Home
Jobs
Companies
Resume

80 Crowdstrike Jobs

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4.0 - 9.0 years

10 - 16 Lacs

Bengaluru

Work from Office

Naukri logo

Role & responsibilities Understand the existing security controls (including Endpoint Detection & Response, anti-malware and incident response) Engage with other IT teams including Network Engineering, Data Center, Service Desk to ensure a consistent approach for organizational support across the enterprise Understand the current state of the technology components in the IT stack ranging from networking, storage, compute (virtualization, containers), applications & security mgmt Establish non-production and production environments for testing and hosting the applications Adhere to the Scaled Agile Framework methodologies and tools that exists in the environment Participate in daily stand-up of Compliance & Security release train and contribute to bi-weekly sprints Learn System Engineering concepts to analyze existing environment and find more efficient ways Identify ways of doing things with full automation, AI and ML which needs knowing/learning the concepts of these technologies. Maintain regular communication with supervisor and continually update needs & priorities to Preferred candidate profile Hands-on experience in managing CrowdStrike, McAfee and TrendMicro platforms using the console, scripting and automation frameworks Hands-on expertise programming in Python Experience in L1/L2/L3 support and understanding of common corporate IT issues Have a sense of urgency in production issues and be a proactive speaker and listener Hands-on experience in programming with networking stack, TCP/IP stack, compute technologies (virtualization, containerization), storage Knowledge of technical design of the security controls (especially in the Windows OS)

Posted 3 days ago

Apply

2.0 - 6.0 years

6 - 8 Lacs

Chennai

Work from Office

Naukri logo

Hi , We are hiring for the ITES Company for Carbon Black Role. Overview The Carbon Black Specialist is responsible for supporting and managing Carbon Black security products, with experience and certification in one or more Carbon Black solutions. This role involves independently working with customers through virtual platforms like Webex, providing expert training, mentoring, and exceptional customer service. The Carbon Black Cyber Security professional specializes in deploying, managing, and optimizing Carbon Black endpoint security solutions to protect organizations from cyber threats. Their responsibilities include monitoring security alerts, analyzing threats, and responding to incidents to ensure robust endpoint protection. Attention to detail, professionalism, and adaptability are key, with analysis, debugging, and programming in the enterprise security domain. Key Skills : Any Graduate Minimum 2 years of experience working with all Carbon Black products. Deeper knowledge with at least one of the Carbon Black products Familiarity with analysis and debugging skill a plus Programming experience a plus To Apply, WhatsApp 'Hi' @ 9151555419 Follow the Steps Below: >Click on Start option to Apply and fill the details >Select the location as Other ( to get multiple location option ) a) To Apply for above Job Role ( Chennai ) Type : Job Code # 274 Job description: Minimum 2 years of experience working with all Carbon Black products. Deeper knowledge with at least one of the Carbon Black products Certification obtained on the product(s) of expertise Ability and motivation to work with customers independently via Webex Excellent training and mentoring skills Team motivator who currently serves as an example for their team mates Consistently exceeds personal goal expectations Certification in the enterprise security space Good time management skills and ability to multi task Adaptable, professional, courteous, motivated and works well on their own or as a member of a team Excellent Customer Service skills and a demonstrated success exceeding customer expectations Strong communication (verbal and written) and customer handling skills Strong attention to detail and focus on producing quality work products and results Familiarity with analysis and debugging skill a plus Programming experience a plus

Posted 1 week ago

Apply

2.0 - 4.0 years

2 - 5 Lacs

Bengaluru

Work from Office

Naukri logo

2 years of experience in endpoint security implementation and management. Hands-on experience with CrowdStrike Falcon, Trend Micro Apex One/Deep Security, and EDR solutions. Strong knowledge of endpoint security, malware analysis, and threat detection methodologies. Experience in PowerShell, Python, or Bash scripting for automation and security tasks. Familiarity with Windows, macOS, and Linux endpoint security best practices. Understanding of network security, firewalls, and SIEM platforms (Splunk, Sentinel, etc.). Security certifications such as CrowdStrike CCFA/CCFR, Trend Micro Certified Professional, CEH, or CISSP (preferred).

Posted 1 week ago

Apply

8.0 - 13.0 years

25 - 35 Lacs

Bengaluru

Work from Office

Naukri logo

Endpoint & Network Security: Leverage CrowdStrike, XDR, and Zscaler for endpoint and network protection. Email & API Security: Manage and secure email platforms using Proofpoint and safeguard API security with WAF solutions.

Posted 1 week ago

Apply

6.0 - 7.0 years

10 - 14 Lacs

Pune

Work from Office

Naukri logo

Job ID: 197283 Required Travel :Minimal Managerial - Yes Location: :India- Pune (Amdocs Site) Who are we Amdocs helps those who build the future to make it amazing. With our market-leading portfolio of software products and services, we unlock our customers innovative potential, empowering them to provide next-generation communication and media experiences for both the individual end user and enterprise customers. Our approximately 30,000 employees around the globe are here to accelerate service providers migration to the cloud, enable them to differentiate in the 5G era, and digitalize and automate their operations. Listed on the NASDAQ Global Select Market, Amdocs had revenue of $4.89 billion in fiscal 2023. In one sentence The Information Security Lead develops, maintains, and publishes required information security standards, procedures, and guidelines per domain of responsibility. Responsible for conceiving and executing forward-looking security systems or processes design, implements programs for user awareness, compliance monitoring, security controls design and implementation. What will your job look like You will maintain the organization's information security effectiveness and efficiency by defining and leading the implementation of security approaches, standards and procedures supporting strategic plans and directions You will lead teams to resolve Information Security challenges. Provide the information security requirements for cross-organization projects and accompany the implementation of the requirements. Utilize deep information security understanding to support internal and external business-related activities, formulate IS solutions based on technical and business requirements. Maintain a detailed knowledge of IS solutions and present them to our customers. You will lead unit level initiatives and ensure competency to meet the needs of the team/ Amdocs /Customers. You will design solutions and formulate response to RFx, create POC/demos, and present IS solutions to customers/corporate stakeholders. Utilize deep technical knowledge of IS products and services to align appropriate solutions based on client need. You will lead and manage Information Security Projects, including (as required) budget and resources, customer relationships, timelines, deliverables, quality and overall management. You will recommend information technology strategies, policies, and procedures by evaluating the organization's outcomes, identifying problems, evaluating trends, and anticipating requirements. You will keep updated with emerging security threats and alerts; conduct research on emerging products, services, protocols, and standards in support of security enhancement and development efforts; collaborate with other cyber threat researchers. You will be accountable for meeting quality objectives, adherence to best practices, quality processes, and methodologies; lead continuous improvement via Root Cause Analysis, Lessons Learned, and Prevention processes; Track quality KPIs and continuously improve quality and measurements. You will promote clarity and alignment with ongoing, effective communication to the project team regarding the unit s goals and status, project matters, companywide changes, special initiative status, etc.; Strive for strong and healthy working relationships within the team. You will provide technical guidance and training to information owners, other security managers, and IT associates. Information Security Manager functions include: You will lead, manage and mentor teams in specific domains such as risk assessment, cyber technologies, corporate security, PMI, SOC, Penetration testing, security operations, etc. You will attract, develop and retain talent to build and maintain strong, effective and competent teams, and ensure the enhancement of their knowledge. Coach and empower the team and foster an environment that encourages teamwork based on motivation and inspiration. Responsible for HR processes such as recruitment, onboarding, definition of clear goals and objectives, ongoing performance management and feedback, career development, and growth of the team and its members. Manage day to day employee relations. 12. Information Security Expert functions include: You will be the technical expert and leader of certain domains such as IT, Application and GRC. All you need is... 1. 6-7 years of experience in the information security management ecosystem 2. Familiarity with industry standards and frameworks, such as NIST, CIS, ISO 27001, and GDPR. 3. Strong understanding of security best practices, including, vulnerability management, system hardening, patch management, and secure coding. 4. Proven experience working with security tools such as CrowdStrike, InsightVM, Tripwire, WIZ etc. 5. Experience with cloud security platforms (AWS, Azure) and native security services 6. Knowledge of network security principles & solutions, including IAM, firewalls, IDS/IPS, and secure network design. 7. Good team player - an advantage 8. Ability to scale up - for cross-domain security tools Why you will love this job: You will have the influence on many of the security teams in Amdocs and therefor the whole company You will bring the innovation into security teams in Amdocs You will have the independence to design the role as you think and like Amdocs is an equal opportunity employer. We welcome applicants from all backgrounds and are committed to fostering a diverse and inclusive workforce

Posted 1 week ago

Apply

2.0 - 6.0 years

7 - 17 Lacs

Noida

Remote

Naukri logo

**Urgent Hiring for the role of Cloud Security Analyst for our team** Job Title: Cloud Security Analyst Experience: 2+yrs Job Location: Remote Working Shifts: UK/EST Hrs. Job Description: We are seeking a skilled and experienced Cloud Security Analyst with over 2+ years of experience in securing cloud environments across AWS and Azure platforms. The ideal candidate will have hands-on expertise with AWS Security Hub, Azure Security Center, Palo Alto Next-Generation Firewalls (NGFW), and Crowdstrike. You will be responsible for configuring security controls, continuously monitoring for threats, and remediating vulnerabilities to ensure a secure and compliant cloud infrastructure. Required Skills & Experience: 2+ years of experience in cloud security or cybersecurity roles. Strong experience with: AWS Security Hub, Azure Security Center, Palo Alto NGFW, Crowdstrike Falcon Solid understanding of cloud infrastructure and services (IaaS, PaaS, SaaS). Experience with security monitoring, incident detection and response. Familiarity with cloud-native security frameworks and best practices (e.g., CIS Benchmarks, NIST, Zero Trust). Excellent problem-solving skills and attention to detail. Strong communication skills to work across technical and non-technical team Note: Interested candidates can drop their resumes at aagnihotri@fcsltd.com

Posted 1 week ago

Apply

1.0 - 3.0 years

3 - 4 Lacs

Kochi, Ernakulam

Work from Office

Naukri logo

As an L1 Threat Hunter, you will work closely with SOC analysts and incident responders to identify, analyze, and escalate suspicious activity using a variety of tools and threat intelligence sources.

Posted 1 week ago

Apply

3.0 - 8.0 years

5 - 15 Lacs

Noida

Remote

Naukri logo

Position: SOC Analyst 100% Remote Working Hours: US/UK hours Job description: We are seeking a highly motivated and skilled SOC Analyst to join our Security Operations Center. Key Responsibilities Monitor security events and alerts using tools such as Splunk, IBM QRadar, Microsoft Sentinel, and Palo Alto XSIAM. Perform initial triage and categorization of security events to determine severity and potential impact. Escalate confirmed incidents to appropriate teams or stakeholders with accurate and detailed information. Correlate logs and alerts across various platforms to detect anomalous behavior or indicators of compromise (IoCs). Utilize the MITRE ATT&CK framework to enrich detection and response processes. Collaborate with Incident Response and Threat Intelligence teams for deeper investigations. Generate reports and dashboards for incident trends, KPIs, and SOC performance. Maintain documentation of SOC procedures, playbooks, and workflows. Participate in regular threat-hunting and detection engineering activities. Continuously evaluate and tune detection rules and alerts for improved accuracy. Required Qualifications Education: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field (or equivalent experience) Certifications: CompTIA Security+ CySA+ Certified SOC Analyst (CSA) or equivalent Required Skills and Experience 3+ years of experience in a SOC environment or cybersecurity operations Proficient with SIEM platforms: Splunk, IBM QRadar, Microsoft Sentinel Experience with EDR/XDR platforms like Palo Alto XSIAM and CrowdStrike Falcon Familiarity with MITRE ATT&CK and threat detection mapping Preferred Qualifications Understanding of cloud security monitoring (Azure, AWS, GCP) Exposure to SOAR tools and incident response automation Knowledge of NIST, ISO 27001, and other security compliance frameworks Interested candidate can apply: dsingh15@fcsltd.com

Posted 1 week ago

Apply

8.0 - 13.0 years

15 - 27 Lacs

Gurugram

Work from Office

Naukri logo

• Strong expertise with SIEM platforms (e.g., QRadar, Sentinel, LogRhythm , Splunk,). • Proficient in EDR and XDR tools (e.g., CrowdStrike, SentinelOne, Carbon Black).

Posted 1 week ago

Apply

3.0 - 6.0 years

4 - 9 Lacs

Hyderabad, Pune, Bengaluru

Hybrid

Naukri logo

Your key responsibilities Administration and management support of CrowdStrike Next-Gen SIEM/EDR Perform as the subject matter expert on any of the above solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. Content development (Use case development) which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Skills and attributes for success Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities. Experience in managing and administering security solution CrowdStrike Next-Gen SIEM/EDR Hands-on expertise in Security use case development and log source integration Good knowledge of SIEM technologies such as Splunk, Azure Sentinel from a Security Analysts point of view Exposure to IOT/OT monitoring (Claroty, Nozomi Networks etc.) is a plus Good knowledge and experience in Security Monitoring Good knowledge and experience in Cyber Incident Response Knowledge in ELK Stack Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in endpoint protection tools, techniques, and platforms such as Carbon Black, Tanium, CrowdStrike, Defender ATP or others To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Demonstrate both technical acumen and critical thinking abilities. Strong interpersonal and presentation skills. Minimum 4 years of Hands-on experience of operating/implementing the above security tools. Certification in any of the SIEM platforms is a plus Knowledge of RegEx, Perl scripting and SQL query language. Certification - CCSA, CEH, CISSP, GCIH, GIAC.

Posted 1 week ago

Apply

3.0 - 8.0 years

15 - 25 Lacs

Mumbai

Work from Office

Naukri logo

Position summary: The Senior Presales Consultant for Cybersecurity plays a key role in assisting the sales team by providing technical expertise and insights into cybersecurity solutions and services during the pre-sales process. This role requires deep knowledge of security technologies, MSSP offerings and solutions, excellent communication skills and the ability to build trust with clients through technical consultancy and advisory. You will closely work with clients to assess their security requirements, design customized security solutions, services and articulate the value of the company’s products and services to drive successful sales outcomes. Key Roles & Responsibilities: Technical Presales Support: Collaborate with the sales team to identify client security needs and recommend appropriate technical solutions and services Conduct in-depth technical presentations, demo, workshops on below listed solutions: Cisco Security Solutions: SSE, Firewall, Secure Workload, SNA, ESA, MCD and so on Palo Alto Security Solutions: Prisma Access, Cortex XDR, XSIAM, CNAPP etc.. Gruve Professional and Managed Services: Next-Gen SOC, Device Management, VAPT, Network Security Assessments, Vulnerability Management, Threat Hunting, Dark Web Monitoring, EASM Solutions Design and propose customized architectures based on clients’ environments, challenges and business goals. Develop technical proposals, SOW, LLD and proof of concepts (PoCs) to demonstrate product & solution effectiveness. • Customer Engagement & Requirement Gathering: Engage with clients regularly to understand their security landscape, objectives and requirements Capture meeting notes, action items- Share with Internal, external stakeholders, follow up and act till the closure of the business Perform detailed analysis and risk assessments by taking note of regulatory and compliance requirements. Serve as a trusted advisor for security best practices and technology adoption, building strong client/customer relationships. Solution Design and Architecture: Proficient in designing end to end cybersecurity solutions, managed and professional services that address customer needs, integrating with existing environment where necessary. Collaborate with internal teams to ensure the proposed solutions are feasible, scalable, and align with the company’s technical capabilities. Prepare solution documentation, architecture diagrams, compliance framework summary guidelines, marketing collaterals as and when required. • Technical Knowledge and Expertise: Maintain up-to-date knowledge of technology trends, emerging threats, and new cybersecurity and network technologies. Educate sales team on new technologies, trends, market opportunities and be an advisor and support them with required updates to sell our solutions effectively Research and analyze competitors' security products, identifying differentiators and positioning the company’s solution accordingly. • Proposal Development and RFP/RFI Response Participate in the development of proposals and respond to Request for Proposals (RFPs) and Request for Information (RFIs) from potential customers. Collaborate with different teams to ensure technical accuracy, relevance, and compliance with customer requirements. Basic Qualifications: Bachelor's degree in computer science, cybersecurity, information technology, or related Experience: 5+ years of experience in a cybersecurity pre-sales, consulting or technical advisor role. Relevant certifications (such as CCIE, CISSP, CISM, CEH, or vendor-specific certifications) are a plus. Experience working in a cloud environment and cloud security will be a value add. Good understanding on Cybersecurity & Networking technologies – Firewall, SSE, SIEM, SOAR, NDR, Workload Protection, Routing, Switching and wireless Techno-commercial approach and hunger for growth and business with Integrity Preferred Qualifications: Understanding of security architecture and risk assessment methodologies. Strong understanding of cybersecurity principles, tools, and frameworks, including but not limited to firewalls, intrusion detection/prevention systems, SIEM, endpoint protection, identity and access management, cloud security, and vulnerability management. Experience with security vendors and products (e.g., Cisco, Palo Alto, Fortinet, Zscaler/Netskope, CrowdStrike, Splunk, etc.) Knowledge of network security, cloud security (AWS, Azure, GCP), data security, and compliance standards (e.g., ISO 27001, NIST, GDPR, HIPAA). Excellent ability to convey technical concepts to non-technical stakeholders. Proven experience conducting client meetings, presentations, and technical demos. Excellent communication, presentation, and interpersonal skills. Ability to build and maintain relationships with clients, acting as a trusted advisor.

Posted 1 week ago

Apply

1.0 - 3.0 years

5 - 10 Lacs

Gurugram

Work from Office

Naukri logo

Title: Security Analyst (SOC & EDR) Location: Gurgaon, India Type: Hybrid (work from office) Job Description Who We Are: Fareportal is a travel technology company powering a next-generation travel concierge service. Utilizing its innovative technology and company owned and operated global contact centers, Fareportal has built strong industry partnerships providing customers access to over 600 airlines, a million lodgings, and hundreds of car rental companies around the globe. With a portfolio of consumer travel brands including CheapOair and OneTravel, Fareportal enables consumers to book-online, on mobile apps for iOS and Android, by phone, or live chat. Fareportal provides its airline partners with access to a broad customer base that books high-yielding international travel and add-on ancillaries. Fareportal is one of the leading sellers of airline tickets in the United States. We are a progressive company that leverages technology and expertise to deliver optimal solutions for our suppliers, customers, and partners. FAREPORTAL HIGHLIGHTS: Fareportal is the number 1 privately held online travel company in flight volume. Fareportal partners with over 600 airlines, 1 million lodgings, and hundreds of car rental companies worldwide. 2019 annual sales exceeded $5 billion. Fareportal sees over 150 million unique visitors annually to our desktop and mobile sites. Fareportal, with its global workforce of over 2,600 employees, is strategically positioned with 9 offices in 6 countries and headquartered in New York City. Job Overview We are seeking a proactive and knowledgeable Security Analyst to join our Information Security Operations (SecOps) team . This role will focus on SOC monitoring and Endpoint Detection and Response (EDR) using SentinelOne . The ideal candidate should have solid experience in threat monitoring, incident response, and SentinelOne tool handling. Key Responsibilities: Monitor and respond to SOC alerts and security incidents in real time. Analyze logs and alerts from SIEM and SentinelOne EDR platforms. Perform incident triage , escalation, and coordination with internal teams. Troubleshoot SentinelOne-related issues , including error resolution, agent communication, and performance problems. Understand and manage SentinelOne policies , ensure proper deployment, and make necessary adjustments for better coverage. Quickly identify the root cause of issues related to endpoint protection and take corrective actions. Coordinate with the IT team for issue resolution and endpoint remediation. Collaborate with teams to reduce false positives and improve alert accuracy. Maintain incident documentation , reports, and operational dashboards. Support in threat hunting , vulnerability detection, and other BAU (Business As Usual) security tasks. Required Skills & Qualification: Bachelors/Masters Degree in Computer Science, Information Systems, Engineering. 24 years of experience in SOC operations and endpoint security monitoring. Hands-on experience with SentinelOne EDR , including troubleshooting and policy management. Good knowledge of cybersecurity threats, incident response processes, and log analysis. Ability to investigate and resolve SentinelOne alerts and agent-related errors effectively. Experience working with SIEM tools (like Splunk, Qradar, etc.). Strong understanding of false positive tuning and threat detection improvement. Basic scripting knowledge (PowerShell, Python) is a plus. Good communication and analytical skills. Preferred Skills & Qualifications: CEH , CompTIA Security+ , or any other relevant security certification. Disclaimer This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Fareportal reserves the right to change the job duties, responsibilities, expectations or requirements posted here at any time at the Companys sole discretion, with or without notice.

Posted 1 week ago

Apply

10.0 - 14.0 years

35 - 50 Lacs

Bengaluru

Work from Office

Naukri logo

Primary/ Mandatory skills : Extensive experience in “Chef IT Automation” Secondary skills : Good knowledge and experience in DevOps Level: SA RR : Maintain a consistent terraform script when compared to existing cloud resources Chef version update: version 14 to version 18 Crowdstrike, Qualys and Splunk integration for Ecommerce workloads Packer AMI creation for Windows Core and CentOS Stream 9 Terraform version update Collaborate with DB team for “CentOS version + DB version” update project Test every change made. Work with DevOps, SRE and development teams for testing. Document and publish the changes, and projects undertaken. Client Round (Yes/ No): Yes Location Constraint if any : No Constraints Shift timing: IST 1330Hrs – 2330Hrs

Posted 2 weeks ago

Apply

5.0 - 10.0 years

10 - 18 Lacs

Kolkata

Work from Office

Naukri logo

We are looking for a highly experienced Senior Cybersecurity Engineer with advanced skills in Splunk, CrowdStrike, vulnerability management, and identity provider (IDP) systems. This role will be instrumental in building robust detection, response, and identity-integrated security capabilities to defend against evolving threats. The ideal candidate will have a hands-on, security engineering mindset and a proven track record working across endpoint protection, SIEM, and identity systems. Key Responsibilities: Deploy, manage, and optimize Splunk Enterprise Security (ES) for real-time detection, alerting, and correlation of security events. Design and build custom SPL queries, dashboards, and threat detection logic, integrating data from CrowdStrike, IDPs, and vulnerability scanners. Lead the vulnerability management program, including scanning (Qualys, Tenable, Rapid7), analysis, risk prioritization, and driving remediation. Maintain and configure CrowdStrike Falcon, including prevention policies, detection tuning, response playbooks, and integration with SIEM and SOAR platforms. Leverage CrowdStrike telemetry for threat hunting, endpoint investigations, and threat actor tracking. Integrate and manage IDP platforms (e.g., Okta, Azure AD, Entra ID) to secure identity access, enforce MFA/SSO, and detect anomalous user behavior. Correlate identity, endpoint, and vulnerability data to drive risk-based alerting and incident response. Collaborate with incident response, IAM, infrastructure, and compliance teams to maintain a resilient and auditable security posture. Required Qualifications: Bachelors degree in Computer Science, Cybersecurity, or related field. 5+ years of experience in cybersecurity roles with significant hands-on expertise in: Splunk (SPL, ES, dashboards, alerting) CrowdStrike Falcon (EDR management, threat hunting, integration) Vulnerability Management (Qualys, Tenable, or Rapid7) IDP platforms (Okta, Azure AD, Entra ID, etc.) Experience with scripting (Python, Bash, PowerShell) and API integrations. Familiarity with MITRE ATT&CK, threat modeling, CVSS, and Zero Trust principles. Preferred Certifications: Splunk Certified Architect or Admin CrowdStrike Certified Falcon Administrator (CCFA) or higher Okta Certified Professional or Azure Security Engineer Associate CISSP, OSCP, GIAC (GCIH, GMON, GCIA)

Posted 2 weeks ago

Apply

0.0 years

0 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Foundit logo

Introduction In this role, youll work in one of our IBM Consulting Client Innovation Centers (Delivery Centers), where we deliver deep technical and industry expertise to a wide range of public and private sector clients around the world. Our delivery centers offer our clients locally based skills and technical expertise to drive innovation and adoption of new technology In this role, youll work in one of our IBM Consulting Client Innovation Centers (Delivery Centers), where we deliver deep technical and industry expertise to a wide range of public and private sector clients around the world. Our delivery centers offer our clients locally based skills and technical expertise to drive innovation and adoption of new technology. Your role and responsibilities Analyze and triage security incidents to determine their severity and impact on Infrastructure systems. Primary point of contact for Cyber Security Incident response in the Cyber Security Escalations team. Provide a first point of contact for L3 security escalations from the SOC team, ensuring a thorough review, escalation Required education Bachelors Degree Preferred education Masters Degree Required technical and professional expertise Conduct in-depth analysis of security events, collaborating directly with different stakeholders to escalate and thoroughly investigate incidents. Participate in Security Incident Response Team in the identification, containment, eradication, and resolution of security issues, This involves understanding the scope, impact, and root cause of incidents to tailor the response effectively, Collaborate with SOC teams to ensure effective incident response and continuous improvement. Assist in the development and refinement of SOC processes, procedures, and playbooks, Create and maintain incident reports, documenting findings, actions taken, and lessons learned Preferred technical and professional experience Stay current with emerging threats, vulnerabilities, and security technologies to proactively protect the organization. Notify Client of incident and required mitigation works. Track and update incidents and requests based on clients updates and analysis results. Good understanding on Phishing email analysis and their terminologies Having knowledge on EDR solutions (Preferred CrowdStrike), Participate in regular SOC team meetings and provide input on improving security posture. Communicate vertically and horizontally to keep stakeholders informed and involved on Security Operations matters

Posted 2 weeks ago

Apply

2.0 - 5.0 years

6 - 7 Lacs

Thiruvananthapuram / Trivandrum, Kerala, India

On-site

Foundit logo

Bachelor's degree preferably in information security, computer science or other related field, or equivalent combination of education and/or experience from which comparable knowledge, skills and abilities have been achieved. 2 years experience in information technologies, or combined experience in security and IT technical work experience.Degrees or certifications may be considered in lieu of experience. Proven experience in developing, operating, and maintaining security systems. Good knowledge of operating system and database security. Familiarity with security systems including anti-virus applications, content filtering, firewalls, authentication systems, and intrusion detection and notification systems. In-depth knowledge of security protocols and principles. Excellent communication skills to coordinate and work with both US and India teams. Strong critical thinking skills and the ability to solve complex problems Experience working in an automation environment and a mindset geared towards automation.

Posted 2 weeks ago

Apply

5.0 - 10.0 years

13 - 17 Lacs

Gurugram

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Operations Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitate the transition to cloud security-managed operations, ensuring that security measures are effectively integrated into the cloud environment and aligned with organizational objectives. Roles & Responsibilities:-Administer a globally distributed and heterogeneous SIEM environment, preferably Securonix/Splunk-Knowledge on Automation app deployment to multiple sites, Monitoring the central infrastructure-Design and customize complex search queries, develop dashboards, data models, reports and optimize their performance-Administration of core SIEM Components (Deployment Server, Indexer)-Understanding of threat models and threat intelligence-Improve detection capabilities by building and enhancing alert rules Professional & Technical Skills: - Exp working in SOC/SIEM-Incident handling, use case management development , risk assessment, playbook recommendation, fine-tunings-SIEM/SOC operations experience for very large enterprises-Knowledge on MITRE/CKC framework-Security Analytical skills and analysis-Should have good customer handling skills-SIEM, Incident Response, Basic understanding of security technologies-User behavior/Malware Analysis, Knowledge on Securonix, Defender, CrowdStrike, FortiSOAR and Splunk Admin Additional Information:- The candidate should have a minimum of 5 years of experience in Infrastructure Security Vulnerability Management Operations.- This position is based at our Noida office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

3.0 - 8.0 years

13 - 17 Lacs

Gurugram

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Endpoint Extended Detection and Response Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are seeking a skilled cybersecurity professional with hands-on experience in managing and optimizing CrowdStrike EDR, FIM, Host Firewall, MxDR solutions. As a CrowdStrike EDR Specialist, you will play a critical role in endpoint threat detection, incident response, and continuous monitoring of the enterprise environment to identify and remediate cyber threats. Roles & Responsibilities:-Deploy, configure, and maintain CrowdStrike Falcon EDR agents across enterprise endpoints.-Monitor CrowdStrike dashboards and alerts for suspicious activity, malware, and unauthorized behavior.-Investigate, analyze, and respond to endpoint-related security incidents.-Create and tune detection rules, indicators of compromise (IOCs), and response workflows.-Collaborate with SOC teams, IT administrators, and incident responders on security investigations.-Perform threat hunting using CrowdStrike Falcon and other tools.-Develop reports and dashboards that provide visibility into the EDR environment and incident trends.-Ensure EDR platform integration with SIEM and other cybersecurity tools.-Stay updated on emerging threats and recommend configuration or policy improvements.-Knowledge and Exposure on Service Now ticketing for Incident Management, Problem Management and Change Management. Professional & Technical Skills: -Experience in a EDR (CrowdStrike) or threat detection role.-Strong hands-on experience with CrowdStrike Falcon EDR (deployment, policy management, investigation, etc.).-Solid understanding of malware, endpoint threats, and attack vectors.-Familiarity with MITRE ATT&CK framework and threat intelligence principles.-Experience with scripting (PowerShell, Python, etc.) and automation tools is a plus.-Knowledge of SIEM platforms (Splunk, QRadar, etc.) and their integration with EDR.-Relevant certifications preferred (e.g., CrowdStrike CCFA, FIM, Azure Fundamental). Additional Information:- The candidate should have minimum 3 years of experience in Endpoint Extended Detection and Response.- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field (or equivalent experience).- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

5.0 - 7.0 years

5 - 9 Lacs

Hyderabad

Work from Office

Naukri logo

Security Engineer Hyderabad, Telangana IT Description Why youll want to work at nimble! This is a great opportunity to join a well-established and market-leading brand serving a high-growth end market while gaining valuable experience and visibility to Executive leadership. As an organization, we are in considerable growth mode through acquisition and with a laser focus on positive culture building. The Information Security Engineer is responsible for safeguarding the organization's systems and data assets. This critical role focuses on preventing and mitigating unauthorized access, modification, or destruction of sensitive information. The Engineer actively participates in the development and implementation of robust IT security policies and standards. Through close collaboration with end-users across various departments, this position ensures the alignment of security measures with individual business needs while maintaining strict adherence to company-wide security policies and procedures. The Information Security Engineer reports directly to the Director of Information Security and maintains an indirect reporting line to the Chief Information Technology Officer. Threat Detection & Response: Monitor the organization's servers and networks for security breaches using tools such as Windows Defender, Windows Purview, Crowdstrike, Rapid7 Investigate and respond to security incidents promptly. Utilize Windows Defender , Rapid7 and Wiz for vulnerability scanning and threat intelligence gathering. Implement and enforce security policies through Intune . Security Architecture & Engineering: Design, implement, and maintain security controls, including firewalls, intrusion detection/prevention systems (IDPS), and data encryption. Conduct security assessments and penetration testing. Develop and maintain security standards and best practices. Endpoint Security Management: Manage endpoint security solutions, including Windows Defender and Crowdstrike Vulnerability Management: Identify, assess, and prioritize vulnerabilities using Windows Defender, Wiz and Rapid7 . Develop and implement remediation plans. Compliance & Reporting: Prepare reports that document security metrics, attempted attacks, and security breaches. Ensure compliance with relevant security standards and regulations. Security Awareness & Training: Educate and train employees on IT security best practices and awareness. Collaborate with IT teams, business units, and other stakeholders to ensure effective security implementation. Clearly communicate security risks and recommendations to management. Requirements 5+ years of experience in systems or network administration/engineering 1+ years of experience in information security roles Strong understanding of security principles and best practices (e.g., NIST) Proficient with Windows Server administration and management Proficient with network protocols and topologies Experience with security information and event management (SIEM) systems Experience with scripting languages (e.g., Python, PowerShell) Strong analytical and problem-solving skills Excellent written and verbal communication skills Ability to work independently and as part of a team Experience with cloud security (e.g. Azure, Defender) Experience with security orchestration and automation platforms (SOAR). Experience with container security and microservices. This job description is intended to provide a general overview of the position. Responsibilities and qualifications may vary depending on the specific needs of the organization. This revised job description incorporates the specified security software suites and provides a more comprehensive overview of the role. Intersted candidates drop your resumes to 8179814131 - Navya (WhatsApp) or apply through below link https://recruiting.paylocity.com/recruiting/jobs/All/3cb31b47-df35-44a0-9592-a322ad0b2915/nimble-international

Posted 2 weeks ago

Apply

4.0 - 7.0 years

12 - 16 Lacs

Pune, Chennai, Bengaluru

Work from Office

Naukri logo

Role & responsibilities Security Architecture & Engineering Design and deploy secure network, infrastructure, and Azure cloud architectures using Defender for Cloud, Sentinel, Entra ID, and Purview. Select, integrate, and optimize security tools (SIEM/SOAR, firewalls, EDR, DLP). Embed security into DevOps/CI-CD pipelines via automation (Logic Apps, PowerShell, KQL). Security Operations & Incident Response Configure and tune detection rules and workbooks in Sentinel; build automated playbooks for common incidents. Lead triage, investigation, and root-cause analysis of alerts from Defender and Sentinel. Conduct proactive threat hunting, log review, and vulnerability assessments. Identity & Access Management Implement and manage Conditional Access, MFA, Privileged Identity Management, and RBAC in Entra ID. Enforce least-privilege principles and lifecycle policies across users, groups, and service identities. Governance, Risk & Compliance Maintain alignment with ISO 27001, NIST, CIS, PCI-DSS, and GDPR using Secure Score and Compliance Manager. Develop and enforce security policies, standards, and audit controls. Team Leadership & Collaboration Mentor SOC analysts and engineers, driving continuous improvement and knowledge sharing. Collaborate closely with IT, DevOps, and business units to integrate security into all projects.

Posted 2 weeks ago

Apply

3.0 - 8.0 years

4 - 9 Lacs

Hyderabad

Work from Office

Naukri logo

Greetings from Wysetek!! Wysetek leverage's 35 years of rich experience in providing Integrated Technology Solutions to SMEs and Large Corporations across India. We are recruiting for our Technology Solution Division Working Knowledge on Technology/ Product Knowledge (Any One is must): TrendMicro, Vision one, Apex One. Mode of Work: Onsite/Field Location: Hyderabad (Onsite) Position : 10 (L1/L2/L3) Preferably Looking for Immediate joiners Job description Implementation & Troubleshooting Implementation of TrendMicro / Endpoint Encryption at client place as per the scope work and their requirement. Troubleshooting client issues and suggesting them best and optimal solution which can secure their systems and servers from theft attack. Giving remote and onsite support to the client. Escalating case to tech team whenever require. Closely working with endpoint encryption for enterprise. Firewall Endpoint Encryption Server Installation & SQL DB Installation for Trend Micro/ Firewall Endpoint Encryption Policy Server. As well as troubleshooting on encryption affected machine and issue resolutions. Closely working with Trend Micro or other antivirus product for enterprise. Trend Micro or other Antivirus Server Installation, Agent package creation, DLP policy management for enterprise users and antivirus agent troubleshooting as per the issue persist. Core Competencies Self-starter with a high energy level Ability to work with all levels of individuals. Good with Escalation matric know how Excellent communicator, both written and verbal Ability to articulate complex technical ideas. Ability to forecast accurately. Technical Experience: Degree qualified in a relevant field (B.E, B. Tech, Computer graduate) or equivalent experience in Implementation & troubleshooting on Load balancer / Web Application Firewall is essential. Relevant Certification will be advantageous.

Posted 2 weeks ago

Apply

8.0 - 13.0 years

20 - 35 Lacs

Noida, Chennai, Bengaluru

Hybrid

Naukri logo

Hi We have got an opening in HCL for Qualys - 8 Years To 15 Years - Permanent Openings, Interview Location : Chennai / Bangalore / Noida / Hyderabad Job Location : Chennai / Bangalore / Noida / Hyderabad if you are interested; kindly send your updated resume to Shakthi@glaubentechnology.com with below mentioned details Skills : Qualys - 8 Years To 15 Years While sending your resume, Pls provide the following details First name Last name Date of Birth Total Experience Relevant Experience in Qualys - UG Degree percentage/CGPA & year of passing PG Degree Percentage & year of passing Current Company Current CTC Expected CTC Notice Period Location of interview Preferred Job Location Regards, Shakthi Shakthi@glaubentechnology.com

Posted 2 weeks ago

Apply

8.0 - 13.0 years

15 - 25 Lacs

Chennai

Work from Office

Naukri logo

SOC Analyst - L3 Experience Range : 8 - 15 Years Position : Permanent Location : Chennai (Taramani) Project : Banking Shift : Rotational Notice : Immediate Joiners, Serving Notice Key Responsibilities: Incident Detection & Response: Monitor security alerts and events through SIEM tools to identify potential threats. Investigate security incidents and respond in a timely and effective manner. Leverage EDR (Endpoint Detection and Response) solutions for threat detection and incident analysis. Threat Analysis & Mitigation: Conduct thorough threat and malware analysis to identify and mitigate risks. Work closely with internal teams to investigate malware, viruses, and ransomware threats. Use CrowdStrike , Defender , and other endpoint security tools to prevent attacks. Email Security Management: Monitor and manage email security systems to prevent phishing, spam, and other malicious email threats. Respond to suspicious email alerts and work with other teams to resolve them. Continuous Monitoring & Alerting: Actively monitor systems, networks, and applications for any signs of suspicious activities. Utilize Endpoint Security solutions to continuously track and protect endpoints across the network. Collaboration & Reporting: Work closely with the IT and security teams to assess, analyze, and resolve security incidents. Maintain detailed documentation of incidents, findings, and responses for future reference. Regularly report on the status of ongoing security incidents and trends to senior management. Research & Knowledge Enhancement: Stay updated with the latest security threats, vulnerabilities, and trends. Participate in security training and development to improve skills in SIEM , EDR , and other security tools. Required Skills and Qualifications: Bachelors degree in Cybersecurity, Information Security, Computer Science, or a related field, or equivalent work experience. Strong experience with SIEM (e.g., Splunk, QRadar, ArcSight). Proficient in EDR and Endpoint Security tools (e.g., CrowdStrike, Microsoft Defender). Hands-on experience in threat and malware analysis . Familiarity with email security systems (e.g., Proofpoint, Mimecast). Strong understanding of network protocols, firewalls, and intrusion detection/prevention systems. Knowledge of security frameworks and industry standards (e.g., MITRE ATT&CK, NIST). Excellent analytical and problem-solving skills. Preferred Qualifications: Security certifications like CompTIA Security+ , CISSP , CEH , or GIAC are a plus. Experience with incident response and forensic investigation. Familiarity with cloud security in AWS, Azure, or Google Cloud.

Posted 2 weeks ago

Apply

7.0 - 12.0 years

9 - 14 Lacs

Chennai

Work from Office

Naukri logo

Comcast brings together the best in media and technology We drive innovation to create the world's best entertainment and online experiences As a Fortune 50 leader, we set the pace in a variety of innovative and fascinating businesses and create career opportunities across a wide range of locations and disciplines We are at the forefront of change and move at an amazing pace, thanks to our remarkable people, who bring cutting-edge products and services to life for millions of customers every day If you share in our passion for teamwork, our vision to revolutionize industries and our goal to lead the future in media and technology, we want you to fast-forward your career at Comcast, Job Summary Responsible for working with the Network and Systems Engineers to create, maintain and enforce security policies effecting the network Responsible for securing all information and information systems assets of the Company network infrastructure Design/install/operations of VPN, SoHo, WAF, IDS, DDoS, Partner Access Solutions, Network Security Stack powering Zero-Trust, Firewalls and microsegmentation protecting CCS operations infrastructure (SIEM, DataLake, WAF, IDS, SOC dashboards) Has in-depth experience, knowledge and skills in own discipline Usually determines own work priorities Acts as a resource for colleagues with less experience, Job Description Expertise in Linux with experience in major distributions such as RHEL, Rocky Linux, Ubuntu and Amazon Linux, Hands-on experience with at least one EDR tool such as CrowdStrike, Sentinel One, Defender or Trend Micro (CrowdStrike is a strong plus), Capable of writing and managing Ansible roles/playbooks for automating EDR deployment, Strong experience in container security particularly with Docker, Proficient in Kubernetes orchestration with hands-on experience in AWS EKS, Azure AKS, and self-hosted orchestrators, Skilled in handling AWS security at the endpoint level especially for EC2-backed workloads, Solid foundational knowledge of cybersecurity principles, Basic scripting skills in Python and Shell for task automation, alert customization and API integration in tools like CrowdStrike Falcon, Strong documentation skills for automation processes, projects and major tasks, Prior experience analysing hashes provided by the Incident Response team, Skilled in troubleshooting and resolving issues on EDR-protected machines, Ability to work with EDR vendors to proactively address issues and implement new features, Conducts regular EDR agent testing and assesses the impact of new versions on enterprise systems, Experience implementing tasks within a Change Management process especially for production impacting changes, Knowledgeable in managing forward and reverse proxy tools such as HAP Roxy and Squid for secure data flow, Understanding of cloud security posture to identify and address gaps in endpoint protection, Able to collaborate with application teams to address P1/P2 incidents during outages, Proactively generates new ideas to improve endpoint security posture and protect enterprise assets, Disclaimer This information has been designed to indicate the general nature and level of work performed by employees in this role It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications, Comcast is proud to be an equal opportunity workplace We will consider all qualified applicants for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability, veteran status, genetic information, or any other basis protected by applicable law, Base pay is one part of the Total Rewards that Comcast provides to compensate and recognize employees for their work Most sales positions are eligible for a Commission under the terms of an applicable plan, while most non-sales positions are eligible for a Bonus Additionally, Comcast provides best-in-class Benefits to eligible employees We believe that benefits should connect you to the support you need when it matters most, and should help you care for those who matter most Thats why we provide an array of options, expert guidance and always-on tools, that are personalized to meet the needs of your reality to help support you physically, financially and emotionally through the big milestones and in your everyday life Please visit the compensation and benefits summary on our careers site for more details, Education Bachelor's Degree While possessing the stated degree is preferred, Comcast also may consider applicants who hold some combination of coursework and experience, or who have extensive related professional experience, Relevant Work Experience 5-7 Years

Posted 2 weeks ago

Apply

1.0 - 5.0 years

2 - 6 Lacs

Karnataka

Work from Office

Naukri logo

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations Since 2011, our mission hasnt changed "” were here to stop breaches, and weve redefined modern security with the worlds most advanced AI-native platform Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward Were also a mission-driven company We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers Were always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other Ready to join a mission that mattersThe future of cybersecurity starts with you. About The Role You will be extremely results driven, customer focused, technologically savvy, and innovative at building internal relationships and external partnerships to attack the market with passion! Focusing on creating business opportunities within Corporate clients across India. This role requires you to be working from office 5 days a week from our Bangalore office. What You'll Do Actively engage our prospective customers to identify new opportunities for CrowdStrike over the phone Discover and drive new business opportunities within the assigned region. Conduct high level discovery calls with the C-suite and their VPs Become a cyber security expert and thought leader Earn a black belt in competitive selling and objection handling Collaborate with marketing and channel partners to execute on a successful go-to-market strategy Provide exceptional and high touch customer service, including escalation and coordination of support issues as needed. Become an insider within the Cyber Security Industry and become an expert at expert of CrowdStrike products. What Youll Need A strong desire to create a successful career in technology sales Technical aptitude and ability to learn new business and technical concepts quickly Competitive nature, but also a collaborative team player Strong presentation skills, both in person and via virtual channels Customer Service background a plus Security and/or SaaS Sales experience a plus Telephone Sales experience preferred but not essential Benefits Of Working At CrowdStrike Remote-friendly and flexible work culture Market leader in compensation and equity awards Comprehensive physical and mental wellness programs Competitive vacation and holidays for recharge Paid parental and adoption leaves Professional development opportunities for all employees regardless of level or role s, geographic neighbourhood groups and volunteer opportunities to build connections Vibrant office culture with world class amenities Great Place to Work Certified„¢ across the globe CrowdStrike is proud to be an equal opportunity employer We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed We support veterans and individuals with disabilities through our affirmative action program. CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance. Show more Show less

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies