Jobs
Interviews

1427 Correlation Jobs - Page 24

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

10.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Key Job Responsibilities: VOC - VI (Vulnerability Intelligence), ASM (Attack Surface Management) & VM (Vulnerability Management) Expert. Environment / Context Saint Gobain, world leader in the habitat and construction market, is one of the top 100 global industrial groups. Saint-Gobain is present in 68 countries with 171 000 employees. They design, manufacture and distribute materials and solutions which are key ingredients in the wellbeing of each of us and the future of all. They can be found everywhere in our living places and our daily life: in buildings, transportation, infrastructure and in many industrial applications. They provide comfort, performance and safety while addressing the challenges of sustainable construction, resource efficiency and climate change Saint-Gobain GDI Grou p (250 persons at the head office, including 120 that are internal) is responsible for defining, setting up and managing the Group's Information Systems (IS) and Telecom policy with its 1,000 subsidiaries in 6,500 sites worldwide. The GDI Groupe also carries the common means (infrastructures, telecoms, digital platforms, cross-functional applications ). IN DEC, the IT Development Centre of Saint-Gobain, is an entity with a vision to leverage India’s technical skills in the Information Technology domain to provide timely, high-quality and cost-effective IT solutions to Saint-Gobain businesses globally.Within the Cybersecurity Department, t he Cybersecurity Vulnerability Operations Cent er mission is to Identify, assess and confirm vulnerability and threats that can affect the Group. The CyberVOC teams are based out of Paris and Mumbai and consist of skilled persons working in different Service Lines. Mission We are seeking a highly experienced cybersecurity professional to serve as an VOC Expert supporting the Vulnerability Intelligence (VI), Attack Surface Management (ASM), and Vulnerability Management (VM) teams. This role is pivotal in shaping the strategy, defining technical approaches, and supporting day-to-day operations—particularly complex escalations and automation efforts. The ideal candidate will combine technical mastery in offensive security with practical experience in vulnerability lifecycle management and external attack surface discovery. The expert will act as a senior advisor and technical authority for the analyst teams, while also contributing to the design, scripting, and documentation of scalable security proceess. The VOC Expert is responsible for: Vulnerability Intelligence (VI) Drive the qualification and risk analysis of newly disclosed vulnerabilities. Perform exploit PoC validation when needed to assess practical risk. Maintain and enhance the central VI database, enriched with (EPSS, CVSS, QVS, SG-specific scoring models, and EUVD) Define and automate workflows for: Vulnerability qualification, exposure analysis, and prioritization Ingestion of qualified vulnerability data into the enterprise Data Lake Collaborate on documentation of VI methodology and threat intelligence integration Support proactive communication of high/critical vulnerabilities to asset and application owners Attack Surface Management (ASM): Operate and enhance external asset discovery and continuous monitoring using ASM tools Integrate asset coverage data from CMDB, and other internal datasets Design and implement scripts for: WHOIS/ASN/banner correlation Data enrichment and alert filtering Deploy and maintain custom scanning capabilities (e.g., Nuclei integrations) Provide expert input on threat modeling based on exposed assets and external footprint BlackBox Pentesting: Maintain the service delivery of the BlackBox Pentesting platform Automate the export of pentest data and integrate into Data Lake and Power BI dashboards Define and document onboarding workflows for new applications Actively guide analysts in prioritizing pentest requests and validating results. Vulnerability Management: Vulnerability review, recategorization, and false positive identification Proactive vulnerability testing and replay Pre-analyze and consolidate vulnerability data from various scanning tools Prepare concise syntheses of available vulnerabilities Offer guidance to the SO and CISO on vulnerabilities Collaborate with key stakeholders to develop strategies for vulnerability management Assist in defining vulnerability management KPIs and strategic goals Prepare concise, actionable summaries for high-risk vulnerabilities and trends Automate testing actions: Develop scripts and tooling to automate repetitive and complex tasks across VI, ASM and VM. Implement data pipelines to sync outputs from ASM/VI tools to dashboards and reporting engines. Design streamlined workflows for vulnerability lifecycle—from detection to closure. Collaborate with both offensive and defensive teams to support App managers and Asset managers in remediating vulnerabilities and issues. Skills and Qualifications: Bachelor's degree in Computer Science, Information Security, EXTC or related field; relevant certifications (e.g., CISSP, CCSP, CompTIA Security+) are a plus Proven experience (10+ years) working within the Cybersecurity field, with a focus on offensive security, vulnerability intelligence and attack surface analysis. Proven experience on Penetration testing actions (web application, infrastructure, …) Proven expertise in: CVE analysis, exploit development/validationExternal asset discovery & mapping Threat modeling and prioritizationAdvanced knowledge of tooling such as: ASM platforms Nuclei, Shodan, Open Source CTI, vulnerability scanners (Qualys, Tenable, …) Pentester tools (Burp, SQLmap, Responder, IDA and Kali environment) Experience in investigating newly published vulnerabilities, assessing their risks, severity. Strong scripting languages (e.g., Python, Bash, Powershell, C#, …) for automation and customization Experience with Pentester tools (Burp, SQLmap and Kali environment) Strong technical skills with an interest in open-source intelligence investigations Experience building dashboards in Power BI or similar tools. Familiarity with data lakes, API integrations, and ETL processes. Knowledge of NIST CVE database, OWASP Top 10, Microsoft security bulletins Excellent writing skills in English and ability to communicate complicate technical challenges in a business language to a range of stakeholders. Personal Skills: Has a systematic, disciplined, and analytical approach to problem solving with Thorough leadership skills & experience Excellent ability to think critically underpressure Strong communication skills to convey technical concepts clearly to both technical and non-technical stakeholders Willingness to stay updated with evolving cyber threats, technologies, and industry trends Capacity to work collaboratively with cross-functional teams, developers, and management to implement robust security measures Additional Information: The position is based in Mumbai (India)

Posted 1 month ago

Apply

0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Job Title: Technical Consultants with Incident Management in Banking Domain About Us “Capco, a Wipro company, is a global technology and management consulting firm. Awarded with Consultancy of the year in the British Bank Award and has been ranked Top 100 Best Companies for Women in India 2022 by Avtar & Seramount . With our presence across 32 cities across globe, we support 100+ clients across banking, financial and Energy sectors. We are recognized for our deep transformation execution and delivery. WHY JOIN CAPCO? You will work on engaging projects with the largest international and local banks, insurance companies, payment service providers and other key players in the industry. The projects that will transform the financial services industry. MAKE AN IMPACT Innovative thinking, delivery excellence and thought leadership to help our clients transform their business. Together with our clients and industry partners, we deliver disruptive work that is changing energy and financial services. #BEYOURSELFATWORK Capco has a tolerant, open culture that values diversity, inclusivity, and creativity. CAREER ADVANCEMENT With no forced hierarchy at Capco, everyone has the opportunity to grow as we grow, taking their career into their own hands. DIVERSITY & INCLUSION We believe that diversity of people and perspective gives us a competitive advantage. Role Description Job Title: Technical Consultants with Incident Management in Banking Domain Location: Sarjapur, Bengaluru 3 days WFO (Tues, Wed, Thurs) Shift Time: 24*6 Rotational Shifts Overview Job Title: Technology Command Center Analyst Department: Information Technology Location: Bangalore, India Reports To: Command Center Manager Job Summary: The Technology Command Center Analyst plays a critical role in monitoring, managing, and supporting the organization’s IT infrastructure and services. Operating in a 24x7x365 environment, the group ensures rapid incident response and proactive performance optimization. This role acts as a first line of defense to detect, triage, and escalate critical incidents while providing visibility into IT health across the enterprise. A Command Center Analyst is responsible for monitoring and managing various systems related to incidents and events. This role involves surveillance, incident response, and communication to ensure the timely resolution of issues and proper management of planned/unplanned events. Key Responsibilities Real-Time Monitoring: Monitor enterprise infrastructure, applications, and services using monitoring tools (e.g., App Dynamics, Open Telemetry, ServiceNow, Splunk, Zabbix, etc.). Incident Management: Detect and respond to system alerts, outages, and degradations. Log incidents, perform initial diagnostics, and escalate to appropriate teams per SLAs. Event Correlation & Analysis: Analyze system and application events to identify trends and potential threats. Correlate data across multiple platforms for root cause identification. Communication Hub: Act as a central communication point for all major incidents. Facilitate incident bridges and provide updates to stakeholders. Collaborate with other regional counterparts on technical and functional initiatives. Runbooks & SOPs: Follow and improve documented standard operating procedures and escalation paths. Assist in maintaining knowledge base documentation. Automation & Tooling Support: Collaborate with IT teams to implement automation for monitoring, alerting, and incident remediation. Qualifications and Skills Bachelor’s degree in Computer Science, Information Technology, Business, Communications, or equivalent experience. experience in a crisis management, command center, NOC, SOC, or IT operations role. Experience with enterprise monitoring tools and ticketing systems. Strong analytical and problem-solving skills. Ability to build strong relationships with both technical and non-technical team members. Excellent written and verbal communication abilities. Situational awareness and meticulous attention to detail. Ability to work in high-pressure environments and support 24x7 operations, including nights/weekends/holidays and on-call schedule if required. Knowledge of Capital Markets / Investment Banking industries. Preferred: Certifications such as ITIL, CompTIA Network+, or relevant cloud certifications (AWS, Azure). Experience with basic scripting or automation tools (e.g., PowerShell, Python). Familiarity with incident and change management frameworks. If you are keen to join us, you will be part of an organization that values your contributions, recognizes your potential, and provides ample opportunities for growth. For more information, visit www.capco.com. Follow us on Twitter, Facebook, LinkedIn, and YouTube.

Posted 1 month ago

Apply

0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Job Title: Technical Consultants with Incident Management in Banking Domain About Us “Capco, a Wipro company, is a global technology and management consulting firm. Awarded with Consultancy of the year in the British Bank Award and has been ranked Top 100 Best Companies for Women in India 2022 by Avtar & Seramount . With our presence across 32 cities across globe, we support 100+ clients across banking, financial and Energy sectors. We are recognized for our deep transformation execution and delivery. WHY JOIN CAPCO? You will work on engaging projects with the largest international and local banks, insurance companies, payment service providers and other key players in the industry. The projects that will transform the financial services industry. MAKE AN IMPACT Innovative thinking, delivery excellence and thought leadership to help our clients transform their business. Together with our clients and industry partners, we deliver disruptive work that is changing energy and financial services. #BEYOURSELFATWORK Capco has a tolerant, open culture that values diversity, inclusivity, and creativity. CAREER ADVANCEMENT With no forced hierarchy at Capco, everyone has the opportunity to grow as we grow, taking their career into their own hands. DIVERSITY & INCLUSION We believe that diversity of people and perspective gives us a competitive advantage. Role Description Job Title: Technical Consultants with Incident Management in Banking Domain Location: Sarjapur, Bengaluru 3 days WFO (Tues, Wed, Thurs) Shift Time: 24*6 Rotational Shifts Overview Job Title: Technology Command Center Analyst Department: Information Technology Location: Bangalore, India Reports To: Command Center Manager Job Summary: The Technology Command Center Analyst plays a critical role in monitoring, managing, and supporting the organization’s IT infrastructure and services. Operating in a 24x7x365 environment, the group ensures rapid incident response and proactive performance optimization. This role acts as a first line of defense to detect, triage, and escalate critical incidents while providing visibility into IT health across the enterprise. A Command Center Analyst is responsible for monitoring and managing various systems related to incidents and events. This role involves surveillance, incident response, and communication to ensure the timely resolution of issues and proper management of planned/unplanned events. Key Responsibilities Real-Time Monitoring: Monitor enterprise infrastructure, applications, and services using monitoring tools (e.g., App Dynamics, Open Telemetry, ServiceNow, Splunk, Zabbix, etc.). Incident Management: Detect and respond to system alerts, outages, and degradations. Log incidents, perform initial diagnostics, and escalate to appropriate teams per SLAs. Event Correlation & Analysis: Analyze system and application events to identify trends and potential threats. Correlate data across multiple platforms for root cause identification. Communication Hub: Act as a central communication point for all major incidents. Facilitate incident bridges and provide updates to stakeholders. Collaborate with other regional counterparts on technical and functional initiatives. Runbooks & SOPs: Follow and improve documented standard operating procedures and escalation paths. Assist in maintaining knowledge base documentation. Automation & Tooling Support: Collaborate with IT teams to implement automation for monitoring, alerting, and incident remediation. Qualifications and Skills Bachelor’s degree in Computer Science, Information Technology, Business, Communications, or equivalent experience. experience in a crisis management, command center, NOC, SOC, or IT operations role. Experience with enterprise monitoring tools and ticketing systems. Strong analytical and problem-solving skills. Ability to build strong relationships with both technical and non-technical team members. Excellent written and verbal communication abilities. Situational awareness and meticulous attention to detail. Ability to work in high-pressure environments and support 24x7 operations, including nights/weekends/holidays and on-call schedule if required. Knowledge of Capital Markets / Investment Banking industries. Preferred: Certifications such as ITIL, CompTIA Network+, or relevant cloud certifications (AWS, Azure). Experience with basic scripting or automation tools (e.g., PowerShell, Python). Familiarity with incident and change management frameworks. If you are keen to join us, you will be part of an organization that values your contributions, recognizes your potential, and provides ample opportunities for growth. For more information, visit www.capco.com. Follow us on Twitter, Facebook, LinkedIn, and YouTube.

Posted 1 month ago

Apply

8.0 years

3 - 6 Lacs

Hyderābād

On-site

Job title: Team Lead - MR Location: Hyderabad % of travel expected : Travel required as per business need, if any Job type : Permanent and Full time About the job As part of GTMC, Insights & Analytics Capabilities delivers best-in-class and transformative insights and innovative tools and methods that actionably fuel Sanofis strategic business decisions, processes and deliverables. In doing so, our Hubs are a crucial part of how we innovate, improving performance across every Sanofi department and providing a springboard for the amazing work we do. Build a career and you can be part of transforming our business while helping to change millions of lives. Ready? Overall Purpose At Sanofi, we leverage analytics and technology to benefit patients worldwide. We seek individuals passionate about using data, analytics, and insights to drive decision-making and tackle global health threats. Our mission is to transform decision-making across our end-to-end commercialization process, from business development to late lifecycle management. The Specialist in Market Research and Competitive Intelligence will provide deliverables that support planning and decision-making across multiple functional areas, such as finance, manufacturing, product development, and commercial. This role ensures high-quality deliverables, drives synergies across franchises, fosters innovation, and creates scalable, shareable solutions. Key Responsibilities Team Lead –MR drives operational impact by effectively leading team initiatives within the Business Unit. Through hands-on leadership and technical expertise, this role optimizes market research (primary and secondary) workflows to enhance team productivity. The Team Lead manages a dedicated team, providing direct supervision, mentoring, and technical guidance while ensuring alignment with departmental objectives. Key responsibilities include coordinating daily operations, implementing process improvements, and maintaining quality standards within the team's scope. They collaborate with stakeholders to understand requirements, allocate team resources effectively, and ensure timely delivery of market research solutions. The Team Lead also supports team development, provides technical mentorship, and ensures adherence to MR activities, governance practices while reporting progress to senior managemen People Supports analytical operations within the Business Unit, providing insights that inform departmental decisions and contribute to team objectives. Stays current on governance practices and shares relevant updates with team members to support MR project planning and activities. Ensures team delivers quality analytical deliverables on schedule, maintaining stakeholder confidence through consistent performance and reliable execution. Identifies process improvement opportunities and collaborates with internal teams to implement solutions that enhance team efficiency and quality. Manages and develops team members, fostering a collaborative learning environment that supports individual growth and team performance. Balances project priorities with operational needs, ensuring practical implementation while supporting broader departmental goals. Mentors junior team members and coordinates with peer leads to strengthen team capabilities and knowledge sharing. Maintains working relationships with internal stakeholders and team members, ensuring data solutions meet current business requirements and project needs, across the product/brand lifecycle. Support the contracting process within defined timelines and collaborate with global stakeholders for project planning and budgeting. Performance Indicators : Feedback from (end stakeholders) on overall satisfaction Weightage : 20% Performance Coordinates a team of specialists to address business challenges, ensuring team members are effectively assigned to meet project requirements. Collaborates with departmental teams to deliver insights and support data-driven solutions within the team's scope of work. Reviews MR workfolws and processes within the team, tracking progress and sharing results with immediate stakeholders. Contributes to implementing solutions that align with specific business objectives and team deliverables. Establishes effective workflows within the team and coordinates with other teams when needed for project completion. Tracks team deliverables, identifying potential issues early and working with team members to resolve challenges and address stakeholder questions. Implements best practices within the team, encouraging data-driven approaches in daily work. Supports operational efficiency by following established standards and helping team members collaborate effectively. Develops stakeholder relationships through reliable delivery of quality data products that contribute to business objectives. Translate understanding of brand and business needs into potential hypotheses and effective analytical approaches for both market research and competitive intelligence projects. Partner with therapy area/brand/Medical team across Sanofi based Globally, for high quality execution and on time delivery of the insights projects and initiatives. This includes development, refinement, and comprehensive quality control for standard deliverables (real-time alerts, competitor benchmarking, Insights & SML Report, conference activities, Listening Priorities, PV reporting, Expert encounters, etc), slide preparation for various internal meetings, and strategic and tactical ad hoc support Support planning for key conferences with guidance/input from the Sanofi teams. Support cross-functional team preparedness and proactive planning Support competitive simulation workshops, including development of briefing books, gap analysis, SWOT, scenario planning Collaborate with vendor and Sanofi team to develop and refine deliverables Leverage a wealth of in-house secondary resources to develop a comprehensive, synthesized narrative for key competitive topics and questions on an ad hoc basis Development and refinement of key in-house MR & CI resources including clinical trial trackers, clinical data comparisons, internal portals, launch timings Participate in global, regional, and local meetings as relevant to better understand the business context and appropriately translate into deliverables Analyze primary market research/survey data to address key business objectives and develop impactful presentations to report insights and recommendations. Support planning for key conferences and develop resources for competitive simulation workshops. Communicate effectively with internal stakeholders and present key insights and recommendations. Provide evidence-based recommendations to support decision-making Proactively troubleshoot and offer solutions/options before escalating and reaching out for help Support logistics of scheduling meetings with a large number of people and PO processing, as needed Performance indicator s: Adherence to timeline, quality target Weightage : 50% Process Ensure the team delivers projects effectively, focusing on resourcing, quality, timeliness, efficiency, and maintaining high standards. Contribute to overall quality enhancement by ensuring the team meets the defined/agreed quality parameters for their outputs. Managing the process or team expansion initiatives, involved in hiring and people management responsibilities Ensure adherence to compliance procedures and internal/operational risk controls in accordance with all applicable regulatory standards. Implements resource and back-up planning for analytics teams to ensure business continuity and consistent delivery of insights to stakeholders. Ensuring right demand planning and optimizing resources Lead and implement operational excellence projects within the team, aligning with the overall direction from senior leadership. Develop and implement tools, technology, and processes to continuously improve quality and productivity. Identify synergies and redundancies across brands and global business units (GBUs) for common customers/business models, prioritizing information gaps and business challenges from global teams. Work cross-functionally to gather requirements, analyze data, and generate actionable insights and reports. Contribute to overall quality enhancement by ensuring high scientific standards for the output produced by the medical/ field writing group; and Secure adherence to compliance procedures and internal/operational risk controls in accordance with all applicable standards Refresh report on frequency/cycle basis (weekly/monthly/quarterly/annually), along with QC checks for each refresh Performance indicators : Feedback from stakeholders on satisfaction with deliverables Adherence to plan/calendar Weightage : 20% Stakeholder Develop working relationships with immediate business partners to understand their data requirements and ensure team deliverables support departmental goals. Present analytical findings to stakeholders in clear, understandable formats that support team and project decision-making. Work with internal teams (such as Brand Teams, Competitive Intelligence, Customer Facing teams etc.) to ensure analytics outputs meet their project needs and provide practical value. Coordinate project timelines by setting realistic expectations for deliverables and communicating resource needs to immediate supervisors. Share knowledge between team members and business partners to improve understanding of data insights and encourage their practical application. Participate in departmental meetings to provide updates on analytics work and communicate team needs for project success. Address day-to-day concerns related to data quality, methods, or implementation of team analytics solutions. Maintain regular communication with key stakeholders, focusing on those directly involved in current projects and team objectives. Supporting Role: This position contributes to analytics and insights generation within the commercial function, helping deliver data-driven solutions that support business objectives and informed decision-making at the departmental level. Collaborate with global teams and external vendors to ensure effective project delivery of market research and competitive intelligence initiatives. Performance indicator s: Adherence to timeline, quality target Weightage : 10% This role is essential for driving robust analytics and insights generation across different franchises, supporting Sanofi's mission to tackle some of the world's greatest health threats through informed decision-making and strategic planning. About you Experience: 8+ years of experience in pharmaceutical product Competitive Intelligence or Market Research (Primary/Secondary) or Medical Insights and analytics. Experience in the pharmaceutical industry is preferred. Experience in General Medicine/Specialty care/Vaccines Therapy Area is preferred. Extensive understanding of commercial operations and operating model. People Management experience for managing a team or function Familiarity with major business KPIs and processes, and up to date knowledge of CI, MR, Forecasting, SFE, and Medical Insights methodologies. Familiarity with common databases like Citeline, Evaluate, Cortellis, IQVIA, etc. Soft Skills: Strong learning agility and ability to manage ambiguous environments. Ability to mentor and guide the team Excellent interpersonal and communication skills with strong presentation skills. Team player who is curious, dynamic, result-oriented, and collaborative. Strategic thinking in an ambiguous environment. Ability to operate effectively in an international matrix environment and work across time zones. Technical Skills: Strong qualitative and quantitative market research, and data analytics capabilities. Knowledge of CI, statistical and programming tools (SPSS, Q, or similar) a plus Experience with statistical approaches such as conjoint, MaxDiff, linear regression, correlation, factor, and cluster analyses a plus Advanced MS Office skills (Excel and PowerPoint) a must. Slide creation skills to develop creative and impactful presentations. Preferred experience using analytical tools like Power BI, QlikSense, Tableau, Smartsheet, and Alteryx. Expert knowledge of Excel and/or proficiency in VBA, is a plus. Experience in developing and managing dashboards. Project management abilities to prioritize and handle multiple projects simultaneously. Aptitude for problem-solving and strategic thinking. Ability to synthesize complex information into clear and actionable insights. Proven ability to work effectively across all levels of stakeholders and diverse functions. Solid understanding of pharmaceutical development, manufacturing, supply chain, and marketing functions. Education: Advanced degree in Pharma, Management, Statistics, Decision Sciences, Engineering, Life Sciences, Business Analytics, or related fields (PhD, MBA, or Master's preferred). Languages: Excellent knowledge of English with strong written and spoken communication skills. Why chose us? Bring the miracles of science to life alongside a supportive, future-focused team. Discover endless opportunities to grow your talent and drive your career, whether it’s through a promotion or lateral move, at home or internationally. Enjoy a thoughtful, well-crafted rewards package that recognizes your contribution and amplifies your impact. Take good care of yourself and your family, with a wide range of health and wellbeing benefits including high-quality healthcare, prevention and wellness programs and at least 14 weeks’ gender-neutral parental leave. Play an instrumental part in creating best practice within our Go-to-Market Capabilities. null

Posted 1 month ago

Apply

6.0 years

0 Lacs

Pune, Maharashtra, India

On-site

About Rearc At Rearc, we're committed to empowering engineers to build awesome products and experiences. Success as a business hinges on our people's ability to think freely, challenge the status quo, and speak up about alternative problem-solving approaches. If you're an engineer driven by the desire to solve problems and make a difference, you're in the right place! Our approach is simple — empower engineers with the best tools possible to make an impact within their industry. Role Overview Rearc is looking for a Cybersecurity Threat Detection Engineer with proactive communication skills, a foundation in DevSecOps, Detection-As-Code, deep purple team technical expertise, and an entrepreneurial approach to join our growing Cybersecurity practice. This role involves partnering with Rearc customers to design cutting-edge detection strategies and support the development of top-tier, modern cybersecurity monitoring programs. You will craft tailored security detections to strengthen our clients' cybersecurity efforts by leveraging Security Information and Event Management (SIEM), Security Orchestration Automation and Response (SOAR), Endpoint Detection and Response (EDR), and Network Detection and Response (NDR) services. What You Bring Enthusiasm about developing and evangelizing services in the cyber space. Strong cloud, security, SIEM and data engineering fundamentals. What You'll Do Utilize NDR, EDR, real-time streaming, and SIEM technologies to develop robust threat detection capabilities. Build and optimize detection rules leveraging real-time data streaming to enhance detection accuracy. Design enrichment pipelines and automation workflows to enhance the precision of threat detections. Develop correlation logic and automated processes to create high-fidelity threat alerts. Build compliance and recoverability of customer Data Analytics solutions, including SOPs, data onboarding, normalization, enrichment, and system maintenance. Create automation playbooks for incident triage and response. Align detection content with customer-specific Use Case Frameworks and provide metrics on cybersecurity threats impacting their environment. Collaborate with customer cybersecurity teams to cover gaps and enhance enterprise posture. Support enterprise Cybersecurity, Information Technology (IT), and Operational Technology (OT) teams by providing dashboards and other data exploration tools. Stay continually aware of emerging cybersecurity threats and trends, adapting detection strategies as needed. Work closely with customer teams, including Cybersecurity Operations Center (CSOC), Operational Technology (OT), and Incident Response (IR) teams, to ensure detections are actionable and relevant. Provide feedback to improve the customer's security framework and overall security monitoring strategy. In this role, you will combine technical expertise with continual situational awareness of emerging threats, driving client success while staying at the cutting edge of cyber security innovations. Qualifications 6+ years of experience in Cybersecurity with a focus on: Log streaming Cybersecurity data lakes and data warehousing SOAR engineering SIEM engineering, administration, architecture, and operations Data science, statistical analysis, and threat detection development Integrating disparate IT, OT, and business applications into SIEM systems Bachelor's degree in Management Information Systems, Computer Science, or a related field A strong passion for Cybersecurity and a commitment to staying current with industry trends, best practices, and tools Proven experience in documenting, socializing, and operationalizing Cybersecurity technologies and processes Prior programming experience in Python, SQL, and Apache Spark Solid understanding of common attack techniques and their practical applications Demonstrated ability to work effectively across multiple teams, building cross-functional relationships with individuals of varying technical expertise A self-starter with a proven ability to thrive in fast-paced environments Strong technical communication skills, both written and verbal Nice To Have Prior experience with platforms like Databricks, Cribl, Tines, or other cybersecurity lakehouse providers Some More About Us At Rearc, our mission is straightforward - empower engineers with the best tools possible to make an impact within their industry. We pride ourselves on fostering an environment where creativity flourishes, bureaucracy is non-existent, and individuals are encouraged to challenge the status quo. We're not just a company; we're a community of problem-solvers dedicated to improving the lives of fellow software engineers. Our commitment is simple - finding the right fit for our team and cultivating a desire to make things better. If you're a cloud professional intrigued by our problem space and eager to make a difference, you've come to the right place. Join us, and let's solve problems together!

Posted 1 month ago

Apply

0 years

0 Lacs

India

Remote

Netcool developer Location : Gurgaon - WFO NP : 30 days Experience :3 to 7 yrs Budget : Max 15 LPA Payroll : STL - Sterlite Technologies Limited Customer : IBM Work Mode : Work from Office only (No Work from Home option) Mandatory skills: Strong hands-on experience in Netcool OMNIbus , Impact , WebGUI , and custom probes. Develop, configure, and maintain IBM Netcool OMNIbus , Impact , and WebGUI components. Design and implement custom probes and gateways. Develop Netcool rules, triggers, filters, and event enrichment logic. Integrate Netcool with third-party tools like ServiceNow, Remedy, or other ITSM systems. Automate event correlation and noise reduction using Impact policies.

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Job Description TITLE : SOC Analyst I DEPARTMENT : Information Technology REPORTING TO : Manager, Cyber Security PURPOSE OF THE POSITION: The SOC Analyst I position is a key role responsible for supporting company's global security infrastructure working in close coordination with the US onsite team. The positions primary role is to monitor systems to identify threats. A SOC analyst I will respond to alerts and carry out triage operations to determine what type of response, if any, is required. They also scan systems for vulnerabilities and manage monitoring and reporting tools. The SOC Analyst I position will follow standard operating procedure for detecting, classifying, escalating, and reporting of incidents. Job Responsibilities: Perform monitoring and data correlation to events of interest using multiple tools such as system event logs, SIEM, IPS/IDS logs, network traffic, anti-virus console and client end-point software to determine if there is an incident. Respond to security incident and investigation requests in line with established processes and procedures within defined service level targets. Must have extensive experience in multiple security areas such as SIEM, IDS and APT. Drive containment strategy during data loss or breach events. Triage and resolve advanced vector attacks such as botnets and advanced persistent threats (APTs). Perform basic forensic activities e.g. conducting examinations of computers, system logs, applications and networks to locate evidence. Perform Root cause analysis (RCA) for the incidents and update the knowledge management. Tuning of IDS, proxy policy, in-line malware tools based on threat feeds, trust and reputation data, incidents, or vulnerabilities and exploits of downstream systems. Provide tuning recommendations to administrators based on findings during investigations or threat information reviews. Research and stay up-to-date on current security threats and vulnerabilities to relevant information systems Qualifications Required: Bachelor's degree in Computer Science or related field. Should have 3 to 7 years of experience supporting complex global environment. Accredited Certification on Incident Handling (CEH, GCIH, ECIH). Hands-on investigation and log analysis exposure. Experience in IT security and defensive technologies (Antivirus, Firewalls, Event Monitoring, Network and Perimeter devices, Data Loss Prevention, IDS, Web content filtering). Should be familiar with handling and mitigating attacks related to viruses, spoofing, hoaxes, malware Should be familiar with emerging security threats and their attack vectors especially web application attacks Knowledge of SSL/TLS, certificates and encryption methods Exposure to security tools (Web application security scanning with Netsparker, Nessus and Tenable Security Center, Snort IDS, Wireshark, Data Loss Prevention software) Sound understanding of OS (Unix/Linux, Windows), IPS/IDS, VPN, Firewalls, Application Security. Interpersonal skills Passionate, Self-motivated and driven, with keen attention to detail, action-and-results oriented. Excellent interpersonal, verbal and written communication skills as well as strong logical, analytical, problem solving skills and reporting skills. Able to prioritize and execute tasks in a high-pressure environment. Experience with in a team-oriented, collaborative environment. About Berkadia: Berkadia , a joint venture of Berkshire Hathaway and Jefferies Financial Group, is an industry leading commercial real estate company providing comprehensive capital solutions and investment sales advisory and research services for multifamily and commercial properties. Berkadia is amongst the largest, highest rated and most respected primary, master and special servicers in the industry. Berkadia is an equal opportunity employer and affords equal opportunity to all applicants and employees for all positions without regard to race, color, religion, gender, national origin, age, disability or any other status protected under the law. Our people are our greatest strength and make Berkadia a great place to work, creating an environment of trust, mutual respect, innovation and collaboration. Our culture is driven by our core values: https://www.berkadia.com/about/vision-and-values. To know more about Berkadia, please visit our website https://www.berkadia.com/aboutus/

Posted 1 month ago

Apply

8.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Job title: Team Lead - MR Location: Hyderabad % of travel expected: Travel required as per business need, if any Job type: Permanent and Full time About The Job As part of GTMC, Insights & Analytics Capabilities delivers best-in-class and transformative insights and innovative tools and methods that actionably fuel Sanofis strategic business decisions, processes and deliverables. In doing so, our Hubs are a crucial part of how we innovate, improving performance across every Sanofi department and providing a springboard for the amazing work we do. Build a career and you can be part of transforming our business while helping to change millions of lives. Ready? Overall Purpose At Sanofi, we leverage analytics and technology to benefit patients worldwide. We seek individuals passionate about using data, analytics, and insights to drive decision-making and tackle global health threats. Our mission is to transform decision-making across our end-to-end commercialization process, from business development to late lifecycle management. The Specialist in Market Research and Competitive Intelligence will provide deliverables that support planning and decision-making across multiple functional areas, such as finance, manufacturing, product development, and commercial. This role ensures high-quality deliverables, drives synergies across franchises, fosters innovation, and creates scalable, shareable solutions. Key Responsibilities Team Lead –MR drives operational impact by effectively leading team initiatives within the Business Unit. Through hands-on leadership and technical expertise, this role optimizes market research (primary and secondary) workflows to enhance team productivity. The Team Lead manages a dedicated team, providing direct supervision, mentoring, and technical guidance while ensuring alignment with departmental objectives. Key responsibilities include coordinating daily operations, implementing process improvements, and maintaining quality standards within the team's scope. They collaborate with stakeholders to understand requirements, allocate team resources effectively, and ensure timely delivery of market research solutions. The Team Lead also supports team development, provides technical mentorship, and ensures adherence to MR activities, governance practices while reporting progress to senior managemen People Supports analytical operations within the Business Unit, providing insights that inform departmental decisions and contribute to team objectives. Stays current on governance practices and shares relevant updates with team members to support MR project planning and activities. Ensures team delivers quality analytical deliverables on schedule, maintaining stakeholder confidence through consistent performance and reliable execution. Identifies process improvement opportunities and collaborates with internal teams to implement solutions that enhance team efficiency and quality. Manages and develops team members, fostering a collaborative learning environment that supports individual growth and team performance. Balances project priorities with operational needs, ensuring practical implementation while supporting broader departmental goals. Mentors junior team members and coordinates with peer leads to strengthen team capabilities and knowledge sharing. Maintains working relationships with internal stakeholders and team members, ensuring data solutions meet current business requirements and project needs, across the product/brand lifecycle. Support the contracting process within defined timelines and collaborate with global stakeholders for project planning and budgeting. Performance Indicators: Feedback from (end stakeholders) on overall satisfaction Weightage: 20% Performance Coordinates a team of specialists to address business challenges, ensuring team members are effectively assigned to meet project requirements. Collaborates with departmental teams to deliver insights and support data-driven solutions within the team's scope of work. Reviews MR workfolws and processes within the team, tracking progress and sharing results with immediate stakeholders. Contributes to implementing solutions that align with specific business objectives and team deliverables. Establishes effective workflows within the team and coordinates with other teams when needed for project completion. Tracks team deliverables, identifying potential issues early and working with team members to resolve challenges and address stakeholder questions. Implements best practices within the team, encouraging data-driven approaches in daily work. Supports operational efficiency by following established standards and helping team members collaborate effectively. Develops stakeholder relationships through reliable delivery of quality data products that contribute to business objectives. Translate understanding of brand and business needs into potential hypotheses and effective analytical approaches for both market research and competitive intelligence projects. Partner with therapy area/brand/Medical team across Sanofi based Globally, for high quality execution and on time delivery of the insights projects and initiatives. This includes development, refinement, and comprehensive quality control for standard deliverables (real-time alerts, competitor benchmarking, Insights & SML Report, conference activities, Listening Priorities, PV reporting, Expert encounters, etc), slide preparation for various internal meetings, and strategic and tactical ad hoc support Support planning for key conferences with guidance/input from the Sanofi teams. Support cross-functional team preparedness and proactive planning Support competitive simulation workshops, including development of briefing books, gap analysis, SWOT, scenario planning Collaborate with vendor and Sanofi team to develop and refine deliverables Leverage a wealth of in-house secondary resources to develop a comprehensive, synthesized narrative for key competitive topics and questions on an ad hoc basis Development and refinement of key in-house MR & CI resources including clinical trial trackers, clinical data comparisons, internal portals, launch timings Participate in global, regional, and local meetings as relevant to better understand the business context and appropriately translate into deliverables Analyze primary market research/survey data to address key business objectives and develop impactful presentations to report insights and recommendations. Support planning for key conferences and develop resources for competitive simulation workshops. Communicate effectively with internal stakeholders and present key insights and recommendations. Provide evidence-based recommendations to support decision-making Proactively troubleshoot and offer solutions/options before escalating and reaching out for help Support logistics of scheduling meetings with a large number of people and PO processing, as needed Performance indicators: Adherence to timeline, quality target Weightage: 50% Process Ensure the team delivers projects effectively, focusing on resourcing, quality, timeliness, efficiency, and maintaining high standards. Contribute to overall quality enhancement by ensuring the team meets the defined/agreed quality parameters for their outputs. Managing the process or team expansion initiatives, involved in hiring and people management responsibilities Ensure adherence to compliance procedures and internal/operational risk controls in accordance with all applicable regulatory standards. Implements resource and back-up planning for analytics teams to ensure business continuity and consistent delivery of insights to stakeholders. Ensuring right demand planning and optimizing resources Lead and implement operational excellence projects within the team, aligning with the overall direction from senior leadership. Develop and implement tools, technology, and processes to continuously improve quality and productivity. Identify synergies and redundancies across brands and global business units (GBUs) for common customers/business models, prioritizing information gaps and business challenges from global teams. Work cross-functionally to gather requirements, analyze data, and generate actionable insights and reports. Contribute to overall quality enhancement by ensuring high scientific standards for the output produced by the medical/ field writing group; and Secure adherence to compliance procedures and internal/operational risk controls in accordance with all applicable standards Refresh report on frequency/cycle basis (weekly/monthly/quarterly/annually), along with QC checks for each refresh Performance indicators: Feedback from stakeholders on satisfaction with deliverables Adherence to plan/calendar Weightage: 20% Stakeholder Develop working relationships with immediate business partners to understand their data requirements and ensure team deliverables support departmental goals. Present analytical findings to stakeholders in clear, understandable formats that support team and project decision-making. Work with internal teams (such as Brand Teams, Competitive Intelligence, Customer Facing teams etc.) to ensure analytics outputs meet their project needs and provide practical value. Coordinate project timelines by setting realistic expectations for deliverables and communicating resource needs to immediate supervisors. Share knowledge between team members and business partners to improve understanding of data insights and encourage their practical application. Participate in departmental meetings to provide updates on analytics work and communicate team needs for project success. Address day-to-day concerns related to data quality, methods, or implementation of team analytics solutions. Maintain regular communication with key stakeholders, focusing on those directly involved in current projects and team objectives. Supporting Role: This position contributes to analytics and insights generation within the commercial function, helping deliver data-driven solutions that support business objectives and informed decision-making at the departmental level. Collaborate with global teams and external vendors to ensure effective project delivery of market research and competitive intelligence initiatives. Performance indicators: Adherence to timeline, quality target Weightage: 10% This role is essential for driving robust analytics and insights generation across different franchises, supporting Sanofi's mission to tackle some of the world's greatest health threats through informed decision-making and strategic planning. Experience About you 8+ years of experience in pharmaceutical product Competitive Intelligence or Market Research (Primary/Secondary) or Medical Insights and analytics. Experience in the pharmaceutical industry is preferred. Experience in General Medicine/Specialty care/Vaccines Therapy Area is preferred. Extensive understanding of commercial operations and operating model. People Management experience for managing a team or function Familiarity with major business KPIs and processes, and up to date knowledge of CI, MR, Forecasting, SFE, and Medical Insights methodologies. Familiarity with common databases like Citeline, Evaluate, Cortellis, IQVIA, etc. Soft Skills Strong learning agility and ability to manage ambiguous environments. Ability to mentor and guide the team Excellent interpersonal and communication skills with strong presentation skills. Team player who is curious, dynamic, result-oriented, and collaborative. Strategic thinking in an ambiguous environment. Ability to operate effectively in an international matrix environment and work across time zones. Technical Skills Strong qualitative and quantitative market research, and data analytics capabilities. Knowledge of CI, statistical and programming tools (SPSS, Q, or similar) a plus Experience with statistical approaches such as conjoint, MaxDiff, linear regression, correlation, factor, and cluster analyses a plus Advanced MS Office skills (Excel and PowerPoint) a must. Slide creation skills to develop creative and impactful presentations. Preferred experience using analytical tools like Power BI, QlikSense, Tableau, Smartsheet, and Alteryx. Expert knowledge of Excel and/or proficiency in VBA, is a plus. Experience in developing and managing dashboards. Project management abilities to prioritize and handle multiple projects simultaneously. Aptitude for problem-solving and strategic thinking. Ability to synthesize complex information into clear and actionable insights. Proven ability to work effectively across all levels of stakeholders and diverse functions. Solid understanding of pharmaceutical development, manufacturing, supply chain, and marketing functions. Education Advanced degree in Pharma, Management, Statistics, Decision Sciences, Engineering, Life Sciences, Business Analytics, or related fields (PhD, MBA, or Master's preferred). Languages Excellent knowledge of English with strong written and spoken communication skills. Why chose us? Bring the miracles of science to life alongside a supportive, future-focused team. Discover endless opportunities to grow your talent and drive your career, whether it’s through a promotion or lateral move, at home or internationally. Enjoy a thoughtful, well-crafted rewards package that recognizes your contribution and amplifies your impact. Take good care of yourself and your family, with a wide range of health and wellbeing benefits including high-quality healthcare, prevention and wellness programs and at least 14 weeks’ gender-neutral parental leave. Play an instrumental part in creating best practice within our Go-to-Market Capabilities. null Pursue Progress . Discover Extraordinary . Join Sanofi and step into a new era of science - where your growth can be just as transformative as the work we do. We invest in you to reach further, think faster, and do what’s never-been-done-before. You’ll help push boundaries, challenge convention, and build smarter solutions that reach the communities we serve. Ready to chase the miracles of science and improve people’s lives? Let’s Pursue Progress and Discover Extraordinary – together. At Sanofi, we provide equal opportunities to all regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, protected veteran status or other characteristics protected by law.

Posted 1 month ago

Apply

4.0 years

0 Lacs

Delhi, India

On-site

JOB_POSTING-3-73069-3 Job Description Role Title: AVP, Detection Operations (L10) Company Overview Synchrony (NYSE: SYF) is a premier consumer financial services company delivering one of the industry’s most complete digitally enabled product suites. Our experience, expertise and scale encompass a broad spectrum of industries including digital, health and wellness, retail, telecommunications, home, auto, outdoors, pet and more. We have recently been ranked #2 among India’s Best Companies to Work for by Great Place to Work. We were among the Top 50 India’s Best Workplaces in Building a Culture of Innovation by All by GPTW and Top 25 among Best Workplaces in BFSI by GPTW. We have also been recognized by AmbitionBox Employee Choice Awards among the Top 20 Mid-Sized Companies, ranked #3 among Top Rated Companies for Women, and Top-Rated Financial Services Companies. Synchrony celebrates ~52% women talent. We offer Flexibility and Choice for all employees and provide best-in-class employee benefits and programs that cater to work-life integration and overall well-being. We provide career advancement and upskilling opportunities, focusing on Advancing Diverse Talent to take up leadership roles. Organizational Overview This role resides in the Security Automation and Detection Operations organization which is global team responsible for streamlining security events through automation and optimizing detection development. This team partners closely with Technical Intel, JSOC, and other partners to develop and deliver high fidelity security alerting to protect Synchrony from cyber threats. Role Summary/Purpose The AVP, Detection Operations candidate is responsible for managing and optimizing the Splunk ES (Enterprise Security) to enhance security operations and threat detection. Responsibilities include managing Splunk Mission Control for improving incident response workflows. Key duties include building and maintaining Splunk ES data models, assets, and identities to improve analytics, entity correlation, and security posture. The role requires developing and managing alert actions to automate and optimize threat detection and response processes. Additionally, this position involves leveraging CDLC pipelines to facilitate detection logic integration. Automated validation of logs and detection logic is also essential to ensure accuracy and reliability in threat detection and response. In this role, a combination of technical expertise in Splunk ES, security operations, and automation is required to enhance system performance, ensure timely response to security incidents, and drive efficient security analytics. Key Responsibilities Splunk Mission Control: Develop and manage Splunk Mission Control to enhance incident response capabilities and streamline security operations. CDLC Pipelines/ Detection as Code: Employ CDLC pipelines to expedite and integrate detection logic across systems. Automated Validation: Develop automated validation mechanisms for critical logs and detection logic, ensuring high accuracy and reliability in threat detection. Required Skills/Knowledge Bachelors degree with 4+ years of experience with Information Security along with Splunk ES and in lieu of degree with 6+ years of experience required. 4 years of Splunk ES Administration: Expertly manage the overall administration of Splunk ES, ensuring optimal performance, scalability, and reliability of the system. 4 years of Splunk Search Processing Language (SPL): Proficiently utilize Splunk SPL for querying, analyzing, and visualizing data to inform timely security decisions. 4 years of Data Models: Build, manage, and effectively leverage Splunk ES data models to enhance data analytics, security insights, and detection logic. Assets & Identities: Construct and manage comprehensive Splunk ES assets and identities, ensuring accurate security posture and entity correlation. Alert Actions: Develop, manage, and leverage Splunk ES alert actions to automate and optimize threat detection and response processes. Programming Expertise: Utilize Python and HTTP client programming to integrate and automate security solutions efficiently. Desired Skills/Knowledge Previous experience in working with or in SOC and Incident Response programs Experienced working in organizations that leverage agile methodologies. Experience working in cloud environments (AWS/Azure). Eligibility Criteria Bachelors degree with 4+ years of experience with Information Security along with Splunk ES and in lieu of degree with 6+ years of experience required. Work Timings : 3pm to 12am IST This role qualifies for Enhanced Flexibility and Choice offered in Synchrony India and will require the incumbent to be available between 06:00 AM Eastern Time – 11:30 AM Eastern Time (timings are anchored to US Eastern hours and will adjust twice a year locally). This window is for meetings with India and US teams. The remaining hours will be flexible for the employee to choose. Exceptions may apply periodically due to business needs. Please discuss this with the hiring manager for more details . For Internal Applicants Understand the criteria or mandatory skills required for the role, before applying Inform your manager and HRM before applying for any role on Workday Ensure that your professional profile is updated (fields such as education, prior experience, other skills) and it is mandatory to upload your updated resume (Word or PDF format) Must not be any corrective action plan (First Formal/Final Formal, LPP) L8+ Employees who have completed 18 months in the organization and 12 months in current role and level are only eligible L08+ Employees can apply Grade/Level:10 Job Family Group Information Technology

Posted 1 month ago

Apply

4.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

JOB_POSTING-3-73069-2 Job Description Role Title: AVP, Detection Operations (L10) Company Overview Synchrony (NYSE: SYF) is a premier consumer financial services company delivering one of the industry’s most complete digitally enabled product suites. Our experience, expertise and scale encompass a broad spectrum of industries including digital, health and wellness, retail, telecommunications, home, auto, outdoors, pet and more. We have recently been ranked #2 among India’s Best Companies to Work for by Great Place to Work. We were among the Top 50 India’s Best Workplaces in Building a Culture of Innovation by All by GPTW and Top 25 among Best Workplaces in BFSI by GPTW. We have also been recognized by AmbitionBox Employee Choice Awards among the Top 20 Mid-Sized Companies, ranked #3 among Top Rated Companies for Women, and Top-Rated Financial Services Companies. Synchrony celebrates ~52% women talent. We offer Flexibility and Choice for all employees and provide best-in-class employee benefits and programs that cater to work-life integration and overall well-being. We provide career advancement and upskilling opportunities, focusing on Advancing Diverse Talent to take up leadership roles. Organizational Overview This role resides in the Security Automation and Detection Operations organization which is global team responsible for streamlining security events through automation and optimizing detection development. This team partners closely with Technical Intel, JSOC, and other partners to develop and deliver high fidelity security alerting to protect Synchrony from cyber threats. Role Summary/Purpose The AVP, Detection Operations candidate is responsible for managing and optimizing the Splunk ES (Enterprise Security) to enhance security operations and threat detection. Responsibilities include managing Splunk Mission Control for improving incident response workflows. Key duties include building and maintaining Splunk ES data models, assets, and identities to improve analytics, entity correlation, and security posture. The role requires developing and managing alert actions to automate and optimize threat detection and response processes. Additionally, this position involves leveraging CDLC pipelines to facilitate detection logic integration. Automated validation of logs and detection logic is also essential to ensure accuracy and reliability in threat detection and response. In this role, a combination of technical expertise in Splunk ES, security operations, and automation is required to enhance system performance, ensure timely response to security incidents, and drive efficient security analytics. Key Responsibilities Splunk Mission Control: Develop and manage Splunk Mission Control to enhance incident response capabilities and streamline security operations. CDLC Pipelines/ Detection as Code: Employ CDLC pipelines to expedite and integrate detection logic across systems. Automated Validation: Develop automated validation mechanisms for critical logs and detection logic, ensuring high accuracy and reliability in threat detection. Required Skills/Knowledge Bachelors degree with 4+ years of experience with Information Security along with Splunk ES and in lieu of degree with 6+ years of experience required. 4 years of Splunk ES Administration: Expertly manage the overall administration of Splunk ES, ensuring optimal performance, scalability, and reliability of the system. 4 years of Splunk Search Processing Language (SPL): Proficiently utilize Splunk SPL for querying, analyzing, and visualizing data to inform timely security decisions. 4 years of Data Models: Build, manage, and effectively leverage Splunk ES data models to enhance data analytics, security insights, and detection logic. Assets & Identities: Construct and manage comprehensive Splunk ES assets and identities, ensuring accurate security posture and entity correlation. Alert Actions: Develop, manage, and leverage Splunk ES alert actions to automate and optimize threat detection and response processes. Programming Expertise: Utilize Python and HTTP client programming to integrate and automate security solutions efficiently. Desired Skills/Knowledge Previous experience in working with or in SOC and Incident Response programs Experienced working in organizations that leverage agile methodologies. Experience working in cloud environments (AWS/Azure). Eligibility Criteria Bachelors degree with 4+ years of experience with Information Security along with Splunk ES and in lieu of degree with 6+ years of experience required. Work Timings : 3pm to 12am IST This role qualifies for Enhanced Flexibility and Choice offered in Synchrony India and will require the incumbent to be available between 06:00 AM Eastern Time – 11:30 AM Eastern Time (timings are anchored to US Eastern hours and will adjust twice a year locally). This window is for meetings with India and US teams. The remaining hours will be flexible for the employee to choose. Exceptions may apply periodically due to business needs. Please discuss this with the hiring manager for more details . For Internal Applicants Understand the criteria or mandatory skills required for the role, before applying Inform your manager and HRM before applying for any role on Workday Ensure that your professional profile is updated (fields such as education, prior experience, other skills) and it is mandatory to upload your updated resume (Word or PDF format) Must not be any corrective action plan (First Formal/Final Formal, LPP) L8+ Employees who have completed 18 months in the organization and 12 months in current role and level are only eligible L08+ Employees can apply Grade/Level:10 Job Family Group Information Technology

Posted 1 month ago

Apply

4.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

JOB_POSTING-3-73069 Job Description Role Title: AVP, Detection Operations (L10) Company Overview Synchrony (NYSE: SYF) is a premier consumer financial services company delivering one of the industry’s most complete digitally enabled product suites. Our experience, expertise and scale encompass a broad spectrum of industries including digital, health and wellness, retail, telecommunications, home, auto, outdoors, pet and more. We have recently been ranked #2 among India’s Best Companies to Work for by Great Place to Work. We were among the Top 50 India’s Best Workplaces in Building a Culture of Innovation by All by GPTW and Top 25 among Best Workplaces in BFSI by GPTW. We have also been recognized by AmbitionBox Employee Choice Awards among the Top 20 Mid-Sized Companies, ranked #3 among Top Rated Companies for Women, and Top-Rated Financial Services Companies. Synchrony celebrates ~52% women talent. We offer Flexibility and Choice for all employees and provide best-in-class employee benefits and programs that cater to work-life integration and overall well-being. We provide career advancement and upskilling opportunities, focusing on Advancing Diverse Talent to take up leadership roles. Organizational Overview This role resides in the Security Automation and Detection Operations organization which is global team responsible for streamlining security events through automation and optimizing detection development. This team partners closely with Technical Intel, JSOC, and other partners to develop and deliver high fidelity security alerting to protect Synchrony from cyber threats. Role Summary/Purpose The AVP, Detection Operations candidate is responsible for managing and optimizing the Splunk ES (Enterprise Security) to enhance security operations and threat detection. Responsibilities include managing Splunk Mission Control for improving incident response workflows. Key duties include building and maintaining Splunk ES data models, assets, and identities to improve analytics, entity correlation, and security posture. The role requires developing and managing alert actions to automate and optimize threat detection and response processes. Additionally, this position involves leveraging CDLC pipelines to facilitate detection logic integration. Automated validation of logs and detection logic is also essential to ensure accuracy and reliability in threat detection and response. In this role, a combination of technical expertise in Splunk ES, security operations, and automation is required to enhance system performance, ensure timely response to security incidents, and drive efficient security analytics. Key Responsibilities Splunk Mission Control: Develop and manage Splunk Mission Control to enhance incident response capabilities and streamline security operations. CDLC Pipelines/ Detection as Code: Employ CDLC pipelines to expedite and integrate detection logic across systems. Automated Validation: Develop automated validation mechanisms for critical logs and detection logic, ensuring high accuracy and reliability in threat detection. Required Skills/Knowledge Bachelors degree with 4+ years of experience with Information Security along with Splunk ES and in lieu of degree with 6+ years of experience required. 4 years of Splunk ES Administration: Expertly manage the overall administration of Splunk ES, ensuring optimal performance, scalability, and reliability of the system. 4 years of Splunk Search Processing Language (SPL): Proficiently utilize Splunk SPL for querying, analyzing, and visualizing data to inform timely security decisions. 4 years of Data Models: Build, manage, and effectively leverage Splunk ES data models to enhance data analytics, security insights, and detection logic. Assets & Identities: Construct and manage comprehensive Splunk ES assets and identities, ensuring accurate security posture and entity correlation. Alert Actions: Develop, manage, and leverage Splunk ES alert actions to automate and optimize threat detection and response processes. Programming Expertise: Utilize Python and HTTP client programming to integrate and automate security solutions efficiently. Desired Skills/Knowledge Previous experience in working with or in SOC and Incident Response programs Experienced working in organizations that leverage agile methodologies. Experience working in cloud environments (AWS/Azure). Eligibility Criteria Bachelors degree with 4+ years of experience with Information Security along with Splunk ES and in lieu of degree with 6+ years of experience required. Work Timings : 3pm to 12am IST This role qualifies for Enhanced Flexibility and Choice offered in Synchrony India and will require the incumbent to be available between 06:00 AM Eastern Time – 11:30 AM Eastern Time (timings are anchored to US Eastern hours and will adjust twice a year locally). This window is for meetings with India and US teams. The remaining hours will be flexible for the employee to choose. Exceptions may apply periodically due to business needs. Please discuss this with the hiring manager for more details . For Internal Applicants Understand the criteria or mandatory skills required for the role, before applying Inform your manager and HRM before applying for any role on Workday Ensure that your professional profile is updated (fields such as education, prior experience, other skills) and it is mandatory to upload your updated resume (Word or PDF format) Must not be any corrective action plan (First Formal/Final Formal, LPP) L8+ Employees who have completed 18 months in the organization and 12 months in current role and level are only eligible L08+ Employees can apply Grade/Level:10 Job Family Group Information Technology

Posted 1 month ago

Apply

4.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

JOB_POSTING-3-73069-1 Job Description Role Title: AVP, Detection Operations (L10) Company Overview Synchrony (NYSE: SYF) is a premier consumer financial services company delivering one of the industry’s most complete digitally enabled product suites. Our experience, expertise and scale encompass a broad spectrum of industries including digital, health and wellness, retail, telecommunications, home, auto, outdoors, pet and more. We have recently been ranked #2 among India’s Best Companies to Work for by Great Place to Work. We were among the Top 50 India’s Best Workplaces in Building a Culture of Innovation by All by GPTW and Top 25 among Best Workplaces in BFSI by GPTW. We have also been recognized by AmbitionBox Employee Choice Awards among the Top 20 Mid-Sized Companies, ranked #3 among Top Rated Companies for Women, and Top-Rated Financial Services Companies. Synchrony celebrates ~52% women talent. We offer Flexibility and Choice for all employees and provide best-in-class employee benefits and programs that cater to work-life integration and overall well-being. We provide career advancement and upskilling opportunities, focusing on Advancing Diverse Talent to take up leadership roles. Organizational Overview This role resides in the Security Automation and Detection Operations organization which is global team responsible for streamlining security events through automation and optimizing detection development. This team partners closely with Technical Intel, JSOC, and other partners to develop and deliver high fidelity security alerting to protect Synchrony from cyber threats. Role Summary/Purpose The AVP, Detection Operations candidate is responsible for managing and optimizing the Splunk ES (Enterprise Security) to enhance security operations and threat detection. Responsibilities include managing Splunk Mission Control for improving incident response workflows. Key duties include building and maintaining Splunk ES data models, assets, and identities to improve analytics, entity correlation, and security posture. The role requires developing and managing alert actions to automate and optimize threat detection and response processes. Additionally, this position involves leveraging CDLC pipelines to facilitate detection logic integration. Automated validation of logs and detection logic is also essential to ensure accuracy and reliability in threat detection and response. In this role, a combination of technical expertise in Splunk ES, security operations, and automation is required to enhance system performance, ensure timely response to security incidents, and drive efficient security analytics. Key Responsibilities Splunk Mission Control: Develop and manage Splunk Mission Control to enhance incident response capabilities and streamline security operations. CDLC Pipelines/ Detection as Code: Employ CDLC pipelines to expedite and integrate detection logic across systems. Automated Validation: Develop automated validation mechanisms for critical logs and detection logic, ensuring high accuracy and reliability in threat detection. Required Skills/Knowledge Bachelors degree with 4+ years of experience with Information Security along with Splunk ES and in lieu of degree with 6+ years of experience required. 4 years of Splunk ES Administration: Expertly manage the overall administration of Splunk ES, ensuring optimal performance, scalability, and reliability of the system. 4 years of Splunk Search Processing Language (SPL): Proficiently utilize Splunk SPL for querying, analyzing, and visualizing data to inform timely security decisions. 4 years of Data Models: Build, manage, and effectively leverage Splunk ES data models to enhance data analytics, security insights, and detection logic. Assets & Identities: Construct and manage comprehensive Splunk ES assets and identities, ensuring accurate security posture and entity correlation. Alert Actions: Develop, manage, and leverage Splunk ES alert actions to automate and optimize threat detection and response processes. Programming Expertise: Utilize Python and HTTP client programming to integrate and automate security solutions efficiently. Desired Skills/Knowledge Previous experience in working with or in SOC and Incident Response programs Experienced working in organizations that leverage agile methodologies. Experience working in cloud environments (AWS/Azure). Eligibility Criteria Bachelors degree with 4+ years of experience with Information Security along with Splunk ES and in lieu of degree with 6+ years of experience required. Work Timings : 3pm to 12am IST This role qualifies for Enhanced Flexibility and Choice offered in Synchrony India and will require the incumbent to be available between 06:00 AM Eastern Time – 11:30 AM Eastern Time (timings are anchored to US Eastern hours and will adjust twice a year locally). This window is for meetings with India and US teams. The remaining hours will be flexible for the employee to choose. Exceptions may apply periodically due to business needs. Please discuss this with the hiring manager for more details . For Internal Applicants Understand the criteria or mandatory skills required for the role, before applying Inform your manager and HRM before applying for any role on Workday Ensure that your professional profile is updated (fields such as education, prior experience, other skills) and it is mandatory to upload your updated resume (Word or PDF format) Must not be any corrective action plan (First Formal/Final Formal, LPP) L8+ Employees who have completed 18 months in the organization and 12 months in current role and level are only eligible L08+ Employees can apply Grade/Level:10 Job Family Group Information Technology

Posted 1 month ago

Apply

4.0 years

0 Lacs

Pune, Maharashtra, India

On-site

JOB_POSTING-3-73069-5 Job Description Role Title: AVP, Detection Operations (L10) Company Overview Synchrony (NYSE: SYF) is a premier consumer financial services company delivering one of the industry’s most complete digitally enabled product suites. Our experience, expertise and scale encompass a broad spectrum of industries including digital, health and wellness, retail, telecommunications, home, auto, outdoors, pet and more. We have recently been ranked #2 among India’s Best Companies to Work for by Great Place to Work. We were among the Top 50 India’s Best Workplaces in Building a Culture of Innovation by All by GPTW and Top 25 among Best Workplaces in BFSI by GPTW. We have also been recognized by AmbitionBox Employee Choice Awards among the Top 20 Mid-Sized Companies, ranked #3 among Top Rated Companies for Women, and Top-Rated Financial Services Companies. Synchrony celebrates ~52% women talent. We offer Flexibility and Choice for all employees and provide best-in-class employee benefits and programs that cater to work-life integration and overall well-being. We provide career advancement and upskilling opportunities, focusing on Advancing Diverse Talent to take up leadership roles. Organizational Overview This role resides in the Security Automation and Detection Operations organization which is global team responsible for streamlining security events through automation and optimizing detection development. This team partners closely with Technical Intel, JSOC, and other partners to develop and deliver high fidelity security alerting to protect Synchrony from cyber threats. Role Summary/Purpose The AVP, Detection Operations candidate is responsible for managing and optimizing the Splunk ES (Enterprise Security) to enhance security operations and threat detection. Responsibilities include managing Splunk Mission Control for improving incident response workflows. Key duties include building and maintaining Splunk ES data models, assets, and identities to improve analytics, entity correlation, and security posture. The role requires developing and managing alert actions to automate and optimize threat detection and response processes. Additionally, this position involves leveraging CDLC pipelines to facilitate detection logic integration. Automated validation of logs and detection logic is also essential to ensure accuracy and reliability in threat detection and response. In this role, a combination of technical expertise in Splunk ES, security operations, and automation is required to enhance system performance, ensure timely response to security incidents, and drive efficient security analytics. Key Responsibilities Splunk Mission Control: Develop and manage Splunk Mission Control to enhance incident response capabilities and streamline security operations. CDLC Pipelines/ Detection as Code: Employ CDLC pipelines to expedite and integrate detection logic across systems. Automated Validation: Develop automated validation mechanisms for critical logs and detection logic, ensuring high accuracy and reliability in threat detection. Required Skills/Knowledge Bachelors degree with 4+ years of experience with Information Security along with Splunk ES and in lieu of degree with 6+ years of experience required. 4 years of Splunk ES Administration: Expertly manage the overall administration of Splunk ES, ensuring optimal performance, scalability, and reliability of the system. 4 years of Splunk Search Processing Language (SPL): Proficiently utilize Splunk SPL for querying, analyzing, and visualizing data to inform timely security decisions. 4 years of Data Models: Build, manage, and effectively leverage Splunk ES data models to enhance data analytics, security insights, and detection logic. Assets & Identities: Construct and manage comprehensive Splunk ES assets and identities, ensuring accurate security posture and entity correlation. Alert Actions: Develop, manage, and leverage Splunk ES alert actions to automate and optimize threat detection and response processes. Programming Expertise: Utilize Python and HTTP client programming to integrate and automate security solutions efficiently. Desired Skills/Knowledge Previous experience in working with or in SOC and Incident Response programs Experienced working in organizations that leverage agile methodologies. Experience working in cloud environments (AWS/Azure). Eligibility Criteria Bachelors degree with 4+ years of experience with Information Security along with Splunk ES and in lieu of degree with 6+ years of experience required. Work Timings : 3pm to 12am IST This role qualifies for Enhanced Flexibility and Choice offered in Synchrony India and will require the incumbent to be available between 06:00 AM Eastern Time – 11:30 AM Eastern Time (timings are anchored to US Eastern hours and will adjust twice a year locally). This window is for meetings with India and US teams. The remaining hours will be flexible for the employee to choose. Exceptions may apply periodically due to business needs. Please discuss this with the hiring manager for more details . For Internal Applicants Understand the criteria or mandatory skills required for the role, before applying Inform your manager and HRM before applying for any role on Workday Ensure that your professional profile is updated (fields such as education, prior experience, other skills) and it is mandatory to upload your updated resume (Word or PDF format) Must not be any corrective action plan (First Formal/Final Formal, LPP) L8+ Employees who have completed 18 months in the organization and 12 months in current role and level are only eligible L08+ Employees can apply Grade/Level:10 Job Family Group Information Technology

Posted 1 month ago

Apply

15.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Solution Architect (Network Traffic & Flow Data systems) Location: Pune, India (with Travel to Onsite) Experience Required: 15+ years in solution architecture with at least 5 years in telecom data systems, network traffic monitoring, or real-time data streaming platforms. Overview : We are seeking a senior solution Architect to lead the design, integration, and delivery of a large-scale network traffic and data flow system. This role is accountable for ensuring architectural integrity, zero-error tolerance, and robust fallback mechanisms across the entire solution lifecycle. The architect will oversee subscriber data capture, DPI, DR generation, Kafka integration, DWH ingestion. and secure API-based retrieval, ensuring compliance and security regulations. Key Responsibilities: Own the end-to-end architecture spanning subscriber traffic capture, DPI, DR generation, Kafka streaming, and data lake ingestion. Design and document system architecture, data flow diagrams, and integration blueprints across DPI and traffic classification systems, nProbe, Kafka. Spark, and Cloudera CDP Implement fallback and error-handling mechanisms to ensure zero data loss and high availability across all layers. Lead cross-functional collaboration with network engineers, Kafka developers. data platform teams, and security stakeholders. Ensure data govemance, encryption, and compliance using tools like Apache Ranger, Atlas, SDX, and HashiCorp Vault. Oversee API design and exposure for customer access, including advanced search, session correlation, and audit logging. Drive SIT/UAT planning, performance benchmarking, and production rollout readiness. Provide technical leadership across multiple vendors and internal teams, ensuring alignment with Business requirements and regulatory standards, Required Skills & Qualifications: Proven experience in telecom-grade architecture involving DPI, IPFIX/NefFlow, and subscriber metadata enrichment. Deep knowledge of Apache Kafka, Spark Structured Streaming, and Cloudera CDP (HDFS, Hive, Iceberg, Ranger). Experience integrating QPtobe with Kafka and downstream analyfics platforms. Strong understanding of QoE metrics, A/B party correlation, and application traffic classification. Expertise in RESTful API design, schema management (Avro/JSON), and secure data access protocols. Familiarity with network interfaces (Gn/Gi, Radius, DNS) and traffic filtering strategies. Experience implementing fallback mechanisms, error queues, and disaster recovery strategies. Excellent communication, documentation, and stakeholder management skills. Cloudera Certified Architect / Kafka Developer / AWS or GCP Solution Architect. Security certifications (e.g., CISSP, CISM) will be advantageous

Posted 1 month ago

Apply

25.0 years

0 Lacs

Greater Kolkata Area

On-site

Recruitment Fraud Alert We’ve learned that scammers are impersonating Commvault team members—including HR and leadership—via email or text. These bad actors may conduct fake interviews and ask for personal information, such as your social security number. What To Know Commvault does not conduct interviews by email or text. We will never ask you to submit sensitive documents (including banking information, SSN, etc) before your first day. If you suspect a recruiting scam, please contact us at wwrecruitingteam@commvault.com About Commvault Commvault (NASDAQ: CVLT) is the gold standard in cyber resilience. The company empowers customers to uncover, take action, and rapidly recover from cyberattacks – keeping data safe and businesses resilient. The company’s unique AI-powered platform combines best-in-class data protection, exceptional data security, advanced data intelligence, and lightning-fast recovery across any workload or cloud at the lowest TCO. For over 25 years, more than 100,000 organizations and a vast partner ecosystem have relied on Commvault to reduce risks, improve governance, and do more with data. Senior Site Reliability Engineer - Cloud Security The Opportunity We have an outstanding career opportunity for Senior Engineer- Site Reliability at Bangalore, Hyderabad and Pune locations. In this role you will design, implement, and maintain highly available and scalable infrastructure. What You’ll Do… Develop and maintain automation tools to improve the efficiency and reliability of our systems. Collaborate with development teams to ensure that applications are designed with security and reliability in mind. Monitor system performance and troubleshoot issues to ensure optimal performance and reliability. Implement and maintain security best practices across all systems and applications. Conduct regular security assessments and vulnerability scans to identify and mitigate potential risks. Respond to security incidents and work with the security team to resolve them. Document and maintain standard operating procedures and best practices. Who You Are… Bachelor's degree required. 3+ years in a Site Reliability Engineer (SRE) or DevSecOps role with a focus on security. Strong experience with cloud security services on major platforms such as AWS, Azure, or Google Cloud. Good Understanding of Linux Operating systems Proficiency in languages such as GO, Python, or PowerShell. Experience with configuration management tools such as Terraform. Understanding of common security vulnerabilities and exploits. Good understanding of Networking and Network Protocols Familiarity with access control mechanisms (IAM, RBAC). Experience with CI/CD pipelines for security checks. Implementation and management of security monitoring tools. Ability to design effective alerting systems for security incidents. Log analysis and correlation for threat detection. Strong background in security, including experience with security assessments, vulnerability scanning, and incident response Certifications such as AWS Certified DevOps Engineer or Certified Information Systems Security Professional (CISSP) is desired. Security and SaaS experience strongly preferred. You’ll Love Working Here Because Employee stock purchase plan (ESPP) Continuous professional development, product training, and career pathing Annual health check-ups, Car lease Program, and Tuition Reimbursement An inclusive company culture, an opportunity to join our Community Guilds Personal accident cover and Term life cover Ready to #makeyourmark at Commvault? Apply now! Commvault is an equal opportunity workplace and is an affirmative action employer. We are always committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status and we will not discriminate against on the basis of such characteristics or any other status protected by the laws or regulations in the locations where we work. Commvault’s goal is to make interviewing inclusive and accessible to all candidates and employees. If you have a disability or special need that requires accommodation to participate in the interview process or apply for a position at Commvault, please email accommodations@commvault.com For any inquiries not related to an accommodation please reach out to wwrecruitingteam@commvault.com. Commvault's Privacy Policy

Posted 1 month ago

Apply

4.0 years

0 Lacs

India

Remote

Job Role: Sr. Cyber Security Engineer(L3) Type: Full Time Location: Remote Intraedge is seeking a seasoned Cybersecurity Engineer on behalf of its financial domain client to support advanced threat detection, data-driven defense, and automation within a cloud-first, consumer-centric environment. This role will lead the development and implementation of intelligent security solutions using SIEM, SOAR, and machine learning to enhance detection, response, and operational efficiency across the enterprise. Key Responsibilities * Design, implement, and manage enterprise SIEM (Splunk) solutions for centralized log analysis and real-time event monitoring. * Develop and fine-tune correlation rules, alerts, dashboards , and use cases to detect anomalous and malicious activity. * Lead data ingestion and normalization from varied enterprise systems (e.g., cloud workloads, endpoints, network devices). * Develop and maintain SOAR playbooks to automate incident detection, triage, response, and recovery. * Optimize SOAR workflows and integrations with security infrastructure to reduce MTTD/MTTR. * Build and apply machine learning models to identify security anomalies, enrich event context, and predict threats. * Collaborate with Security Operations Center (SOC) , DevOps , IT , and business units to align security automation with business goals. * Analyze incident data to uncover trends and provide recommendations for improving controls and detection. * Maintain detailed documentation for playbooks, integrations, automation processes, and incident response protocols. * Stay abreast of industry trends and emerging tools to continually advance detection and automation strategies. * Mentor junior engineers and assist in promoting SOAR and SIEM best practices across the team. Required Qualifications * 4+ years of experience in cybersecurity engineering , including SIEM (Splunk), SOAR, and machine learning-based threat detection. * 3+ years of experience in security automation using platforms such as Splunk SOAR, XSOAR, Swimlane , or similar. * 3+ years in cyber data engineering or analytics: log processing, enrichment, and telemetry pipelines. * Expertise in scripting languages like Python and PowerShell , and using REST APIs for integrations. * Proven experience designing and deploying security automation workflows in enterprise environments. * Bachelor's degree in Computer Science , Information Security , Engineering , or related field-or equivalent experience. * Ability to troubleshoot complex security issues and integrate with diverse platforms. * Strong communication and collaboration skills to work with technical and non-technical stakeholders. Preferred Qualifications * Hands-on experience with cloud platforms such as AWS , Azure , or Google Cloud Platform . * Familiarity with cloud-native security tooling , telemetry pipelines, and serverless security design patterns. * Experience working within Agile environments and cross-functional DevSecOps teams. * Knowledge of change management processes , compliance frameworks (e.g., NIST, ISO), and regulatory constraints in financial services.

Posted 1 month ago

Apply

9.0 years

3 - 8 Lacs

Hyderābād

On-site

Job Description Overview We are looking for a self-driven, software engineering mindset SRE support engineer enabling an SRE-driven orchestration of all components of the end2end ecosystem & preemptively diagnosing anomalies and remediating through automation. The SRE support engineer is integral part of the global team with its main purpose to provide a delightful customer experience for the user of the global consumer, commercial, supply chain and enablement functions in the PepsiCo digital products application portfolio of 260+ applications, enabling a full SRE Practice incident prevention / proactive resolution model. The scope of this role is focussed on the Modern architected application portfolio, B2B pepsiconnect and Direct to Customer and other S&T roadmap applications. Ensures that PepsiCo DPA applications service performance,reliability and availability expected by our customers and internal groups It requires a blend of technical expertise on SRE tools, modern applications arhictecture, IT operations experience, and analytics & influence skills. Responsibilities Reporting directly to the SRE & Modern Operations Associate Director, is responsible to enable & execute the pre-emptive diagnosis of PepsiCo applications towards service performance, reliability and availability expected by our customers and internal groups Responsible as pro-active support engineer, diagnosing any anomalies prior to any user and driving the necessary remediations across the teams involved. Develop / leverage aggregation correlation solutions that integrates events across all eco system component of the modern architecture solution and comes up with insights to continuously improve the user journey and order flow experience collaborating with software engineering teams. Drive incident response, root cause analysis (RCA), and post-mortem processes to ensure continuous improvement. Develop and maintain robust monitoring, alerting, and observability frameworks using tools like Grafana, ELK, etc. Collaborate with product and engineering teams during the design and development phases to embed reliability and operability into new services. Participate in architecture reviews and provide SRE input on scalability, fault tolerance, and deployment strategies. Define and implement SLOs/SLIs for new services before they go live, ensuring alignment with business objectives. Work closely with customer facing support teams to evolve & empower them with SRE insights Participate in on-call support and orchestrating blameless post-mortems and encourage the practice within the organization Provides inputs to the definition, collection and analysis of data relevant products systems and their interactions towards business process resiliency especially related impacting customer satisfaction, Actively engage and drive AI Ops adoption across teams Qualifications 9-11 years of work experience evolving to a SRE engineer with 3-5 years of experience in continuously improving and transforming IT operations ways of working Bachelor’s degree in Computer Science, Information Technology or a related field The ideal Engineer will be highly quantitative, have great judgment, able to connect dots across ecosytems, and efficiently work cross-functionally across teams to ensure SRE orchestrating solutions are meeting customer/end-user expectations The candidate will take a pragmatic approach resolving incidents, including the ability to systemically triangulate root causes and work effectively with external and internal teams to meet objectives. A firm understanding of SRE (Software Reliability Engineering) and IT Service Management (ITSM) processes with a track record for improving service offerings – pro-actively resolving incidents, providing a seamless customer/end-user experience and proactively identifying and mitigating areas of risk. Proven experience as an SRE in designing the events diagnostics, performance measures and alert solutions to meet the SLA/SLO/SLIs. Hands on experience in Python, SQL, relational or non-relational DBs, AppDynamics, Grafana, Splunk, Dynatrace, or other SRE Ops toolsets. Deep hands-on technical expertise, excellent verbal and written communication skills Differentiating Competencies Driving for Results: Demonstrates perseverance and resilience in the pursuit of goals. Confronts and works to resolve tough issues. Exhibits a “can-do” attitude and a willingness to take on significant challenges Decision Making: Quickly analyses complex problems to find actionable, pragmatic solutions. Sees connections in data, events, trends, etc. Consistently works against the right priorities Collaborating: Collaborates well with others to deliver results. Keeps others informed so there are no unnecessary surprises. Effectively listens to and understands what other people are saying. Communicating and Influencing: Ability to build convincing, persuasive, and logical storyboards. Strong executive presence. Able to communicate effectively and succinctly, both verbally and on paper. Motivating and Inspiring Others: Demonstrates a sense of passion, enjoyment, and pride about their work. Demonstrates a positive attitude in the workplace. Embraces and adapts well to change. Creates a work environment that makes work rewarding and enjoyable.

Posted 1 month ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

On-site

About noon noon, the region's leading consumer commerce platform. On December 12th, 2017, noon launched its consumer platform in Saudi Arabia and the UAE, expanding to Egypt in February 2019. The noon ecosystem of services now includes marketplaces for food delivery, quick-commerce, fintech, and fashion. noon is a work in progress; we’re six years in, but only 5% done. noon’s mission: every door, everyday. What we are looking for Noon’s Cybersecurity department, Security operations team is looking for a talented, experienced, and enthusiastic Senior Threat Detection Engineer to help build and scale the Detection & Threat Hunting program at Noon. The ideal candidate will be someone who has diverse security skill-set (IR, TI, SOC..) and specialized in detecting engineering and threat hunting. The focus area for this role will be on designing and implementing advanced detection mechanisms based on known/emerging attacks and pivoting techniques. The Sr. Threat Detection will be working on proactive approaches to advance steps ahead of attackers and help in building detection to identify advanced, current and emerging threats. He will be responsible for the design and implementation of security intelligence and detection capabilities across our applications and networks. This role will be assisting in building the strategy and the team for our Detection and Threat Hunting Program. He will be the focal point for the planning and execution of security investigation, response process and coordination of relevant parties when an information security incident occurs. In addition, documentation, analytical and critical thinking skills, investigation and forensics, and the ability to identify needs and take the initiative are key requirements of this position. About the role Help build and scale the Detection & Threat hunting Program at Noon Drive improvements in detection and response capabilities, and operations for the Internal SOC/TI Write detection signatures, tune security monitoring systems/ tools, develop automation scripts and correlation rules. Work closely with other Security Team members to strengthen our detection and defence mechanisms in regards to, Web applications, Cloud and Network. Exhibit knowledge of attacker lifecycle, TTPs, indicators of compromise (IOCs), and proactively implementing countermeasures to neutralize the threats. Identifies opportunities to enhance the development and implementation of new methods for detecting attacks and malicious activities. Participate as a member of the CSIRT during major incidents and lend contributions to post-Incident review and continuous improvement Proactive threat hunting of anomalies to identify IOCs and derive custom snort signatures for the IOCs Identifying and managing a wide range of intelligence sources to provide a holistic view of the threat landscape. (OSINT aggregation) Work closely with the Red Team and Blue Team to implement custom detection of new and emerging threats, and develop monitoring use cases. Coordinate in red teaming activities such as table-top and adversarial simulation exercises. Responsible for owning all confirmed incidents. This includes publishing Incident Report, documenting Lessons Learnt and updating Knowledge Base. Required Expertise: Required: Senior level experience in a threat intel, detection, IR, or similar cybersecurity roles for medium to large organizations. Required: Technical professional security certifications in Incident Response, Digital Forensics, Offensive Security, or Malware Analysis, such as GCIH, GCFA, GNFA, GCTI, OSCP or similar Bachelor’s degree in Computing, Information Technology, Engineering or a related field, with a strong security component. Hands-on experience in detection engineering, advanced cyber threat intelligence activities, intrusion detection, incident response, and security content development (e.g., signatures, rules, etc.) A broad and diverse security skill-set with an advanced understanding of modern network security technologies (e.g. Firewalls, Intrusion Detection/Prevention Systems, Access Control Lists, Network Segmentation, SIEMs, Auditing/Logging and Identity & Access Management solutions, DDoS protection etc.). Knowledge of at least one common scripting language (Python, Ruby, Go). Experience handling and building a SOAR such as Chronicle’s SOAR, Demisto, Phantom or similar tools. Experience conducting and leading incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Insider Threats .. etc. Understanding of log collection and aggregation techniques, Elastic Search, Logstash, Kibana (ELK), Syslog-NG, Windows Event Forwarding (WEF), etc. Experience with endpoint security agents (Carbon Black, Crowdstrike, etc.). Preferred Qualifications: Hands on experience with Chronicle SIEM/SOAR and Google SecOps Expertise in threat hunting in one or more public cloud solutions such as AWS and GCP Ability to work with a team or independently with minimal direction/leadership Hands-on experience in offensive/defensive web applications security is a big plus for this role. Highly motivated and self-directed with a passion for solving complex problems Establishes industry expertise through writing, speaking or online presence. Who will excel? We’re looking for people with high standards, who understand that hard work matters. You need to be relentlessly resourceful and operate with a deep bias for action. We need people with the courage to be fiercely original. noon is not for everyone; readiness to adapt, pivot, and learn is essential.

Posted 1 month ago

Apply

7.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Supervising Security Analyst - Cyber Triage and Forensics Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity The Senior Security Analyst in Cyber Defense CTF (Cyber Triage and Forensics) plays a pivotal role in enhancing EY’s security posture by vigilantly monitoring, assessing, and managing incidents effectively. In collaboration with the team and leadership, to ensure strong security oversight and contribute to joint security monitoring and incident response initiatives. Key duties include triage, detailed investigations, clear communication, and comprehensive reporting, all contributing to the integrity and resilience of the EY’s cyber defenses. Essential Functions of the Job : You will work collaboratively to detect and respond to information security incidents, develop, maintain, and follow procedures for security event alerting, and participate in security investigations. Engage in proactive threat hunting and provide expert security assessments, utilizing EDR, SIEM, and other tools to understand and counteract the cybercrime landscape Communicate with IT stakeholders during incident response activities, ensuring effective containment, remediation, and accurate identification of compromise indicators Report on incident metrics, analyse findings, and develop reports to ensure comprehensive resolution and understanding of security events Act as an escalation point for incident response, shift lead, mentor junior team members, and contribute to team skill enhancement Analyse security events, provide feedback on security controls, and drive process improvements to strengthen the organization's security posture Maintain and improve security incident processes, protocols, and standard operating procedures to reflect best practices in security incident response Skills And Attributes For Success Proficient in Cyber investigation including evidence management in line with best practices and using advanced tools for threat detection and incident management including advanced querying with KQL Proficient in analyzing varied data sets, identifying malware, and conducting comprehensive security event analysis from network traffic attributes and host-based attributes to detect information security incidents and latent threats. Proficient in conducting detailed forensic investigations across various operating systems, with a keen eye for obfuscation and the ability to clearly communicate findings In-depth understanding of Active Directory security, with strong scripting abilities to automate response measures and improve operational effectiveness To qualify for the role, you must have Undergraduate or Postgraduate Degree in Computer Science, Engineering, or a related field (MCA/MTech/BTech/BCA/BSc CS or BSc IT) At least 7 years of overall experience with a minimum of 5 years specialized in incident response, computer forensics, and Security Operations. Proficiency in operating within a Security Monitoring/Security Operations Center (SOC) environment, including experience with CSIRT and CERT operations Demonstrated experience in investigating security events, threats, and vulnerabilities Strong understanding of electronic investigation and forensic methodologies, including log correlation, electronic data handling, investigative processes, and malware analysis In-depth knowledge of Windows and Unix/Linux operating systems, and experience with EDR solutions for threat detection and response Ideally, you’ll also Desired certifications such as SSCP, CEH, GCIH, GCFA, GCIA, GSEC, GIAC, Security+. Experience with security incident response in cloud environments, including Azure. Knowledge of legal considerations in electronic discovery and analysis Proficiency in scripting or programming (e.g., Shell scripting, PowerShell, C, C#, Python) Solid understanding of security best practices for network architecture and server configuration What We Look For Demonstrates integrity in a professional environment Strong ethical behavior Ability to work independently Possesses a global mindset for working with diverse cultures and backgrounds Knowledgeable in industry-standard security incident response processes, procedures, and lifecycle Positive attitude and Excellent teaming skills Excellent social, communication, and writing skills Good presentation skills Excellent investigative, analytical, and problem-solving skills Supervising Responsibilities: Coordinate escalations and collaborate with internal technology teams to ensure timely resolution of issues Provide mentoring and training to other team members as required, supporting their development and ensuring consistent team performance Other Requirements: Should be willing to work in shifts What We Offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. We ensure that individuals with disabilities are provided reasonable accommodations to participate in the job application or interview process, to perform essential job functions and to receive other benefits and privileges of employment. Please contact us to request accommodation. EY is committed to being an inclusive employer, and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. If you can confidently demonstrate that you meet the criteria above, please contact us as soon as possible. Make your mark. Apply now EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 month ago

Apply

1.0 - 2.0 years

0 Lacs

Gurugram, Haryana, India

On-site

At EY, we’re all in to shape your future with confidence. We’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world. Junior Security Analyst -Cyber Defense CTF (Cyber Triage and Forensics) Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity Cyber Triage and Forensics (CTF) - The Cyber Defense Response Center is responsible for monitoring and detecting information security events that could adversely impact EY information assets and resources. Its mission is aligned with the both the incident response and attack lifecycles A qualified candidate will have the opportunity to work with highly talent Cyber security professional experts to learn and develop new skills. Candidate will be exposed to many technologies and security tools whilst working with EY as well as career growth opportunity. CTF also deliver training to analysts to upskill. Your Key Responsibilities Perform front line accurate and precise real-time monitoring and analysis correlation of logs/alerts from a multitude of security devices with a focus on the determination of what was said as events constitute security incidents. Collaborate to detect and respond to information security incidents, develop, maintain, and follow procedures for security event alerting, and participate in security investigations. The CTF Junior Security Analyst must be competent to work at a technical level, be capable of identifying threats and vectors that cause security events and be able to follow defined procedures for mitigating said threats. Essential Functions of the Job : Respond to network and host based security events Participate in detecting, investigating, and resolving security events Identify and propose areas for improvement within the Cyber Defense Response Center Provide documentation and project support Serve as an escalation point for difficult problems and complex inquiries Server as shift lead when necessary Conduct detailed security event analysis from network traffic attributes and host-based attributes ( binary analysis, etc) to identify information security incidents Provide feedback on security control capability gaps based off of security intrusion trends Develop and maintain analytical procedures to improve security incident identification efficiency Demonstrate ability to drive process improvements and identify gaps Skills And Attributes For Success Information Security Principles, Technologies, and Practices Experience with multiple security event detection platforms Fair understanding of Linux, TCP/IP, Network Security, encryption standards etc Aware of Types of attacks (DOS, DDOS etc) Understand basic IDS / IPS rules to identify and/or prevent malicious activity Aware of security log analysis. Idea about various penetration testing and application testing methodology and tools is a definite plus. Comfortable navigating and troubleshooting Linux and Windows system issues To qualify for the role you must have Capability of working independently Soft Skills - Excellent communication skills; written and verbal. Good Presentation skills Good Investigative, analytical and problem solving skills Ability to work in a team, with little supervision and using own initiative Experience: Minimum of 1-2 years of experience in one or more of the following: Working in a Security Monitoring/Security Operations Center environment (SOC) Experience investigating security events, threats and/or vulnerabilities Understanding of electronic investigation and log correlation Proficiency with the latest intrusion detection platforms; working knowledge of Linux and/or Windows systems administration (Including AD). Scripting or programming (Shell scripting, Power Shell, C, C#, Java, etc) Qualifications, certifications and Education requirements: Under Graduate/Post Graduate Degree in Computer Science or Engineering or related domain (MCA/MTech/BTech/BCA /BSc CS or BSc IT). Desired Certifications: Any Cyber Security Certification Ideally, you’ll also have Good demeanour. Willingness to work a flexible shifts with schedules that includes nights, weekends and holidays; shifts can changed based on business needs. Demonstrated integrity in a professional environment Willingness to learn new technologies. What We Look For Under limited supervision the CTF (Cyber Triage and Forensics) Junior Security Analyst will report to the designated CTF Shift lead. The CTF Junior Security Analyst will perform tasks including monitoring, research, classification and analysis of security events that occur on the network or endpoint. The CTF Junior Security Analyst should have familiarity with the principles of network and endpoint security, current threat and attack trends, a basic understanding of the OSI model, and have a working knowledge of Defense in depth strategies. What We Offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. We ensure that individuals with disabilities are provided reasonable accommodations to participate in the job application or interview process, to perform essential job functions and to receive other benefits and privileges of employment. Please contact us to request accommodations. EY is committed to being an inclusive employer, and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. If you can confidently demonstrate that you meet the criteria above, please contact us as soon as possible. Make your mark. Apply now. EY | Building a better working world EY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories.

Posted 1 month ago

Apply

0 years

0 Lacs

Ahmedabad, Gujarat, India

On-site

About Our Company: Aerocraft Engineering India Pvt Ltd based in Ahmedabad, provides services to US-based Architecture, Engineering, and Construction groups of companies: Russell and Dawson – An Architecture/Engineering/Construction firm (www.rdaep.com) United-BIM – BIM Modeling Services Firm (www.united-bim.com) AORBIS – Procurement as a Service Provider (www.aorbis.com) We are a nimble and growing organization where everyone’s role is very important for the company’s business success. All team members’ contributions have a direct correlation with the company’s performance in meeting its business and financial objectives. We are hiring a Video/Graphic Designer who will work on many creative needs for Product images, websites, infographics, social media, Festival mailers, posters, Videos, etc. Job Location: Ahmedabad (Siddhivinayak Towers, Makarba) Shift Timings: 3 pm to 12 pm (Shift may change as per business requirement) Monday to Friday Work from office Key Responsibilities: Video Production (70%) Conceptualize, design, and produce engaging video content for various digital platforms (e.g., social media, websites, newsletters). Edit and enhance video footage using Premiere Pro, After Effects, and similar tools. Collaborate with the marketing team to develop visual content that aligns with our messaging and brand identity. Optimize videos for different platforms and formats. Graphic Design (30%): Create images, banners, and other visuals for websites, newsletters, and marketing materials. Develop on-brand graphics for communication and promotional purposes. Take ownership of graphic content from concept through to execution. Requirements: Strong proficiency in both video and graphic design. Expertise in software and technologies like Photoshop, Illustrator, Premiere Pro, After Effects, InDesign, CorelDRAW, etc. Ability to work collaboratively as a team player. Demonstrated ability to deliver high-quality work efficiently. Strong time-management skills and ability to manage multiple projects simultaneously. Benefits: Exposure to US Projects/Design/Standards Company provides Dinner/Snacks/Tea/Coffee Reimbursable Health Insurance 15 paid leave annually + 8-10 Public Holidays

Posted 1 month ago

Apply

2.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NA Minimum 2 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Summary: As a Level 1.5 SOC Analyst, your role involves deeper investigation of security alerts and confirmed incidents. You will validate escalated events using Sentinal One and Splunk SIEM, enrich them with context, and work closely with L3 analysts to assist in containment and timely remediation. You will also assist in improving detection fidelity and supporting SOAR automation. This role requires deep expertise in detection, investigation, containment, and remediation, as well as collaboration with multiple teams across security, IT, and compliance. Roles & Responsibilities: - Investigate alerts escalated by L1 to determine scope, impact, and root cause - Perform in-depth endpoint and network triage using Sentinel One - Use Sentinel One to perform endpoint analysis and threat validation - Correlate multiple log sources in Splunk to trace attacker activity - Enrich events with asset, identity, and threat intelligence context - Document investigation workflows, evidence, and final conclusions - Support L2 during major incidents by performing log or memory triage - Suggest improvements in alert logic & fine tunning. - Conduct threat research aligned to alert patterns and business context - Enhance alert fidelity with threat intel and historical context - Document investigation findings and communicate with stakeholders Professional & Technical Skills: - Alert Triage & Monitoring: Experience investigating escalated alerts using SIEM or EDR - Incident Response and Containment: Take necessary actions to contain, eradicate and recover from security incidents. - Identify opportunities for automation and work with SIEM Platform Support team for implementing it. - EDR Deep Dive: Using Real Time Response (RTR), Threat Graph, custom IOA rules - Proficiency in writing SPL queries, dashboards and providing fine tuning opportunities - Threat Hunting: Behavior-based detection using TTPs - Good understanding of malware, lateral movement, privilege escalation, and exfiltration patterns - Threat Intel Integration: Automation of IOC lookups and enrichment flows - Forensic Skills: Live host forensics, log correlation, malware behavioral analysis - Good experience in advanced threat detection and incident response - Proficiency in Sentinal One forensic and incident response capabilities - Playbook Development/Updation: Able to define, update, and optimize IR playbooks and workflows - Forensic analysis (memory, file systems, logs) - Cloud incident handling (AWS, Azure) - Dashboarding: Advanced visualizations and business-focused metrics in Splunk - Certifications: Splunk Certified Admin/ES Admin, SC-200, Sentinal One EDR vendor training - Sentinal One: Custom detections, forensic triage, threat graphs - Splunk SIEM (core + ES module): Searching Logs, Monitoring and investigating alerts. Additional Information: - The candidate should have minimum 2+ years in SOC/IR . - Experience in 24x7 environments, shift-based operations, or critical infrastructure response - This position is based at our Hyderabad office. - A 15 years full time education is required. - Bachelors in IT/Cybersecurity + advanced certifications (CISSP), Splunk Certified Admin/ES admin, EDR Certification (like Sentinal One) etc.

Posted 1 month ago

Apply

4.0 years

0 Lacs

Ahmedabad, Gujarat, India

On-site

Job description About Our Company : Aerocraft Engineering India Pvt. Ltd. based in Ahmedabad, provides services to US based Architecture, Engineering and Construction group of companies: Russell and Dawson – An Architecture/Engineering/Construction firm (www.rdaep.com) United-BIM – BIM Modeling Services Firm (www.united-bim.com) AORBIS – Procurement as a Service Provider (www.aorbis.com) We are a nimble and growing organization where everyone’s role is very important for the company’s business success. All team members’ contributions have a direct correlation with the company’s performance in meeting its business and financial objectives. We are looking for a BIM Manager with minimum 4+ years of work experience to join our growing team. The firm is seeking a self-motivated candidate for the Ahmedabad, India office to manage a team of 20-30 BIM Modelers. The candidate will be responsible for BIM designing and managing engineering projects of different size and complexity throughout the life cycle of the project. a Candidate is responsible for managing BIM modeling and Co-ordination. Job Location : Ahmedabad (Siddhivinayak Towers, Makarba) Travel to USA as and when required for business needs Shift Timings : 06:00 PM to 03:00 AM Monday to Friday Work from office only Responsibilities : Own quality of all deliverables related to BIM modeling LOD 100 to 500 and clash coordination Lead a team of 20 to 30 BIM Modelers Manage deliverables of client projects and communication Lead and Participate in client meetings and presentations Making sure quality standards and checklists are followed for every project Responsible for BIM standards development, implementation, and enforcement Skills Required : Minimum 4+ years’ experience in BIM projects Excellent verbal and written communication skills Hands on knowledge and experience of BIM projects and Revit models from Schematic Design to Construction Documents set Experience of leading a team of at least 15 team members and working with overseas customers Experience of using Autodesk AEC package - AutoCAD, Revit, Navisworks etc. Benefits : Exposure to USA Projects Company provides Dinner/Snacks/Tea/Coffee Zero Balance Salary Account with Axis Bank Reimbursable Health Insurance 15 paid leave annually 10 Public Holidays Industry Architecture and Planning Employment Type Full-time

Posted 1 month ago

Apply

1.0 - 2.0 years

0 Lacs

Kochi, Kerala, India

On-site

At EY, we’re all in to shape your future with confidence. We’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world. Junior Security Analyst -Cyber Defense CTF (Cyber Triage and Forensics) Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity Cyber Triage and Forensics (CTF) - The Cyber Defense Response Center is responsible for monitoring and detecting information security events that could adversely impact EY information assets and resources. Its mission is aligned with the both the incident response and attack lifecycles A qualified candidate will have the opportunity to work with highly talent Cyber security professional experts to learn and develop new skills. Candidate will be exposed to many technologies and security tools whilst working with EY as well as career growth opportunity. CTF also deliver training to analysts to upskill. Your Key Responsibilities Perform front line accurate and precise real-time monitoring and analysis correlation of logs/alerts from a multitude of security devices with a focus on the determination of what was said as events constitute security incidents. Collaborate to detect and respond to information security incidents, develop, maintain, and follow procedures for security event alerting, and participate in security investigations. The CTF Junior Security Analyst must be competent to work at a technical level, be capable of identifying threats and vectors that cause security events and be able to follow defined procedures for mitigating said threats. Essential Functions of the Job : Respond to network and host based security events Participate in detecting, investigating, and resolving security events Identify and propose areas for improvement within the Cyber Defense Response Center Provide documentation and project support Serve as an escalation point for difficult problems and complex inquiries Server as shift lead when necessary Conduct detailed security event analysis from network traffic attributes and host-based attributes ( binary analysis, etc) to identify information security incidents Provide feedback on security control capability gaps based off of security intrusion trends Develop and maintain analytical procedures to improve security incident identification efficiency Demonstrate ability to drive process improvements and identify gaps Skills And Attributes For Success Information Security Principles, Technologies, and Practices Experience with multiple security event detection platforms Fair understanding of Linux, TCP/IP, Network Security, encryption standards etc Aware of Types of attacks (DOS, DDOS etc) Understand basic IDS / IPS rules to identify and/or prevent malicious activity Aware of security log analysis. Idea about various penetration testing and application testing methodology and tools is a definite plus. Comfortable navigating and troubleshooting Linux and Windows system issues To qualify for the role you must have Capability of working independently Soft Skills - Excellent communication skills; written and verbal. Good Presentation skills Good Investigative, analytical and problem solving skills Ability to work in a team, with little supervision and using own initiative Experience: Minimum of 1-2 years of experience in one or more of the following: Working in a Security Monitoring/Security Operations Center environment (SOC) Experience investigating security events, threats and/or vulnerabilities Understanding of electronic investigation and log correlation Proficiency with the latest intrusion detection platforms; working knowledge of Linux and/or Windows systems administration (Including AD). Scripting or programming (Shell scripting, Power Shell, C, C#, Java, etc) Qualifications, certifications and Education requirements: Under Graduate/Post Graduate Degree in Computer Science or Engineering or related domain (MCA/MTech/BTech/BCA /BSc CS or BSc IT). Desired Certifications: Any Cyber Security Certification Ideally, you’ll also have Good demeanour. Willingness to work a flexible shifts with schedules that includes nights, weekends and holidays; shifts can changed based on business needs. Demonstrated integrity in a professional environment Willingness to learn new technologies. What We Look For Under limited supervision the CTF (Cyber Triage and Forensics) Junior Security Analyst will report to the designated CTF Shift lead. The CTF Junior Security Analyst will perform tasks including monitoring, research, classification and analysis of security events that occur on the network or endpoint. The CTF Junior Security Analyst should have familiarity with the principles of network and endpoint security, current threat and attack trends, a basic understanding of the OSI model, and have a working knowledge of Defense in depth strategies. What We Offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. We ensure that individuals with disabilities are provided reasonable accommodations to participate in the job application or interview process, to perform essential job functions and to receive other benefits and privileges of employment. Please contact us to request accommodations. EY is committed to being an inclusive employer, and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. If you can confidently demonstrate that you meet the criteria above, please contact us as soon as possible. Make your mark. Apply now. EY | Building a better working world EY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories.

Posted 1 month ago

Apply

6.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

You’ll be Responsible for? Implement, configure, and maintain infrastructure and monitoring tools across on-prem Data Centers (Servers, Networks, Storage, Firewalls) and hybrid Cloud (Azure/AWS). Work closely with Security, Network, Server, and Cloud teams to strengthen overall IT infrastructure posture and align tool deployments with organizational policies. Deploy and manage enterprise monitoring platforms (SolarWinds, Grafana, NTT data) for proactive visibility and alerting. Assist in implementing server/network baselines, access controls, and integrations with Security platforms. Deploy and maintain vulnerability scanning tools (Qualys, Nessus, Rapid7) and coordinate with teams for patch compliance. Implement and maintain Privileged Access Management (PAM) tools such as CyberArk for critical server and network infrastructure. Configure and manage enterprise Antivirus/Endpoint Protection solutions and integrate with monitoring dashboards. Support firewall and network tool integrations, including rule-set monitoring, configuration backups, and device health checks. Provide logs, metrics, and dashboards during incident response and RCA, working alongside Security teams. Maintain documentation, runbooks, and SOPs for tool configurations, integrations, and operational procedures. Assist in automation and AIOps for tool deployment, alert correlation, and reporting. You’d have? Bachelor’s degree in computer science, Information Technology, or a related field. 6 to 10 years of hands-on experience in IT Infrastructure (Servers, Networks, Storage) with a focus on tool implementation and monitoring. Practical exposure to CyberArk PAM deployments, enterprise Antivirus/Endpoint Protection platforms, and integration with DC and server environments. Hands-on experience with vulnerability scanning platforms (Qualys, Nessus, Rapid7) and remediation workflows. Familiarity with any of the Antivirus tools like Microsoft Defender for Servers, Defender for Cloud, Azure Sentinel, and AWS GuardDuty/Security Hub. Experience with Windows/Linux servers, VMware/Hyper-V virtualization, enterprise network devices, and storage systems. Understanding of network infrastructure tools (NetFlow analyzers, Wireshark, Cisco Prime, SNMP-based monitoring). Exposure to firewall platforms (Palo Alto, Fortinet, Cisco ASA) and ability to collaborate with network teams for tool alignment. Scripting/automation skills in PowerShell, Python, or Ansible for tool deployment and reporting automation. Ability to collaborate effectively with cross-functional teams for securing and monitoring enterprise infrastructure. Preferred Certifications: Tool-Focused: SolarWinds Certified Professional, Qualys/Nessus, CyberArk Defender/Trustee, Microsoft Defender Certifications. Cloud & Hybrid: Azure Security Engineer Associate / Administrator, AWS Security Specialty. Infrastructure: Data Center Certifications (Cisco CCNA/CCNP DC), Server/Storage (MCSE, VMware VCP-DCV, Dell EMC, HPE). Network: CCNA/CCNP (Routing & Switching or Security), Firewall vendor certs (Palo Alto, Fortinet). Foundational: CompTIA Security+, ITIL v4 Foundation. Tools & Technologies (Preferred Knowledge): Monitoring: SolarWinds, PRTG, Zabbix, Nagios, Azure Monitor Security & PAM: CyberArk, Microsoft Defender, Azure Sentinel, AWS GuardDuty Scanning: Qualys, Nessus, Rapid7 Antivirus/EDR: Symantec, CrowdStrike, Trend Micro, Microsoft Defender ATP Network: Cisco Prime, NetFlow analyzers, Wireshark, SNMP tools Automation: PowerShell, Ansible, Python Why join us? Impactful Work : Play a pivotal role in safeguarding Tanla's assets, data, and reputation in the industry. Tremendous Growth Opportunities : Be part of a rapidly growing company in the telecom and CPaaS space, with opportunities for professional development. Innovative Environment: Work alongside a world-class team in a challenging and fun environment, where innovation is celebrated. Tanla is an equal opportunity employer. We champion diversity and are committed to creating an inclusive environment for all employees. www.tanla.com

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies