Home
Jobs

1328 Ids Jobs - Page 34

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

10.0 - 15.0 years

0 Lacs

Delhi

On-site

GlassDoor logo

Job Summary The Director, TSG Information Security, Cyber Threat Management is a position within Bain's Cyber Security Department, whose mission is to define and enable strategies to safeguard the digital assets and integrity of the organization. In this role, the Director understands how security measures align with the overall organizational strategy and will begin to organize and lead in the development and implementation of security controls that adhere to regulatory requirements and best practices. The Director combines a strong level of technical and managerial skills and business alignment to build and guide a growing team and resources across a spectrum of capabilities. The position primarily focuses on the efficient, effective and reliable resolution of Bain's defensive strategy as well as focuses on improving our offensive strategy to help the company meet its overall business objectives. The position therefore must have the technical skills to troubleshoot and resolve complex issues as well as excellent communication and upward management. These measures require taking a leadership position in coordinating activities across the team working with Technical, IT and Cybersecurity leadership. The Director role has expertise and experience in multiple disciplines, including Threat Intelligence programs, Detection and Deterrence systems, Threat Exposure Management, Incident Response, Forensics and Evidence gather and Pro-Active Security probing capabilities (Red/Blue/Purple teaming & Penetration Testing). Principal Accountabilities Monitoring & Detection Oversee and strategize on developing advanced security monitoring, analysis, and correlation platforms to detect cybersecurity events. Direct cross-functional efforts in the identification and in-depth analysis of sophisticated security threats, including malware, APTs (Advanced Persistent Threats), and targeted attacks. Enable a wide range of security tools and technologies, including SIEM, IDS/IPS, or next gen/advanced threat detection solutions. Partner with organizations and vendors to identify and integrate new data sources. Incident Response & Analysis Oversee the ongoing management and evolution of security runbooks and champion for ongoing automation or AI/ML based technologies to increase speed/efficiency. Strengthen Bain’s capability in-depth log analysis, data correlation, and forensic investigations to identify root causes of incidents and improve security measures. Provide strong and clear communications on cyber events and situations with sr. leadership. Ensure alignment in security policies and practices adhere to industry standards and compliance requirements and oversee the validation of the controls. Serve as a subject matter expert in security discussions and decision-making and enable and grow team members skills and experience. Work with the primary goal of building efficiencies in Cyber Threat Management responses and driving down MTTR and reducing overall risk. Threat Intelligence Enable a threat intelligence capability, including open-source intelligences (OSINT), dark web forums, and industry reports to drive awareness and improvement in our defensive posture. Utilize threat intelligence platforms and tools to aggregate and correlate threat data. Drive coordination with intelligence and incident response teams to investigate and analyze security incidents. Develop and refine threat intelligence methodologies and tools. Stay current with industry best practices and new methodologies to enhance the teams capabilities. Vulnerability Management & Threat Exposure Management Work cross-functionally across IT teams and provide leadership and guidance in mitigating threats to Bain. Serve as a subject matter expert in security discussions and decision-making. Build processes to enable regular vulnerability scans on the organization's network, applications, and systems using industry-standard tools Pro- Active Security Testing Experience implementing and operationalizing vulnerability management tools, processes, and best practices. Oversee the classification and prioritization of vulnerabilities based on risk and potential impact. Stay informed about emerging trends and technologies in cybersecurity. Work collaboratively with other security team members, IT departments, and relevant business units to address security concerns and enhance overall security posture. Pro- Active/Enhanced Security Testing Partner with colleagues to expand controlled penetration testing technologies and capabilities on networks, applications, and systems to identify security vulnerabilities. Investigate and keep up to date with changes in tooling and advanced attacks in network, cloud and application testing. Analyze and interpret results to identify potential risk as well as evaluate potential impact. Red Team, Blue Team, Purple team exercise leadership experience. Professional Development and Innovation Stay informed about emerging trends and technologies in cybersecurity. Drive collaboration and defensive standards/expertise across Bain, working with other security team members, IT departments, and relevant business units to address security concerns and enhance overall security posture. Explore Professional Certifications and work with leadership to plan trainings. Knowledge, Skills, and Abilities Security Monitoring & Incident Detection and Response Strong knowledge of Splunk (or other SIEM tools),CrowdStrike or equivalent EDR/MDR platforms, Windows Defender, Palo Alto Networks, Other AV/EDR tool configuration, Cyberhaven (or other DLP tools) Knowledge of Vulnerability & Attack Surface Management toolsets, Threat Intelligence and Analysis tools, Vendor technical Risk Scoring tools, Deception technologies Knowledge of ticketing, triage and forensics capabilities and toolsets General Skills Great communication skills, with the ability to document and explain technical information clearly. Analytical mindset, with a focus on learning and problem-solving. Ability to work independently and well in a team, showing strong interpersonal skills. Eagerness to learn and adapt to new challenges in cybersecurity. Entrepreneurial spirit, open to trying new approaches and learning from them. Team Management Drive and expand the training and professional development of Security Operations staff. Qualification and Experience Bachelor's degree in a related field (e.g., Computer Science, Cybersecurity, Information Technology) or an equivalent combination of education, training, and experience 10-15 years of relevant experience Experience with Information Security technologies (Firewall, IPS, IDS, SIEM, EDR, CASB, AV, DLP, etc.) Experience with common information security controls frameworks (i.e. ISO, NIST, CIS, or CSA) Global company or equivalent Experience deploying systems or applications Ability to work independently and with teams on complex problems Complex problem solving Ability to work in a fast paced, dynamic environment.

Posted 2 weeks ago

Apply

7.0 years

22 - 25 Lacs

Gurgaon

On-site

GlassDoor logo

Designation: SOC analyst L3 Experience: 7-15 Year Office Location: Sector 18, Gurugram Job Type: Full-time Job Summary: We are seeking an experienced and proactive SOC Analyst Level 3 to join our cybersecurity operations team. As a senior member of the Blue Team, you will lead threat detection, incident response, and threat hunting efforts using cutting-edge tools including SOAR and XDR platforms. You will also play a key role in mentoring junior analysts, fine-tuning detection mechanisms, and developing automated playbooks. Key Responsibilities: * Lead real-time monitoring and analysis of security events from various sources (XDR, SIEM, SOAR, etc.). * Coordinate and perform advanced threat hunting across endpoints, networks, and cloud environments. * Analyze alerts and incidents to identify false positives and true threats. * Manage and develop SOAR playbooks to improve response times and incident handling. * Correlate threat intelligence with internal events to identify potential risks. * Drive incident response efforts, including containment, eradication, and recovery. * Collaborate with cross-functional teams to remediate vulnerabilities and prevent recurrence. * Perform forensic analysis as part of post-incident review and root cause analysis. * Mentor and train SOC Level 1 and 2 analysts. * Maintain and optimize detection rules and signatures in XDR and SIEM platforms. * Document investigation findings, incident reports, and threat hunting activities. Required Skills & Qualifications: * 7+ years of experience in Security Operations, Incident Response, or Cyber Threat Detection. * Deep understanding of Blue Team methodologies and defense-in-depth strategies. * Hands-on experience with SOAR platforms (e.g., Cortex XSOAR, Splunk SOAR, or similar). * Strong experience with XDR solutions (e.g., Palo Alto Cortex XDR, Microsoft Defender XDR, SentinelOne). * Advanced threat hunting techniques using both manual and automated approaches. * Proficient in using SIEM tools (Splunk, QRadar, or similar) and correlating log data from multiple sources. * Knowledge of MITRE ATT&CK framework and its application in threat detection and response. * Strong scripting and automation skills (Python, PowerShell, etc.) for SOAR and data parsing. * Familiarity with EDR, NDR, IDS/IPS, and endpoint forensic tools. * Solid understanding of TCP/IP, network protocols, and operating system internals (Windows, Linux). * Excellent communication and analytical skills. Job Type: Full-time Pay: ₹2,200,000.00 - ₹2,500,000.00 per year Schedule: Day shift Night shift Work Location: In person

Posted 2 weeks ago

Apply

0 years

5 - 5 Lacs

Bhubaneshwar

Remote

GlassDoor logo

1. Advanced Troubleshooting & Incident Analysis Perform in-depth analysis of network security incidents (e.g., DDoS, firewall breach attempts, malware communication). Investigate alerts escalated by L1 support. Analyze traffic patterns, logs, and system behavior for potential threats. Use packet analysis tools (Wireshark, tcpdump) to investigate suspicious traffic. 2. Firewall and Network Security Device Management Implement and manage firewall policies (Palo Alto, Fortinet, Cisco ASA). Review and refine firewall rules to minimize false positives and improve security posture. Perform configuration changes, backups, and rule audits. 3. Incident Response & Mitigation Act as first responder in critical security incidents. Work with SOC team to contain and remediate threats (e.g., isolate hosts, block IPs, reconfigure ACLs). Coordinate with L3 and Threat Intelligence teams for advanced threat mitigation. 4. Change Management & Implementation Review and implement network security changes as part of the change control process. Deploy updates, patches, and configuration adjustments in firewalls, IDS/IPS, and VPNs. Test and validate the impact of changes before implementation. 5. Log Analysis & Correlation Analyze logs from firewalls, routers, switches, IDS/IPS, and SIEM systems (e.g., Splunk, QRadar). Correlate events across multiple systems to identify attack patterns. Hunt for indicators of compromise (IOCs) in network traffic. 6. Tool Optimization & Maintenance Tune IDS/IPS signatures and firewall rules to reduce noise and increase accuracy. Ensure the health and performance of network security devices. Collaborate on SIEM tuning to improve detection capability. 7. Escalation Point & Support to L1 Team Act as technical escalation point for L1 team. Guide L1 analysts on SOPs, investigation techniques, and tool usage. Help document new playbooks and update knowledge bases. 8. VPN & Remote Access Support Configure and troubleshoot site-to-site and client VPNs. Investigate failed VPN connections, authentication issues, and access violations. 9. Security Audits & Compliance Support internal/external audits by providing logs, reports, and evidence. Ensure compliance with security policies, standards, and regulations (e.g., ISO 27001, PCI-DSS, NIST). Required Skills for L2 Network Security Strong understanding of: TCP/IP, routing protocols, NAT, ACLs Firewall architecture, DMZ, proxy servers IDS/IPS concepts, VPN, IPSec, SSL. Job Types: Full-time, Permanent Pay: ₹500,000.00 - ₹550,000.00 per year Benefits: Health insurance Life insurance Paid sick time Provident Fund Schedule: Day shift Work Location: In person

Posted 2 weeks ago

Apply

3.0 years

2 - 3 Lacs

Guwahati

On-site

GlassDoor logo

Greet and welcome guests as soon as they arrive at the office. Direct visitors to the appropriate person and office. Answer, screen and forward incoming phone calls. Ensure front desk is tidy . Ensure timely and accurate customer service Handle complaints and specific customers requests Troubleshoot emergencies Monitor stock and order office supplies Ensure proper mail distribution Ensure company’s policies and security requirements are met IDS is a must. Job Types: Full-time, Permanent Schedule: Rotational shift Education: Diploma (Preferred) Experience: Hotel: 3 years (Required) Language: English (Required) Hindi (Required) Work Location: In person Expected Start Date: 06/10/2025

Posted 2 weeks ago

Apply

3.0 - 5.0 years

0 Lacs

Noida

On-site

GlassDoor logo

Roles and Responsibilities: Work on requests, changes, incidents, and problem records to support customers' network security environment Provide technical escalation to L2 support engineers Provide on call support for high severity incidents in a 24x7 environment Detect security issues, create customer tickets, and manage problems until closure Act as point of escalation for the Network Security team and collaborate with internal support teams to ensure timely resolution of issues Ensure that Service Level Agreements and operational standards are met Perform system maintenance, check-ups and maintain current documentation Provide resolution plans for device issues Propose service, process, and technical improvements to management Requirements: Mid-level experience and proven knowledge in at least three of different network security products likes Firewalls (Cisco, Palo Alto), Content Filtering (Bluecoats, Websense, McAfee Web gateway) and IDS/IPS Mid-level networking troubleshooting skills and extensive knowledge of web connectivity and protocols (WCCP, PAC files, TCP/IP, HTTP, HTTPS, SSL, FTP, Telnet, SSH, etc.) Understanding the integration with authentication protocols such as LDAP, IWA, IWA-direct, SSO, Active directory At least two mid-level certifications in Network Security from any of the vendors like Cisco, Palo Alto, BlueCoat, SourceFire (PCNSE, CCNP Security etc.) Over 3-5 years of network troubleshooting experience and at least 2 years Network Security administration and design experience Bachelor's degree or equivalent experience Flexible to changing needs of customer, account, and team Drive for results, ability to grasp complex issues to arrive at optimal solutions Excellent customer facing communication skills, customer support and knowledge of ITIL best practices Work Timings: 24/7 work environment, India

Posted 2 weeks ago

Apply

5.0 - 7.0 years

3 - 8 Lacs

Noida

On-site

GlassDoor logo

Required Skills and Qualifications: 5-7 year experience Bachelor’s degree in Computer Science, Information Technology, or a related field (or equivalent experience). The candidate should be willing to relocate to Noida. Good knowledge of Windows /Linux system and networking fundamentals. Experience with cloud security and technologies like AWS, Azure, or Google Cloud Knowledge in operating and configuring SIEM tools (e.g., Sentinel , Splunk, MS defender). Knowledge of firewalls, IDS/IPS, DLP, and endpoint protection systems. Familiar with scripting and automation tools (e.g., Python, PowerShell). Experience with monitoring and logging platforms like ELK Stack, Splunk, Prometheus, Grafana, New Relic , Solarwinds Knowledge in CI/CD tools and processes (e.g., Jenkins, GitLab CI/CD). Knowledge containerization and orchestration tools (e.g., Docker, Kubernetes). Key Responsibilities Hands-on experience in Security incident response and threat intelligence analysis Knowledge of networking concepts, firewalls, and security protocols. Experience with SIEM tools, IDS/IPS systems, and endpoint security tools. Investigate security incidents and recommend remediation measures. Analyze security alerts from various monitoring tools and respond appropriately. Manage SIEM (Security Information and Event Management) tools and ensure logs are analyzed. Respond to incidents, perform initial troubleshooting, and escalate complex issues to L2/L3 engineers. Perform routine maintenance of servers, virtual machines, and cloud resources. Assist in provisioning, configuring, and decommissioning infrastructure as required. Support and maintain CI/CD pipelines for various projects. Execute existing automation scripts for routine tasks. Contribute to the improvement of automation scripts and processes. Maintain accurate and up-to-date documentation for configurations, incidents, and procedures. Coordinate with L2/L3 engineers, development, and QA teams for issue resolution.

Posted 2 weeks ago

Apply

0 years

0 - 0 Lacs

Bhiwadi

On-site

GlassDoor logo

Job Responsibilities:- •Work closely with the store team to achieve IDS & store Targets •Convert leads generated by IDS BD into sales by proactive interaction with customers for need assessment (design preferences); Emphasize on add on sales & increase in average bill value •Handle customer queries related to product, product availability, pricing information, sizing, material etc. •Proactively assist the customer in mixing and matching based on their design preferences •Follow up for the customer orders & accordingly coordinate till the merchandise is delivered to the customer •oversee IDS sales across nearby stores and manage customers specific to IDS for these stores •Forward leads to IDS Project Managers for customers with interior designing & space planning requirements •Provide inputs on VM for the store and ensure adherence to VM guidelines defined at corporate •Manage footfalls, conversations, Stock rotation, inventory . Manage store KPI .Follow all the SOP,s .Doing Atl & Btl activity if required .Genrate New leads and close the pipeline leads .Maintain relation with builder and interior designers or architecture Shear The cv 9560993813 Job Types: Full-time, Permanent Pay: ₹30,000.00 - ₹40,000.00 per month Schedule: Day shift Fixed shift Morning shift Language: English (Required) Work Location: In person

Posted 2 weeks ago

Apply

5.0 - 10.0 years

10 - 18 Lacs

Bengaluru

Work from Office

Naukri logo

Job Description: We are seeking a dedicated Vehicle SOC Analyst to join our automotive cybersecurity operations team. This role focuses on monitoring and responding to threats targeting in-vehicle systems , connected car platforms, and vehicle-to-everything (V2X) technologies. The analyst will work with in-vehicle security tools and contribute to the development of automotive-specific detection and response strategies. Key Responsibilities: Automotive Security Monitoring & Analysis: Monitor vehicle telemetry, network traffic, and logs from ECUs, gateways, and telematics units. Identify, investigate, and respond to cyber threats affecting in-vehicle networks (CAN, LIN, FlexRay, Ethernet). Perform root cause analysis of security alerts and anomalous vehicle behavior. In-Vehicle Security Protocols & Standards: Ensure implementation of in-vehicle cybersecurity protocols such as secure boot, secure OTA, authentication, and encryption. Maintain awareness of ISO/SAE 21434, UNECE WP.29 regulations, and industry best practices. Use Case & Playbook Development: Design and maintain detection use cases tailored to automotive environments (e.g., CAN message flooding, firmware tampering). Develop and update response playbooks for in-vehicle attack scenarios. Collaborate with engineering and R&D teams to refine security detection logic. Hands-On Tools & Technology: Use in-vehicle IDS and anomaly detection tools (e.g., Argus, GuardKnox, Upstream Security, AutoCrypt). Work with automotive SIEM platforms and data aggregation tools. Apply EDR or endpoint monitoring to IVI systems, telematics control units (TCUs), and other connected components. Conduct packet analysis with automotive-specific tools (e.g., CANalyzer, Savari, Wireshark with CAN protocol plugins).

Posted 2 weeks ago

Apply

4.0 years

0 Lacs

Uttar Pradesh, India

On-site

Linkedin logo

Job Description Be part of the solution at Technip Energies and embark on a one-of-a-kind journey. You will be helping to develop cutting-edge solutions to solve real-world energy problems. We are currently seeking a Climate Data Analyst, reporting directly to [reporting line position] to join our team based in Noida. The Climate Data Analyst will be responsible for collecting, analyzing, and reporting data related to the company’s Greenhouse Gas emissions (scope 3). They will play a crucial role in supporting the development and implementation of Climate Transition strategies and action plans by providing insights derived from data analysis. About us: Technip Energies is a global technology and engineering powerhouse. With leadership positions in LNG, hydrogen, ethylene, sustainable chemistry, and CO2 management, we are contributing to the development of critical markets such as energy, energy derivatives, decarbonization, and circularity. Our complementary business segments, Technology, Products and Services (TPS) and Project Delivery, turn innovation into scalable and industrial reality. Through collaboration and excellence in execution, our 17,000+ employees across 34 countries are fully committed to bridging prosperity with sustainability for a world designed to last. About the opportunity we offer: The Climate Data Analyst will be responsible for collecting, analyzing, and reporting data related to the company’s Greenhouse Gas emissions (scope 3). They will play a crucial role in supporting the development and implementation of Climate Transition strategies and action plans by providing insights derived from data analysis. Job Accountabilities: Carbon calculation (for scope 3 emissions) Maintain and improve Carbon calculation tools Ensure data accuracy, consistency, and integrity through regular audits as part of Data Quality run process. Train and support projects team in calculating the carbon footprint on projects Maintain Emission factors to be up-to-date Ensure proper collection of the data from carbon calculation Analyze data to identify trends, patterns, and insights related to GHG emissions reductions. Prepare reports, dashboards and presentations to communicate GHG emissions performance. Climate scenario analysis Improve the Climate scenario analysis tool Participate in elaborating different scenarios of GHG emissions reduction Collaborate with finance modeling to ensure the alignment of data forecast Elaborate a tool to monitor GHG emissions reduction Data Analysis Data crunching and competitive analysis for the various Climate-related topics. Collect and manage climate-related data from various internal and external sources. Support the Climate change team to optimize internal processes by using digital tools and artificial intelligence. Gather data and develop a strategic competitor analysis dashboard and reports. Collaborate with cross-functional teams, especially IDS and Digital to identify opportunities and develop solutions for the sustainability department. Contribute to the continuous improvement of sustainability data management processes and systems. About you: Bachelor degree or superior in engineering and/or data sciences 4+ years of relevant work experience Mastery of Microsoft Tools (PowerPoint, Word, Excel) Hands-on experience with data visualization tools (PowerBI preferably) Knowledge of Python programming and databases Knowledge of artificial intelligence and machine learning Excellent data analysis and organizational skills Strong analytical and data management skills Ability to work independently and manage multiple projects simultaneously Knowledge of sustainability issues and commitment to driving sustainable change is a differentiator Comfortable with complex ecosystem, moving environment and multi-stakeholders’ management Good communication and interpersonal skills to effectively collaborate with various teams Fluent English level is required with good writing skills What’s next? Once receiving your application, our Talent Acquisition professionals will screen and match your profile against the role requirements. We ask for your patience as the team completes the volume of applications with reasonable timeframe. Check your application progress periodically via personal account from created candidate profile during your application. We invite you to get to know more about our company by visiting and follow us on LinkedIn, Instagram, Facebook, X and YouTube for company updates. Show more Show less

Posted 2 weeks ago

Apply

0.0 - 5.0 years

0 Lacs

Madhya Pradesh, India

On-site

Linkedin logo

Job Requirements Role/Job Title: Associate Customer Service Manager Function/Department: Rural Banking Job Purpose The role entails managing and scaling up the retail banking business for the branch managing operations and resources in the most cost efficient and technology effective manner. The role bearer would lead customer service and branch operations for a designated branch and be responsible for the daily branch upkeep. This role is the central custodian of all Rural Banking documents for the branch and provides operational support for Rural and semi urban Retail products. The role bearer is primarily accountable for ensuring seamless maintaining of customer life cycle, fulfilling customer requests and providing best-in class service. Responsibilities Roles & Responsibilities: Responsible for day-to-day operations and administration of the Branch, ensuring strict compliance with Bank's policies and procedures. Responsible for branch operations and service delivery to the customers of a designated branch in our rural network. Data entry of application forms, creation of customer IDs, accounts, etc. File / document checking including KYC checking, application forms and loan document verification. Handling cash and clearing transactions. Maintaining good audit rating for the branch. Work towards ensuring best in class service delivery at the branch for external and internal customers. Work as an effective business partner in strategizing and driving the implementation of critical operational and regulatory practices for the branch such as compliance, Lending operations and operational risk. Oversee quality initiatives across operations team for optimization of processes in order to improve TAT and upgradation of SLAs. Employ tools such as automation and digitization to increase process efficiency. Education Qualification Graduation: BA / BCom / BBA / BSc / BTech / BE or any other graduate Experience: 0 to 5 years of relevant experience in Banking or allied Business. Show more Show less

Posted 2 weeks ago

Apply

5.0 - 10.0 years

10 - 18 Lacs

Bengaluru

Work from Office

Naukri logo

Job Description: We are seeking a skilled and proactive OT SOC Analyst to join our cybersecurity operations team. This role is focused on protecting industrial control systems (ICS) and operational technology (OT) environments through continuous monitoring, incident response, and development of OT-specific detection and response strategies. Key Responsibilities: OT Incident Response: Detect, investigate, and respond to cybersecurity incidents affecting OT systems. Coordinate with plant operations and engineering teams during security events. Conduct root cause analysis and document incident findings. OT Security Protocols & Compliance: Implement and enforce OT security best practices and standards (e.g., ISA/IEC 62443, NIST 800-82). Assist in designing secure OT network architectures based on the Purdue Model. Monitor adherence to OT-specific access controls, patching, and asset hardening. Use Case & Playbook Development: Design and implement detection use cases tailored to ICS/SCADA environments. Create and maintain incident response playbooks for OT scenarios (e.g., unauthorized PLC changes, protocol abuse). Continuously improve detection coverage and response efficiency. Hands-On Tool Usage: Monitor and analyze alerts using IDS (e.g., Snort, Zeek, Nozomi Networks, Claroty). Utilize SIEM tools (e.g., Splunk, QRadar) for log correlation, rule creation, and threat detection. Support OT endpoint monitoring using EDR solutions (e.g., CrowdStrike, Defender for Endpoint). Perform traffic analysis using tools like Wireshark for protocol inspection and anomaly detection.

Posted 2 weeks ago

Apply

1.0 - 3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

ECI is the leading global provider of managed services, cybersecurity, and business transformation for mid-market financial services organizations across the globe. From its unmatched range of services, ECI provides stability, security and improved business performance, freeing clients from technology concerns and enabling them to focus on running their businesses. More than 1,000 customers worldwide with over $3 trillion of assets under management put their trust in ECI. At ECI, we believe success is driven by passion and purpose. Our passion for technology is only surpassed by our commitment to empowering our employees around the world . The Opportunity: ECI has an exciting opportunity for a Security Ops Center Analyst , who is responsible for analyzing and responding to network security events. In this role, you will be responsible for threat actor based investigations, directing new detection methodology and providing 1st level support to incident response and monitoring functions. Also, responsible for proactive monitoring and response of known and or emerging threats against the network. This is an onsite role. What you will do: Proactive monitoring and response to known and or emerging threats against the network. Responsible for threat actor-based investigations using SIEM, EDR, Email gateway, directing new detection methodology and providing 1st level support to incident response and monitoring functions. Perform investigation and triage of events and escalate as appropriate. Recognize and investigate intrusion attempts differentiate false positives from true intrusion attempts. Document and present findings on security incidents and investigations. Collaborate with the team to mitigate and counteract threats. Perform email analysis and be able to categorize email with its verdict. Remain informed about the latest security trends and best practices Communicate effectively with representatives of the Lines of Business, technology specialists, customers, and vendor. To continuously improve on their knowledge around information security as it relates to their job and identifying and preventing phishing attempts. Who you are: Minimum 1 - 3 years of experience in the IT industry, preferably working in a SOC environment. Bachelors in Computer science/IT/Electronics Engineering, M.C.A. or equivalent University degree. Certifications: CCNA, CEH, CHFI. Knowledge on SIEM, IDS/IPS, Firewall, VPN, EDR, AV and other security products. Knowledge on TCP/IP network traffic and event log analysis. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Willingness to work in a job that involves 24/7 operations. Remain vigilant while continuing to maintain and enhance the overall security of our client service portfolio. Maintain awareness about the potential risks based on the environment they are operating in and the clients they are working on. Strong verbal and written communication skills, with ability to communicate technical information to non-technical stakeholders Displays an analytical and problem-solving mindset Bonus points if you have: Ability to work well under pressure – particularly during a security incident or regulatory audit Strong interpersonal and presentation skills. ECI’s culture is all about connection - connection with our clients, our technology and most importantly with each other. In addition to working with an amazing team around the world, ECI also offers a competitive compensation package and so much more! If you believe you would be a great fit and are ready for your best job ever, we would like to hear from you! Love Your Job, Share Your Technology Passion, Create Your Future Here! Show more Show less

Posted 2 weeks ago

Apply

1.0 - 3.0 years

0 Lacs

Indore, Madhya Pradesh, India

On-site

Linkedin logo

ECI is the leading global provider of managed services, cybersecurity, and business transformation for mid-market financial services organizations across the globe. From its unmatched range of services, ECI provides stability, security and improved business performance, freeing clients from technology concerns and enabling them to focus on running their businesses. More than 1,000 customers worldwide with over $3 trillion of assets under management put their trust in ECI. At ECI, we believe success is driven by passion and purpose. Our passion for technology is only surpassed by our commitment to empowering our employees around the world . The Opportunity: ECI has an exciting opportunity for a Security Ops Center Analyst , who is responsible for analyzing and responding to network security events. In this role, you will be responsible for threat actor based investigations, directing new detection methodology and providing 1st level support to incident response and monitoring functions. Also, responsible for proactive monitoring and response of known and or emerging threats against the network. This is an onsite role. What you will do: Proactive monitoring and response to known and or emerging threats against the network. Responsible for threat actor-based investigations using SIEM, EDR, Email gateway, directing new detection methodology and providing 1st level support to incident response and monitoring functions. Perform investigation and triage of events and escalate as appropriate. Recognize and investigate intrusion attempts differentiate false positives from true intrusion attempts. Document and present findings on security incidents and investigations. Collaborate with the team to mitigate and counteract threats. Perform email analysis and be able to categorize email with its verdict. Remain informed about the latest security trends and best practices Communicate effectively with representatives of the Lines of Business, technology specialists, customers, and vendor. To continuously improve on their knowledge around information security as it relates to their job and identifying and preventing phishing attempts. Who you are: Minimum 1 - 3 years of experience in the IT industry, preferably working in a SOC environment. Bachelors in Computer science/IT/Electronics Engineering, M.C.A. or equivalent University degree. Certifications: CCNA, CEH, CHFI. Knowledge on SIEM, IDS/IPS, Firewall, VPN, EDR, AV and other security products. Knowledge on TCP/IP network traffic and event log analysis. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Willingness to work in a job that involves 24/7 operations. Remain vigilant while continuing to maintain and enhance the overall security of our client service portfolio. Maintain awareness about the potential risks based on the environment they are operating in and the clients they are working on. Strong verbal and written communication skills, with ability to communicate technical information to non-technical stakeholders Displays an analytical and problem-solving mindset Bonus points if you have: Ability to work well under pressure – particularly during a security incident or regulatory audit Strong interpersonal and presentation skills. ECI’s culture is all about connection - connection with our clients, our technology and most importantly with each other. In addition to working with an amazing team around the world, ECI also offers a competitive compensation package and so much more! If you believe you would be a great fit and are ready for your best job ever, we would like to hear from you! Love Your Job, Share Your Technology Passion, Create Your Future Here! Show more Show less

Posted 2 weeks ago

Apply

0 years

0 Lacs

Tijara, Rajasthan, India

On-site

Linkedin logo

Dear Friends, We have excellent opening for Cyber Security Consultant to Lead our Organisations Security strategy and ensure the Protection of Digital assets network and Data. Manage and oversee security infrastructure, including firewalls, IDS/IPS Required Candidate profile Bachelor degree in Cyber security, information Technology, or related field 5-10 yrs of experiences in Cyber security Strong knowledge of security frameworks Certifications such CISSP, CISM CEH Note : candidates those can join immediately will be prefer. Interested candidates can send me their profiles at yash@inventurehr.com Call us Directly on 7499041632 Show more Show less

Posted 2 weeks ago

Apply

10.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Note: By applying to this position you will have an opportunity to share your preferred working location from the following: Bengaluru, Karnataka, India; Mumbai, Maharashtra, India . Minimum qualifications: Bachelor's degree or equivalent practical experience. 10 years of experience with cloud native architecture in a customer-facing or support role. 7 years of experience in vendor pre-sales cybersecurity (e.g., threat detection, malware intelligence, cloud security posture management, SIEM, or SOAR). Experience with a wide variety of IT technologies and security solutions (e.g., SIEM, NGFW, Proxy, IDS/IPS, DLP, EDR, A/V, WAF, SOAR). Ability to travel up to 50% of the time as required. Preferred qualifications: Master's degree in Computer Science, Engineering, Mathematics, or a related field. Experience implementing security solutions for enterprises (e.g., threat detection and hunting, malware intelligence, cloud security posture management, SIEM or SOAR). Knowledge of product and solution market trends in the cybersecurity industry (e.g., ransomware, attack frameworks, zero trust, etc.). Knowledge of industry frameworks (e.g., MITRE, NIST, FAIR, CMMC, etc.). Knowledge of various hacking and exploitation tools and methodologies, common malware families, and Anti-Virus/IDS/IPS evasion techniques. Ability to deliver technical presentations with excellent problem-solving, communication, and presentation skills. About The Job The Google Cloud Platform team helps customers transform and build what's next for their business — all with technology built in the cloud. Our products are developed for security, reliability and scalability, running the full stack from infrastructure to applications to devices and hardware. Our teams are dedicated to helping our customers — developers, small and large businesses, educational institutions and government agencies — see the benefits of our technology come to life. As part of an entrepreneurial team in this rapidly growing business, you will play a key role in understanding the needs of our customers and help shape the future of businesses of all sizes use technology to connect with customers, employees and partners. As a Customer Engineer, you will help us grow our cybersecurity business by building and expanding relationships with customers. You will serve as an advisor to customers and an advocate for our security solutions, providing support to executive level, security leaders, architects, and analysts to lead projects forward. You will accompany customers in discovering the technology/solution and consult around the best way to secure and ensure compliance. You will optimize for results when in production, leading with empathy, while identifying innovative ways to multiply your impact and the impact of the team as a whole Google Cloud accelerates every organization’s ability to digitally transform its business and industry. We deliver enterprise-grade solutions that leverage Google’s cutting-edge technology, and tools that help developers build more sustainably. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems. Responsibilities Work with Security Sales and Google Cloud teams to identify and qualify business opportunities, understand customer technical and compliance objections, and develop strategies to resolve technical blockers. Work with all Google Cloud Security products to demonstrate and validate solution benefits in customer and partner environments. Support Google Cloud Security opportunities and relationships, own technical aspects of solutions, and deliver technical presentations, product and solution briefings, proofs-of-concepts, and demos to customers, partners, and stakeholders. Prepare and deliver product messaging in an effort to highlight our solutions value proposition using techniques including presentations, product demonstrations, white papers, trial management, and response documents. Travel to customer sites, conferences, and other related events, where applicable. Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also Google's EEO Policy and EEO is the Law. If you have a disability or special need that requires accommodation, please let us know by completing our Accommodations for Applicants form . Show more Show less

Posted 2 weeks ago

Apply

0 years

0 Lacs

Kozhikode, Kerala, India

On-site

Linkedin logo

Key Responsibilities: 1. Network Design and Implementation: • Design and deploy scalable and secure network solutions (LAN, WAN, VPN, SD-WAN, MPLS). • Plan and execute network upgrades and migrations with minimal downtime. • Oversee the integration of cloud networking solutions (e.g., AWS, Azure). 2. Network Operations Management: • Monitor network performance and ensure uptime according to SLAs. • Manage and troubleshoot connectivity, routing, and switching issues. • Implement and oversee disaster recovery (DR) and business continuity plans for network services. 3. Team Leadership and Collaboration: • Lead a team of network engineers, technicians, and administrators. • Assign tasks, provide mentorship, and conduct performance evaluations. • Collaborate with IT teams, vendors, and stakeholders on network-related initiatives. 4. Security and Compliance: • Ensure network security by implementing firewalls, intrusion detection/prevention systems (IDS/IPS), and VPNs. • Regularly audit network configurations to ensure compliance with industry standards. • Respond to and mitigate network security breaches and vulnerabilities. 5. Vendor and Asset Management: • Manage relationships with third-party vendors, ISPs, and service providers. • Negotiate contracts, licenses, and SLAs for network hardware and services. • Track network inventory, including routers, switches, and access points. 6. Performance Monitoring and Optimization: • Use tools like Op Manager ,SolarWinds, PRTG, or Cisco Prime to monitor and optimize network performance. • Analyze traffic patterns and implement quality of service (QoS) for critical applications. 7. Budget and Reporting: • Develop and manage budgets for network operations and upgrades. • Create regular reports on network performance, incidents, and capacity planning for senior management. Show more Show less

Posted 2 weeks ago

Apply

10.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

Note: By applying to this position you will have an opportunity to share your preferred working location from the following: Bengaluru, Karnataka, India; Mumbai, Maharashtra, India . Minimum qualifications: Bachelor's degree or equivalent practical experience. 10 years of experience with cloud native architecture in a customer-facing or support role. 7 years of experience in vendor pre-sales cybersecurity (e.g., threat detection, malware intelligence, cloud security posture management, SIEM, or SOAR). Experience with a wide variety of IT technologies and security solutions (e.g., SIEM, NGFW, Proxy, IDS/IPS, DLP, EDR, A/V, WAF, SOAR). Ability to travel up to 50% of the time as required. Preferred qualifications: Master's degree in Computer Science, Engineering, Mathematics, or a related field. Experience implementing security solutions for enterprises (e.g., threat detection and hunting, malware intelligence, cloud security posture management, SIEM or SOAR). Knowledge of product and solution market trends in the cybersecurity industry (e.g., ransomware, attack frameworks, zero trust, etc.). Knowledge of industry frameworks (e.g., MITRE, NIST, FAIR, CMMC, etc.). Knowledge of various hacking and exploitation tools and methodologies, common malware families, and Anti-Virus/IDS/IPS evasion techniques. Ability to deliver technical presentations with excellent problem-solving, communication, and presentation skills. About The Job The Google Cloud Platform team helps customers transform and build what's next for their business — all with technology built in the cloud. Our products are developed for security, reliability and scalability, running the full stack from infrastructure to applications to devices and hardware. Our teams are dedicated to helping our customers — developers, small and large businesses, educational institutions and government agencies — see the benefits of our technology come to life. As part of an entrepreneurial team in this rapidly growing business, you will play a key role in understanding the needs of our customers and help shape the future of businesses of all sizes use technology to connect with customers, employees and partners. As a Customer Engineer, you will help us grow our cybersecurity business by building and expanding relationships with customers. You will serve as an advisor to customers and an advocate for our security solutions, providing support to executive level, security leaders, architects, and analysts to lead projects forward. You will accompany customers in discovering the technology/solution and consult around the best way to secure and ensure compliance. You will optimize for results when in production, leading with empathy, while identifying innovative ways to multiply your impact and the impact of the team as a whole Google Cloud accelerates every organization’s ability to digitally transform its business and industry. We deliver enterprise-grade solutions that leverage Google’s cutting-edge technology, and tools that help developers build more sustainably. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems. Responsibilities Work with Security Sales and Google Cloud teams to identify and qualify business opportunities, understand customer technical and compliance objections, and develop strategies to resolve technical blockers. Work with all Google Cloud Security products to demonstrate and validate solution benefits in customer and partner environments. Support Google Cloud Security opportunities and relationships, own technical aspects of solutions, and deliver technical presentations, product and solution briefings, proofs-of-concepts, and demos to customers, partners, and stakeholders. Prepare and deliver product messaging in an effort to highlight our solutions value proposition using techniques including presentations, product demonstrations, white papers, trial management, and response documents. Travel to customer sites, conferences, and other related events, where applicable. Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also Google's EEO Policy and EEO is the Law. If you have a disability or special need that requires accommodation, please let us know by completing our Accommodations for Applicants form . Show more Show less

Posted 2 weeks ago

Apply

2.0 - 5.0 years

0 Lacs

Madhya Pradesh, India

On-site

Linkedin logo

Job Requirements Job Requirements Role/Job Title: Associate Customer Service Manager Function/Department: Rural Banking Job Purpose The role entails managing and scaling up the retail banking business for the branch managing operations and resources in the most cost efficient and technology effective manner. The role bearer would lead customer service and branch operations for a designated branch and be responsible for the daily branch upkeep. This role is the central custodian of all Rural Banking documents for the branch and provides operational support for Rural and semi urban Retail products. The role bearer is primarily accountable for ensuring seamless maintaining of customer life cycle, fulfilling customer requests and providing best-in class service. Responsibilities Roles & Responsibilities: Responsible for day-to-day operations and administration of the Branch, ensuring strict compliance with Bank's policies and procedures. Responsible for branch operations and service delivery to the customers of a designated branch in our rural network. Data entry of application forms, creation of customer IDs, accounts, etc. File / document checking including KYC checking, application forms and loan document verification. Handling cash and clearing transactions. Maintaining good audit rating for the branch. Work towards ensuring best in class service delivery at the branch for external and internal customers. Work as an effective business partner in strategizing and driving the implementation of critical operational and regulatory practices for the branch such as compliance, Lending operations and operational risk. Oversee quality initiatives across operations team for optimization of processes in order to improve TAT and upgradation of SLAs. Employ tools such as automation and digitization to increase process efficiency. Education Qualification Graduation: BA / BCom / BBA / BSc / BTech / BE or any other graduate Experience: 2 to 5 years of relevant experience in Banking or allied Business. Show more Show less

Posted 2 weeks ago

Apply

0 years

0 Lacs

India

On-site

Linkedin logo

Job Introduction: Key Responsibilities: (should be Ex servicemen) Patrolling and Observation: Conducting foot or vehicle patrols to monitor areas, identify potential threats, and prevent unauthorized access. Access Control: Verifying IDs, controlling building access, managing visitor logs, and ensuring compliance with security protocols. CCTV Monitoring: Observing security cameras to detect suspicious activity and respond to emergencies. Emergency Response: Responding to alarms, disturbances, and emergencies, ensuring the safety of personnel and property. Report Writing: Preparing reports on incidents, observations, and any security breaches. Enforcement of Security Procedures: Upholding security policies, enforcing rules, and taking necessary action to address security concerns. Handling Guest/Employee Complaints: Responding to guest complaints or incidents involving security calmly and professionally. Suspicious Activity: Reporting any suspicious persons or activities immediately to the Security Supervisor or Management. Qualifications: Military Experience: Preferred or required, with specific experience in security or related roles. Security Training/Certifications: Desirable, especially for roles involving firearms or advanced security procedures. Physical Fitness: Often a requirement for physically demanding roles like patrolling and emergency response. Good Communication Skills: Essential for interacting with visitors, employees, and responding to emergencies. Ability to Follow Procedures: Strict adherence to security protocols and procedures is crucial. Job Responsibility: The Ideal Candidate: Show more Show less

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

Job Summary: We are looking for a proactive and detail-oriented Senior Executive – HR Operations to join our team. The ideal candidate will focus primarily on managing employee onboarding and exit processes while ensuring a smooth and professional experience. Strong communication and Excel skills are essential for success in this role. Key Responsibilities: Onboarding: Coordinate pre-joining formalities: document collection, background verification, and induction scheduling Create and maintain employee records Ensure a seamless Day 1 experience Facilitate new hire orientation and onboarding sessions Ensure timely creation of email IDs, ID cards, and system access HR Operations & Reporting: Maintain accurate employee data and trackers Prepare regular HR reports and dashboards using Excel (e.g., headcount, joining/exits) Assist in audits and compliance-related documentation Exit Management: Coordinate exit formalities including notice period tracking, clearance forms, and asset recovery Schedule and conduct exit interviews; capture feedback and escalate issues as needed Maintain exit data and generate periodic reports Key Skills & Qualifications: Bachelor’s degree in HR, Business Administration, or related field 1–3 years of experience in HR operations, preferably in onboarding/exit processes Strong communication and interpersonal skills Excellent proficiency in MS Excel (VLOOKUP, pivot tables, charts, basic formulas) Ability to multitask, prioritize, and maintain confidentiality Show more Show less

Posted 2 weeks ago

Apply

0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Linkedin logo

We’re looking for a hands-on, self-directed Senior DevOps Engineer to join our fast-paced startup. You’ll be the first line of defense for production issues, architect robust observability systems, and improve deployment and testing practices. If you thrive in startup environments, enjoy taking ownership, and are comfortable in modern JS/TS stacks, we’d love to meet you. Top Outcomes – First 3 Months Implement a reliable observability stack: Leverage Grafana, CloudWatch, and OpenTelemetry within our Node.js and TypeScript codebase. Be on top of alerts and issues: Monitor, triage, fix or escalate production issues with traceability and follow-up. Reduce system noise: Begin reducing the frequency and volume of unexpected errors. Top Outcomes – First 12 Months Improve test coverage: Ensure better code quality and proactively catch regressions. Own DevOps workflows: Deploy, debug, and maintain infrastructure health autonomously. Become a core team member: Handle incidents independently and support the evolution of our infra/dev culture. Key Performance Indicators (KPIs) Leading Indicators: Number of alerts and incidents triaged Trace IDs investigated and logged Bugs found early and resolved Tickets opened/closed efficiently Reduced volume of unhandled or duplicate errors Lagging Indicators: Production uptime and stability % fixes resolved without handoff Number of tests added Reduction in recurring or duplicate issues Core Responsibilities Observability & Alerting Maintain and enhance Grafana dashboards Integrate and manage CloudWatch alarms and OpenTelemetry traces Ensure traceability across all systems (CRM, APIs, webhooks, workflows) Issue Response & Triage Act as first responder for production issues during working hours Troubleshoot, escalate with full context, and coordinate incident response Infrastructure Maintenance Improve deployment workflows and monitor resource usage Maintain the health of critical subsystems (queues, sync jobs, memory/cpu) Testing & QA Add and improve test coverage once baseline reliability is achieved Build confidence in deployments through automated testing and regression checks Candidate Profile Strong experience with Node.js, TypeScript, and React Deep knowledge of AWS, Grafana, OpenTelemetry, and CloudWatch Prior Startup Experience Preferred Clear, proactive communicator with a bias toward ownership Available 1:30 AM to 10:30 PM IST 5 days/week for on-call responsibilities Bonus: Experience reviewing pull requests and deploying code regularly Immediate Tasks Review and phase-implement an internal RFC for observability Refine and own Grafana dashboards; implement meaningful alerts Ensure consistent trace ID usage throughout the codebase Improve logging and tracing to increase debuggability Monitor and respond to production errors daily Investigate, fix, or escalate recurring system issues Show more Show less

Posted 2 weeks ago

Apply

0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Linkedin logo

About The Role We are looking for a highly skilled and experienced Network Architect to join our team in Mumbai. In this full-time, on-site role, you will be responsible for architecting and overseeing the implementation of complex network infrastructures for enterprise environments. This includes designing secure and scalable networks, ensuring high availability, and aligning network strategy with organizational goals. The ideal candidate will bring a strong background in network engineering, architecture, security, and experience with data center and campus network design. Key Responsibilities Design and implement robust and scalable network architectures to support enterprise applications, cloud infrastructure, and hybrid IT environments. Lead end-to-end planning and deployment of data center or campus network infrastructure. Oversee the configuration and installation of routing, switching, wireless, and security equipment. Define and document High-Level Design (HLD) and Low-Level Design (LLD) for all network projects. Analyze and resolve network issues, ensuring high availability, performance, and security. Collaborate with cross-functional teams (IT, security, IoT, application teams) to support digital transformation initiatives. Conduct capacity planning, risk assessment, and network optimization activities. Lead or contribute to RFP/RFI preparation, technical proposals, and vendor evaluation. Review network architecture standards and make recommendations for improvements. Evaluate emerging technologies and tools to enhance network performance and resiliency. Maintain accurate documentation and provide training/support to network operations teams. Technical Skills And Requirements Must-Have Technical Skills : Network Design & Architecture for enterprise, data center, and campus environments. Deep understanding of network protocols : TCP/IP, BGP, OSPF, EIGRP, MPLS, STP, VLANs, VPNs. Hands-on experience in routing, switching, and wireless technologies (Cisco, Aruba, Juniper, etc.). Network Security: Firewalls, NAC, IPS/IDS, segmentation, and Zero Trust principles. Experience with wireless infrastructure planning and deployment (including security configurations). HLD/LLD documentation and technical presentation preparation. Exposure to IT and IoT network integration projects. Experience with RFP/RFI processes and responding to large enterprise tenders. Good To Have Knowledge of firewalls (e.g., Palo Alto, Cisco ASA), load balancers (e.g., F5, Citrix), WAFs, and network monitoring tools (e.g., SolarWinds, Nagios, PRTG). Familiarity with SD-WAN, VPN solutions, and cloud network architecture (AWS, Azure, GCP). Experience in network automation using Ansible, Python, or similar tools. Awareness of compliance standards (ISO, NIST, PCI-DSS, (Preferred) : Cisco Certifications : CCNA, CCNP, or ideally CCIE. Other industry-recognized certifications : CompTIA Network+, Juniper, Aruba, or Fortinet NSE. Soft Skills Strong analytical and problem-solving abilities. Excellent verbal and written communication skills. Ability to work independently and collaboratively with cross-functional teams. Detail-oriented with strong documentation and presentation skills. Proven leadership in managing network architecture projects and vendor coordination. (ref:hirist.tech) Show more Show less

Posted 2 weeks ago

Apply

5.0 - 6.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

We are seeking a skilled and experienced Senior Analyst (Network Support) with strong expertise in managing and configuring Check Point firewalls, Fortinet firewalls, and Cisco networking solutions. The ideal candidate will play a key role in designing, implementing, and maintaining secure and reliable network infrastructure for our organization. Requirements: Configure, manage, and troubleshoot Checkpoint Firewall and security policies Implement and maintain network security solutions including firewalls, VPNs, IDS/IPS, and endpoint security Perform regular security assessments and ensure compliance with best practices Monitor network performance, identify vulnerabilities, and deploy necessary security patches or updates Provide technical support and incident response for security-related issues Collaborate with IT and security teams to enhance network security posture Document network security configurations, policies, and procedures Stay updated with emerging security threats and industry trends Experience: 5 to 6 years of experience in network engineering Proven expertise in configuring and managing Check Point and Fortinet firewalls Hands-on experience with Cisco networking (routers, switches, and firewalls) Technical Skills: Proficiency in network protocols and technologies (e.g. TCP/IP, MPLS, VPN) Knowledge of routing and switching protocols (e.g. OSPF, BGP, EIGRP) Familiarity with network monitoring tools and techniques Understanding of SD-WAN and cloud networking (AWS, Azure, or GCP) Certifications (Good to have): Check Point Certified Security Expert (CCSE) or equivalent Fortinet Network Security Expert (NSE 4 or higher) Cisco Certified Network Professional (CCNP) or higher Education (Required): Bachelor's degree in computer science, Information Technology, or a related field. Employment Type: Full-Time Work Experience (Required): 5 to 6 years Show more Show less

Posted 2 weeks ago

Apply

3.0 - 31.0 years

0 - 0 Lacs

Nehru Place, New Delhi

Remote

Apna logo

Network Security Engineer – Job Description Overview: A Network Security Engineer is responsible for designing, implementing, and maintaining secure network systems to protect an organization’s data, systems, and infrastructure from internal and external cyber threats. This role involves proactive monitoring, risk assessment, incident response, and continual security improvement. ⸻ Key Responsibilities: • Design and implement secure network architectures, including firewalls, VPNs, intrusion detection/prevention systems (IDS/IPS), and endpoint protection. • Monitor network traffic for suspicious behavior, investigate anomalies, and respond to security incidents. • Conduct regular vulnerability assessments, penetration testing, and risk analysis. • Maintain and enforce network security policies, protocols, and procedures. • Configure, manage, and troubleshoot network security tools and appliances (e.g., firewalls, proxies, SIEM, NAC). • Ensure compliance with relevant security standards and regulations (e.g., ISO 27001, NIST, GDPR). • Collaborate with IT and DevOps teams to integrate security into network and system operations. • Stay up to date with the latest cybersecurity threats, technologies, and best practices. Required Skills & Qualifications: • Bachelor’s degree in Computer Science, Information Security, or a related field. • Proven experience in network administration and security engineering. • Strong knowledge of TCP/IP, DNS, routing, switching, and common networking protocols. • Expertise with firewalls (e.g., Palo Alto, Fortinet, Cisco ASA), IDS/IPS, SIEM solutions, and VPN technologies. • Familiarity with scripting and automation (e.g., Python, Bash, PowerShell) for security operations. • Certifications such as CISSP, CEH, CCNP Security, or CompTIA Security+ are highly desirable. ⸻ Soft Skills: • Strong analytical and problem-solving skills. • Excellent communication and documentation abilities. • Ability to work independently and as part of a security or infrastructure team. • Proactive mindset with attention to detail and a strong sense of responsibility. ⸻ Let me know if you’d like to customize this for a junior, mid-level, or senior role, or tailor it for specific industries (e.g., finance, healthcare, government).

Posted 2 weeks ago

Apply

10.0 years

0 Lacs

Manesar, Haryana, India

On-site

Linkedin logo

🔐 Hiring Now: Senior SOC Analyst (SIEM | Threat Hunting | Incident Response) 📍 Location: Manesar, Haryana (Onsite | Government Sector Client) 📅 Join by: Immediate to Max 1 Month 🏢 Company: VVNT SEQUOR LLP, Noida 🛡️ About the Role VVNT SEQUOR is urgently hiring a Senior SOC Analyst with 8 –10 years of hands-on experience in SIEM, threat hunting, incident response , and L3/L4 security operations . This is a critical individual contributor role supporting a Government sector client at Manesar, where your cybersecurity expertise will help defend against real-world threats in a high-stakes environment. You’ll work with leading SIEM/EDR/SOAR platforms, conduct forensic investigations, and take the lead on proactive threat detection, containment, and post-incident analysis. 🧰 Key Responsibilities 🔍 Threat Monitoring & SIEM Operations Lead 24x7 SOC operations, monitoring alerts via ArcSight, Splunk, ELK Create and optimize correlation rules , use cases, and detection dashboards Leverage MITRE ATT&CK framework and threat intel feeds for advanced threat hunting 🚨 Incident Response & Forensics Coordinate incident lifecycle management and forensic investigations using CHFI techniques Analyze logs, memory dumps, and endpoint telemetry (EDRs like CrowdStrike, SentinelOne ) Conduct Root Cause Analysis (RCA) and post-incident reviews 🛡️ Vulnerability & Infrastructure Security Perform VAPT using Nessus, Qualys, OpenVAS, Metasploit, Burp Suite Manage security appliances – Firewalls (Palo Alto, FortiGate), WAF, IDS/IPS, Anti-DDoS Support compliance activities for ISO 27001, NIST CSF 🧠 Automation & Knowledge Sharing Integrate SOAR platforms and automate response playbooks (Python, PowerShell scripting) Lead security awareness programs (e.g., KnowBe4) and mentor junior SOC analysts 🧩 Who We’re Looking For 8–10 years in SOC & Security Operations with L3/L4 experience Deep working knowledge of SIEM, EDR, SOAR, forensic tools, threat modeling Strong skills in incident detection, investigation, containment, and RCA documentation Ability to handle escalations independently , acting as a technical leader on shift 🏆 Bonus Skills (Nice to Have) Certifications: CEH, CHFI, GCFA, GCIA, Security+, Splunk Certified Analyst Experience with Tripwire SCM, AWS GuardDuty, Azure Sentinel, TIPs Exposure to OT/ICS security , Red/Blue teaming, Purple teaming drills 📚 Tech Stack & Keywords (for AI & Job Portal Optimization) SOC Analyst | Threat Hunting | Incident Response | SIEM ArcSight Splunk | CHFI | CrowdStrike SentinelOne | SOAR | EDR | MITRE ATT&CK | L3/L4 Security Support | VAPT | Nessus Qualys | Firewall FortiGate PaloAlto | Burp Suite | RCA | ISO 27001 | NIST CSF | Python PowerShell Scripting | Government Sector Cybersecurity 🎯 Why Join VVNT SEQUOR? ✅ Lead mission-critical SOC operations for a Government Sector client ✅ Exposure to real-world threats and next-gen cyber tools ✅ Subsidized Cab + Lunch at client site ✅ Work in a fast-paced, hands-on, innovation-driven environment 📬 Apply Now 📩 Email: chaitali@vvntsequor.in parveen.arora@vvntsequor.in 📱 WhatsApp: +91-9891810196 +91-8802801739 📌 Please include : Updated Resume Last Drawn Salary Expected CTC Notice Period (Only Immediate or ≤1 Month) 📌 #SeniorSOCAnalyst #CybersecurityJobs #SIEM #ThreatHunting #IncidentResponse #L3L4Support #GovernmentCybersecurity #EDR #SplunkJobs #ArcSight #HiringNow #SecurityOperations Show more Show less

Posted 2 weeks ago

Apply

Exploring ids Jobs in India

The ids job market in India is rapidly growing with the increasing demand for professionals who can design, implement, and manage information security systems. With the rise in cyber threats and data breaches, companies across various industries are actively hiring ids professionals to secure their networks and safeguard their sensitive information.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Mumbai
  5. Delhi

These cities are known for their thriving tech industries and offer abundant opportunities for ids professionals.

Average Salary Range

The average salary range for ids professionals in India varies based on experience and expertise. Entry-level positions can expect to earn around INR 4-6 lakhs per annum, while experienced professionals with advanced skills can earn upwards of INR 15 lakhs per annum.

Career Path

A typical career path in ids may include roles such as: - Junior Security Analyst - Security Engineer - Senior Security Consultant - Chief Information Security Officer (CISO)

With continuous learning and upskilling, ids professionals can progress to higher levels of responsibility and leadership within the field.

Related Skills

In addition to ids expertise, professionals in this field are often expected to have skills in: - Network security - Vulnerability assessment - Incident response - Penetration testing - Security compliance

Interview Questions

  • What is IDS and how does it differ from IPS? (basic)
  • Describe a recent cyber attack you have encountered and how you responded to it. (medium)
  • Can you explain the difference between symmetric and asymmetric encryption? (medium)
  • How do you stay updated on the latest trends and technologies in information security? (basic)
  • What is the importance of threat intelligence in IDS? (advanced)
  • Can you walk us through your experience with setting up and configuring IDS systems? (medium)
  • Explain the concept of zero-day vulnerability and how IDS systems can detect such threats. (advanced)
  • How do you handle false positives in IDS alerts? (medium)
  • Describe a time when you successfully prevented a data breach in your organization. (medium)
  • What is the role of machine learning in IDS? (advanced)
  • How would you prioritize security vulnerabilities in a network? (medium)
  • Can you discuss a challenging IDS project you have worked on and how you overcame obstacles? (medium)
  • What are the common types of IDS evasion techniques used by attackers? (advanced)
  • How do you ensure compliance with data protection regulations in your IDS work? (medium)
  • Explain the concept of signature-based vs. anomaly-based IDS detection. (medium)
  • How do you handle incidents of insider threats in an organization? (medium)
  • What are the key components of a comprehensive IDS strategy? (medium)
  • Describe your experience with conducting security audits and assessments. (medium)
  • How do you collaborate with other IT teams to enhance overall security posture? (medium)
  • Can you discuss a time when you had to make a critical decision under pressure in an IDS incident? (medium)
  • How do you approach continuous monitoring and improvement of IDS systems? (medium)
  • What role does encryption play in IDS operations? (medium)
  • How do you ensure IDS systems are aligned with business goals and objectives? (medium)
  • Can you provide an example of a successful IDS implementation you have led? (medium)
  • How do you communicate security risks and findings to non-technical stakeholders? (medium)

Closing Remark

As you explore ids jobs in India, remember to continuously enhance your skills, stay updated on industry trends, and prepare thoroughly for interviews to showcase your expertise confidently. Good luck on your job search!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies