11+ Enterprise mobility management Jobs in Hyderabad | Enterprise mobility management Job openings in Hyderabad
Apply to 11+ Enterprise mobility management Jobs in Hyderabad on CutShort.io. Explore the latest Enterprise mobility management Job opportunities across top companies like Google, Amazon & Adobe.
Role- Sr. Engineer Networking-(Post Sales- Implementation Team)
The purpose of the role is to implement and manage different Networking Project implementation for 22by7 customers. Preparing Plan of Action (PoA), Scope of Work (SoW), and implementation documents and submitting to customers.
Key Responsibilities:
Project Implementation as per SoW
Interact with client Project Manager and managing the implementation activities for the client
Troubleshooting L1/L2/L3 tickets and submitting the RCA.
Responsible for documentation and reporting
Presenting the appropriate solutions at customer meetings.
Keeping well informed of general technical developments, company products and services.
Maintaining accurate, up to date reporting using the company systems and providing reporting where required.
Ensuring that product, technical and market knowledge is kept up to date by reading literature, networking, attending training courses, collaborate with other colleagues and sharing unique knowledge with the rest of the company.
Maintaining a positive and healthy attitude that contributes directly to the working environment of the sales team and the Company.
Perform all other role-related tasks as assigned.
Key Requirements:
3 to 5 years of experience, out of which recent 3 years minimum on handson implementation of Aruba switches and wi-fi solutions
Mandatory Hands on experience on technologies (Routing, Switching, Wi fi)
Good understanding of OSI Model, TCP/IP protocol suite (IP, ARP, ICMP, TCP, UDP, SNMP, FTP, TFTP).. IP addressing & sub netting, Routing Concepts (OSPF, BGP), VLSM/CIDR
In-depth knowledge of L2 technology and protocols like VLANs, VLAN Tagging (IEEE 802.1q), LACP, VLAN trunking, STP (IEEE 802.1D and other 802.1 implementations.).
Good working knowledge of Application layer protocols and functions such as FTP, DHCP, DNS, SNMP, HTTP/HTTPS, LDAP, Radius, User Authentication Mechanisms, SMTP etc.
Implementation scenarios, configuration and troubleshooting of network related issues.
Key Skills:
Routers, Switches, Wi-Fi (Primary Skill- Aruba Switches, Aruba Central, Aruba IAP, Mobility Controller, Mobility Master, Aruba Airwave, Aruba CPPM etc)
Secondary Product suite- Cisco or Ruckus
It will be added advantage if the candidate has a combination of skills in Aruba and network security like Palo Alto etc.
Education- Open
Diploma- Any Diploma
UG: Any Graduate - Any Specialization, B.Tech/B.E. - Any Specialization, Electrical, Electronics/Telecommunication, Diploma - Any Specialization
PG: Any Postgraduate - Any Specialization (Post Graduation Not mandatory)
CTC- As per the market standard
- Provide safe transportation for staff, guests, and clients
- Ensure to deliver service to highest standards while adhering to all policies and procedures
- Maintain vehicle mileage logs
- Drive courteously and safely
- Maintain a safe driving record
As an Enterprise Security Architect you will join a growing organization to lead a modern enterprise security program. In this role the Architect will have responsibility for identifying, defining, developing, leading security technology strategy across a broad portfolio of IAM, Cloud, End Point, Network, Web security and related technology systems, and the assessment of new and emerging identity technologies at the very large enterprise scale.
As a senior member of the team you will engage and partner with senior leaders across the organization leveraging your extensive background in (managing / delivering / implementing / architecting) security technology combined with expertise in organizational and cross-functional communication to develop strategy, influence roadmaps, solution adoption, champion strategic opportunities / execution plans with the aim to improve security capabilities, reduce risk and position forward looking identity governance and security enhancements
• Responsible for defining an architectural vision and architecture for large complex solutions, which aligns with the enterprise architecture strategy, technology and platform choices
• Describes the solution intent and the associated operating environment, determining the primary systems/subsystems and their interfaces, defining non-functional requirements and architectural runway to support new epics/features and expand into new opportunities
• Ensures the solution is fit for purpose and use by working with stakeholders, vendors/service providers, and evaluating the impact of strategic design decisions
• Contributes to best practices, standard templates, and the architecture roadmap for defined domains.
• Creates endpoint/host, workplace productivity security reference architecture and design patterns for reusability.
• Contributes in the creation of the architecture roadmap of defined domains (Business, Application, Data and Technology) in support of the product roadmap
• Contributes to the development of best practices including standardized templates
• Works across business and technology to create the solution intent and architectural vision for large complex solutions and evolves it based on an emerging backlog
• Works with Product Manager/Owner to plan and prioritize technology focused backlog items for the architecture runway to enable business epics/features and expand into new opportunities
• Clarifies the architecture for the development teams to support implementation, and provides solution options to resolve any architectural impediments
• Performs design and code reviews to ensure all non-functional requirements for a solution are sufficiently met (e.g. security, performance, maintainability, scalability, usability, and reliability)
• The platform security architect must interpret business, technology and threat drivers, and develop practical security roadmaps to deal with these drivers.
• Develop blueprints and procedures to effectively secure company data against accidental or unauthorized modification, destruction or disclosure.
• Create and define the security architectures and roadmaps encompassing cloud architecture, access management, and monitoring.
• Design and develop data security architectures for cloud and cloud/hybrid-based systems.
• Align architectural design technical controls and solutions to industry best practices and guidelines (e.g., NIST CSF, CSA, CIS, OWASP)
What are we looking for?
We want strong collaborators who can deliver a world-class client experience. We are looking for people who thrive in a fast-paced environment, are client-focused, team oriented, and are able to execute in a way that encourages creativity and continuous improvement.
Requirements:
• 10+ years of hands-on experience with scoping, sizing, designing, architecting & building IAM solutions across various technologies, or demonstrated ability to meet job requirements through comparable work experience.
• Expert level knowledge of authentication/authorization standards, protocols, and frameworks such as FIDO, OpenID, SAML, OAuth, JWT, CA, X.509, MTLS, etc.
• Technical expertise and experience with Microsoft MFA, SailPoint, CyberArk, ForgeRock, Okta, Ping, Active Directory, Azure Active Directory, AWS, Google Cloud Platform, Microsoft Azure, and IDM integration across domains
• Solid understanding of Cloud concepts and hands on knowledge on Azure/AD or other cloud identity environments.
• Experience designing and implementing security services and tools applied to GCP, Azure and AWS
• Expertise with Data Loss Prevention and CASB strategies and solutions supporting security of critical SaaS solutions such as Office 365, etc.
• Experience with Hybrid cloud architectures and designs
• Must have experience with Internet Application Hosting architectures, best practices and related technologies to effectively protect externally facing applications
• Experience with DevSecOps process, Container technologies (Docker, Kubernetes), API Gateways, and other common web application technologies is preferred
• Strong knowledge of enterprise security concepts/frameworks and products, secure design principles and best practices
• Strong verbal and writing skills to develop technical documentation and presentations
• Experience in leading technical architecture and security design discussions
• Experience managing multiple multi-level stakeholder relationships
• Bachelors in Computer Science, Computer Engineering or related field
“Such other task that Company may assign you time to time”.
Responsibilities: |
· Supports the security of next generation endpoint technology (Windows and Mac). |
· Assists with coordination and implementation of efforts with various IT teams to ensure solutions are fully tested and deployed enterprise wide. |
· Designs, builds, tests, secures, and documents endpoint security standards. |
· Participates on project teams as a resource representing Endpoint Engineering. |
· Manage an Engineering Team and provide support for users with more advanced security software issues with the highest service quality and customer satisfaction. |
· Ensures OS, security, and application lifecycle updates are consistently deployed on defined schedule. |
· Leverages/Consolidate SCCM Intune, and other data sources to build executive reports to measure compliance and provide dashboard and metrics to leadership. |
· Analyse security product issues and create workarounds along with self-healing automation for silent remediations. |
· Works closely with the Security Operations team to improve workflow and tool usage workflow for enhanced monitoring and response capabilities. |
· Evaluates risk, address security issues, facilitate and execute remediation activities across the organization. |
· Patriate in security assessment and validation of new technologies and major security changes. |
· Review security configurations and compliance on all endpoints technologies as well as assists with audits. |
· On-call for endpoint security incidents response and operational functions including triage, escalation, post-mortem, and remediation. |
· Uses data and operational metrics to analyse project and task results. Creates reports and charts to track progress and measures trends in the environment. Leverages data and reporting tools to make data-driven decisions about projects and tasks. |
· Engages with other IT support teams including Network Engineering, Enterprise Infrastructure, Service Desk, IT Security, and Technical Services to ensure a consistent approach for organizational support across the Enterprise. |
· Frontend new product POC and work closely with various stake holder including OEM. |
· Performs other duties and projects as assigned. |
Requirements: |
· Strong analytical, troubleshooting, and problem-solving skills. |
· Strong technical understanding of Endpoint Security in End User Computing. |
· Effective organizational and time management skills. |
· Effective team management skills. |
· Demonstrates knowledge of, adherence to, monitoring and responsibility for compliance with the international regulations and laws as they pertain to this position (Endpoint Security). |
· Strong understanding of past, current, and emerging malware and security exploits. |
· Minimum of fifteen (15) + years of comprehensive IT experience working with multiple operating systems, such as Windows desktop and server, Mac, Linux, etc. |
· Minimum of five (5) + years of with Cisco AMP or equivalent EDR/EPP/MDR/XDR tools. |
· Minimum of five (5) + years of with PMC or equivalent Endpoint Privilege Management tools. |
· Knowledge in Zero Trust Security framework. |
· Expert knowledge EPP, EDR, XDR, MDR, Privilege Management Active Directory, including Group Policy, DNS and organization unit design best practices. |
· Knowledge of SCCM, Azure Active Directory, and Intune. |
· Deep understanding of the Windows registry, Windows and macOS permissions, macOS preferences, and drivers and software required to build baseline images. |
· Knowledge of Mobile device management using Intune, JAMF. |
· Report writing expertise using Database Tools. |
· Advanced skills in creating SOP, SOW and Presentation decks using Microsoft Office applications including but not limited to Visio, Word, Excel, PowerPoint, and Outlook. |
· Exceptional verbal, written and interpersonal communication skills. |
· Ability to troubleshoot complex LAN/WAN issues related to connectivity, security, and physical location. |
· Ability to deliver stable and high-quality working solutions under deadlines in a fast-paced and dynamic environment. |
· Ability to make decisions that have significant impact on the enterprise. |
· Ability to manage ambiguity, operate effectively when things are not certain, or the way forward is not clear. |
· Ability to provide consultation and expert advice to management. |
· Ability to discuss emerging technologies such as cloud endpoint management. |
· Ability to make informal and formal presentations, inside and outside the organization; speaking before assigned team or other groups as needed. |
· Ability to deal with complex difficult problems involving multiple facets and variables in non-standardized situations. |
· Knowledge in securing/supporting/administering a virtual desktop environment running on VMware vSphere and Azure Virtual Desktop. |
· Experience creating deployment test plans, test cases, managing deployment groups, and soliciting feedback from pilot users. General understanding of software development, agile, CI/CD required. |
· Bachelor’s Degree in engineering or Cyber security preferred and a minimum of five (5) + years’ experience with security engineering. |
The company has raised $14.5 MM in seed funding and partners with over 30 manufacturers around the world and is founded by seasoned entrepreneurs and technology leaders who come from institutions like IIT Bombay and Stanford GSB.
As a Talent Acquisition Manager, you will be responsible for managing the full cycle recruitment process starting from sourcing to on- boarding and generating an excellent candidate experience.
What you will do:
- Working closely with the Founders of the company to design and implement the overall Talent Acquisition and Organization development strategies
- Developing an effective hiring process for each requirement and setting evaluation parameters for the purpose of assessment
- Utilizing effective networking methods to build a robust pipeline of candidates for potential hiring needs
- Collaborating with hiring managers to refine and implement innovative hiring strategies
- Proactively sourcing candidates through multiple channels like job portals, headhunting, referrals, social media and others
- Screening resumes, interviewing and managing candidates throughout the interview process till final offer negotiation
- Managing candidate status in the internal applicant tracking system
- Gaining market intelligence by performing competitor analysis and talent mapping
- Maximizing ROI on recruitment costs
Desired Candidate Profile
What you need to have:- MBA from tier 1/ 2 colleges
- At least 5-10 years experience in core recruitment
- Tech and startup experience preferred
- Knowledge of applicant tracking systems
- Good presentation skills
- Excellent verbal and written communication skills
- Proficiency in MS Office Applications
Responsibilities:
The Senior Information Security Engineer is responsible for the implementation, execution and maintenance of technology solutions to mitigate risk, to protect the IT and Engineering environments by reducing the probability of, and to minimize the effects of, damage caused by malware, malicious activities and security events.
The individual will help protect the company by deploying, tuning, and managing security tools across the computing environment, as well as provide security incident response cycle support. They should have a passion and skills for identifying the latest cyber threats. The individual will:
Basic Qualifications
- Working knowledge of infrastructure-as-code and CI/CD pipelines tools (i.e. Jenkins, Teamcity, CircleCI etc..)
- Lead and participate in major day-to-day operational aspects of the security engineering team including improvement of current security controls while constantly identifying areas of needed improvement
- Deep hands-on security experience with cloud providers, such as AWS, GCP, Azure
- Understanding of automated security testing approaches and tools
- Experience with proactive integration of security into the development process
- Lead continuous improvement efforts of out security tools and systems (Concertation on SIEM, IDS, EDR Tools)
- Work with our customers (Security Operations, Incident Response, and Product teams) to incorporate high quality security alerting into their operational workflows
- Improve overall security practitioner efficiency through process automation
- Foster and promote collaboration among all members of the IT, Infrastructure, and Risk Management Departments.
Minimum Qualifications/Requirements
- BS or MS in Computer Science or related field
- Minimum 7+ years of cybersecurity experience
- Must have previous experience performing threat hunting and incident response duties using SIEM tools, cybersecurity management consoles, and ticketing systems
- Experience in deployment, development, and maintenance of SIEM
- Experience writing and using Ansible server administration scripts, and create simple Python, BASH, or Powershell scripts to automate cybersecurity functions
- Scripting experience to automate security operations, alerting, and compliance checks, CI/CD design, deployment, and management
- Experience with managing endpoint response and detection infrastructure and endpoints at the enterprise level, including performing upgrades to the back end application and deploying new agent versions to endpoints
- Understanding the investigative process and performing triage for cybersecurity incidents
- Experience maintaining industry leading security technologies or infrastructure systems in complex technical IT operations environment
- Must be detail-oriented and organized with ability to handle competing demands while meeting deadlines
- Experience in authentication protocols and frameworks to include OAuth, and AWS IAM
- Proactive and motivated; team player with a positive can-do attitude
- Strong analytical/problem-solving skills and cross-functional knowledge across multiple IT operational and security disciplines
- Ability to communicate technical concepts to a broad range of technical and non-technical staff
- Must possess a high degree of integrity, be trustworthy, and have the ability to lead and inspire change
Sr. Technical IT Recruiter
Prefers someone local to Bangalore, or okay with any Accion offices at Hyderabad, Pune, Mumbai post pandemic,
Complete WFH is also possible for a right candidate
Present Virtual Operations since Covid
Full Time Permanent Opportunity; Okay with CTH model too
Job Descritiption:
- Min of 3 plus years of relevant END-END recruitment experience; Starting from sourcing a candidate till onboarding, maintaing complete rapport
- Worked in fast paced environments, eager to learn new work, passionate about recruitment
- Individual contributor, has good listening skills,
- Smart working
- Thinking out of the way in hiring talent
- Good to have social medial platforms hiring
- Fast Leaner, who has aspirations to grow next level very soon
- Prior experience in hiring Emerging Technologies is a PLUS
- Very good opportunity to hire and recruit candidates only for cutting edge emerging techologies mostly
- 8+ years of experience in software development
- 4+ years of recent hands-on experience in architecting and building complex solutions that run in SaaS/PaaS environments, especially on AWS cloud leveraging SaaS based Microservices development coupled with Distributed Caching & Message Queuing.
- Should have experience in developing solution architecture and/or evaluate architectural alternatives for private, public and hybrid cloud models, including IaaS, PaaS, and other cloud services
- Should have excellent knowledge of cloud architecture and implementation features (OS, multi-tenancy, virtualization, orchestration, elastic scalability)
- Should have experience with Full Stack development with experience in technology stacks/frameworks like JAVA, Springboot, Python, Redis, SQL, NoSQL and Graph DBs
- Good to have Architected solutions that handle Big Data and should be proficient in data analytics
- Must have Expert level proficiency in Design / Architectural patterns, data structures and algorithms
- Must demonstrate knowledge of DevOps tool chains and processes
- Experience in web-based application migration from on-premise to SaaS model is a big plus.
- Experience of Integration patterns and associated best practice(e.g. Web Services, REST API's, Pub/Sub, MOM)
- Excellent knowledge and hands-on experience in Web services related, functionally decomposed architecture, Load Balancing of Web Services and applications, designing multi-tenant systems, Clustering and sharding of data, microservices architecture / design patterns, and throttling and performance management of such services
This IT company is currently hiring for penetration testing.
JOB DESCRIPTION
(NOTE- we are looking for those candidates who join immediately or notice period of within 15-20days)
• Job Scope
o Conduct penetration testing on internal website/system owned by EC-Council
o Produce a report and presentation to the system owner explaining the security
structure and the vulnerabilities of the system
o Conduct scoping for any new projects
o Research and recommend fixes for issues/vulnerabilities identified during the
penetration testing
o Create and update security test plan regularly according to the nature of the website
assigned
o Conduct research on new vulnerabilities and threats regularly to improve oneself
capabilities
• Minimum Requirements
o At least 3 year experience in conducting any three of the following
▪ Network Penetration Testing
▪ Mobile Application Penetration Testing
▪ Web Application Penetration Testing
▪ Source Code Review
▪ Writing, extending and modifying exploits, shellcode
▪ Reverse engineering malware, data obfuscation and ciphers
o Bachelor’s degree in IT security related field or equivalent
o Any (2) of the following certification ; OSCP, OSCE, OSEP, OSWE, CRT, LPT or
equivalent
o Proficiency in at least 1 programming language such as PHP, ruby, Python, Perl
o Strong understanding of encryption (SSL/TLS, PKI) and other authentication methods
o Good experience with tools used for penetration testing such as Metasploit,
BurpSuite, w3af, Kali Linux, SQLMap, Skipfish
o Excellent written and verbal communication skills, especially when dealing with
large reports and datasets with a high standard of documentation
o Mastery in linux/unix operating system and bash/Powershell