Jobs
Interviews

61 Incident Handling Jobs - Page 2

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 7.0 years

8 - 10 Lacs

Bengaluru

Hybrid

Greetings from Synamedia!!!! Experience Required: 5+ years in IT support roles Familiarity with ticketing systems, email, phone, and chat-based support Exposure to multinational environments Support Responsibilities: Second-level IT support for internal users globally Troubleshooting issues on: Windows & Mac laptops/desktops Servers, printers, and video conferencing equipment Hardware diagnostics Support for Microsoft Office 365 24/7 shift model (must be open to shift-based work) Mandatory Tech Skills: Azure Active Directory JAMF Intune Key Responsibilities Technical Support Installation & Troubleshooting: Hardware, software, and network issues Escalation Management: Ensure ticket documentation and resolution System Maintenance: Updates, patching, performance optimization Incident & Knowledge Management Incident Handling: Documenting, resolving, and collaborating with teams Knowledge Sharing: Contributing to internal documentation and peer training Communication & Collaboration Maintain clear communication with end-users Work closely with cross-functional IT teams Specialized Duties Network support Application-specific support Scripting and task automation Basic system administration Security best practices Required Technical Skills Personal Attributes Strong customer-first mindset Excellent communication and listening skills Receptive to critical feedback

Posted 3 weeks ago

Apply

0.0 - 3.0 years

2 - 4 Lacs

Pune

Work from Office

Job Description: Oversees site EHS, legal compliance, safety plans, audits, incident management, PPE, training, mock drills, documentation, reporting, supports EHS initiatives, and collaborates with corporate EHS for training, audits & advice. Provident fund Health insurance

Posted 3 weeks ago

Apply

1.0 - 6.0 years

0 - 3 Lacs

Thane

Work from Office

We have excellent opening for the position of Incident Coordinator (Thane) Qualification : Any graduate Experience: 2 to 6 Yrs Job Location: Mumbai (Thane) JD as follows Receiving and logging incidents. Categorizing and prioritizing incidents. Facilitating communication between different teams. Monitoring the progress of incident resolution. Verifying the resolution of incidents with end-users. Ensuring incidents are closed properly. Creating and maintaining knowledge articles based on incident resolution. Conducting regular reviews of incident management processes. Assisting in the development of incident response plans. Ensuring compliance with Service Level Agreements (SLAs). About Company Team Computers is a bridge between business needs and the world of IT solutions. We see ourselves as trusted solutions partner.We understand your needs, Identify-Integrate-Support High quality, affordable IT Solutions in Hardware, Software, Services, Mobility, Analytics and Cloud with Speed, Flexibility and an attitude of Sewa. Founded in 1987 by Ranjan Chopra , an alumnus of IIT-Kanpur, it has emerged as a leading IT Infrastructure and Information Solution Provider in the last three decades. With a turnover of 3000+ Cr , having 25+ offices across India and 4,000+ members, we have served 2500+ customers over a span of 36+ years. If you are interested in this opening please send your updated resume with following details on rahul.bhole@teamcomputers.com Experience Current CTC Expected CTC Notice Period Thanks & Regard, Rahul Bhole

Posted 3 weeks ago

Apply

3.0 - 6.0 years

4 - 5 Lacs

Bangalore Rural, Bengaluru

Work from Office

Role & responsibilities : Process Must be honest and hard working with a high degree of integrity. Must be of good character and display loyalty towards Linfox. Must possess good communication skills. Must be able to read & write in both English and Local language. Must be in good health and possess a basic level of physical fitness. Must be capable of performing in a disciplined environment (able to follow and comply with written or verbal lawful instructions). Must be capable of working in a team environment. Must be able to propagate and ensure the Linfox Safety Standards are being always complied to. Must have a clear understanding of anti -bribery legislation and be able to deal confidently with enforcement bodies. Capable of motivating personnel under your control. Capable of providing confidence in others that they have the ability to provide good, high-level of Leadership and direction. Must be able to perform duties to a high standard when under pressure or in stressful situations. Must possess sound judgment and good decision-making skills. Must be capable of establishing and maintaining good relationships with Local Police, Government Officials and Customers. Must be capable of providing verbal briefings to various interested parties. Able to record lagging indicators/ root cause for accidents & incidents involving the following against set targets, and corrective actions taken: Third parties. Vehicles and fleet Operators. Carries out site Security reviews / security audits. Carry our detailed audit process on subcontract transport companys giving accurate findings to senior management. Establishes regular communication with Site Manager / National Security Operations & Compliance Manager to share best practices. Meets regularly with unit Operations team to track and monitor Compliance. Maintains regular dialogue with Unit Management to communicate the Security agenda and goals. Make sure that all Incidents, accidents & near miss are reported & investigated. To transform Vision Zero” to reality”. this includes Security Inductions for new site staff that covers the above points. Customer Works In partnership with Unit Managers, ensure that all Security & Safety processes are in place. Conducts detailed investigations in line with Linfox Standards. People Works closely with Site Operations Manager / National Security Operations & Compliance Manager to identify and mitigate Risks. Influences and ensures that Unit Operation processes comply with LINFOX Group and related local Legal requirements, as well as Industry best practices. Ensures unit line personnel understand these Standards and gain commitment from staff to these Standards. Work closely with Site Manager to develop plans, programmes, and performance measures. Meets regularly with key stakeholders to track progress and identify areas for improvement; ensures local practices are in line with LINFOX Group practices and local legislation. Regularly meets with Unit Operations Management/ Supervisory team to track Safety Kannad Language is mandatory

Posted 3 weeks ago

Apply

5.0 - 10.0 years

7 - 17 Lacs

Bengaluru

Work from Office

Interested candidates can apply on the below job link: https://kyndryl.wd5.myworkdayjobs.com/KyndrylProfessionalCareers/job/Bangalore-Karnataka-India/Service-Coordinator_R-31049-1 Can send in applications to apeksha.patil@kyndryl.com Service Coordinator Job Description Summary Coordinates, diagnoses and troubleshoots incoming employee calls to provide support services to employees with technical problems and information technology issues involving desktop, laptop or network services from local personnel or from employees using network remote access. Provides timely resolution of problems or escalation on behalf of customer to appropriate technical personnel. Provides case status updates to management and end-users. Supports and maintains effective relationships with users. Develops, documents, and implements standard operating procedures and customer service guidelines relating to IT support. Job Description Join Kyndryl as a Service Coordinator and take charge of a dynamic role that puts you at the forefront of delivering exceptional IT services to our customers. As a Service Coordinator, you'll be responsible for ensuring timely and effective resolution of customer issues, coordinating and managing service requests, and maintaining constant communication with customers throughout the service process. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you wont find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. At Kyndryl, you'll have the opportunity to work with other IT teams, end-users, and stakeholders across the organization to ensure that service delivery is aligned with the needs and expectations of the business. As a part of our team, you'll be instrumental in documenting and updating service management procedures and workflows, monitoring and reporting on service level agreements (SLAs), and ensuring that our ITSM systems are maintained and updated to support efficient and effective service delivery. The position is with the Infrastructure Services business of "Kyndryl". This business unit supports client IT Infrastructure (Servers, Networks, Info Sec, Service Management etc.) Responsibilities include Accountable for effective management of Service Support (Incident, Problem, Change Management) processes and compliance of the processes in BAU. Functional responsibility of the Service Support team. Accountability for audibility of the documented Incident, problem and change process. Deploying the documented process, including education of process users during deployment. Ensuring improvements to the process through required service improvements plans. Assisting in resolution of process exceptions that arise during normal day-to-day process activities as requested. Monitoring regular process measurements. Address and analyse negative trends that impact effectiveness or efficiency of the IPC processes. Ensuring appropriate issue records are opened to address negative trends that are associated with specific operational areas or functions. Ensuring ongoing education is provided to process users when requested or when circumstances indicate that education would improve process execution. Performing post-resolution incident reviews and evaluating the effectiveness of incident resolution. Orchestrate Incident Recovery by driving Incident Bridge. Consolidating an integrated resolution plan when multiple competencies/Business Units are engaged. Acting as coordinator for multiService Provider for Severity 1 Incidents/Major Incident Determining the impact and urgency of an incident and assigns priority. Creates a resolution plan outlining actions to resolve and recover incident. Responsibilities to Resolve, Recover and Close. Determines most appropriate approach to be used in resolving and recovering incident. Invokes Problem Management process where further investigation into root cause is required. Communicates status to client of High priority incident throughout the Incident Lifecyle, as per communication plan. You'll be responsible for managing Service Support processes , including Incident, Problem, and Change Management, and ensuring compliance with these processes. You'll also be responsible for driving process improvements through service improvement plans, monitoring regular process measurements, addressing negative trends that impact effectiveness or efficiency of the IPC processes, and ensuring that ongoing education is provided to process users when requested or when circumstances indicate that education would improve process execution. As a Service Coordinator at Kyndryl, you'll perform post-resolution incident reviews and evaluate the effectiveness of incident resolution. You'll also be the orchestrator for incident recovery by driving the incident bridge and consolidating an integrated resolution plan when multiple competencies or business units are engaged. With your expertise in IT services, you'll invoke problem management processes where further investigation into root cause is required and communicate the status of high-priority incidents to customers throughout the incident lifecycle, as per the communication plan. If you're a passionate problem-solver with a drive to deliver the best possible IT services, then this is the perfect opportunity for you. Come join us at Kyndryl and let's work together to create innovative and progressive technical solutions for our customers and our communities. Job Qualifications You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Technical and Professional Expertise At least 7-10 years of experience in Incident, Problem & Change Management. Experience in stakeholder management and vendor coordination is required. Graduate degree or equivalent qualification in Computer Science, Electronics & telecommunication. Proficient in using MS Office tools. ITIL v3/4 (Inter/Expert) . Good understanding of infrastructure technologies. Preferred Technical and Professional Experience ITIL certified Good understanding and hands-on on Service Management (Incident ,Problem and Change).

Posted 4 weeks ago

Apply

8.0 - 11.0 years

35 - 37 Lacs

Kolkata, Ahmedabad, Bengaluru

Work from Office

Dear Candidate, Seeking a Security Automation Engineer to automate detection and remediation of threats. Key Responsibilities: Build SOAR workflows and automated playbooks. Monitor logs and alerts using SIEM tools. Respond to security incidents and conduct root cause analysis. Required Skills & Qualifications: Experience with tools like Splunk, XSOAR, Sentinel. Scripting in Python or Bash. Familiar with SOC and threat intel operations. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Reddy Delivery Manager Integra Technologies

Posted 4 weeks ago

Apply

3.0 - 6.0 years

8 - 13 Lacs

Hyderabad, Chennai, Bengaluru

Work from Office

EDR Analyst -Endpoint Security (L1 or L2 Support) for Reputed MNC Position: EDR Analyst -Endpoint Security (L1 OR L2 Support) Position Type: Full Time- Permanent Experience: 3 to 5 yrs Job Locations: South India Mode: Office Notice Period: Immediate to 15 days Note: We expect your cooperation to attend online/F2F interviews (if any) whenever the interviews scheduled. Must-Have Skills: Minimum 3 years of experience in EDR (Endpoint security) Minimum experience of 3 years as L1 level or L2 Level Only need L1 level or L2 Level experienced candidates who are expert on EDR (EDR, incident response) and Trend Micro (Antivirus) Active CEH certificate Key Performance Indicators: Assess endpoint security infrastructure Deploy and configure EDR agents Monitor endpoints for suspicious activities Generate real-time alerts for potential security incidents Ensure compatibility with other security systems

Posted 1 month ago

Apply

3.0 - 6.0 years

8 - 13 Lacs

Ahmedabad, Gurugram, Delhi / NCR

Work from Office

EDR Analyst -Endpoint Security (L1 or L2 Support) for Reputed MNC Position: EDR Analyst -Endpoint Security (L1 OR L2 Support) Position Type: Full Time- Permanent Experience: 3 to 5 yrs Job Location: Gujrath, Delhi, NCR Mode: Office Notice Period: Immediate to 15 days Note: We expect your cooperation to attend online/F2F interviews (if any) whenever the interviews scheduled. Must-Have Skills: Minimum 3 years of experience in EDR (Endpoint security) Minimum experience of 3 years as L1 level or L2 Level Only need L1 level or L2 Level experienced candidates who are expert on EDR (EDR, incident response) and Trend Micro (Antivirus) Active CEH certificate Key Performance Indicators: Assess endpoint security infrastructure Deploy and configure EDR agents Monitor endpoints for suspicious activities Generate real-time alerts for potential security incidents Ensure compatibility with other security systems

Posted 1 month ago

Apply

3.0 - 6.0 years

8 - 13 Lacs

Bhopal, Pune, Mumbai (All Areas)

Work from Office

EDR Analyst -Endpoint Security (L1 or L2 Support) for Reputed MNC Position: EDR Analyst -Endpoint Security (L1 OR L2 Support) Position Type: Full Time- Permanent Experience: 3 to 5 yrs Job Location: Mumbai,Bhopal, Pune Mode: Office Notice Period: Immediate to 15 days Note: We expect your cooperation to attend online/F2F interviews (if any) whenever the interviews scheduled. Must-Have Skills: Minimum 3 years of experience in EDR (Endpoint security) Minimum experience of 3 years as L1 level or L2 Level Only need L1 level or L2 Level experienced candidates who are expert on EDR (EDR, incident response) and Trend Micro (Antivirus) Active CEH certificate Key Performance Indicators: Assess endpoint security infrastructure Deploy and configure EDR agents Monitor endpoints for suspicious activities Generate real-time alerts for potential security incidents Ensure compatibility with other security systems

Posted 1 month ago

Apply

1.0 - 5.0 years

2 - 6 Lacs

Bengaluru

Work from Office

Location: Bangalore Department: InfoSec About Zybisys: At ZyBiSys , our success is driven by innovation and technical excellence. We deliver top-tier IT solutions and services, ensuring seamless connectivity and efficient infrastructure management for our clients. Additionally, we specialize in managing cybersecurity , information security , and compliance to safeguard our customers' digital environments. As we continue to grow, we are seeking skilled professionals to join our SOC Team . If you are passionate about information technology and eager to make a difference, we invite you to be part of our journey! Role Overview: A SOC-Analyst is the first line of defence in a Security Operations Center, responsible for monitoring, detecting, and responding to security incidents in real-time. Key Responsibilities: Monitoring & Alerting Use SIEM and EDR tools to continuously monitor system alerts and network traffic. Identify suspicious activities and indicators of compromise (IoCs). Incident Handling Perform initial triage of alerts and determine severity levels. Escalate incidents with clear documentation and context. Threat Investigation Investigate alerts for root causes and determine actionable steps. Analyze phishing attempts, flagged URLs, and suspicious file attachments. Documentation & Reporting Maintain detailed incident logs and generate regular security activity reports. Assist in creating playbooks and refining response workflows. Collaboration Work with IT teams to remediate vulnerabilities and support compliance audits. Participate in war-room discussions during critical incidents. Analytical Thinking Root cause analysis for distinguishing false positives from genuine threats. Ability to correlate data from diverse sources to identify complex attack vectors. Threat Intelligence Integration Leverage threat intelligence feeds to compare alerts with known signatures. Identify emerging threats and communicate insights to senior analysts. Technical Expertise Hands-on experience with SIEM platforms (e.g., Splunk, QRadar) and EDR tools (e.g., CrowdStrike, Carbon Black). Basic scripting knowledge for automating repetitive SOC tasks. Adaptability & Learning Stay updated on the latest cyber threats, tools, and techniques. Contribute to continuous improvement of SOC processes and detection capabilities. Interpersonal Skills Strong communication skills for effective coordination with cross-functional teams. Mentorship of junior team members to foster team growth and resilience. Qualifications: Education: - Tech degree or equivalent (B. Tech/MCA/BCA/M.Tech)] Required Key Skills Key Tools & Hands-on Experience Technical Proficiency Familiarity with SIEM platforms (Splunk, Azure Sentinel) and EDR tools (Microsoft Defender, Sentinel One). Basic understanding of IDS/IPS, vulnerability scanning tools (Nessus, Qualys), and packet analysis tools (Wireshark). Firewalls and Network Security Solid understanding of TCP/IP, DNS, DHCP, ARP, HTTP/HTTPS, and other protocols. Knowledge of packet capture and analysis tools like Wireshark or tcpdump. Operating Systems Windows: Event logs, registry analysis, PowerShell basics. Linux/Unix: Command-line utilities, syslogs, and basic shell scripting.( Bash , Python, etc ) Active Directory (AD) Vulnerability Management Basic understanding of vulnerability scanning tools like Nessus, Qualys, or OpenVAS. Knowledge of collecting and analyzing evidence (e.g., memory dumps, disk images). Certification: - Mandatory: Certified Ethical Hacker (CEH) Preferred: CompTIA Security+, Certified SOC Analyst (CSA), or GSEC. Communication Skills: Strong communication and documentation skills, with the ability to work collaboratively with other teams. Problem-Solving Ability Strong analytical and troubleshooting skills to address complex security incidents effectively. Shift Flexibility:- Willingness to work in shifts, including weekends and off-hours if required. __________________________________________________________________________________ To Apply: Are you an experienced IT professional with a passion for tackling complex challenges and enhancing information security and cybersecurity? If you're driven to make a meaningful impact, we want to hear from you! Submit your resume and a cover letter showcasing your relevant experience and why you're the ideal candidate for the SOC-Analyst role at ZyBiSys . We look forward to welcoming you to our team!

Posted 1 month ago

Apply

1.0 - 3.0 years

1 - 5 Lacs

Bengaluru

Work from Office

Responsibilities and Duties : Responsible for the efficiency & effectiveness of Incident process within the Organization Classification and Prioritization of all incidents based on impact and urgency Engage resources to resolve the major incidents and thus avoid customer/business impact Provides immediate response and coordination aimed at minimizing the duration of service interruptions. Make decisions regarding real-time incident resolution activities and management escalation updates. Acts as a liaison between the business and technology teams for high severity incidents (priority 1, 2 and 3 spanning across the entire enterprise) and escalates as appropriate. Compiles the enterprise post-incident report (RCA) Support software engineering, technical operations, Information Technology, Information security, and customer support teams, and others who are responsible for assessing and triaging incident escalations Send communication updates for all incidents until incident resolution Manage communications to internal stakeholders, leadership Communication process is internal only Proactively using monitoring and alert applications to identify incidents Perform minor incident remediation actions based on runbooks and SOPs Perform minor change activities after hours based on runbooks and SOPs Work schedule model is shift work - Work in one of 2 night shifts Sunday Tuesday / Every other Wednesday 8pm 8am central If you feel your profile is matching to above JD please share details along with updated resume to below mail Jakkakamakshi@happiestminds.com Total Experience (L1/L2): Relevant Experience(L1/L2): Current CTC: Expected CTC: Notice: Qualification: Availability on Wednesday (2th July F2F) - Thanks, Kavya

Posted 1 month ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Pune

Work from Office

The ideal candidate must possess strong communication skills, with an ability to listen and comprehend information and share it with all the key stakeholders, highlighting opportunities for improvement and concerns, if any. He/she must be able to work collaboratively with teams to execute tasks within defined timeframes while maintaining high-quality standards and superior service levels. The ability to take proactive actions and willingness to take up responsibility beyond the assigned work area is a plus. Senior Analyst Roles and responsibilities: Act as gatekeeper for Incident Queues govern the queue flow Work with managers in streamlining & optimizing incidents handling - improve repeat instance rate & time for instance closure Work on different tools which will help to identify Customer experience monitoring Exposure to monitoring tools like Glassbox, Splunk, Dynatrace, Catchpoint etc. Monitoring traffic incoming-outgoing troubleshooting and reporting to stakeholders Conduct extensive quality check, pass feedback & maintain repository which team can refer while execution of task Interact with client stakeholders to understand the customer impact and severity of issue Create report on daily and weekly basis on alerts observed on different dashboard Lead documentation on new projects by getting first hand trained on different activities & pass refines / optimal knowledge to team Lead team on skill enhancement on monitoring, technical knowledge of environment & incident / service request handling Technical and Functional Skills: Bachelors Degree with 2 to 4 years of experience in Incident handling, forum / platform monitoring, incident / service request troubleshooting & reporting. Strong platform monitoring & troubleshooting knowledge is basic requirement. Application based server knowledge is must to handle troubleshooting Experience in synthetic monitoring (preferably e-commerce) & application based server troubleshooting Exposure to ITSM modules. ITIL certification will be an added advantage Strong proficiency in MS Office, especially MS Excel and PPT Good written and verbal communication - should be good to interact with stakeholders

Posted 1 month ago

Apply

3.0 - 7.0 years

10 - 20 Lacs

Bengaluru

Hybrid

Say hello to possibilities. Its not everyday that you consider starting a new career. We’re RingCentral, and we’re happy that someone as talented as you is considering this role. First, a little about us, we’re the global leader in cloud-based communications and collaboration software. We are fundamentally changing the nature of human interaction—giving people the freedom to connect powerfully and personally from anywhere, at any time, on any device. We’re a $2 billion company that’s growing at 30+% annually. Job Type: Full-Time Department: Security This is a great opportunity to work at a rapidly growing, market leading Unified Communications as-a-service company. RingCentral provides Voice-over-IP (VoIP), hosted PBX, voicemail, SMS, e-fax, and HD video meeting solutions for business. About this role: As a SOC Analyst at RingCentral, your primary responsibilities are to implement a comprehensive security monitoring, incident response and threat intelligence program for RingCentral’s global cloud service, corporate and development environments. You will also be collaboratively providing feedback to improve security operations processes, generating actionable analysis and threat intelligence from tools, logs, and other data sources, ensuring strong documentation is in place to support ongoing SOC activities, and reporting your observations to other Security, Operations and IT personnel. Successful Candidates will: Have proven skills in application security, security monitoring, incident response and intrusion analysis Have strong knowledge of the diverse methods and technologies used to attack web/mobile/desktop applications, SaaS infrastructure, and data Think critically, work well under pressure, and possess strong analytical, written, verbal, and interpersonal skills Demonstrated track record of quality processes in candidate’s work history Be strongly self-motivated with an aptitude for both individual and team-oriented work Have experience following and refining standard operating procedures and playbooks Responsibilities: Monitor security events, analyze and investigate alarms, and maintain day-to-day operational activities of a secure cloud environment Engage teams within and outside of RingCentral to mitigate and resolve cases Maintain relevant documentation and audit artifacts Identify and track suspicious system activity Identify trends and patterns, and present them to Security Engineers to enhance our processes and systems This role participates in on-call rotations Qualifications / Requirements: 3+ years in a security engineering, SRE, or SOC roles in a cloud services environment Experience with SIEM Experience investigating security incidents Basic knowledge AWS or GCP Experience with IDS, case management, and related tools and practices Experience with Linux, RedHat preferred Basic knowledge of broad security topics such as encryption, application security, malware, ransomware, etc. Knowledge of network, VoIP and web related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, HTTPS, SIP, RTP) Preferred Skills/Experience: Any combination of the following certifications: GCIA (GIAC Certified Intrusion Analyst) GCIH (GIAC Certified Incident Handler) GCFA (GIAC Certified Forensic Analyst) GNFA (GIAC Certified Network Forensic Analyst) GCFE (GIAC Forensic Examiner) GASF (GIAC Advanced Smartphone Forensics) GICA GCTI (GIAC Certified Cyber Threat Intelligence) GPEN (GIAC Certified Pentester) GWAPT (GIAC Certified Web Application Pentester) GPYC (GIAC Certified Python Coder) OSCP (Offensive Security Certified Pentester) Experience using Crowdstrike, Cloudflare, FirePower, Splunk, ELK, Imperva, Syslog, packet capture, and Windows Event Log tools and similar tools Knowledge of current hacking techniques, malicious code trends, botnets, exploits, malware, DDoS, and data breach events Strong knowledge of Microsoft Windows Experience automating security tasks, including scripting, programming and/or SecDevOps Experience working with global teams

Posted 1 month ago

Apply

5.0 - 8.0 years

6 - 16 Lacs

Hyderabad

Work from Office

LTIMindtree Hiring for Azure Sentinel L2/L3 SOC Analyst for Hyderabad Location- Notice period-immediate to 15 days. Exp-5 to 8 yrs. Location- Hyderabad Skill Combination: Minimum 6 yrs in security domain, and at least 3 yrs as L2/L3 if interested Share me these details along with CV-Richa.Srivastava@ltimindtree.com Total Experience- Current CTC- Expected CTC- Holding offers if any- Current Location- Preferred Location- Notice period- Skills- Date of Birth- PAN No- Passport size photo- Pan no- Availability for interview (YES/NO)- Job Description- Develop and maintain playbooks runbooks and incident response procedures Collaborate with threat intelligence teams to enrich alerts and improve detection capabilities Conduct post incident reviews and root cause analysis Mentor and train L1 and L2 SOC analysts Recommend and implement improvements to SOC tools processes and detection rules Stay current with emerging threats vulnerabilities and security technologies The expectations from the graders would be To evaluate the tasks that are being fed into the agent for their real world applicability To evaluate the agent output to come up with a ground truth and rate the agent output in a predefined rubric based on the inputs pr-ovided by us To have very deep SOC analyst experience and insights This also includes any other skills needed to evaluate the agent output The ability to scale to around min 2030 evaluations per day per grader based on the complexity of the task Core Technical Skills SIEM Tools eg Splunk QRadar Microsoft Sentinel Endpoint Detection and Response EDR eg CrowdStrike SentinelOne Firewall and IDSIPS eg Palo Alto Snort Suricata Log Analysis and Packet Capture Analysis eg Wireshark Threat Intelligence Platforms eg MISP Recorded Future Incident Response and Forensics Scripting Automation Python PowerShell Bash Operating Systems Windows Linux macOS Networking Fundamentals TCPIP DNS HTTP VPNs

Posted 1 month ago

Apply

2.0 - 5.0 years

3 - 7 Lacs

Bengaluru

Work from Office

Come join Deepwatch’s team of world-class cybersecurity professionals and the brightest minds in the industry. If you're ready to challenge yourself with work that matters, then this is the place for you. We're redefining cybersecurity as one of the fastest growing companies in the U.S. – and we have a blast doing it!. Who We Are. Deepwatch is the leader in managed security services, protecting organizations from ever-increasing cyber threats 24/7/365. Powered by Deepwatch’s cloud-based security operations platform, Deepwatch provides the industry’s fastest, most comprehensive detection and automated response to cyber threats together with tailored guidance from dedicated experts to mitigate risk and measurably improve security posture. Hundreds of organizations, from Fortune 100 to mid-sized enterprises, trust Deepwatch to protect their business.. Our core values drive everything we do at Deepwatch, including our approach to tackling tough cyber challenges. We seek out tenacious individuals who are passionate about solving complex problems and protecting our customers. At Deepwatch, every decision, process, and hire is made with a focus on improving our cybersecurity solutions and delivering an exceptional experience for our customers. By embracing our values, we create a culture of excellence that is dedicated to empowering our team members to explore their potential, expand their skill sets, and achieve their career aspirations, which is supported by our unique annual professional development benefit.. Deepwatch Recognition Includes. 2025, 2024, 2023, 2022 and 2021 Great Place to Work® Certified. 2024 Military Times Best for Vets Employers. 2024 US Department of Labor Hire Vets Gold Award. 2024 Forbes' America's Best Startup Employers. 2024 Cyber Defense Magazine, Global Infosec Awards. 2023 and 2022 Fortress Cybersecurity Award. 2023 $180M Series C investment from Springcoast Capital Partners, Splunk Ventures, and Vista Credit Partners of Vista Equity Partners. 2022 Cybersecurity Excellence Award for MDR. Position Summary. This role is 100% onsite in Bengaluru. The shift for this position is Monday Friday, 7:30AM 3:30 PM.. Deepwatch is looking for a highly motivated, self-driven, technical analyst dedicated to making a difference in global security by protecting organizations against the most advanced attackers in the world. The Deepwatch Squad and Security Operations Center offers opportunities to expand your skill set through a wide variety of experiences, detecting and responding to incidents as they occur in real-time for our customers.. The Deepwatch squad is a unique approach to how we support our customers and ultimately provide an experience not found anywhere else. You’ll be an integral part of supporting our customers by understanding their bespoke environment, needs and challenges. You will be playing a key role in supporting some of the top organizations in the world, and have the opportunity to develop your skills by working with the best responders in the industry, your team and your Squad.. The Analyst I is focused on providing descriptive analysis. They will answer questions such as the who, what, when, and where of events. Analysts are curious individuals who actively work to develop a better understanding of the environments they are assigned. Using cybersecurity best practices, you will monitor and secure complex customer environments utilizing industry leading technology such as Splunk, xSOAR, CrowdStrike and more.. In This Role, You’ll Get To. Support incident handling processes across multiple platforms and security technologies including Windows, Linux and macOS. Monitor a queue of security events generated by the Deepwatch platform SOAR, triage events based on their criticality, and escalate validated security events to customers. Document and manage incident cases in our case management system. Keep up-to-date with information security news, techniques, and trends. Identify and report any gaps in log collection or reporting as soon as possible to the customer and Deepwatch Engineering. Become proficient with Splunk, ServiceNow and other third-party threat intelligence tools as required. Perform security detection analysis and investigations using SIEM and SOAR technologies, leverage Deepwatch proprietary tooling and intelligence and maintain SLA’s. Act as the first line of defense during security events by triaging and investigating alerts within a customer’s environment. Produce high-quality written and verbal communications, recommendations, and findings to customer management in a timely manner. Continue to sharpen your skills and capabilities on the job, and through the Deepwatch development program. To be successful in this role, you’ll need to:. A basic understanding of cyber security principles, concepts and practice with a focus on SOC operations, alert triage and investigations. Know your way around SIEM platforms (Splunk preferred), how to perform queries and leverage various log sources to perform investigations. Articulate the process involved in pivoting to other log sources, cloud systems, or consoles to perform a comprehensive analysis from multiple data sources. Have a basic understanding of modern EDR, email security and cloud identity platforms. Review SIEM alerts and make a determination for what other sources or intelligence is needed to make a determination, relying on peers to help improve your skills and capabilities. A strong understanding of all basic ports and protocols. Familiarity with Windows, Mac, and Linux file path structure.. Familiarity with OSINT, TTPs and IOCs. Strong written and verbal communication skills with the ability to produce well-written reports and analysis that’s thorough, accurate and complete.. Provide the customer with a complete understanding of the investigation. CEH, CySA, GSEC, Sec+, or equivalent certification preferred. A college degree in Information Security or IT, related training, certifications or on-the-job experience. Life At Deepwatch. For employees, Deepwatch fosters a unique, flexible work environment designed with collaboration in mind. The company emphasizes personal and professional. growth, offering benefits such as professional development programs, comprehensive health coverage, and generous parental leave. Deepwatch is also committed to diversity, equity, inclusion, and belonging, aiming to empower underrepresented groups in tech by connecting them with meaningful opportunities, mentors, and sponsors.. In recognition of its supportive workplace culture, Deepwatch earned the Great Place To Work Certification/(TM) in 2025, underscoring its dedication to. creating a positive and inclusive work environment. Deepwatch is a global cybersecurity company with offices in San Francisco Bay Area, CA; Tampa, Florida;. and Bengaluru, India.. What We Offer. At Deepwatch, we are committed to supporting our employees with a comprehensive benefits package designed to enhance your well-being and financial security.. We Partner With Plum Benefits To Provide. ? Group Health Insurance – Comprehensive medical coverage for you and your dependents.. ? Group Accidental Insurance – Financial protection in case of accidental injuries.. ? Group Term Life Insurance – Security for your loved ones in unforeseen circumstances.. For additional details, refer to the benefits guide provided by Plum.. Payroll & Compensation. ? Pay Cycle: Salaries are processed monthly and paid on the last day of each month.. ? Pay Slips & Reimbursements: Delivered via email.. ? Payroll Processing: Managed by BCL Chartered Accountants through GreytHR, which provides tax and payment-related details.. Show more Show less

Posted 1 month ago

Apply

4.0 - 8.0 years

15 - 25 Lacs

Bengaluru

Hybrid

Warm Greetings from SP Staffing!! Role :SOC Analyst Experience Required :3 to 8 yrs Work Location :Bangalore Required Skills, Security operations SOC1, SOC2 , FFIEC , GDPR Interested candidates can send resumes to nandhini.spstaffing@gmail.com

Posted 1 month ago

Apply

12.0 - 15.0 years

55 - 60 Lacs

Ahmedabad, Chennai, Bengaluru

Work from Office

Dear Candidate, We are seeking a Security Operations Engineer to monitor, detect, investigate, and respond to security incidents and threats across systems and networks. Key Responsibilities: Monitor alerts and logs using SIEM tools (Splunk, QRadar, Sentinel). Analyze security incidents, conduct root cause analysis, and coordinate response. Support threat hunting and vulnerability assessments. Maintain and tune security tools (IDS/IPS, endpoint protection, firewalls). Document incident reports and provide remediation recommendations. Required Skills & Qualifications: Experience in a Security Operations Center (SOC) or similar role. Strong knowledge of cybersecurity concepts and incident response. Familiarity with EDR tools (CrowdStrike, Carbon Black) and log analysis. Scripting and automation skills for detection and response tasks. Security certifications such as CEH, CompTIA Security+, or GCIA are beneficial. Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Srinivasa Reddy Kandi Delivery Manager Integra Technologies

Posted 1 month ago

Apply

0.0 - 2.0 years

2 - 4 Lacs

Pune

Work from Office

Job Description: Oversees site EHS, legal compliance, safety plans, audits, incident management, PPE, training, mock drills, documentation, reporting, supports EHS initiatives, and collaborates with corporate EHS for training, audits & advice.

Posted 1 month ago

Apply

7.0 - 12.0 years

25 - 35 Lacs

Noida, Chennai, Bengaluru

Work from Office

Roles and Responsibilities Conduct threat hunting activities to identify potential security threats and vulnerabilities. Analyze malware samples using various tools such as QRadar, Splunk, and ArcSight. Perform incident response duties including handling incidents, conducting root cause analysis, and implementing remediation measures. Monitor security event logs from multiple sources to detect anomalies and potential security breaches. Collaborate with other teams to develop threat intelligence reports and improve overall security posture. Desired Candidate Profile 7-12 years of experience in Security Operations Center (SOC) or related field. Strong understanding of incident response, threat analysis, threat intelligence gathering, log analysis, and security monitoring concepts. Proficiency in tools like QRadar, Splunk, ArcSight for malware analysis and incident response tasks.

Posted 1 month ago

Apply

12.0 - 15.0 years

55 - 60 Lacs

Ahmedabad, Chennai, Bengaluru

Work from Office

Dear Candidate, We are seeking a Cybersecurity Analyst to detect, investigate, and prevent security threats across digital assets and systems. Key Responsibilities: Monitor and analyze security alerts, logs, and events. Perform threat intelligence, malware analysis, and incident response. Conduct vulnerability assessments and patch management. Support compliance and audit activities (ISO, NIST, GDPR). Educate staff on cybersecurity best practices and awareness. Required Skills & Qualifications: Experience with SIEM tools (Splunk, AlienVault, QRadar). Knowledge of firewalls, IDS/IPS, endpoint protection, and antivirus. Familiarity with scripting for automation and reporting. Strong analytical, investigative, and communication skills. Security certifications preferred (e.g., CompTIA Security+, SOC Analyst, CISSP). Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Srinivasa Reddy Kandi Delivery Manager Integra Technologies

Posted 1 month ago

Apply

3.0 - 8.0 years

3 - 8 Lacs

Pune

Work from Office

Only candidates currently in Pune or Open to relocate to Pune, please apply: Job Description: We are seeking a skilled and detail-oriented Senior System Administrator to oversee, manage, and support on-premise servers and secure network infrastructure across multiple hospital sites and a central data centre. This is a critical, hands-on role focused on maintaining server uptime, ensuring secure and stable connectivity, managing reliable data backups, and supporting local IT teams to ensure seamless operations in a mission-critical healthcare environment. The ideal candidate will have strong Linux (Ubuntu) server administration skills, be highly responsive to system issues, and have a strong understanding of secure networking, backup integrity, and infrastructure compliance. This role requires technical depth, a proactive mindset, and a commitment to maintaining high system availability and security in environments where downtime is not an option. Key Responsibilities: 1) You will manage and maintain on-premise servers located at hospitals and central site 2) You will ensure secure connectivity between all sites using VPN and APN 3) You will monitor server performance, uptime, and resource utilization 4) You will perform daily backup operations and ensure data is stored reliably on NAS 5) You will validate backup integrity and troubleshoot failed backup jobs 6) You will respond to system issues and incidents reported by hospital staff 7) You will perform routine maintenance: software updates, patch management, and log reviews 8) You will configure and manage network settings, firewall rules, and remote access 9) You will maintain documentation for system configuration, incident resolution, and backups 10) You will coordinate with local IT staff for on-site troubleshooting or hardware issues 11) You will support new server deployments, configurations, and migrations as needed 12) You will ensure compliance with IT policies, security standards, and audit readiness 13) You will prepare periodic reports on server health, backup status, and incident logs Candidate Profile: Required Qualifications: Strong hands-on experience with Ubuntu Server administration Proficient in VPN and APN setup and troubleshooting across distributed locations Deep understanding of Linux CLI tools, systemd, cron, and shell scripting Experience with rsync, rclone, or similar tools for backup and NAS integration Skilled in managing firewall (UFW/iptables), SSH hardening, and basic security configurations Ability to troubleshoot network, disk, and service-level issues on Ubuntu Familiarity with automated updates, patching, and system monitoring (manual/log-based) Knowledge of LVM, RAID configurations, and disk performance tuning Proficient in documenting server setup, changes, and incident handling Able to manage remote server environments without centralized monitoring tools Excellent problem-solving skills and responsiveness to live issues Prior experience in healthcare or mission-critical IT environments is an advantage Desired Qualifications: Experience with automation tools like Ansible or Bash scripting for repetitive tasks Familiarity with open-source monitoring tools (e.g., Zabbix, Prometheus, Grafana) for future implementation Knowledge of NAS management, especially with NFS or SMB protocols Understanding of basic MySQL/PostgreSQL server administration Experience in log management and analysis using tools like Logwatch, journalctl, or syslog Ability to design and implement disaster recovery plans Exposure to ITIL practices or structured ticketing/helpdesk environments Ability to train and mentor junior IT staff or hospital IT coordinators Awareness of cybersecurity best practices in handling patient data and medical systems Willingness to contribute to process improvement and documentation standardization

Posted 1 month ago

Apply

4.0 - 7.0 years

3 - 7 Lacs

Mumbai

Work from Office

Windows System Administration and Troubleshooting knowledge on Windows Area/O365 Windows and VMWare Trouble shooting, VMWare vCenter, Patching Troubleshooting, User Management/Storage management Windows System Administration with a minimum 4+ Years of Relevant Experience in Windws and Vmware and good Troubleshooting experience Good Exposure on Windows Production/Non-Production Environment Patching and Troubleshooting Good knowledge on AD access management and group policy troubleshooting LDAP User-Management and Troubleshooting Good knowledge on PowerShell scripting for automation Good knowledge on Vmware environment and should familiar on HA and DRA in Vmware Good knowledge in server and Vmware decommission process Good knowledge on hardware tools like HP SIM and HP oneview Should be familiar with firmware updates and enclosure and VCM administration in HPE Management/LVM/Process-Related Performing Production and Non-Production Changes and resolving queries that comes from Application Teams that are related to OS side Handling Incidents will be an added advantage Depth knowledge of Windows server setup, deployment, and maintenance, advanced coding skills, and the ability to solve complex IT issues. Responsible for installing or upgrading Windows-based systems and servers, managing user access to the servers, and maintaining the security and stability of the network. Handling O365 Issue

Posted 1 month ago

Apply

3.0 - 5.0 years

4 - 6 Lacs

Noida, New Delhi, Gurugram

Work from Office

Incident handling, forensic analysis, and VAPT SIEM tools cybersecurity frameworks Log analysis, monitoring, detecting and investigating security incidents and breaches. CEH,CSA,CompTIA Security+,GCIH,security incidents

Posted 1 month ago

Apply

12.0 - 15.0 years

55 - 60 Lacs

Ahmedabad, Chennai, Bengaluru

Work from Office

Dear Candidate, We are hiring a Digital Forensics Analyst to investigate cyber incidents, recover digital evidence, and support legal and compliance teams. Ideal for professionals with a strong background in cybersecurity and forensic analysis. Key Responsibilities: Perform forensic imaging and analysis on digital devices Investigate incidents involving malware, breaches, or data leaks Document evidence for regulatory, legal, or HR use Collaborate with SOC and legal teams to support investigations Required Skills & Qualifications: Experience with forensic tools (EnCase, FTK, Autopsy, X-Ways) Knowledge of file systems, OS internals, and memory analysis Understanding of chain-of-custody and evidence handling Bonus: GIAC (GCFA, GCFE) or related digital forensics certifications Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Srinivasa Reddy Kandi Delivery Manager Integra Technologies

Posted 1 month ago

Apply

8.0 - 12.0 years

14 - 20 Lacs

Hyderabad, Pune, Bengaluru

Hybrid

Job Title Cybersecurity Lead Incident Management Network Security Signature Writing Job Summary The Cybersecurity Lead will manage the Incident Management Network Security Signature Writing team This role involves overseeing incident response and signature development direct stakeholder management team management and project management The ideal candidate will have a strong background in cybersecurity incident response and network security with excellent communication and leadership skills Key Responsibilities Incident Monitoring and Response Monitor security alerts and incidents respond promptly and escalate as needed Threat Analysis and Detection Investigate security incidents develop detection rules and signatures Signature Development Create signatures for vulnerabilities and perform vulnerability hunting Tool Management Deploy configure and manage NDR tools Alert Tuning and Optimization Optimize alerts to reduce false positives Reporting and Documentation Document and report on security incidents Research and Development Stay updated with cybersecurity trends and improve detection capabilities Stakeholder Management Engage with stakeholders and manage escalated issues Team Management Lead and support the team Project Management Oversee projects related to incident response and signature development Preferred Skills Experience with Microsoft Defender or similar endpoint protection solutions Strong understanding of endpoint and network security threat detection and response Proficiency with SIEM platforms and scripting languages Knowledge of network protocols firewall rules and intrusion detection prevention systems Familiarity with advanced persistent threats threat hunting and incident response frameworks Understanding of IPSIDS signatures and Rapid7 recog signatures Good to have malware and threat analysis and CVE hunting This role operates within a 24x7x365 environment requiring flexibility for shifts holidays and on call responsibilities.

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies