Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 8.0 years
0 Lacs
mumbai, maharashtra, india
On-site
Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Manager Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. As a cybersecurity generalist at PwC, you will focus on providing comprehensive security solutions and experience across various domains, maintaining the protection of client systems and data. You will apply a broad understanding of cybersecurity principles and practices to address diverse security challenges effectively. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes forour clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences foreach other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firms growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: A career within Risk Consulting services, will provide you with the opportunity to help our clients secure their cloud infrastructures to enhance their Cyber Security posture. Responsibilities: 1. Knowledge of cloud service providers (majorly Azure and GCP) and their technologies 2. Knowledge of windows and Linux operating system. 3. Basic knowledge of Linux commands and bash scripting 4. Basic knowledge of ELK 5. Assess and implement cloud security best practices in Axure and GCP 6. Strong understanding of Azure Sentinel, Microsoft Defender for cloud on Azure and Security command center on GCP 7. Effectively collaborate with different team members to build security solutions and integrate them 8. Periodically assess and identify security control gaps and remediate them 9. Design and implement cloud security framework for Azure and GCP, Develop documentations for implementations Mandatory skill sets: Cloud Security Preferred skill sets: Cloud Security Years of experience required: 3-8 years Education qualification: B.Tech Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Master of Business Administration, Bachelor of Technology Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills Email Security, Microsoft Defender Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Analytical Thinking, Azure Data Factory, Coaching and Feedback, Communication, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Learning Agility, Managed Services, Optimism, Privacy Compliance, Professional Courage + 13 more Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship No Government Clearance Required No Job Posting End Date Show more Show less
Posted 2 weeks ago
8.0 - 10.0 years
0 Lacs
hyderabad, telangana, india
On-site
YASH Technologies is a leading technology integrator specializing in helping clients reimagine operating models, enhance competitiveness, optimize costs, foster exceptional stakeholder experiences, and drive business transformation. At YASH, were a cluster of the brightest stars working with cutting-edge technologies. Our purpose is anchored in a single truth bringing real positive changes in an increasingly virtual world and it drives us beyond generational gaps and disruptions of the future. We are looking forward to hire IoT Professionals in the following areas : Position Name: Lead Consultant - OT/ IOT Description YASH is a Digital services enabler organization delivering vast portfolio of digital services to customers across the globe. Our topline services include Cybersecurity services. This role will be part of vibrant YASHs Cybersecurity Security Operations Team. We are looking for candidates who will embrace our Security strategy in the design, implementation and operations of Azure Sentinel with a focus on Azure. As an Azure Sentinel Administrator, you should have experience in all aspects of SIEM tools including estimating, designing, fine tuning, log source integration, threat hunting and automation. Attributes we will look for in our candidates include excellent technical and analytical skills, communication and flexibility, innovative thinking and problem solving. In addition, this position is responsible for analyzing security vulnerabilities and determining if there is an attack surface and impact. The ideal candidate understands the complete implementation of a SIEM tool. Position Lead Consultant - OT/ IOT Security Number 1 Location Bangalore/ Pune / Indore Total Experience 8 -10 Years How Do You Grow And Be Successful At YASH, we will offer all support to grow in your career. At the very beginning you will receive a deep knowledge on the current SOPs once you are fully onboarded into our Security Operations team. You will be measured on the positive contribution in delivering the SIEM services to our customers. Fluency will be measured on the goals such as improvement of cyber posture of customers through our Manage detect and respond services. Our employees will have global exposure from day-1. We offer to learn multiple security domains through our mentored on-the-job training program. Aspiring candidates will reach to highest positions and make a global career. Preferred Skills Minimum 8+ years of experience in developing use cases customized to the environment. Work on Cloud SIEM project implementations for various customers in different locations, starting with estimating the SIEM configuration to successful deployment and fine tuning of the solution Configure data digestion types and connectors. Create incident categorization and threat management plan. End to end operational knowledge of Azure Incident Management Process/SLAs. Configure Sentinel Incidents, Workbooks, Hunt queries, Notebooks. Support on-going development and troubleshooting of Azure Sentinel. Advise and develop Azure Sentinel adoption migration roadmap for clients. Analytic design and configuration of the events and logs being digested. Preferred with experience on SOAR tools like IBM SOAR(Resilient), Splunk SOAR(Phantom) , Microsoft Sentinel SOAR, knowledge in Jupyter and logicApps or any other SOAR Tool. In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc Use Case Fine tuning and New Use case creation. Hands-on experience with Azure Sentinel/Kusto Query language preferred). Azure Security Services for Vulnerability Assessment and Compliance practices analysis, Develop, automate, and orchestrate tasks(playbooks) with logic apps based on certain events. Tuning threat detection to minimize noise and amplify a signal. Experience in SIEM/ SOAR & Playbook creation technologies understanding the log source integration. Responsible for integration review of standard and non-standard logs in SIEM Provide support to the Security Operations Center (SOC) during incident response, event monitoring, and threat hunting activities. Proficient in one or more of the following computer languages PowerShell, Bash ,Python & KQL to support cyber threat detection or reporting. Security API implementations can be considered as well. Deep understanding of either MITRE Attack framework (MITRE preferred) or the Cyber Kill Chain Experience in threat management. Knowledge of various operating system flavors including but not limited to Windows, Linux, Unix. Knowledge of applications, databases, middleware to address security threats against the same. Proficient in preparation of reports, dashboards and documentation. Working knowledge Passion for Cyber Security, being the basic ingredient of success. Ensure compliance to SLA, process adherence and process improvisation to achieve operational objectives Necessary soft-skills set to successfully understand, challenge and translate the business needs and communicate to the relevant parties with a structured and methodical approach to problem solving You are a team player with good communication skills, proactive and highly motivated individual with a serious hands-on work ethic Qualifications: A bachelor&aposs or master&aposs degree in computer science, information technology Preferred Certifications: Azure Security Certifications, SIEM certifications At YASH, you are empowered to create a career that will take you to where you want to go while working in an inclusive team environment. We leverage career-oriented skilling models and optimize our collective intelligence aided with technology for continuous learning, unlearning, and relearning at a rapid pace and scale. Our Hyperlearning workplace is grounded upon four principles Flexible work arrangements, Free spirit, and emotional positivity Agile self-determination, trust, transparency, and open collaboration All Support needed for the realization of business goals, Stable employment with a great atmosphere and ethical corporate culture Show more Show less
Posted 2 weeks ago
3.0 - 8.0 years
3 - 7 Lacs
bengaluru
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Splunk Security Information and Event Management (SIEM) Good to have skills : Microsoft Azure SentinelMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. You will provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Be a crucial part of ensuring the security of the organization's digital assets. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work-related problems.- Implement security measures to protect systems, networks, and data.- Conduct security assessments and audits to identify vulnerabilities.- Develop and implement security policies and procedures.- Stay updated on the latest security trends and technologies.- Collaborate with cross-functional teams to enhance security measures. Professional & Technical Skills: - Must To Have Skills: Proficiency in Splunk Security Information and Event Management (SIEM).- Good To Have Skills: Experience with Microsoft Azure Sentinel.- Strong understanding of security principles and practices.- Knowledge of threat intelligence and incident response.- Experience in security monitoring and analysis. Additional Information:- The candidate should have a minimum of 3 years of experience in Splunk Security Information and Event Management (SIEM).- This position is based at our Bengaluru office.- A 15 years full-time education is required. Qualification 15 years full time education
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
hyderabad, telangana
On-site
At EY, you'll have the opportunity to shape a unique career tailored to your individual strengths, with the global reach, support, diverse culture, and cutting-edge technology needed to unleash your full potential. Your distinctive voice and perspective are valued at EY as we strive for continuous improvement. Join our team to create an exceptional experience for yourself while contributing to a better working world for all. As a CMS-TDR Senior at EY, you will be a key member of our cybersecurity team, serving as a Senior Analyst responsible for assisting clients in identifying and responding to security incidents using SIEM, EDR, and NSM solutions. Your primary responsibilities will include: - Providing operational support utilizing SIEM solutions (Splunk, Sentinel), EDR (CrowdStrike, Defender, Carbon Black), and NSM (Fidelis, ExtraHop) for multiple clients. - Specializing in second-level incident validation and conducting detailed investigations. - Coordinating and communicating with clients to ensure effective incident containment, eradication, and recovery. - Conducting SIEM support activities such as adhoc reporting and basic troubleshooting. - Advising customers on best practices and use cases for achieving their desired security objectives using these solutions. - Offering near real-time analysis, investigation, reporting, remediation, coordination, and tracking of security-related activities for clients. Required skills and attributes for success: - Customer service orientation with a focus on meeting commitments and seeking feedback for continuous improvement. - Proficiency in SIEM technologies like Splunk, Azure Sentinel from a security analyst's perspective. - Ability to troubleshoot issues related to SIEM solutions. - Capability to work independently with minimal supervision. - Exposure to IOT/OT monitoring tools (Claroty, Nozomi Networks) is advantageous. - Strong knowledge and experience in Security Monitoring and Cyber Incident Response. - Familiarity with ELK Stack, Network monitoring platforms like Fidelis XPS, ExtraHop, and endpoint protection tools such as Carbon Black, Tanium, CrowdStrike, Defender, etc. Qualifications for this role include: - Bachelor's degree in Engineering with a strong technical background. - Availability to work in 24x7 shifts. - Excellent command of verbal and written English. - Demonstrated technical expertise and critical thinking skills. - Strong interpersonal and presentation abilities. - Minimum of 3 years hands-on experience in SIEM/EDR/NSM solutions. - Certification in any SIEM platform and knowledge of RegEx, Perl scripting, and SQL query language. - Certifications such as CCSA, CEH, CISSP, GCIH are preferred. Additionally, project management skills are desirable for this role. Working at EY offers: - Engaging and diverse projects with clients ranging from startups to Fortune 500 companies. - Opportunities for education, coaching, and personal development. - Supportive colleagues, feedback, and coaching. - Room for skill development and career progression. - A flexible work environment that empowers you to excel in your role. EY is committed to building a better working world by creating long-term value for clients, people, and society while fostering trust in capital markets. Through data and technology, EY teams worldwide provide assurance and help clients grow, transform, and operate effectively in today's complex landscape. Whether in assurance, consulting, law, strategy, tax, or transactions, EY teams drive innovation by asking the right questions to address the challenges of our time.,
Posted 2 weeks ago
3.0 - 8.0 years
3 - 7 Lacs
noida
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Splunk Security Information and Event Management (SIEM) Good to have skills : Microsoft Azure SentinelMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply your security expertise to design, build, and protect enterprise systems, applications, data, assets, and people. Your typical day will involve collaborating with various teams to implement security measures, conducting risk assessments, and ensuring compliance with security policies. You will also monitor security systems and respond to incidents, all while staying updated on the latest cyber threats and security technologies to effectively safeguard the organizations information and infrastructure. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular security assessments and audits to identify vulnerabilities.- Develop and implement security policies and procedures to enhance the organization's security posture. Professional & Technical Skills: - Must To Have Skills: Proficiency in Splunk Security Information and Event Management (SIEM).- Good To Have Skills: Experience with Microsoft Azure Sentinel.- Strong understanding of security protocols and best practices.- Experience in incident response and threat hunting.- Familiarity with network security technologies and tools. Additional Information:- The candidate should have minimum 3 years of experience in Splunk Security Information and Event Management (SIEM).- This position is based at our Noida office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture, and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. As part of our EY-cyber security team, you will work as a SOC analyst who will assist clients in detecting and responding to security incidents with the support of their SIEM, EDR, and NSM solutions. We are looking for a Security Analyst with experience in SIEM, EDR, and NSM solutions. Your key responsibilities include: - Providing operational support using SIEM solutions (Splunk, Sentinel), EDR Solution (Defender, CrowdStrike, Carbon Black), NSM (Fidelis, ExtraHop) for multiple customers. - Handling the first level of monitoring and triaging of security alerts. - Conducting initial data gathering and investigation using SIEM, EDR, and NSM solutions. - Providing near real-time analysis, investigation, and reporting security incidents for customers. Skills and attributes for success: - Customer Service oriented - meets commitments to customers and seeks feedback from customers to identify improvement opportunities. - Good knowledge of SIEM technologies such as Splunk, Azure Sentinel from a Security analyst's point of view. - Exposure to IOT/OT monitoring (Claroty, Nozomi Networks, etc.) is a plus. - Good knowledge and experience in Security Monitoring. - Good knowledge and experience in Cyber Incident Response. - Knowledge in Network monitoring technology platforms such as Fidelis XPS, ExtraHop. - Knowledge in endpoint protection tools, techniques, and platforms such as Carbon Black, Tanium, CrowdStrike, Defender ATP, etc. To qualify for the role, you must have: - B. Tech./ B.E. with sound technical skills. - Ability to work in 24x7 shifts. - Strong command of verbal and written English language. - Demonstrate both technical acumen and critical thinking abilities. - Strong interpersonal and presentation skills. - Hands-on experience in SIEM, EDR, and NSM solutions. - Certification in any of the SIEM platforms. - Knowledge of RegEx, Perl scripting, and SQL query language. - Certification - CEH, ECSA, ECIH, Splunk Power User. Working at EY offers: At EY, we're dedicated to helping our clients, from startups to Fortune 500 companies, and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees, and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: - Support, coaching, and feedback from some of the most engaging colleagues around. - Opportunities to develop new skills and progress your career. - The freedom and flexibility to handle your role in a way that's right for you. EY | Building a better working world: EY exists to build a better working world, helping to create long-term value for clients, people, and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform, and operate. Working across assurance, consulting, law, strategy, tax, and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.,
Posted 3 weeks ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
As a potential candidate for this role, you will be responsible for working with SIEM Azure Sentinel and EDR technologies like MDE and SentinelOne. Your expertise will also be required with the Microsoft Security Suite, which includes MCAS, MDO, MDI, MDC, and MDE among others. Proficiency in KQL ranging from basic to advanced/mid level is essential for this position. Additionally, experience with threat intelligence tools such as Recorded Future, VMRay, or similar tools will be considered a secondary preference. Familiarity with SNOW (ServiceNow) as a ticketing tool will also be acknowledged in this role.,
Posted 3 weeks ago
8.0 - 13.0 years
18 - 33 Lacs
hyderabad
Work from Office
Job Title: Security Operations Center (SOC) Analyst Experience: 8+ Years Location: Hyderabad (Hybrid Mode of work) Department: Cybersecurity / Security Operations Job Summary: We are seeking an experienced and detail-oriented SOC Analyst (5 - 8 years) to join our cybersecurity team. The ideal candidate will be responsible for monitoring, detecting, investigating, and responding to cyber threats across the organization. The SOC Analyst will play a critical role in defending systems, applications, and data from security breaches and supporting incident response efforts, threat hunting, and continuous improvement of SOC processes. Key Responsibilities: Security Monitoring & Incident Response: Continuously monitor SIEM dashboards, threat intelligence feeds, and security alerts. Investigate and respond to security incidents, phishing attacks, malware infections, and anomalous activities. Triage alerts based on severity, business impact, and threat intelligence context. Perform root cause analysis and prepare incident reports with actionable recommendations. Escalate critical incidents to Tier 3/IR teams and collaborate during major security events. Threat Detection & Hunting: Conduct proactive threat hunting based on IOCs, TTPs, and threat intelligence reports. Analyse logs from endpoints, firewalls, IDS/IPS, cloud workloads, and third-party security solutions. Develop and fine-tune detection rules and correlation logic in SIEM (e.g., Splunk, Sumo Logic, Sentinel). Tool & Infrastructure Management: Work with EDR, NDR, DLP, SIEM, SOAR, and vulnerability management platforms. Support integration of new log sources and ensure completeness of logging for critical systems. Maintain threat detection playbooks and contribute to process automation via SOAR tools. Compliance & Reporting: Ensure security operations align with frameworks like NIST, ISO 27001, SOC 2, or HIPAA. Support security audit requirements by providing incident logs and response documentation. Generate periodic reports on incident trends, SOC performance, and threat landscape. Required Skills & Experience: 58 years of experience in a SOC environment or cybersecurity operations role. Strong knowledge of attack vectors, MITRE ATT&CK framework, and incident response lifecycle. Hands-on experience with SIEM (e.g., Splunk, Microsoft Sentinel, QRadar, LogRhythm). Familiarity with endpoint protection (CrowdStrike, SentinelOne, Defender ATP, etc.). Knowledge of Windows/Linux log analysis, firewall rules, and cloud security controls (Azure/AWS). Strong analytical thinking, attention to detail, and ability to work under pressure. Preferred Qualifications: Bachelors degree in Cybersecurity, Computer Science, or related field. Certifications such as CEH, GCIA, GCIH, CySA+, AZ-500, or Security+ are highly desirable. Experience working in a 24x7 SOC or with MSSP environments is a plus. Exposure to compliance-driven industries (finance, healthcare, SaaS) preferred. Soft Skills: Strong communication and documentation skills. Ability to collaborate across IT, DevOps, and security teams. Risk-aware mindset with a proactive approach to security operations. Work Mode: Hybrid / 24x7 Rotational Shifts if applicable Reporting To: SOC Manager / Head of Security Operations
Posted 3 weeks ago
4.0 - 9.0 years
3 - 8 Lacs
pune, bengaluru, delhi / ncr
Hybrid
Key Responsibilities: • Work independently to lead and complete high quality threat-based risk assessments, business impact analysis across a diverse set of cloud technologies, business functions, and platforms. • Conduct cloud infrastructure security risk assessments based on cloud security best practices. • Assess cloud security architecture • Cloud security controls evaluation to ensure compliance with business scope, security policies and standards • Preparing cloud infrastructure risk assessment reports. • Work closely with internal management/team and client business representatives to scope assessments, gather documentation, interview clients, identify risks, document findings, and ensure transparent assessment of risks by following a structured risk assessment methodology. • Driving the efforts to identify, assess, and communicate the cloud information security risks to relevant-internal and external stakeholders.
Posted 3 weeks ago
3.0 - 5.0 years
4 - 7 Lacs
chennai, bengaluru, delhi / ncr
Hybrid
KEY Capabilities Experience in working with SIEM Solutions such as Splunk or Azure Sentinel. Experience in working with any of Endpoint Detection and Response tools preferably Crowdstrike, Sentinel One or Microsoft Defender for Endpoint. Expertise in SIEM and EDR content development with an eye towards behavior-based detection logic. Strong background in host based and network-based behaviors. Familiarity of Windows Event IDs and common application logs. Knowledge in programming or scripting languages such as Batch Scripting, Python PowerShell, etc. Experience in purple teaming activities. Hands-on experience on threat Hunting for identification of interested events for content development. Analyze and investigate broad range of threats or cyber activities occurring on daily basis. Provide actionable insights to help identify, detect, prevent, and respond to potentially malicious activities. Qualification and experience Minimum of 3 to 7 years experience with in-depth host, network architecture knowledge that will translate over to effective content development. Minimum of 3 years SOC experience. An adversarial mindset, understanding the goals, behaviors, and TTPs of threat actors. Strong oral, written and listening skills are an essential component to effective consulting. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary. Must have content development knowledge in Endpoint Detection and Response (Defender/CrowdStrike), SIEM (Splunk/Sentinel). Must have knowledge of Windows and Linux basics including command and script interpreters, PowerShell, registries etc. Troubleshoot EDR and SIEM platform and application issues, escalate and work with relevant teams to resolve issues. Certifications in a core security related discipline will be an added advantage. Certification in any one of the SIEM, EDR or Network Solutions such as Splunk, Azure Sentinel, Falcon Crowdstrike, SentinelOne will be an added advantage.
Posted 3 weeks ago
3.0 - 8.0 years
10 - 14 Lacs
pune, bengaluru, delhi / ncr
Hybrid
Cloud Security Engineer II Zscale Shift: Rotational, 24*7 Location : Delhi NCR(Noida And Gurugram), Bangalore, Pune, Mumbai,Hyderabad, Trivandrum t Experience with Zscaler is a must. Ability to work independently in implementing and handling Zscaler Insight at a Glance 14,000+ engaged teammates globally with operations in 25 countries across the globe. Received 35+ industry and partner awards in the past year $9.2 billion in revenue #20on Fortune’s World'sBest Workplaces™ list #14 on Forbes World's Best Employers in IT – 2023 #23 on Forbes Best Employers for Women in IT- 2023 $1.4M+ total charitable contributions in 2023 by Insight globally About the role As a Cloud Security Engineer II, you will be providing Security L1/L2/L3/Engineering support for Identity, Network, App Security, Email Security based on Microsoft, Zscaler, Cisco and other ISV Tools following the cloud security model that provides organizations with a range of security solutions and services. We will count on you to help organizations protect their networks, systems, and data from a variety of security threats, such as cyberattacks, data breaches, and unauthorized access. Along the way, you will get to: Analyze logs and reports to identify and resolve connectivity, performance, and security issues. Assist in the deployment and configuration of Zscaler SIPA related solution Be responsible for monitoring, management, and optimization of Security Services within client’s environment\ Handle the responsibilities including but not limited to Continuous Monitoring, Email Security, Antivirus Management, Spam Filtering, IAM/PAM, Intrusion Protection, Security Assessment, Network Security, SIEM/SOAR, App Security What we’re looking for B.E/B.Tech/Graduate Exp in Any cloud Minimum 2-3 years’ experience and hands on in Zscaler (ZIA, ZPA, ZDX) Must possess a basic understanding of Routing and Switching. Should have a clear understanding of the architecture and traffic flow for ZIA (Zscaler Internet Access) and ZPA (Zscaler Private Access). Should be familiar with SSL handshake, SSL Inspection, and have experience in configuring SSL Inspection policies on ZIA. Experience in configuring locations with GRE (Generic Routing Encapsulation) and IPSec tunnels is essential. Experience in supporting SD-WAN integrated sites, including handling SSL inspection bypass configurations and resolving access issues for mobile and remote users. Proficiency in analyzing ZDX telemetry to identify end-user experience issues. Exposure to working in a ticket-driven environment (e.g., ServiceNow) with strong documentation and communication skills for internal and external stakeholders Should have a strong understanding of PAC file modifications. Hands on secure CRT, Putty and fiddler tool for log analysis. Should have exceptional problem-solving skills, identifying and isolating issues following established processes and obtaining approvals for resolutions. Should have strong understanding of ZIA policies to enhance simplicity and reduce complexity. Should have knowledge and experience in troubleshooting ZPA settings, designed App Segments and Access policies to enhance security. knowledge of writing detections based on Network, Host, OS and other relevant logs. Experienced in configuration and logs from various advanced security tools. Basic Troubleshooting skills on Firewalls.
Posted 3 weeks ago
15.0 - 20.0 years
13 - 17 Lacs
hyderabad
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and transitioning to cloud security-managed operations. You will engage in discussions to align security strategies with organizational objectives, ensuring that all security measures are effectively integrated into the cloud environment. Your role will also require you to stay updated on the latest security trends and technologies to enhance the overall security posture of the organization. Roles & Responsibilities:1)Design and implement Microsoft Sentinel architecture, including data connectors, analytics rules, and workbooks.2)Integrate Sentinel with various data sources, including Azure services on-premises systems, and third-party security products.3)Develop and maintain data connectors, APIs and custom integrations.4)Configure and optimize incident response workflows, including automated response actions and playbooks.5)Collaborate with security operations teams to implement Sentinel-based security monitoring and incident response processes.6)Provide training and support to security teams on Sentinel features and functionality7)Continuously monitor and optimize Sentinel performance, scalability, and reliability8)Develop and maintain custom dashboards, reports, and workbooks to provide security insights and metrics. 9)Integrate Azure Logic Apps with Azure Sentinel to automate security workflows and incident response.10)Develop custom connectors for Logic apps to integrate with Azure Sentinel and other security tools. 11)Collaborate with security teams, developers, and operation teams to ensure seamless integration and deployment of Logic Apps with Azure Sentinel12)Configure and maintain Sentinel workspaces, including data connectors, analytics rules. 13)Optimize Sentinel workspace performance, scalability, and security.14)Develop and maintain reports and dashboards to provide visibility into security metrics and trends.15)Strong knowledge of KQL and experience writing complex queries. Proficiency in Microsoft Sentinel, Azure Security Center and Azure Monitor- Experience with data analytics, machine learning, and threat intelligence. Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Develop and maintain comprehensive documentation of security architecture and frameworks.- Conduct regular assessments and audits to ensure compliance with security policies and standards. Professional & Technical Skills: - Must To Have Skills: Proficiency in Sentinel SIEM & KQL query.- Strong understanding of cloud security principles and best practices.- Experience with security incident response and threat management.- Familiarity with regulatory compliance frameworks such as GDPR, HIPAA, or PCI-DSS.- Knowledge of network security protocols and technologies. Additional Information:- The candidate should have minimum 7.5 years of experience in Security Information and Event Management (SIEM).- This position is based at our Hyderabad office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
15.0 - 20.0 years
5 - 9 Lacs
kolkata
Work from Office
Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : Cloud Security Architecture Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :Security Delivery Specialist to support the planning, implementation, and delivery of cybersecurity services across Microsoft security technologies. The ideal candidate will have practical expertise with MDC, MDE, MDI, Azure Firewall, and Microsoft Sentinel, and will play a key role in delivering secure, scalable, and compliant security solutions for internal stakeholders or clients.You will engage in problem-solving activities, participate in team meetings, and contribute to the overall success of projects by delivering high-quality applications that enhance operational efficiency and user experience. Roles & Responsibilities:- Deliver security solutions using Microsofts security stack, with a focus on Microsoft Defender for Cloud, Endpoint, Identity, Azure Firewall, and Microsoft Sentinel.Translate business and technical requirements into well-architected security solutions and support delivery from design to deployment.Configure and fine-tune Microsoft Sentinel, develop analytics rules, workbooks, playbooks, and maintain alerting mechanisms.Implement and operationalize MDC for cloud security posture management and workload protection.Support deployment and ongoing management of MDE for endpoint threat detection and response.Integrate MDI into customer environments to monitor identity-related threats and provide remediation recommendations.Design and maintain Azure Firewall rules and policies as part of secure cloud network implementations.Coordinate with engineering, operations, and risk teams to ensure consistent and secure delivery of services.Create technical documentation, deployment guides, and knowledge transfer materials for clients or internal teams.Collaborate with project managers and stakeholders to ensure timely and successful delivery of security services.Contribute to continuous improvement initiatives and automation of delivery processes. Professional & Technical Skills: - Must To Have Skills: Proficiency in Cloud Security.- Strong knowledge on MDC, MDE, MDI, MCAS, Azure Sentinel, Firewall- Strong understanding of cloud security principles and best practices.- Experience with security frameworks and compliance standards.- Ability to assess and mitigate security risks in cloud environments.- Familiarity with identity and access management solutions. Additional Information:- The candidate should have minimum 5 years of experience in Cloud Security Architecture.- This position is based at our Kolkata office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
15.0 - 20.0 years
13 - 17 Lacs
bengaluru
Work from Office
About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :SIEM Engineer with expertise in Splunk to support the deployment, configuration, and ongoing maintenance of the Splunk platform in support of our Cyber Defense and Security Operations. The ideal candidate will help in developing use cases, onboarding log sources, fine-tuning alerts, and ensuring optimal performance of the SIEM environment Roles & Responsibilities:- Deploy, configure, and maintain Splunk infrastructure components (indexers, forwarders, search heads, etc.)- Onboard log sources from various platforms including network devices, endpoints, cloud, and applications.- Create, optimize, and tune correlation rules and alerts to reduce false positives and improve threat detection.- Develop and maintain dashboards, reports, and visualizations for different stakeholders including SOC, IT, and leadership teams.- Perform root cause analysis and troubleshooting of SIEM-related issues.- Design and implement custom Splunk queries and SPL scripts to support detection and investigation.- Collaborate with Security Operations Center (SOC), Threat Intel, and IR teams to improve detection and response capabilities.- Support the integration of SOAR for automation of repetitive security tasks and response actions.- Participate in threat hunting and red/blue team exercises using Splunk.- Ensure Splunk platform is compliant with internal governance and regulatory requirements (e.g., PCI, HIPAA).- Maintain documentation for use cases, onboarding procedures, and dashboards Professional & Technical Skills: - Bachelors degree in Computer Science, Information Security, or related field (or equivalent experience).- 57 years of experience in Cybersecurity with at least 4+ years hands-on with Splunk.- Strong knowledge of Splunk Enterprise and Splunk Enterprise Security (ES).- Proficient in SPL (Search Processing Language).- Familiarity with security frameworks like MITRE ATT&CK, NIST, or ISO27001.- Experience integrating threat intelligence feeds and IOC sources.- Understanding of network protocols, logs, firewalls, IDS/IPS, endpoint security, and cloud platforms (AWS, Azure).- Experience with SOAR tools (e.g., Splunk SOAR, Phantom) is a plus.- Splunk certifications (e.g., Splunk Core Certified User/Power User/Admin) preferred Additional Information:- The candidate should have minimum 5 years of experience in Security Information and Event Management (SIEM).- This position is based at our Bengaluru office.- A 15 years full time education is required.- Experience with cloud-native logging solutions (e.g., AWS CloudTrail, Azure Sentinel).- Knowledge of scripting languages (Python, PowerShell, Bash).- Exposure to ITSM tools (e.g., ServiceNow) for incident tracking.- Ability to work in a 24x7 security operations environment (if required). Qualification 15 years full time education
Posted 3 weeks ago
8.0 - 13.0 years
13 - 17 Lacs
bengaluru
Work from Office
About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and transitioning to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud technologies and security threats. Roles & Responsibilities:1)Design and implement Microsoft Sentinel architecture, including data connectors, analytics rules, and workbooks.2)Integrate Sentinel with various data sources, including Azure services on-premises systems, and third-party security products.3)Develop and maintain data connectors, APIs and custom integrations.4)Configure and optimize incident response workflows, including automated response actions and playbooks.5)Collaborate with security operations teams to implement Sentinel-based security monitoring and incident response processes.6)Provide training and support to security teams on Sentinel features and functionality7)Continuously monitor and optimize Sentinel performance, scalability, and reliability8)Develop and maintain custom dashboards, reports, and workbooks to provide security insights and metrics. 9)Integrate Azure Logic Apps with Azure Sentinel to automate security workflows and incident response.10)Develop custom connectors for Logic apps to integrate with Azure Sentinel and other security tools. 11)Collaborate with security teams, developers, and operation teams to ensure seamless integration and deployment of Logic Apps with Azure Sentinel12)Configure and maintain Sentinel workspaces, including data connectors, analytics rules. 13)Optimize Sentinel workspace performance, scalability, and security.14)Develop and maintain reports and dashboards to provide visibility into security metrics and trends.15)Strong knowledge of KQL and experience writing complex queries. Proficiency in Microsoft Sentinel, Azure Security Center and Azure Monitor- Experience with data analytics, machine learning, and threat intelligence. Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Develop and maintain comprehensive documentation of security architecture and frameworks.- Conduct regular assessments and audits to ensure compliance with security policies and standards. Professional & Technical Skills: - Must To Have Skills: Proficiency in Sentinel SIEM & KQL query.- Strong understanding of cloud security principles and best practices.- Experience with security incident response and threat management.- Familiarity with regulatory compliance frameworks such as GDPR, HIPAA, or PCI-DSS.- Knowledge of network security protocols and technologies. Additional Information:- The candidate should have minimum 7.5 years of experience in Security Information and Event Management (SIEM).- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
3.0 - 7.0 years
0 Lacs
chennai, tamil nadu
On-site
As a Cybersecurity Analyst at KONE Cybersecurity, you will play a crucial role in safeguarding KONE IT, IoT, and OT infrastructure from various criminal activities. You will be part of the dedicated Cybersecurity team within the KONE Technology & Innovation unit, focusing on ensuring the security of KONE's products, solutions, and applications used across the business lines. We are currently seeking a dynamic individual to join us as a Cybersecurity Operations Analyst. In this role, you will be responsible for conducting L2 activities for Security Incidents at KONE, responding to escalated incidents from the L1 team. Your primary tasks will include monitoring SOC capabilities, enhancing efficiency, and maintaining a secure environment. The team's mission involves identifying potential threats, analyzing their severity, collaborating with the Cybersecurity Incident Management and Response Team, and implementing containment, mitigation, and remediation strategies. Furthermore, you will be expected to contribute ideas to enhance monitoring and detection capabilities continuously. Key Responsibilities: - Investigate and analyze the root cause of Security Incidents, conduct triage, Incident Management, and timely remediation without impacting KONE operations. - Lead the L1 Operations team towards achieving the set OKRs by the Cybersecurity Operations Manager. - Proactively devise strategies to minimize risks associated with Security Incidents, introduce improvements, and automate processes to reduce manual tasks. - Assist in creating operational documents such as use cases, play/run books, and training materials related to incident response, ensuring regular updates. - Collaborate daily with the SOC team, internal stakeholders, and support teams to address Security Investigations and lead major Security Incidents at KONE. - Contribute to the development of metrics, reporting, review incident progress with the Operations Manager. - Communicate potential threats, suspicious activities, malware findings, etc., to the Security SOC provider and serve as a contact point for KONE Cybersecurity issues. - Enhance operational efficiency by improving processes across multiple detection sets. - Manage Cybersecurity incidents, provide remediation advice, support incident response activities, and escalate issues as necessary. - Collaborate with multi-vendor organizations, adapt to diverse cultures, and identify monitoring gaps across IT, IoT, and OT to drive new Security onboarding processes with internal teams. Qualifications: - Bachelor's or Master's degree in IT (Computer Science)/Engineering or equivalent practical experience. - Certifications in Cybersecurity such as COMPTIA+, SC 200, or other specialized security certifications are advantageous. - Minimum of 3 years" experience in Cybersecurity SOC, Incident Management, and Operations Domain. - Profound knowledge of Network Security, Endpoint security, and familiarity with the Microsoft security landscape. - Familiarity with ITIL processes, excellent verbal and communication skills, and a commitment to staying updated on industry best practices. - Strong problem-solving and analytical abilities, ability to work well in a team, and adaptability to tight deadlines. Join us at KONE, where we foster an innovative and collaborative work environment that values each individual's contributions. We prioritize employee engagement, encourage knowledge sharing, and uphold sustainability practices. Our ethical business standards promote mutual trust and recognition of good performance. By offering diverse experiences and growth opportunities, we aim to support your career and personal development while promoting a healthy work-life balance. To explore more about career opportunities at KONE, visit www.kone.com/careers.,
Posted 4 weeks ago
5.0 - 9.0 years
0 Lacs
karnataka
On-site
As a SOC Lead, you will be responsible for incident detection and response, utilizing tools such as Azure Sentinel SIEM, Splunk, and Microsoft Defender for Endpoint. Your primary tasks will involve investigating high-priority security incidents, determining root causes, and guiding the team in remediation efforts. Furthermore, you will be tasked with creating and refining custom detection rules in Azure Sentinel, monitoring alerts from Microsoft Defender for Endpoint to identify security threats, and documenting security incidents including timelines and outcomes. Your role will also involve collaborating with other SOC team members, IT teams, and external vendors to resolve incidents and provide mentorship to junior analysts. Additionally, you will be conducting forensic analysis on compromised systems, performing threat hunting activities, and contributing to security posture improvement by refining security procedures and optimizing Azure Sentinel and Microsoft Defender for Endpoint configurations. Staying up-to-date with the latest threat intelligence and security trends will be crucial to ensure that tools and strategies evolve with emerging threats. If you are passionate about cybersecurity and have experience in incident response, threat hunting, and security monitoring, we invite you to apply for this challenging and rewarding position in either Bangalore or Mumbai.,
Posted 1 month ago
5.0 - 9.0 years
0 Lacs
karnataka
On-site
Join our team as a Security Analyst in India, where you will play a crucial role in assessing, triaging, and proactively responding to security-related threats, incidents, and events. You will be tasked with defending our assets, information, and systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction. By collaborating with internal and external stakeholders, including third-party suppliers, you will ensure that incident response, user access, alert monitoring, root cause analysis, and scenario planning activities are carried out in accordance with standard operating procedures and to a high standard. This role is available at the associate vice president level. In this role, you will work across various domains, stakeholders, and specialists to anticipate and identify security events, incidents, and trends that could impact the bank, our customers, employees, or assets adversely. Your responsibilities will include contributing to security operations, conducting root cause analysis on security incidents, providing training and scenario planning, preparing reports and briefings, and developing response plans, procedures, and playbooks to enhance response capability. Moreover, you will proactively manage risks to achieve key security-related customer and compliance outcomes, participate in security operations such as production support, incident response, and on-call rotations, maintain security response processes, and ensure the delivery of security-related services align with expectations. Act swiftly in responding to customer queries and complaints, establish feedback loops to enhance service and response, and analyze large volumes of data to identify trends and causal factors. We are seeking an individual with a strong passion for cloud security and automation utilizing Agile and DevOps methodologies and promoting a shift-left culture that integrates security analysis into each CI/CD stage. The ideal candidate will have experience with Azure Cloud and security stack, including Defender, Azure Sentinel, and Azure Security Centre, automated security assessments, third-party security tools integration, and compliance standards like PCI-DSS. Additionally, you should possess expertise in security controls, the ability to communicate technical issues to various stakeholders, experience in penetration testing and vulnerability management, and an understanding of Agile methodologies gained through working in an Agile team.,
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture, and technology to become the best version of you. We are counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself and a better working world for all. As a CMS-TDR Senior at EY, you will work as a Senior Analyst within our cyber security team. Your role will involve assisting clients in detecting and responding to security incidents with the support of SIEM, EDR, and NSM solutions. Your key responsibilities will include: - Operational support using SIEM solutions (Splunk, Sentinel, CrowdStrike Falcon LogScale), EDR (CrowdStrike, Defender, Carbon Black), and NSM (Fidelis, ExtraHop) for multiple customers. - Specializing in second-level incident validation and detailed investigations. - Performing incident coordination and communication with clients to ensure effective containment, eradication, and recovery. - Providing SIEM support activities, including ad hoc reporting and basic troubleshooting. - Advising customers on best practices and use cases to achieve customer end-state requirements. - Providing near real-time analysis, investigating, reporting, remediating, coordinating, and tracking security-related activities for customers. Skills and attributes for success include: - Customer service orientation, meeting commitments, and seeking feedback for improvement. - Good knowledge of SIEM technologies such as Splunk, Azure Sentinel, CrowdStrike Falcon LogScale from a security analyst's perspective. - Troubleshooting issues associated with SIEM solutions. - Ability to work with minimal supervision. - Exposure to IoT/OT monitoring (Claroty, Nozomi Networks) is a plus. - Experience in security monitoring and cyber incident response. - Knowledge in ELK Stack, network monitoring technology platforms (Fidelis XPS, ExtraHop), and endpoint protection tools (Carbon Black, Tanium, CrowdStrike, Defender). To qualify for this role, you must have: - A B.Tech./B.E. degree with sound technical skills. - Ability to work in 24x7 shifts. - Strong command of verbal and written English. - Technical acumen and critical thinking abilities. - Strong interpersonal and presentation skills. - Minimum 3 years of hands-on experience in SIEM/EDR/NSM solutions. - Certification in any of the SIEM platforms. - Knowledge of RegEx, Perl scripting, and SQL query language. - Certifications such as CCSA, CEH, CISSP, GCIH, GIAC. Working at EY offers: - Inspiring and meaningful projects. - Education, coaching, and personal development opportunities. - Support, coaching, and feedback from engaging colleagues. - Opportunities for skills development and career progression. - Freedom and flexibility to shape your role according to your needs. EY is dedicated to building a better working world by creating long-term value for clients, people, and society and building trust in the capital markets. Our diverse teams across 150 countries provide trust through assurance and help clients grow, transform, and operate in various sectors. We ask better questions to find new answers for the complex issues facing our world today.,
Posted 1 month ago
10.0 - 15.0 years
11 - 15 Lacs
Pune, Maharashtra, India
On-site
Position Summary We are seeking a skilled Cloud Security Engineer to design, implement, and maintain secure architectures in AWS and Azure environments. The role focuses on risk assessment, IAM, container security (Kubernetes, Docker), compliance with standards like GDPR and ISO 27001, and collaboration with cross-functional teams to integrate security into cloud operations. The ideal candidate will bring strong technical skills, a deep understanding of cloud-native security tools, and leadership in secure cloud design. Key Responsibilities Design and implement secure AWS and Azure cloud architectures Integrate and manage tools like Azure Sentinel, Azure Active Directory, Microsoft 365 Defender, and AWS GuardDuty Configure AWS IAM, cloud firewalls, and other native security services Implement and enforce Zero Trust Security principles Ensure infrastructure compliance with industry standards (GDPR, ISO 27001, etc.) Conduct risk assessments and develop cloud threat mitigation strategies Optimize cloud architecture for cost efficiency, performance, and security Support security incident response and vulnerability management in cloud environments Collaborate with CloudOps and engineering teams to embed security by design Lead and contribute to audits and security reviews Basic Qualifications Bachelor's or Master's degree in Computer Science, Information Security, or a related field Hands-on experience with AWS and Azure security services Proficiency in Infrastructure as Code (Terraform, CloudFormation) Experience in container security using Kubernetes and Docker Deep understanding of IAM, network security, encryption protocols Familiarity with cloud compliance frameworks and standards (GDPR, ISO 27001) Soft Skills Excellent communication and collaboration skills Strong analytical and problem-solving capabilities Ability to lead or mentor junior team members Proactive mindset and detail-oriented
Posted 1 month ago
5.0 - 7.0 years
10 - 15 Lacs
Bengaluru
Hybrid
Greetings from Newwave Computing ! One of our esteemed clients is looking to hire a seasoned Microsoft Security Consultant with a minimum of 5 years of experience. . Role & responsibilities Implementation & Deployment: Lead end-to-end implementation of Microsoft Defender products (Defender for Endpoint, Identity, Office 365, Cloud Apps, and defender for cloud). Configure and deploy Azure Sentinel for SIEM/SOAR capabilities, including custom alert rules, automation playbooks, and threat hunting. Implement Microsoft Purview (Data Security & Compliance) solutions, including Data Loss Prevention (DLP), Endpoint DLP, Information Protection, and Insider Risk Management. Design and execute Microsoft 365 E5 Security implementations, covering Advanced Threat Protection, Identity & Access Management, Conditional Access Policies and Intune MAM/MDM. Integration & Optimization: Optimize security configurations for threat detection, automated remediation, and compliance reporting. Deliver workshops and training sessions for client teams on security operations and tool management. Preferred candidate profile Certifications: Microsoft Certified: SC-400, SC-200, SC-300, AZ-500 , or equivalent. (Optional) Technical Expertise: Hands-on experience deploying Microsoft Defender suite, Azure Sentinel, and M365 E5 Security . Proficiency in Microsoft Purview (DLP, Information Protection, Audit, eDiscovery) . Strong knowledge of Microsoft Entra ID (Azure AD), Conditional Access, and Intune . Experience with KQL (Kusto Query Language), PowerShell, and automation (Logic Apps, Playbooks) . Soft Skills: Excellent communication and client-facing consulting skills. Ability to translate technical concepts into business value. Strong problem-solving and analytical mindset. Interested candidates kindly send the updated resume to rugma.s@newwavecomputing.com
Posted 1 month ago
6.0 - 10.0 years
15 - 25 Lacs
Bengaluru
Work from Office
Job Title: Cybersecurity Vulnerability & Patch Management Engineer (Onsite PST Hours) Location: Bangalore, India Work Hours: 8:00 AM – 5:00 PM PST (India Time: 8:30 PM – 5:30 AM IST) Reports To: SecOps Leader, Cybersecurity (US-based) About the Role: We are seeking a skilled and proactive Vulnerability & Patch Management Engineer to join our offshore cybersecurity team supporting Rocket EMS. You will lead the end-to-end vulnerability management and patching program across global infrastructure. This is a strategic, hands-on role requiring expert knowledge in tools like TenableOne, Automox, CrowdStrike Falcon, and Azure security solutions. Key Responsibilities: Manage enterprise-wide vulnerability lifecycle using TenableOne Rapid response to zero-day threats with scripting via CrowdStrike RTR Execute patch deployment using Automox across OS and cloud workloads Develop PowerShell/Python scripts for automation and rollback procedures Perform Azure Sentinel threat hunting using KQL Lead weekly vulnerability/patch management meetings and prepare executive dashboards Collaborate with global IT, SecOps, DevOps, and Engineering teams Required Skills: 5+ years in enterprise patch and vulnerability management Hands-on experience with TenableOne , Automox , CrowdStrike Falcon Complete , Azure Sentinel , and KQL Proficient in PowerShell and/or Python Strong understanding of Azure Cloud security posture and incident response CISSP certification (mandatory) Preferred: Knowledge of Infrastructure-as-Code (Terraform/ARM) Experience in regulated industries or manufacturing Additional certifications: Azure Security Engineer, CrowdStrike Certified Please share your resume to Sirishad@ca-one.com
Posted 1 month ago
3.0 - 12.0 years
0 Lacs
karnataka
On-site
As an Azure Technical Project Manager, you will be responsible for managing data and analytics projects in the cloud environment. With a minimum of 12 years of IT experience, including at least 3 years in technical project management, you will bring a strong background in overseeing data engineering and data analytics initiatives. Your primary responsibilities will include overseeing migration projects, working with Azure, AWS, and managing data lake implementations. You will need to have hands-on experience in managing data science, analytics, and data engineering projects. Additionally, you should have a good understanding of Micro Service architecture and experience working as a scrum master in agile environments. Your role will involve close collaboration with clients to deliver cutting-edge solutions by leveraging your technical expertise. Strong communication, interpersonal, and leadership skills are essential for engaging with stakeholders and guiding project teams effectively. You should also possess analytical skills to interpret data, conduct statistical analysis, and support ongoing reporting and analysis activities. Furthermore, a deep understanding of cloud solutions, data architecture flow, ETL processing, analytical modeling, and consumption patterns is required. Your ability to articulate technical concepts to business leaders will be crucial in ensuring successful project delivery.,
Posted 1 month ago
4.0 - 6.0 years
14 - 20 Lacs
Gurugram, Manesar
Hybrid
Threat Protection Engineer | ACPL Must have Microsoft Threat Detection & Protection, Defender, and Cloud Security experience. Should be able to provide L3 support.its a 2 yrs bond with ACPL Company/Manesar location-Hybrid
Posted 1 month ago
3.0 - 8.0 years
3 - 12 Lacs
Chennai
Work from Office
Responsibilities: * Conduct threat analysis using SOC tools like QRadar & LogRhythm. * Collaborate with incident response team on security incidents. * Monitor network activity for suspicious behavior.
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |