Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
6.0 - 11.0 years
5 - 9 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Job description :- Bachelors degree in computer science, Information Technology, or related field. Certifications such as CCNP Security, PCNSE, Check Point CCSA, or equivalent. Extensive experience (6+ years) in managing network security devices including Cisco ASA Firewall, Palo Alto Firewall, Panorama, Log Collector, Checkpoint Firewall, and IPS Technologies. Strong understanding of network security principles and best practices. Proven experience in troubleshooting complex security issues. ready to work in rotational shifts for 24x7 Operational Support Excellent communication and teamwork skills. Manage and administer the Palo Alto Panorama centralized security management system. Configure and maintain policies and rules across multiple Palo Alto Networks firewalls using Panorama templates, device group and Shared Firewall policies. Monitor network security events and alerts through Panorama for quick response to potential threats and incidents triggered. Troubleshoot and resolve issues related to Panorama configuration and firewall policy management. Conduct regular audits and reviews of Panorama configurations to ensure compliance with security standards. Ability to work in a fast-paced environment and handle multiple priorities efficiently. Available to work from office Monday through Friday.
Posted 1 day ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Threat Modeling. Experience3-5 Years.
Posted 1 day ago
3.0 - 5.0 years
7 - 11 Lacs
Chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Palo Alto Networks - Firewalls. Experience3-5 Years.
Posted 1 day ago
5.0 - 8.0 years
5 - 9 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Microsoft Bitlocker. Experience5-8 Years.
Posted 1 day ago
3.0 - 5.0 years
7 - 11 Lacs
Chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Trend Micro Antivirus - Deep Security. Experience3-5 Years.
Posted 1 day ago
3.0 - 5.0 years
7 - 11 Lacs
Coimbatore
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: SailPoint Identity Now. Experience3-5 Years.
Posted 1 day ago
3.0 - 5.0 years
5 - 9 Lacs
Gurugram
Work from Office
The Role is to work as a Senior Analyst on the GRC Third Party Risk Assessment, Cybersecurity team and is a Tier / L2 support role for Vendor Risk Management (Cyber). The Cyber vendor team conducts the cyber diligence on all firm vendors and works closely with the Vendor Risk Team (Non-Cyber The individual will be responsible for managing portions of the operational work for VRM (Cyber) Kickoff of reviews, touchpoints with vendors to follow up on review status, collecting evidence, and following up on any action items. Updating tracking tools and drafting reports for stakeholders The ideal individual also has cybersecurity and risk management proficiency and can review questionnaires that vendors provide, identify control deficiencies, ask to follow up questions and know when to escalate control gaps to Tier / L3 Training on our proprietary system will be given, however knowledge of frameworks such as the SIG, CAIQ, NIST, ISO and SOC1/2 will be ideal. Having specific vendor risk experience is not a requirement, but knowledge of cybersecurity is If they understand risk management and vendor risk thats a plus, but I can teach them more about our risk management approach, but reviewing and understanding technical controls is important. Understanding of cybersecurity domain like Application security, threat management, incident response, network security, infrastructure security, cloud security, end point security, vulnerability managemen Knowledge of industry regulations and standards such as NIST, ISO, GDPR, SOC is also useful. Good to have working experience onMandatory SkillUse of Tools Microsoft Office, Word, PowerPoint, Excel Familiarity with Jira, Confluence, Kanban Board, ServiceNo Familiarity with ISO 27001, ISO 27002, ISAE 3402, SOC 1 and 2, SOX, CMMC, HITRUST, HIPAA, CRBF, Solvency, etc Familiarity with cybersecurity domains such as domains Compliance of the companys user access rights and respond with reports to auditors. Good to have Handson experience in assessing GRC tools (e.g. ProcessUnity, Hyperproof etc.) Good Communication and audit report writing Skill Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: GRC Consulting. Experience3-5 Years.
Posted 1 day ago
8.0 - 12.0 years
20 - 35 Lacs
Bengaluru
Hybrid
Requirements Bachelors degree in Computer Science, Cyber Security, Information Systems, or equivalent work experience. 8+ years of security experience, including 3+ years specifically in a security architecture role. Hands-on experience with securing microservice and serverless architectures, especially on AWS (ECS/ECR, Lambda, API Gateway, RDS, Secrets Manager, S3, IAM). In-depth understanding of regulatory and compliance frameworks (ISO27001, NIST, HITRUST, SOC). Proficiency in authentication protocols such as LDAP, SAML, and OAuth. Scripting or coding experience in Python, PowerShell, Java/JavaScript, or Node.js. Preferences Certifications in AWS (Solutions Architect, Security Specialty), Azure (AZ-104, AZ-305, AZ-500), or other major cloud providers. Prior experience in networking and firewalling. Exposure to cloud security posture management, identity & access management, and endpoint/server protection. Familiarity with secure design practices and threat modeling techniques. Experience conducting security code reviews and authoring security automation scripts.
Posted 1 day ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: SailPoint Identity Mgmt and Governance. Experience5-8 Years.
Posted 1 day ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: PingFederate. Experience3-5 Years.
Posted 1 day ago
3.0 - 5.0 years
7 - 11 Lacs
Chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Palo Alto Prisma Access. Experience3-5 Years.
Posted 1 day ago
6.0 - 10.0 years
15 - 25 Lacs
Bengaluru
Work from Office
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you a tech-savvy problem-solver with a passion for ensuring optimal network performance? If so, look no further – Kyndryl is seeking a Network Support Specialist who will be the go-to expert for installing, maintaining, and troubleshooting computer networks. As our Network Support Specialist, you'll be working in a complex, multi-vendor environment, and will use your analytical skills to identify and resolve network issues, make configuration changes, and implement security policies. This role requires someone who can think on their feet, test and apply corrective actions (including emergency changes), and participate in change reviews as needed. And with the ever-changing nature of technology, you'll be constantly learning and growing in your role. You will work alongside a talented team of experts to plan and execute routine network changes, troubleshoot and solve network issues and outages, and maintain excellent communication with our end customers, project managers, and service engineers. You’ll be responsible for maintaining network components, monitoring network performance, and maintaining network security. You will also be providing user support for network-related issues, ensuring that our customers receive the highest level of support possible. If you're ready to take on a fast-paced and rewarding role in the world of network support, apply to join the Kyndryl team today! Responsibility are Implement and maintain VPNs, IPSec tunnels, and SSL VPNs using Palo Alto and FortiGate technologies.Proficiency in routing protocols BGP, OSPF Configure proxy and network access control (NAC) solutions.Hands-on experience with FortiManager, and FortiAnalyzerCreate and Perform firmware upgrades, patches, and routine maintenance on firewalls.cIntegrate firewall solutions with SIEM, IDS/IPS, endpoint protection, and cloud security tools.Monitor network performance and security systems, responding to security incidents and conducting root cause analysis.Investigate and respond to security breaches, malware infections, and intrusion attempts. Implement network virtualization, micro-segmentation, distributed fire walling (DFW) .Troubleshoot and optimize NSX networking components, including VXLAN, Overlay, Edge Services Gateway (ESG), and Distributed Logical Routers (DLR) and Configure NSX Security Policies, NAT, VPN, Load Balancing, and Firewall rules Expertise in NSX-T components such as Transport Zones, Edge Nodes, and T0/T1 Gateways. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career, from Junior Administrator to Architect. We have training and upskilling programs that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. One of the benefits of Kyndryl is that we work with customers in a variety of industries, from banking to retail. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others Required Technical and Professional Experience : Total 10+ years of experience. Experience in cybersecurity, SOC, or security engineering roles. Hands-on experience with WAF, IBM DAM, IBM GDE, Force point Proxy, DLP , Email Gateway. Strong knowledge of network security, endpoint security Qualification: BSc. B.E./B. Tech, M.E. /M. Tech Preferred Technical and Professional Experience : Experience with DAM solutions such as IBM Guardium Ability to monitor and audit database activities for unauthorized access and suspicious activities Experience with Thales CipherTrust Understanding of key management solutions (KMS) and Hardware Security Modules (HSMs) Certifications : PCNSE, NSE4 ,WAF, Network Virtualization (VCTA-NV) , Force point DLP, Web Security Administrator Certification , CEH , CompTIA Security+ Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 1 day ago
12.0 - 19.0 years
16 - 20 Lacs
Pune, Ahmedabad, Vadodara
Work from Office
Qualifications & Experience: Engineering graduate with 10 to15 years of experience in Manufacturing Sector with 4+ years of experience in digital transformation particularly in either Development, Project Management of digital projects. Digital Transformation to oversee execution and adoption of digital initiatives across different streams of value chain at company's manufacturing / corporate location. Continuously scout emerging technologies (IoT, AI/ML, Robotics, Digital Twins) and evaluate their applicability in operations. Lead full lifecycle of digital and automation projects: initiation, planning, execution, monitoring, and closure Develop and maintain detailed project plans, budgets, and timelines using Agile or Waterfall methodologies. Hands-on knowledge in setting up digital twins, condition monitoring, anomaly prediction, and environment monitoring. Exposure to Python, SQL, Looker Studio, Power BI for data-driven operations decisions. Certifications in Scrum, Lean, Applied Business Analytics, Azure Cloud, or equivalent are an advantage. Technology Proficiency: Industrial Automation & OT: PROFIBUS, Ethernet, SCADA. Cloud & Edge Platforms: Azure Fundamentals, Azure IoT Edge, integration with on-premise OT systems. Cybersecurity & OT Governance: Awareness of OT security standards for plant systems. Data Science Exposure: Basic knowledge of Python scripting, anomaly detection, and data visualization. Tools: ERP, JIRA, Power BI, GenAI based content development applications Suitable candidates may forward their updated profiles in strict confidence to hr41@hectorandstreak.com
Posted 1 day ago
7.0 - 12.0 years
15 - 25 Lacs
Chennai
Hybrid
We are looking for a Lead Cybersecurity Engineer with deep technical expertise and leadership experience to drive innovative threat detection solutions and lead a team of security engineers. The ideal candidate will bring hands-on experience in research & development (R&D) , demo environment creation , endpoint security , SIEM operations , and cloud-native tools such as Azure Sentinel and the Microsoft Defender suite . This role will play a strategic part in shaping our security detection roadmap and mentoring a high-performing team. Key Responsibilities: Technical Leadership & Strategy Lead a team of cybersecurity engineers in R&D, detection engineering, and solution design. Define detection strategies and oversee implementation of new use cases across tools. Collaborate with security architects, threat intel, and SOC teams for end-to-end threat coverage. R&D & Security Innovation Drive continuous improvement through security research, PoCs, and new technology evaluations. Analyze evolving threats and proactively build defense strategies and custom detections. Lead the development of security content aligned with frameworks like MITRE ATT&CK. Demo Environment & Simulation Lab Design and lead the creation of demo/test environments to simulate real-world threats. Automate environment deployment for testing security tools, rules, and threat scenarios. Build reusable assets and playbooks for internal enablement and customer-facing demos. Endpoint & SIEM Security Lead implementation and optimization of Microsoft Defender for Endpoint , Defender for Identity , and Defender for Cloud . Oversee the configuration and tuning of Azure Sentinel , including custom KQL queries, analytics rules, and automation via playbooks. Ensure integration of diverse log sources and enrichment for advanced threat detection. People & Process Management Mentor junior engineers and promote skill development across the security engineering team. Establish standards and documentation for security engineering best practices. Drive cross-functional collaboration with IT, Cloud, Compliance, and SOC stakeholders. Required Skills & Experience: 8+ years in cybersecurity roles, with 3+ years in a leadership or senior engineering position . Strong hands-on experience with: Azure Sentinel (KQL, workbooks, playbooks) Microsoft Defender for Endpoint, Identity, and Cloud Endpoint security, EDR, and threat detection Security lab/demo environment setup Excellent understanding of security frameworks (MITRE ATT&CK, NIST, etc.). Strong scripting and automation skills (PowerShell, Python, etc.). Experience managing or mentoring technical teams and delivering complex security projects.
Posted 1 day ago
4.0 - 7.0 years
25 - 30 Lacs
Bengaluru
Work from Office
Job Title: Senior Data Scientist About Trellix: Trellix, the trusted CISO ally, is redefining the future of cybersecurity and soulful work. Our comprehensive, GenAI-powered platform helps organizations confronted by today s most advanced threats gain confidence in the protection and resilience of their operations. Along with an extensive partner ecosystem, we accelerate technology innovation through artificial intelligence, automation, and analytics to empower over 53,000 customers with responsibly architected security solutions. We also recognize the importance of closing the 4-million-person cybersecurity talent gap. We aim to create a home for anyone seeking a meaningful future in cybersecurity and look for candidates across industries to join us in soulful work. More at https://www.trellix.com/ . Role Overview: We are seeking a highly skilled and experienced Senior Data Scientist to join our innovative Data Science team. Reporting to the Data Science Director, you will contribute to the development of advanced Machine Learning (ML) solutions for cybersecurity challenges, including threat detection, malware analysis, and anomaly detection. Your expertise will help drive end-to-end ML product development, from data preparation to deployment, while ensuring seamless integration into our core products. What You Will Do: As a Senior Data Scientist, you will work in a team of smart data scientists reporting to the Data Science Director that does full-lifecycle full-stack Machine Learning product development, from feature engineering to model building and evaluation. Our teams use cases include but are not limited to threat detection, threat hunting, malware detection and anomaly detection, and MLOps. You will work with other Senior Data Scientists in the team to execute data science projects. You will identify issues with models running in production and resolve them. This may require retraining models from scratch, adding new features to model, set-up automated model training and deployment pipelines. These models will be integrated into popular products of the company to show maximum impact. About You: A Master Degree or Equivalent degree in Machine Learning, Computer Science, or Electrical Engineering, Mathematics, Statistics In-Depth understanding of all major Machine Learning and Deep learning algorithms, supervised and unsupervised both Passion for leveraging ML/AI to solve real-world business problems 4-7 years of industry experience in one or more machine/deep learning frameworks 4-7 years of industry experience with Python/Pyspark and SQL Experience solving multiple business problems using Machine Learning Experience with various public cloud services (such as AWS, Google, Azure) and ML automation platforms (such as MLFlow) Should be able to drive end-to-end machine learning project with limited guidance Solid computer science foundation Good written and verbal communication Ph.D in Cyber Security/Machine Learning or related field will be an added advantage 4-7 years of industry experience in the field of Data Science/Machine learning Prior experience in solving cyber security problems using machine learning Familiarity with Security Domain will be a plus Company Benefits and Perks: We believe that the best solutions are developed by teams who embrace each others unique experiences, skills, and abilities. We work hard to create a dynamic workforce where we encourage everyone to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees. Retirement Plans Medical, Dental and Vision Coverage Paid Time Off Paid Parental Leave Support for Community Involvement Were serious ab out our commitment to a workplace where everyone can thrive and contribute to our industry-leading products and customer support, which is why we prohibit discrimination and harassment based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.
Posted 1 day ago
3.0 - 6.0 years
7 - 12 Lacs
Noida
Work from Office
Role & responsibilities Conduct internal audits and control assessments across frameworks including but not limited to: SOC 2 Type 2 ISO/IEC 27001:2022 PCI DSS HiTrust CSF PIMS (ISO/IEC 27701), AIMS (ISO/IEC 22301) EcoVadis Prepare and maintain audit documentation, evidence collection, and control narratives. Liaise with stakeholders from IT, Security, HR, Legal, and Operations to gather and verify compliance evidence. Support external auditors during SOC, ISO, and PCI assessments by coordinating walkthroughs, follow-ups, and remediation tracking. Perform risk-based control testing and gap analysis against regulatory and contractual obligations. Maintain and update the audit calendar, issue logs, and compliance dashboards. Monitor and track audit findings and assist in developing corrective action plans (CAPAs). Contribute to the development and continuous improvement of the GRC framework and control library. Stay current on updates to standards (e.g., ISO 27001:2022 updates), regulatory developments (e.g., DPDPA, GDPR), and industry best practices. Looking for early Joiners. Interested Candidate can share resume on bhawana.sharma@rsystems.com or can call at 8595575733. Regards, Bhawana
Posted 1 day ago
5.0 - 10.0 years
11 - 21 Lacs
Mumbai
Work from Office
Role Description: Deep understanding of Insurance Domain, Identification of the system involvement with respect to new Requirement. Continuous coordination and clarification of requirements during development with the business units2. Effective communication with all the involved stakeholders in the Project and Administrating the overall project. Stakeholder management with relevant stakeholders. Coordinating with various team leads, domain specific leads and communicate their involvement in the requirement. Key Accountabilities & Responsibilities: Driving multiple complex projects with a budget of approximately 1m - 3m and taking responsibility for their delivery using formal project management techniques as appropriate by facilitating communication, coordination, planning, and execution across ERGO teams and business partners Planning and follow-up on assigned projects - including time scheduling, cost planning, resource management, quality assurance, etc. Producing a Charter for each project based on the agreed scope, defining the budget, identifying the resources, creating the schedule, outlining the approach and suggesting the sequencing of work required to execute the project effectively Collaborating with internal ERGO partners to troubleshoot project planning issues facilitating design, planning, and implementation workshops with internal and external stakeholders Preparing, planning, and supervising IT projects areas of delivery, implementation, and integration of IT infrastructure and systems Proactively managing project risks and issues; developing effective mitigation/treatment plans Managing project meetings, schedules, milestones, and delivery Preparing project correspondence and presentations, as needed, for status reports, executive updates, meetings, annual planning, etc. Ensuring all project costs (actuals) are actively tracked and managed, including SOWs/Purchase Orders, contracts, internal resource assignments Coordinating the completion of all documentation, project plans, change requests, approvals, lifecycle steps and compliance gate requests on time to ensure the project continues to align with the agreed schedule Building and maintaining a successful relationship with teams and business partners Travelling to our European locations of ERGO may be required Key Competencies & Skills required Technical Skills: Experience of Cyber security domain, Compliance Regulatory and/or Risk projects Regulatory and/or Risk projects knowledge of DORA OR, VAIT OR, NIS2 are a prerequisite experience in both waterfall and agile methodology working knowledge of Project/Programme Management, e.g., Managing Successful Programmes (MSP), Prince2 and agile project management tools and methodologies Strong management skills including project management, financial management, change management and facilitation Demonstrable experience in setting up and driving successful global programmes Demonstrated strong personal organizational skills and the ability to coordinate the efforts of others globally in the successful delivery of projects Ability to work in complex organization structures and tenaciously forge a path for delivery resulting in business outcomes and stakeholder benefit Excellent project planning, budget, scoping, costing, and scheduling ability Proven ability to create meaningful reports and summaries’ project health status for stakeholder presentations Ability to drive a mixture of functional and geographic workstreams and co-ordinate step change delivery to the business in a unified way Knowledge of infrastructure integration issues at the international level Experience in managing distributed teams and able to work in a matrix setup Excellent communication and presentation skills Plan View experience desirable good to have Nice to have: Certification in Project Management German written and spoken language Behavioral Skills: Good interpersonal, communication and organizational skills relevant to the role. Willingness to learn and quickly adapt to changing requirements. Proactive approach to identifying issues and presenting solutions and options Ability to direct and guide teams as relevant Soft Skills: Ability to work in a team Conflict resolving skills Flexibility Initiative Resilience Excellent interpersonal, communication, and organizational skills. Communication and presentation skills Previous Experience & Qualifications Minimum Educational Qualification: Bachelor’s or master’s degree in computer science /engineering/information technology Candidate with non-computer science degree must have minimum 1 year of relevant experience MBA in IT / Insurance/Finance can also apply for Requirements Engineer and Test Engineer role. Years Experience & Knowledge: 7 experiences in successfully managing the delivery of multiple IT Regulatory, Risk, Compliance and/or Risk projects within a technically complex and dynamic environment, ideally in a global Finance/Insurance or regulated industry fluency in English
Posted 1 day ago
12.0 - 14.0 years
35 - 40 Lacs
Bengaluru
Work from Office
Job Title - S&CGN - Tech Strategy & Advisory -Platform Strategy - Manager Management Level: 7-Manager Location: Hyderabad, HDC2A Must-have skills: Enterprise Architects Good to have skills: Knowledge of emerging technologies, cloud computing, and cybersecurity best practices. Job Summary : This role involves driving strategic initiatives, managing business transformations, and leveraging industry expertise to create value-driven solutions. Roles & Responsibilities: Develop and execute technology transformation strategies, oversee implementation projects, and optimize digital capabilities for business efficiency. The Enterprise Architect Join our team in Technology Strategy for an exciting career opportunity to enable our most strategic clients to realize exceptional business value from technology Practice: Technology Strategy & Advisory, Capability Network I Areas of Work: Enterprise Architecture & Business Transformation | Level: Manager | Location: Bangalore/Gurugram/Mumbai/Pune/Hyderabad/Kolkata | Years of Exp: 10 to 15 Explore An Exciting Career at Accenture Do you believe in creating an impactAre you a problem solver who enjoys working on transformative strategies for global clientsAre you passionate about being part of an inclusive, diverse and collaborative culture Then, this is the right place for you! Welcome to a host of exciting global opportunities in Accenture Technology Strategy & Advisory. The Practice- A Brief Sketch: The Practice is a part of and focuses on the clients most strategic priorities. We help clients achieve growth and efficiency through innovative R&D transformation, aimed at redefining business models using agile methodologies. We provide you with a great learning ground, deep-rooted in , where you will get an opportunity to advice and work with our key global clients, driving end-to-end transformative strategic value and business growth. As a part of this high performing team, you will proactively and holistically help and guide the enterprise leaders, product managers, product owners and distributed product delivery teams through transformation and optimization initiatives, supporting the formulation of business strategy, outcomes and capabilities. Your scope of activities could include helping the organization achieve targeted business outcomes related to growing revenue, optimizing costs, mitigating risks and improving sustainability. You focus on development of the business and IT strategy and enterprise architecture of the organization as a whole. You would be expected to: Facilitate alignment between business and IT, and across the democratized IT landscape Engage business and IT stakeholders, building and maintaining relationships Adapt to changing business and operating models Analyze trends and disruptions, and assess their impact on targeted business outcomes Tell stories to visualize the future state and trigger long-term planning Support various operating models such as project-centric and product-centric Communicate the value of enterprise architecture, and its portfolio of services Drive the evolution of the EA teams services and operating model Coach and mentor other architects, product owners/managers and business stakeholders to instill architectural thinking Scope of Activities: As an Enterprise Architect, you will demonstrate competencies across four key dimensions: Support Formulation of Strategy and Guide Execution Lead the analysis of business and operating models, market trends and the technology industry to determine their potential impact on the enterprises business strategy, direction, and architecture. Provide perspective on the readiness of the organization to change and innovate through scenario planning techniques, and supports formulation of business strategy. Uses planning-driven, design-driven and learning-driven approaches to construct future- and current-state business models. Connects Strategy to Execution Facilitate business and IT alignment, connecting strategy to execution, through a collaborative, supportive and consultative manner, driving the organizations digital business strategies and balancing innovation and growth. Translate and guide execution of business strategy to achieve the organizations targeted business outcomes. Build and Maintain Relationships Build the EA value proposition, contributing to positioning the EA practice as an internal management consultancy, offering services and skills to support the development and execution of business strategy. Develop a portfolio of consulting services, designed to meet business and stakeholder needs, and delivers in an agile and time-boxed way. Determine the relationship between people, processes, information, technology and other components of the enterprise operating model. Enable value-based messaging and manage cross-functional relationships Provide consultative advice, adapted to stakeholder context, to business leaders and organizational stakeholders who seek actionable recommendations to make investment decisions about the next business and operating model of their organization, using technology to make that change happen. Lead interaction with business leaders, product managers and product owners in a business-driven conversation over the risks and implications of the product decision to the line of business, business unit and greater enterprise. Orchestrate the Delivery of Business Outcomes Position the EA practice at the intersection of business and IT. Ensure that the EA practice is designed and enabled to formulate, translate and execute business strategy. Work with business architects and business leaders to identify key drivers and targeted business outcomes to derive useful business context. Bring alignment across business and IT Lead analysis of the business future-state capabilities and future (and current) IT environment to detect critical gaps and opportunities and recommend solutions for improvement to drive the business towards its targeted outcomes. Identify organizational requirements for the resources, structure and cultural changes necessary to support the enterprise architecture. Work with the CIO and IT leaders to find the right EA organizational design to drive business-outcomes. Ensure that the EA organizational design process leads to a more efficient and effective business and IT operating model, significantly improved results and EA resources empowered and committed to the integration of business and IT. Support Solution Design and Delivery Maintain the alignment, integration and coordination of architecture activities across different programs, projects and products as they evolve over time. Present gap analyses and/or IT investment roadmaps that reflect the status of the existing IT landscape, namely, its ability to contribute to future-state business capabilities around ecosystems and digital platforms. Lead analysis of the IT environment to detect critical deficiencies and recommend solutions for improvement. Lead the development of an implementation plan for the enterprise architecture based on business requirements and the varying IT strategies for project-driven or product-driven delivery teams. Support solution design and delivery Develop and apply minimal viable architectures, which can include a set of standards, reference architecture patterns, principles and guardrails, through the EA governance model, which is informed by the business strategy and corporate governance. Facilitate a collaborative relationship across architecture community, product management and product delivery teams by providing freedom-in-a-box for decision making, with the minimal viable architecture forming the boundaries of the box. Collaborate with delivery teams to ensure consistency with the enterprise architecture, as well as to leverage shared technologies, tools and processes that impact speed to value and time to market. Collaborate with infrastructure teams to ensure consistency with the enterprise architecture, as well as to identify when it is necessary to modify the enterprise architecture. Professional & Technical Skills: - Relevant experience in the required domain.- Strong analytical, problem-solving, and communication skills.- Ability to work in a fast-paced, dynamic environment. Additional Information: - Opportunity to work on innovative projects.- Career growth and leadership exposure. Qualification Experience: 12-14Years Educational Qualification: Any Degree
Posted 1 day ago
8.0 - 12.0 years
12 - 13 Lacs
Bengaluru
Work from Office
General information: Hitachi Energy, is looking for a highly motivated Product Security Specialist, to be responsible to Establish an Enterprise Approach to Product Risk Management. We are an energy technology company with engineers, digital pioneers, creators, and innovators at our core. We do more than keep the lights on, our purpose is to inspire sustainable progress. Responsibilities: Review the current state of Product Risk generated by security control testing and vulnerability management activities. Provide technical tool integration and architect guidance regarding product cybersecurity vulnerability identification, remediation, and response to the business and Enterprise Risk Management reporting. Lead the development of innovative solutions and drives implementation of new tools and technologies related to Product risk management and report activities that meet customer requirements and define risk maturity goals. Product Security content management with standard assessment and risk review documentation for audit and compliance reporting. Support implementation of best security practice methods, processes, tools, and continuous improvement initiatives aimed at scaling and increasing the efficiency of Hitachi Energy processes. Establish an oversight on the end-to-end Product risk management process on the corporate level with Enterprise risk management and define a way to track and ensure the product standards and exception policy is followed correctly. Set up a best practice and operational process for full transparency and mitigation of Products Risk Conduct Product risk impact assessment with the business unit for risk remediation tracking and reporting. Drive awareness of product vulnerability findings across the developer community for a secure development life cycle practice, hardening systems, vulnerability, and code scanning management. Track global Cyber regulations, security audits, and reviews to ensure policies and processes are followed. Complete understanding of inherent risk in Product Security management. Your background: Master or higher degree in Computer Science, Software Engineering, or related qualification, and demonstrated capability through past employment experience. Around 8+ years of experience in vulnerability management with customers in IT and industrial systems and an in-depth understanding of cyber security technology, solution, and processes, especially in the area of vulnerability handling management, incident response handling, and risk management Strong project management skills: planning, organizing, monitoring, and reporting on project activities. Security Audit experience a plus. Strong analytical problem-solving skills and practical cyber security experience. Capable of understanding and communicating complex cybersecurity requirements. Strong communication skills such as planning and leading effective meetings, conducting structured interviews to collect information, interpersonal and negotiation skills, and presenting to various audiences. Security industry certification such as SANS GIAC or industrial control system-related certifications a plus Working experience in Product Security is a plus and not mandatory. Qualified individuals with a disability may request a reasonable accommodation if you are unable or limited in your ability to use or access the Hitachi Energy career site as a result of your disability. You may request reasonable accommodations by completing a general inquiry form on our website. Please include your contact information and specific details about your required accommodation to support you during the job application process. .
Posted 1 day ago
8.0 - 13.0 years
5 - 12 Lacs
Chennai
Work from Office
VAPT, OCSP / CISSP Certified
Posted 1 day ago
4.0 - 9.0 years
9 - 15 Lacs
Thane, Chennai
Work from Office
Job Title: Technical Project Manager (FinTech) Location: Chennai & Thane Maharashtra Employment Type: Full time Job Summary: We are seeking a skilled Technical Project Manager with expertise in FinTech to lead and manage complex projects in a fast-paced environment. The ideal candidate will bridge the gap between technical teams and business stakeholders, ensuring seamless execution and delivery of projects within scope, time, and budget. Key Responsibilities: Oversee the end-to-end lifecycle of technical projects, from initiation to deployment. Collaborate with cross-functional teams including engineering, product management, compliance, and finance. Define project scope, goals, and deliverables that align with business objectives. Develop detailed project plans, timelines, and resource allocations. Manage risks, dependencies, and mitigation strategies effectively. Drive agile methodologies (Scrum/Kanban) and ensure best practices in project execution. Ensure compliance with financial regulations, security protocols, and industry standards. Communicate project status, milestones, and issues to stakeholders clearly and effectively. Coordinate with external vendors, third-party providers, and partners when necessary. Continuously optimize workflows and processes to enhance efficiency and scalability. Required Skills & Qualifications: Bachelor's/Masters degree in Computer Science, Information Technology, Business, or related field. 5+ years of experience in project management, with at least 3 years in the FinTech domain. Strong understanding of financial technologies, payment systems, banking APIs, blockchain, or trading platforms. Experience with Agile methodologies (Scrum, Kanban), Jira, Confluence, and other project management tools. Proven ability to manage multiple projects simultaneously in a dynamic environment. Strong technical acumen with the ability to communicate effectively with development teams. Excellent problem-solving, decision-making, and analytical skills. Strong leadership and stakeholder management abilities. PMP, CSM, or other project management certifications are a plus. Preferred Qualifications: Experience working with cloud platforms (AWS, Azure, GCP) and DevOps practices. Knowledge of regulatory compliance frameworks such as PCI DSS, GDPR, and AML/KYC. Background in software development or engineering is an advantage.
Posted 1 day ago
7.0 - 12.0 years
35 - 37 Lacs
Bengaluru
Work from Office
Core Responsibilities Assist with technical control design, implementation and monitoring, support incident responses and assist with providing root cause analysis support for incidents. Monitor for attacks, intrusions, and un-usual, unauthorised or illegal activities when the Security Analysts are finding the instance challenging. Keep an eye on the alerts from systems including SEIM solutions and vulnerability monitoring services and check if the Analysts are able to handle the flow appropriately, if not then jump in and investigate if there are any abnormality in the inflow. Monitor identity and access management, including monitoring for abuse of permissions by authorised systems users if the stats are fluctuating or when you see a spike in the alerts. Assist with Information Security Reporting and metrics, providing input into improving information security reporting and metrics. Identify/recommend improvements on internal investigation capabilities via tool and process building/automation. Provide support to recovering from security breaches; participate in investigation and remediation of security incidents, which may include working as part of a team Assist in perform deep-dive incident analysis, determining if critical systems or data sets has been impacted. Assist with the definition and configuration of compliance policies for security technologies. Conduct research on emerging threats in support of security enhancement and development efforts; recommend security improvements, upgrades, and/or purchases. Support the incident response of minor incidents by advising on remediation actions, escalating major incidents to the designated parties. Recording lessons learnt whilst supporting on improving existing processes and procedures. Providing support of new analytic methods for detecting threats. Continuously seeking to identify potential service and process improvements. Participate in the implementation of technologies and platforms supporting the corporate infrastructure. Ensure that you fully understand and comply with the organisation’s Risk Management Policies as they relate to your area of responsibility. Ensure that you fully understand and comply with the organisation’s Data Governance Policies as they relate to your area of responsibility. Maintain the company’s compliance standards and ensure timely completion of all mandatory on-line training modules and attestations. Monitoring technical controls that are in place Addressing quires raised by the Security Analysts during investigation or other BAU. Assist Security Analysts in decision making and help in setting up standards. Will be responsible to suggest new fine tunings in the environment to the vendor or to the technical counterparts. Process review and upgradation recommendation when required. Setting up simplified and effective steps in BAU that in turn improves the quality of the work Implementation of new process based on business requirements and communicating the same with the team Team building and team management activities will be one of the key responsibility.
Posted 1 day ago
9.0 - 14.0 years
20 - 25 Lacs
Navi Mumbai, Bengaluru, Delhi / NCR
Work from Office
Information security, Cyber Security, Data Privacy Security Analysis, Network Security , Information Security Projects, Audit assessment, GRC Security Project Audit Perform Risk Assessment .share resume info@Servingskill.com/whats app 9819832570 Required Candidate profile Information Security Project Audits, assessments appsec Perform Technology Risk Assessments for processes, technology (Information security, Cyber Security, Data Privacy) Security Analysis ISO/CEH
Posted 1 day ago
3.0 - 6.0 years
10 - 15 Lacs
Hyderabad, Chennai, Bengaluru
Work from Office
KEY Capabilities: Experience in working with Splunk Enterprise, Splunk Enterprise Security & Splunk UEBA Minimum of Splunk Power User Certification Good knowledge in programming or Scripting languages such as Python (preferred), JavaScript (preferred), Bash, PowerShell, Bash, etc. Perform remote and on-site gap assessment of the SIEM solution. Define evaluation criteria & approach based on the Client requirement & scope factoring industry best practices & regulations Conduct interview with stakeholders, review documents (SOPs, Architecture diagrams etc.) Evaluate SIEM based on the defined criteria and prepare audit reports Experience in onboarding data into Splunk from various sources including unsupported (in-house built) by creating custom parsers Verification of data of log sources in the SIEM, following the Common Information Model (CIM) Experience in parsing and masking of data prior to ingestion in SIEM Provide support for the data collection, processing, analysis and operational reporting systems including planning, installation, configuration, testing, troubleshooting and problem resolution Assist clients to fully optimize the SIEM system capabilities as well as the audit and logging features of the event log sources Assist client with technical guidance to configure end log sources (in-scope) to be integrated to the SIEM Experience in handling big data integration via Splunk Qualification & experience: Minimum of 3 to 7 years experience with a depth of network architecture knowledge that will translate over to deploying and integrating a complicated security intelligence solution into global enterprise environments. Strong oral, written and listening skills are an essential component to effective consulting. Strong background in network administration. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary. Must have knowledge of Vulnerability Management, Windows and Linux basics including installations, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting. Certification in any one of the SIEM Solution such as IBM QRadar, Exabeam, Securonix will be an added advantage Certifications in a core security related discipline will be an added advantage.
Posted 1 day ago
2.0 - 7.0 years
8 - 18 Lacs
Noida, Gurugram, Mumbai (All Areas)
Hybrid
Role & responsibilities Develop and implement custom analytics rules within Microsoft Sentinel to identify security threats and anomalies. Leverage KQL and other tools to create custom detection on Microsoft Defender XDR MDE & MDCA. Create advanced detection rules based on business requirements & SOC Use Cases. Work with SIEM and SOAR solutions at scale. Collaborate with other security teams to identify and prioritize security requirements and develop effective solutions. Update the code (KQL) on analytical rule for finetuning the false positive incidents. Stay up to date with the latest security threats and trends and apply this knowledge to improve our security posture. Perform content enrichment depending on feedback received from security analysts. Have a strong understanding of Cloud Security and Networking Concepts and practices. Helps to create reports that properly present the key risk and performance indicators. Communicating & reporting concise summaries of complex scenarios & information across diverse and senior stakeholder groups. Design, maintain Content Management standard operating procedures (SOP), processes and guidelines. Report preparation for leads and management review with data from dashboards & reports. Preferred candidate profile Strong understanding of JSON, Kusto Query Language (KQL) and PowerShell languages. Experience analyzing data from cybersecurity monitoring tools such as SIEM / SOAR platforms, host and network logs, firewall and IPS/IDS logs and email security gateway. Strong understanding of security operations concepts: perimeter defense, endpoint management, data leak prevention, kill chain analysis and security metrics. Knowledge of the common attack vectors on various layers. Knowledge and experience working with the Cyber Kill Chain Model, MITER ATT&CK Matrix. Experience with Security Operations Center, SIEM management & solutions ownership. Knowledge of various security methodologies and technical security solutions. Conduct an audit of the platform configuration to optimize it. Optimizing the way logs are processed and leveraged by SOC team members. Knowledge on schemas of Microsoft Defender XDR solutions (Microsoft Entra ID and ID protection, Microsoft Defender for Endpoint, Microsoft Defender for Cloud apps, Microsoft Purview Information Protection) and Microsoft 365. Knowledge of schemas with security events logs from Microsoft windows server. Experience of working within a regulatory/controlled environment. Understanding of Cyber Security Risk and mitigation strategies.
Posted 2 days ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6462 Jobs | Ahmedabad
Amazon
6351 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane