Jobs
Interviews

2 Cybersecurity Monitoring Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4.0 - 6.0 years

4 - 6 Lacs

Bengaluru, Karnataka, India

On-site

Monitor events and alerts from multiple technologies to detect malicious activity and report probable cyberattacks to senior analysts Perform real time proactive security monitoring, detection and response to security events and incidents Collaborate with the team to generate transfer of knowledge documentation for other analysts on duty to effectively remediate security incidents Conduct moderately complex investigations of security events generated by the detection mechanisms and research their root cause Utilize advanced network and host forensic tools to triage and scope an incident Update the company's security systems regularly to avoid cyberattacks Independently solve moderately complex issues with minimal supervision, while escalating more complex issues to appropriate staff Other duties as assigned Qualifications Bachelor's degree in a related field or equivalent experience Administrative skills in various operating systems Knowledge of security related principles, techniques, technologies and their functions Minimum of 2 years of relevant work experience Typically reflects 3 years or more of relevant experience Preferred Qualifications Industry recognized information security certifications Experience in scripting, analytics and automation Experience with security information and event management, email, network and host forensic tools Knowledge of various cyber attacks and hacker techniques Experience working in network defense, ethical hacking, incident response, computer forensics, malware analysis and reverse engineering

Posted 1 week ago

Apply

5.0 - 10.0 years

5 - 10 Lacs

Chennai, Tamil Nadu, India

On-site

At least 3 years of relevant experience in IT Security or with Security Operations Center. Knowledge of various security methodologies and technical security solutions. Experience analyzing data from cybersecurity monitoring tools such as SIEM / SOAR platforms. Knowledge of commonly accepted information security principles and practices, as well as techniques attackers would use to identify vulnerabilities, gain unauthorized access, escalate privileges, and access restricted information. Strong understanding of security operations concepts: perimeter defense, endpoint management, data leak prevention, kill chain analysis and security metrics. Knowledge of the common attack vectors on various layers. Knowledge and experience working with the Cyber Kill Chain Model, MITER ATT&CK Matrix. Experience in transport/shipping/logistics is a plus.

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies