Pune, Maharashtra, India
None Not disclosed
Remote
Full Time
3Columns is a specialist cybersecurity firm that delivers a wide range of services, including security assurance, security governance, professional services, and managed services. Solutions include managed security services, offensive security services, cybersecurity consulting, and professional services to assist customers in deploying all the required controls. The core services delivered by the SOC are Managed Detection and response and Incident Response. About the Role: 3Columns is seeking a SOC Analyst to join their team remotely. They will be responsible for expanding the business by delivering outcome-based engagements to various clients and proactively improving the Managed SOC and SIEM capabilities within the organizations they are engaged with. The SOC analyst will work with the team to assist clients in investigating the logs, creating playbooks, and proactively notifying the customers. Have experience or understanding of a wide range of technologies such as Office365, InTunes, MS Defender, Rapid7 SIEM, Vulnerability Management, Mimecast, CrowdStrike and SentinelOne to support the business and help drive the success of organizational business strategies. The successful applicant will become integral to each client's cybersecurity strategy, developing strong relationships and becoming a trusted partner within each organization. To be successful in this role, you will have the following: Minimum of 4 years of experience. String experience with investigation and Incident handling. Strong Log analysis capability. Experience with investigations related to Malware alerts, Phishing emails, Suspicious logins, etc. Experience in security tools and technologies such as SIEM, IDS/IPS, Firewalls, and Vulnerability Management Experience in scanning for vulnerabilities Hands-on practical knowledge of EDR such as MS Defender, CrowdStrike, SentinelOne Understanding of MITRE attack framework and related Techniques. Some understanding of Digital Forensics or desire to learn the technology. Good understanding of SIEM solutions such as Rapid7, Azure Sentinel, Wazuh or Graylog. Desire to excel in career and learn new tools and technology Personal Skills Must be forward-thinking in terms of vision for the business and team culture. Come up with innovative ideas to deliver services to the customer Ability to speak about security and recommend security controls to experienced security professionals and executives confidently and accurately. The ability to work as part of a team. Flexibility and motivation to work across various types of engagements. The ability to multitask and service multiple clients at once. Is detail-orientated, self-motivated and can work independently.
Pune, Maharashtra, India
None Not disclosed
Remote
Full Time
3Columns is a specialist cybersecurity firm that delivers a wide range of services, including security assurance, security governance, professional services, and managed services. Solutions include managed security services, offensive security services, cybersecurity consulting, and professional services to assist customers in deploying all the required controls. The core services delivered by the SOC are Managed Detection and Response and Incident Response. About the Role: 3Columns is seeking an SOC Lead Investigator / Level 3 analyst to join their team remotely. They will be responsible for expanding the business by delivering outcome-based engagements to various clients and proactively improving the Managed SOC and SIEM capabilities within the organisations they are engaged with. The SOC analyst will work with the team to assist clients in investigating the logs, creating playbooks, and proactively notifying customers. Have experience or understanding of a wide range of technologies such as Office365, InTunes, MS Defender, Rapid7 SIEM, Vulnerability Management, Mimecast, CrowdStrike and SentinelOne to support the business and help drive the success of organisational business strategies. The successful applicant will become integral to each client's cybersecurity strategy, developing strong relationships and becoming a trusted partner within each organisation. Lead Investigator – SOC Responsibilities: Minimum of 7 years of experience Must have hands-on experience is investigations related to Malware, Advanced TTP, Have experience is detections and dealing with cases related to Ransomware. Strong understanding of Windows and Linux System event logs. Experience with Threat Hunting and Rule writing. Lead and coordinate in-depth investigations into security incidents, ensuring timely and accurate response. Act as the primary escalation point for complex and high-impact incidents. Provide technical and strategic guidance to Level 2 analysts throughout the investigation lifecycle. Review and validate findings from Level 2 investigations, ensuring completeness and quality of analysis. Develop and maintain standardised investigation checklists, workflows, and playbooks. Conduct regular case reviews and post-incident debriefs to identify gaps and drive continuous improvement. Mentor and coach Level 2 analysts to build investigative skills and improve threat detection capabilities. Ensure adherence to investigation procedures, evidence handling, and documentation standards. Collaborate with Threat Intelligence, Incident Response, and Engineering teams to enrich investigations. Recommend and implement improvements in investigation tools, techniques, and processes. Track investigation metrics and provide reports to SOC leadership on team performance and incident trends. Stay current on threat actor techniques, tools, and procedures (TTPs) to enhance investigation quality. Please Note: - To save you time with rejections and save our time, if you do not have experience in SOC, you will be rejected. Candidates, who will apply without any SOC experience just for the sake of applying will be blacklisted for next 10 years.
India
None Not disclosed
On-site
Full Time
This role is focused on the delivery of SOC / MDR services for our customers. Experience with SOC, SIEM and understanding of cybersecurity is very important for this role. Candidates with no SOC, SIEM or Cyber experience will not be selected for this role. Candidates who are applying for this role for sake of applying will be blacklisted for 10 years. Please do not waste your time or my time. Thanks alot in advance. Company Profile: 3Columns is a specialist cybersecurity firm delivering a wide range of services from Security Assurance, Security Governance, Professional services and Managed Services. Solutions include Managed Security Services, Offensive Security Services, Cyber Security Consulting, and professional services to assist customers in deploying all the required controls. The core service delivered by the SOC is Managed Detection & Response and Incident Response. About the Role: We are looking for a Service Delivery Manager (SDM) to join our team on a full-time permanent basis. You will own the key Service Delivery relationship, delivering excellence in service assurance, liaising with internal technical staff on behalf of the client, providing generalist Cyber consultancy, be “application aware” and assisting with uncovering growth opportunities with the client through new or product upgrades. This role is focused on delivering SOC services for our customers. Experience with SOC, SIEM, and understanding of cybersecurity are very important for this role. A successful candidate in this role would have a good balance between customer service, technical knowledge and experience dealing with C-level executives. Key Responsibilities Preparing and presenting client operational reporting at monthly meetings Client SLAs and Reporting (including driving enhancements) Ensure L1 and L2 analysts are meeting SLA and following the procedures. Great report writing skills. Onboarding of new Clients. Continuously improve operations and client engagement. Continual Service Improvement Plans (CSIP) for client patch Develop a deep understanding of the client’s business, including orchestration of strategic business planning, roadmaps and workshops Risk and Issue Management Problem Management Scope Management Change Management Major incident management Skills and Experience: Minimum of 5 years of work experience in Service Management Experience in delivering Cyber of SOC (Security Operation Centre ) service is very important Experienced working in an MSP environment ITIL Service Management accreditation Proven experience with Incident response. Strong working knowledge of ITSM service delivery concepts Demonstrated ability to position and present at a C-suite level Demonstrated ability to lead and collaborate with a multi-disciplined team Demonstrated skills in time management · Strategic thinking with a get-up-and-go attitude A willingness to work and adapt to a fast-growing & changing environment. Self-sufficiency and a high degree of autonomy. Ability to work within a team and achieve results through others Ability to influence external & internal stakeholders as part of a continuous improvement life cycle for customers. Lead the incidents to resolution. Desirable Commercial experience & exposure to Presales or Solutions Architecture in as many of the following areas: IT, cloud, Networking & Cyber Security. Industry-based technical certifications (e.g., Cisco, Fortinet, Palo Alto, CrowdStrike, Rapid7, NetSkope Etc.) This role is focused on the delivery of SOC services for our customers. Experience with SOC, SIEM and understanding of cybersecurity is very important for this role. Candidates with no SOC, SIEM or Cyber experience will not be selected for this role
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.