×
Register Here to Apply for Jobs or Post Jobs. X

Security Engineer

Job in 411001, Pune, Maharashtra, India
Listing for: Confidential
Full Time position
Listed on 2026-02-04
Job specializations:
  • IT/Tech
    Cybersecurity, Network Security, Information Security, IT Consultant
Job Description & How to Apply Below
ISA is a premier technology solution provider for the Aviation industry. We are backed by Air Arabia and headquartered in Sharjah, UAE.  (Use the "Apply for this Job" box below)./

ISA (Information Systems Associates) is a premier in the field of Information Technology providing best-of-breed technology solutions for the global travel and aviation industry since 2005. We offer a wide range of tailor-made aviation technology

We are hiring! Pune location
Smartworks Building, Nexa Soft, Core Ops,5th Floor, 43EQ, Survey No 44, PLOT A, H. No. 8/1 (P, opp. Opp. Ravindranath Tagore School of Excellence,, Balewadi, Pune, Maharashtra 411045

Job Title:

Security Engineer
Job Type: Full-time

Reports To:

Security Architect

Job Overview:

We are seeking a  highly skilled Security Engineer  to design, implement, and manage the security architecture of our organization. The ideal candidate will be responsible for  firewall and endpoint security, WAF implementation, VAPT, fraud investigation, dark web monitoring, brand monitoring, email security, and compliance enforcement . The role requires expertise in securing IT infrastructure, conducting risk assessments, ensuring compliance, and implementing  Microsoft security layers  to strengthen the organization's security posture.

Key Responsibilities:

1. Firewall, Endpoint & WAF Security
Design, configure, and manage  firewalls  (Palo Alto, Fortinet, Cisco ASA, Check Point).
Deploy and maintain  Web Application Firewalls (WAF)  for web security (Cloudflare, Imperva, AWS WAF).
Implement  Endpoint Detection & Response (EDR)  solutions like  Microsoft Defender for Endpoint, Crowd Strike, Sentinel One .
Conduct regular firewall rule audits, optimize configurations, and enforce  Zero Trust principles .

2. Microsoft Security Layer Implementation

a. Microsoft Email Security
Configure and manage  Microsoft Defender for Office 365  to protect against phishing, malware, and email threats.
Implement  Safe Links, Safe Attachments, and Anti-Phishing policies .
Monitor and respond to email security alerts in  Microsoft Security Portal .
Conduct  email security threat hunting  using Defender for O365 and advanced hunting queries.
b. Microsoft Endpoint Security
Deploy and manage  Microsoft Defender for Endpoint (MDE)  to protect corporate devices.
Enforce  attack surface reduction (ASR) rules  for endpoint protection.
Configure  endpoint compliance policies  using  Microsoft Intune .
Implement  DLP (Data Loss Prevention) policies  to prevent data exfiltration.
c. Compliance & Risk Management
Implement and monitor  Microsoft Purview Compliance Manager  for risk assessment.
Enforce  Information Protection & Encryption Policies  using Microsoft Purview.
Configure and manage  Conditional Access Policies  in  Microsoft Entra  .
Ensure compliance with security frameworks like  ISO 27001, NIST, CIS, and GDPR .
3. Dark Web Monitoring & Brand Protection
Monitor  dark web forums, marketplaces, and underground networks  for stolen credentials, data leaks, and insider threats.
Implement  dark web intelligence tools  such as Recorded Future, Digital Shadows, or Microsoft Defender Threat Intelligence.
Work with  threat intelligence platforms  to detect and respond to  brand impersonation, phishing sites, and fraudulent domains .
Collaborate with  legal and compliance teams  to enforce takedowns of malicious content.

4. Fraudulent Incident Investigation & Threat Hunting
Investigate  fraud incidents, phishing attempts, and business email compromise (BEC) .
Conduct  forensic analysis  on compromised endpoints, servers, and email accounts.
Develop and implement  threat intelligence and threat hunting  processes.
Work closely with  SOC teams for incident response and mitigation .

5. VAPT & IT Security Operations
Perform  Vulnerability Assessments & Penetration Testing (VAPT)  on infrastructure, applications, and cloud environments.
Implement and manage  intrusion detection/prevention systems (IDS/IPS) .
Monitor, analyze, and mitigate vulnerabilities from  external and internal security scans .
Work with teams to remediate vulnerabilities and harden IT assets.

6. IT Security & Compliance Management
Develop and enforce  security policies, standards, and procedures .
Impleme…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary