Job Description & How to Apply Below
ISA (Information Systems Associates) is a premier in the field of Information Technology providing best-of-breed technology solutions for the global travel and aviation industry since 2005. We offer a wide range of tailor-made aviation technology
We are hiring! Pune location
Smartworks Building, Nexa Soft, Core Ops,5th Floor, 43EQ, Survey No 44, PLOT A, H. No. 8/1 (P, opp. Opp. Ravindranath Tagore School of Excellence,, Balewadi, Pune, Maharashtra 411045
Job Title:
Security Engineer
Job Type: Full-time
Reports To:
Security Architect
Job Overview:
We are seeking a highly skilled Security Engineer to design, implement, and manage the security architecture of our organization. The ideal candidate will be responsible for firewall and endpoint security, WAF implementation, VAPT, fraud investigation, dark web monitoring, brand monitoring, email security, and compliance enforcement . The role requires expertise in securing IT infrastructure, conducting risk assessments, ensuring compliance, and implementing Microsoft security layers to strengthen the organization's security posture.
Key Responsibilities:
1. Firewall, Endpoint & WAF Security
Design, configure, and manage firewalls (Palo Alto, Fortinet, Cisco ASA, Check Point).
Deploy and maintain Web Application Firewalls (WAF) for web security (Cloudflare, Imperva, AWS WAF).
Implement Endpoint Detection & Response (EDR) solutions like Microsoft Defender for Endpoint, Crowd Strike, Sentinel One .
Conduct regular firewall rule audits, optimize configurations, and enforce Zero Trust principles .
2. Microsoft Security Layer Implementation
a. Microsoft Email Security
Configure and manage Microsoft Defender for Office 365 to protect against phishing, malware, and email threats.
Implement Safe Links, Safe Attachments, and Anti-Phishing policies .
Monitor and respond to email security alerts in Microsoft Security Portal .
Conduct email security threat hunting using Defender for O365 and advanced hunting queries.
b. Microsoft Endpoint Security
Deploy and manage Microsoft Defender for Endpoint (MDE) to protect corporate devices.
Enforce attack surface reduction (ASR) rules for endpoint protection.
Configure endpoint compliance policies using Microsoft Intune .
Implement DLP (Data Loss Prevention) policies to prevent data exfiltration.
c. Compliance & Risk Management
Implement and monitor Microsoft Purview Compliance Manager for risk assessment.
Enforce Information Protection & Encryption Policies using Microsoft Purview.
Configure and manage Conditional Access Policies in Microsoft Entra .
Ensure compliance with security frameworks like ISO 27001, NIST, CIS, and GDPR .
3. Dark Web Monitoring & Brand Protection
Monitor dark web forums, marketplaces, and underground networks for stolen credentials, data leaks, and insider threats.
Implement dark web intelligence tools such as Recorded Future, Digital Shadows, or Microsoft Defender Threat Intelligence.
Work with threat intelligence platforms to detect and respond to brand impersonation, phishing sites, and fraudulent domains .
Collaborate with legal and compliance teams to enforce takedowns of malicious content.
4. Fraudulent Incident Investigation & Threat Hunting
Investigate fraud incidents, phishing attempts, and business email compromise (BEC) .
Conduct forensic analysis on compromised endpoints, servers, and email accounts.
Develop and implement threat intelligence and threat hunting processes.
Work closely with SOC teams for incident response and mitigation .
5. VAPT & IT Security Operations
Perform Vulnerability Assessments & Penetration Testing (VAPT) on infrastructure, applications, and cloud environments.
Implement and manage intrusion detection/prevention systems (IDS/IPS) .
Monitor, analyze, and mitigate vulnerabilities from external and internal security scans .
Work with teams to remediate vulnerabilities and harden IT assets.
6. IT Security & Compliance Management
Develop and enforce security policies, standards, and procedures .
Impleme…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
Search for further Jobs Here:
×