Security architect
BengaluruAccenture
...labels, DLP policies, and auto-labeling rules. -Monitor alerts, investigate policy violations, and drive remediation. -Cyberhaven -Manage Cyberhaven for data flow visibility, insider threat detection, and data exfiltration prevention. -Analyze user behavior and data movement across endpoints, browsers, and cloud applications. [...]
Job Type: Full-time
Category Education, Training, & Library