3Columns

11 Job openings at 3Columns
SOC Analyst L2 Pune,Maharashtra,India 4 years None Not disclosed Remote Full Time

3Columns is a specialist cybersecurity firm that delivers a wide range of services, including security assurance, security governance, professional services, and managed services. Solutions include managed security services, offensive security services, cybersecurity consulting, and professional services to assist customers in deploying all the required controls. The core services delivered by the SOC are Managed Detection and response and Incident Response. About the Role: 3Columns is seeking a SOC Analyst to join their team remotely. They will be responsible for expanding the business by delivering outcome-based engagements to various clients and proactively improving the Managed SOC and SIEM capabilities within the organizations they are engaged with. The SOC analyst will work with the team to assist clients in investigating the logs, creating playbooks, and proactively notifying the customers. Have experience or understanding of a wide range of technologies such as Office365, InTunes, MS Defender, Rapid7 SIEM, Vulnerability Management, Mimecast, CrowdStrike and SentinelOne to support the business and help drive the success of organizational business strategies. The successful applicant will become integral to each client's cybersecurity strategy, developing strong relationships and becoming a trusted partner within each organization. To be successful in this role, you will have the following: Minimum of 4 years of experience. String experience with investigation and Incident handling. Strong Log analysis capability. Experience with investigations related to Malware alerts, Phishing emails, Suspicious logins, etc. Experience in security tools and technologies such as SIEM, IDS/IPS, Firewalls, and Vulnerability Management Experience in scanning for vulnerabilities Hands-on practical knowledge of EDR such as MS Defender, CrowdStrike, SentinelOne Understanding of MITRE attack framework and related Techniques. Some understanding of Digital Forensics or desire to learn the technology. Good understanding of SIEM solutions such as Rapid7, Azure Sentinel, Wazuh or Graylog. Desire to excel in career and learn new tools and technology Personal Skills Must be forward-thinking in terms of vision for the business and team culture. Come up with innovative ideas to deliver services to the customer Ability to speak about security and recommend security controls to experienced security professionals and executives confidently and accurately. The ability to work as part of a team. Flexibility and motivation to work across various types of engagements. The ability to multitask and service multiple clients at once. Is detail-orientated, self-motivated and can work independently.

SOC Analyst L3 Pune,Maharashtra,India 7 years None Not disclosed Remote Full Time

3Columns is a specialist cybersecurity firm that delivers a wide range of services, including security assurance, security governance, professional services, and managed services. Solutions include managed security services, offensive security services, cybersecurity consulting, and professional services to assist customers in deploying all the required controls. The core services delivered by the SOC are Managed Detection and Response and Incident Response. About the Role: 3Columns is seeking an SOC Lead Investigator / Level 3 analyst to join their team remotely. They will be responsible for expanding the business by delivering outcome-based engagements to various clients and proactively improving the Managed SOC and SIEM capabilities within the organisations they are engaged with. The SOC analyst will work with the team to assist clients in investigating the logs, creating playbooks, and proactively notifying customers. Have experience or understanding of a wide range of technologies such as Office365, InTunes, MS Defender, Rapid7 SIEM, Vulnerability Management, Mimecast, CrowdStrike and SentinelOne to support the business and help drive the success of organisational business strategies. The successful applicant will become integral to each client's cybersecurity strategy, developing strong relationships and becoming a trusted partner within each organisation. Lead Investigator – SOC Responsibilities: Minimum of 7 years of experience Must have hands-on experience is investigations related to Malware, Advanced TTP, Have experience is detections and dealing with cases related to Ransomware. Strong understanding of Windows and Linux System event logs. Experience with Threat Hunting and Rule writing. Lead and coordinate in-depth investigations into security incidents, ensuring timely and accurate response. Act as the primary escalation point for complex and high-impact incidents. Provide technical and strategic guidance to Level 2 analysts throughout the investigation lifecycle. Review and validate findings from Level 2 investigations, ensuring completeness and quality of analysis. Develop and maintain standardised investigation checklists, workflows, and playbooks. Conduct regular case reviews and post-incident debriefs to identify gaps and drive continuous improvement. Mentor and coach Level 2 analysts to build investigative skills and improve threat detection capabilities. Ensure adherence to investigation procedures, evidence handling, and documentation standards. Collaborate with Threat Intelligence, Incident Response, and Engineering teams to enrich investigations. Recommend and implement improvements in investigation tools, techniques, and processes. Track investigation metrics and provide reports to SOC leadership on team performance and incident trends. Stay current on threat actor techniques, tools, and procedures (TTPs) to enhance investigation quality. Please Note: - To save you time with rejections and save our time, if you do not have experience in SOC, you will be rejected. Candidates, who will apply without any SOC experience just for the sake of applying will be blacklisted for next 10 years.

Service Delivery Manager (SOC Service) India 10 years None Not disclosed On-site Full Time

This role is focused on the delivery of SOC / MDR services for our customers. Experience with SOC, SIEM and understanding of cybersecurity is very important for this role. Candidates with no SOC, SIEM or Cyber experience will not be selected for this role. Candidates who are applying for this role for sake of applying will be blacklisted for 10 years. Please do not waste your time or my time. Thanks alot in advance. Company Profile: 3Columns is a specialist cybersecurity firm delivering a wide range of services from Security Assurance, Security Governance, Professional services and Managed Services. Solutions include Managed Security Services, Offensive Security Services, Cyber Security Consulting, and professional services to assist customers in deploying all the required controls. The core service delivered by the SOC is Managed Detection & Response and Incident Response. About the Role: We are looking for a Service Delivery Manager (SDM) to join our team on a full-time permanent basis. You will own the key Service Delivery relationship, delivering excellence in service assurance, liaising with internal technical staff on behalf of the client, providing generalist Cyber consultancy, be “application aware” and assisting with uncovering growth opportunities with the client through new or product upgrades. This role is focused on delivering SOC services for our customers. Experience with SOC, SIEM, and understanding of cybersecurity are very important for this role. A successful candidate in this role would have a good balance between customer service, technical knowledge and experience dealing with C-level executives. Key Responsibilities Preparing and presenting client operational reporting at monthly meetings Client SLAs and Reporting (including driving enhancements) Ensure L1 and L2 analysts are meeting SLA and following the procedures. Great report writing skills. Onboarding of new Clients. Continuously improve operations and client engagement. Continual Service Improvement Plans (CSIP) for client patch Develop a deep understanding of the client’s business, including orchestration of strategic business planning, roadmaps and workshops Risk and Issue Management Problem Management Scope Management Change Management Major incident management Skills and Experience: Minimum of 5 years of work experience in Service Management Experience in delivering Cyber of SOC (Security Operation Centre ) service is very important Experienced working in an MSP environment ITIL Service Management accreditation Proven experience with Incident response. Strong working knowledge of ITSM service delivery concepts Demonstrated ability to position and present at a C-suite level Demonstrated ability to lead and collaborate with a multi-disciplined team Demonstrated skills in time management · Strategic thinking with a get-up-and-go attitude A willingness to work and adapt to a fast-growing & changing environment. Self-sufficiency and a high degree of autonomy. Ability to work within a team and achieve results through others Ability to influence external & internal stakeholders as part of a continuous improvement life cycle for customers. Lead the incidents to resolution. Desirable Commercial experience & exposure to Presales or Solutions Architecture in as many of the following areas: IT, cloud, Networking & Cyber Security. Industry-based technical certifications (e.g., Cisco, Fortinet, Palo Alto, CrowdStrike, Rapid7, NetSkope Etc.) This role is focused on the delivery of SOC services for our customers. Experience with SOC, SIEM and understanding of cybersecurity is very important for this role. Candidates with no SOC, SIEM or Cyber experience will not be selected for this role

Service Delivery Manager (SOC Service) India 10 years None Not disclosed On-site Full Time

This role is focused on the delivery of SOC / MDR services for our customers. Experience with SOC, SIEM and understanding of cybersecurity is very important for this role. Candidates with no SOC, SIEM or Cyber experience will not be selected for this role. Candidates who are applying for this role for sake of applying will be blacklisted for 10 years. Please do not waste your time or my time. Thanks alot in advance. This role is focused on the delivery of SOC services for our customers. Experience with SOC, SIEM and understanding of cybersecurity is very important for this role. Candidates with no SOC, SIEM or Cyber experience will not be selected for this role  Company Profile: 3Columns is a specialist cybersecurity firm delivering a wide range of services from Security Assurance, Security Governance, Professional services and Managed Services. Solutions include Managed Security Services, Offensive Security Services, Cyber Security Consulting, and professional services to assist customers in deploying all the required controls. The core service delivered by the SOC is Managed Detection & Response and Incident Response. About the Role: We are looking for a Service Delivery Manager (SDM) to join our team on a full-time permanent basis. You will own the key Service Delivery relationship, delivering excellence in service assurance, liaising with internal technical staff on behalf of the client, providing generalist Cyber consultancy, be “application aware” and assisting with uncovering growth opportunities with the client through new or product upgrades. This role is focused on delivering SOC services for our customers. Experience with SOC, SIEM, and understanding of cybersecurity are very important for this role. A successful candidate in this role would have a good balance between customer service, technical knowledge and experience dealing with C-level executives. Key Responsibilities Preparing and presenting client operational reporting at monthly meetings Client SLAs and Reporting (including driving enhancements) Ensure L1 and L2 analysts are meeting SLA and following the procedures. Great report writing skills. Onboarding of new Clients. Continuously improve operations and client engagement. Continual Service Improvement Plans (CSIP) for client patch Develop a deep understanding of the client’s business, including orchestration of strategic business planning, roadmaps and workshops Risk and Issue Management Problem Management Scope Management Change Management Major incident management Skills and Experience: Minimum of 5 years of work experience in Service Management Experience in delivering Cyber of SOC (Security Operation Centre ) service is very important Experienced working in an MSP environment ITIL Service Management accreditation Proven experience with Incident response. Strong working knowledge of ITSM service delivery concepts Demonstrated ability to position and present at a C-suite level Demonstrated ability to lead and collaborate with a multi-disciplined team Demonstrated skills in time management · Strategic thinking with a get-up-and-go attitude A willingness to work and adapt to a fast-growing & changing environment. Self-sufficiency and a high degree of autonomy. Ability to work within a team and achieve results through others Ability to influence external & internal stakeholders as part of a continuous improvement life cycle for customers. Lead the incidents to resolution. Desirable Commercial experience & exposure to Presales or Solutions Architecture in as many of the following areas: IT, cloud, Networking & Cyber Security. Industry-based technical certifications (e.g., Cisco, Fortinet, Palo Alto, CrowdStrike, Rapid7, NetSkope Etc.) This role is focused on the delivery of SOC services for our customers. Experience with SOC, SIEM and understanding of cybersecurity is very important for this role. Candidates with no SOC, SIEM or Cyber experience will not be selected for this role

Penetration Tester new delhi,delhi,india 3 - 8 years None Not disclosed On-site Full Time

About the business We are a highly specialised Cybersecurity consulting firm based in the Sydney CBD. We are looking for an experienced CEH / OSCP / OSCE certified Penetration tester or Pen Tester on a Permanent basis. About the role We are looking for a Security Consultant with multiple years of experience with Penetration testing and Vulnerability assessments. Someone with the ability to think out of the box, someone who is comfortable using new tools and new methodologies. Someone who is customer-centric and can work with the customer and resolve complex issues. Skills and experience Key Skills: Must be certified in Penetration testing with any of these certifications. CEH / OSCP / OSCE / Crest/ SANS Must have over 3-8 years of hands-on penetration testing and Vulnerability assessment experience. Black box, Grey box testing. Experience with Network and Web Application testing Red Team and Blue Team experience. IoT or OT penetration testing experience. Someone who has hands-on Wireless network penetration experience. Experience in Internal penetration testing, systems like AD, Database etc. Good understanding of industry-standard methodologies. Excellent documentation skills. Experience with Wireless scans and testing. Desirable Skills: Some exposure to Wireless or LAN networks Exposure to Cloud-based applications. Due to the nature of this role, overseas applications will not be accepted and the candidate must be based in Sydney

Penetration Tester delhi,delhi,india 3 - 8 years INR Not disclosed On-site Full Time

About the business We are a highly specialised Cybersecurity consulting firm based in theSydney CBD. We are looking for an experienced CEH / OSCP / OSCE certified Penetration tester or Pen Tester on a Permanent basis. About the role We are looking for a Security Consultant with multiple years of experience with Penetration testing and Vulnerability assessments. Someone with the ability to think out of the box, someone who is comfortable using new tools and new methodologies. Someone who is customer-centric and can work with the customer and resolve complex issues. Skills and experience Key Skills: Must be certified in Penetration testing with any of these certifications. CEH / OSCP / OSCE / Crest/ SANS Must have over 3-8 years of hands-on penetration testing and Vulnerability assessment experience. Black box, Grey box testing. Experiencewith Network and Web Application testing Red Team and Blue Team experience. IoT or OT penetration testing experience. Someone who has hands-on Wireless network penetration experience. Experience in Internal penetration testing, systems like AD, Database etc. Good understanding of industry-standard methodologies. Excellent documentation skills. Experience with Wireless scans and testing. Desirable Skills: Some exposure to Wireless or LAN networks Exposure to Cloud-based applications. Due to the nature of this role, overseas applications will not be accepted and the candidate must be based in Sydney

Cyber Incident Handler pune,maharashtra,india 10 years None Not disclosed Remote Full Time

3Columns is a specialist cybersecurity firm that delivers a wide range of services, including security assurance, security governance, professional services, and managed services. Solutions include managed security services, offensive security services, cybersecurity consulting, and professional services to help customers deploy all the necessary controls. The core services delivered by the SOC are Managed Detection and Response and Incident Response. About the Role: 3Columns is seeking a Cyber Incident Handler to join their team remotely. They will be responsible for working with the MDR team and leading escalated incidents, updating customers and stakeholders, and assisting the MDR team with investigations. Incident responders will work with SOC team, develop playbooks and update existing as required. The successful applicant will become integral to each client's cybersecurity strategy, developing strong relationships and becoming a trusted partner within each organisation. Please Note: - To save you time with rejections and save our time, if you do not have experience in Incident response, Stakeholder communication, investigation or Log analysis, you will be rejected. Candidates who will apply without any SOC experience just for the sake of applying will be blacklisted for the next 10 years. Cyber Incident Handler - Work with MDR analysts on escalated Incidents. Understand the incident, generate possible scenarios and work with Digital Forensics and Level 1 and Level 2 analysts and assist them with the investigation Perform triage and validation of suspicious activity, determining urgency and potential impact. Execute containment, eradication, and recovery actions during active cybersecurity incidents. Assist with Digital forensic analysis on endpoints, cloud services, and network artifacts to determine root cause and scope. Lead incident investigations and collaborate with internal stakeholders to minimise business disruption. Provide technical guidance to junior analysts during escalations and complex cases. Develop incident timelines, collect evidence, and ensure proper chain of custody for investigations. Document incidents, lessons learned, and produce high-quality incident reports for leadership. Maintain and tune detection content, response playbooks, and automation workflows (SOAR/XDR/SIEM). Participate in proactive threat hunting activities based on emerging threat intelligence. Support ongoing improvement of SOC maturity, readiness exercises, and incident response processes. Qualifications Bachelor’s degree in Cybersecurity / Information Technology / Computer Science (or equivalent experience). Industry certifications such as GIAC (GCIA / GCIH / GCFA) , CEH , Security+ , CySA+ , or Azure/AWS security credentials. Strong understanding of cybersecurity frameworks (MITRE ATT&CK, NIST CSF, ISO 27035). Proficiency with SIEM, EDR/XDR, and SOAR platforms (e.g., SentinelOne, CrowdStrike, Microsoft Defender, Splunk, Rapid7). Knowledge of TCP/IP networking, common protocols, and security tools (firewalls, IDS/IPS, proxies). Solid grasp of Windows, Linux, Active Directory, identity security, and cloud security fundamentals. Ability to interpret malware behaviour, logs, network traffic, and forensic artifacts. Strong written communication skills for executive and technical reporting. Relevant Experience 2–5 years working in a SOC or Cyber Incident Response function. Hands-on experience with threat detection, containment, and remediation activities. Involvement in major or moderate security incidents, including ransomware, BEC, insider threats, or phishing. Experience conducting forensic analysis on hosts (memory, disk) and cloud environments (M365, Azure, AWS). Development or optimisation of incident response playbooks and automation. Collaboration with IT teams to implement security controls and corrective actions. Exposure to red team scenarios, threat hunting operations, or purple team exercises. Real-world experience leveraging threat intelligence to improve detection capability.

Cyber Incident Handler pune,maharashtra,india 2 - 5 years INR Not disclosed Remote Full Time

3Columns is a specialist cybersecurity firm that delivers a wide range of services, including security assurance, security governance, professional services, and managed services. Solutions include managed security services, offensive security services, cybersecurity consulting, and professional services to help customers deploy all the necessary controls. The core services delivered by the SOC are Managed Detection and Response and Incident Response. About the Role: 3Columns is seeking a Cyber Incident Handler to join their team remotely. They will be responsible for working with the MDR team and leading escalated incidents, updating customers and stakeholders, and assisting the MDR team with investigations. Incident responders will work with SOC team, develop playbooks and update existing as required. The successful applicant will become integral to each client's cybersecurity strategy, developing strong relationships and becoming a trusted partner within each organisation. Please Note: - To save you time with rejections and save our time, if you do not have experience in Incident response, Stakeholder communication, investigation or Log analysis, you will be rejected. Candidates who will apply without any SOC experience just for the sake of applying will be blacklisted for the next 10 years. Cyber Incident Handler - Work with MDR analysts on escalated Incidents. Understand the incident, generate possible scenarios and work with Digital Forensics and Level 1 and Level 2 analysts and assist them with the investigation Perform triage and validation of suspicious activity, determining urgency and potential impact. Execute containment, eradication, and recovery actions during active cybersecurity incidents. Assist with Digital forensic analysis on endpoints, cloud services, and network artifacts to determine root cause and scope. Lead incident investigations and collaborate with internal stakeholders to minimise business disruption. Provide technical guidance to junior analysts during escalations and complex cases. Develop incident timelines, collect evidence, and ensure proper chain of custody for investigations. Document incidents, lessons learned, and produce high-quality incident reports for leadership. Maintain and tune detection content, response playbooks, and automation workflows (SOAR/XDR/SIEM). Participate in proactive threat hunting activities based on emerging threat intelligence. Support ongoing improvement of SOC maturity, readiness exercises, and incident response processes. Qualifications Bachelor's degree in Cybersecurity / Information Technology / Computer Science (or equivalent experience). Industry certifications such as GIAC (GCIA / GCIH / GCFA) , CEH , Security+ , CySA+ , or Azure/AWS security credentials. Strong understanding of cybersecurity frameworks (MITRE ATT&CK, NIST CSF, ISO 27035). Proficiency with SIEM, EDR/XDR, and SOAR platforms (e.g., SentinelOne, CrowdStrike, Microsoft Defender, Splunk, Rapid7). Knowledge of TCP/IP networking, common protocols, and security tools (firewalls, IDS/IPS, proxies). Solid grasp of Windows, Linux, Active Directory, identity security, and cloud security fundamentals. Ability to interpret malware behaviour, logs, network traffic, and forensic artifacts. Strong written communication skills for executive and technical reporting. Relevant Experience 25 years working in a SOC or Cyber Incident Response function. Hands-on experience with threat detection, containment, and remediation activities. Involvement in major or moderate security incidents, including ransomware, BEC, insider threats, or phishing. Experience conducting forensic analysis on hosts (memory, disk) and cloud environments (M365, Azure, AWS). Development or optimisation of incident response playbooks and automation. Collaboration with IT teams to implement security controls and corrective actions. Exposure to red team scenarios, threat hunting operations, or purple team exercises. Real-world experience leveraging threat intelligence to improve detection capability.

Cyber Threat Researcher new delhi,delhi,india 4 years None Not disclosed On-site Full Time

3Columns is a specialist cybersecurity firm that delivers a wide range of services, including security assurance, security governance, professional services, and managed services. Solutions include managed security services, offensive security services, cybersecurity consulting, and professional services to help customers deploy all the necessary controls. The core services delivered by the SOC are Managed Detection and Response and Incident Response. About the Role: 3Columns is seeking a Cyber Threat Researcher to join their team. They will be responsible for working with the MDR team and working in Threat research, Threat intelligence, Dark Web monitoring and vulnerability management. Job Responsibilities Threat Research & Intelligence Conduct continuous monitoring of dark web forums, marketplaces, breach databases, and threat actor channels for leaked credentials, corporate data, or targeted threats. Analyse threat actor behaviour, emerging TTPs, and underground discussions relevant to customer industries. Produce actionable intelligence reports for internal teams and customers, highlighting risks, trends, and recommended mitigations. Enrich internal threat intelligence platforms with IOCs, indicators of compromise, and context derived from OSINT, darknet, and security feeds. Vulnerability Management Track and analyse newly disclosed vulnerabilities (e.g., CVEs, vendor advisories, Zero-Day disclosures). Prioritise vulnerabilities using exploitability data, threat intelligence, risk scoring (CVSS, EPSS), and customer-specific context. Develop vulnerability summaries, technical breakdowns, and remediation guidance for customers. Collaborate with SOC/MDR teams to map vulnerabilities against real-world exploitation campaigns. Incident Support Support SOC/DFIR teams during investigations with threat intel insights, leaked credential analysis, and threat actor profiling. Provide rapid intelligence lookups during active incidents and assist in identifying potential adversary infrastructure. Reporting & Stakeholder Communication Prepare monthly and ad-hoc threat intelligence reports for customers. Present findings to internal and external stakeholders in a clear and business-friendly manner. Qualifications & Skills 2–4+ years of experience in threat intelligence, vulnerability research, darknet monitoring, or related cybersecurity roles. Strong understanding of exploit development basics, vulnerability disclosure processes, and common attacker methodologies. Experience with OSINT tools, darknet access, threat feeds, and scraping/monitoring platforms. Familiarity with scripting languages (Python preferred) for automation and data analysis. Knowledge of MITRE ATT&CK, CVSS, EPSS, CWE, NVD, and vendor advisory ecosystems. Experience using threat intelligence platforms (e.g., Recorded Future, Cyble, ThreatConnect, OpenCTI). Strong analytical and report writing skills, with the ability to produce clear, actionable intelligence. Ability to operate within legal and ethical boundaries while researching dark web sources.

Service Delivery Manager (SOC Service) india 5 years None Not disclosed On-site Full Time

Company Profile: 3Columns is a specialist cybersecurity firm delivering a wide range of services from Security Assurance, Security Governance, Professional services and Managed Services. Solutions include Managed Security Services, Offensive Security Services, Cyber Security Consulting, and professional services to assist customer deploy all the required controls. The core service delivered by the SOC is Managed Detection & Response and Incident Response. About the Role: We are looking for a Service Delivery Manager (SDM) to join our team on a full-time permanent basis. You will own the key Service Delivery relationship, delivering excellence in service assurance, liaising with internal technical staff on behalf of the client, provide generalist Cyber consultancy, be “application aware” and assist with uncovering growth opportunities with the client through new or product upgrades. This role is focused on delivering SOC service for our customers. Experience with SOC, SIEM, and understanding of Cyber security are very important for this role. A successful candidate in this role would have a good balance between customer service, technical knowledge and experience dealing with C-level executives. Key Responsibilities Preparing and presenting client operational reporting at monthly meetings Client SLAs and Reporting (including driving enhancements) Ensure L1 and L2 analysts are meeting SLA and following the procedures. Great report writing skills. Onboarding of new Clients. Continuously improve operations and client engagement. Continual Service Improvement Plans (CSIP) for client patch Develop a deep understanding of the client’s business including orchestration of strategic business planning, roadmaps and workshops Risk and Issue Management Problem Management Scope Management Change Management Major incident management Skills and Experience: Minimum of 5 years work experience in Service Management Experience in Deliver Cyber of SOC (Security Operation Centre ) service is very important Experienced working in an MSP environment ITIL Service Management accreditation Proven experience with Incident response. Strong working knowledge of ITSM service delivery concepts Demonstrated ability to position and present at a C-suite level Demonstrated ability to lead and collaborate with a multi-disciplined team Demonstrated skills in time management · Strategic thinking with a get-up-and-go attitude A willingness to work and adapt to a fast-growing & changing environment. Self-sufficiency and a high degree of autonomy. Ability to work within a team and achieve results through others Ability to influence external & internal stakeholders as part of a continuous improvement life cycle for customers. Lead the incidents to resolution. Desirable Commercial experience & exposure to Presales or Solutions Architecture in as many of the following areas: IT, cloud, Networking & Cyber Security). Industry-based technical certifications (e.g., Cisco, Fortinet, Palo Alto, CrowdStrike, Rapid7, NetSkope Etc.) This role is focused on delivery of SOC service for our customer. Experience with SOC, SIEM and understanding of Cyber security is very important for this role. Candidate with no SOC, SIEM or Cyber experience will not be selected for this role

Service Delivery Manager (SOC Service) india 5 - 7 years INR Not disclosed On-site Full Time

Company Profile: 3Columns is a specialist cybersecurity firm delivering a wide range of services from Security Assurance, Security Governance, Professional services and Managed Services. Solutions include Managed Security Services, Offensive Security Services, Cyber Security Consulting, and professional services to assist customer deploy all the required controls. The core service delivered by the SOC is Managed Detection & Response and Incident Response. About the Role: We are looking for a Service Delivery Manager (SDM) to join our team on a full-time permanent basis. You will own the key Service Delivery relationship, delivering excellence in service assurance, liaising with internal technical staff on behalf of the client, provide generalist Cyber consultancy, be application aware and assist with uncovering growth opportunities with the client through new or product upgrades. This role is focused on delivering SOC service for our customers. Experience with SOC, SIEM, and understanding of Cyber security are very important for this role. A successful candidate in this role would have a good balance between customer service, technical knowledge and experience dealing with C-level executives. Key Responsibilities Preparing and presenting client operational reporting at monthly meetings Client SLAs and Reporting (including driving enhancements) Ensure L1 and L2 analysts are meeting SLA and following the procedures. Great report writing skills. Onboarding of new Clients. Continuously improve operations and client engagement. Continual Service Improvement Plans (CSIP) for client patch Develop a deep understanding of the client's business including orchestration of strategic business planning, roadmaps and workshops Risk and Issue Management Problem Management Scope Management Change Management Major incident management Skills and Experience: Minimum of 5 years work experience in Service Management Experience in Deliver Cyber of SOC (Security Operation Centre ) service is very important Experienced working in an MSP environment ITIL Service Management accreditation Proven experience with Incident response. Strong working knowledge of ITSM service delivery concepts Demonstrated ability to position and present at a C-suite level Demonstrated ability to lead and collaborate with a multi-disciplined team Demonstrated skills in time management Strategic thinking with a get-up-and-go attitude A willingness to work and adapt to a fast-growing & changing environment. Self-sufficiency and a high degree of autonomy. Ability to work within a team and achieve results through others Ability to influence external & internal stakeholders as part of a continuous improvement life cycle for customers. Lead the incidents to resolution. Desirable Commercial experience & exposure to Presales or Solutions Architecture in as many of the following areas: IT, cloud, Networking & Cyber Security). Industry-based technical certifications (e.g., Cisco, Fortinet, Palo Alto, CrowdStrike, Rapid7, NetSkope Etc.) This role is focused on delivery of SOC service for our customer. Experience with SOC, SIEM and understanding of Cyber security is very important for this role. Candidate with no SOC, SIEM or Cyber experience will not be selected for this role