Role Description We are seeking a highly skilled and self-driven Cybersecurity Specialist with hands-on experience in Imperva Database Activity Monitoring (DAM) to join our security operations team. The ideal candidate will have deep expertise in deploying, configuring, and troubleshooting Imperva DAM solutions, along with broad knowledge of various other enterprise security tools. The role requires strong problem-solving abilities, attention to detail, and a proactive mindset for enhancing our security posture. Job Responsibilities Install, configure, and manage Imperva DAM across diverse environments. Perform ongoing administration, health checks, and tuning of Imperva systems. Develop and maintain security policies, rulesets, and custom alerts within Imperva DAM. Work closely with DBAs, system admins, and compliance teams to support audit and monitoring requirements. Troubleshoot and resolve performance, connectivity, and configuration issues related to security tools. Deploy and support other security tools such as SIEMs, vulnerability scanners, endpoint security platforms, firewalls, etc. Maintain detailed technical documentation, SOPs, and architectural diagrams. Stay current with emerging threats, vulnerabilities, and best practices in data protection and security monitoring. Assist in incident response and investigations involving data access or database-related threats. Required Qualifications 3+ years of experience in cybersecurity, with 2+ years of hands-on work with Imperva DAM . Strong understanding of database environments (Oracle, SQL Server, MySQL, etc.) and how DAM integrates with them. Proven experience in installation, configuration, upgrade, and troubleshooting of security tools in enterprise environments. Working knowledge of Linux and Windows systems. Familiarity with SIEM (e.g., Splunk, QRadar), endpoint protection (e.g., CrowdStrike, SentinelOne), and vulnerability scanners (e.g., Qualys, Nessus). Strong scripting skills (e.g., Shell, PowerShell, Python) are a plus. Excellent communication, documentation, and analytical skills. Job Type: Full-time Pay: ₹10,523.07 - ₹67,466.61 per month Work Location: In person
Role Summary The Ivanti ITSM Administrator/Developer is the Subject Matter Expert (SME) responsible for the day-to-day administration, configuration, development, and maintenance of the organization's Ivanti Neurons for ITSM platform. This role ensures the platform is optimized to support ITIL processes, automate workflows, and deliver a high-quality service experience across the enterprise. Key Responsibilities Platform Administration & Maintenance System Administration: Manage user roles, security access, groups, and permissions within the Ivanti platform. Upgrades & Patches: Plan, test, and execute platform upgrades, patches, and hotfixes to maintain security and performance. Performance Monitoring: Monitor system health, performance, and log files, troubleshooting and resolving complex platform issues. Data Management: Maintain data integrity, manage imports/exports, and ensure the accuracy of the Configuration Management Database (CMDB) within Ivanti. Development & Configuration Workflow Automation: Design, configure, and implement custom business rules, workflows, forms, and validation rules across core ITIL processes (Incident, Request Fulfilment, Change, Problem, Knowledge, and Asset Management). Customization: Develop and maintain Service Catalogue request offerings, Quick Actions, Templates, and role-based Dashboards using Ivanti's low-code/no-code capabilities. Scripting: Utilize JavaScript, PowerShell, or Groovy Script (where applicable) to create advanced automations, custom functions, and integrations. Reporting: Build and maintain custom reports, saved searches, and metrics to track Service Level Agreements (SLAs) and provide actionable insights to management. Integration & Support Integrations: Implement and manage integrations with other enterprise tools (e.g., monitoring, Active Directory, Asset Management, HR) using Ivanti's Integration Framework or web services (REST/SOAP APIs). User Support: Provide Tier 3 support for Ivanti platform issues, assisting end-users and IT staff with advanced configuration and usability questions. Documentation: Create and maintain technical documentation, SOPs, and system configuration guides for the platform. Required Qualifications Experience: [3-5+] years of hands-on experience administering, developing, or implementing Ivanti Neurons for ITSM (or Ivanti Service Manager/HEAT). ITIL Knowledge: Strong understanding of ITIL v4 principles and experience applying them to ITSM tool configuration. Technical Proficiency: Expertise in Ivanti's core configuration components (Business Objects, Forms, Workflows, Templates, Quick Actions). Proficiency in SQL (or similar database language) for data retrieval, reporting, and troubleshooting. Experience with JavaScript for scripting and customization within the platform. Certifications (Preferred): Ivanti Neurons for ITSM Administrator or Developer Certification . ITIL Foundation Certification (v4 preferred). Desired Skills & Attributes Familiarity with Ivanti Neurons features like Automated Bots and IT Asset Management (ITAM) integration. Experience with Enterprise Service Management (ESM) extension into other business units (HR, Facilities). Excellent communication and ability to work with process owners to translate business requirements into technical solutions. Strong analytical, problem-solving, and time management skills. Job Type: Full-time Pay: ₹1,200,000.00 - ₹1,532,832.50 per year Work Location: In person
About the Role We are looking for a skilled Linux Engineer with 3–5 years of hands-on experience in managing, configuring, and troubleshooting Linux-based systems. The ideal candidate will have strong expertise in Linux administration, shell scripting, system performance tuning, and production environment support. Key Responsibilities Install, configure, and maintain Linux operating systems (Ubuntu, CentOS, RHEL, or similar). Manage user accounts, permissions, roles, and system security policies. Monitor system performance, identify issues, and provide timely resolutions. Perform system updates, patch management, and kernel upgrades. Automate routine tasks using Bash, Shell, or Python scripting. Manage services such as Apache/Nginx, DNS, DHCP, FTP, SSH, and cron jobs. Maintain system logs, audit trails, and conduct root cause analysis during incidents. Troubleshoot hardware, software, and networking-related OS issues. Collaborate with DevOps, Security, and Infrastructure teams to support production environments. Develop and maintain system documentation and SOPs. Required Skills & Qualifications 3–5 years of hands-on experience in Linux administration. Strong command-line expertise in RHEL/CentOS/Ubuntu or similar distributions. Experience with system monitoring tools (Nagios, Zabbix, Grafana, etc.). Good understanding of network fundamentals (TCP/IP, routing, firewalls). Experience with LVM , file systems, and storage configurations. Proficiency in shell scripting (Bash, Shell). Knowledge of security best practices and OS hardening. Familiarity with Git and version control workflows. Certifications Required (Any of the following) RHCSA (Red Hat Certified System Administrator) RHCE (Red Hat Certified Engineer) Linux+ (CompTIA Linux+) LFCS (Linux Foundation Certified System Administrator) LPIC-1 or LPIC-2 (Linux Professional Institute Certification) Good to Have Experience with Docker, Kubernetes , or cloud platforms (AWS/Azure/GCP). Basic knowledge of automation tools like Ansible or Terraform . Exposure to enterprise-scale production environments. Soft Skills Strong analytical and troubleshooting skills. Good communication and teamwork abilities. Ability to work independently and under pressure. Job Type: Full-time
Job Description: We are seeking an experienced and skilled SOC Analyst – Level 2 to manage the Security Operations Centre. As a SOC Analyst, you will play a pivotal role in managing the end-to-end life cycle of managed SOC. Your expertise will drive efficiency, enhance productivity, and transform processes across our organization. As a SOC Analyst Level 2, you will be the first line of defense in our Security Operations Center (SOC) with the Level 1 team. You will monitor, analyze, and respond to security events and incidents using a variety of tools and technologies. This position offers hands-on experience with industry-standard and open-source SOC tools, making it a perfect opportunity to grow your career in cybersecurity. . This role requires strong analytical skills, deep knowledge of security tools, and a proactive approach to threat detection and mitigation. Key Responsibilities: - Perform in-depth analysis of security incidents, including root cause analysis and incident remediation. - Respond to escalated security alerts and incidents, providing expertise in incident response. - Manage and coordinate security incidents, from detection to resolution, in collaboration with relevant teams. - Develop and improve SOC procedures, playbooks, and incident response workflows. - Mentor and assist L1 analysts in triaging security events and identifying false positives. - Conduct threat hunting activities to proactively identify vulnerabilities or malicious behavior. - Utilize both commercial and open-source tools to monitor and secure the organization’s network and systems. - Collaborate with threat intelligence teams to correlate threat data with security incidents. - Report and document incidents with clear, actionable insights to reduce future risk. Required Skills and Qualifications: - Bachelor’s degree in information technology, Cybersecurity, or related field. - 3+ years of experience in a SOC or security-focused role. - Expertise in Security Information and Event Management (SIEM) tools. - Strong understanding of network protocols, firewalls, IDS/IPS, and endpoint security. - Advanced knowledge of incident response, threat analysis, and vulnerability management. - Experience in log analysis, forensic investigations, and malware analysis. - Familiarity with security frameworks (NIST, MITRE ATT&CK, ISO 27001) and compliance standards. - Strong communication skills, with the ability to present technical information to non-technical stakeholders. - Ability to work in a 24/7 shift environment when needed. Good to Have: - Experience with open-source SOC tools such as: - Scripting skills (Python, PowerShell, Bash) for automation and custom tooling. - Knowledge of Endpoint Detection and Response (EDR) solutions. - Certifications like GIAC Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH), or CompTIA CySA+. Why Join Us? - Work with cutting-edge open-source and commercial cybersecurity tools. - Take on leadership roles within a growing SOC team. - Opportunity for continuous professional development and certification support. - A dynamic work environment with exposure to a variety of security challenges. Job Types: Full-time, Permanent Pay: From ₹500,000.00 per year Benefits: Life insurance Paid sick time Paid time off Provident Fund Ability to commute/relocate: Noida, Uttar Pradesh: Reliably commute or planning to relocate before starting work (Required) Experience: Cybersecurity: 2 years (Required) SoC: 2 years (Required) Work Location: In person
Job Description: We are seeking an experienced and skilled SOC Analyst – Level 2 to manage the Security Operations Centre. As a SOC Analyst, you will play a pivotal role in managing the end-to-end life cycle of managed SOC. Your expertise will drive efficiency, enhance productivity, and transform processes across our organization. As a SOC Analyst Level 2, you will be the first line of defense in our Security Operations Center (SOC) with the Level 1 team. You will monitor, analyze, and respond to security events and incidents using a variety of tools and technologies. This position offers hands-on experience with industry-standard and open-source SOC tools, making it a perfect opportunity to grow your career in cybersecurity. . This role requires strong analytical skills, deep knowledge of security tools, and a proactive approach to threat detection and mitigation. Key Responsibilities: - Perform in-depth analysis of security incidents, including root cause analysis and incident remediation. - Respond to escalated security alerts and incidents, providing expertise in incident response. - Manage and coordinate security incidents, from detection to resolution, in collaboration with relevant teams. - Develop and improve SOC procedures, playbooks, and incident response workflows. - Mentor and assist L1 analysts in triaging security events and identifying false positives. - Conduct threat hunting activities to proactively identify vulnerabilities or malicious behavior. - Utilize both commercial and open-source tools to monitor and secure the organization’s network and systems. - Collaborate with threat intelligence teams to correlate threat data with security incidents. - Report and document incidents with clear, actionable insights to reduce future risk. Required Skills and Qualifications: - Bachelor’s degree in information technology, Cybersecurity, or related field. - 3+ years of experience in a SOC or security-focused role. - Expertise in Security Information and Event Management (SIEM) tools. - Strong understanding of network protocols, firewalls, IDS/IPS, and endpoint security. - Advanced knowledge of incident response, threat analysis, and vulnerability management. - Experience in log analysis, forensic investigations, and malware analysis. - Familiarity with security frameworks (NIST, MITRE ATT&CK, ISO 27001) and compliance standards. - Strong communication skills, with the ability to present technical information to non-technical stakeholders. - Ability to work in a 24/7 shift environment when needed. Good to Have: - Experience with open-source SOC tools such as: - Scripting skills (Python, PowerShell, Bash) for automation and custom tooling. - Knowledge of Endpoint Detection and Response (EDR) solutions. - Certifications like GIAC Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH), or CompTIA CySA+. Why Join Us? - Work with cutting-edge open-source and commercial cybersecurity tools. - Take on leadership roles within a growing SOC team. - Opportunity for continuous professional development and certification support. - A dynamic work environment with exposure to a variety of security challenges. Job Types: Full-time, Permanent Pay: From ₹500,000.00 per year Benefits: Life insurance Paid sick time Paid time off Provident Fund Ability to commute/relocate: Noida, Uttar Pradesh: Reliably commute or planning to relocate before starting work (Required) Experience: Cybersecurity: 2 years (Required) SoC: 2 years (Required) Work Location: In person
Job Description: We are seeking an experienced and skilled SOC Analyst – Level 1 to manage the Security Operations Centre. As a SOC Analyst, you will play a pivotal role in managing the end-to-end life cycle of managed SOC. Your expertise will drive efficiency, enhance productivity, and transform processes across our organization. As a SOC Analyst L1, you will be the first line of defense in our Security Operations Center (SOC). You will monitor, analyze, and respond to security events and incidents using a variety of tools and technologies. This entry-level position offers hands-on experience with industry-standard and open-source SOC tools, making it a perfect opportunity to grow your career in cybersecurity. Key Responsibilities: - Monitor security alerts and events using SIEM tools and other security monitoring systems. - Analyze security events to determine if they are legitimate threats or false positives. - Escalate incidents based on established procedures and severity levels. - Conduct initial triage and incident investigation for detected security threats. - Document and track security incidents through the incident lifecycle. - Assist in maintaining and updating SOC documentation and playbooks. - Support security analysts in incident response efforts. - Perform vulnerability assessments and provide basic remediation suggestions. Required Skills and Qualifications: - Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or related field. - Knowledge of security concepts, including malware, attack vectors, and defense techniques. - Familiarity with Security Information and Event Management (SIEM) tools. - Strong understanding of network protocols, system logs, and security events. - Basic knowledge of incident handling and cybersecurity frameworks (NIST, ISO 27001, etc.). - Good problem-solving and analytical skills. - Ability to work in a 24/7 shift environment. Good to Have Skills: - Experience with open-source SOC tools. - Basic understanding of scripting (Python, Bash) for automation. - Certifications such as CompTIA Security+, CEH, or any equivalent would be a plus. Why Join Us? - Opportunity to work with the latest cybersecurity technologies. - Continuous learning and development through hands-on experience and training. - A collaborative work environment with a team dedicated to protecting critical infrastructures. Job Types: Full-time, Permanent Benefits: Life insurance Paid sick time Paid time off Provident Fund Ability to commute/relocate: Noida, Uttar Pradesh: Reliably commute or planning to relocate before starting work (Required) Experience: SOC: 1 year (Preferred) Cybersecurity: 1 year (Preferred) Work Location: In person
Job Description: We are seeking an experienced and skilled SOC Analyst – Level 1 to manage the Security Operations Centre. As a SOC Analyst, you will play a pivotal role in managing the end-to-end life cycle of managed SOC. Your expertise will drive efficiency, enhance productivity, and transform processes across our organization. As a SOC Analyst L1, you will be the first line of defense in our Security Operations Center (SOC). You will monitor, analyze, and respond to security events and incidents using a variety of tools and technologies. This entry-level position offers hands-on experience with industry-standard and open-source SOC tools, making it a perfect opportunity to grow your career in cybersecurity. Key Responsibilities: - Monitor security alerts and events using SIEM tools and other security monitoring systems. - Analyze security events to determine if they are legitimate threats or false positives. - Escalate incidents based on established procedures and severity levels. - Conduct initial triage and incident investigation for detected security threats. - Document and track security incidents through the incident lifecycle. - Assist in maintaining and updating SOC documentation and playbooks. - Support security analysts in incident response efforts. - Perform vulnerability assessments and provide basic remediation suggestions. Required Skills and Qualifications: - Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or related field. - Knowledge of security concepts, including malware, attack vectors, and defense techniques. - Familiarity with Security Information and Event Management (SIEM) tools. - Strong understanding of network protocols, system logs, and security events. - Basic knowledge of incident handling and cybersecurity frameworks (NIST, ISO 27001, etc.). - Good problem-solving and analytical skills. - Ability to work in a 24/7 shift environment. Good to Have Skills: - Experience with open-source SOC tools. - Basic understanding of scripting (Python, Bash) for automation. - Certifications such as CompTIA Security+, CEH, or any equivalent would be a plus. Why Join Us? - Opportunity to work with the latest cybersecurity technologies. - Continuous learning and development through hands-on experience and training. - A collaborative work environment with a team dedicated to protecting critical infrastructures. Job Types: Full-time, Permanent Benefits: Life insurance Paid sick time Paid time off Provident Fund Ability to commute/relocate: Noida, Uttar Pradesh: Reliably commute or planning to relocate before starting work (Required) Experience: SOC: 1 year (Preferred) Cybersecurity: 1 year (Preferred) Work Location: In person