Home
Jobs

271 Ceh Jobs - Page 8

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5 - 10 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Okta Identity Management Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:-Okta Workforce Identity Cloud (WIC) Administration:User Provisioning & Lifecycle Management:Administer and manage Okta Workforce Identity Cloud (WIC) for user provisioning, de-provisioning, and lifecycle management of internal employees and contractors.Design and implement user authentication flows, multi-factor authentication (MFA), Single Sign-On (SSO), and federated identity integrations to provide secure access to corporate applications.Access Management & Policy Enforcement:Configure and maintain access policies, including role-based access control (RBAC) and dynamic access policies based on user attributes and risk context.Implement Okta's Adaptive Authentication to assess risk levels and apply additional security controls based on user behavior.Integration:Integrate Okta WIC with on-premise and cloud-based enterprise applications (e.g., Office 365, Google Workspace, Salesforce, AWS) to enable seamless authentication and authorization.Ensure Okta integration with Active Directory (AD), LDAP, and other identity repositories to manage workforce access.Monitoring & Reporting:Monitor Okta's WIC platform for performance, security events, and access-related incidents.Generate reports on user activity, authentication logs, and security events to ensure compliance with internal and external regulations.Okta Customer Identity Solutions (CIS) Administration:Customer Identity Management:Administer and optimize Okta Customer Identity Solutions (CIS) for external customers, managing user registration, self-service access, and user authentication across web and mobile applications.Configure and customize customer-facing authentication flows, such as SSO, social logins (Facebook, Google, etc.), and multi-factor authentication (MFA).Customer Experience & Security:Collaborate with product and marketing teams to design a seamless, user-friendly registration and login experience for customers, while ensuring compliance with security and privacy standards.Implement adaptive authentication for customer identities to ensure secure and personalized access across applications and services.API & Developer Tools Integration:Leverage Okta APIs and developer tools to integrate Okta's Customer Identity capabilities with third-party services, such as customer relationship management (CRM) and marketing tools.Support customer-facing applications in scaling Okta-based authentication and user identity flows for optimal performance. Professional & Technical Skills: Must To Have Skills: Proficiency in Okta Identity Management Strong understanding of cloud security principles Experience with security architecture design Knowledge of identity and access management Hands-on experience with security tools and technologies Additional Information: The candidate should have a minimum of 5 years of experience in Okta Identity Management. This position is based at our Bengaluru office. A 15 years full time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply

3 - 8 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Saviynt Identity Platform Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities: Develop, configure, and customize the Saviynt IGA platform, including Identity Governance and Access Management features.Design and implement role-based access control (RBAC), access certifications, and policy enforcement in the Saviynt environment.Work with business and technical stakeholders to gather requirements and deliver IAM solutions that meet organizational needs.Configure and customize Saviynt's connectors to integrate with various enterprise applications, systems, and cloud platforms.Develop and implement identity workflows, including user provisioning and de-provisioning, role assignments, and access requests.Troubleshoot and resolve issues related to identity governance and access management in the Saviynt environment.Collaborate with the security and compliance teams to ensure that all IAM solutions adhere to security standards and regulatory requirements.Develop custom scripts, API integrations, and automated processes to streamline identity management tasks.Participate in designing and implementing audit logs and reports for compliance tracking and access reviews.Provide ongoing support and maintenance of Saviynt IGA implementations, including troubleshooting and performing software upgrades.Stay updated on industry trends in identity management, governance, and Saviynt platform updates to continuously enhance system features. Professional & Technical Skills: Must To Have Skills: Proficiency in Saviynt Identity Platform. Strong understanding of cloud security principles. Experience with implementing security controls in cloud environments. Knowledge of identity and access management concepts. Hands-on experience with security tools and technologies. Additional Information: The candidate should have a minimum of 3 years of experience in Saviynt Identity Platform. This position is based at our Bengaluru office. A 15 years full time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply

5 - 10 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities: Expected to be an SME Collaborate and manage the team to perform Responsible for team decisions Engage with multiple teams and contribute on key decisions Provide solutions to problems for their immediate team and across multiple teams Lead security assessments and provide recommendations Develop security architecture standards and guidelines Conduct security reviews and audits Professional & Technical Skills: Must To Have Skills: Proficiency in SailPoint IdentityIQ Strong understanding of cloud security principles Experience with security architecture design Knowledge of identity and access management Hands-on experience with security tools and technologies Additional Information: The candidate should have a minimum of 5 years of experience in SailPoint IdentityIQ This position is based at our Bengaluru office A 15 years full time education is required Qualification 15 years full time education

Posted 1 month ago

Apply

7 - 9 years

15 - 20 Lacs

Mohali

Work from Office

Naukri logo

Role & responsibilities SOC Operations: Monitor and analyze security events across networks, systems, and endpoints. Investigate, escalate, and respond to security incidents in a timely manner. Collaborate with the SOC team to enhance incident response procedures. Microsoft Security Solutions: Manage and maintain Microsoft Defender suite of tools, Azure Sentinel, and Microsoft Services. Implement Microsoft security configurations and policies to protect digital environments. Conduct threat hunting and data analysis using Microsoft Sentinel, KQL, and other Microsoft tools. Ensure compliance with security standards and best practices within Microsoft environments. Threat Detection and Incident Response: Conduct root cause analysis for security incidents and create actionable remediation plans. Support threat intelligence and vulnerability management programs to proactively reduce risk. Automate response and remediation workflows using Microsofts security automation tools. Security Engineering and Improvements: Develop and fine-tune security alerts and rules to improve threat detection. Collaborate with cross-functional teams to assess and improve security architecture. Assist in the design and implementation of secure cloud and hybrid environments with a focus on Microsoft platforms. Documentation and Reporting: Maintain up-to-date documentation of security procedures and incident reports. Generate reports on security incidents, SOC performance, and security posture improvements. Provide recommendations to improve security operations and incident response Preferred candidate profile 7+ years of professional experience in Security Operations Centre (SOC) or 5+ years of experience cybersecurity engineering role Strong hands-on experience with Microsoft security products, including: Microsoft Defender for Endpoint, Azure Sentinel, and Microsoft 365 Defender. Knowledge of Kusto Query Language (KQL) for threat hunting and data analysis. Familiarity with Microsoft security compliance frameworks and configurations. Act as an escalation point for high and critical severity security incidents and conduct thorough investigations to determine potential impact and understand extend of compromise. Practical knowledge of SIEM platforms, preferably Azure Sentinel, and incident response processes. Hunt for Indicators of Compromise (IOCs) and signs of Advanced Persistent Threats (APTs) within the Clients environment. Analyse attack patterns, Tools, Techniques and Procedures (TTPs) to identify methods of attacks and attack life cycle. Experience with a variety of security technologies, including firewalls, intrusion detection systems, EDR, XDR, SASE, SSE, Email Security Gateways, IDAM, and vulnerability scanners Experience with security best practices, including incident response, risk assessments, and security controls. Strong analytical and problem-solving skills with the ability to work in a fast-paced environment. Perks and benefits Perks and benefits Oreta takes pride in providing a service of excellence to our customers and looking after our employees who enable our business to succeed. The successful applicant will enjoy working in a collaborative environment in Chandigarh, India with a friendly and highly driven people (the Oreos), where ideas are always welcome and ongoing training and development is strongly encouraged. The renumeration will be negotiated and based on the relevant skills and experience of the successful applicant. If you are interested in a long-term career with potential to develop and grow with the business and are available to start immediately, then we look forward to hearing from you.

Posted 2 months ago

Apply

10 - 15 years

30 - 37 Lacs

Mohali

Work from Office

Naukri logo

We are seeking a highly experienced and motivated Senior SOC Manager to lead our Security Operations Center (SOC) team. The Senior SOC Manager will be responsible for managing the day-to-day operations of the SOC, overseeing security monitoring, incident response, threat intelligence activities, and ensuring the organisation's information assets are protected. The ideal candidate will have a strong background in cybersecurity operations, team leadership, and incident management, with a strategic mindset and the ability to drive continuous improvement. Role & responsibilities 1. Leadership and Management: Team Leadership : Lead, mentor, Build and manage a team of SOC analysts, incident responders, and threat hunters. Foster a culture of continuous improvement, accountability, and professional development within the SOC team. Conduct regular performance reviews and provide constructive feedback to team members. Operational Management : Develop and maintain SOC processes, procedures, and documentation to ensure efficient and effective operations. Ensure the SOC team operates 24/7, providing continuous coverage for security monitoring and incident response. Coordinate shift schedules, resource allocation, and ensure adequate staffing levels. Monitoring and Detection : Oversee the monitoring of security events and alerts generated by various security tools and technologies. Ensure the timely identification, analysis, and escalation of potential security incidents. Develop and fine-tune detection rules, signatures, and use cases to enhance threat detection capabilities. Incident Response : Coordinate and manage the end-to-end incident response process, including detection, analysis, containment, eradication, and recovery. Develop, implement, and maintain incident response playbooks, runbooks, and standard operating procedures (SOPs). Lead post-incident reviews, including root cause analysis and lessons learned, to improve incident response processes. Threat Intelligence Integration : Ensure the SOC team stays up-to-date with the latest threat intelligence and cyber threat landscape. Integrate threat intelligence into SOC operations to enhance detection and response capabilities. Collaborate with threat intelligence analysts to gather, analyse, and disseminate actionable intelligence. Threat Hunting : Develop and lead proactive threat hunting activities to identify and mitigate potential threats before they impact the organisation. Utilise advanced analytical and forensic tools to uncover hidden threats and malicious activities. Internal Collaboration : Work closely with other IT and security teams to ensure seamless integration of security operations. Collaborate with the IT infrastructure team to ensure security controls are properly implemented and maintained. Engage with application development teams to ensure secure coding practices and application security measures. Stakeholder Communication : Communicate effectively with senior management, providing regular updates on SOC activities, incidents, and overall security posture. Develop and deliver regular SOC performance and incident reports to leadership. Serve as the primary point of contact for escalated security incidents and external communications. Process Enhancement : Identify areas for improvement within the SOC and implement enhancements to processes, tools, and technologies. Conduct regular SOC assessments and readiness exercises to ensure operational effectiveness. Stay informed about the latest security trends, technologies, and best practices. Metrics and Reporting : Develop and track key performance indicators (KPIs) and metrics to measure the effectiveness and efficiency of SOC operations. Provide detailed reporting on SOC activities, incidents, and trends to senior management and other stakeholders. Monthly CISO reports Regulatory Compliance : Ensure SOC operations comply with relevant regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI-DSS). Support audit activities and provide necessary documentation and evidence for compliance audits. Collaborate with the compliance team to address regulatory changes and ensure ongoing compliance. Employee Training : Develop and deliver regular cybersecurity training programs for SOC staff to enhance their skills and knowledge. Promote security awareness and best practices across the organisation through training and awareness programs. Conduct phishing simulations and other awareness activities to test and improve employee readiness. Professional Development : Encourage SOC team members to pursue relevant certifications and professional development opportunities. Provide guidance and support for career development and advancement within the SOC team. Education and Experience: Education : Bachelor's degree in Computer Science, Information Security, or a related field. Advanced degree preferred. Relevant certifications such as CISSP, CISM, GIAC, or equivalent are highly desirable. Experience : A minimum of 10-12 years of experience in cybersecurity, with at least 7-8 years in a SOC management or leadership role. Proven track record of managing and leading high-performing security teams in a dynamic and fast-paced environment. Security Operations : Strong understanding of security monitoring and incident response processes and technologies. Experience with SIEM platforms (e.g., Splunk, ArcSight, QRadar) and other security tools. Knowledge of threat intelligence and analysis methodologies. Technical Expertise : Familiarity with regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI-DSS). Proficiency in using advanced analytical and forensic tools for threat detection and incident analysis. Understanding of network security, endpoint security, application security, and cloud security principles. Leadership and Management : Excellent leadership, team management, and mentoring skills. Strong analytical and problem-solving abilities. Effective communication and interpersonal skills, with the ability to interact with technical and non-technical stakeholders. Strategic Thinking : Ability to think strategically and develop long-term plans for improving SOC operations and overall security posture. Demonstrated ability to drive continuous improvement and foster a culture of innovation. This position may require occasional on-call support and the ability to respond to security incidents outside of regular business hours. Hybrid work environment with a combination of on-site and remote work. Perks and Benefits Perks and benefits Oreta takes pride in providing a service of excellence to our customers and looking after our employees who enable our business to succeed. The successful applicant will enjoy working in a collaborative environment in Chandigarh, India with a friendly and highly driven people (the Oreos), where ideas are always welcome and ongoing training and development is strongly encouraged. The renumeration will be negotiated and based on the relevant skills and experience of the successful applicant. If you are interested in a long-term career with potential to develop and grow with the business and are available to start immediately, then we look forward to hearing from you.

Posted 2 months ago

Apply

10 - 12 years

30 - 35 Lacs

Mohali

Work from Office

Naukri logo

Job description We are seeking a highly experienced and motivated Senior SOC Manager to lead our Security Operations Center (SOC) team. The Senior SOC Manager will be responsible for managing the day-to-day operations of the SOC, overseeing security monitoring, incident response, threat intelligence activities, and ensuring the organisation's information assets are protected. The ideal candidate will have a strong background in cybersecurity operations, team leadership, and incident management, with a strategic mindset and the ability to drive continuous improvement. Role & responsibilities Lead the analysis and investigation of information security events (IDS/DLP/SIEM/etc.) in a 24x7 SOC environment to immediately detect, verify, and respond swiftly to cyber threats, and remove false positive. Serve as a technical point of escalation. Responsible for investigating incidents, analysing attack methods, researching new defence techniques and tools, developing security policy, and documenting procedures for SOC. Maintain baselines for secure configuration and operations. Malware analysis and other attack analysis to extract indicators of compromise. Perform data security event correlation between various systems. Prepare reports, summaries, and other forms of communication that may be both internal and client facing. Ensure compliance to SLA, process adherence and process improvisation to achieve operational objectives. Develop and deploy processes to ensure efficient and effective security operations. Provide guidance and mentorship to other security analysts and junior members of the security team. Keep up-to-date with the latest trends and best practice developments in the field of cybersecurity and SIEM tools Values And Behaiviours Have Fun We take time and effort to make the workplace more enjoyable, we reward and celebrate success, our customers and partners see us as human. Move with Velocity We evolve and grow to stay ahead of the curve, we make decisions quickly and often, we are decisive and show initiative, we are outcome oriented and we question everything to determine what speeds or impedes the desired outcome. Go Further We go beyond delivering what works, we discover delights and help customers transform their business, we have a passion for learning, we have a desire to question the norms, and we are curious to step out of our comfort zones. Thrive Together We are high functioning, supportive and inclusive, collaboration is in our DNA, we step up to assist our team members, and we work as a team to achieve the right outcome. Skills and Capabilities At least 7 years of experience working in a SOC environment, with a focus on using multiple SIEM tools. Strong understanding of security operations and incident response processes Hands-on experience with at least two major SIEM tools (e.g., MS Sentinel Rapid7, Exabeam Splunk, ArcSight, QRadar,) Strong analytical and problem-solving skills Excellent communication and interpersonal skills Ability to work in a fast-paced, dynamic environment Qualifications B-Tech

Posted 2 months ago

Apply

10 - 15 years

25 - 40 Lacs

Chandigarh

Work from Office

Naukri logo

We are seeking a highly experienced and motivated Senior SOC Manager to lead our Security Operations Center (SOC) team. The Senior SOC Manager will be responsible for managing the day-to-day operations of the SOC, overseeing security monitoring, incident response, threat intelligence activities, and ensuring the organisation's information assets are protected. The ideal candidate will have a strong background in cybersecurity operations, team leadership, and incident management, with a strategic mindset and the ability to drive continuous improvement. Role & responsibilities 1. Leadership and Management: Team Leadership : Lead, mentor, Build and manage a team of SOC analysts, incident responders, and threat hunters. Foster a culture of continuous improvement, accountability, and professional development within the SOC team. Conduct regular performance reviews and provide constructive feedback to team members. Operational Management : Develop and maintain SOC processes, procedures, and documentation to ensure efficient and effective operations. Ensure the SOC team operates 24/7, providing continuous coverage for security monitoring and incident response. Coordinate shift schedules, resource allocation, and ensure adequate staffing levels. 2. Security Monitoring and Incident Response: Monitoring and Detection : Oversee the monitoring of security events and alerts generated by various security tools and technologies. Ensure the timely identification, analysis, and escalation of potential security incidents. Develop and fine-tune detection rules, signatures, and use cases to enhance threat detection capabilities. Incident Response : Coordinate and manage the end-to-end incident response process, including detection, analysis, containment, eradication, and recovery. Develop, implement, and maintain incident response playbooks, runbooks, and standard operating procedures (SOPs). Lead post-incident reviews, including root cause analysis and lessons learned, to improve incident response processes. 3. Threat Intelligence and Analysis: Threat Intelligence Integration : Ensure the SOC team stays up-to-date with the latest threat intelligence and cyber threat landscape. Integrate threat intelligence into SOC operations to enhance detection and response capabilities. Collaborate with threat intelligence analysts to gather, analyse, and disseminate actionable intelligence. Threat Hunting : Develop and lead proactive threat hunting activities to identify and mitigate potential threats before they impact the organisation. Utilise advanced analytical and forensic tools to uncover hidden threats and malicious activities. 4. Collaboration and Communication: Internal Collaboration : Work closely with other IT and security teams to ensure seamless integration of security operations. Collaborate with the IT infrastructure team to ensure security controls are properly implemented and maintained. Engage with application development teams to ensure secure coding practices and application security measures. Stakeholder Communication : Communicate effectively with senior management, providing regular updates on SOC activities, incidents, and overall security posture. Develop and deliver regular SOC performance and incident reports to leadership. Serve as the primary point of contact for escalated security incidents and external communications. 5. Continuous Improvement: Process Enhancement : Identify areas for improvement within the SOC and implement enhancements to processes, tools, and technologies. Conduct regular SOC assessments and readiness exercises to ensure operational effectiveness. Stay informed about the latest security trends, technologies, and best practices. Metrics and Reporting : Develop and track key performance indicators (KPIs) and metrics to measure the effectiveness and efficiency of SOC operations. Provide detailed reporting on SOC activities, incidents, and trends to senior management and other stakeholders. Monthly CISO reports 6. Compliance and Audit: Regulatory Compliance : Ensure SOC operations comply with relevant regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI-DSS). Support audit activities and provide necessary documentation and evidence for compliance audits. Collaborate with the compliance team to address regulatory changes and ensure ongoing compliance. 7. Training and Awareness: Employee Training : Develop and deliver regular cybersecurity training programs for SOC staff to enhance their skills and knowledge. Promote security awareness and best practices across the organisation through training and awareness programs. Conduct phishing simulations and other awareness activities to test and improve employee readiness. Professional Development : Encourage SOC team members to pursue relevant certifications and professional development opportunities. Provide guidance and support for career development and advancement within the SOC team. Preferred candidate profile Education and Experience: Education : Bachelor's degree in Computer Science, Information Security, or a related field. Advanced degree preferred. Relevant certifications such as CISSP, CISM, GIAC, or equivalent are highly desirable. Experience : A minimum of 10-12 years of experience in cybersecurity, with at least 7-8 years in a SOC management or leadership role. Proven track record of managing and leading high-performing security teams in a dynamic and fast-paced environment. Technical Skills: Security Operations : Strong understanding of security monitoring and incident response processes and technologies. Experience with SIEM platforms (e.g., Splunk, ArcSight, QRadar) and other security tools. Knowledge of threat intelligence and analysis methodologies. Technical Expertise : Familiarity with regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI-DSS). Proficiency in using advanced analytical and forensic tools for threat detection and incident analysis. Understanding of network security, endpoint security, application security, and cloud security principles. Soft Skills: Leadership and Management : Excellent leadership, team management, and mentoring skills. Strong analytical and problem-solving abilities. Effective communication and interpersonal skills, with the ability to interact with technical and non-technical stakeholders. Strategic Thinking : Ability to think strategically and develop long-term plans for improving SOC operations and overall security posture. Demonstrated ability to drive continuous improvement and foster a culture of innovation. Work Environment: This position may require occasional on-call support and the ability to respond to security incidents outside of regular business hours. Hybrid work environment with a combination of on-site and remote work. Perks and benefits Oreta takes pride in providing a service of excellence to our customers and looking after our employees who enable our business to succeed. The successful applicant will enjoy working in a collaborative environment in Chandigarh, India with a friendly and highly driven people (the Oreos), where ideas are always welcome and ongoing training and development is strongly encouraged. The renumeration will be negotiated and based on the relevant skills and experience of the successful applicant. If you are interested in a long-term career with potential to develop and grow with the business and are available to start immediately, then we look forward to hearing from you.

Posted 2 months ago

Apply

7 - 9 years

15 - 20 Lacs

Chandigarh

Work from Office

Naukri logo

Role & responsibilities SOC Operations: Monitor and analyze security events across networks, systems, and endpoints. Investigate, escalate, and respond to security incidents in a timely manner. Collaborate with the SOC team to enhance incident response procedures. Microsoft Security Solutions: Manage and maintain Microsoft Defender suite of tools, Azure Sentinel, and Microsoft Services. Implement Microsoft security configurations and policies to protect digital environments. Conduct threat hunting and data analysis using Microsoft Sentinel, KQL, and other Microsoft tools. Ensure compliance with security standards and best practices within Microsoft environments. Threat Detection and Incident Response: Conduct root cause analysis for security incidents and create actionable remediation plans. Support threat intelligence and vulnerability management programs to proactively reduce risk. Automate response and remediation workflows using Microsofts security automation tools. Security Engineering and Improvements: Develop and fine-tune security alerts and rules to improve threat detection. Collaborate with cross-functional teams to assess and improve security architecture. Assist in the design and implementation of secure cloud and hybrid environments with a focus on Microsoft platforms. Documentation and Reporting: Maintain up-to-date documentation of security procedures and incident reports. Generate reports on security incidents, SOC performance, and security posture improvements. Provide recommendations to improve security operations and incident response Preferred candidate profile 7+ years of professional experience in Security Operations Centre (SOC) or 5+ years of experience cybersecurity engineering role Strong hands-on experience with Microsoft security products, including: Microsoft Defender for Endpoint, Azure Sentinel, and Microsoft 365 Defender. Knowledge of Kusto Query Language (KQL) for threat hunting and data analysis. Familiarity with Microsoft security compliance frameworks and configurations. Act as an escalation point for high and critical severity security incidents and conduct thorough investigations to determine potential impact and understand extend of compromise. Practical knowledge of SIEM platforms, preferably Azure Sentinel, and incident response processes. Hunt for Indicators of Compromise (IOCs) and signs of Advanced Persistent Threats (APTs) within the Clients environment. Analyse attack patterns, Tools, Techniques and Procedures (TTPs) to identify methods of attacks and attack life cycle. Experience with a variety of security technologies, including firewalls, intrusion detection systems, EDR, XDR, SASE, SSE, Email Security Gateways, IDAM, and vulnerability scanners Experience with security best practices, including incident response, risk assessments, and security controls. Strong analytical and problem-solving skills with the ability to work in a fast-paced environment. Perks and benefits Perks and benefits Oreta takes pride in providing a service of excellence to our customers and looking after our employees who enable our business to succeed. The successful applicant will enjoy working in a collaborative environment in Chandigarh, India with a friendly and highly driven people (the Oreos), where ideas are always welcome and ongoing training and development is strongly encouraged. The renumeration will be negotiated and based on the relevant skills and experience of the successful applicant. If you are interested in a long-term career with potential to develop and grow with the business and are available to start immediately, then we look forward to hearing from you.

Posted 2 months ago

Apply

10 - 15 years

30 - 37 Lacs

Chandigarh

Work from Office

Naukri logo

We are seeking a highly experienced and motivated Senior SOC Manager to lead our Security Operations Center (SOC) team. The Senior SOC Manager will be responsible for managing the day-to-day operations of the SOC, overseeing security monitoring, incident response, threat intelligence activities, and ensuring the organisation's information assets are protected. The ideal candidate will have a strong background in cybersecurity operations, team leadership, and incident management, with a strategic mindset and the ability to drive continuous improvement. Role & responsibilities 1. Leadership and Management: Team Leadership : Lead, mentor, Build and manage a team of SOC analysts, incident responders, and threat hunters. Foster a culture of continuous improvement, accountability, and professional development within the SOC team. Conduct regular performance reviews and provide constructive feedback to team members. Operational Management : Develop and maintain SOC processes, procedures, and documentation to ensure efficient and effective operations. Ensure the SOC team operates 24/7, providing continuous coverage for security monitoring and incident response. Coordinate shift schedules, resource allocation, and ensure adequate staffing levels. Monitoring and Detection : Oversee the monitoring of security events and alerts generated by various security tools and technologies. Ensure the timely identification, analysis, and escalation of potential security incidents. Develop and fine-tune detection rules, signatures, and use cases to enhance threat detection capabilities. Incident Response : Coordinate and manage the end-to-end incident response process, including detection, analysis, containment, eradication, and recovery. Develop, implement, and maintain incident response playbooks, runbooks, and standard operating procedures (SOPs). Lead post-incident reviews, including root cause analysis and lessons learned, to improve incident response processes. Threat Intelligence Integration : Ensure the SOC team stays up-to-date with the latest threat intelligence and cyber threat landscape. Integrate threat intelligence into SOC operations to enhance detection and response capabilities. Collaborate with threat intelligence analysts to gather, analyse, and disseminate actionable intelligence. Threat Hunting : Develop and lead proactive threat hunting activities to identify and mitigate potential threats before they impact the organisation. Utilise advanced analytical and forensic tools to uncover hidden threats and malicious activities. Internal Collaboration : Work closely with other IT and security teams to ensure seamless integration of security operations. Collaborate with the IT infrastructure team to ensure security controls are properly implemented and maintained. Engage with application development teams to ensure secure coding practices and application security measures. Stakeholder Communication : Communicate effectively with senior management, providing regular updates on SOC activities, incidents, and overall security posture. Develop and deliver regular SOC performance and incident reports to leadership. Serve as the primary point of contact for escalated security incidents and external communications. Process Enhancement : Identify areas for improvement within the SOC and implement enhancements to processes, tools, and technologies. Conduct regular SOC assessments and readiness exercises to ensure operational effectiveness. Stay informed about the latest security trends, technologies, and best practices. Metrics and Reporting : Develop and track key performance indicators (KPIs) and metrics to measure the effectiveness and efficiency of SOC operations. Provide detailed reporting on SOC activities, incidents, and trends to senior management and other stakeholders. Monthly CISO reports Regulatory Compliance : Ensure SOC operations comply with relevant regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI-DSS). Support audit activities and provide necessary documentation and evidence for compliance audits. Collaborate with the compliance team to address regulatory changes and ensure ongoing compliance. Employee Training : Develop and deliver regular cybersecurity training programs for SOC staff to enhance their skills and knowledge. Promote security awareness and best practices across the organisation through training and awareness programs. Conduct phishing simulations and other awareness activities to test and improve employee readiness. Professional Development : Encourage SOC team members to pursue relevant certifications and professional development opportunities. Provide guidance and support for career development and advancement within the SOC team. Education and Experience: Education : Bachelor's degree in Computer Science, Information Security, or a related field. Advanced degree preferred. Relevant certifications such as CISSP, CISM, GIAC, or equivalent are highly desirable. Experience : A minimum of 10-12 years of experience in cybersecurity, with at least 7-8 years in a SOC management or leadership role. Proven track record of managing and leading high-performing security teams in a dynamic and fast-paced environment. Security Operations : Strong understanding of security monitoring and incident response processes and technologies. Experience with SIEM platforms (e.g., Splunk, ArcSight, QRadar) and other security tools. Knowledge of threat intelligence and analysis methodologies. Technical Expertise : Familiarity with regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI-DSS). Proficiency in using advanced analytical and forensic tools for threat detection and incident analysis. Understanding of network security, endpoint security, application security, and cloud security principles. Leadership and Management : Excellent leadership, team management, and mentoring skills. Strong analytical and problem-solving abilities. Effective communication and interpersonal skills, with the ability to interact with technical and non-technical stakeholders. Strategic Thinking : Ability to think strategically and develop long-term plans for improving SOC operations and overall security posture. Demonstrated ability to drive continuous improvement and foster a culture of innovation. This position may require occasional on-call support and the ability to respond to security incidents outside of regular business hours. Hybrid work environment with a combination of on-site and remote work. Perks and Benefits Perks and benefits Oreta takes pride in providing a service of excellence to our customers and looking after our employees who enable our business to succeed. The successful applicant will enjoy working in a collaborative environment in Chandigarh, India with a friendly and highly driven people (the Oreos), where ideas are always welcome and ongoing training and development is strongly encouraged. The renumeration will be negotiated and based on the relevant skills and experience of the successful applicant. If you are interested in a long-term career with potential to develop and grow with the business and are available to start immediately, then we look forward to hearing from you.

Posted 2 months ago

Apply

10 - 12 years

30 - 35 Lacs

Chandigarh

Work from Office

Naukri logo

Job description We are seeking a highly experienced and motivated Senior SOC Manager to lead our Security Operations Center (SOC) team. The Senior SOC Manager will be responsible for managing the day-to-day operations of the SOC, overseeing security monitoring, incident response, threat intelligence activities, and ensuring the organisation's information assets are protected. The ideal candidate will have a strong background in cybersecurity operations, team leadership, and incident management, with a strategic mindset and the ability to drive continuous improvement. Role & responsibilities Lead the analysis and investigation of information security events (IDS/DLP/SIEM/etc.) in a 24x7 SOC environment to immediately detect, verify, and respond swiftly to cyber threats, and remove false positive. Serve as a technical point of escalation. Responsible for investigating incidents, analysing attack methods, researching new defence techniques and tools, developing security policy, and documenting procedures for SOC. Maintain baselines for secure configuration and operations. Malware analysis and other attack analysis to extract indicators of compromise. Perform data security event correlation between various systems. Prepare reports, summaries, and other forms of communication that may be both internal and client facing. Ensure compliance to SLA, process adherence and process improvisation to achieve operational objectives. Develop and deploy processes to ensure efficient and effective security operations. Provide guidance and mentorship to other security analysts and junior members of the security team. Keep up-to-date with the latest trends and best practice developments in the field of cybersecurity and SIEM tools Values And Behaiviours Have Fun We take time and effort to make the workplace more enjoyable, we reward and celebrate success, our customers and partners see us as human. Move with Velocity We evolve and grow to stay ahead of the curve, we make decisions quickly and often, we are decisive and show initiative, we are outcome oriented and we question everything to determine what speeds or impedes the desired outcome. Go Further We go beyond delivering what works, we discover delights and help customers transform their business, we have a passion for learning, we have a desire to question the norms, and we are curious to step out of our comfort zones. Thrive Together We are high functioning, supportive and inclusive, collaboration is in our DNA, we step up to assist our team members, and we work as a team to achieve the right outcome. Skills and Capabilities At least 7 years of experience working in a SOC environment, with a focus on using multiple SIEM tools. Strong understanding of security operations and incident response processes Hands-on experience with at least two major SIEM tools (e.g., MS Sentinel Rapid7, Exabeam Splunk, ArcSight, QRadar,) Strong analytical and problem-solving skills Excellent communication and interpersonal skills Ability to work in a fast-paced, dynamic environment Qualifications B-Tech

Posted 2 months ago

Apply

1 - 5 years

4 - 8 Lacs

Kanpur

Work from Office

Naukri logo

Description We are seeking a dedicated and skilled Associate Analyst to join our Security Team. This role is ideal for someone passionate about cybersecurity, with a strong foundation in penetration testing and a good grasp of programming languages. The successful candidate will be part of a dynamic team responsible for identifying, assessing, and mitigating security vulnerabilities within our IT infrastructure. Responsibilities Conduct penetration tests and security assessments for network, web-based applications, and operating systems. Work with the cybersecurity team to simulate attacks on systems, networks, and applications to identify and exploit vulnerabilities. Develop custom scripts or tools in Python and C++ to automate testing and exploit vulnerabilities. Analyze and evaluate system vulnerabilities and potential security threats. Provide recommendations and solutions for improving our security posture. Document findings and prepare reports detailing the results and methodologies of tests. Collaborate with other team members to refine security strategies and update the security infrastructure as necessary. Stay updated with the latest security news, techniques, and tools related to penetration testing and ethical hacking. Eligibility Bachelors degree in Computer Science, Information Security, or a related field. 2-3 years of experience in cybersecurity, specifically in penetration testing and red team operations. Strong programming skills in Python and C++. Knowledge of other scripting languages is a plus. Profound understanding of Linux environments and their subsystems. Familiarity with network protocols, encryption techniques, and intrusion detection systems. Excellent problem-solving skills and ability to think like both an attacker and a defender. Strong communication skills and ability to document and explain technical details clearly. Desired Eligibility Certifications such as OSCP, CEH, or related are highly regarded. Experience with other operating systems like Windows or macOS is beneficial. A proactive approach and eagerness to learn new technologies and testing techniques. Benefits: Competitive salary and comprehensive health benefits. Opportunities for professional growth and advancement. Access to the latest tools and technologies. Supportive and collaborative work environment. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph.

Posted 2 months ago

Apply

3 - 5 years

5 - 7 Lacs

Bengaluru

Work from Office

Naukri logo

Youll make a difference by You work in engineering for our international locomotive projects. In this interesting environment, you interact with engineers from various disciplines. As a Cybersecurity / IT Security Expert (m/f/d), you are responsible for carrying out the product and solution security process. You specify and maintain security requirements. Furthermore, you support the fulfillment of security standards and regulations. You create a security architecture for locomotives or products as part of a team. Additionally, you coordinate requirements from suppliers and customers with security experts. You implement concepts for securing and protecting locomotives and provide technical support for the implementation of IT security. You develop software for diagnostics (as well as security functions), conduct security reviews, and harden critical components (secure hardening). Desired Skills: Education: Bachelor's degree in Cybersecurity, Computer Science, Electrical Engineering, or a related field. A master's degree is a plus. Experience: 3-5 years of experience in cybersecurity engineering, preferably in the transportation or industrial control systems (ICS) sectors. Experience with rolling stock systems or other transportation technologies is highly desirable. In addition, you have gained initial experience in IT security and have acquired knowledge of IT security technologies and concepts. You have good programming skills and ideally good Linux knowledge. You also stand out with experience in the development of embedded systems. Additionally, you score points with expertise in industrial communication and tools for secure testing (e.g., Nessus). If you also have knowledge of relevant standards such as IEC 62443 and a CISSP certification, your application is very welcome Skills & Competencies: Strong knowledge of cybersecurity principles, risk management, and threat analysis. Proficiency with cybersecurity tools and technologies used for monitoring, detection, and incident response. Familiarity with cybersecurity standards and regulations such as IEC 62443, ISO 27001, NIST, etc. Excellent problem-solving and analytical skills. Strong communication skills, with the ability to explain complex technical concepts to non-technical stakeholders. Certifications: Relevant certifications such as CISSP, CISM, CEH, or GIAC are preferred.

Posted 2 months ago

Apply

4 - 6 years

9 - 12 Lacs

Gurgaon

Work from Office

Naukri logo

4+ years of exp in Security Analyst with ISMS Framework.Hands on exp with security monitoring, vulnerability mgt, penetration testing tools & incident response.Excellent exp in ISMS process (ISO 27001).Exp in network protocols (TCP/IP,DNS,HTTP, etc.) Required Candidate profile Maintain & manage security tools(e.g.Next gen AV,EDR,SIEM & Network protocol).Compliance with security standards & frameworks(e.g.,ISO 27001).Certified (Optional)-CEH,CISM,ISO 27001:2022 Lead Auditor.

Posted 2 months ago

Apply

1 - 6 years

3 - 7 Lacs

Hyderabad

Work from Office

Naukri logo

ABOUT AMGEN Amgen harnesses the best of biology and technology to fight the world’s toughest diseases, and make people’s lives easier, fuller and longer. We discover, develop, manufacture and deliver innovative medicines to help millions of patients. Amgen helped establish the biotechnology industry more than 40 years ago and remains on the cutting-edge of innovation, using technology and human genetic data to push beyond what’s known today. Role Description The SOC Tier 2 Analyst serves as the primary escalation point for the Tier 1 SOC team, responsible for advanced threat detection, investigation, and incident response coordination. This role acts as a technical lead, ensuring that security incidents are properly triaged, investigated, and remediated while continuously improving security operations processes. The SOC Tier 2 Analyst plays a critical role in cybersecurity defense, supporting real-time monitoring, forensic analysis, and threat hunting. They will assist incident responders across all lifecycle phases, from detection to post-incident reviews, and contribute to SOC process optimizations. Roles & Responsibilities: Act as the primary escalation point for SOC Tier 1 analysts, providing technical expertise and guidance in incident handling. Perform deep-dive analysis of security events, leveraging SIEM, EDR, IDS/IPS, and other security tools. Identify common attack techniques (MITRE ATT&CK framework) and investigate anomalies to detect advanced persistent threats (APTs). Assist in security incident response, leading containment, eradication, and recovery efforts. Conduct artifact analysis to determine the root cause and scope of security incidents. Collaborate with Threat Intelligence and Threat Hunting teams to improve detection rules and incident response playbooks. Develop and refine SOC standard operating procedures (SOPs) to enhance security event triage and response. Work with engineering teams to fine-tune security controls and improve overall SOC efficiency. Mentor and train Tier 1 analysts to improve SOC maturity and ensure effective knowledge transfer. Support security audits, compliance initiatives, and reporting efforts as required. Basic Qualifications and Experience: Master’s degree in Information Technology or Cybersecurity OR Bachelor’s degree with 1 year of experience in Security Operations or related field OR Diploma with 2 years of experience in Security Operations or a related field Functional Skills: Must-Have Skills: Strong understanding of SOC operations, including event triage, escalation, and investigation. Experience analyzing cybersecurity threats and understanding attacker TTPs (Tactics, Techniques, and Procedures). Proficiency in security tools such as SIEM (Splunk, QRadar, Sentinel), EDR (CrowdStrike, Defender ATP), IDS/IPS, and firewall logs. Experience in incident response across all phases (detection, containment, eradication, recovery). Knowledge of Windows and Linux security, including log analysis, PowerShell, and Bash scripting. Good-to-Have Skills: Experience in 24/7 SOC operations and shift leadership. Knowledge of forensic tools (Volatility, Autopsy, FTK) and malware analysis techniques. Understanding of cloud security monitoring (AWS, Azure, GCP). Familiarity with MITRE ATT&CK, NIST Cybersecurity Framework, and CIS controls. Threat hunting experience to proactively detect unknown threats. Professional Certifications: CompTIA Security+ (preferred) CEH (preferred) GSEC (preferred) GCFA (preferred) MTA Security Fundamentals (preferred) CISSP (preferred) Soft Skills: Strong communication and collaboration skills, particularly when working with global teams. Ability to manage and prioritize tasks effectively in a high-pressure environment. Critical thinking and problem-solving abilities, especially in incident response situations. A commitment to continuous learning and knowledge sharing. EQUAL OPPORTUNITY STATEMENT Amgen is an Equal Opportunity employer and will consider you without regard to your race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, or disability status. We will ensure that individuals with disabilities are provided with reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. Apply now for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.

Posted 2 months ago

Apply

3 - 5 years

5 - 7 Lacs

Noida

Work from Office

Naukri logo

We are looking for a self-motivated Senior Cybersecurity Analyst to join the R1 Cybersecurity Operations Team. We have a relentless focus on driving results for our customers and enabling them to invest more into patient care; in turn, this allows us to continue to grow our company and your career. The successful candidate must be well-versed in security operations, cyber security tools, intrusion detection, and secured networks. They will serve as an expert and be responsible for providing network and security operations technical analysis, assessment, and recommendations in the areas of real-time security situational awareness, operational network system and applications systems security monitoring. Responsibilities: Monitor various security tools to identify potential incidents, network intrusions, and malware events, etc., to ensure the confidentiality, integrity, and availability of R1s architecture and information systems are protected. Generate trouble tickets and perform initial validation and triage to determine whether incidents are security events using open-source intelligence (OSINT). Review and analyze log files to report any unusual or suspect activities. Utilize incident response use-case workflows to follow established and repeatable processes for triaging and escalating. Follow established incident response procedures to ensure proper escalation, analysis, and resolution of security incidents. Analyze and correlate incident event data to develop preliminary root cause and corresponding remediation strategy. Provide technical support for new detection capabilities, recommendations to improve upon existing tools/capabilities to protect R1s network, and assessments for High Value Assets. Research Threat Intelligence sources on the latest malware, trends, patches to keep the Security Program up to date. Document and maintain SOPs/Runbooks related to investigating security incidents. Perform case management throughout the incident lifecycle for moderately complex security incidents. Understand and assist with compliance and enterprise change management policies and procedures. Attend and participate in cybersecurity projects and the change management process. This includes interacting with business units and technical teams to understand what is coming and how their projects can be more secure from the beginning. Maintain metrics & reports on the status of the R1 cybersecurity operations program. Required Qualifications: A bachelors degree in a technical discipline (e.g., Computer Science, Business Analyst, etc.) A minimum of 3-5 years of professional experience in an IT-related field. Intermediate knowledge of security, monitoring, and networking technologies, tools, protocols, and standards. Intermediate or advanced security, networking, or audit certification or equivalent professional experience in security operations. Knowledge of security policy, programs, process, and metrics. Understanding/Experience on Network Security, Firewall Security, and Web Security (including web application firewalls and proxies). Experience on SIEM, PIM, Content Filtering, and Firewalls. Experience on Change Management Review and Security Audits/Reviews. Understanding/Experience on Linux and pen testing tools. Experience on Investigating, documenting, and reporting on any information security (InfoSec) issues as well as emerging trends. Experience administering Security Tools. Experience Threat Hunting and searching for malicious activity. Strong drive and passion to deliver distinctive end-products, a quick learner with a strong attention to detail and quality. Excellent interpersonal and communication skills. Self-driven, with attention to detail and the ability to think outside the box for solutions to issues. Knowledge of IT Industry standards such as ISO 27001, HIPAA, SOX. Good knowledge of security programs, process, and metrics. Good knowledge of IT Security Infrastructure and related applications and toolsets. Examples include firewalls & Network, Active Directory, DNS. Desired Qualifications: Certification (or ability to obtain certification) in at least one of the following areas: General Security (CISSP), Cloud Security (GCLD, Cloud+, CCSK), and Ethical Hacking (CEH). Experience with advanced cybersecurity tools, network topologies, intrusion detection, and secured networks. In-depth understanding of NIST SP 800-61,?SOC 2 AICPA controls, and frameworks. Recent experience with static and/or dynamic code review process. Experience with forensic data analysis. Leadership experience and qualities.

Posted 2 months ago

Apply

2 - 4 years

6 - 10 Lacs

Bengaluru

Work from Office

Naukri logo

Skills Required: Role :Supplier information Security Contract Negotiator Must have Skills :Legal or law professional having good knowledge of information security frameworks & controls and also related terms. Prior work experience in contract negotiation will be consider a value add. Good to Have Skills :ISO27001 LA, Security+, CISA, CISSP or CISM certifications (optional) Key Responsibilities: Resource will be responsible for conducting the review and share response on the supplier query or redlines on the information security controls/schedule during supplier contract negotiation. . The role will require the contract negotiator to: Work directly with supplier contacts and supplier management team to review and negotiate information security clauses/controls. Perform the gap analysis of the supplier IS controls against Accenture specified controls. Assessors will be part of a globally distributed team, and negotiate with Accenture suppliers. Good technical writing skills. Good communication skills Experience of managing Interaction with team management or senior management would be plus. Ability to think out of the box. Qualifications Professional Experience: The person should be well versed with the information security concepts and frameworks such as ISO27001, NIST, PCIDSS, HIPAA etc . He or she should have legal contract negotiation experience along with knowledge of information security standard such as ISO27001 .

Posted 2 months ago

Apply

3 - 6 years

5 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Identifying, assessing, and solving complex business problems for area of responsibility, where analysis of situations or data requires an in-depth evaluation of variable factors Overseeing the development of Security solutions, architecture, design, asset documentation etc. Experience in assessment and implementation of security industry and regulatory compliance standards like ISO 27001, NIST, HIPAA, GDPR, CSA STAR compliance, PCI DSS, GDPR, CCPA, HITRUST Drafting policies, procedures and assist with security process development Experience in cloud assurance. Building security strategy, security operating model for cloud- based solutions, deployments, or migration Leading Security RFP response and security solutioning specific to client needs Experience in Gap, risk and maturity Assessments, Remediation recommendations and drafting To-Be Security architecture for clients Exposure to risk management, risk quantification Helping solve key business problems and challenges by enabling a security architecture transformation, painting a picture of, and charting a journey from the current state to a "to-be" enterprise environment Experience in participating in client presentations & orals for proposal defense etc. Implementing programs/interventions that prepare the organization for the implementation of new business processes Assisting our clients to build the required capabilities for growth and innovation to sustain high performance Managing multi-disciplinary teams to shape, sell, communicate, and implement programs Provide thought leadership to the downstream teams for developing offerings and assets Mentoring and developing our people Professional certifications like CISSP, CISA, CISM, CEH, ISO27001, CRISC, CCSK Qualifications TBC

Posted 2 months ago

Apply

0 - 2 years

0 - 0 Lacs

Bengaluru

Work from Office

Naukri logo

L1 - Cyber Defense Center (CDC) Required Skills

Posted 2 months ago

Apply

8 - 12 years

10 - 15 Lacs

Bengaluru

Work from Office

Naukri logo

As a Cybersecurity Defense professional at Kyndryl, you will encompass cybersecurity, incident response, security operations, vulnerability management, and the world of cyber threat hunting and security intelligence analysis all to protect the very heartbeat of organizations their infrastructure. In this role, you won't just monitor; you'll actively engage in the relentless hunt for cyber adversaries. In a world where every click and keystroke could be a potential gateway for attackers, your role will be nothing short of critical as you seek out advanced threats, attackers, and Indicators of Compromise (IOCs). Your expertise in endpoint detection and response (EDR) will be the shield that safeguards individual workstations, laptops, servers, and other devices from cybercrime. Your responsibilities go beyond vigilance. When it comes to network security, you'll utilize Network Detection and Response (NDR) to monitor the ever-flowing currents of network traffic. The incident management process will be used as you respond and manage to cybersecurity incidents. Cybersecurity Defense is all about information. You'll gather, analyze, and interpret data applying your own and external threat intelligence to uncover potential security threats and risks. These insights and your ability to analyze complex attack scenarios will be the foundation of our security strategy helping Kyndryl stay one step ahead of security breaches. In Cybersecurity Defense at Kyndryl, youre not just protecting the present youre shaping the future of digital security. Join us on this cybersecurity venture where your expertise and creativity will have a lasting impact in the world of digital defense. Who You Are Youre good at what you do and possess the required experience to prove it. However, equally as important you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused someone who prioritizes customer success in their work. And finally, youre open and borderless naturally inclusive in how you work with others. Required Skills and Experience 8+ years of experience in a technical role in the areas of Security Operations, Threat Intelligence, Cyber Incident Response, or Penetration Testing/Red Team. Advanced knowledge of operating system internals and security mechanisms. Experience analyzing attacker techniques that leverage email and cloud-service tactics. Skilled working with extremely large data sets, using tools and scripting languages such as: Excel, SQL, Python, Splunk, and PowerBI. Preferred Skills and Experience Knowledge of operating system internals, OS security mitigations & understanding of Security challenges in Windows, Linux, Mac, Android & iOS platforms Knowledge of kill-chain model, ATT&CK framework, and modern penetration testing techniques Excellent cross-group and interpersonal skills, with the ability to articulate business need for detection improvements Knowledge of major cloud and productivity platforms as well as identity systems and related security concerns Experienced with curation of Threat Intelligence Experienced with direct customer communication in a service delivery role Ability to use data to 'tell a story' Experience with reverse engineering, digital forensics (DFIR) or incident response, or machine learning models Experience with system administration in a large enterprise environment including Windows and Linux servers and workstations, network administration, cloud administration Experience with offensive security including tools such as Metasploit, exploit development, Open Source Intelligence Gathering (OSINT), and designing ways to breach enterprise networks Additional advanced technical degrees or cyber security certifications such as CISSP, OSCP, CEH, or GIAC certifications

Posted 2 months ago

Apply

3 - 8 years

5 - 11 Lacs

Faridabad

Work from Office

Naukri logo

Hi, We are looking to expand our network security testing team. Below is the requirement Job Title: Security Testing Engineer (WFO) Report To: Test Lead Location: Faridabad 5 Days/Week Qualifications and Experiences Qualification: B.tech (Computer Science)/ Information Technology/ Electronics & Communication or MCA (2022 or before passout) Certification Required: CCNA/CCNP/OSCP Years of Experience Minimum 2 years of relevant experience post qualification Skills Certified highly skilled and motivated with Strong knowledge of network protocols, operating systems, Routing, Switching, Configuration and security technologies. Experience with security tools such as Metasploit, Nessus, burp Suite and Wireshark. Also, OWASP top 10. Excellent analytical, problem-solving, and communication skills. Teamwork and management Willingness to travel if required. Responsibilities and Duties Manage Cyber security and network security testing including operation of test equipment in accordance with Regulatory Standards and requirements. Provide technical Knowledge and use expertise for security testing lab and hands on experience in planning and excellent time management. Responsible for planning, directing, and organizing operational resource to accomplish department goals and objectives. Full ownership of strategy, test planning, resource planning and timely delivery of project. collaborate with cross-Functional teams. development, writing, review, and validation of test methods, laboratory SOPs, and other department-level operating and quality documents. Stay up to date with emerging threats, vulnerabilities, testing tools, guidelines. Recommend best practices and train the team of testing engineers. Conduct multiple projects within tight deadlines. Testing report preparation and review. Provide technical guidance and training to other team members as needed. Participate in incident response activities as needed. Salary and Benefits Monthly Salary: As per the competency Benefits Health Insurance Transport facility (Nearest Metro station) 5 days/week Interested candidate can share updated CV to "nikita.singh@nemko.com" or apply on naukri.com

Posted 2 months ago

Apply

4 - 6 years

6 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

The Role Are you passionate about cybersecurity and looking for an exciting role where you can make a difference? If so, we have an opportunity for you! As a Security Specialist at Kyndryl, you will play a crucial role in enabling and securing our customer organizations, cultures, and ecosystems. Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and security awareness workshops. You will be tasked with configuring, monitoring, and managing the performance of networks to maintain the quality of services, while also protecting organizational infrastructure from malicious cyber-attacks. As a key member of our team, you will assess, predict, prevent, and manage the risk of IT infrastructure and data, helping our customers stay ahead of the curve and ensure their systems are secure. You will develop and implement security policies and procedures, working closely with other departments to ensure that all security measures are in place and operating effectively. But that is not all at Kyndryl you will have the opportunity to explore innovation in CyberSecurity data science taking information that has been gathered and looking for areas to have that Ah Ha moment. Drawing conclusions and patterns from the data across single and multiple clients. Creating new ideas in the area of risk management and risk quantification. In addition to your technical responsibilities, you will also play a key role in raising awareness of potential security threats through technical security training on best practices. This is an exciting opportunity to help shape the culture of our clients' organizations and make a tangible impact on their security posture. If you have a passion for cybersecurity governance, risk and compliance, are looking for a challenging and dynamic role, and want to work with a team of like-minded individuals, then we want to hear from you! Join us as a Security Specialist and help us secure the future of our clients' organizations. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you wont find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are Youre good at what you do and possess the required experience to prove it. However, equally as important you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused someone who prioritizes customer success in their work. And finally, youre open and borderless naturally inclusive in how you work with others. Required Skills and Experience Bachelors degree in computer science, Information Security or a related field. 4-6 years of experience in information security, Firewall, VPN, NAC, DNS, Infoblox Strong knowledge of security frameworks and standards (e.g., NIST, ISO). Proficiency in security technologies and tools Firewall (Palo Alto, Fortinet), VPN (Citrix), NAC (ForeScout, HP ClearPass Airwave), DNS (Infoblox) Strong communication and teamwork abilities. Ability to work independently and manage multiple tasks simultaneously. Detail-oriented with a focus on delivering high-quality results. Preferred Skills and Experience Relevant certifications (e.g., CISSP, CEH, CISM) are highly desirable. Excellent problem-solving and analytical skills.

Posted 2 months ago

Apply

0 - 6 years

6 - 9 Lacs

Jaipur

Work from Office

Naukri logo

AM Enterprise is hiring a remote Red Team Security Specialist to simulate cyberattacks, perform penetration tests, and collaborate with Blue Team members to enhance cybersecurity defenses. Requires expertise in penetration testing tools, scripting. Health insurance Annual bonus Office cab/shuttle

Posted 2 months ago

Apply

1 - 5 years

3 - 4 Lacs

Thane

Work from Office

Naukri logo

Key Responsibilities: Deliver technology training in accordance with the defined curriculum and course structure. Provide guidance and support to students. Required Skills & Competencies: Fundamentals of Networking, Mobile Hacking.

Posted 2 months ago

Apply

4 - 6 years

10 - 15 Lacs

Mumbai

Work from Office

Naukri logo

Job Description: Information Security Auditor Location- Andheri or any client Position: Senior Associate Information Security Employment Type: Full-time Company Overview: ANB is a fully integrated and one of the fastest-growing assurance and business advisory firms, with 450 plus employees and a presence in 6 countries. ANB leverages practical experience of many years in multi-disciplinary areas like business risk management, tax advisory, information risk management, assurance, consulting, compliance, regulatory risk, technology, GRC tools, and transaction services. Our clients include top 500 companies, touching every major industry. At ANB, we are a motley crew of inspired innovators, technologists, business designers and project managers, but we are also entrepreneurs who partner in creating new opportunities. Job Summary: We are seeking an experienced VAPT (Vulnerability Assessment and Penetration Testing) Specialist with 4-6 years of experience to join our cybersecurity team. The ideal candidate will have hands-on experience in identifying, assessing, and exploiting security vulnerabilities across networks, systems, and applications. The role requires a strong understanding of penetration testing methodologies, tools, and security best practices. Key Responsibilities: Conduct vulnerability assessments and penetration tests on web applications, networks, infrastructure, and mobile applications to identify security weaknesses. Perform detailed risk analysis and provide actionable remediation steps based on findings. Engage in manual and automated testing using industry-standard tools (e.g., Burp Suite, Nessus, Metasploit, Nmap, Kali Linux, etc.). Document and communicate the results of assessments clearly, including the severity of the vulnerabilities, recommended mitigations, and overall security posture. Stay up-to-date with the latest security threats, vulnerabilities, and tools, ensuring testing methodologies remain current. Conduct risk assessments and security audits to ensure compliance with industry standards (e.g., OWASP Top 10, NIST, CIS). Perform threat modeling to identify potential attack vectors in system architectures and designs. Perform advanced exploitation techniques (buffer overflows, reverse engineering, etc.). Cloud security and penetration testing methodologies for platforms like AWS, Azure, and GCP. Assist in preparing security reports for clients and senior management. Skills & Qualifications: Experience: 4-6 years of hands-on experience in penetration testing, vulnerability assessments, and security auditing. Technical Expertise: Strong knowledge of common web application vulnerabilities (e.g., SQL Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), etc.). Proficiency with penetration testing tools like Burp Suite, OWASP ZAP, Nessus, Nmap, Metasploit, etc. Experience with vulnerability management systems and reporting tools. Familiarity with both manual and automated testing techniques. Strong knowledge of operating systems (Linux, Windows) and networking protocols. Certifications (Preferred): Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH) Any additional certifications in cybersecurity or penetration testing. How to Apply: Interested candidates are invited to submit their resume and cover letter to [Pallavi.kulkarni@anbglobal.com]. Please include "VAPT" in the subject line. Equal Opportunity Employer: ANB is an equal opportunity employer. We celebrate diversity and are committed to creating an inclusive environment for all employees. For more information about our company and culture, visit https://anbglobal.com/

Posted 2 months ago

Apply

3 - 5 years

5 - 9 Lacs

Pune, Hyderabad

Hybrid

Naukri logo

JD for Anti-Spam Conduct thorough investigations of phishing attempts spam and other email-based threats. Develop and implement strategies to detect analyze and mitigate email security threats. Monitor and analyze email traffic to identify suspicious activities and potential breaches. Provide incident response support for email related security incidents. Create and maintain documentation for email security policies procedures and incident reports. Stay updated with the latest trends and technologies in email security and threat intelligence. Strong understanding of email protocols SMTP IMAP POP3 and email security standards DMARC DKIM SPF. Familiarity with email security tools and platforms e.g. Proofpoint Mimecast Microsoft Defender for Office 365. Excellent analytical and problem-solving skills. Strong written and verbal communication skills. Ability to work independently and collaboratively in a fast-paced environment. Attention to detail and a proactive approach to identifying and addressing security issues. Knowledge of threat intelligence platforms and techniques. Any security certifications like CEH CEHFI CISSP or CISM would be plus. Main skills basic req. CEH and Spam analysis.

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies