Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
2.0 - 7.0 years
3 - 6 Lacs
Pune
Work from Office
Post Name: Global Safety Operation Center (GSOC) Operator ( Control Center Operator) Post Details: Description: GSOC Operator Locations: Pune, India Objective These General Post Orders are applicable to all contract safety & security personnel supporting Global Safety Operation Center (GSOC) Operator duties for Workday Inc. These rules must be followed to ensure proper execution of post specific job functions. All personnel supporting GSOC Operator duties for Workday Inc. must thoroughly read, review, understand, adhere to and execute their duties to these standards at all times. Arrival on Duty Arrive on time for start of shift in the right uniform, ready to assume your post Attend shift passdown brief at the Global Safety Operation Center (GSOC); ask questions where clarification is needed Deployment to Assigned Post Inspect all post equipment where applicable to ensure equipment is operational and accounted for;i.e. GSOC high dollar electronic assets, radios, keys, access control badges Report any equipment inspection deficiencies to the client leadership team immediately After completing passdown brief and shift inspection, relieve the offgoing GSOC Operator and assume the assigned post GSOC Operator Duties Ensure all third party software solutions used by the GSOC are opened, operational, and being monitored where applicable, or ready for use where applicable Ensure all access control and camera monitoring tools are opened, operational and being monitored Investigate all alarm activity and dispatch foot patrol as need to follow up on alarm events or suspicious activity as observed via the surveillance system Dispatch foot & vehicle patrol to support request received by the GSOC; i.e. escorts, drop offs, etc. Notify police for any reports of verified suspicious activity or crimes in progress, as well as notify client leadership for situational awareness and further guidance Notify emergency medical services when notified of medical emergencies occurring on campus and execute client guidance as outline in standard operating procedures relative to medical emergencies Monitor all incoming electronic notifications received related to intelligence reports generated by third party software solution (Dataminr, NC4, OSAC, Egencia) to understand and escalate risk related concerns to impacted personnel, site coordinators, or client leadership, within the framework of establish standard operating procedures As directed and at the guidance of site leadership, send mass notifications via Workdays mass notification system Dispatch personnel to support medical and fire life safety incidents within the framework of Workdays WERC & Life Safety program as well as standard operating procedures Provide ad hoc support to physical security request from the client as directed Fulfill special projects as assigned by client leadership team & the Site Manager Understand an execute all post specific task as they occur within the framework of guidance established in post specific standard operating procedures and departmental playbooks Shall make sure to track/record women employees late-night travelling. Highly Preferred Qualifications 1-2 years of experience working in one or more of the following environments: Commercial or Corporate security environments involving 24/7 monitoring and escalation processes. Security/Emergency/Response based dispatch/operations centre services involving direct interaction with callers and dispatched personnel.
Posted 1 week ago
3.0 - 5.0 years
4 - 6 Lacs
Hyderabad
Work from Office
Position and Key Responsibilities At RSM, analysts work with large and small companies in variety of industries. They develop strong working relationships with their peers within the security operations center (SOC) while learning their clients businesses and challenges facing their organizations. Analysts work as part of a broader team under the direction of more senior analysts, threat hunters, shift leads, intelligence analysts and SOC managers in support of multiple clients. Working in a mutually respectful team environment helps our analysts perform at their best and integrate their career with their personal life. You will have the opportunity to: Role Responsibilities: Investigate security incidents using SIEM tools, automation, and other cybersecurity technologies (i.e. ServiceNow, Stellar Cyber, Hyas Insight and DNS Protect, sentinel One, ELK Stack, Virus total, Shodan, NetFlow, Passive DNS, Silobreaker, Tenable.io, Hatching Triage Sandbox) Analyze, escalate, and assist in remediation of critical security incidents. Improve and challenge existing processes and procedures in a very agile and fast-paced information security environment serving multiple clients Process IDS alerts and identifying incidents and events in customer data. Setup and execution and analysis of vulnerability scans Perform advanced analysis and investigation into alerts as they are identified Performing initial basic malware analysis utilizing automated means (static and dynamic sandbox analysis or other available tools) Incident intake, ticket updates and reporting of cyber events and threat intelligence Understanding, identifying, and researching indicators of compromise (IOCs) from a variety of sources such as threat intelligence reports and feeds Writing incident reports, process documentation, and interact with clients as required Transcribe and implement atomic indicators into a monitoring environment. Consume policy documentation and determine applicability in a network. Work with protocols at layers 2 and higher in the OSI model, to include ARP TCP, UDP, ICMP, DNS, Telnet, SSH, HTTP, SSL, SNMP, SMTP, and other common protocols that use well-known ports. Develops the playbooks to respond and recovery from various attacks/incidents. Drives the automation efforts focused on the closing cases, responding to Cyber events and analyzing data required to enable efficient response activities. Processing of Cyber Threat Intel that is used across RSM detection platforms to understand and prepare for potential threats. Threat intel is heavily used across RSM platforms drive issue prioritization. Open to working shifts in a 24x7 operations environment. Qualifications and Experience: Minimum B.A. or B.S. degree or equivalent from an accredited university by the time employment commences or prior relevant military / law enforcement experience. Computer science, information technology, information systems management, or other similar degrees preferably with a focus on information security 3-5 years experience working in a security operations center, networking operations center or threat intelligence capacity. Possess at least one security industry certification such as CYSA+, Security+, CISSP, SANS GIAC (GSOC, GCIA, GMON, CGCDA) Knowledge of security standards and information security and compliance frameworks, controls, and best practices, including SSAE 16, SOC 2 and SOC3, OWASP Top 10, SANS, NIST Must have a naturally curious mindset and approach to solving problems. Basic understanding of cloud technologies and their operations Experience supporting various operating systems such as Windows/Linux Understanding of IP network protocols
Posted 1 week ago
7.0 - 11.0 years
15 - 20 Lacs
Pune
Work from Office
Greetings from Peoplefy Infosolutions !!! We are hiring for one of our reputed MNC client based in Pune. We are looking for candidates with 7 + years of experience in : Security operations center Global SOC Experience Splunk Incident response Interested candidates for above position kindly share your updated CV to varsha.si@peoplefy.com with below details : Notice Period : Experience: CTC : ECTC : Current Location :
Posted 1 week ago
6.0 - 10.0 years
14 - 24 Lacs
Pune
Hybrid
Hi Everyone, I am on lookout for Infosec Analyst- GSOC for leading product based MNC in Yerwada, Pune. Kindly refer below JD:- Should have experience with Global Security Operation Center(SOC) Should have good experience with concepts of SIEM Should have strong experience in Incident Response Any SIEM tools experience: (Splunk, Azure Sentinel, EDR, MS Defender, Azure Sentinel, Any) Share your resume on nitika.sh@peoplefy.com NOTE: Immediate joiners to max 30 days are preferred.
Posted 1 week ago
3.0 - 8.0 years
12 - 15 Lacs
Bengaluru
Work from Office
We are seeking an innovative professional to join our GSOC team as a GSOC Technology & Automation Specialist. This individual contributor role focuses on enhancing the efficiency and resilience of our GSOC by leveraging advanced technologies, promoting automation, and eliminating manual tasks. The ideal candidate will bridge the gap between security operations and IT, ensuring that our Critical Event Management (CEM) platforms and other critical technologies operate seamlessly to deliver real-time actionable intelligence. Key Responsibilities: Technology Integration & Optimization: - Oversee and continuously improve the suite of technologies used within the GSOC, including CEM platforms , CCTV, access control, and alarm management systems. - Identify opportunities to automate routine monitoring and response tasks to reduce manual intervention and streamline GSOC operations. System Administration & Troubleshooting: - Serve as the primary technical resource for GSOC systems, ensuring all security devices, software, and integrations function optimally. - Develop and implement solutions to address system glitches, false alarms, and integration inefficiencies, collaborating closely with internal IT teams and external vendors. Automation & Process Enhancement: - Lead initiatives to implement automated workflows and intelligent alert systems that enhance proactive incident detection. - Design, test, and refine automated procedures to ensure rapid incident verification and escalation, reducing response times and operator workload. Innovation & Continuous Improvement: - Monitor emerging security technologies and industry best practices to inform strategic technology investments within the GSOC. - Evaluate new tools and platforms, conduct pilot projects, and provide recommendations to senior management on technology upgrades that improve operational resilience. Documentation & Training: - Develop and maintain comprehensive documentation, including system configurations, integration workflows, and standard operating procedures (SOPs) for GSOC technology systems. - Provide training and support to GSOC staff on new technological implementations and automation tools, with an emphasis on effectively using CEM platforms. Skills Required: Technical Expertise: - Strong background in security systems, including CCTV, access control, alarm systems, and CEM platforms. - Proficiency in network administration, system integration, and IT troubleshooting. CEM Platform Proficiency: - Demonstrated experience using and configuring CEM platforms. - Ability to integrate CEM solutions with other security and business systems to create a unified operational view. Automation & Analytics: - Experience with automation technologies, including REST API and workflow automation tools. - Strong analytical skills to optimize system performance and operational efficiency through data-driven insights. Problem-Solving & Innovation: - Excellent analytical and troubleshooting abilities to diagnose technical issues and implement innovative solutions that reduce manual tasks. - A proactive mindset with a focus on continuous process improvement in a fast-paced, 24/7 operational environment. Communication & Collaboration: - Strong interpersonal skills to work effectively with both technical teams and GSOC operators. - Ability to translate technical requirements into practical solutions that align with GSOC operational needs. Additional Attributes: - Knowledge and hands-on experience with REST APIs, JSON, and XML for developing automation projects and integrating security systems. Qualifications & Experience: Education: - Bachelors degree in Information Technology, Computer Science, Security Management, or a related field. Experience: 3+ years of experience managing or supporting security systems, preferably within a GSOC or similar security operations environment. Proven track record of implementing automation projects in a corporate or security-focused setting. Prior experience working with CEM platforms is highly preferred, including system administration and integration work. Certifications (Preferred): Certifications in IT systems management (e.g., CompTIA Network+, Security+, or equivalent). Relevant security or automation certifications are advantageous.
Posted 2 weeks ago
4.0 - 9.0 years
10 - 17 Lacs
Pune
Hybrid
Greetings from Peoplefy Infosolutions !!! We are hiring for one of our reputed MNC client based in Pune . We are looking for candidates with 4 + years of experience in GSOC - Job Description Monitoring and Alerting: Continuously monitor security systems for suspicious activity, analyze alerts and events, and escalate critical incidents according to established procedures. Incident Response: Investigate security incidents, determine the root cause, and implement mitigation and remediation measures. This may involve collecting evidence, analyzing log data, and coordinating with other teams. Threat Hunting: Proactively search for and identify potential threats within the environment, using various techniques and tools. This may include analyzing network traffic, reviewing system logs, and conducting vulnerability scans. Vulnerability Assessment: Identify and assess vulnerabilities in systems, applications, and networks. This may involve using vulnerability scanning tools, performing manual assessments, and collaborating with other teams to address vulnerabilities. Policy and Procedure Compliance: Adhere to information security policies and procedures, and ensure that all activities are aligned with security standards. Documentation and Reporting: Maintain detailed documentation of security incidents, investigations, and resolutions. Generate reports and summaries on security performance and trends. Collaboration: Collaborate with other SOC analysts, security engineers, and other IT teams to ensure effective security operations. Technical Skills: Experience with Security Information and Event Management (SIEM) systems (e.g., Splunk, ArcSight, Qradar). Experience with Endpoint Detection and Response (EDR) tools (e.g., CrowdStrike, Microsoft Defender ATP). Understanding of network security concepts, including firewalls, intrusion detection systems, and intrusion prevention systems. Experience with vulnerability assessment tools and techniques. Experience with incident response frameworks and procedures. Knowledge of security standards and regulations (e.g., PCI DSS, GDPR). Interested candidates for above position kindly share your CVs on Priyanka.sar@peoplefy.com with below details - Experience : CTC : Expected CTC : Notice Period : Location :
Posted 2 weeks ago
8 - 13 years
22 - 37 Lacs
Gurgaon, Noida, Mumbai (All Areas)
Hybrid
About KPMG in India KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant with local laws, regulations, markets and competition. KPMG has offices across India in Ahmedabad, Bengaluru, Chandigarh, Chennai, Gurugram, Hyderabad, Jaipur, Kochi, Kolkata, Mumbai, Noida, Pune, Vadodara and Vijayawada. KPMG entities in India offer services to national and international clients in India across sectors. We strive to provide rapid, performance-based, industry-focused and technology-enabled services, which reflect a shared knowledge of global and local industries. Role & responsibilities: The candidate should be hands-on in managing Security Operations, SOC, Identify access management, Risk Management Should have worked on Blueprinting and Designing of SOC frameworks and implementation of SOC/SIEM solution and Enterprise Architecture Should be hands-on on security processes with good client and Market facing experience in India geography Should have worked on Designing, solutioning and Implementation of Cyber Security Frameworks - Security Operations Strategy, Vulnerability Management - Application & Infrastructure and Threat Intelligence and Analytics Preferred candidate profile : Should have worked on the below - M&A experience - Actively monitoring, analyzing & escalating SIEM alerts based on correlation rules, Active threat hunting on network flow, user behavior and threat intelligence Candidate should have expert level domain knowledge (Cyber Security), Threat Hunting, SIEM - Azure Sentinel, SIEM - (RSA / Splunk / LogRhythm), Ability to Comprehend Logs (HTTP, SMTP, Network), Operating systems and servers, Organizes Technical Sessions / Talks. Candidate should able to familiar with python Scripting & Windows Active Directory (Optional). Vulnerability Management Services - External & internal Vulnerability scanning, VMS tool Qualys & Kenna Administration, Application server & Vulnerability scanning Candidate should have expert level domain knowledge (Cyber Security), Vulnerability scans and recognizing vulnerabilities in security systems, Network analysis tools to identify vulnerabilities, Develop insights about the context of an organizations threat environment, Risk management processes, Network attack and a network attacks relationship to both threats and vulnerabilities. Candidate should have advance level understanding of Impact/risk assessments. Security Operations and Management experience - SOC Experience in Identity access, privilege access, vulnerability management Client facing - front end with the client- focused on engagements + Sales, BD + Capability Development Qualification: B.Tech / M.Tech/ MCA professional with 6-15 years of experience in the relevant role Should have strong hands on MS Power Point and MS Project Hands on experience and certification in any one SIEM (IBM QRadar, ArcSight, Azure Sentinel, Splunk) Security Certifications like CISSP, CISM, GIAC, Security+ etc Equal employment opportunity information KPMG India has a policy of providing equal opportunity for all applicants and employees regardless of their color, caste, religion, age, sex/gender, national origin, citizenship, sexual orientation, gender identity or expression, disability or other legally protected status. KPMG India values diversity and we request you to submit the details below to support us in our endeavor for diversity. Providing the below information is voluntary and refusal to submit such information will not be prejudicial to you.Role & responsibilities
Posted 3 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2