Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
6.0 - 10.0 years
0 Lacs
hyderabad, telangana
On-site
As a Lead Product Security Analyst expert, you will join the Product Security team at the forefront of the digital transformation within the global organization. Your role will involve leading security architecture reviews, threat modeling, and risk assessments for complex systems and products. You will define and drive the adoption of secure development practices across engineering teams, collaborate with various stakeholders to embed security into product roadmaps and design decisions, and develop scalable security frameworks, standards, and automation tools. In addition, you will be responsible for conducting advanced security testing, overseeing remediation efforts, evaluating and integrating security tools into CI/CD pipelines, and serving as a mentor and technical leader for junior analysts and engineers. Your expertise will be crucial in collaborating with incident response and vulnerability management teams to address product-related security issues and staying ahead of emerging threats and technologies to translate them into actionable strategies. To excel in this role, you should possess a Bachelor's or Master's degree in Computer Science, Cybersecurity, or a related field, along with at least 6 years of experience in application/product security. A deep understanding of secure coding, software architecture, common vulnerabilities, proficiency in multiple programming languages, experience with cloud-native security and containers, as well as strong communication and leadership skills are essential for success. Desired characteristics include industry certifications such as OSCP, CISSP, CSSLP, or GIAC, experience in threat modeling methodologies, familiarity with compliance and regulatory standards, and contributions to open-source security tools or research. By working with Baker Hughes, an energy technology company known for revolutionizing the energy industry, you will have the opportunity to innovate, grow, and contribute to a safer, cleaner, and more efficient future.,
Posted 1 month ago
2.0 - 6.0 years
0 Lacs
karnataka
On-site
The Consultant, Core Cyber Operations - SOC role plays a crucial part in enhancing our security operations by aiding in organization-wide cybersecurity threat detection and response processes. The ideal candidate for this position should possess a strong background in incident response, cybersecurity, security operations, and networking. This job entails being part of a team dedicated to identifying, analyzing, and mitigating cyber threats, ensuring a robust security posture, and ensuring compliance with legal and regulatory standards. Working with minimal supervision, you will be responsible for supporting various functions including security monitoring, incident response, log analysis, threat intelligence utilization, and documentation. In the realm of security monitoring, you will be tasked with continuously monitoring security alerts and events using SIEM tools to spot potential threats. Your role will involve analyzing logs and network traffic to identify anomalies and suspicious activities. During incident response, you will contribute to the initial triage and investigation of security incidents, following predefined protocols to escalate incidents to senior analysts and documenting findings. Additionally, you will conduct detailed log analysis from diverse sources such as EDR, firewalls, IDS/IPS, and servers to identify and investigate security incidents. Leveraging threat intelligence feeds to stay updated about emerging threats, you will apply this knowledge to enhance detection capabilities and refine response strategies. One of your key responsibilities will be documenting security incidents comprehensively, including the steps taken and outcomes, while also creating and maintaining process documentation to ensure consistent and efficient security operations. In terms of qualifications, the essential functions include leading and guiding incident detection, response, and recovery processes to ensure effective management of cyber incidents. You will also oversee the design and operation to ensure situational visibility for all cyber services, encompassing foundational cyber analytics and automation. Building partnerships for third party compromise response activities to address and mitigate risks associated with external entities is another crucial aspect of this role. The minimum requirement for this position is 2 years of relevant work experience, with a typical expectation of 3 years or more of relevant experience. A solid understanding of cybersecurity principles, threat detection, and incident response is essential for success in this role.,
Posted 1 month ago
5.0 - 9.0 years
0 Lacs
noida, uttar pradesh
On-site
As a skilled L2 Network Engineer, you will be responsible for managing escalated network issues, ensuring infrastructure stability, and supporting the deployment and configuration of network devices. Your role will involve handling L2 escalations, troubleshooting complex network problems, configuring and maintaining routers, switches, and firewalls. Monitoring network performance, maintaining network security, and collaborating with L3 support and cross-functional teams will be essential aspects of your responsibilities. Additionally, you will be expected to document configurations and troubleshooting processes, mentor L1 engineers, and share technical knowledge. To excel in this role, you should have a solid understanding of TCP/IP, routing, switching, and firewalls, along with proficiency in working with Cisco devices and tools such as Wireshark and SolarWinds. Knowledge of security practices, incident response, strong communication skills, and effective problem-solving abilities are also crucial for success in this position. This is a full-time technical position based in Noida, requiring 5-8 years of relevant experience. If you are passionate about network engineering, possess the required skills and experience, and are eager to contribute to a dynamic team environment, we encourage you to apply for this opportunity.,
Posted 1 month ago
4.0 - 8.0 years
0 Lacs
haryana
On-site
You are an experienced Infrastructure Security Architect responsible for designing and maintaining secure infrastructure systems to uphold the highest cybersecurity standards within the organization. Your role is crucial in protecting systems and data against emerging threats while ensuring regulatory compliance and operational resilience. Your key responsibilities include safeguarding digital assets, developing Data Loss Prevention (DLP) strategies, detecting and mitigating threats using various tools, leading security incident response processes, conducting risk assessments and security audits, evaluating infrastructure for vulnerabilities, and collaborating with teams to integrate security into systems architecture. To qualify for this role, you need an M.Tech / B.Tech in Computer Science, Information Security, Information Technology, or a related field, along with at least 4 years of professional experience in infrastructure or cybersecurity positions. You should possess a deep understanding of network security, cloud security (AWS/Azure), firewalls, VPNs, IDS/IPS, and encryption protocols, as well as hands-on experience with SIEM, XDR, DLP, vulnerability scanners, and incident response tools. A solid knowledge of compliance, governance, and regulatory frameworks (such as ISO, NIST, PCI DSS) is also required. Preferred certifications for this role include CISSP, CISM, CEH, or related certifications, as well as Cloud Security Certifications like AWS Security Specialty or Azure Security Engineer Associate.,
Posted 1 month ago
4.0 - 12.0 years
0 Lacs
haryana
On-site
As a SOC Manager at UnifyApps in Gurugram, Haryana, you will play a crucial role in leading the establishment and continuous operations of our Security Operations Center (SOC). Your strategic expertise will be instrumental in building a high-performing SOC team from the ground up, defining operational processes, selecting and deploying security tools, and overseeing daily threat detection, incident response, and continuous monitoring efforts. Your responsibilities will include defining the SOC vision, operating model, and roadmap in alignment with organizational security goals. You will be responsible for building and leading the SOC team, which involves tasks such as hiring, training, mentoring, and performance management. Additionally, you will need to select, implement, and integrate essential security technologies including SIEM, SOAR, EDR, threat intelligence platforms, and log management tools. Documenting SOC processes, including incident detection, triage, escalation, response, and reporting workflows will also be a key aspect of your role. In your role, you will oversee 24/7 SOC operations to ensure timely detection, analysis, and response to security threats and incidents. Establishing and maintaining incident response playbooks and standard operating procedures will be crucial in your operations management. Collaboration with IT, DevOps, Risk, and Compliance teams will be essential to ensure end-to-end security visibility and coverage. You will continuously optimize alerting rules, automation, and response capabilities using threat intelligence and lessons learned. Your governance and reporting duties will involve tracking key SOC metrics, presenting regular reports and dashboards to senior leadership on SOC performance, threats detected, and incident trends. Ensuring compliance with internal policies and external regulatory requirements such as ISO 27001, SOC 2, GDPR, etc., will also be part of your responsibilities. Leading post-incident reviews, driving root cause analysis, and implementing improvements will be crucial for maintaining a robust security posture. As a technology leader, you are expected to stay updated with the latest cyber threats, tactics, and techniques to ensure the SOC's preparedness and agility. Evaluating and recommending new tools, frameworks, and methodologies to enhance detection and response capabilities will be part of your role. You will drive the integration and optimization of various data sources and security telemetry into the SOC ecosystem. To qualify for this role, you should have a Bachelor's or Master's degree in Computer Science, Information Security, or a related field. You should have 8-12 years of overall experience in cybersecurity, with at least 3-5 years in SOC operations. Proven experience in setting up and scaling SOC teams and processes from scratch is essential. Hands-on experience with SIEMs, SOAR platforms, EDR tools, and threat intelligence platforms is required. A strong understanding of cyberattack vectors, incident response, and threat hunting methodologies is also necessary. Additionally, you should possess strong leadership and team management skills, excellent problem-solving and analytical abilities, and effective communication and stakeholder management skills across technical and non-technical teams. Experience working in regulated environments is considered a plus. If you are ready to take on this challenging role and contribute to the security operations at UnifyApps, please fill out the application form [here](https://forms.gle/7y5AkKZgKYNYjnU77).,
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
ongole, andhra pradesh
On-site
Are you passionate about cybersecurity and eager to share your expertise We're looking for a knowledgeable and motivated Cybersecurity Mentor to guide aspiring professionals through an intensive 2-month training program. As a Cybersecurity Mentor, you will be responsible for designing and delivering engaging lessons, supervising practical labs, and mentoring students throughout their learning journey. This is a part-time/freelance opportunity perfect for industry experts looking to give back and shape the next generation of cybersecurity professionals. Key Responsibilities: - Conduct 30 comprehensive classes over 2 months (Monday to Friday, 4 classes per week, between 6 PM - 10 PM) - Develop and deliver curriculum covering core cybersecurity topics (Network Security, Cryptography, Ethical Hacking, Web Security, etc.) - Supervise and evaluate practical labs and student projects - Guide students on two major projects and provide mentorship and feedback - Facilitate Q&A sessions and industry insights to enhance learning experience Qualifications: - Proven experience in cybersecurity (minimum 3+ years) in roles such as Security Analyst, Ethical Hacker, Penetration Tester, or similar - Strong knowledge of network security, cryptography, cloud security, and incident response - Prior experience in teaching, mentoring, or training is highly preferred - Excellent communication and presentation skills - Ability to work independently and motivate students What We Offer: - Flexible part-time engagement - Opportunity to influence and inspire future cybersecurity professionals - Competitive honorarium / freelance engagement Interested Apply with your CV and a brief note on your teaching/training experience or send your inquiries to 8712007153,
Posted 1 month ago
8.0 - 12.0 years
0 Lacs
karnataka
On-site
As a Senior Security Analyst/Engineer, you will be responsible for supporting the security operations of our organization by assisting in the monitoring, detection, and response to security incidents. This role offers a blend of security analysis and engineering tasks, allowing you to contribute significantly to the organization's cybersecurity efforts. You will assist in monitoring security events and alerts from various sources, conduct initial analysis of security events, and collaborate with senior analysts to investigate and respond to security incidents. Your role will involve providing technical assistance during security incidents, documenting incident response procedures, and implementing proactive measures to enhance incident detection and response capabilities. Furthermore, you will support the vulnerability management process by assisting in vulnerability scanning, assessment, and remediation efforts. You will prioritize and track the resolution of identified vulnerabilities, collaborate with system owners and IT teams for timely patching and mitigation, and conduct security assessments and penetration tests to identify weaknesses in systems, applications, and network infrastructure. Additionally, you will assist in the administration and configuration of security tools and technologies, participate in the evaluation and testing of new security technologies, optimize the configuration and tuning of security tools, and recommend enhancements based on industry best practices. Qualifications and Skills: - Bachelor's degree in Information Technology, Computer Science, Information Security, or related field - 8-12 years of experience in a cybersecurity role - Strong understanding of cybersecurity principles, threat landscape, and attack methodologies - Proficiency in security tools and technologies such as SIEM, EDR, IDS/IPS, firewalls, and vulnerability scanners - Excellent analytical, problem-solving, and decision-making skills - Effective communication and stakeholder management abilities - Certifications such as CompTIA Security+, CEH (Certified Ethical Hacker), or equivalent are a plus Experience: - Demonstrated experience in conducting security analysis, incident response, and vulnerability management - Hands-on experience with security tool optimization, security assessments, and penetration testing - Proven track record of incident response efforts and managing security incidents effectively Career Development: This role offers a valuable opportunity for career growth in the field of cybersecurity. As you gain experience and proficiency, you will have the opportunity to progress into more specialized roles such as Senior Security Analyst, Incident Responder, or Security Engineer. Continued learning and professional certifications will be encouraged to enhance your skills and knowledge in the cybersecurity domain. Your Team: You will be part of the global cybersecurity team at Carmeuse, which is dedicated to enabling the organization's digitalization strategy without compromising security. The team consists of regional senior security managers and cyber architects based around the globe, with a major presence in the US, Belgium, and Romania. You will work with the cybersecurity team on security design, delivery, and operations to safeguard Carmeuse's digital IT and OT footprint. Your Manager: Victor Alexandrescu, the leader of the team, brings over 20 years of experience to his role. His management style is direct, based on trust and support, with a focus on efficiency and continuous improvement. Victor promotes proactive problem-solving and achieving tangible results, offering a supportive environment for professional growth and development. Join Us: If you are looking for a challenging role in cybersecurity with opportunities for career advancement and skill development, consider joining our team at Carmeuse. We offer a permanent contract, flexible working hours, a home working policy, competitive salary package and benefits, growing possibilities, a strong HR and training policy, and work-life balance. Your contributions will be valued, and you will work alongside experienced professionals in a dynamic and innovative environment. Recruitment Process: If you apply for this position, you will go through a thorough recruitment process that includes resume and cover letter analysis, personality questionnaires, and multiple interviews with the talent acquisition lead, cybersecurity delivery manager, HRBP, and key cybersecurity team members. This process aims to assess your qualifications, motivations, and fit for the role while providing you with insights into our team dynamics and work environment.,
Posted 1 month ago
5.0 - 9.0 years
0 Lacs
noida, uttar pradesh
On-site
At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture, and technology to become the best version of yourself. We are counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself, and contribute to creating a better working world for all. As part of our EY Cyber Security team in the Risk Consulting department, your role will involve the daily monitoring and maintenance of enterprise Data Protection tools/solutions. You will be responsible for the proper administration of Data Protection tools, monitoring and responding to alerts, and collaborating with various teams like IT Operations, Network Operations, Infrastructure, Legal, and Risk Management. We are looking for a Security Analyst in the Risk Consulting team to work on privacy/data protection-related projects globally. You will be expected to ensure the highest quality of work in compliance with EY's standards, coach junior team members, and contribute to creating a positive learning culture. Your key responsibilities will include designing DATA PROTECTION solution concepts, deploying DATA PROTECTION tools, working with vendors to support these technologies, monitoring and responding to alerts, following incident response processes, and supporting clients in privacy-related incident response activities. To qualify for this role, you must have a Bachelor's or master's degree in Computer Science, Information Systems, Engineering, or a related field, along with 5-8 years of experience in supporting Data Security Technology. You should also have experience in Information Security concepts, Data Loss Prevention, CASB Technology support, and administration of DLP and CASB tools from leading vendors. Additionally, you should possess strong analytical skills, excellent communication abilities, and the capacity to work under pressure to meet deadlines. Maintaining current data protection and privacy expertise, as well as the willingness to continuously learn and adapt to a changing environment, are essential for this role. Ideally, you should hold professional certifications such as CompTia Security+, CEH, CISSP, or Vendor/Technical certification. Flexibility to work on weekends, travel as required, and work at client locations are also expected. Working at EY offers you the opportunity to be part of a dynamic team with diverse experience and the chance to work on inspiring projects. You will receive support, coaching, and opportunities for career development. At EY, we aim to build a better working world by creating long-term value for clients, people, and society through assurance and transformative services across various industries globally.,
Posted 1 month ago
8.0 - 12.0 years
0 Lacs
tiruppur, tamil nadu
On-site
As a Network and IT Security Administrator at M. A. Al Abdul Karim & Co, you will be responsible for managing and securing the corporate and regional IT infrastructure. Your role will involve designing, implementing, and maintaining a secure network infrastructure, including VPNs, Firewalls, SD-WAN, and Cisco Call Manager. You will also be managing and monitoring Azure Cloud, virtual machines, M365, Exchange Hybrid, and on-premise servers. Your key responsibilities will include administering security protocols, conducting risk assessments, ensuring compliance with IT security policies, and overseeing the IT operations of multiple regional offices to maintain uptime, performance, and security of all systems. You will lead incident response efforts, proactively mitigate vulnerabilities, and coordinate vendor management and service-level agreements related to IT infrastructure. To be successful in this role, you should have 8+ years of experience in networking, IT security, and infrastructure management. You should possess strong knowledge of firewalls such as Fortinet, Palo Alto, Cisco, SD-WAN, VPN technologies, and network protocols. Hands-on experience with Azure, M365, Exchange Hybrid, and Windows/Linux servers is essential. Additionally, you should have a proven ability to manage multi-site IT environments and excellent troubleshooting, documentation, and communication skills. Join our team at M. A. Al Abdul Karim & Co and contribute to the secure and seamless operation of our IT infrastructure.,
Posted 1 month ago
5.0 - 9.0 years
0 Lacs
karnataka
On-site
As a SOC Lead, you will be responsible for incident detection and response, utilizing tools such as Azure Sentinel SIEM, Splunk, and Microsoft Defender for Endpoint. Your primary tasks will involve investigating high-priority security incidents, determining root causes, and guiding the team in remediation efforts. Furthermore, you will be tasked with creating and refining custom detection rules in Azure Sentinel, monitoring alerts from Microsoft Defender for Endpoint to identify security threats, and documenting security incidents including timelines and outcomes. Your role will also involve collaborating with other SOC team members, IT teams, and external vendors to resolve incidents and provide mentorship to junior analysts. Additionally, you will be conducting forensic analysis on compromised systems, performing threat hunting activities, and contributing to security posture improvement by refining security procedures and optimizing Azure Sentinel and Microsoft Defender for Endpoint configurations. Staying up-to-date with the latest threat intelligence and security trends will be crucial to ensure that tools and strategies evolve with emerging threats. If you are passionate about cybersecurity and have experience in incident response, threat hunting, and security monitoring, we invite you to apply for this challenging and rewarding position in either Bangalore or Mumbai.,
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
chennai, tamil nadu
On-site
Join us as a Cryptography Service Engineer at Barclays, responsible for supporting the successful delivery of Location Strategy projects to plan, budget, agreed quality, and governance standards. You'll spearhead the evolution of our digital landscape, driving innovation and excellence. You will harness cutting-edge technology to revolutionize our digital offerings, ensuring unparalleled customer experiences. To be successful as a Cryptography Service Engineer, you should have experience with: Experience with Certificate Management platforms such as Venafi, Digicert, or Sectigo. PKI (Public Key Infrastructure) Setting up and managing digital certificates and certificate authorities. Incident response knowledge of how to handle breaches or compromises related to cryptographic assets. Proficiency in Linux/Unix and Windows, especially for managing cryptographic systems. Excellent verbal and written communications skills. Some other highly valued skills may include: Experience with HSMs (Hardware Security Modules) like Thales or Entrust for secure key storage. Compliance Knowledge, Expertise in standards such as NIST, FIPS, ISO27001/27002. Strong documentation skills for operational procedures. Familiarity with SharePoint, Confluence, and JIRA. You may be assessed on the key critical skills relevant for success in the role, such as risk and controls, change and transformation, business acumen strategic thinking, and digital and technology, as well as job-specific technical skills. This role is based in Chennai. Purpose of the role To manage and monitor the bank's cryptographic assets, for all use cases, while ensuring the confidentiality, integrity, and authenticity of sensitive data, both through BAU support and On-Call support as part of a 24/7 global team. Accountabilities Collaboration with internal and external customers and stakeholders to understand and identify cryptographic needs across the organization, sharing best practices including solutions to business applications and processes. Execution of security assessments and penetration testing to identify vulnerabilities in cryptographic implementations and procedures and guide the implementation of mitigation strategies and communicate findings to relevant senior stakeholders. Implementation and monitoring of cryptographic solutions used in various banking applications to ensure they function correctly and meet the Cryptography Standard. Development of training content for colleagues to share expertise on cryptographic concepts, best practices, and security procedures in line with Standards and Industry regulations. Contribute to the creation of technical documentation and specifications related to cryptographic designs and implementations. Provision of subject matter expertise in cryptography methodologies. To manage and support the service management of cryptography solutions consumed by the Bank globally, in line with Technology Controls and Standards, including but not limited to Incident/Problem/Change/Vulnerability Management. Understanding of industry cryptographic principles including algorithms, protocols, and technologies including symmetric and asymmetric keys, digital signatures, key exchange, and encryption. Advocate the improvement and implementation of security controls when appropriate. Presentation of complex ideas effectively to technical and non-technical audiences at all levels of Leadership. Assistant Vice President Expectations To advise and influence decision-making, contribute to policy development, and take responsibility for operational effectiveness. Collaborate closely with other functions/ business divisions. Lead a team performing complex tasks, using well-developed professional knowledge and skills to deliver on work that impacts the whole business function. Set objectives and coach employees in pursuit of those objectives, appraisal of performance relative to objectives, and determination of reward outcomes. If the position has leadership responsibilities, People Leaders are expected to demonstrate a clear set of leadership behaviors to create an environment for colleagues to thrive and deliver to a consistently excellent standard. The four LEAD behaviors are: L Listen and be authentic, E Energize and inspire, A Align across the enterprise, D Develop others. OR for an individual contributor, they will lead collaborative assignments and guide team members through structured assignments, identify the need for the inclusion of other areas of specialization to complete assignments. They will identify new directions for assignments and/or projects, identifying a combination of cross-functional methodologies or practices to meet required outcomes. Consult on complex issues; providing advice to People Leaders to support the resolution of escalated issues. Identify ways to mitigate risk and developing new policies/procedures in support of the control and governance agenda. Take ownership for managing risk and strengthening controls in relation to the work done. Perform work that is closely related to that of other areas, which requires an understanding of how areas coordinate and contribute to the achievement of the objectives of the organization sub-function. Collaborate with other areas of work, for business-aligned support areas to keep up to speed with business activity and the business strategy. Engage in complex analysis of data from multiple sources of information, internal and external sources such as procedures and practices (in other areas, teams, companies, etc.) to solve problems creatively and effectively. Communicate complex information. "Complex" information could include sensitive information or information that is difficult to communicate because of its content or its audience. Influence or convince stakeholders to achieve outcomes. All colleagues will be expected to demonstrate the Barclays Values of Respect, Integrity, Service, Excellence, and Stewardship our moral compass, helping us do what we believe is right. They will also be expected to demonstrate the Barclays Mindset to Empower, Challenge, and Drive the operating manual for how we behave.,
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
pune, maharashtra
On-site
As a SOC L2 Analyst with 3 to 6 years of experience, you will be a key player in the Security Operations Center, responsible for managing intricate security incidents, conducting thorough investigations, and guiding L1 analysts. Your role will involve harnessing advanced security tools and technologies to identify, analyze, and address sophisticated cyber threats. Your primary responsibilities will include delving into escalated security incidents, conducting detailed analysis and correlation of security events, and devising strategies to mitigate and resolve incidents effectively. Additionally, you will engage in proactive threat hunting activities, utilizing tools such as Splunk, CrowdStrike, ExtraHop, and Proofpoint to analyze threat intelligence and pinpoint potential risks to the organization. In the realm of endpoint and network security, you will leverage tools like Cisco AMP and CrowdStrike for advanced protection and threat analysis, as well as monitor network traffic using ExtraHop to detect anomalies and potential intrusions. Furthermore, you will be tasked with detailed log analysis and correlation using tools like Splunk, CrowdStrike, and Proofpoint, proposing enhancements to SIEM rules and alerts to bolster detection capabilities. Your role will also involve ensuring cloud security through CASB solutions, collaborating with diverse teams for coordinated response efforts, escalating incidents as necessary, documenting incident findings and actions taken, and providing mentorship to L1 analysts. Additionally, you will stay abreast of the latest cybersecurity threats, trends, and technologies, contributing to the improvement of SOC processes and playbooks. To qualify for this position, you should possess a Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience), along with proficiency in tools like Splunk, CrowdStrike, Proofpoint, ServiceNow, and JIRA. A strong understanding of network and endpoint security principles, experience in incident response, threat hunting, and log analysis, as well as excellent analytical, problem-solving, and communication skills are essential. Moreover, the ability to work under pressure and manage multiple tasks simultaneously is crucial. Preferred certifications for this role include Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), and other relevant cybersecurity certifications. Please note that this role entails working in shifts to ensure 24/7 security monitoring.,
Posted 1 month ago
5.0 - 9.0 years
0 Lacs
maharashtra
On-site
As a Regional Security Manager at Barclays, you will play a crucial role in assisting regional resilience teams by stress testing crisis management plans and providing expertise and leadership on physical security-related scenarios during emergencies. Your responsibilities will include ensuring early identification, assessment, monitoring, and subsequent management of security risks in line with the group risk framework and physical security policies to reduce risks to colleagues and Barclays operations across Mumbai. You will be tasked with implementing policies and standards within the region for the personal protection of at-risk colleagues, including travel and major event security. As the Regional Security Manager, you will have overall accountability, ownership, management, and direction of physical security resources to ensure effective and efficient support to business partners in Mumbai. Additionally, you will be responsible for supplier management of all physical security contracts within Mumbai, developing and managing the security budget for the respective region, and acting as a point of contact for coordinating regional operational risk and audit activities related to physical security controls. To excel in this role, you should have experience in overseeing security incident management within the Mumbai region, supporting crisis management structures, leading physical security-related incidents, and ensuring consistent standard processes are in place for incident monitoring and response. You will also be expected to communicate effectively with various audiences regarding threats, situations, and incidents to ensure stakeholders have a clear understanding of the impact on their operations. Furthermore, your role will involve staying informed about emerging security issues, building relationships with key stakeholders, understanding security risk landscapes, and ensuring compliance with regulatory requirements and internal Barclays policies. Possessing a security-related degree, diploma, or professional security qualifications, as well as membership in recognized professional security bodies, would be advantageous for this position. In addition to the above, having excellent knowledge of leading-edge physical security technology, commercial value drivers, industry best practices, security risk landscapes in India, and physical security & cyber monitoring technologies will be valuable assets in this role. Your success in this role will be evaluated based on key critical skills such as risk and controls, change and transformation, business acumen, strategic thinking, digital and technology skills, and job-specific technical competencies. Overall, the purpose of the Regional Security Manager role is to develop risk management strategies that safeguard the bank's regional sites against various threats. Key responsibilities include managing specialist security services, implementing security policies, developing risk management strategies, creating crisis management and contingency plans, and maintaining stakeholder relationships aligned with the bank's objectives. As a Vice President in this role, you will be expected to advise key stakeholders, manage and mitigate risks, demonstrate leadership, collaborate across functions, analyze complex problems, conduct in-depth research, and build strong relationships to achieve business objectives. All colleagues at Barclays are expected to embody the Barclays Values of Respect, Integrity, Service, Excellence, and Stewardship, and demonstrate the Barclays Mindset of Empower, Challenge, and Drive in their daily actions.,
Posted 1 month ago
5.0 - 9.0 years
0 Lacs
maharashtra
On-site
The Cyberwatcher role involves maintaining expert knowledge of Advanced Persistent Threat (APT) Tools, Techniques, and Procedures (TTPs), as well as forensics and incident response best practices. You will be expected to use threat intelligence and threat models to create threat scenarios, conduct threat-hunting campaigns, and analyze various data sets from diverse sources. Proactive research on systems and networks to identify advanced threats is a crucial aspect of this role. Reporting risk analysis and threat findings to stakeholders, providing automated alerts for emerging threats, and collaborating with different teams to enhance security checks and detection performance are also part of your responsibilities. Participation in PTXs (purple team exercises) to monitor new detection capabilities, managing reports, dashboards, and metrics for CyberSOC KPIs, and presenting findings to senior management and stakeholders are essential tasks. Additionally, working closely with key stakeholders in technology, application, and cybersecurity to develop targeted use cases addressing specific APT behaviors is a key part of this role. As a Cyberwatcher, your performance will be evaluated based on your ability to maintain expert knowledge of APT TTPs, utilize threat intelligence effectively, conduct threat-hunting campaigns, analyze data sets, proactively research threats, report findings to stakeholders, provide automated alerts for threats, collaborate with various teams, participate in PTXs, manage reports and metrics, and develop targeted use cases for APT behaviors. Your success in these areas will contribute to the overall security and effectiveness of the organization's cybersecurity measures.,
Posted 1 month ago
2.0 - 6.0 years
0 Lacs
noida, uttar pradesh
On-site
As a SOC Analyst I EDR at NCG, located in Noida, you will be instrumental in safeguarding the organization's digital assets and ensuring the integrity of information systems. Your role involves monitoring and responding to security incidents to mitigate risks and enhance the overall security posture. Working within a dynamic Security Operations Center (SOC) team, you will collaborate with other analysts and IT professionals to detect, analyze, and respond to cybersecurity threats in real-time. This position offers significant growth opportunities to develop skills in endpoint detection and response (EDR), incident response, and threat intelligence. Key responsibilities include actively monitoring CrowdStrike Falcon EDR alerts and other security tools to identify potential threats, investigating endpoint incidents, collaborating with cross-functional teams for a cohesive security approach, maintaining incident records, contributing to incident response process development, and engaging in continuous training for professional development. The ideal candidate will hold a Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field, with 2-3 years of experience in a Security Operations Center or similar role focusing on endpoint detection and response. Proficiency in CrowdStrike Falcon EDR and familiarity with SIEM tools, incident response methodologies, EDR fundamentals, Windows and Linux operating systems, and networking fundamentals are required. Experience with threat intelligence and vulnerability management tools is considered a plus. NCG (NetConnect Global) is a prominent digital transformation, engineering, and professional services company that collaborates with global enterprises and technology companies to deliver innovative solutions. Established in 1997, NCG enables organizations to reimagine their business models through digitalization strategies. Specializing in Cloud and Infrastructure Solutions, Cybersecurity, Artificial Intelligence & Machine Learning, and Advanced Data Analytics, NCG is committed to operational excellence and ethical standards. With a workforce of over 2,000 employees and a global alumni network exceeding 22,000 professionals, NCG shapes the future of digital enterprises worldwide. NCG offers a comprehensive benefits package to support employees and their families, including family-friendly benefits, robust medical coverage, financial security, and personal support through the Employee Assistance Program. This full-time position requires 2-3 years of experience as a SOC Analyst I EDR with CrowdStrike, based in Noida.,
Posted 1 month ago
5.0 - 9.0 years
0 Lacs
chennai, tamil nadu
On-site
About Radian Generation Radian Generation is a global provider of critical technology-forward services designed specifically to support the comprehensive lifecycle of renewable facilities including solar, wind, and energy storage. Their wide range of commercial, technical, and compliance services provide developers, owners, and operators with critical insights into each aspect of their assets to make better-informed decisions. Job Summary As the SOC Manager at Radian Generation, you will be responsible for overseeing the protection and monitoring of industrial control systems (ICS) and critical infrastructure from cyber threats. Your role will ensure the continuous operation and resilience of Operational Technology (OT) environments by coordinating incident response, threat analysis, and implementing robust security measures tailored to the unique needs of renewable energy generators" OT networks. Role And Responsibilities - Lead and manage the Security Operations Center to ensure efficient and effective 24/7 monitoring of all renewable energy projects. - Develop and implement SOC procedures, protocols, and policies to enhance security operations. - Oversee the detection, analysis, and response to security incidents and threats targeting industrial control systems and critical infrastructure. - Collaborate with internal and external teams to mitigate risks and resolve security incidents promptly. - Monitor and analyze security threats and vulnerabilities specific to solar, wind, and battery OT networks. - Utilize advanced threat detection tools and technologies to identify potential risks to industrial control systems. - Communicate security incidents and resolutions to stakeholders effectively, ensuring clear and concise information flow. - Ensure compliance with industry standards, regulations, and best practices related to cybersecurity for critical infrastructure and OT environments. - Lead and mentor a team of SOC analysts and security professionals. - Provide training and development opportunities to enhance team skills and knowledge in OT security. - Prepare and present regular security reports and incident summaries to management and stakeholders. - Maintain detailed documentation of security incidents, responses, and resolutions, ensuring thorough records for future reference. Qualifications - Bachelors degree in Cybersecurity, Information Technology, or a related field. - Minimum of 5 years of experience in a SOC role, plus at least 1 year of team handling experience. - In-depth knowledge of security operations, incident response, and threat analysis for industrial control systems and critical infrastructure. - Experience with renewable energy projects, particularly solar, wind, and battery storage, is highly desirable. - Strong understanding of industry standards and regulations related to OT cybersecurity. - Excellent leadership, communication, and collaboration skills. - Relevant certifications such as CISSP, CISM, or similar are preferred. Working Conditions This position is based in India and requires working from the office five days a week. Shift Work: This role primarily follows an AM shift but is part of a 24/7 operation center, requiring flexibility to adapt to varying schedules as needed, including occasional evening, weekend, or holiday coverage. Why Join Us - Opportunity to work on cutting-edge renewable energy projects. - Collaborative and innovative work environment. - Competitive salary and benefits package. - Professional development and growth opportunities.,
Posted 1 month ago
3.0 - 7.0 years
0 - 0 Lacs
ahmedabad, gujarat
On-site
Are you passionate about maintaining a secure environment Integrated Facility Management is looking for a dedicated Security Officer to join our team in Sarkhej, Ahmedabad. In this role, you'll be a key player in safeguarding our facility and ensuring the safety of our employees and visitors. As a Security Officer with Integrated Facility Management, you will be entrusted with vital responsibilities to uphold our high standards of security and service. Key Responsibilities Surveillance Monitoring: Actively monitor surveillance cameras and conduct regular patrols to ensure the security of the facility for Integrated Facility Management. Access Control: Manage and control access to the premises, ensuring only authorized personnel are permitted entry at Integrated Facility Management. Incident Response: Respond quickly and effectively to security incidents or emergencies, adhering to established protocols set by Integrated Facility Management. Report Writing: Prepare detailed incident reports, observations, and any irregularities for review by management at Integrated Facility Management. Safety Checks: Conduct routine safety inspections and compliance checks, ensuring adherence to safety regulations at Integrated Facility Management. Visitor Management: Greet, register, and verify visitors, ensuring compliance with security procedures at Integrated Facility Management. Emergency Procedures: Implement emergency response procedures in case of fire, theft, or other emergencies, ensuring a prompt and effective resolution for Integrated Facility Management. Collaboration: Work closely with local law enforcement and emergency services as needed, providing necessary support and information for Integrated Facility Management. Training: Assist in the training of new security staff on procedures and protocols to ensure a high standard of security management at Integrated Facility Management. Customer Service: Deliver exceptional customer service to clients and visitors, addressing any security-related concerns or inquiries at Integrated Facility Management. Requirements Experience: Previous experience as a Security Guard or in a similar security role is preferred but not mandatory for Integrated Facility Management. Skills: Strong observational and problem-solving skills essential for handling security situations effectively at Integrated Facility Management. Communication: Excellent communication skills to interact with staff, visitors, and emergency services at Integrated Facility Management. Alertness: Ability to stay alert and vigilant during shifts, including during night hours if required by Integrated Facility Management. Physical Fitness: Good physical fitness to handle the demands of security duties, including standing for long periods and responding to emergencies for Integrated Facility Management. Ethics: High level of integrity and professionalism, maintaining confidentiality and ethical standards at Integrated Facility Management. Flexibility: Willingness to work various shifts, including weekends and holidays as needed by Integrated Facility Management. Documentation: Capability to maintain accurate records and prepare detailed reports on security activities for Integrated Facility Management. Benefits Competitive Salary: Earn between 25,000 - 30,000 per month, plus performance-based incentives at Integrated Facility Management. Incentives: Attractive performance-based incentives recognizing your contributions and commitment to security at Integrated Facility Management. Career Growth: Opportunities for career advancement and professional development within Integrated Facility Management. Supportive Environment: Join a supportive team at Integrated Facility Management dedicated to maintaining a safe and secure work environment. Apply today to join Integrated Facility Management as a Security Officer and make a difference in ensuring a secure environment in Ahmedabad!,
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
bhopal, madhya pradesh
On-site
As a Cybersecurity Application Security Consultant with a focus on DevSecOps in Bhopal, Madhya Pradesh, you will play a crucial role in ensuring the secure design, development, and deployment of applications by integrating security measures across the SDLC. Your responsibilities will include integrating security into CI/CD pipelines, performing various security testing such as SAST, DAST, IAST, and SCA, conducting threat modeling and security architecture reviews, guiding teams on secure coding practices, and automating security testing using tools like Burp Suite, ZAP, Checkmarx, SonarQube, among others. Additionally, you will be involved in supporting incident response activities and maintaining security documentation. To excel in this role, you should have at least 3 years of experience in application security with a strong focus on DevSecOps. Proficiency in OWASP Top 10, secure coding practices, and vulnerability management is essential. You should be familiar with tools such as Jenkins, GitLab, Azure DevOps, Fortify, and have hands-on experience with scripting languages like Python and Bash, as well as container security technologies like Docker and Kubernetes. Excellent communication and problem-solving skills are also required. Preferred qualifications for this position include a degree in Computer Science, Information Technology, or Cybersecurity, along with certifications like CEH or OSCP. Knowledge of compliance standards such as ISO 27001, NIST, and GDPR, as well as familiarity with programming languages like Java, .NET, Python, and Node.js, would be advantageous. This is a full-time permanent position with a day shift schedule. The work location may vary as it involves being on the road for certain assignments.,
Posted 1 month ago
6.0 - 10.0 years
0 Lacs
karnataka
On-site
As the Security Program Development & Implementation specialist at Phox Health, your primary responsibility will be to plan, develop, and implement our security program in alignment with industry best practices and compliance requirements. You will be entrusted with managing and maintaining the Security Information and Event Management (SIEM) infrastructure to monitor and analyze security events effectively. Additionally, overseeing the implementation of Endpoint Detection and Response (EDR) solutions to detect, investigate, and respond to potential security threats will be a crucial part of your role. Your expertise will be vital in managing Virtual Private Network (VPN) solutions and designing Zero Trust Network (ZTN) architecture to ensure secure access to Phox Health's resources. Continuously monitoring and assessing the security posture of our cloud environments, particularly GCP and AWS, will also fall under your purview. Collaborating closely with application teams to conduct architecture reviews and integrating security best practices into the development lifecycle will be essential tasks. Ensuring all security measures comply with relevant laws, regulations, and standards will be a key responsibility. Conducting regular audits and assessments to maintain compliance, leading the incident response process, including detection, analysis, containment, eradication, and recovery from security incidents, and developing and delivering security training and awareness programs to educate employees on security best practices will also be part of your duties. To be successful in this role, you should hold a Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field, along with a minimum of 6 years of experience in information security engineering or a related role. Proven experience in managing security for cloud environments (GCP, AWS) and relevant certifications such as CISSP, CISM, CEH, AWS Certified Security Specialty, or GCP Professional Cloud Security will be advantageous. Your proficiency in SIEM and EDR tools, strong understanding of VPN and Zero Trust Network principles, expertise in cloud security (especially in GCP and AWS environments), and experience with security compliance frameworks (e.g., ISO 27001, NIST, GDPR, HIPAA) will be essential. Familiarity with scripting and automation, excellent analytical and problem-solving skills, strong communication and interpersonal abilities, collaborative teamwork, leadership in security initiatives, attention to detail, and a proactive approach to security management are qualities that will contribute to your success in this role.,
Posted 1 month ago
7.0 - 11.0 years
0 Lacs
hyderabad, telangana
On-site
Sonatype is the software supply chain security company. We provide the world's best end-to-end software supply chain security solution, combining proactive protection against malicious open source, enterprise-grade SBOM management, and the leading open source dependency management platform. This empowers enterprises to create and maintain secure, quality, and innovative software at scale. As founders of Nexus Repository and stewards of Maven Central, the world's largest repository of Java open-source software, we are software pioneers with unmatched open source expertise. We empower innovation with a commitment to building faster, safer software and leveraging AI and data intelligence to mitigate risks, maximize efficiencies, and drive powerful software development. More than 2,000 organizations, including 70% of the Fortune 100 and 15 million software developers, rely on Sonatype to optimize their software supply chains. About The Role We are seeking a skilled Information Security Engineer to join our team and play a crucial role in securing our digital assets. This role offers an exciting opportunity to work with cutting-edge security tools, collaborate with global teams, and contribute to strengthening our cybersecurity framework. Key Responsibilities - Conduct vulnerability scans, analyze results, and support remediation efforts. - Manage security incidents, including response, resolution, and prevention. - Proactively protect digital assets, mitigating risks before breaches occur. - Implement, configure, and upgrade security tools and systems. - Evaluate, integrate, and configure security technologies to enhance protection. - Collaborate with technical teams, product managers, and third-party vendors on security initiatives. - Respond to cybersecurity alerts, monitor logs, and manage security events. - Perform technical risk assessments on software, tools, and third-party integrations. - Identify vulnerabilities in infrastructure and provide risk-based recommendations. What We're Looking For - 8+ years of experience in software development or security engineering. - 7+ years of experience in DevOps and security operations. - 7+ years handling incident response and escalation. - Strong understanding of vulnerability management and scanning tools. - Familiarity with common security frameworks, protection methods, and DevSecOps. - Experience with SAST, DAST, SCA, or related security testing tools. - Hands-on experience conducting security reviews (architecture, source code, infrastructure). - Experience deploying automated/custom vulnerability scans. - Knowledge of cloud and infrastructure security principles. Bonus Skills (Good To Have) - Knowledge of web application security (e.g., OWASP Top 10). - Understanding of security architecture principles. - Familiarity with threat modeling frameworks and security assessments. - Relevant certifications such as SANS Certifications: GSEC, GCIH, GCLD, GCID, GMON and (ISC) Certifications: CISSP, CC, SSCP, CCSP, CAP, CSSLP. Why Join Us - Work with a global team at the forefront of cybersecurity. - Exciting career growth opportunities with industry-leading experts. - Work-from-home flexibility with a strong work-life balance. - Continuous learning and certification support to advance your skills.,
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
hyderabad, telangana
On-site
You will be joining RSM, a leading provider of professional services to the middle market globally, with a focus on instilling confidence in a world of change and enabling clients and employees to achieve their full potential. The exceptional team at RSM creates an inclusive culture that values talent and provides a compelling experience for clients. As an associate in Risk Consulting in Hyderabad, Telangana, you will play a key role in supporting ongoing security operations for RSM clients across various industries and locations. Your responsibilities will include investigating security incidents using tools such as SIEM, automation, and cybersecurity technologies like ServiceNow, Stellar Cyber, Hyas Insight, and DNS Protect. You will analyze and escalate critical security incidents, improve existing processes, and challenge procedures in an agile and fast-paced information security environment. Additionally, you will process IDS alerts, perform vulnerability scans, conduct malware analysis, and handle incident intake and reporting of cyber events and threat intelligence. To excel in this role, you should have a minimum B.A. or B.S. degree in computer science, information technology, or a related field, along with 3-5 years of experience in a security operations center or threat intelligence capacity. Possessing a security industry certification such as CYSA+, Security+, CISSP, or SANS GIAC is preferred. A strong understanding of security standards, compliance frameworks, and best practices, including SSAE 16, SOC 2, SOC3, OWASP Top 10, and NIST, is essential. You should also have a curious mindset, basic knowledge of cloud technologies, and experience with operating systems like Windows and Linux. At RSM, we offer a competitive benefits and compensation package, along with flexibility in your schedule to help you balance work and personal life. If you are passionate about cybersecurity and enjoy working in a collaborative team environment, this opportunity to join RSM's Risk Consulting team in Hyderabad, Telangana, may be the perfect fit for you. Apply now to be a part of a dynamic and inclusive organization where your skills and expertise will be valued and nurtured.,
Posted 1 month ago
0.0 - 4.0 years
0 Lacs
karnataka
On-site
As the global leader in materials engineering solutions, Applied Materials plays a crucial role in producing advanced display and semiconductor chips that power the devices we use daily. Our cutting-edge equipment facilitates the manufacturing processes for these essential components, driving innovation in technologies like AI and IoT that shape our interconnected world. If you are passionate about pushing the boundaries of science and engineering to create a better future, join us in our mission to Make Possible. At Applied, we prioritize the well-being of our employees and their families, fostering a work environment where you can thrive. Our comprehensive benefits and wellness programs are designed to support your happiness, health, and resilience, enabling you to bring your best self to work. We are committed to providing opportunities for personal and professional growth, both within the company and beyond. Join us and become part of a culture that encourages learning, development, and innovative solutions for our customers. Key Responsibilities: - Assist in identifying, analyzing, and managing the organization's cybersecurity asset attack surface. - Conduct regular asset discovery and inventory to ensure comprehensive visibility of all digital assets. - Monitor and assess vulnerabilities across the attack surface, prioritizing remediation efforts based on risk. - Collaborate with cross-functional teams to implement security controls and mitigate identified risks. - Support incident response activities by providing asset-related information and analysis. - Maintain and update asset management databases and documentation. - Assist in the development and implementation of security policies and procedures related to asset management. - Stay up-to-date with the latest cybersecurity trends, threats, and best practices. - Perform regular audits of asset management processes to ensure compliance with internal and external standards. - Develop and deliver training sessions for staff on asset management best practices and security awareness. - Generate detailed reports and dashboards to communicate asset management metrics and risk assessments to stakeholders. - Participate in security assessments and penetration testing to identify potential vulnerabilities. - Assist in the integration of new tools and technologies to enhance asset management capabilities. - Provide support for regulatory compliance efforts by ensuring accurate asset tracking and documentation. Qualifications and Skills: - Bachelor's degree in Cybersecurity, Information Technology, or a related field. - Basic understanding of cybersecurity principles and practices. - Familiarity with asset management tools and techniques. - Strong analytical and problem-solving skills. - Excellent communication and teamwork abilities. - Detail-oriented with a proactive approach to identifying and addressing security issues. - Relevant certifications (e.g., CompTIA Security+, CISSP) are a plus. Additional Information: - Time Type: Full time - Employee Type: Assignee / Regular - Travel: No - Relocation Eligible: Yes,
Posted 1 month ago
5.0 - 9.0 years
0 Lacs
karnataka
On-site
As a Firewall Management specialist, you will be responsible for configuring and managing Paloalto, ASA, and Fortinet firewall devices to ensure compliance with security policies. Your primary duties will include monitoring network traffic for any suspicious activity, implementing VPN solutions for secure remote access, and efficiently troubleshooting network security incidents. You will play a crucial role in providing Level 3 support for firewall-related issues, conducting regular system backups and updates, and documenting firewall configurations and incidents for compliance purposes. Collaboration with IT teams to establish and enforce security best practices will be essential, along with analyzing security alerts in real-time and assisting in the design of firewall architecture and network segmentation. In addition, you will be expected to conduct vulnerability assessments and penetration testing, stay informed about the latest Fortinet technologies and security trends, and actively participate in incident response activities and post-mortem analysis. Educating end-users on security policies and practices, preparing reports on firewall performance and security events, and engaging with clients to address security-related inquiries will also be part of your responsibilities.,
Posted 1 month ago
2.0 - 6.0 years
0 Lacs
haryana
On-site
We are looking for an experienced GCP Security Engineer who will be responsible for designing, implementing, and managing security solutions within Google Cloud Platform (GCP). The ideal candidate should possess a thorough understanding of cloud security best practices, compliance frameworks, and practical experience with GCP security services. Your main responsibilities will include designing secure cloud architectures on GCP in adherence to security best practices and standards such as CIS Benchmarks and NIST guidelines. You will also be tasked with integrating security by design across cloud services and applications. In addition, you will deploy and configure various GCP security services like Cloud IAM, VPC Service Controls, Cloud Armor, Security Command Center, Cloud KMS, and Cloud HSM. Regular vulnerability assessments and penetration testing on GCP resources will be part of your routine, along with remediating identified vulnerabilities and providing security recommendations. Ensuring GCP environment compliance with security standards such as ISO 27001, SOC 2, HIPAA, and GDPR will be essential. You will also be involved in supporting internal and external security audits and implementing remediation plans. Automation of security tasks using scripting languages like Python, Bash, and infrastructure-as-code tools such as Terraform and Cloud Deployment Manager will be required. Furthermore, you will configure and manage security logging and monitoring tools for detecting, analyzing, and responding to security events. Collaboration with engineering, operations, and development teams to integrate security into the software development lifecycle (DevSecOps) is crucial. You will also communicate security best practices to technical and non-technical stakeholders. Staying up-to-date on the latest GCP security features, vulnerabilities, and emerging threats is expected. You will evaluate and recommend new security tools and technologies. In the event of security incidents, you will participate in security incident response activities, including investigation, containment, eradication, and recovery. The required qualifications for this role include a Bachelor's degree in Computer Science, Information Security, or a related field, along with 5+ years of experience in IT security focusing on cloud security. A minimum of 2 years of hands-on experience with GCP security services and best practices is necessary. Strong knowledge of cloud security concepts, principles, and technologies is also essential, along with experience in security hardening, vulnerability management, and incident response. Familiarity with security compliance frameworks and regulations such as ISO 27001, SOC 2, HIPAA, and GDPR is required. Excellent communication and collaboration skills are a must, and possessing a GCP Security Engineer or Professional certification is preferred. Bonus qualifications for this role include experience in Insights Management for reporting and security analytics, strong knowledge of SQL to support Big Data teams in managing and securing large-scale data environments, and familiarity with data visualization tools for security insights such as Looker and Tableau.,
Posted 1 month ago
5.0 - 10.0 years
0 Lacs
navi mumbai, maharashtra
On-site
Eventus Security is a prominent cybersecurity solutions provider specializing in threat detection, incident response, and managed security services. The organization aims to assist clients in proactively securing their digital assets through cutting-edge technologies and expert-driven services. By prioritizing innovation and trust, Eventus Security empowers businesses to remain resilient in the constantly evolving cyber threat landscape. The ideal candidate for the position of Security Lead (L3) SOC at Eventus Security should possess 5-10 years of relevant experience. The job locations for this role are Navi Mumbai and Ahmedabad. Key Responsibility Areas: Security Incident Leadership: - Take charge of high-priority security investigations and incident response activities. - Ensure accurate analysis, containment, remediation, and post-incident reporting. Operational Oversight: - Supervise day-to-day Security Operations Center (SOC) operations. - Manage shift handovers, escalation procedures, and ensure continuous operations in a 24/7 environment serving global customers. Technical Expertise: - Serve as the escalation point for complex threats and security incidents. - Conduct in-depth analysis of logs, packets, malware, and behavioral patterns using EDR, XDR, SIEM, and forensic tools. Threat Detection and Hunting: - Proactively hunt for threats using various data sources and tools. - Develop and optimize detection use-cases, correlation rules, and playbooks to enhance threat visibility and decrease dwell time. Process & Playbook Management: - Develop, refine, and enforce standard operating procedures (SOPs), playbooks, and incident response workflows. - Drive consistent and measurable outcomes through effective process management. Customer Engagement: - Engage with global stakeholders, particularly clients from the US and Canada. - Provide clear incident briefings, RCA reports, and advisory support to clients. Collaboration and Mentorship: - Mentor L1 and L2 analysts and facilitate training sessions. - Support skill development across shifts to enhance team capabilities. Continuous Improvement: - Participate in tuning detection content and tool configurations. - Support red/blue/purple team exercises to enhance SOC maturity. Documentation and Reporting: - Maintain high-quality documentation of incidents, processes, and technical findings. - Contribute to executive and operational reporting to ensure transparency and accountability.,
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |