Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 7.0 years
0 Lacs
hyderabad, telangana
On-site
As a candidate for this position, you should have a Bachelor's degree in Computer Science, a related field, or equivalent practical experience. Additionally, you should possess at least 3 years of experience in the security space, which includes security engineering, security analytics, risk quantification/measurement, or technical risk management. Your experience should also include developing and contributing to the implementation of scaled global security risk programs and solutions. Furthermore, you should have a proven track record of landing security outcomes focusing on end-users in areas such as Identity and Access Management (IAM), platform security, and incident response. Experience with AI/ML and data analysis software like SQL, R, Python, and Go is also required for this role. Preferred qualifications for this position include the ability to convert concepts into robust technology for security applications. You should also have experience in partnering with technical and non-technical executive cross-functional stakeholders and successfully influencing across different levels and organizational boundaries. Additionally, expertise in converting data science principles into simple, consumable outputs that cater to broad audiences is highly valued. A good understanding of the current and evolving landscape of security and insider risk for technology companies is also beneficial. In this role, you will be responsible for building the fundamental infrastructure to measure and gain observability of risk and security surfaces in gTech. This involves developing analytics, reporting, and control enforcement infrastructure. You will play a crucial role in developing data and access infrastructure that contributes to securing and improving observability for a large insider population and associated threats. Driving the adoption of infrastructure and controls developed within gTech's operations will also be part of your responsibilities. Your main duties will include designing, developing, and deploying technical solutions to enhance the security posture of a large-scale user base. You will automate manual processes through technology to scale output and improve the effectiveness of large security programs and initiatives. Applying secure access management practices, dealing with insider risk and associated threats, and performing security event triage to identify anomalous behavior will be essential tasks. Moreover, you will be responsible for translating complex technical concepts into consumable data outputs that facilitate interoperability between technical work and business operations.,
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
bhubaneswar
On-site
As an L2 Network Security professional, your responsibilities will include advanced troubleshooting and incident analysis of network security incidents such as DDoS attacks, firewall breach attempts, and malware communication. You will be tasked with investigating alerts escalated by L1 support and analyzing traffic patterns, logs, and system behavior to identify potential threats. Utilizing packet analysis tools like Wireshark and tcpdump will be essential for investigating suspicious network traffic. Additionally, you will be responsible for managing firewall policies for various platforms such as Palo Alto, Fortinet, and Cisco ASA. This includes reviewing and refining firewall rules to enhance security posture and minimize false positives. Implementing configuration changes, performing backups, and conducting rule audits will also be part of your duties. In the event of security incidents, you will act as the first responder and collaborate with the SOC team to contain and remediate threats. This may involve isolating hosts, blocking IPs, and reconfiguring ACLs. Furthermore, you will work closely with L3 and Threat Intelligence teams to implement advanced threat mitigation strategies. Your role will also involve reviewing and implementing network security changes as part of the change control process. Deploying updates, patches, and configuration adjustments in firewalls, IDS/IPS, and VPNs will be crucial tasks. Prior to implementation, you will be responsible for testing and validating the impact of these changes. Analyzing logs from various security devices such as firewalls, routers, switches, IDS/IPS, and SIEM systems will be part of your regular routine. Correlating events across multiple systems to identify attack patterns and hunting for indicators of compromise (IOCs) in network traffic will be essential for threat detection. Furthermore, you will be responsible for tuning IDS/IPS signatures and firewall rules to reduce noise and enhance accuracy. Ensuring the health and performance of network security devices and collaborating on SIEM tuning to improve detection capability will also fall under your purview. As an escalation point and support to the L1 team, you will provide technical guidance and support. This includes guiding L1 analysts on SOPs, investigation techniques, and tool usage, as well as assisting in the documentation of new playbooks and updates to knowledge bases. In addition, you will be involved in configuring and troubleshooting site-to-site and client VPNs, investigating failed VPN connections, authentication issues, and access violations. Supporting internal and external audits by providing logs, reports, and evidence to ensure compliance with security policies, standards, and regulations such as ISO 27001, PCI-DSS, and NIST will also be part of your responsibilities. The ideal candidate for this role should have a strong understanding of TCP/IP, routing protocols, NAT, ACLs, firewall architecture, DMZ, proxy servers, IDS/IPS concepts, VPN, IPSec, and SSL. This is a full-time, permanent position with benefits including health insurance, life insurance, paid sick time, and Provident Fund. The work schedule is during the day shift, and the work location is in person.,
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
navi mumbai, maharashtra
On-site
As a Cyber Security Officer (CSO), your primary responsibility will be to design, implement, and manage cybersecurity strategies aimed at safeguarding the organization's data, systems, and infrastructure from cyber threats. You will play a crucial role in ensuring compliance with security regulations, conducting audits, and establishing a robust cybersecurity architecture. Your key responsibilities will include developing and implementing comprehensive cybersecurity policies and frameworks to enhance the organization's security posture. You will also be responsible for ensuring data privacy, encryption, and secure storage practices, as well as monitoring, analyzing, and mitigating cyber threats, vulnerabilities, and risks. Additionally, you will play a critical role in designing and implementing secure network and system architectures, conducting regular security audits, and ensuring compliance with industry standards and regulations. In the event of cybersecurity incidents, you will lead investigations and response efforts to mitigate potential risks. Collaboration will be a key aspect of your role, as you will work closely with IT, legal, and compliance teams to integrate security into business operations. Furthermore, you will be responsible for educating employees on cybersecurity best practices and threat prevention to enhance the overall security posture of the organization. To excel in this role, you should possess a Bachelor's or Master's degree in Cybersecurity, Information Security, or a related field. Extensive experience in cybersecurity architecture, risk management, and compliance is essential, along with a strong knowledge of network security, encryption, and threat intelligence. Additionally, leadership, analytical thinking, and problem-solving skills will be crucial for success in this role.,
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
As a Security Supervisor, you will be responsible for supervising and coordinating the activities of the security personnel on-site. You will ensure that all security operations are carried out in compliance with company policies and local laws. Conducting regular patrols and inspections to identify and resolve security risks will be a key part of your role. Monitoring CCTV systems and access control systems will also be within your purview. In this position, you will be responsible for scheduling shifts and maintaining proper staffing levels for all posts. Responding to incidents, emergencies, and alarms in a timely manner and conducting thorough incident reports will be essential. You will also play a crucial role in training new security staff and conducting periodic performance evaluations to ensure a high level of professionalism. As a Security Supervisor, you will be required to liaise with law enforcement, emergency responders, and external agencies as needed. Maintaining accurate logs, records, and reports related to security operations will be part of your daily responsibilities. Providing leadership and support to ensure a professional and courteous security presence is also a key aspect of this role. This is a full-time position with benefits including health insurance and Provident Fund. The work schedule will involve rotational shifts, and the work location is in person. If you are looking to take on a challenging role that involves ensuring the safety and security of the premises, this position might be the perfect fit for you.,
Posted 2 weeks ago
2.0 - 6.0 years
0 Lacs
punjab
On-site
As a skilled and security-focused DevSecOps Engineer, you will join our growing engineering team working at the intersection of development, security, and operations. Your primary responsibility will be ensuring the security, scalability, and compliance of our infrastructure and applications across various cloud environments. You will play a crucial role in automating security practices within CI/CD pipelines, hardening cloud environments, and managing firewall and access control policies. Your key responsibilities will include implementing and maintaining security controls across AWS, Azure, and GCP environments, integrating DevSecOps tools and practices into CI/CD pipelines for automated security testing, managing and monitoring cloud-based infrastructure with a focus on compliance and security, configuring and monitoring firewalls, WAFs, and other security solutions, conducting threat modeling, vulnerability assessments, and implementing mitigation strategies. Collaboration with DevOps, SRE, and Security teams will be essential to align infrastructure and application security best practices. Additionally, you will ensure secure configuration management, respond to security incidents, and contribute to documentation and internal knowledge base for security practices and systems. To excel in this role, you should have at least 4 years of hands-on experience in DevOps/DevSecOps roles, a strong understanding of cloud platforms (especially AWS, Azure, and GCP), familiarity with cloud-native security tools and services, solid knowledge of firewall management, network security, and access control systems, experience with CI/CD tools and infrastructure as code tools, a strong grasp of container security and vulnerability scanning tools, as well as scripting skills for automation and monitoring. Preferred certifications such as AWS Certified Security Specialty, Microsoft Certified: Azure Security Engineer Associate, Google Professional Cloud Security Engineer, Certified Kubernetes Security Specialist (CKS), CEH, CISSP, or other security-focused certifications are a plus. In return, you will have the opportunity to work with cutting-edge cloud and security technologies, enjoy a collaborative and inclusive work culture, benefit from career development opportunities, upskilling support, flexible work options, competitive compensation, food provided, work from home, and performance bonuses. The job type is full-time, and the work schedule includes Monday to Friday with night shift and rotational shift options. Join us in person and be part of our dynamic team where your skills and expertise will be valued and rewarded.,
Posted 2 weeks ago
4.0 - 9.0 years
0 Lacs
hyderabad, telangana
On-site
You are a professional with at least 7 to 9 years of experience in IoT L2 support and a minimum of 4 years of experience in Cloud Operations. You will be responsible for providing advanced technical support for AWS IoT services, resolving complex issues related to device connectivity, data ingestion, security, and integration with other AWS services. Additionally, you will interact indirectly with customers to understand their technical issues, provide timely updates, and ensure customer satisfaction through effective communication and resolution of problems via Jira Service Management (JSM). You will handle escalated cases from Level 1/Level 3/ Business support, taking ownership of issues and driving them to resolution while adhering to defined service-level agreements (SLAs). Your role will involve performing thorough analysis of incidents, identifying root causes, and implementing preventive measures to minimize recurring issues and improve service reliability. Furthermore, you will document troubleshooting steps, resolutions, and best practices for internal knowledge base and customer-facing documentation, contributing to the overall improvement of support processes and customer experience. Experience in Jira, AWS Services (Lambda, CloudWatch, Kinesis Stream, SQS, IoT Core), and New Relic will be advantageous. In Cloud Operations, you will be responsible for designing, deploying, and managing cloud infrastructure solutions (AWS), ensuring scalability, reliability, and efficiency. You will implement and maintain monitoring, alerting, and logging solutions to ensure proactive management of cloud resources and respond to and resolve incidents in a timely manner to minimize downtime. Developing and maintaining infrastructure as code (IaC) using tools such as Terraform, CloudFormation, or Ansible, and automating routine tasks and processes to streamline operations and improve efficiency are also part of your responsibilities. Knowledge of Python or node is mandatory to automate manual operation tasks. You will implement and enforce security best practices, including access controls, encryption, and compliance with industry standards, as well as conduct regular security audits and vulnerability assessments. Identifying opportunities to optimize AWS cloud resources for cost and performance, implementing cost management strategies, and recommending architectural improvements based on monitoring and analysis are crucial aspects of your role. Collaboration with cross-functional teams and maintaining documentation of infrastructure configurations, procedures, and troubleshooting guides are also key responsibilities. Staying current with industry trends, emerging technologies, and best practices in cloud operations and driving initiatives for process improvement, automation, and scalability are essential for success in this role.,
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
noida, uttar pradesh
On-site
As a Site Reliability Engineer II, you will play a crucial role in ensuring the reliability and performance of the VP platform by leveraging your expertise at the intersection of Software Engineering and Systems Administration. Your primary focus will be on maintaining a delicate balance between meeting SLAs, optimizing performance, and managing operational costs effectively. Your responsibilities will include designing, implementing, and maintaining robust monitoring and alerting systems to proactively detect and address any issues that may impact system health and performance. You will lead observability initiatives by enhancing metrics, logging, and tracing capabilities across various services and infrastructure components. Collaboration with development and infrastructure teams will be essential to instrument applications and ensure visibility into the system's overall health. Automation will be a key aspect of your role, requiring you to develop Python scripts and tools for tasks such as infrastructure management, incident response, and automation. You will actively participate in incident management and on-call processes, working towards reducing Mean Time to Resolution (MTTR) by conducting root cause analysis, postmortems, and implementing preventive measures to avoid recurrence. Optimizing systems for scalability, performance, and cost-efficiency in cloud and containerized environments will be another critical responsibility. You will advocate for and implement Site Reliability Engineering best practices, including defining Service Level Objectives (SLOs) and Indicators (SLIs), capacity planning, and conducting reliability reviews to continuously enhance the platform's reliability. To excel in this role, you should possess at least 3 years of experience in a Site Reliability Engineer or similar position, with a strong proficiency in Python for automation and tooling. Hands-on experience with monitoring tools like Prometheus, Grafana, Datadog, and observability tools is essential. Familiarity with log aggregation and analysis tools, cloud platforms (AWS, GCP, Azure), container orchestration (Kubernetes), and infrastructure-as-code tools (Terraform, Ansible) is required. Additionally, strong debugging skills, incident response capabilities, and knowledge of CI/CD pipelines and release engineering practices will be beneficial to succeed as a Site Reliability Engineer II.,
Posted 2 weeks ago
10.0 - 20.0 years
16 - 27 Lacs
chennai
Work from Office
SOC Manager - L4 (NBA + SIEM + Perimeter Security, managing 20+ resources) Experience: 10+ years to 15 years Team Management: 20+ Security Analysts/Engineers Role Overview: We are looking for an experienced SOC Manager to lead our global Security Operations Center. The role demands strong expertise in Network Behavior Analytics (NBA), SIEM platforms, and Perimeter Security technologies , along with proven experience in managing and mentoring large teams (20+ resources). Key Responsibilities: Lead day-to-day operations of the Security Operations Center (SOC) . Oversee SIEM deployment, monitoring, and tuning (Splunk, QRadar, ArcSight, etc.). Manage Network Behavior Analytics (NBA) solutions for advanced threat detection. Ensure effectiveness of Perimeter Security tools (firewalls, IDS/IPS, WAF, VPNs, proxies). Define, implement, and monitor incident response playbooks & escalation procedures . Conduct threat hunting, forensic investigations, and vulnerability assessments . Collaborate with cross-functional teams to maintain regulatory compliance (ISO 27001, NIST, PCI-DSS, GDPR). Drive automation and optimization of SOC processes and workflows. Mentor and manage a team of 20+ analysts and engineers in a 24x7 environment. Report on security posture, incidents, and risk mitigation to leadership. Required Skills & Experience: 1015 years in Cybersecurity/SOC operations with at least 5+ years in a leadership role. Strong knowledge of SIEM tools (Splunk, QRadar, ArcSight, etc.) . Hands-on expertise in NBA tools and their integration with SIEM/SOAR. Deep knowledge of Perimeter Security technologies (Firewalls, IDS/IPS, WAF, DLP, VPN, Proxy). Experience with Cloud Security (AWS/Azure/GCP) in hybrid environments. Proven ability to manage large teams (20+ resources) in 24x7 SOC. Strong communication and stakeholder management skills. Preferred Certifications: CISSP, CISM, CCSP, Splunk Certified, QRadar, or Palo Alto . Education: Bachelors or Masters in Computer Science, Cybersecurity, or related field. Education Criteria : MCA OR BE/B.Tech in Electrical/Electronics/CS/IT Certification : At least one Security certification, PMP/ITIL Expert/CISA/CISM/CISSP OR Tool-Based Certification, should be completed within 30 days of onboarding. Interested candidate share your profile to geetha.p@matchps.com
Posted 2 weeks ago
8.0 - 12.0 years
0 Lacs
hyderabad, telangana
On-site
As a Security Manager, you will be responsible for developing and implementing security policies, procedures, and protocols to safeguard the company's assets and personnel. You will lead and oversee a team of security personnel, offering training, coaching, and support when necessary. Regular security assessments and audits will be conducted under your supervision to identify and mitigate potential risks and vulnerabilities. In the event of security incidents, you will monitor and respond promptly, including conducting investigations and collaborating with law enforcement and relevant authorities. Accurate record-keeping of security incidents, investigations, and related activities will be part of your responsibilities. It is essential to stay informed about security industry trends, technologies, and best practices to enhance security policies effectively. Managing relationships with third-party security providers will also be required in this role. To qualify for this position, you should have a background in the military or law enforcement, with a minimum of 8-10 years of experience in security management. Sound judgment, quick decision-making abilities, and strong problem-solving skills are essential attributes for this role. Knowledge of security industry standards, best practices, laws, and regulations is necessary. Familiarity with security technologies such as CCTV, access control systems, and alarm systems will be advantageous. Flexibility in working hours, including evenings and weekends when necessary, is expected. Join us in ensuring the safety and security of our organization by applying your expertise and skills to effectively manage security operations.,
Posted 2 weeks ago
5.0 - 10.0 years
0 Lacs
maharashtra
On-site
As a Senior Security Engineer specializing in Medical Device Cybersecurity & Compliance, you are expected to have 5-10 years of experience in the cybersecurity field. Your primary responsibility will be to drive the seamless integration of cybersecurity measures throughout the entire medical device product development life cycle, ensuring that security is a fundamental aspect from the initial concept to the final release. Your duties will include developing and upholding cybersecurity protocols for medical products, such as defining security requirements, conducting risk assessments, creating threat models, and documenting product security architecture. You will also be tasked with conducting comprehensive gap assessments to assess compliance with standards like IEC 81001-5-1, IEC 60601-4-5, AAMI TIR 57, and AAMI TIR 97, and implementing necessary remediation measures. Furthermore, you will be responsible for performing hands-on vulnerability assessments, penetration testing, and secure code reviews for embedded devices, IoMT components, and connected systems. Collaboration with development, compliance, and regulatory teams will be crucial to ensure that the product security measures align with both internal security policies and external regulatory expectations. Your role will also involve supporting Software Bill of Materials (SBOM) management, conducting software supply chain risk evaluations, and analyzing third-party components to enhance software transparency and mitigate potential risks. Additionally, you will provide expertise on secure communication protocols, encryption standards, data protection for both at-rest and in-transit data, and cloud-based connectivity of medical systems. Your contribution to developing incident response strategies and applying your knowledge of HIPAA, GDPR, and HL7 to address data privacy and healthcare-specific regulatory concerns will be essential. Moreover, you are expected to actively participate in enhancing internal secure development processes, tools, and methodologies while promoting security best practices within the product teams. To excel in this role, you must possess a minimum of 6 years of cybersecurity experience, with at least 3 years dedicated to medical devices, embedded systems, or IoT security. Your proven track record in authoring security designs, defining technical requirements, and documenting security architectures in alignment with regulatory needs will be essential. Hands-on experience in embedded system security, including secure boot, firmware security, threat modeling techniques, and product-level risk assessments is required. A sound understanding of standards such as IEC 81001-5-1, IEC 60601-4-5, AAMI TIR 57, and AAMI TIR 97, as well as familiarity with ISO 14971 and the medical device product development lifecycle, will be beneficial. Demonstrated expertise in vulnerability management, penetration testing, and knowledge of data privacy and interoperability standards like HIPAA, GDPR, and HL7 are highly desirable. Your problem-solving skills, critical thinking abilities, and leadership qualities will be essential as you lead gap analysis and remediation activities in regulated environments. Strong collaboration skills are also required to influence cross-functional teams, including R&D, compliance, and product management, to ensure the successful implementation of security measures. This is a full-time position located in IN-GJ-Ahmedabad, India-Ognaj (eInfochips), falling under the job category of Engineering Services.,
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
maharashtra
On-site
You are a skilled DLP Operations Analyst with over 3 years of experience, looking to join a security operations team based in Mumbai. Your expertise lies in managing Data Loss Prevention (DLP) tools, particularly Zscaler, and you possess a deep understanding of operational workflows and incident response mechanisms related to data protection. Your primary responsibilities will include monitoring, analyzing, and responding to DLP alerts and incidents following predefined processes. You will be tasked with investigating potential data leakage scenarios, collaborating with internal stakeholders for resolution, and maintaining thorough incident documentation to ensure timely case closure. Additionally, you will be responsible for generating and sharing regular reports and dashboards highlighting DLP incidents and trends. Your role will also involve optimizing DLP policies based on alert analysis, false positives, user behavior, and emerging security threats, in coordination with InfoSec, IT, and compliance teams to enhance data protection frameworks. To excel in this role, you must have a minimum of 3 years of experience in security operations, with a specific focus on DLP. Proficiency in Zscaler DLP or equivalent tools is essential, along with a solid grasp of incident handling and triage within a security operations environment. Your strong analytical, documentation, and reporting skills will be crucial, enabling you to interpret and fine-tune DLP policies for enhanced detection capabilities with minimal false positives. Effective verbal and written communication skills are a must, and a collaborative work approach will be beneficial in engaging with cross-functional teams. If you are available to join immediately or within a short notice period, you would be a preferred candidate for this position. Stay informed about the latest DLP technologies and industry best practices to continually propose process improvements and contribute to the strengthening of data protection measures.,
Posted 2 weeks ago
1.0 - 6.0 years
7 - 12 Lacs
mumbai
Work from Office
About the Role We are seeking a dynamic and detail-oriented Cyber Forensic candidates to join our Forensic Team in Risk Advisory practice. The ideal candidate will have hands-on experience in cyber incident response, digital forensics, and threat investigations, and will be responsible for supporting high-impact engagements involving cyber breaches, fraud investigations, and forensic analysis. Role & responsibilities Conduct end-to-end digital forensic investigations across endpoints, servers, cloud, and mobile devices. Support cyber incident response engagements including containment, eradication, recovery, and root cause analysis. Perform evidence acquisition, chain of custody documentation, and forensic imaging using industry-standard tools and Chain of custody procedures. Analyze logs, memory dumps, and network traffic to identify indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs). Assist in malware analysis, reverse engineering, and threat actor profiling. Prepare detailed technical reports and executive summaries for clients and internal stakeholders. Preferred candidate profile Bachelors or Masters degree in Computer Science, Information Security, Digital Forensics, or a related field from a reputed institute. 25 years of relevant experience in cyber forensic and incident response. Strong understanding of Windows, Linux, and cloud environments (AWS, Azure, GCP) including log acquisition. Experience with forensic tools such as EnCase, FTK, X-Ways, Autopsy, Cellebrite, Magnet AXIOM. Preferred Certifications (any one) GCFA (GIAC Certified Forensic Analyst) GCIH (GIAC Certified Incident Handler) CHFI (Computer Hacking Forensic Investigato
Posted 2 weeks ago
15.0 - 20.0 years
13 - 17 Lacs
gurugram
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Omada Identity Cloud Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitating the transition to cloud security-managed operations. You will engage in discussions to align security strategies with organizational objectives, ensuring that all security measures are effectively integrated into the cloud environment. Your role will also require you to stay updated on the latest security trends and technologies to enhance the overall security posture of the organization. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team knowledge and skills in cloud security.- Develop and maintain comprehensive documentation of security policies and procedures. Professional & Technical Skills: - Must To Have Skills: Proficiency in Omada Identity Cloud.- Good To Have Skills: Experience with cloud security frameworks and compliance standards.- Strong understanding of identity and access management principles.- Experience with security incident response and risk management.- Familiarity with cloud service providers and their security offerings. Additional Information:- The candidate should have minimum 7.5 years of experience in Omada Identity Cloud.- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
3.0 - 8.0 years
4 - 8 Lacs
bengaluru
Work from Office
About The Role Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time educationRole Summary :The SOC Analyst plays a critical role in the first line of cyber defense by monitoring and triaging security alerts generated by Microsoft Sentinel. This role is responsible for identifying potential threats through continuous monitoring of security dashboards, performing initial analysis, executing predefined response actions, and escalating incidents based on severity. The analyst will work closely with L2/L3 analysts to ensure timely escalation and incident closure while maintaining accuracy and SLA adherence. This role is ideal for individuals developing their skills in SIEM operations and security monitoring with a focus on Microsofts security ecosystem. Roles & Responsibilities- Monitor Microsoft Sentinel dashboards and respond to alerts.- Perform initial triage, classification, and correlation of security events.- Trigger and monitor predefined SOAR playbooks.- Create and update incident tickets with all required details.- Escalate validated incidents to L2/L3 teams for deeper investigation.- Support daily SOC health checks and Sentinel connector status reviews Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Information and Event Management (SIEM) Operations.- Strong understanding of incident response processes and procedures.- Experience with security monitoring tools and techniques.- Knowledge of compliance frameworks and regulations related to cybersecurity.- Ability to analyze security incidents and provide actionable insights.- Experience in SOC / IT security.- Basic knowledge of Microsoft Sentinel and KQL.- Familiarity with Defender for Endpoint, Identity, and Microsoft 365 Security.- Ability to follow runbooks, good verbal and written communication. Additional Information:- The candidate should have minimum 3 years of experience in Security Information and Event Management (SIEM) Operations.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
15.0 - 20.0 years
3 - 7 Lacs
coimbatore
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Data Loss Prevention (DLP) Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. A typical day involves collaborating with various teams to implement security measures, conducting assessments to identify vulnerabilities, and ensuring that all systems are fortified against potential cyber threats. You will also engage in continuous monitoring and improvement of security protocols to safeguard sensitive information and maintain compliance with industry standards. Roles & Responsibilities:- Expected to be an SME in DLP and Data masking solution implementation and support.- Collaborate and manage the team to perform.- Demonstrates excellent problem-solving skills and the ability to collaborate effectively with diverse stakeholders- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements.- Develop and implement security policies and procedures to ensure compliance with industry standards. Professional & Technical Skills: - Must Have Skills: Proficiency in Proofpoint and Microsoft Purview Data Loss Prevention (DLP) tools, Varonis Data Discovery and Data masking.- Creation of DLP detection and prevention policies- DLP agents compliance and incident monitoring- DLP agent upgradation- Design and implementation of Data masking solution across enterprise-wide applications- Perform Sensitive Data Discovery and analysis across enterprise data repositories- Create Technical documentation and installation/administration manuals- Strong understanding of risk management and mitigation strategies.- Experience with security frameworks and compliance standards such as ISO 27001, NIST, or GDPR, HIPAA, HiTrust- Familiarity with incident response and threat intelligence processes.- Knowledge of network security protocols and technologies. Additional Information:- The candidate should have minimum 8 years of experience in Data Loss Prevention (DLP) and Data Discovery- Good to have experience in Health care industry - Certifications on Proofpoint, Varonis is preferred.- This position is based in Coimbatore.- Willing to work in US shifts including support in late IST hours. Willing to work in office adhering to current HR policies.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
15.0 - 20.0 years
3 - 7 Lacs
chennai
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Data Loss Prevention (DLP) Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. A typical day involves collaborating with various teams to implement security measures, conducting assessments to identify vulnerabilities, and ensuring that all systems are fortified against potential cyber threats. You will also engage in continuous monitoring and improvement of security protocols to safeguard sensitive information and maintain compliance with industry standards. Roles & Responsibilities:- Expected to be an SME in DLP and Data masking solution implementation and support.- Collaborate and manage the team to perform.- Demonstrates excellent problem-solving skills and the ability to collaborate effectively with diverse stakeholders- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements.- Develop and implement security policies and procedures to ensure compliance with industry standards. Professional & Technical Skills: - Must Have Skills: Proficiency in Proofpoint and Microsoft Purview Data Loss Prevention (DLP) tools, Varonis Data Discovery and Data masking.- Creation of DLP detection and prevention policies- DLP agents compliance and incident monitoring- DLP agent upgradation- Design and implementation of Data masking solution across enterprise-wide applications- Perform Sensitive Data Discovery and analysis across enterprise data repositories- Create Technical documentation and installation/administration manuals- Strong understanding of risk management and mitigation strategies.- Experience with security frameworks and compliance standards such as ISO 27001, NIST, or GDPR, HIPAA, HiTrust- Familiarity with incident response and threat intelligence processes.- Knowledge of network security protocols and technologies. Additional Information:- The candidate should have minimum 8 years of experience in Data Loss Prevention (DLP) and Data Discovery- Good to have experience in Health care industry - Certifications on Proofpoint, Varonis is preferred.- This position is based in Coimbatore.- Willing to work in US shifts including support in late IST hours. Willing to work in office adhering to current HR policies.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
3.0 - 8.0 years
3 - 7 Lacs
bengaluru
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Security Information and Event Management (SIEM), Splunk Security Information and Event Management (SIEM) Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for a proactive and detail-oriented SOC Analyst (Incident Response) to join our Security Operations Center (SOC) team. In this role, you will be responsible for detecting, analyzing, and responding to cybersecurity incidents using a combination of technology solutions and processes. Roles & Responsibilities:- Monitor security alerts and events from various sources (SIEM, EDR, firewall logs, IDS/IPS, etc.) to detect potential security incidents.- Triage, investigate, and respond to incidents following standard operating procedures (SOPs) and incident response playbooks.- Perform in-depth analysis of security incidents to identify root causes, scope, and impact.- Escalate complex incidents to appropriate stakeholders and support containment, eradication, and recovery efforts.- Work with internal teams and external partners to contain and remediate threats.- Contribute to continuous improvement of detection capabilities and IR processes.- Maintain incident documentation and provide detailed reports post-incident.- Stay current with emerging threats, vulnerabilities, and incident response best practices. Professional & Technical Skills: - 25 years of experience in a Security Operations Center (SOC) or similar cybersecurity role.- Strong understandin of security technologies such as SIEM, EDR, IDS/IPS, firewalls, and antivirus.- Experience with incident detection, triage, analysis, and response.- Familiarity with MITRE ATT&CK framework and other threat models.- Knowledge of operating systems (Windows/Linux), networking protocols, and cloud environments.- Strong analytical and problem-solving skills.- Excellent verbal and written communication skills.- Industry certifications such as CEH, GCIH, GCIA, or CompTIA Security+ are a plus. Additional Information:- The candidate should have minimum 3 years of experience in Splunk, QRadar or any SIEM tool.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
3.0 - 8.0 years
3 - 7 Lacs
noida
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Splunk Security Information and Event Management (SIEM) Good to have skills : Microsoft Azure SentinelMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply your security expertise to design, build, and protect enterprise systems, applications, data, assets, and people. Your typical day will involve collaborating with various teams to implement security measures, conducting risk assessments, and ensuring compliance with security policies. You will also monitor security systems and respond to incidents, all while staying updated on the latest cyber threats and security technologies to effectively safeguard the organizations information and infrastructure. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular security assessments and audits to identify vulnerabilities.- Develop and implement security policies and procedures to enhance the organization's security posture. Professional & Technical Skills: - Must To Have Skills: Proficiency in Splunk Security Information and Event Management (SIEM).- Good To Have Skills: Experience with Microsoft Azure Sentinel.- Strong understanding of security protocols and best practices.- Experience in incident response and threat hunting.- Familiarity with network security technologies and tools. Additional Information:- The candidate should have minimum 3 years of experience in Splunk Security Information and Event Management (SIEM).- This position is based at our Noida office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
15.0 - 20.0 years
13 - 17 Lacs
gurugram
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Threat Hunting, JCL, Batch/Job Scheduling Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. A typical day involves collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and transitioning to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud security threats and solutions. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team knowledge and skills in security practices.- Evaluate and recommend new security technologies and tools to improve the overall security posture. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Threat Hunting.- Strong understanding of cloud security principles and frameworks.- Experience with incident response and threat intelligence.- Familiarity with security compliance standards such as ISO 27001 and NIST.- Ability to analyze security incidents and develop mitigation strategies. Additional Information:- The candidate should have minimum 7.5 years of experience in Security Threat Hunting.- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
2.0 - 3.0 years
4 - 6 Lacs
noida, bhopal
Work from Office
Job Summary: We are seeking an experienced Cyber Security Trainer to join our team. The ideal candidate will have a solid background in cybersecurity principles and practices, combined with a passion for teaching and helping students understand complex cybersecurity concepts. You will be responsible for delivering high-quality training sessions and supporting students as they develop skills essential to succeed in the cybersecurity field. Key Responsibilities: Deliver engaging and interactive training sessions on cybersecurity topics, including but not limited to network security, threat analysis, malware protection, digital forensic, and ethical hacking. Develop and update course materials, including presentations, handouts, and online resources, to reflect the latest cybersecurity trends and practices. Conduct hands-on labs and exercises to help students gain practical experience with cybersecurity tools and techniques. Assess students' understanding and progress through evaluations, assignments, and feedback sessions. Stay updated with the latest cybersecurity developments and incorporate new knowledge into training programs. Support and mentor students as they navigate their learning journey, answering questions, and providing guidance on cybersecurity career paths. Qualifications: Bachelors degree in Technology (BTech) or a Master’s in Computer Applications (MCA), or a Master's degree in Technology (MTech) 2-3 years of experience in cybersecurity or a related field, with proven knowledge of current cybersecurity threats, tools, and practices. Previous experience in teaching, training, or mentoring is highly desirable. Excellent communication skills, with the ability to simplify complex topics and engage a diverse audience. Strong knowledge of cybersecurity tools and technologies, such as firewalls, intrusion detection systems, SIEM, and vulnerability assessment tools. Preferred Skills: Relevant certifications in cybersecurity, such as CompTIA Security+, CISSP, CEH, or similar. Familiarity with e-learning platforms and digital training tools. Strong problem-solving skills and adaptability to different learning styles. Why Join Us: Opportunity to make a meaningful impact on the next generation of cybersecurity professionals. Collaborative and supportive work environment. Access to continuous learning and professional development opportunities.
Posted 2 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
bharuch, ahmedabad, surat
Work from Office
Department/Unit : Safety, Health & Environment (SHE) Reporting To: Head of Safety, Health & Environment (SHE) Direct Reports : None Job Purpose/Summary : To manage and monitor the plant's environmental performance, ensuring compliance with all environmental regulations, permits, and company policies, while driving initiatives for waste reduction, resource conservation, and pollution prevention. Key Responsibilities & Duties: Environmental Compliance: Ensure full compliance with all applicable local, national, and international environmental laws, regulations, and consents (e.g., Air Act, Water Act, Hazardous Waste Management Rules, Consent to Operate). Permit Management: Manage all environmental permits, licenses, and consents, including applications, renewals, and reporting requirements to regulatory bodies (e.g., GPCB). Monitoring & Reporting: Oversee environmental monitoring programs (air emissions, wastewater discharge, noise levels). Collect, analyze, and report environmental data to internal and external stakeholders. Waste Management: Develop and implement effective waste management plans for solid waste, hazardous waste, and wastewater. Promote waste minimization and recycling. Pollution Control: Monitor the performance of pollution control equipment (e.g., scrubbers, ETP, bag filters) and recommend improvements or corrective actions. Environmental Audits: Conduct internal environmental audits and support external audits. Ensure timely closure of audit findings. Resource Conservation: Identify and implement initiatives for energy conservation, water conservation, and raw material efficiency. Incident Response: Participate in environmental incident investigations, determine root causes, and implement corrective actions. Develop and test emergency response plans related to environmental spills. Training & Awareness: Conduct environmental awareness training for employees and contractors. Documentation: Maintain comprehensive environmental records, reports, and documentation. Key Performance Indicators (KPIs): Compliance with Environmental Discharge Limits (Air, Water) Waste Generation Rates (per ton of product) Recycling/Reuse Rates (%) Energy & Water Consumption Reduction (%) Environmental Audit Scores Number of Environmental Non-Compliances/Incidents Required Qualifications: Bachelor's or Master's degree in Environmental Engineering, Environmental Science, Chemical Engineering, or a related field. Required Experience: 5-8 years of experience as an Environmental Officer or similar role in a heavy process industry, preferably with experience in managing environmental aspects of metallurgical operations. Strong knowledge of Indian environmental laws and regulations (e.g., CPCB, GPCB guidelines). Required Skills: Strong knowledge of environmental management systems (e.g., ISO 14001). Expertise in pollution control technologies for air, water, and waste. Excellent analytical skills for environmental data interpretation. Strong communication and liaison skills with regulatory bodies. Ability to develop and implement environmental programs. Commitment to sustainable practices. Locations - Ahmedabad,Bharuch,Surat,Pune
Posted 2 weeks ago
2.0 - 7.0 years
9 - 10 Lacs
gurugram
Work from Office
Job Title: Level 2 Cyber Security Analyst Experience Required: 3-6 Years Location: Work from office (Gurugram) Shift Timing : 24x7 Job Responsibilities: Incident Investigation: Conduct thorough investigations of security incidents using IBM QRadar, ensuring timely and accurate identification, analysis, and resolution of security threats. Support Level 1 Analysts: Provide guidance and support to Level 1 analysts, assisting with complex issues and ensuring effective incident response and escalation procedures. Use Case Understanding: Develop and maintain a deep understanding of security use cases, ensuring the effective implementation and monitoring of security controls. Rotational Shifts: Be prepared to work in rotational shifts to provide 24/7 security monitoring and incident response. Collaboration: Work closely with other IT and security teams to ensure comprehensive security coverage and effective incident management. Documentation: Maintain detailed and accurate documentation of incidents, investigations, and resolutions to support continuous improvement and compliance requirements. Training and Development: Stay updated with the latest security trends, tools, and best practices, and participate in ongoing training and development opportunities.
Posted 2 weeks ago
2.0 - 7.0 years
4 - 7 Lacs
bengaluru
Work from Office
About this role: As a SOC Analyst at RingCentral, your primary responsibilities are to implement a comprehensive security monitoring, incident response and threat intelligence program for RingCentrals global cloud service, corporate and development environments. You will also be collaboratively providing feedback to improve security operations processes, generating actionable analysis and threat intelligence from tools, logs, and other data sources, ensuring strong documentation is in place to support ongoing SOC activities, and reporting your observations to other Security, Operations and IT personnel. Successful Candidates will: Have proven skills in application security, security monitoring, incident response and intrusion analysis Have strong knowledge of the diverse methods and technologies used to attack web/mobile/desktop applications, SaaS infrastructure, and data Think critically, work well under pressure, and possess strong analytical, written, verbal, and interpersonal skills Demonstrated track record of quality processes in candidates work history Be strongly self-motivated with an aptitude for both individual and team-oriented work Have experience following and refining standard operating procedures and playbooks Responsibilities: Monitor security events, analyze and investigate alarms, and maintain day-to-day operational activities of a secure cloud environment Engage teams within and outside of RingCentral to mitigate and resolve cases Maintain relevant documentation and audit artifacts Identify and track suspicious system activity Identify trends and patterns, and present them to Security Engineers to enhance our processes and systems This role participates in on-call rotations Qualifications Requirements: 2+ years in a security engineering, SRE, or SOC roles in a cloud services environment Experience with SIEM Experience investigating security incidents Basic knowledge AWS or GCP Experience with IDS, case management, and related tools and practices Experience with Linux, RedHat preferred Basic knowledge of broad security topics such as encryption, application security, malware, ransomware, etc. Knowledge of network, VoIP and web related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, HTTPS, SIP, RTP) Preferred Skills/Experience: Any combination of the following certifications: GCIA (GIAC Certified Intrusion Analyst) GCIH (GIAC Certified Incident Handler) GCFA (GIAC Certified Forensic Analyst) GNFA (GIAC Certified Network Forensic Analyst) GCFE (GIAC Forensic Examiner) GASF (GIAC Advanced Smartphone Forensics) GICA GCTI (GIAC Certified Cyber Threat Intelligence) GPEN (GIAC Certified Pentester) GWAPT (GIAC Certified Web Application Pentester) GPYC (GIAC Certified Python Coder) OSCP (Offensive Security Certified Pentester) Experience using Crowdstrike, Cloudflare, FirePower, Splunk, ELK, Imperva, Syslog, packet capture, and Windows Event Log tools and similar tools Knowledge of current hacking techniques, malicious code trends, botnets, exploits, malware, DDoS, and data breach events Strong knowledge of Microsoft Windows Experience automating security tasks, including scripting, programming and/or SecDevOps Experience working with global teams
Posted 2 weeks ago
7.0 - 12.0 years
10 - 15 Lacs
hyderabad, pune
Work from Office
Job Title: Information Security Officer (ISO) Company Overview: Fourth Partner Energy Limited (FPEL) is a leading renewable energy company in India, with a proven track record of delivering high-quality solar projects. With over 1 GW of installed capacity and more than 1800 projects executed, Fourth Partner Energy Limited is committed to providing innovative and sustainable energy solutions. FPEL has targeted to reach more than 3 GW of capacity by 2025. The company utilizes assets and software from reputed companies such as Microsoft (MS Dynamics D365, MS Office 265, MS SharePoint, Azure cloud, MS Intune), Acronis (data backup software), AWS (cloud services), HP (Endpoints), Sophos (Firewall and Anti-Virus) Job Overview: The Information Security Officer (ISO) will be responsible for leading the company's information security program and ensuring the confidentiality, integrity, and availability of the company's information assets. The ISO will report directly to the Head Digital Transformation and work closely with the executive team to develop and implement security strategies that align with the company's overall business objectives. Responsibilities: Develop and implement a comprehensive information security strategy, policies, and guidelines in accordance with the Cyber Security Guidelines issued by CEA and NCIIPC to protect the organization's information assets including IT & OT. Oversee the design, implementation, and maintenance of the company's information security architecture. Conduct regular risk assessments and vulnerability scans to identify potential security threats and vulnerabilities and develop mitigation strategies. Develop and implement the company's Cyber crisis management Plan, Critical information infrastructure protection plan, incident response plan and disaster recovery plans. Develop and maintain a security awareness and training program for employees, security team and other stakeholders. Ensure compliance with all regulatory and legal requirements related to information security, including CEA's Cyber Security Guidelines, NCIIPC guidelines, ISO standards and data privacy and protection laws (DPDPA Act). Establish and maintain strong working relationships with internal and external stakeholders, including regulatory bodies, auditors, and external security vendors and service providers. Manage and oversee the security operations team, including the security operations centre (SOC), security analysts, and security engineers. Develop and maintain metrics and reports to monitor the organization's information security posture and communicate security-related information to senior management and the board of directors. Identify, mitigate and monitor information security risks to the company's operations, assets, and reputation and accordingly implement improvement initiatives. Manage the company's information security budget and ensure that resources are allocated effectively. Qualifications: Bachelors or Master's degree in Computer Science, Information Technology, or a related field. Preferred to have professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Ethical Hacker (CEH). 7+ years of experience in information security, with at least 2 years in a leadership role. Experience in developing and implementing information security strategies, policies, and guidelines in accordance with regulatory requirements and industry best practices, including Cyber Crisis Management Plan (CCMP), Vulnerability Assessment & Penetration Testing (VAPT) and procedure for identification of Critical Information Infrastructure (CII) , to deal with Cyber crises, contingencies and disasters, attack on IT & OT systems etc. In-depth knowledge of the power sector's cyber security guidelines, including CEA's Cyber Security Guidelines and NCIIPC guidelines. Experience in common information security management frameworks, such as ISO/IEC 27001, and NIST including cyber security standards for operational technology (OT) such as ISA/IEC 62443, and ISO/IEC 27019. Strong communication and leadership skills, with the ability to effectively manage a team and communicate complex information to non-technical stakeholders. Experience in managing information security audits, reviews, log analysis and coordinating responses with internal and external stakeholders. Familiarity with relevant regulatory and legal requirements related to information security, including IT Act, data privacy, protection laws and associated Rules. Strong analytical and problem-solving skills, with the ability to identify and mitigate potential security threats and vulnerabilities. Experience with Renewable Energy (Solar, Wind, Hybrid) Operational and IT infrastructure and its security management.
Posted 2 weeks ago
2.0 - 5.0 years
4 - 7 Lacs
bengaluru
Work from Office
Say hello to possibilities. Its not everyday that you consider starting a new career. Were RingCentral, and were happy that someone as talented as you is considering this role. First, a little about us, were the global leader in cloud-based communications and collaboration software. We are fundamentally changing the nature of human interactiongiving people the freedom to connect powerfully and personally from anywhere, at any time, on any device. Were a $2 billion company thats growing at 30+% annually. We are currently looking for a Security Operations Center Analyst , and the key responsibilities are the following: Security Operations Center Analyst About this role: As a SOC Analyst at RingCentral, your primary responsibilities are to implement a comprehensive security monitoring, incident response and threat intelligence program for RingCentrals global cloud service, corporate and development environments. You will also be collaboratively providing feedback to improve security operations processes, generating actionable analysis and threat intelligence from tools, logs, and other data sources, ensuring strong documentation is in place to support ongoing SOC activities, and reporting your observations to other Security, Operations and IT personnel. Successful Candidates will: Have proven skills in application security, security monitoring, incident response and intrusion analysis Have strong knowledge of the diverse methods and technologies used to attack web/mobile/desktop applications, SaaS infrastructure, and data Think critically, work well under pressure, and possess strong analytical, written, verbal, and interpersonal skills Demonstrated track record of quality processes in candidates work history Be strongly self-motivated with an aptitude for both individual and team-oriented work Have experience following and refining standard operating procedures and playbooks Responsibilities: Monitor security events, analyze and investigate alarms, and maintain day-to-day operational activities of a secure cloud environment Engage teams within and outside of RingCentral to mitigate and resolve cases Maintain relevant documentation and audit artifacts Identify and track suspicious system activity Identify trends and patterns, and present them to Security Engineers to enhance our processes and systems This role participates in on-call rotations Qualifications Requirements: 2+ years in a security engineering, SRE, or SOC roles in a cloud services environment Experience with SIEM Experience investigating security incidents Basic knowledge AWS or GCP Experience with IDS, case management, and related tools and practices Experience with Linux, RedHat preferred Basic knowledge of broad security topics such as encryption, application security, malware, ransomware, etc. Knowledge of network, VoIP and web related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, HTTPS, SIP, RTP) Preferred Skills/Experience: Any combination of the following certifications: GCIA (GIAC Certified Intrusion Analyst) GCIH (GIAC Certified Incident Handler) GCFA (GIAC Certified Forensic Analyst) GNFA (GIAC Certified Network Forensic Analyst) GCFE (GIAC Forensic Examiner) GASF (GIAC Advanced Smartphone Forensics) GICA GCTI (GIAC Certified Cyber Threat Intelligence) GPEN (GIAC Certified Pentester) GWAPT (GIAC Certified Web Application Pentester) GPYC (GIAC Certified Python Coder) OSCP (Offensive Security Certified Pentester) Experience using Crowdstrike, Cloudflare, FirePower, Splunk, ELK, Imperva, Syslog, packet capture, and Windows Event Log tools and similar tools Knowledge of current hacking techniques, malicious code trends, botnets, exploits, malware, DDoS, and data breach events Strong knowledge of Microsoft Windows Experience automating security tasks, including scripting, programming and/or SecDevOps Experience working with global teams
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |