Security Operations Engineer
ITPeopleNetwork
4 - 6 years
Kurnool
Posted: 18/12/2025
Job Description
Job Summary
We are looking for a junior to mid-level Security Operations Engineer to support daily operations, monitoring, and administration of key security platformsProofpoint Email Security , Saviynt Identity Access Management (IAM/IGA) , and CyberArk Endpoint Privilege Manager (EPM) . The ideal candidate will assist in user access governance, email threat monitoring, endpoint privilege controls, and basic incident handling.
Key Responsibilities
Email Security (Proofpoint)
- Monitor and triage email security alerts (spam, phishing, malware).
- Review quarantined messages and assist users with release/false-positive requests.
- Support configuration updates such as policies, URL defense, and impersonation protection.
- Assist in preparing reports on email threats and security trends.
Identity Access Management (Saviynt IAM/IGA)
- Support user lifecycle management (provisioning, deprovisioning, access modifications).
- Review access requests and help enforce access approval workflows.
- Assist in periodic access certifications and role-based access reviews.
- Monitor IAM alerts and help resolve basic access governance issues.
Endpoint Privilege Management (CyberArk EPM)
- Monitor endpoint privilege escalations and policy enforcement across endpoints.
- Support the onboarding of new endpoints into EPM policies.
- Assist in managing least-privilege settings and handling user exceptions.
- Review endpoint security logs and help respond to suspicious activity.
General Security Operations
- Contribute to incident response by collecting logs, evidence, and performing first-level analysis.
- Follow established SOPs and update documentation when processes change.
- Collaborate with security, IT, and operations teams to resolve security issues.
- Provide user support and help drive compliance with security policies.
Qualifications
- 14 years of experience in Security Operations or IT Security.
- Basic understanding of Email Security, IAM/IGA concepts, and Endpoint Security.
- Hands-on exposure (even partial) to any of these tools: Proofpoint, Saviynt, CyberArk EPM, Okta, Azure AD, or similar platforms.
- Good analytical, troubleshooting, and communication skills.
- Ability to follow SOPs and work in a fast-paced environment.
Services you might be interested in
Improve Your Resume Today
Boost your chances with professional resume services!
Get expert-reviewed, ATS-optimized resumes tailored for your experience level. Start your journey now.
