3Columns

6 Job openings at 3Columns
SOC Analyst L2 Pune,Maharashtra,India 4 years None Not disclosed Remote Full Time

3Columns is a specialist cybersecurity firm that delivers a wide range of services, including security assurance, security governance, professional services, and managed services. Solutions include managed security services, offensive security services, cybersecurity consulting, and professional services to assist customers in deploying all the required controls. The core services delivered by the SOC are Managed Detection and response and Incident Response. About the Role: 3Columns is seeking a SOC Analyst to join their team remotely. They will be responsible for expanding the business by delivering outcome-based engagements to various clients and proactively improving the Managed SOC and SIEM capabilities within the organizations they are engaged with. The SOC analyst will work with the team to assist clients in investigating the logs, creating playbooks, and proactively notifying the customers. Have experience or understanding of a wide range of technologies such as Office365, InTunes, MS Defender, Rapid7 SIEM, Vulnerability Management, Mimecast, CrowdStrike and SentinelOne to support the business and help drive the success of organizational business strategies. The successful applicant will become integral to each client's cybersecurity strategy, developing strong relationships and becoming a trusted partner within each organization. To be successful in this role, you will have the following: Minimum of 4 years of experience. String experience with investigation and Incident handling. Strong Log analysis capability. Experience with investigations related to Malware alerts, Phishing emails, Suspicious logins, etc. Experience in security tools and technologies such as SIEM, IDS/IPS, Firewalls, and Vulnerability Management Experience in scanning for vulnerabilities Hands-on practical knowledge of EDR such as MS Defender, CrowdStrike, SentinelOne Understanding of MITRE attack framework and related Techniques. Some understanding of Digital Forensics or desire to learn the technology. Good understanding of SIEM solutions such as Rapid7, Azure Sentinel, Wazuh or Graylog. Desire to excel in career and learn new tools and technology Personal Skills Must be forward-thinking in terms of vision for the business and team culture. Come up with innovative ideas to deliver services to the customer Ability to speak about security and recommend security controls to experienced security professionals and executives confidently and accurately. The ability to work as part of a team. Flexibility and motivation to work across various types of engagements. The ability to multitask and service multiple clients at once. Is detail-orientated, self-motivated and can work independently.

SOC Analyst L3 Pune,Maharashtra,India 7 years None Not disclosed Remote Full Time

3Columns is a specialist cybersecurity firm that delivers a wide range of services, including security assurance, security governance, professional services, and managed services. Solutions include managed security services, offensive security services, cybersecurity consulting, and professional services to assist customers in deploying all the required controls. The core services delivered by the SOC are Managed Detection and Response and Incident Response. About the Role: 3Columns is seeking an SOC Lead Investigator / Level 3 analyst to join their team remotely. They will be responsible for expanding the business by delivering outcome-based engagements to various clients and proactively improving the Managed SOC and SIEM capabilities within the organisations they are engaged with. The SOC analyst will work with the team to assist clients in investigating the logs, creating playbooks, and proactively notifying customers. Have experience or understanding of a wide range of technologies such as Office365, InTunes, MS Defender, Rapid7 SIEM, Vulnerability Management, Mimecast, CrowdStrike and SentinelOne to support the business and help drive the success of organisational business strategies. The successful applicant will become integral to each client's cybersecurity strategy, developing strong relationships and becoming a trusted partner within each organisation. Lead Investigator – SOC Responsibilities: Minimum of 7 years of experience Must have hands-on experience is investigations related to Malware, Advanced TTP, Have experience is detections and dealing with cases related to Ransomware. Strong understanding of Windows and Linux System event logs. Experience with Threat Hunting and Rule writing. Lead and coordinate in-depth investigations into security incidents, ensuring timely and accurate response. Act as the primary escalation point for complex and high-impact incidents. Provide technical and strategic guidance to Level 2 analysts throughout the investigation lifecycle. Review and validate findings from Level 2 investigations, ensuring completeness and quality of analysis. Develop and maintain standardised investigation checklists, workflows, and playbooks. Conduct regular case reviews and post-incident debriefs to identify gaps and drive continuous improvement. Mentor and coach Level 2 analysts to build investigative skills and improve threat detection capabilities. Ensure adherence to investigation procedures, evidence handling, and documentation standards. Collaborate with Threat Intelligence, Incident Response, and Engineering teams to enrich investigations. Recommend and implement improvements in investigation tools, techniques, and processes. Track investigation metrics and provide reports to SOC leadership on team performance and incident trends. Stay current on threat actor techniques, tools, and procedures (TTPs) to enhance investigation quality. Please Note: - To save you time with rejections and save our time, if you do not have experience in SOC, you will be rejected. Candidates, who will apply without any SOC experience just for the sake of applying will be blacklisted for next 10 years.

Service Delivery Manager (SOC Service) India 10 years None Not disclosed On-site Full Time

This role is focused on the delivery of SOC / MDR services for our customers. Experience with SOC, SIEM and understanding of cybersecurity is very important for this role. Candidates with no SOC, SIEM or Cyber experience will not be selected for this role. Candidates who are applying for this role for sake of applying will be blacklisted for 10 years. Please do not waste your time or my time. Thanks alot in advance. Company Profile: 3Columns is a specialist cybersecurity firm delivering a wide range of services from Security Assurance, Security Governance, Professional services and Managed Services. Solutions include Managed Security Services, Offensive Security Services, Cyber Security Consulting, and professional services to assist customers in deploying all the required controls. The core service delivered by the SOC is Managed Detection & Response and Incident Response. About the Role: We are looking for a Service Delivery Manager (SDM) to join our team on a full-time permanent basis. You will own the key Service Delivery relationship, delivering excellence in service assurance, liaising with internal technical staff on behalf of the client, providing generalist Cyber consultancy, be “application aware” and assisting with uncovering growth opportunities with the client through new or product upgrades. This role is focused on delivering SOC services for our customers. Experience with SOC, SIEM, and understanding of cybersecurity are very important for this role. A successful candidate in this role would have a good balance between customer service, technical knowledge and experience dealing with C-level executives. Key Responsibilities Preparing and presenting client operational reporting at monthly meetings Client SLAs and Reporting (including driving enhancements) Ensure L1 and L2 analysts are meeting SLA and following the procedures. Great report writing skills. Onboarding of new Clients. Continuously improve operations and client engagement. Continual Service Improvement Plans (CSIP) for client patch Develop a deep understanding of the client’s business, including orchestration of strategic business planning, roadmaps and workshops Risk and Issue Management Problem Management Scope Management Change Management Major incident management Skills and Experience: Minimum of 5 years of work experience in Service Management Experience in delivering Cyber of SOC (Security Operation Centre ) service is very important Experienced working in an MSP environment ITIL Service Management accreditation Proven experience with Incident response. Strong working knowledge of ITSM service delivery concepts Demonstrated ability to position and present at a C-suite level Demonstrated ability to lead and collaborate with a multi-disciplined team Demonstrated skills in time management · Strategic thinking with a get-up-and-go attitude A willingness to work and adapt to a fast-growing & changing environment. Self-sufficiency and a high degree of autonomy. Ability to work within a team and achieve results through others Ability to influence external & internal stakeholders as part of a continuous improvement life cycle for customers. Lead the incidents to resolution. Desirable Commercial experience & exposure to Presales or Solutions Architecture in as many of the following areas: IT, cloud, Networking & Cyber Security. Industry-based technical certifications (e.g., Cisco, Fortinet, Palo Alto, CrowdStrike, Rapid7, NetSkope Etc.) This role is focused on the delivery of SOC services for our customers. Experience with SOC, SIEM and understanding of cybersecurity is very important for this role. Candidates with no SOC, SIEM or Cyber experience will not be selected for this role

Service Delivery Manager (SOC Service) India 10 years None Not disclosed On-site Full Time

This role is focused on the delivery of SOC / MDR services for our customers. Experience with SOC, SIEM and understanding of cybersecurity is very important for this role. Candidates with no SOC, SIEM or Cyber experience will not be selected for this role. Candidates who are applying for this role for sake of applying will be blacklisted for 10 years. Please do not waste your time or my time. Thanks alot in advance. This role is focused on the delivery of SOC services for our customers. Experience with SOC, SIEM and understanding of cybersecurity is very important for this role. Candidates with no SOC, SIEM or Cyber experience will not be selected for this role  Company Profile: 3Columns is a specialist cybersecurity firm delivering a wide range of services from Security Assurance, Security Governance, Professional services and Managed Services. Solutions include Managed Security Services, Offensive Security Services, Cyber Security Consulting, and professional services to assist customers in deploying all the required controls. The core service delivered by the SOC is Managed Detection & Response and Incident Response. About the Role: We are looking for a Service Delivery Manager (SDM) to join our team on a full-time permanent basis. You will own the key Service Delivery relationship, delivering excellence in service assurance, liaising with internal technical staff on behalf of the client, providing generalist Cyber consultancy, be “application aware” and assisting with uncovering growth opportunities with the client through new or product upgrades. This role is focused on delivering SOC services for our customers. Experience with SOC, SIEM, and understanding of cybersecurity are very important for this role. A successful candidate in this role would have a good balance between customer service, technical knowledge and experience dealing with C-level executives. Key Responsibilities Preparing and presenting client operational reporting at monthly meetings Client SLAs and Reporting (including driving enhancements) Ensure L1 and L2 analysts are meeting SLA and following the procedures. Great report writing skills. Onboarding of new Clients. Continuously improve operations and client engagement. Continual Service Improvement Plans (CSIP) for client patch Develop a deep understanding of the client’s business, including orchestration of strategic business planning, roadmaps and workshops Risk and Issue Management Problem Management Scope Management Change Management Major incident management Skills and Experience: Minimum of 5 years of work experience in Service Management Experience in delivering Cyber of SOC (Security Operation Centre ) service is very important Experienced working in an MSP environment ITIL Service Management accreditation Proven experience with Incident response. Strong working knowledge of ITSM service delivery concepts Demonstrated ability to position and present at a C-suite level Demonstrated ability to lead and collaborate with a multi-disciplined team Demonstrated skills in time management · Strategic thinking with a get-up-and-go attitude A willingness to work and adapt to a fast-growing & changing environment. Self-sufficiency and a high degree of autonomy. Ability to work within a team and achieve results through others Ability to influence external & internal stakeholders as part of a continuous improvement life cycle for customers. Lead the incidents to resolution. Desirable Commercial experience & exposure to Presales or Solutions Architecture in as many of the following areas: IT, cloud, Networking & Cyber Security. Industry-based technical certifications (e.g., Cisco, Fortinet, Palo Alto, CrowdStrike, Rapid7, NetSkope Etc.) This role is focused on the delivery of SOC services for our customers. Experience with SOC, SIEM and understanding of cybersecurity is very important for this role. Candidates with no SOC, SIEM or Cyber experience will not be selected for this role

Penetration Tester new delhi,delhi,india 3 - 8 years None Not disclosed On-site Full Time

About the business We are a highly specialised Cybersecurity consulting firm based in the Sydney CBD. We are looking for an experienced CEH / OSCP / OSCE certified Penetration tester or Pen Tester on a Permanent basis. About the role We are looking for a Security Consultant with multiple years of experience with Penetration testing and Vulnerability assessments. Someone with the ability to think out of the box, someone who is comfortable using new tools and new methodologies. Someone who is customer-centric and can work with the customer and resolve complex issues. Skills and experience Key Skills: Must be certified in Penetration testing with any of these certifications. CEH / OSCP / OSCE / Crest/ SANS Must have over 3-8 years of hands-on penetration testing and Vulnerability assessment experience. Black box, Grey box testing. Experience with Network and Web Application testing Red Team and Blue Team experience. IoT or OT penetration testing experience. Someone who has hands-on Wireless network penetration experience. Experience in Internal penetration testing, systems like AD, Database etc. Good understanding of industry-standard methodologies. Excellent documentation skills. Experience with Wireless scans and testing. Desirable Skills: Some exposure to Wireless or LAN networks Exposure to Cloud-based applications. Due to the nature of this role, overseas applications will not be accepted and the candidate must be based in Sydney

Penetration Tester delhi,delhi,india 3 - 8 years INR Not disclosed On-site Full Time

About the business We are a highly specialised Cybersecurity consulting firm based in theSydney CBD. We are looking for an experienced CEH / OSCP / OSCE certified Penetration tester or Pen Tester on a Permanent basis. About the role We are looking for a Security Consultant with multiple years of experience with Penetration testing and Vulnerability assessments. Someone with the ability to think out of the box, someone who is comfortable using new tools and new methodologies. Someone who is customer-centric and can work with the customer and resolve complex issues. Skills and experience Key Skills: Must be certified in Penetration testing with any of these certifications. CEH / OSCP / OSCE / Crest/ SANS Must have over 3-8 years of hands-on penetration testing and Vulnerability assessment experience. Black box, Grey box testing. Experiencewith Network and Web Application testing Red Team and Blue Team experience. IoT or OT penetration testing experience. Someone who has hands-on Wireless network penetration experience. Experience in Internal penetration testing, systems like AD, Database etc. Good understanding of industry-standard methodologies. Excellent documentation skills. Experience with Wireless scans and testing. Desirable Skills: Some exposure to Wireless or LAN networks Exposure to Cloud-based applications. Due to the nature of this role, overseas applications will not be accepted and the candidate must be based in Sydney