Jobs
Interviews

344 Edr Jobs - Page 4

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 6.0 years

0 Lacs

delhi

On-site

Continue to make an impact with a company that is pushing the boundaries of what is possible. At NTT DATA, renowned for technical excellence, leading innovations, and making a difference for clients and society. The workplace embraces diversity and inclusion, offering a place where you can grow, belong, and thrive. Your career here is about believing in yourself, seizing new opportunities and challenges, expanding skills, and expertise in your current role while preparing for future advancements. Encouraged to take every opportunity to further your career within the great global team. The Security Managed Services Engineer (L1) is an entry-level engineering role responsible for providing a managed service to clients to ensure operational Firewall infrastructure. The role involves proactively identifying, investigating, and routing incidents to the correct resolver group. The primary objective is to ensure zero missed service level agreement (SLA) conditions, focusing on first-line support for standard and low complexity incidents and service requests. Additionally, the Security Managed Services Engineer (L1) may contribute to project work as needed. **What you'll be doing:** **Academic Qualifications and Certifications:** - BE/BTech in Electronics/EC/EE/CS/IT Engineering - At least one security certification such as CCNA Security, CCSA, CEH, CompTIA **Required Experience:** - Minimum 2 years of experience in handling security-related products & services, preferably SIEM solution. - Adequate knowledge of security devices like firewalls, IPS, Web Application Firewall, DDOS, EDR, Incident response, SOAR, and other security devices. - Construction of SIEM content required for Content Outputs. - Knowledge of packet level analysis, networking protocols, technologies, and network security. - Sound analytical and troubleshooting skills. **Key Responsibilities:** - Monitor client infrastructure and solutions, identifying problems and errors before or when they occur. - Investigate first-line incidents, identifying root causes. - Provide telephonic or chat support to clients. - Schedule maintenance activity windows for patching and configuration changes. - Follow required handover procedures for shift changes. - Report and escalate incidents as necessary. - Ensure efficient resolution of incidents and requests, update knowledge articles, identify optimization opportunities, and contribute to project work as required. - Implement and deliver Disaster Recovery functions and tests. - Perform any other related task as required. **Workplace type:** On-site Working **Equal Opportunity Employer**,

Posted 2 weeks ago

Apply

21.0 - 31.0 years

17 - 21 Lacs

Bengaluru

Work from Office

What we’re looking for In this dynamic Information Security Analyst III role, you'll be at the forefront of protecting SurveyMonkey by crafting sophisticated threat detections and staying ahead of emerging threats within the security operations team. You will be reporting to the Information Security Manager. Leveraging your expertise in SIEM query languages, you'll play a key role in identifying and mitigating risks, ensuring the company's security posture remains robust. We are looking for someone who has experience in automation and is constantly challenged to expand their knowledge of the latest security trends while contributing to the defense of a widely trusted service. What you’ll be working on Monitor and triage security events, identify vulnerabilities, and respond to security incidents. Develop and refine security automation playbooks. Expertise in creating threat detections and staying abreast of new and evolving threats. Ability to conduct research and log analysis into IT security issues and products as required. Deploy, manage and maintain all security tools and ensure strong security posture of corporate devices. We’d love to hear from people with Bachelor degree in Information Security, Cybersecurity, Information Technology, or a related field. 8+ years of hands-on experience in IT security, compliance or incident response. Strong familiarity with SIEMs, EDR, SOAR platforms (e.g.,CrowdStrike, LogScale, XSOAR) Working experience with MITRE ATT&CK and Cyber Kill Chain frameworks Experience with AWS cloud security monitor and detection tools. (e.g, AWS GuardDuty, AWS Cloudwatch or AWS CloudTrail or similar) Ability to effectively prioritize and execute tasks in a high-pressure environment. Certifications preferred: Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), CompTIA Security+, Certified Information Security Manager (CISM), or similar. SurveyMonkey believes in-person collaboration is valuable for building relationships, fostering community, and enhancing our speed and execution in problem-solving and decision-making. As such, this opportunity is hybrid and requires you to work from the SurveyMonkey office in Bengaluru 3 days per week. #LI - Hybrid

Posted 2 weeks ago

Apply

4.0 - 9.0 years

5 - 10 Lacs

Ahmedabad

Work from Office

We are seeking an experienced and proactive Senior Cyber Security Specialist (SOC Analyst L3) to strengthen our Security Operations Center (SOC) capabilities. This role demands deep expertise in threat hunting , incident response , and digital forensics , with a proven ability to operate independently while confidently engaging with clients. The ideal candidate will play a critical role in identifying, analyzing, and mitigating cyber threats to ensure enterprise security posture. Key Responsibilities: Conduct proactive threat hunting across network and endpoint environments using SIEM, EDR, and threat intelligence platforms. Identify and analyze Indicators of Compromise (IOCs) and adversary Tactics, Techniques, and Procedures (TTPs) . Perform incident response activities , including triage, containment, investigation, remediation, and recovery. Execute forensic analysis on compromised Windows and Linux systems to determine root cause and impact. Coordinate with SOC, IT, and business teams during high-severity security events and ensure effective communication. Develop and fine-tune detection rules, correlation logic, and incident response playbooks . Leverage frameworks such as MITRE ATT&CK and integrate threat intelligence to enhance detection and defense capabilities. Generate detailed incident reports, RCA documentation , and post-incident recommendations. Act as a subject matter expert (SME) for security operations and mentor junior analysts. Required Skills & Qualifications: 4 - 6 years of hands-on experience in SOC operations , threat hunting , and incident response . Proven ability to work independently and handle client interactions with professionalism and confidence. Strong knowledge of networking concepts , Windows OS , and Linux OS internals. Proficiency in using SIEM tools (e.g., Splunk, QRadar, Sentinel) and EDR solutions (e.g., CrowdStrike, Carbon Black, Defender). Deep understanding of cyberattack lifecycles , threat vectors, and advanced persistence mechanisms. Solid grasp of MITRE ATT&CK , cyber kill chain , and threat modeling methodologies. Experience in forensic tools and techniques for memory, disk, and network forensics. Excellent analytical , problem-solving , and communication skills (both verbal and written). Certifications: Mandatory: CEH, E|CIH, or equivalent Preferred: GCFA, CHFI, GCIH, or other advanced cybersecurity certification

Posted 2 weeks ago

Apply

6.0 - 10.0 years

25 - 32 Lacs

Bengaluru

Work from Office

Hiring Cyber Security Specialist-Operational Technology in Automotive Co. Experience of Endpoint tools,Endpoint Security Mgt S/W, SSL Cert knowledge Knowledge of Security technologies,principles & best practices(Proxy, EDR, ATP, DLP, CASB, ZTNA, AM).

Posted 2 weeks ago

Apply

2.0 - 4.0 years

8 - 18 Lacs

Noida

Work from Office

Key Responsibilities: Perform in-depth penetration testing, vulnerability assessments, and security reviews of applications, infrastructure, and networks. Identify, exploit, and document security vulnerabilities across systems and provide remediation recommendations. Simulate sophisticated attacks to test the strength of security controls and identify potential areas of compromise. Collaborate with development, infra, and DevOps teams to integrate security into the development lifecycle and Infrastructure-as-Code (IaC) security. Develop comprehensive security test plans, methodologies, and tools to ensure effective assessment of systems. Create detailed reports that outline vulnerabilities, risks, and recommended mitigations. Perform threat modeling and risk assessments to prioritize testing efforts. Monitor network traffic for threats and respond to security incidents. Ensure security best practices in Cloud environments, security controls for cloud workloads, IAM policies, and network security. Monitor and respond to cloud security incidents using SIEM and cloud-native security tools. Integrate and automate security testing and compliance checks into CI/CD pipelines using tools like SAST, DAST, and IAST . Required Skills & Qualifications: 2-3 years of experience in cybersecurity with a focus on Penetration testing or Ethical Hacking , Application Security, Cloud Security, and DevSecOps . Experience with security tools such as Burp Suite, Metasploit, Nessus, Wireshark, SonarQube, AWS WAF, Google WAF, Kali Linux, and other vulnerability scanning tools, etc. Knowledge of SIEM , EDR , NIST, CIS, and OWASP security frameworks. Proficiency in scripting (Python, Bash, PowerShell) for security automation. Industry certifications like CEH, Security+, AWS/GCP Security, or any DevSecOps-related certification (preferred but not mandatory). Excellent written and verbal communication skills to effectively report vulnerabilities and collaborate with stakeholders. Education Qualification: B.E./B.Tech Location: Noida Sector 135

Posted 2 weeks ago

Apply

7.0 - 9.0 years

9 - 14 Lacs

Gurugram, Bengaluru

Hybrid

SOC Analyst Core Responsibilities Monitor security dashboards and alerts to identify potential threats. Respond to security incidents by following established response plans. Conduct threat hunting to proactively identify vulnerabilities and potential threats. Collaborate with other departments, such as network engineering and incident response teams, for coordinated threat response. Analyze security incidents and document findings to prevent future occurrences. Develop and maintain security monitoring tools and processes. Implement and optimize SIEM, SOAR, EDR, and Threat Intelligence platforms. Conduct vulnerability assessments and penetration tests to identify weaknesses. Create and maintain incident response procedures and playbooks. Provide detailed reports on security incidents and emerging threats. Stay updated with the latest cybersecurity trends and threats. Experience 7-9 years of experience in cybersecurity, with a focus on SOC operations. Extensive experience with security monitoring tools and incident response. Proficiency in threat hunting and vulnerability analysis. Strong knowledge of network protocols, operating systems, and common cybersecurity threats. Experience with SIEM, SOAR, EDR, and Threat Intelligence platforms. Ability to conduct in-depth threat intelligence analysis and develop containment strategies. Experience in conducting vulnerability assessments and penetration tests. Excellent analytical and problem-solving skills. Strong communication and collaboration skills. Knowledge of frameworks such as NIST Cybersecurity framework, MITRE ATT&CK, and Lockheed Martin Cyber Kill Chain.

Posted 2 weeks ago

Apply

5.0 - 10.0 years

2 - 4 Lacs

Mumbai

Work from Office

Threat Hunting: Minimum 5 years of experience in conducting hypothesis based threat hunting using SIEM logs (preferably Splunk) Good knowledge of recent cyber trends/attacks, MITRE framework Good understanding of network, end point based attacks Must have experience in developing hypothesis using DNS, Proxy, EDR logs Must have experience in drafting hunting reports and communicating to senior leadership & technical stakeholders

Posted 2 weeks ago

Apply

10.0 - 14.0 years

0 Lacs

karnataka

On-site

As the Cybersecurity Program Delivery Director, you will play a pivotal role in coordinating the planning, execution, and delivery of key cybersecurity projects and programs on a global scale. You will work closely with technical teams, security experts, and various stakeholders to ensure that critical security initiatives are implemented effectively and in alignment with corporate strategies. Your responsibilities will span across program portfolio management, global delivery and execution, governance, risk, and compliance (GRC), team coordination, budget control, and technical strategy support. You will be tasked with managing a diverse portfolio of cybersecurity projects, encompassing new technology deployments, risk mitigation, policy updates, and compliance enhancements. It will be your responsibility to establish project goals, timelines, and budgets, while also overseeing cross-regional resource integration and priority management. Additionally, you will ensure the quality and timely delivery of key security projects, manage external suppliers and service providers, and establish standardized delivery processes to drive global project replication capabilities. Collaboration with compliance, legal, and audit teams will be essential to ensure that all projects adhere to relevant regulations and standards such as GDPR, ISO 27001, and NIST. You will lead a global team of project managers, security architects, and business analysts, fostering open communication with senior management, IT, Security Operations Center (SOC), and regional heads. Regular reporting on project progress and key risks to the CISO and senior management will be a key aspect of your role. Your background should include a Bachelor's degree or above in information security, computer science, engineering, or related fields, with a preference for a Master's/MBA. You should possess more than 10 years of experience in information security or project delivery, including over 5 years in cross-border security project management. Proficiency in project management frameworks such as PMP, PRINCE2, and agile delivery methods like Scrum/SAFe is required. Familiarity with information security frameworks and technologies such as NIST, CIS Controls, SOC, IAM, SIEM, XDR, and SASE is crucial, along with certifications like CISSP, CISM, and PMP being preferred. Your leadership skills, cross-cultural communication abilities, and global vision will be essential for this role. You should be comfortable with remote management across different time zones and occasional international travel. Keeping abreast of security technology trends and providing strategic investment recommendations will also be part of your responsibilities. Your contribution to cybersecurity budget formulation, resource allocation, and technology roadmap adjustments will ensure the maximum safety benefits of project investments.,

Posted 2 weeks ago

Apply

4.0 - 8.0 years

0 Lacs

noida, uttar pradesh

On-site

At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture, and technology to become the best version of you. We are counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself and a better working world for all. As part of our EY-Cyber Security in the Risk Consulting team, your role will primarily involve the daily monitoring and maintenance of enterprise Data Protection tools and solutions. Your responsibilities will include the proper care and administration of Data Protection tools, monitoring and responding to alerts generated by the tool, and interfacing with IT Operations, Network Operations, Infrastructure teams, Legal, Risk Management, and more. The opportunity: We are looking for a Security Analyst to work on various privacy/data protection related projects for our global customers. You will work in line with EY's commitment to quality, ensuring that work meets the highest standards and is reviewed by the next-level reviewer. As a key team member, you will help create a positive learning culture, coach junior team members, and contribute to their development. Your key responsibilities: - Building DATA PROTECTION solution concepts and deployment requirements - Deploying DATA PROTECTION tools and implementing endpoint protection - Working with vendors to support DATA PROTECTION technology - Administration of Data Protection tools including configuring policies, upgrading, and patching - Monitoring and responding to alerts generated from Data Protection systems - Following incident response processes and escalating events as needed - Maintaining the leading DATA LOSS PREVENTION/CASB system - Assisting clients in privacy-related incident response activities - Supporting clients" teams by acting as an interim team member Skills and attributes for success: - Strong team player - Excellent verbal and written communication skills - Proficient in documentation and PowerPoint - Good social, communication, and technical writing skills - Ability to prioritize tasks and work accurately under pressure - Understanding and adherence to workplace policies and procedures - Ability to independently manage projects with minimal oversight To qualify for the role, you must have: - Bachelor's or Master's degree in Computer Science, Information Systems, Engineering, or related field - 4-6 years of experience in supporting Data Security Technology - Experience in Information Security concepts related to Governance, Risk & Compliance - Experience in Data Loss Prevention, CASB Technology support, and Event Handling - Knowledge of Digital Guardium and other leading DLP and CASB tools - Technical/Vendor certifications will be an advantage - Experience in other data protection technologies will be an advantage - Ability to research and solve technical issues independently - Demonstrated integrity in a professional environment - Knowledge of core Information Security concepts - Ability to work in a changing environment Ideally, you'll also have: - Professional certifications such as CompTia Security+, CEH, CISSP, or Vendor/Technical certification - Willingness to work weekends and travel as required What we look for: We seek individuals with commercial acumen, technical experience, and a willingness to learn in a fast-moving consulting environment. Join our market-leading team and work with leading businesses across various industries. What working at EY offers: At EY, we are dedicated to helping our clients, from startups to Fortune 500 companies. You will work on inspiring and meaningful projects, receive support, coaching, and feedback from engaging colleagues, and have opportunities to develop new skills and progress your career. You will have the freedom and flexibility to handle your role in a way that suits you best. Join EY and be a part of building a better working world, creating long-term value for clients, people, and society while building trust in the capital markets. Work with diverse teams worldwide to provide trust through assurance and help clients grow, transform, and operate effectively.,

Posted 2 weeks ago

Apply

3.0 - 4.0 years

7 - 9 Lacs

Bengaluru

Work from Office

Experience in working with tools like CrowdStrike, Proofpoint, Proxy, SIEM like Google SecOps, Azure Sentinel and understanding of SOAR/MDR platforms (Demisto, Resilient etc.) Good knowledge of cyber kill chain, recent threats and MITRE ATT&CK techniques and tactics. Experience in Manual Threat Hunting, effective dashboard, views, reports, alarm understanding. Regularly review standard operating procedures. Helping client in mitigating critical incidents. Advanced Device Health Management, Threat Intel feeds knowledge. Good functional knowledge of cloud, linux, windows, EDR, sandbox, firewall, IDS/IPS, AV, WAF, AD, DNS etc. Must have any one of CEH/ECSA/CHFI/ACISE. Excellent communication and presentation skills. Open to work on 24x7 shifts from office. Preferred Skills: Azure Sentinel SIEM,SOAR Concept,Cyber Security,SOC Monitoring

Posted 2 weeks ago

Apply

5.0 - 10.0 years

17 - 25 Lacs

Hyderabad

Work from Office

Job Role : Cyber Security Engineer--Work From Office Experience : 4 to 8 Yrs Key Skills: Security tools integration and management, Onboarding, Log ingestion, writing rules and polices in Cloud Security/SIEM/EDR/Antivirus/XDR/MDR/SOAR tool/IPS & IDS Notice Period : 0 to 30 days Should be willing to work in Second shift Company: Cyber Towers, Quadrant 3, 3rd floor, Madhapur, Hyderabad -- 500081. Job Overview: They plan, implement, and maintain security measures, respond to security incidents, and identify vulnerabilities. Their roles vary depending on the specific area of security, such as network, application, or cloud security. Here's a more detailed breakdown of their responsibilities: Security Planning and Implementation: Designing and implementing security controls: This includes firewalls, intrusion detection systems, and access control mechanisms. Developing security policies and procedures: Establishing guidelines for secure operations and data handling. Performing risk assessments: Identifying potential vulnerabilities and threats. Implementing security tools and technologies: Integrating security software and hardware into the organization's infrastructure. Analyze and recommend improvements to network, system, and application architectures to enhance security. Research, design, and implement cybersecurity solutions that protect the organizations systems and products. Collaborate with DevOps, Platform Engineering, and Architecture teams to ensure security is embedded in the design and development of applications and systems. Actively participate in the change management process, ensuring security considerations are prioritized in system upgrades and modifications. Design and deploy automated security controls to improve efficiency in risk identification, configuration management, and security assessments. Develop and refine security policies to address cloud security misconfigurations, leveraging cloud-native security technologies. Implement logging and monitoring solutions for cloud environments to enhance SOC team capabilities in detecting and responding to security incidents. Assess and review emerging technologies to identify potential security risks and implement mitigation strategies. Design and deploy innovative security technologies to address evolving security challenges. Conduct vulnerability scanning, anomaly detection, and risk assessment to enhance the security posture. Work closely with security architects to develop and deploy security solutions that address cloud-specific risks. Take ownership of security posture improvements, ensuring strict security policies and controls align with business objectives. Research and stay up to date on emerging security threats and provide strategic recommendations to strengthen security defenses. Qualifications & experience: Hands-on experience with implementing security controls, including Database security, Web content filtering, Anomaly detection & response, Vulnerability scanning & management Proficiency in at least one scripting language (e.g., Perl, Python, PowerShell, Bash) for automation and security tooling. Expertise in at least one of the following security domains: Cloud-native security (e.g., IAM, security groups, encryption), Endpoint security (e.g., EDR/XDR, mobile security) Strong familiarity with industry security frameworks and regulations, including: NIST Cybersecurity Framework (CSF) , CIS Controls, HIPAA, GDPR compliance Ability to assess compliance requirements and implement security controls to ensure adherence. Strong problem-solving and analytical skills, with the ability to assess complex security risks and develop mitigation strategies. Excellent communication and interpersonal skills, with the ability to engage both technical and non-technical stakeholders. Proven ability to work independently, manage projects, and contribute as an integral part of a high-performing security team.

Posted 2 weeks ago

Apply

7.0 - 12.0 years

8 - 18 Lacs

Gurugram

Hybrid

Role & responsibilities Core Responsibilities Monitor security dashboards and alerts to identify potential threats. Respond to security incidents by following established response plans. Conduct threat hunting to proactively identify vulnerabilities and potential threats. Collaborate with other departments, such as network engineering and incident response teams, for coordinated threat response. Analyze security incidents and document findings to prevent future occurrences. Develop and maintain security monitoring tools and processes. Implement and optimize SIEM, SOAR, EDR, and Threat Intelligence platforms. Conduct vulnerability assessments and penetration tests to identify weaknesses. Create and maintain incident response procedures and playbooks. Provide detailed reports on security incidents and emerging threats. Stay updated with the latest cybersecurity trends and threats. Experience 7-9 years of experience in cybersecurity, with a focus on SOC operations. Extensive experience with security monitoring tools and incident response. Proficiency in threat hunting and vulnerability analysis. Strong knowledge of network protocols, operating systems, and common cybersecurity threats. Experience with SIEM, SOAR, EDR, and Threat Intelligence platforms. Ability to conduct in-depth threat intelligence analysis and develop containment strategies. Experience in conducting vulnerability assessments and penetration tests. Excellent analytical and problem-solving skills. Strong communication and collaboration skills. Knowledge of frameworks such as NIST Cybersecurity framework, MITRE ATT&CK, and Lockheed Martin Cyber Kill Chain.

Posted 2 weeks ago

Apply

5.0 - 8.0 years

10 - 20 Lacs

Bengaluru

Work from Office

Role Overview We are seeking an ambitious and client-focused Cybersecurity Sales Professional to drive our security solutions portfolio. This individual will be responsible for identifying, engaging, and closing opportunities for cybersecurity services such as SASE, XDR, SOC/NOC services, Zero Trust, Compliance solutions (SOC2, IT Governance), and more. Key Responsibilities Own the sales cycle for cybersecurity offerings from lead generation to closure across enterprise and mid-market clients. Promote Fideliss proprietary platforms including: NEXOLE-XDR (Extended Detection & Response) NEXOLE-SASE (Secure Access Service Edge) Security Testing as a Service (STaaS) Zero Trust Security Solutions Managed SOC/NOC Services Understand client pain points and security gaps and craft tailored value propositions. Engage with CXOs, IT Heads, to drive cybersecurity discussions and generate demand. Collaborate with technical presales and delivery teams for solutioning, proposals, and pricing. Drive revenue through both direct sales and partner/channel ecosystems. Track and report progress using CRM tools while forecasting accurately. Required Skills & Experience 5-8 years of proven experience in B2B sales, specifically in cybersecurity or IT security solutions. Bachelor's degree in business, IT, or related field. MBA is a plus. Strong understanding of cybersecurity trends, challenges, and solution ecosystems . Demonstrated ability to sell complex solutions and achieve/exceed revenue targets. Prior experience working with cybersecurity OEMs or resellers is a strong advantage.

Posted 2 weeks ago

Apply

7.0 - 11.0 years

0 Lacs

maharashtra

On-site

As a PS Consultant (XDR), you will be responsible for providing expert-level remote consultation and support in the network and security domain to leading global clients. Your primary role will involve implementing, supporting, and optimizing EDR/XDR and security solutions while closely collaborating with customers and internal account teams. Desired Profile: Education: - BE/BTech in Computer Science or equivalent. Experience: - You should have 6-8 years of experience in remote support/consultation for network and cybersecurity, with a strong focus on EDR/XDR solutions. Technical Skills: - Possess an advanced understanding of internetworking, LAN/WAN, and routing protocols. - Strong knowledge of Remote Access VPNs, IPSEC, PKI & SSL, TCP/IP, and authentication protocols (LDAP, RADIUS). - Proficiency in firewall configuration, installation, and operations. - Hands-on experience with EDR and XDR platforms is mandatory. - Experience with endpoint security, multi-factor authentication systems, and security architecture. - Familiarity with cloud technologies like AWS, Azure, VMware NSX (a plus). - Strong troubleshooting skills for NAT, IPSEC VPNs, and understanding their impact on applications/users. - Exposure to products from Cisco, Palo Alto, Fortinet, Checkpoint, and Juniper is preferred. Consulting Skills: - Excellent written and verbal communication skills. - Strong customer-facing and problem-solving abilities. - Ability to manage multiple projects and priorities in a fast-paced, global environment. - A self-starter who thrives both individually and within a team. Why Join Us - Work with a globally recognized team on large-scale enterprise projects. - Gain exposure to cutting-edge technologies in cybersecurity and cloud. - Be a part of an agile, collaborative, and inclusive work culture. Ready to make an impact Apply now or share your resume at tulika.mukherjee@kerol.in. Tag someone who fits this role or Share This Opportunity!,

Posted 2 weeks ago

Apply

10.0 - 15.0 years

22 - 37 Lacs

Bengaluru

Work from Office

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Kyndryl’s Security & Resiliency is one of our most critical practices, ensuring enterprises, regardless of their size and complexity, remain secure, available, reliable, and resilient. We take Cybersecurity seriously. We're not just invested; we're committed. We're not just protecting data; we're empowering. Kyndryl is committed to making the world safer, not only by investing in state-of-the-art services and technologies but also by empowering underserved communities with essential cyber skills. When you walk through our doors, you're not only joining a team but you're also becoming part of a legacy. Welcome to Kyndryl, where Cybersecurity isn't just a job – it’s a passion; a commitment to designing, running, and managing the most modern and reliable technology infrastructure that the world depends on every day. As a Cybersecurity Defense professional at Kyndryl, you will encompass cybersecurity, incident response, security operations, vulnerability management, and the world of cyber threat hunting and security intelligence analysis all to protect the very heartbeat of organizations – their infrastructure. Responsibilities: Design & Implementation : Lead the design, configuration, and implementation of Cortex XSIAM solutions, ensuring they meet organizational security requirements and integrate with existing infrastructure. Expertise in XSIAM: Deep understanding of the XSIAM platform, its features, and capabilities, including log ingestion, correlation rules, detection strategy, and integration with other security tools. Keep up to date with the latest XSIAM features, releases, and security threats, ensuring ongoing expertise Log Ingestion and Optimization: Devise and implement log ingestion strategies, ensuring high-quality log sources are ingested. Monitor and optimize log sources for performance Detection Strategy: Design and implement effective detection strategies, including the creation and tuning of correlation rules to identify and alert on potential threats Correlation Rules: Create and fine-tune correlation rules to enhance security detections. Automation & Orchestration : Develop and maintain automated workflows, playbooks, and integrations to streamline incident response, threat detection, and security operations. Platform Optimization : Continuously monitor, tune, and optimize Cortex XSIAM performance, ensuring high availability and scalability. Security Operations Collaboration : Collaborate with Security Operations Center (SOC) teams to enhance incident management, response times, and threat intelligence sharing. Integration with Security Tools : Integrate Cortex XSIAM with SIEM, EDR, threat intelligence platforms, and other security tools to create a comprehensive security ecosystem. Problem Solving: Identify, analyze, and resolve technical issues related to XSIAM, providing effective solutions. Documentation and Reporting: Create and maintain technical documentation, training materials, and knowledge base articles for XSIAM. Maintain detailed documentation for system configurations, integrations, and workflows. Provide regular status reports to management on platform performance and incident metrics. Best Practices : Establish and maintain best practices for Cortex XSIAM configuration, workflow design, and incident response. Understanding of cybersecurity threats, vulnerabilities, and industry best practices. Customer Support and Consulting: Serve as a subject matter expert, providing consultative guidance to end-users on optimizing XSIAM usage. Training & Support : Provide training to internal teams and clients on Cortex XSIAM features, workflows, and incident response protocols. Act as a go-to resource for troubleshooting and technical support. Innovation & Continuous Improvement : Stay current with the latest developments in Cortex XSIAM and cybersecurity automation, bringing innovative ideas to enhance security operations. Incident Management and Investigation : Assist in the design and execution of automated response playbooks for common and emerging threats, ensuring rapid and effective resolution of incidents. Participate in incident response activities, including investigating security alerts and supporting incident resolution. Collaboration: Foster collaboration with internal and external teams to drive product adoption Threat Hunting: May be involved in proactive threat hunting activities, identifying potential vulnerabilities and threats. In this role, you won't just monitor; you'll actively engage in the relentless hunt for cyber adversaries. In a world where every click and keystroke could be a potential gateway for attackers, your role will be nothing short of critical as you seek out advanced threats, attackers, and Indicators of Compromise (IOCs). Your expertise in endpoint detection and response (EDR) will be the shield that safeguards individual workstations, laptops, servers, and other devices from cybercrime. Your responsibilities go beyond vigilance. When it comes to network security, you'll utilize Network Detection and Response (NDR) to monitor the ever-flowing currents of network traffic. The incident management process will be used as you respond and manage to cybersecurity incidents. Cybersecurity Defense is all about information. You'll gather, analyze, and interpret data applying your own and external threat intelligence to uncover potential security threats and risks. These insights and your ability to analyze complex attack scenarios will be the foundation of our security strategy – helping Kyndryl stay one step ahead of security breaches. In Cybersecurity Defense at Kyndryl, you’re not just protecting the present – you’re shaping the future of digital security. Join us on this cybersecurity venture where your expertise and creativity will have a lasting impact in the world of digital defense. Your Future at Kyndryl When you join Kyndryl, you're not just joining a company – you're entering a space of opportunities. Our partnerships with industry alliances and vendors mean you'll have access to skilling and certification programs needed to excel in Security & Resiliency, while simultaneously supporting your personal growth. Whether you envision your career path as a technical leader within cybersecurity or transition into other technical, consulting, or go-to-market roles – we’re invested in your journey. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Skills and Experience 8 to 10 years of security analyst experience, preferably in a managed services environment in XSIAM Engineer In-depth expertise in Palo Alto Networks Cortex XSIAM (XSOAR) platform. Proficient in scripting languages (e.g., Python, JavaScript) for creating automated workflows and integrations. Strong understanding of security technologies such as SIEM, SOAR, EDR, XDR and threat intelligence platforms. Hands-on experience with Cortex XSIAM integrations (e.g., RESTful APIs, webhooks, etc.). Experience with developing and tuning playbooks, tasks, and workflows within the Cortex XSIAM platform. Knowledge of security best practices and frameworks such as MITRE ATT&CK, NIST, ISO 27001, etc. Preferred Skills and Experience Cortex XSOAR certification (e.g., Palo Alto Networks Cortex XSOAR Certified Automation Engineer). Security Operations and Incident Response certifications (e.g., GIAC, SOC Analyst). Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 2 weeks ago

Apply

4.0 - 6.0 years

9 - 19 Lacs

Gurugram

Work from Office

Job Summary: We are looking for a Security Analyst to join the MakeMyTrip Cybersecurity team and strengthen MMTs defense against evolving cyber threats. This role involves monitoring, analyzing, and responding to security incidents while enhancing our security framework. The ideal candidate should have 4-6 years of experience in Security Operations, with a strong focus on Endpoint Security and network security controls. Hands-on experience with security tools in these areas is essential. Scripting knowledge is preferable, along with a proactive learning attitude, strong problem-solving skills, and a can-do mindset. Key Responsibilities: Monitor and analyse security events across endpoints, networks, and cloud environments. Implement and manage security controls using various security technologies. Ensure strong endpoint protection and respond to threats, vulnerabilities, and suspicious activities. Manage and enhance email security to prevent phishing, malware, and other emailbased threats. Work on Zero Trust security principles to enhance access control and identity security. Assist in security incident detection, response, and remediation efforts. Develop and maintain security policies, procedures, and compliance documentation. Collaborate with IT and security teams to strengthen the overall security posture. Automate security processes using Python, PowerShell, or Bash. Stay updated on emerging threats, vulnerabilities, and security technologies. Required Skills & Qualifications: 4-6 years of experience in cybersecurity, focusing on endpoint security, network security, and cloud security. Hands-on experience with security tools in areas such as: Endpoint Security: EDR, XDR, Incident Response, malware analysis, threat hunting. Network Security: NAC, firewalls, IDS/IPS, network segmentation, Zero Trust access. Cloud & Web Security: SSE, CASB, Secure Web Gateway, DLP, cloud security posture management Email Security: Email analysis, expertise in email authentication protocols, knowledge of modern email-based cyber threats, and integration of threat intelligence Strong understanding of Zero Trust security models and implementation. Knowledge of security best practices, frameworks, and compliance standards (NIST, ISO 27001, CIS, etc.). Experience in security incident investigation, threat intelligence, and vulnerability management. Scripting knowledge (Python, PowerShell, Bash) is a plus. Familiarity with SIEM tools and log analysis for threat detection. Excellent problem-solving skills and a proactive learning attitude. Strong communication and documentation skills to convey security insights effectively.

Posted 2 weeks ago

Apply

8.0 - 13.0 years

8 - 18 Lacs

Bengaluru

Hybrid

Job Title: Senior Network Security Engineer Job Summary The Senior Network Engineer Cloud Focus (AWS/Azure) is a pivotal role that blends traditional network engineering with modern cloud-native practices. This individual is responsible for designing, implementing, and maintaining secure, scalable, and high-performance networking solutions across hybrid and multi-cloud environments, particularly within Amazon Web Services (AWS) and Microsoft Azure platforms. In addition to cloud networking, this role entails the deployment and support of enterprise-grade data and telecommunication infrastructures. The Senior Network Engineer is expected to manage complex networking projects, troubleshoot advanced issues, and provide technical leadership to junior staff. Essential Job Duties Job Duty Deisgn & Deployment of cloud-based network solutions on AWS and Azure platforms, including configuration and management of VPCs, VNets, VPNs, Direct Connect, ExpressRoute, load balancers, firewalls, and network gateways. Ensure seamless integration between on-premises and cloud environments, enabling robust support for hybrid and multi-cloud architectures. Develop, manage, and maintain network infrastructure using Terraform, enabling consistent, repeatable, and automated provisioning of cloud resources. Build automated workflows and integrate Terraform with CI/CD pipelines to streamline network changes, testing, and deployments. Utilize tools such as CloudWatch, Azure Monitor, and third-party platforms (e.g., Datadog, Splunk) to monitor network performance, detect issues, and perform root cause analysis. Undserstand and execute technical documentation in the functional network for deployments. Configure and install network softwares on virtual machines, routers and other network devices. Deep undersatanding of networking protocols and packet encapsulation methods to identify and troubleshoot network performance issues. Automate network functions and monitor their effectiveness. Deploy, maintain and test device security and business continuity measures such as access authentication and disaster recovery. Suggest improvements to network performance, capacity and scability. Communicate with users on various solutions as needed. Execute network releases & infrastructure changes in a pre-approved maintenance window in a highly available, multi data centers corporate IT and public facing services environment. Assist in evaluation of network products and service for new development in the networking industry. Manage network infrastructure and connectivity to Amazon Web Service virtual private network. Mentor junior network menebers as needed. Job Qualifications Required Education, Experience, Certification/Licensure Bachelors Degree in Computer Science, Information Technology or similar. Masters degree (optional but advantageous) in Cybersecurity, Cloud Computing, or Systems Engineering. A minimum 7 years of full-time experience with a solid background in network administration and architecture Cloud platform certifications (AWS & Azure) such as professional or expert level in Network & solution architecture. Network industry standard professional certifications such as CCNP, CCDP, FCNSP, CheckPoint, A10. Indepth understanding of communication protocols (mainly TCP/IP) and routing protocols (eg BGP, OSPF) Familiarity with access control model and network security Knowledge of coding languages for scripting (eg python, perl) Experience with network diagnostic, monitoring and analysis tools (e.g. SolarWinds network tools) Solid understanding of network operating systems (JUNOS, Cisco IOS) Sharp troubleshooting skills Organizational and mentoring skills Systems: Windows, Cisco Systems, Linux Must be flexible with schedule. Must be honest, responsible, self-motivated and very willing to learn. Knowledge, Skills and Abilities (KSAs) Perform all work and activities with honesty and integrity. Ability to work overtime/extended hours as required. Will be required to provide after-hours support for infrastructure related emergencies, as needed, and occasional weekend maintenance. Effectively communicate (and listen) clearly, professionally, politely and persuasively in all situations; respond well and in a reasonable, timely manner. Challenge conventional practices and use creativity and information to lead, innovate, problem solve, and implement ideas to contribute to the growth of the organization. Support and meet company/department goals and core values. Collaborate with co-workers to achieve common goals. Take personal responsibility for productivity, quality and timeliness of work. Problem Solving/Analysis. Technical Capacity. Time Management.

Posted 2 weeks ago

Apply

8.0 - 12.0 years

0 Lacs

chennai, tamil nadu

On-site

As a Security Architect & Engineer, you will play a crucial role in designing secure architectures, implementing effective security controls, and supporting security operations across IT and cloud environments. Your responsibilities will involve creating long-term security strategies aligned with business goals, evaluating security technologies, and ensuring compliance with regulatory requirements. In the realm of Security Architecture, you will be tasked with designing secure and scalable architectures that seamlessly integrate with existing IT systems. Your role will also involve recommending security technologies, frameworks, and practices across IT, OT, and cloud environments. Implementing access control and identity management measures will be essential, including least privilege, RBAC, MFA, and SSO controls. In terms of Security Engineering, you will apply secure configuration baselines and automation across operating systems, databases, and cloud environments. Supporting security and vulnerability assessments, assisting in patch implementations, and promoting infrastructure-as-code and DevSecOps practices will also fall under your purview. Your involvement in Security Operations will require collaboration with SOC and IT teams to detect, investigate, and respond to security incidents. To enhance security measures, you will support threat hunting, root cause analysis, and the evolution of incident response and disaster recovery plans. Regarding Risk, Compliance & Governance, you will be responsible for identifying and mitigating security risks associated with IT systems. Developing security policies, conducting risk assessments, ensuring compliance with frameworks and regulations, and providing security input into vendor assessments will be crucial aspects of your role. In terms of Collaboration & Communication, you will act as a trusted advisor to internal teams on security best practices and secure solution design. Your ability to translate complex security topics into actionable guidance for technical and business stakeholders will be paramount. To qualify for this role, you should hold a Bachelor's degree in Information Security, Computer Science, or a related field, along with 8-12 years of cybersecurity experience. Strong knowledge of cloud security services, regulatory compliance requirements, IAM concepts, and relevant certifications are required. Additionally, experience with SIEM, EDR, vulnerability scanners, and cloud-native controls is essential. While not mandatory, advanced knowledge in cloud security architecture, experience with automation tools, and relevant certifications like CISSP, CISM, or CEH would be advantageous. This position may offer remote work options and will involve collaboration with diverse teams in a dynamic environment, providing you with the opportunity to contribute to critical security initiatives.,

Posted 2 weeks ago

Apply

3.0 - 7.0 years

0 Lacs

maharashtra

On-site

As a Security Managed Services Engineer (L1) at NTT DATA, your primary responsibility will be to provide a managed service to clients, ensuring the operational functionality of their Firewall infrastructure. You will proactively identify, investigate, and route incidents to the correct resolver group to maintain zero missed service level agreement (SLA) conditions. This role focuses on first-line support for standard and low complexity incidents and service requests, aiming to contribute to project work as required. Your key responsibilities will include assessing the existing endpoint security infrastructure, deploying EDR agents on endpoints and critical systems, configuring EDR agents to collect and analyze security events, monitoring endpoints for suspicious activities, using behavioral analysis and machine learning to detect advanced threats, generating real-time alerts for potential security incidents, enabling endpoint forensics capabilities, integrating with vulnerability management systems, rolling out patches or upgrades, alerting and remediating endpoints with outdated software configurations, providing real-time alerts for anomalies, ensuring compatibility with other security systems, correlating network anomalies with potential threats, delivering reports as per client requirements, and re-deploying agents when there is a change in infrastructure or operating systems. To excel in this role, you should have a minimum of 3 years of experience in EDR and Trend Micro, possess a Bachelor's degree or equivalent qualification in IT/Computing, hold a CEH certification, and have entry-level experience in troubleshooting and providing support in security/network/data center/systems/storage administration and monitoring services within a medium to large ICT organization. Additionally, you should have a basic knowledge of management agents, redundancy concepts, and products within the supported technical domain, as well as a working knowledge of ITIL processes. Your attributes should include the ability to communicate and work across different cultures, plan activities well in advance, maintain a positive outlook at work, work well in a pressurized environment, apply active listening techniques, adapt to changing circumstances, and prioritize client satisfaction throughout interactions. As an Equal Opportunity Employer, NTT DATA offers an on-site working environment where you can contribute to pushing the boundaries of technical excellence and leading innovations, making a positive impact on clients and society. Join us to grow, belong, and thrive as part of a diverse and inclusive workplace committed to long-term success through innovation and transformation.,

Posted 2 weeks ago

Apply

10.0 - 15.0 years

0 Lacs

thane, maharashtra

On-site

As an L3 Network Security Senior Engineer, you will be responsible for leading technical delivery and managing client engagements in post-sales cycles. Your experience of 10+ years in Network Security/Cyber Security will be crucial in conducting deep-dive security incident analysis and deriving actionable insights. You will handle and configure various security infrastructure components such as Firewalls, VPN, DLP, Proxy, PIM/PAM, Load Balancers, EDR, WAF, SIEM, IDAM, NAC, ZTNA, and CASB. Additionally, you will work on virtualization and server OS including Windows, Redhat Linux, and other Linux distributions. Engaging with OEMs, vendors, and internal teams will be essential for seamless implementation and support. You will be required to draft HLD/LLD documentation, execute Proof of Concepts (POC) for proposed security solutions, and ensure adherence to SLAs and KPIs across security services. Staying updated on evolving threats and technologies will enable you to implement best practices across deployments. Furthermore, conducting presentations, preparing detailed technical/executive reports, and monitoring security services will be part of your responsibilities. In terms of technical skills, you should have expertise in Network Security tools such as Firewall, VPN, DLP, Proxy, PIM/PAM, Load Balancers, EDR, WAF, SIEM, as well as networking components like Switches, Routers, TCP/IP, DNS, DHCP, Routing & Switching. Experience with Public Cloud and On-Prem Private Cloud security, operating systems like Windows, Redhat Linux, other Linux distributions, and tools like Microsoft Office will be required. Preferred certifications for this role include CCNA/CCNP, CCSA, Redhat Certified, Microsoft Certified, ITIL 4, PMP or equivalent. This is a full-time, permanent position with benefits including health insurance and Provident Fund. The work schedule involves fixed shifts from Monday to Friday with rotational shifts at the office in Thane.,

Posted 2 weeks ago

Apply

3.0 - 7.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Roles & Responsibilities: 1.Handling alerts and incident on XDR platform 2.Alert & incident triage and analysis 3.Proactively investigating suspicious activities 4.Log all findings, actions taken, and escalations clearly in the XDR and ITSM platform 5.Execute predefined actions such as isolating blocking IPs or disabling user accounts, based on set protocols. 6.Adhere to established policies, procedures, and security practices. 7.Follow-up with tech team for incident closure 8.Participating in daily standup and review meeting 9.L2 Analyst has responsibility to closely track the incidents and support for closure. 10.Working with logsource and usecase management in integrating log sources and developing & testing usecase 11.Work & support on multiple cybersecurity tool (DLP, GRC, Cloudsec tool, DAM) 12.Developing SOP / instruction manual for L1 team 13.Guiding L1 team for triage/analysis and assist in clousure of cybersecurity alert and incidents 14.Handle XDR alerts and followup with customer team for agent updates 15.Escalate more complex incidents to L3 SME for deeper analysis. Key Responsibilities: Security Monitoring & Incident Response Governance Define and maintain security monitoring, threat detection, and incident response policies and procedures.Establish and mature a threat intelligence program, incorporating tactical and strategic threat feeds.Align SOC operations with evolving business risk priorities and regulatory frameworks.Platform & Toolset Management Evaluate, implement, and enhance SIEM platforms, ensuring optimal log ingestion, correlation, and rule effectiveness.Assess and manage deployment of EDR, XDR, SOAR, and Threat Intelligence solutions.Maintain and update incident response playbooks and automation workflows.Ensure consistent platform hygiene and technology stack effectiveness across SOC tooling.SOC Operations & Threat Detection Oversee 24x7 monitoring of security events and alerts across enterprise assets.Lead and coordinate proactive threat hunting across networks, endpoints, and cloud.Manage and support forensic investigations to identify root cause and recovery paths.Govern use case development, log source onboarding, and alert/event triage processes.Regulatory Compliance & Incident Management Ensure timely and accurate incident reporting in compliance with RBI, CERT-In, and other authorities.Retain logs in accordance with regulatory data retention mandates.Enforce and monitor security baselines for endpoints, in line with internal and regulatory standards.Advanced Threat Management & Reporting Plan, conduct, and report on Red Teaming and Purple Teaming exercises to test detection and response capabilities.Participate in and contribute to the Risk Operations Committee (ROC) meetings and initiatives.Review and track SOC effectiveness through KPIs, metrics, and regular reporting dashboards. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field.3-7 years of experience in SOC management, incident response, or cyber threat detection roles.Hands-on expertise with SIEM (e.g., Splunk, QRadar, Sentinel), EDR/XDR tools, and SOAR platforms.Proven experience in playbook development, forensics, and threat hunting methodologies.Strong understanding of RBI/CERT-In incident reporting guidelines and log retention requirements.Familiarity with MITRE ATT&CK, threat modeling, and adversary emulation techniques. Preferred technical and professional experience Preferred Certifications: GCIA, GCIH, GCFA, CISSP, OSCP, CEH, CHFI, or similar certifications"

Posted 2 weeks ago

Apply

3.0 - 5.0 years

3 - 8 Lacs

Bengaluru

Work from Office

Roles & Responsibilities: 1.Handling alerts and incident on XDR platform 2.Alert & incident triage and analysis 3.Proactively investigating suspicious activities 4.Log all findings, actions taken, and escalations clearly in the XDR and ITSM platform 5.Execute predefined actions such as isolating blocking IPs or disabling user accounts, based on set protocols. 6.Adhere to established policies, procedures, and security practices. 7.Follow-up with tech team for incident closure 8.Participating in daily standup and review meeting 9.L2 Analyst has responsibility to closely track the incidents and support for closure. 10.Working with logsource and usecase management in integrating log sources and developing & testing usecase 11.Work & support on multiple cybersecurity tool (DLP, GRC, Cloudsec tool, DAM) 12.Developing SOP / instruction manual for L1 team 13.Guiding L1 team for triage/analysis and assist in clousure of cybersecurity alert and incidents 14.Handle XDR alerts and followup with customer team for agent updates 15.Escalate more complex incidents to L3 SME for deeper analysis. Key Responsibilities: Security Monitoring & Incident Response Governance Define and maintain security monitoring, threat detection, and incident response policies and procedures.Establish and mature a threat intelligence program, incorporating tactical and strategic threat feeds.Align SOC operations with evolving business risk priorities and regulatory frameworks.Platform & Toolset Management Evaluate, implement, and enhance SIEM platforms, ensuring optimal log ingestion, correlation, and rule effectiveness.Assess and manage deployment of EDR, XDR, SOAR, and Threat Intelligence solutions.Maintain and update incident response playbooks and automation workflows.Ensure consistent platform hygiene and technology stack effectiveness across SOC tooling.SOC Operations & Threat Detection Oversee 24x7 monitoring of security events and alerts across enterprise assets.Lead and coordinate proactive threat hunting across networks, endpoints, and cloud.Manage and support forensic investigations to identify root cause and recovery paths.Govern use case development, log source onboarding, and alert/event triage processes.Regulatory Compliance & Incident Management Ensure timely and accurate incident reporting in compliance with RBI, CERT-In, and other authorities.Retain logs in accordance with regulatory data retention mandates.Enforce and monitor security baselines for endpoints, in line with internal and regulatory standards.Advanced Threat Management & Reporting Plan, conduct, and report on Red Teaming and Purple Teaming exercises to test detection and response capabilities.Participate in and contribute to the Risk Operations Committee (ROC) meetings and initiatives.Review and track SOC effectiveness through KPIs, metrics, and regular reporting dashboards. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Required Qualifications: Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field.3-5 years of experience in SOC management, incident response, or cyber threat detection roles.Hands-on expertise with SIEM (e.g., Splunk, QRadar, Sentinel), EDR/XDR tools, and SOAR platforms.Proven experience in playbook development, forensics, and threat hunting methodologies.Strong understanding of RBI/CERT-In incident reporting guidelines and log retention requirements.Familiarity with MITRE ATT&CK, threat modeling, and adversary emulation techniques. Preferred technical and professional experience Preferred Certifications: GCIA, GCIH, GCFA, CISSP, OSCP, CEH, CHFI, or similar certifications

Posted 2 weeks ago

Apply

5.0 - 10.0 years

19 - 20 Lacs

Hyderabad, Chennai

Work from Office

Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. 6+ years of experience in a Security Operations Center (SOC) or similar security role. Relevant certifications preferred such as: Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) Certified Information Security Manager (CISM) CompTIA Security+ Strong understanding of networking protocols and technologies, vulnerability assessment, and incident response procedures. Experience with SIEM tools (e.g., Splunk, ArcSight, or similar). Familiarity with compliance frameworks (e.g., ISO 27001, NIST, GDPR). Strong analytical and problem-solving skills. Excellent verbal and written communication skills.

Posted 2 weeks ago

Apply

5.0 - 10.0 years

19 - 20 Lacs

Hyderabad, Chennai

Work from Office

Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. 6+ years of experience in a Security Operations Center (SOC) or similar security role. Relevant certifications preferred such as: Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) Certified Information Security Manager (CISM) CompTIA Security+ Strong understanding of networking protocols and technologies, vulnerability assessment, and incident response procedures. Experience with SIEM tools (e.g., Splunk, ArcSight, or similar). Familiarity with compliance frameworks (e.g., ISO 27001, NIST, GDPR). Strong analytical and problem-solving skills. Excellent verbal and written communication skills.

Posted 2 weeks ago

Apply

5.0 - 10.0 years

18 - 20 Lacs

Hyderabad

Work from Office

Role - End Point and Data Security Architect Location - Hyderabad Contract to hire (after 6 months based upon performance) Roles: Design, implement and manage cybersecurity EDR and Data Security solutions. • Update. rules & controls, identify and ensure changes in response to major emerging threats. • Manage cybersecurity data and systems lifecycle to ensure that they are patched and/or upgraded at the right time and remain effective. • Implementing specialized security frameworks including CIS Benchmarks for a broad range of endpoints. • Be highly experienced in EDR/XDR solutions such as SentinelOne, Qualys EVM etc Required: At least 4-5 years of relevant professional experience. • Previous work in an international environment. • Demonstrated experience in working within cybersecurity teams, particularly specialised cyber technology capabilities. • Proven track record of contributing to the design and implementation of security solutions aligned with organizational goals. • Strong interpersonal skills with the ability to build and maintain relationships with stakeholders, understand their security needs.

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies