Jobs
Interviews

Hitachi Cyber

4 Job openings at Hitachi Cyber
Team Lead – Security Operations Center (SOC) Pune,Maharashtra,India 5 years Not disclosed On-site Full Time

Lead the frontline of cyber defense. Join Hitachi Cyber as a Team Lead – Security Operations Center (SOC) and take charge of protecting global organizations from today’s most advanced threats. As a global leader in cybersecurity, Hitachi Cyber empowers businesses to stay ahead of evolving risks. Based in Pune-India, you’ll lead a team of skilled analysts, work with cutting-edge tools, and play a critical role in safeguarding digital infrastructures across industries. Your Mission: As SOC Team Lead, you’ll oversee day-to-day operations, mentor analysts, and ensure rapid, effective incident response. You’ll be the bridge between tactical execution and strategic security leadership. Key Responsibilities: Lead and manage a team of SOC analysts across shifts. Oversee real-time monitoring, triage, and incident response activities. Ensure adherence to SLAs, escalation protocols, and documentation standards. Collaborate with threat intelligence, engineering, and client teams to improve detection and response. Drive continuous improvement in SOC processes, playbooks, and automation. Provide coaching, performance reviews, and training to develop team capabilities. What We’re Looking For: 5+ years of experience in cybersecurity, with at least 2 years in a SOC leadership role. Strong knowledge of SIEM tools (e.g., Splunk, Sentinel, QRadar), EDR, and incident response frameworks. Experience managing 24/7 operations and working with global clients. Excellent leadership and communication skills in English . Relevant certifications (e.g., GCIA, GCIH, CISSP, or equivalent) are a plus. Why Join Hitachi Cyber? Work with global clients and cutting-edge technologies. Be part of a collaborative, high-performance security culture. Accelerate your career in a fast-growing, mission-driven company. Ready to lead the charge? Apply now and help shape the future of cybersecurity. Show more Show less

Sr. Governance, Risk & Compliance Specialist India 0 years None Not disclosed On-site Full Time

Join the dynamic and innovative team at Hitachi Cyber as a Sr. Governance, Risk & Compliance Specialist, specialized in PCI-DSS and take your career to new heights. As a global leader in information security solutions, we are at the forefront of protecting organizations from evolving cyber threats. By joining our team, you'll have the opportunity to work alongside industry experts, cutting-edge technologies, and prestigious clients from various sectors. What can be your next challenge? Reporting to the Team Lead Governance, Risk & Compliance, as a key member of the Professional Services team, the Senior Governance, Risk, and Compliance (GRC) Consultant provides strategic guidance and support to both customer organizations and internal projects. Here’s an overview of your main responsibilities: Conduct various information security consulting engagements, including: *Designing and implementing security policies, frameworks, and standards. *Developing information security management system initiatives. *Performing cyber security posture and threat assessments. *Establishing Security Risk Management Frameworks and defining Risk Treatment Plans. *Acting as a Virtual CISO for clients, advising on security improvement strategies. *Assessing internal and external information security risks and incidents. *Documenting control failures and providing remediation guidance to stakeholders. Demonstrate operational knowledge and hands-on experience with industry standards such as ISO 27000, COBIT, NIST, PCI DSS, and GDPR. Engage directly with clients to develop work plans and execute consulting engagements. Conduct workshops, interviews, surveys, and data collection to perform assessments. Deliver security awareness projects and training to clients. Apply abstract concepts to develop customized solutions for customers. Work independently on assignments and develop deliverables according to agreed work plans. Contribute to the organization's knowledge and practices by enhancing services for customers. Participate in professional development activities, including obtaining certifications like CISSP, CEH, and PCI QSA. Assist in pre-sales discussions and project scoping, as well as perform technical reviews of proposals and RFP responses. Conduct peer and quality assurance reviews on client deliverables, ensuring high standards of excellence. Collaborate with a diverse and talented team in a supportive and inclusive environment that fosters continuous learning and growth. With our commitment to ongoing professional development, you'll have access to training programs, certifications, and mentorship opportunities to enhance your skills and advance your career. At Hitachi Cyber, we believe in work-life balance and offer flexible work arrangements. Experience the excitement of being part of a company that values innovation, teamwork, and making a real impact in the world of cybersecurity. We would like to meet you if you have: Strong experience in Information Security, IT Governance, Risk & Compliance consulting, or related services, with a strong technical background and proven track record of leading complex GRC initiatives, projects, and implementations. Strong experience with PCI-DSS. Bachelor’s degree in computer science or information systems, Engineering, or a related discipline. Experience of risk management principles and associated methodologies. Excellent communication in English. Hands on experience and thorough understanding with some of the standards such as: ISO 27000, NIST, SOC2, PCI DSS, ITIL, ITSM, COBIT, COSO, SOX, SOC, GXP, AI Governance, standards preferred. Ability to travel. Come join us and be a vital force in securing the digital future. Apply today and embark on a rewarding journey with Hitachi Cyber. We thank all applicants for their interest. However, only those selected for an interview will be contacted.

Information Secuity Analyst - Sentinel AND MS Defender pune,maharashtra,india 1 years None Not disclosed On-site Full Time

Company Overview: Cumulus Systems engages in providing End-to-End Software Development Lifecycle involving Business & Requirements Analysis, Solution Architecture & Design, Development, Testing, Deployment and Postproduction Support. Its cross-domain storage performance management platform called MARS (Measure Analyze Recommend Solve) monitors and helps manage large-scale, heterogeneous IT infrastructure across the entire enterprise. Must have : 1-2 Years of hands-on, Sentinel AND MS Defender working experience. Minium 2 years of working experience in Incident Response Willing to work onsite, Pune location 5 days a week. Willing to work on rotational shifts for 24/7 operations. Job Roles & Responsibilities: L1 Analyst experienced in Azure Sentinel and Microsoft Defender. Experienced in Security Incident Investigation, using Microsoft Defender for O365, Microsoft Defender for Endpoint. Preferred certification- SC – 200. Open and track incidents based on suspicious alerts and/or logs in accordance with the intervention protocol of each client. Monitor the networks of clients using our SIEM, ensure the availability of said infrastructure and recommend solutions that would improve the security posture of the clients. Produce the required monthly reports. Compile and produce weekly vulnerability reports. Answer and respond to calls for support on incident. Skills: Client-focused approach with excellent communication in English. Strong analysis, organizational and documentation skills. Flexibility and adaptability to change. Sense of urgency, resourcefulness and initiative. Availability for working in a team-oriented environment during work shifts, 24/7/365. Proficiency in communication protocols found on modern networks (ICMP, IP, UDP, TCP, ARP, HTTP, HTTPS/SSL, SNMP, POP, etc.). Sound knowledge of network security topics. Ability to analyze, assess vulnerabilities and provide recommendations. One or more of the following security certifications: CEH, GISF, Security+, SSCP will be considered an asset. Other security certifications will be considered an asset. Experience with SIEM & Incident handling will be considered an asset. Experience: 1-2 years Education: University Degree in IT or College degree with 2 years of relevant IT experience. Hitachi Values: We are proud to say we are an equal opportunity employer and welcome all applicants for employment without attention to any factor that doesn’t impact your ability to do the job, including race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status. We are proud of Japanese heritage, with our values expressed through the Hitachi Spirit: Wa – Harmony, Trust, Respect Makoto – Sincerity, Fairness, Honesty, Integrity Kaitakusha-Seishin – Pioneering Spirit, Challenge

SIEM Detection Engineer - Azure Sentinal pune,maharashtra,india 3 years None Not disclosed On-site Full Time

Job Description Job Title: SIEM Detection Engineer Designation: Engineer Company: Cumulus Systems Pvt. Ltd. Location: Pune, India Experience: 3-6 years as Detection Engineer Company Overview: Cumulus Systems engages in providing End-to-End Software Development Lifecycle involving Business & Requirements Analysis, Solution Architecture & Design, Development, Testing, Deployment and Postproduction Support. Its cross-domain storage performance management platform called MARS (Measure Analyze Recommend Solve) monitors and helps manage large-scale, heterogeneous IT infrastructure across the entire enterprise. Position Overview: As an L2 Detection Specialist, you will design, test, and maintain high-fidelity detection content in one of the following SIEM platforms—Microsoft Sentinel (KQL) or Google Security Operations (YARA-L). Partnering closely with SOAR engineers, SOC analysts, and solutions engineers, you will perform proactive threat hunting, fine-tune alert logic, and ensure our global SOC can rapidly identify and respond to emerging threats. Job Roles & Responsibilities: Design, build, and maintain detection rules, correlation searches, dashboards, and reports in one or more of the specialized SIEM platform. Continuously validate and tune detection logic through simulations, red-team findings, SOC false positives and live incident feedback. Analyze log and telemetry data to uncover suspicious behaviors, patterns, and indicators of compromise; develop new signatures accordingly. Integrate external threat-intelligence feeds (IoCs and TTPs) to enrich alerts and broaden detection coverage. Leverage MITRE ATT&CK and other frameworks to guide prioritization and detection development methodology. Perform periodic rule health checks, adjusting thresholds to maximize fidelity and minimize false positives. Collaborate with SOAR engineers to automate enrichment, triage, and response actions that stem from SIEM alerts. Conduct hypothesis & threat intelligence driven threat hunts to identify advanced attacker techniques not yet covered by automated detections. Generate clear, actionable metrics and trend reports for SOC leadership, highlighting alert volumes, rule efficacy, and tuning outcomes. Maintain detection KPIs to measure alert accuracy. Document all detection logic, tuning rationales, and operational procedures to support audit, compliance, and knowledge transfer. Provide technical consultation during incident investigations and post-incident retrospectives, identifying detection gaps and recommending improvements. Skills: Strong understanding of MITRE ATT&CK and its practical application to detection engineering. Familiarity with cloud infrastructures (Azure, GCP, AWS) and the security logs they generate. Proficiency in scripting for automation (Python or PowerShell preferred). Working knowledge of common security controls and telemetry sources—firewalls, IDS/IPS, EDR, endpoint protection, cloud logs, etc. Relevant certifications (any of): Admin · SC-200 (Microsoft Sentinel) · Google SecOps Certified · CompTIA Security+ · GCP / Azure / AWS Foundational. Excellent written documentation skills and the ability to convey complex detection concepts to both technical and non-technical stakeholders. Experience: Minimum 3 years overall experience in cybersecurity operations or engineering. At least 1–2 years hands-on experience building detections in one of the following SIEMs: Microsoft Sentinel (KQL) or Google SecOps (YARA-L). Nice-to-Have Experience integrating SOAR playbooks with SIEM alerts. Prior involvement in purple-team exercises or red-team simulations. Knowledge of additional query or signature languages (e.g., Sigma, Elastic Query DSL). Scripting Knowledge (Python, Powershell) Data Analytics & Reporting Expertise in Microsoft PowerBI, Tableau or equivalents.