Home
Jobs
Companies
Resume

280 Arcsight Jobs - Page 5

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 5.0 years

1 - 4 Lacs

Hyderabad

Work from Office

Naukri logo

Client Server Tech is looking for System Security / Engineer to join our dynamic team and embark on a rewarding career journey. Develop and implement system security strategies and solutions. Monitor and analyze security incidents and threats. Conduct incident response and investigation. Collaborate with cross-functional teams on security projects. Ensure compliance with security standards and regulations. Provide training and support on security best practices.

Posted 2 weeks ago

Apply

15.0 - 20.0 years

3 - 7 Lacs

Hyderabad

Work from Office

Naukri logo

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Oracle HCM Cloud Core HR Good to have skills : Oracle Applications Development, Security GovernanceMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. Your typical day will involve collaborating with various teams to implement security measures, conducting risk assessments, and ensuring compliance with security policies. You will engage in proactive monitoring of systems to identify vulnerabilities and respond to potential threats, all while maintaining a focus on safeguarding information and business processes against cyber threats. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Conduct regular security audits and assessments to identify areas for improvement.- Develop and implement security policies and procedures to enhance overall security posture. Professional & Technical Skills: - Must To Have Skills: Proficiency in Oracle HCM Cloud Core HR.- Good To Have Skills: Experience with Oracle Applications Development, Security Governance.- Strong understanding of security frameworks and compliance standards.- Experience with risk assessment and management methodologies.- Familiarity with incident response and threat detection tools. Additional Information:- The candidate should have minimum 5 years of experience in Oracle HCM Cloud Core HR.- This position is based at our Hyderabad office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

5.0 - 10.0 years

2 - 5 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Quality Engineer (Tester) Project Role Description : Enables full stack solutions through multi-disciplinary team planning and ecosystem integration to accelerate delivery and drive quality across the application lifecycle. Performs continuous testing for security, API, and regression suite. Creates automation strategy, automated scripts and supports data and environment configuration. Participates in code reviews, monitors, and reports defects to support continuous improvement activities for the end-to-end testing process. Must have skills : Security Information and Event Management (SIEM) Good to have skills : Cloud Security PlanningMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Quality Engineer (Tester), you will enable full stack solutions through multi-disciplinary team planning and ecosystem integration to accelerate delivery and drive quality across the application lifecycle. You will perform continuous testing for security, API, and regression suite, create automation strategy, automated scripts, and support data and environment configuration. You will also participate in code reviews, monitor, and report defects to support continuous improvement activities for the end-to-end testing process. Roles & Responsibilities:- Expected to be an SME, collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Implement innovative testing strategies to enhance product quality.- Conduct thorough security testing to identify vulnerabilities and risks.- Develop and execute test plans, test cases, and test scripts.- Collaborate with cross-functional teams to ensure quality standards are met.- A security architect creates and designs security for a system or service, maintains security documentation and develops architecture patterns and security approaches for Cloud Native platforms.- Recommend security controls and identify solutions that support a business objective- Conduct Threat Model Assessment leveraging STRIDE Model- Help review Application & Infrastructure components to operation Mission Critical Cloud Platform- Provide specialist advice and recommend approaches across teams and various stakeholders- Communicate widely with other CISO stakeholders- Advise on important security-related technologies and assess the risk associated with proposed changes- Inspire and influence others to execute security principles across the engineering platforms Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Information and Event Management (SIEM).- Good To Have Skills: Experience with Cloud Security Planning.- Strong understanding of security testing methodologies.- Knowledge of security tools and technologies.- Experience in conducting vulnerability assessments and penetration testing.- Ability to analyze and interpret security data for actionable insights. Additional Information:- The candidate should have a minimum of 5 years of experience in Security Information and Event Management (SIEM).- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

12.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Job Title: Senior Manager – Cybersecurity and Cyber Defense Center Location: Bengaluru,KA 📍 Department: Information Security Group (ISG) 👤 Reporting To: VP – Cybersecurity and Cyber Defense Center 📝 Job Purpose: We are seeking a seasoned Senior Manager to lead the strategic operations of our Cyber Defense Center (CDC) . This role is critical to strengthening our cybersecurity posture through advanced threat monitoring, incident response, SIEM management (Azure Sentinel and ArcSight), policy development, and regulatory compliance. You will collaborate with internal stakeholders and leadership teams to mitigate risks, enhance detection capabilities, and lead a high-performance security operations team in alignment with our overall cybersecurity strategy. 🎯 Key Responsibilities: Strategic Security Management Define and implement strategies for monitoring and responding to threats via SIEM platforms (Azure Sentinel & ArcSight preferred). Oversee analysis of data from various sources: firewalls, IDS/IPS, antivirus, DAM systems, proxies, and banking applications. Advanced Threat & Incident Management Create and fine-tune alert rules to improve detection accuracy and reduce false positives. Lead real-time log/alert analysis, ensuring swift and effective incident response aligned with defined policies and procedures. Leadership & Process Enhancement Improve response times and optimize security incident management processes. Lead updates to SOPs, playbooks, and runbooks; champion best practices in cybersecurity operations. Drive execution of security awareness programs and risk-based controls. Cross-Functional Collaboration Liaise with audit, compliance, and regulatory teams to provide logs, evidence, and technical documentation. Engage with leadership to influence strategic cybersecurity decisions. 🔑 Key Principles: Strategic Leadership: Direct the CDC's vision and strategy aligned with organizational goals. Threat Detection & Response: Elevate incident detection, investigation, and mitigation capabilities. Process Optimization: Drive continual improvement of security processes and tools. Collaboration & Communication: Facilitate effective communication across business and technical units. Governance & Compliance: Uphold integrity, ethics, and regulatory alignment in all security operations. 🌐 Operating Environment & Relationships: Operates within frameworks of international cybersecurity regulations and industry standards . Engages across business units (LOD1 to LOD3), including: LOD1: Business, Tech GRC, Technology LOD2: Compliance, Fraud, Risk LOD3: Internal Audit Coordinates with internal/external regulators and auditors. 🧩 Problem Solving & Analysis: Lead strategic problem solving for complex incidents, including root cause and threat impact assessments. Oversee log source onboarding and ensure optimization of data for effective threat detection. 🛡️ Decision-Making Authority: Innovation & PoC: Lead evaluations and PoCs of emerging security technologies. Metrics & Architecture: Analyze and report key security KPIs; contribute to the development of security reference architectures. Policy & Control Design: Drive policy formulation and improvement aligned with business and regulatory needs. Cross-Functional Leadership: Collaborate with senior leaders and vendor partners to deliver security objectives with minimal supervision. 📚 Qualifications & Experience: Education: Graduate/Postgraduate in Science, Engineering, Information Technology , or related disciplines. Certifications (minimum two required): CISSP, CISM, CRISC, CISA, or equivalent. Experience: 12+ years of experience in SOC/CDC leadership roles with demonstrated success in managing complex cyber defense initiatives. Strong expertise in SIEM platforms (Azure Sentinel, ArcSight) and security analytics. Previous exposure to the banking or financial services sector is highly desirable. Technical & Soft Skills: Expert in SIEM management, incident response, threat detection. Strong documentation, policy drafting, and communication skills. Analytical mindset with the ability to guide strategic decisions. Show more Show less

Posted 2 weeks ago

Apply

7.0 years

0 Lacs

India

Remote

Linkedin logo

Job Title: Assistant Manager – Microsoft Sentinel Administration 📍 Location: [Remote] 🧭 Department: Information Security Group (ISG) 👤 Reports To: VP – Head of Cyber Defense Center Duration: 6 months 🔎 Job Purpose: The Assistant Manager – Sentinel Administration will be responsible for the end-to-end management of Microsoft Sentinel , a cloud-native SIEM and SOAR platform. This includes configuring data connectors, developing analytics rules, building dashboards and reports, managing playbooks for automated incident response, and collaborating with cross-functional teams to ensure effective threat monitoring, detection, and response across the organization’s IT landscape. 🎯 Key Responsibilities: Security Event Monitoring & Analytics: Ensure continuous monitoring of integrated systems using Sentinel Develop and tune analytics rules to enhance threat detection and reduce false positives Connect and manage diverse data sources (Azure, Microsoft 365, on-prem systems) Dashboards & Reporting: Design workbooks and dashboards for real-time visibility Generate periodic reports and provide insights to stakeholders on security posture Automation & Response: Develop playbooks using Azure Logic Apps Automate incident response workflows to reduce MTTD and MTTR System Maintenance & Optimization: Monitor system performance and apply patches/updates as needed Optimize data ingestion, retention policies, and ensure platform scalability Compliance & Documentation: Maintain up-to-date documentation of configurations and procedures Support audits and align operations with industry standards and organizational policies Collaboration & Support: Work closely with SOC, IT, and other business units Train Sentinel users and participate in incident investigations and post-mortems 🌐 Key Working Relationships: Internal: Local CISOs, ISG team, SOC, Business Units (LOD1-3), Risk, Compliance, Fraud, Internal Audit External: Regulators, Industry Supervisors ⚙️ Key Skills and Competencies: Technical Expertise: 7+ years in Information Security, with at least 4–5 years in Microsoft Sentinel and SIEM tools like ArcSight Strong understanding of SIEM/SOAR operations, threat detection, and incident response Experience in PowerShell, Azure Logic Apps, and automation tooling Hands-on experience in building dashboards, custom visualizations, and configuring data connectors Industry Knowledge: Familiarity with security frameworks and standards: NIST 800-61, ISO 27035, CERT/CC, PCI-DSS Exposure to BFSI sector and experience supporting SOC functions Soft Skills: Strong analytical, communication, and stakeholder management skills Ability to solve complex security challenges with creative and technical solutions Effective cross-team collaboration during incidents and investigations 🎓 Qualifications & Certifications: Bachelor’s degree in Computer Science, Information Technology, or a related field Preferred Certifications: Microsoft Certified: Security Operations Analyst Associate (SC-200) Microsoft Certified: Azure Security Engineer Associate (AZ-500) 🧠 Key Attributes: Proactive and detail-oriented approach to threat detection Committed to upholding confidentiality, integrity, and availability of data Adaptable to evolving technologies and security threat landscapes Passionate about automation and continuous improvement in security operations 📈 Decision Making & Authority: Acts as a Subject Matter Expert (SME) for Microsoft Sentinel within the Cyber Defense Center Responsible for ensuring compliance with security incident response policies and regulatory requirements Supports the Head of Cyber Defense Center in achieving the organization’s InfoSec goals Show more Show less

Posted 2 weeks ago

Apply

7.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Note If shortlisted, you will be contacted via WhatsApp and email. Please monitor both channels and respond promptly. Location - Noida Work Mode - Work from Office Salary - INR(₹) 1,500,000 to 2,000,000 Joining Time / Notice Period: Immediate – 30 days About The Client We’re hiring for a technology-focused firm specializing in cybersecurity, cloud infrastructure, and risk management. They help global enterprises strengthen security operations, ensure compliance, and build resilient frameworks with advanced SOC capabilities and proactive incident response. Job Purpose The client is actively seeking an experienced SOC Lead to oversee 24/7 security operations and incident response efforts. This role involves leading L1/L2 teams, proactively monitoring threats, managing incident investigations, and ensuring organizational cyber resilience. The ideal candidate will possess strong hands-on experience across security infrastructure components, enterprise IT systems, and cloud environments—especially AWS—and will be instrumental in safeguarding systems from internal and external cyber threats. Roles And Responsibilities Lead and manage the SOC team across L1 and L2 analysts in a 24/7 environment. Handle escalated security incidents including threat detection, investigation, containment, and remediation. Work cross-functionally with technical and business stakeholders during and after incident response. Conduct proactive threat hunting and brand monitoring across endpoints, networks, and cloud environments (especially AWS). Analyze and respond to security alerts generated by SIEM platforms (e.g., Splunk, Datadog, Arcsight). Utilize IOCs and IOAs for real-time detection and forensic analysis. Perform in-depth forensics investigations, evidence handling, and data recovery. Ensure the integrity and secure custody of audit trails in the event of incidents. Maintain and evolve detection use cases, alert tuning, and log source integrations in SIEM. Must-Have Qualifications And Experience Bachelor's degree in Engineering or Technology (B.E./B.Tech.). 7+ years of experience in cybersecurity incident response and SOC operations. Proven Hands-on Expertise In Advanced Firewalls, IDS/IPS/WIPS, HIPS EDR, DLP, Antivirus, Proxy, VPN, DNS, DHCP Cloud platforms: AWS (required), Azure (preferred) SIEM systems (e.g., Splunk, Datadog, Arcsight) Security integration and use case development for SIEM Experience in forensics analysis, data recovery, and audit trail management. Familiarity with APT threats, vulnerability scanning, and threat intelligence. Knowledge of industry regulations and compliance frameworks such as SOC2, HIPAA, ISO27001. Exposure to incident response tools, ITSM platforms (JIRA, ServiceNow), and cloud-based security controls. Security certifications preferred: CISSP, CHFI, CEH. Show more Show less

Posted 2 weeks ago

Apply

7.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Note If shortlisted, you will be contacted via WhatsApp and email. Please monitor both channels and respond promptly. Location - Noida Work Mode - Work from Office Salary - INR(₹) 1,500,000 to 2,000,000 Joining Time / Notice Period: Immediate – 30 days About The Client We’re hiring for a technology-focused firm specializing in cybersecurity, cloud infrastructure, and risk management. They help global enterprises strengthen security operations, ensure compliance, and build resilient frameworks with advanced SOC capabilities and proactive incident response. Job Purpose The client is actively seeking an experienced SOC Lead to oversee 24/7 security operations and incident response efforts. This role involves leading L1/L2 teams, proactively monitoring threats, managing incident investigations, and ensuring organizational cyber resilience. The ideal candidate will possess strong hands-on experience across security infrastructure components, enterprise IT systems, and cloud environments—especially AWS—and will be instrumental in safeguarding systems from internal and external cyber threats. Roles And Responsibilities Lead and manage the SOC team across L1 and L2 analysts in a 24/7 environment. Handle escalated security incidents including threat detection, investigation, containment, and remediation. Work cross-functionally with technical and business stakeholders during and after incident response. Conduct proactive threat hunting and brand monitoring across endpoints, networks, and cloud environments (especially AWS). Analyze and respond to security alerts generated by SIEM platforms (e.g., Splunk, Datadog, Arcsight). Utilize IOCs and IOAs for real-time detection and forensic analysis. Perform in-depth forensics investigations, evidence handling, and data recovery. Ensure the integrity and secure custody of audit trails in the event of incidents. Maintain and evolve detection use cases, alert tuning, and log source integrations in SIEM. Must-Have Qualifications And Experience Bachelor's degree in Engineering or Technology (B.E./B.Tech.). 7+ years of experience in cybersecurity incident response and SOC operations. Proven Hands-on Expertise In Advanced Firewalls, IDS/IPS/WIPS, HIPS EDR, DLP, Antivirus, Proxy, VPN, DNS, DHCP Cloud platforms: AWS (required), Azure (preferred) SIEM systems (e.g., Splunk, Datadog, Arcsight) Security integration and use case development for SIEM Experience in forensics analysis, data recovery, and audit trail management. Familiarity with APT threats, vulnerability scanning, and threat intelligence. Knowledge of industry regulations and compliance frameworks such as SOC2, HIPAA, ISO27001. Exposure to incident response tools, ITSM platforms (JIRA, ServiceNow), and cloud-based security controls. Security certifications preferred: CISSP, CHFI, CEH. Show more Show less

Posted 2 weeks ago

Apply

7.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Note If shortlisted, you will be contacted via WhatsApp and email. Please monitor both channels and respond promptly. Location - Noida Work Mode - Work from Office Salary - INR(₹) 1,500,000 to 2,000,000 Joining Time / Notice Period: Immediate – 30 days About The Client We’re hiring for a technology-focused firm specializing in cybersecurity, cloud infrastructure, and risk management. They help global enterprises strengthen security operations, ensure compliance, and build resilient frameworks with advanced SOC capabilities and proactive incident response. Job Purpose The client is actively seeking an experienced SOC Lead to oversee 24/7 security operations and incident response efforts. This role involves leading L1/L2 teams, proactively monitoring threats, managing incident investigations, and ensuring organizational cyber resilience. The ideal candidate will possess strong hands-on experience across security infrastructure components, enterprise IT systems, and cloud environments—especially AWS—and will be instrumental in safeguarding systems from internal and external cyber threats. Roles And Responsibilities Lead and manage the SOC team across L1 and L2 analysts in a 24/7 environment. Handle escalated security incidents including threat detection, investigation, containment, and remediation. Work cross-functionally with technical and business stakeholders during and after incident response. Conduct proactive threat hunting and brand monitoring across endpoints, networks, and cloud environments (especially AWS). Analyze and respond to security alerts generated by SIEM platforms (e.g., Splunk, Datadog, Arcsight). Utilize IOCs and IOAs for real-time detection and forensic analysis. Perform in-depth forensics investigations, evidence handling, and data recovery. Ensure the integrity and secure custody of audit trails in the event of incidents. Maintain and evolve detection use cases, alert tuning, and log source integrations in SIEM. Must-Have Qualifications And Experience Bachelor's degree in Engineering or Technology (B.E./B.Tech.). 7+ years of experience in cybersecurity incident response and SOC operations. Proven Hands-on Expertise In Advanced Firewalls, IDS/IPS/WIPS, HIPS EDR, DLP, Antivirus, Proxy, VPN, DNS, DHCP Cloud platforms: AWS (required), Azure (preferred) SIEM systems (e.g., Splunk, Datadog, Arcsight) Security integration and use case development for SIEM Experience in forensics analysis, data recovery, and audit trail management. Familiarity with APT threats, vulnerability scanning, and threat intelligence. Knowledge of industry regulations and compliance frameworks such as SOC2, HIPAA, ISO27001. Exposure to incident response tools, ITSM platforms (JIRA, ServiceNow), and cloud-based security controls. Security certifications preferred: CISSP, CHFI, CEH. Show more Show less

Posted 2 weeks ago

Apply

7.0 years

0 Lacs

Noida, Uttar Pradesh, India

Remote

Linkedin logo

Job Description Job Summary We are seeking for SOC Lead to support threat monitoring, detection, event analysis, incident response/reporting, brand monitoring, forensics and threat hunting activities for its SOC, which is a 24/7 environment. The individual must be able to rapidly respond to security incidents and should have at least 7 years of relevant experience in Cyber security incident response. Should have deeper understanding with some hands-on experience on enterprise IT infra components such as advanced firewalls, IPS/IDS/WIPS/HIPS, routers/switches, TACACS, VPN, proxy, AV/EDR, DNS, DHCP, multi factor authentication, virtualization, Email systems/security, Web Proxy, DLP etc. along with cloud environments like AWS (Must), Azure etc. Job Responsibilities Will be discussed by customer Essential Skills Should be able to manage a SOC L1/L2 team Providing incident response/investigation and remediation support for escalated security alerts/incidents Work with various stakeholders for communicating and remediating the cyber incidents Use emerging threat intelligence IOCs, IOAs, etc.to identify affected systems and the scope of the attack and perform threat hunting, end user’s systems and AWS infrastructure Provides support for complex computer/network exploitation and defense techniques to include deterring, identifying and investigating computer, applications and network intrusions Provides technical support for forensics services to include evidence capture, computer forensic analysis and data recovery, in support of computer crime investigation. Should be able to safeguard and custody of audit trails in case of any security incident Researches and maintains proficiency in open and closed source computer exploitation tools, attack techniques, procedures and trends. Performs research into emerging threat sources and develops threat profiles. Keep updated on latest cyber security threats. Demonstrates strong evidence of analytical ability and attention to detail. Has a broad understanding of all stages of incident response. Performing comprehensive computer monitoring, identifying vulnerabilities, Target mapping and profiling. Has a sound understanding of SIEM (Splunk, Datadog, Arcsight etc), PIM/PAM, EDR, O365 security suite and other threat detection platforms and Incident Response tools. Should have knowledge of integrating security solutions to SIEM tool and crate the use cases as per the best practices and customized requirements Has knowledge on working on ITSM tools such as JIRA, Service NOW etc Has a logical, disciplined and analytical approach to problem solving Has knowledge of current threat landscape such as APTs Has basic knowledge of Data Loss Prevention monitoring Has basic knowledge of audit requirements (SOC2, HIPPA, ISO27001, etc.) Should be flexible to work in 24*7 environment Nice to Haves Background Check Required No criminal record Others Bachelor of Engineering - Bachelor of Technology (B.E./B.Tech.) There are 2-3 rounds in the interview process. This is 5 days work from office role (No Hybrid/ Remote options available) Final round will be F2F (Mandatory) Office location-Sector-125, Noida Requirements SOC Lead Team Lead Threat monitoring Cyber Security Forensics Services Audit Trails SIEM ITSM Tools Show more Show less

Posted 2 weeks ago

Apply

2.0 - 5.0 years

2 - 6 Lacs

Hyderabad

Work from Office

Naukri logo

Join Amgen’s Mission of Serving Patients At Amgen, if you feel like you’re part of something bigger, it’s because you are. Our shared mission—to serve patients living with serious illnesses—drives all that we do. Since 1980, we’ve helped pioneer the world of biotech in our fight against the world’s toughest diseases. With our focus on four therapeutic areas –Oncology, Inflammation, General Medicine, and Rare Disease– we reach millions of patients each year. As a member of the Amgen team, you’ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you’ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. What you will do Let’s do this. Let’s change the world. In this vital role you will be responsible for the initial response to security events and incidents within a 24/7 Cybersecurity Operations Center (CSOC). This role involves following established procedures to investigate security events, providing feedback to improve processes, and assisting in the incident response lifecycle. Additionally, the associate will participate in knowledge-sharing sessions and correlate security alerts across platforms. Roles & Responsibilities: Follow established procedures to triage, investigate and respond to security events and incidents. Provide feedback to senior analysts to improve, review, and optimize existing procedures and documentation. Correlate security alerts from various platforms based on common elements. Participate in and lead CSOC Tier 1 knowledge-sharing and learning sessions. Assist incident responders in coordinating the response, containment, eradication, recovery, and lessons learned phases of the incident response lifecycle. Basic Qualifications: Bachelor’s degree and 0 to 3 years of Security Operations experience OR related field experience Diploma and 4 to 7 years of Security Operations or related field experience Professional Certifications: CompTIA Security+ (preferred) CEH (preferred) GSEC (preferred) MTA Security Fundamentals (preferred) Must-Have Skills: Solid understanding of security technologies and their core functionality Experience in analyzing cybersecurity threats with up-to-date knowledge of attack vectors and the cyber threat landscape. Ability to prioritize tasks effectively and solve problems efficiently in a diverse, distributed team environment. Good knowledge of Windows and/or Linux systems. Familiarity with CSOC operations and incident response procedures. Experience with security alert correlation across different platforms. Preferred Qualifications: Good communication and collaboration skills, especially when working with global teams. Ability to prioritize and manage tasks in high-pressure situations. Critical thinking and problem-solving abilities in cybersecurity contexts. A commitment to continuous learning and knowledge sharing. Work Hours This position requires you to work a later shift and may be assigned a second or third shift schedule. Candidates must be willing and able to work during evening or night shifts, as required. Potential Shifts (subject to change based on business requirements)Second Shift2:00 pm – 10:00 pm IST; Third Shift10:00 pm – 7:00 am IST. What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.

Posted 2 weeks ago

Apply

10.0 years

0 Lacs

Manesar, Haryana, India

On-site

Linkedin logo

🔐 Hiring Now: Senior SOC Analyst (SIEM | Threat Hunting | Incident Response) 📍 Location: Manesar, Haryana (Onsite | Government Sector Client) 📅 Join by: Immediate to Max 1 Month 🏢 Company: VVNT SEQUOR LLP, Noida 🛡️ About the Role VVNT SEQUOR is urgently hiring a Senior SOC Analyst with 8 –10 years of hands-on experience in SIEM, threat hunting, incident response , and L3/L4 security operations . This is a critical individual contributor role supporting a Government sector client at Manesar, where your cybersecurity expertise will help defend against real-world threats in a high-stakes environment. You’ll work with leading SIEM/EDR/SOAR platforms, conduct forensic investigations, and take the lead on proactive threat detection, containment, and post-incident analysis. 🧰 Key Responsibilities 🔍 Threat Monitoring & SIEM Operations Lead 24x7 SOC operations, monitoring alerts via ArcSight, Splunk, ELK Create and optimize correlation rules , use cases, and detection dashboards Leverage MITRE ATT&CK framework and threat intel feeds for advanced threat hunting 🚨 Incident Response & Forensics Coordinate incident lifecycle management and forensic investigations using CHFI techniques Analyze logs, memory dumps, and endpoint telemetry (EDRs like CrowdStrike, SentinelOne ) Conduct Root Cause Analysis (RCA) and post-incident reviews 🛡️ Vulnerability & Infrastructure Security Perform VAPT using Nessus, Qualys, OpenVAS, Metasploit, Burp Suite Manage security appliances – Firewalls (Palo Alto, FortiGate), WAF, IDS/IPS, Anti-DDoS Support compliance activities for ISO 27001, NIST CSF 🧠 Automation & Knowledge Sharing Integrate SOAR platforms and automate response playbooks (Python, PowerShell scripting) Lead security awareness programs (e.g., KnowBe4) and mentor junior SOC analysts 🧩 Who We’re Looking For 8–10 years in SOC & Security Operations with L3/L4 experience Deep working knowledge of SIEM, EDR, SOAR, forensic tools, threat modeling Strong skills in incident detection, investigation, containment, and RCA documentation Ability to handle escalations independently , acting as a technical leader on shift 🏆 Bonus Skills (Nice to Have) Certifications: CEH, CHFI, GCFA, GCIA, Security+, Splunk Certified Analyst Experience with Tripwire SCM, AWS GuardDuty, Azure Sentinel, TIPs Exposure to OT/ICS security , Red/Blue teaming, Purple teaming drills 📚 Tech Stack & Keywords (for AI & Job Portal Optimization) SOC Analyst | Threat Hunting | Incident Response | SIEM ArcSight Splunk | CHFI | CrowdStrike SentinelOne | SOAR | EDR | MITRE ATT&CK | L3/L4 Security Support | VAPT | Nessus Qualys | Firewall FortiGate PaloAlto | Burp Suite | RCA | ISO 27001 | NIST CSF | Python PowerShell Scripting | Government Sector Cybersecurity 🎯 Why Join VVNT SEQUOR? ✅ Lead mission-critical SOC operations for a Government Sector client ✅ Exposure to real-world threats and next-gen cyber tools ✅ Subsidized Cab + Lunch at client site ✅ Work in a fast-paced, hands-on, innovation-driven environment 📬 Apply Now 📩 Email: chaitali@vvntsequor.in parveen.arora@vvntsequor.in 📱 WhatsApp: +91-9891810196 +91-8802801739 📌 Please include : Updated Resume Last Drawn Salary Expected CTC Notice Period (Only Immediate or ≤1 Month) 📌 #SeniorSOCAnalyst #CybersecurityJobs #SIEM #ThreatHunting #IncidentResponse #L3L4Support #GovernmentCybersecurity #EDR #SplunkJobs #ArcSight #HiringNow #SecurityOperations Show more Show less

Posted 2 weeks ago

Apply

18.0 - 22.0 years

25 - 30 Lacs

Mumbai

Work from Office

Naukri logo

Job Title - Security Account Lead + Associate Director + IMU Management Level:5 Associate Director Location:Mumbai/ New Delhi Must have skills: Cyber Security with P&L responsibility and good networking and relationship building ability Good to have skills: Cyber Strategy, Cyber Protection, Cyber Resilience Job Summary : As a Security Account Lead (SAL), you will be a trusted advisor who builds and executes Accenture vision by combining the best of Accenture Security and the power of One Accenture to meet our clients needs and help them become cyber resilient business. This is a critical role on the client account leadership team. Roles & Responsibilities: - Drive Growth for Security Oversee the growth and management of account(s) Accountable for Security P&L for the account(s) Identify new opportunities for business development and expansion within the account(s) Create Value for Clients Truly understand client needs and partner quickly to respond and support client Act as C-Suite advisor, partner with the client across the breadth of security offerings and create connection to other service areas across Accenture Maintain strong brand reputation through exceptional delivery and value for clients Bring the best of Accenture and Security Leverage the best of Accenture and Security, including service offerings, innovations, solution tablets, industry perspectives and proof of value (PoV), to deliver value to our clients Bring in experts from across Accenture from other offerings in support of client needs Build Exceptional Relationships Build and nurture relationships as an integral part of the Accenture team Cultivate relationships across One Accenture and Ecosystems partners Inspire teams and act with a Growth Mindset Create an engaging project environment for people to learn and grow Demonstrate a positive, growth mindset with openness to new ideas, innovations, and opportunities that keep the team challenged Professional & Technical Skills: - Must Have Skills: Proficiency in the Cyber Security environment - Strong networking and relationship building skills in the Financial Services and Products domain i.e. Consumer goods, Life Sciences, Utilities, Resources, Manufacturing etc. Additional Information: - The ideal candidate will possess a strong background in cyber security field, along with a proven track record of delivering impactful solutions to clients. This position is based at either Mumbai or New Delhi location. About Our Company | AccentureQualification Experience: Minimum 18-22 years of progressive functional and consulting experience. Educational Qualification: Masters degree in business administration (MBA) or post graduate degree in management (PGDM) from premier institutes preferred

Posted 2 weeks ago

Apply

3.0 - 6.0 years

2 - 6 Lacs

Pune

Work from Office

Naukri logo

Template Job Title - Security Operations Center (SOC) Operator Management Level : CL11 Analyst / CL 10 Senior Analyst Location: Pune, PDC3C, Hinjewadi Must have skills: Excellent verbal and written communication skills Access control alarm monitoring CCTV monitoring Risk monitoring Handling safety / security related calls from employees Good to have skills: Experience in Global Security Operations Center / Regional Security Operations Center Sending mass notification / people advisory to employees / travel advisories Job Summary : The SOC Operator will be responsible for assessing, analyzing, and responding to incidents related to safety and security for the APAC region. The role requires daily use of tools/systems (e.g., access control, video management, risk feeds) to detect the impact to Accentures people, products, property, or brand image and alert the appropriate response stakeholders. Specifically, incidents may range from extreme weather conditions, political instability, crime, terror, civil unrest, and other personnel issues. In addition, the Operator will be responsible for customer service tasks to provide critical information and assistance to travelers, static employees, and potentially third parties. This role will be based in Hinjewadi, Pune, Maharashtra and reports to the SOC Shift Supervisor. Roles & Responsibilities: Monitor and operate security systems including access control and CCTV, along with environmental monitoring and mass notification systems. Respond quickly and initiate action related to alarms, phone calls, and environmental monitoring and alerting systems Notify, assist, and direct external emergency personnel and internal resources as necessary Dispatch security officers or law enforcement personnel for alarm response, calls for service, and emergency situations Execute protocols and communicate at all levels across the APAC region to employees, site security leads, safety & security staff, or contracted officers as needed Manage information flows to and from an incident Maintain operational logs, conduct daily shift checklists, handover reports, and incident reports Ensure all forms of communication, such as e-mails, phone conversations, and client interactions, are conducted in a courteous and professional manner, confidentially, and documented appropriately Coordinate with Accentures Corporate Security regional leads on incident detection and management Coordinate with Accentures Corporate executive protection leads on incident detection and management Ensure that complete and accurate information is entered into the incident management system Utilize and execute protocols and standard operating procedures to effectively manage global incidents. Monitor travel safety and security of the company's staff Maintain situational awareness of current global current events. Monitor and respond to global alerts and events affecting company facilities and employees providing immediate information and assistance as needed Initiate mass communication notifications as required Notify leadership of events affecting business operations and employees Ensure proper handling of highly confidential information. Perform other duties assigned by supervisors related to security and safety Additional Information: Experience with CCTV/video management and access control systems such as Genetec video solutions or CCure 9000 Experience with protective intelligence monitoring tools such as Everbridge and ISOS Tracker Great active listening skills Rapport building skills Patient and empathetic attitude Adaptability and flexibility Ability to analyze threats and envision potential or real time impact to operations Ability to respond quickly and calmly to emergencies and stressful situations by exercising proper judgment and decision-making skills Strong Customer Service skills Strong consensus, team building and negotiating skills Ability to work overtime on short notice Strong cultural sensitivities Be able to type a minimum of 35 words per min Excellent written and verbal communication skills Ability to multitask in a fast-paced, at times stressed work environment Strong team player Comfortable with high-tech work environment, and constant learning of new tools and innovations Proficient in Microsoft Windows and Office Suite About Our Company | Accenture (do not remove the hyperlink) Qualification Experience: Minimum 2 year(s) of experience is required Educational Qualification: Degree in any stream

Posted 2 weeks ago

Apply

15.0 - 25.0 years

12 - 16 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : Security Governance Good to have skills : NAMinimum 15 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Roles & Responsibilities:- Expected to be a SME with deep knowledge and experience.- Should have Influencing and Advisory skills.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Expected to provide solutions to problems that apply across multiple teams.- Lead and mentor junior team members.- Develop and implement security governance frameworks.- Ensure compliance with security policies and regulations. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Delivery Governance.- Good To Have Skills: Experience with Identity Access Management (IAM), Security Information and Event Management (SIEM), Managed Cloud Security Services.- Strong understanding of security governance principles.- Experience in implementing security controls and measures.- Knowledge of risk management and compliance frameworks. Additional Information:- The candidate should have a minimum of 15 years of experience in Security Delivery Governance.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

3.0 - 8.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : Microsoft Azure Sentinel Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Developer, you will be responsible for designing, building, and configuring applications to meet business process and application requirements. You will play a crucial role in developing innovative solutions to enhance business operations and efficiency. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Develop and implement software solutions to meet business requirements.- Collaborate with team members to design and optimize applications.- Troubleshoot and resolve technical issues in application development.- Stay updated with the latest technologies and trends in application development.- Provide technical guidance and support to junior team members. Professional & Technical Skills: - Must To Have Skills: Proficiency in Microsoft Azure Sentinel.- Strong understanding of cloud computing principles.- Experience with Azure services like Azure Functions, Azure Logic Apps.- Knowledge of DevOps practices and tools.- Hands-on experience in developing and deploying applications on Azure.- Good To Have Skills: Experience with Azure Security Center. Additional Information:- The candidate should have a minimum of 3 years of experience in Microsoft Azure Sentinel.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

3.0 - 8.0 years

5 - 9 Lacs

Pune

Work from Office

Naukri logo

Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : Microsoft Azure Sentinel Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Developer, you will be responsible for designing, building, and configuring applications to meet business process and application requirements. You will play a crucial role in developing solutions to enhance business operations and efficiency. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Collaborate with cross-functional teams to analyze business requirements and translate them into technical solutions.- Develop and implement software solutions to meet business needs.- Conduct code reviews and ensure code quality and best practices are followed.- Troubleshoot and debug applications to resolve issues in a timely manner.- Stay updated on emerging technologies and trends to suggest improvements and innovative solutions. Professional & Technical Skills: - Must To Have Skills: Proficiency in Microsoft Azure Sentinel.- Strong understanding of cloud computing principles and experience with Azure services.- Experience in designing and implementing scalable and secure applications on Azure cloud.- Knowledge of DevOps practices and tools for continuous integration and deployment.- Hands-on experience with monitoring, logging, and alerting tools for cloud-based applications. Additional Information:- The candidate should have a minimum of 3 years of experience in Microsoft Azure Sentinel.- This position is based at our Pune office.- A 15 years full-time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

15.0 - 25.0 years

12 - 16 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : Security Delivery Governance Good to have skills : Identity Access Management (IAM), Security Information and Event Management (SIEM)Minimum 15 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Roles & Responsibilities:- Expected to be a SME with deep knowledge and experience.- Should have Influencing and Advisory skills.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Expected to provide solutions to problems that apply across multiple teams.- Lead and mentor junior team members.- Develop and implement security governance frameworks.- Ensure compliance with security policies and regulations. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Delivery Governance.- Good To Have Skills: Experience with Security Information and Event Management (SIEM), Identity Access Management (IAM).- Strong understanding of security governance principles.- Experience in implementing security controls and measures.- Knowledge of security risk management.- Ability to conduct security assessments and audits. Additional Information:- The candidate should have a minimum of 15 years of experience in Security Delivery Governance.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

3.0 - 8.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : Microsoft Azure Sentinel Good to have skills : DevOpsMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Developer, you will design, build, and configure applications to meet business process and application requirements. You will collaborate with teams to ensure seamless integration and functionality of applications. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work-related problems.- Develop and implement software solutions to meet business requirements.- Collaborate with cross-functional teams to ensure application functionality.- Conduct code reviews and provide feedback for continuous improvement.- Stay updated with industry trends and technologies for enhancing applications.- Assist in troubleshooting and resolving application issues. Professional & Technical Skills: - Must To Have Skills: Proficiency in Microsoft Azure Sentinel.- Good To Have Skills: Experience with DevOps.- Strong understanding of cloud computing principles and practices.- Knowledge of software development lifecycle and methodologies.- Experience in designing and implementing scalable applications.- Familiarity with security protocols and best practices. Additional Information:- The candidate should have a minimum of 3 years of experience in Microsoft Azure Sentinel.- This position is based at our Bengaluru office.- A 15 years full-time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

15.0 - 20.0 years

3 - 7 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. Your typical day will involve collaborating with various teams to implement security measures, conducting risk assessments, and ensuring compliance with security policies. You will also engage in proactive monitoring of security systems and respond to potential threats, all while maintaining a focus on safeguarding information and business processes against cyber threats. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Develop and implement security protocols and procedures to enhance the overall security posture.- Conduct regular security audits and assessments to identify vulnerabilities and recommend improvements. Professional & Technical Skills: - Must To Have Skills: Proficiency in CyberArk Privileged Access Management.- Experience with identity and access management solutions.- Strong understanding of security frameworks and compliance standards.- Familiarity with incident response and threat detection methodologies.- Knowledge of network security principles and practices. Additional Information:- The candidate should have minimum 7.5 years of experience in CyberArk Privileged Access Management.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

7.0 - 12.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Work with asset owners to ensure the timely and efficient collection of computer security events and logs for the purpose of detecting and responding to information security incidents. Roles & Responsibilities:- Lead the implementation and delivery of Security Services projects- Leverage global delivery capability for successful project execution- Ensure adherence to project timelines and quality standards Professional & Technical Skills- Proficiency in any Security Information and Event Management (SIEM)- Experience with Security Risk Assessment, Google SecOps- Strong understanding of security principles and practices- Experience in implementing security solutions- Knowledge of threat detection and incident response- Ability to analyze and interpret security data- Engage with multiple teams and contribute on key decisions- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Provide solutions to problems for their immediate team and across multiple teams- Verify custom reports, manage log source groups, and validate log sources with client- Maintain a close partnership with SIEM on feature requests, upgrade planning, and product roadmap alignment- Focus on content creation regarding advanced threat analysis (rules, variables, trending, watch lists, etc.) of incoming data and for self-monitoring of the solution itself.- Perform supporting tasks such as system hardening, high availability configurations, and developing backup strategies.- Identify and implement Automation opportunities in project- Troubleshoot issues with log sources or systems with vendor, and report system defects as needed- Coordinate & lead the technical discussions with Client/vendors.- Identify root cause of security incidents.- Implement SOC best practices to deliver business outcomes Professional & Technical Skills: -Experience in Information Security, Risk Management, Infrastructure Security and Compliance- Experience on SOC Operation-Experience in working UBA and Advanced Threat Detection- Any Security device Installations, Configuration, and troubleshooting (e.g., firewall, IDS, etc.)- Hands on experience in any SIEM tool- Mid-level expertise in UNIX, Linux, and Windows- Experience working in a diversified, virtual environment.-Scripting experience in any language- Experience in data manipulation and regular expressions- Experience with Database installation & configuration- Certifications such as CISSP, ITIL, CISA, CISM, GIAC-GCIA, AWS/Azure/Cloud based Certifications- Advanced Certification from any SIEM vendor on products such as ArcSight, QRadar, McAfee Nitro, RSA SA, SPLUNK, Google SecOps etc. Additional Information:- The candidate should have a minimum of 7.5 years of experience in Security Information and Event Management (SIEM)- This position is based at our Bengaluru office- A 15 years full time education is required Qualification 15 years full time education

Posted 2 weeks ago

Apply

5.0 - 9.0 years

8 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

About Us Capco, a Wipro company, is a global technology and management consulting firm. Awarded with Consultancy of the year in the British Bank Award and has been ranked Top 100 Best Companies for Women in India 2022 by Avtar & Seramount . With our presence across 32 cities across globe, we support 100+ clients across banking, financial and Energy sectors. We are recognized for our deep transformation execution and delivery. WHY JOIN CAPCO You will work on engaging projects with the largest international and local banks, insurance companies, payment service providers and other key players in the industry. The projects that will transform the financial services industry. MAKE AN IMPACT Innovative thinking, delivery excellence and thought leadership to help our clients transform their business. Together with our clients and industry partners, we deliver disruptive work that is changing energy and financial services. #BEYOURSELFATWORK Capco has a tolerant, open culture that values diversity, inclusivity, and creativity. CAREER ADVANCEMENT With no forced hierarchy at Capco, everyone has the opportunity to grow as we grow, taking their career into their own hands. DIVERSITY & INCLUSION We believe that diversity of people and perspective gives us a competitive advantage. Location- Bangalore/Pune Work Mode - Hybrid (3 Days) Experience - 6+ Years Experienced in Project/Program PMO Experienced in handling stakeholders in different geos Experienced in working with Global customers Experienced in Project/Program Financials/budgeting and tracking Experienced in RAID log management Experienced in setting up steerco meetings and chairing it Experienced in working on executive reports/steerco deck/etc Experienced in working for financial services customers/projects Have thorough understanding on Project SDLC/governance Good communication skills Willing to work in UK shift timing WHY JOIN CAPCO You will work on engaging projects with some of the largest banks in the world, on projects that will transform the financial services industry. We offer A work culture focused on innovation and creating lasting value for our clients and employees Ongoing learning opportunities to help you acquire new skills or deepen existing expertise A flat, non-hierarchical structure that will enable you to work with senior partners and directly with clients A diverse, inclusive, meritocratic culture We offer: A work culture focused on innovation and creating lasting value for our clients and employees Ongoing learning opportunities to help you acquire new skills or deepen existing expertise A flat, non-hierarchical structure that will enable you to work with senior partners and directly with clients

Posted 2 weeks ago

Apply

6.0 - 11.0 years

4 - 8 Lacs

Mumbai, Bengaluru

Work from Office

Naukri logo

The SOC Analyst is responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents using a variety of tools and technologies. This role is critical in protecting the organizations digital assets and ensuring compliance with security policies and standards. Monitor SIEM systems and security tools for suspicious activity. Analyze and respond to security incidents and threats. Stay updated on threat intelligence and attack trends. Review logs from firewalls, IDS/IPS, and antivirus tools. Escalate critical incidents and document findings. Support vulnerability management and remediation tracking. Configure and tune security tools like SIEM and EDR. Ensure compliance with security policies and audits. Collaborate with IT and network teams on investigations. Contribute to process improvements and incident playbooks. Primary Skills SIEM (e.g., Splunk, QRadar, ArcSight) Incident Response Log Analysis Threat Intelligence Secondary Skills Scripting (Python, PowerShell, Bash) Cloud Security (AWS, Azure, GCP) Endpoint Detection and Response (EDR)

Posted 2 weeks ago

Apply

5.0 - 10.0 years

13 - 18 Lacs

Bengaluru

Work from Office

Naukri logo

Senior individual delivery role for complex security functions reducing risk, improving defensive capabilities, and mitigating cyber threats to both Thomson Reuters and its customers. Works with Lead Cyber Defense Individual Contributors and Cyber Defense People Leaders to deliver high-quality and innovative cyber defense security solutions across the enterprise by applying analytic, engineering, or other relevant technical expertise. Employs critical subject matter knowledge to identify, develop, and deploy solutions to key operational cyber defense challenges across a range of functions. About the Role: Delivers high quality solutions across cyber security functions including, but not limited tothreat detection, cyber threat intelligence, network security, incident response, insider threat prevention, defensive platforms and engineering, vulnerability management, and attack surface reduction. Drives continuous improvement in key cyber defense capabilities by streamlining technology acquisition and deployment, engineering solutions, and implementing innovative processes and procedures that increase efficiency, enhance performance, and reduce risk. Executes cyber security plans, activities, and policies that protect Thomson Reuters’ information infrastructure, customer base, and products. Assists in maturing cyber defense capabilities, enforces organizational security principles and industry recognized best practices, and demonstrates responsible resource management. Works independently or as part of functional project teams to implement security controls, monitor and mitigate threats, tune and optimize security appliances, coordinate with enterprise information services teams, interface with product teams, or other tasks associated with cyber defense and cyber fusion centers. About you: Youre a fit for the Senior Cyber Security Platform Engineer if you Have at least 5 years of CyberSecurity experience (Administration and Security Tools and Threat Intelligence Platforms) Knowledge and proven experience with AWS Proven experience with Python and Linux. Proven Experience dealing with the administration of cybersecurity tools. Troubleshooting and support on the integration and automation of process flows. Knowledge in MISP and Confluence. #LI-HS1 What’s in it For You Hybrid Work Model We’ve adopted a flexible hybrid working environment (2-3 days a week in the office depending on the role) for our office-based roles while delivering a seamless experience that is digitally and physically connected. Flexibility & Work-Life Balance: Flex My Way is a set of supportive workplace policies designed to help manage personal and professional responsibilities, whether caring for family, giving back to the community, or finding time to refresh and reset. This builds upon our flexible work arrangements, including work from anywhere for up to 8 weeks per year, empowering employees to achieve a better work-life balance. Career Development and Growth: By fostering a culture of continuous learning and skill development, we prepare our talent to tackle tomorrow’s challenges and deliver real-world solutions. Our Grow My Way programming and skills-first approach ensures you have the tools and knowledge to grow, lead, and thrive in an AI-enabled future. Industry Competitive Benefits We offer comprehensive benefit plans to include flexible vacation, two company-wide Mental Health Days off, access to the Headspace app, retirement savings, tuition reimbursement, employee incentive programs, and resources for mental, physical, and financial wellbeing. Culture: Globally recognized, award-winning reputation for inclusion and belonging, flexibility, work-life balance, and more. We live by our valuesObsess over our Customers, Compete to Win, Challenge (Y)our Thinking, Act Fast / Learn Fast, and Stronger Together. Social Impact Make an impact in your community with our Social Impact Institute. We offer employees two paid volunteer days off annually and opportunities to get involved with pro-bono consulting projects and Environmental, Social, and Governance (ESG) initiatives. Making a Real-World Impact: We are one of the few companies globally that helps its customers pursue justice, truth, and transparency. Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs the way forward by bringing together the trusted content and technology that people and organizations need to make the right decisions. We serve professionals across legal, tax, accounting, compliance, government, and media. Our products combine highly specialized software and insights to empower professionals with the data, intelligence, and solutions needed to make informed decisions, and to help institutions in their pursuit of justice, truth, and transparency. Reuters, part of Thomson Reuters, is a world leading provider of trusted journalism and news. We are powered by the talents of 26,000 employees across more than 70 countries, where everyone has a chance to contribute and grow professionally in flexible work environments. At a time when objectivity, accuracy, fairness, and transparency are under attack, we consider it our duty to pursue them. Sound excitingJoin us and help shape the industries that move society forward. As a global business, we rely on the unique backgrounds, perspectives, and experiences of all employees to deliver on our business goals. To ensure we can do that, we seek talented, qualified employees in all our operations around the world regardless of race, color, sex/gender, including pregnancy, gender identity and expression, national origin, religion, sexual orientation, disability, age, marital status, citizen status, veteran status, or any other protected classification under applicable law. Thomson Reuters is proud to be an Equal Employment Opportunity Employer providing a drug-free workplace. We also make reasonable accommodations for qualified individuals with disabilities and for sincerely held religious beliefs in accordance with applicable law. More information on requesting an accommodation here. Learn more on how to protect yourself from fraudulent job postings here. More information about Thomson Reuters can be found on thomsonreuters.com.

Posted 2 weeks ago

Apply

6.0 - 10.0 years

8 - 12 Lacs

Mumbai

Work from Office

Naukri logo

Monitor network traffic for unusual activity and potential threats Configure and manage security tools such as firewalls, antivirus software, and intrusion detection systems. Required Candidate profile Provide technical advice on network security issues to staff and management. Respond to, investigate, and resolve security incidents and breaches

Posted 2 weeks ago

Apply

0.0 - 2.0 years

0 Lacs

Mohali district, India

On-site

Linkedin logo

Location : Mohali Job Type : Full-time Department : Cyber Security / IT Operations CTC : 3 LPA – 5 LPA Experience Required : 0 -2 years We are seeking a motivated and detail-oriented Implementation Engineer with experience in SIEM technologies. As part of the team, you will play a key role in deploying, configuring, and supporting SIEM solutions for our clients, ensuring they are optimally set up to detect, monitor, and respond to security threats. Key Responsibilities: Assist in the deployment, configuration, and maintenance of SIEM solutions (e.g., Splunk, IBM QRadar, ArcSight, etc.) for clients. Collaborate with the project management and technical teams to ensure smooth installation and integration of SIEM tools. Implement and configure log sources, data connectors, and system integrations. Assist in the creation and tuning of security rules and alerts to identify and respond to potential threats. Provide technical support and troubleshooting for SIEM-related issues during implementation and post-deployment phases. Conduct system performance tuning and optimization to ensure the SIEM solution is running efficiently. Document system configurations, processes, and implementation steps. Stay updated on industry best practices and trends in security monitoring. Requirements: Strong understanding of networking concepts and networking components. Proficiency in both Windows and Linux operating systems. In-depth knowledge of firewalls and network security principles is a plus. Hands-on experience with implementing and managing SIEM, SOAR, NDR, XDR tools is highly desirable. Must have the attitude to continuously learn and grow within the cyber security field. Good communication skills, both verbal and written. Ability to work in a fast-paced, collaborative environment Basic knowledge of SIEM platforms (e.g., Splunk, IBM QRadar, ArcSight, etc.). Experience with log sources such as firewalls, intrusion detection/prevention systems, and servers. Familiarity with security monitoring, threat detection, and incident management practices. Knowledge of scripting languages such as Python, Bash, or PowerShell is a plus. Show more Show less

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies