Jobs
Interviews

1461 Incident Response Jobs - Page 33

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 12.0 years

0 Lacs

noida, uttar pradesh

On-site

As a Practice Delivery Executive (PDE) at NTT DATA, you will play a crucial role in overseeing the end-to-end delivery of all NTT Data services for a specific client. Your responsibilities will include ensuring the delivery quality, client satisfaction, crisis management, and the development of client improvement plans. You will be expected to leverage industry best practices and thought leadership to drive client transformation, delivery excellence, profitable growth, and year-over-year cost reductions. Your role will also involve managing financial aspects such as revenue/cost/margin forecasts, cost management, and ramp-up/ramp-down of resources aligned with annual operating plans. Collaborating with the Client Executive, you will develop customer relationships, manage relationship risks, and act as a strategic delivery advisor to the executive leadership team. Additionally, you will be responsible for maintaining effective communication with stakeholders, conducting customer governance meetings, and staying abreast of global industry trends. To be successful in this role, you must have at least 8 years of experience in IT support, production escalations, end-to-end project management, and highly leveraged service environments. Knowledge of ITIL Foundations v4, application development, support services, and digital transformation leveraging A.I. will be essential. Strong leadership skills, the ability to work across multiple time zones, and effective communication skills are imperative for this position. Preferred qualifications include advanced degrees in Information Technology, Computer Science, Software Engineering, or Cybersecurity, along with ITIL Foundations v4 certification. NTT DATA is a global innovator of business and technology services, committed to helping clients innovate, optimize, and transform for long-term success. Join us to be part of a diverse team of experts dedicated to driving digital and AI infrastructure solutions worldwide.,

Posted 1 month ago

Apply

4.0 - 8.0 years

0 Lacs

maharashtra

On-site

As a Database Security and Vulnerability Management professional, you will play a crucial role in ensuring the security of our esteemed client's databases. This immediate position based in Mumbai, BKC requires your expertise in Database Security Audit. Your primary responsibilities will include conducting security audits, vulnerability assessments, and ensuring database hardening to protect sensitive data. To excel in this role, you must possess a deep understanding of various database platforms such as Oracle, SQL Server, MySQL, PostgreSQL, and MongoDB. Proficiency in database architecture, schemas, and access controls is essential for implementing effective security measures. Your experience in security auditing and compliance standards like PCI-DSS, GDPR, HIPAA, and SOX will be valuable in assessing database security risks. You will be expected to apply hardening guidelines, manage user roles and permissions, and implement access control mechanisms to safeguard database resources. Proficiency in writing SQL queries and scripts for auditing purposes, along with the ability to identify vulnerabilities through SQL logs, is crucial for this position. In addition to vulnerability management and patching, you will be responsible for monitoring database events, implementing logging mechanisms, and ensuring backup and recovery processes are in place to secure critical data. Your knowledge of networking, firewalls, and incident response procedures will be instrumental in protecting databases from potential threats and responding to security incidents effectively. Strong communication skills are a must-have for this role, as you will be required to document findings, prepare reports, and communicate security recommendations to stakeholders. Your expertise in database security, vulnerability assessment, and a proactive approach to security measures will contribute significantly to our client's data protection efforts. If you are passionate about database security, possess the required skills, and are eager to make a positive impact in a dynamic work environment, we look forward to receiving your application for this Database Security Audit position.,

Posted 1 month ago

Apply

6.0 - 10.0 years

0 Lacs

pune, maharashtra

On-site

The role requires a Data Security professional with strong experience in DLP (Data Loss Prevention) solutions, policy creation, and incident response. You will be responsible for designing and analyzing DLP policies, utilizing data security tools like DLP and CASB, and optimizing the DLP process to detect false-positive events. Your technical skills should include proficiency in ITIL Foundation, incident management, and hands-on experience in security incident response. Additionally, you should possess coordination skills to collaborate with various business units during DLP events and incidents, along with the ability to handle internal data securely and communicate effectively with different teams. The ideal candidate should have formal education or equivalent experience in Information Security, Cybersecurity, or related fields, with at least 5-7 years of relevant experience in data security and incident response. Knowledge of GDPR requirements, common operating systems, and exposure to enterprise-scale organizations in finance or similar sectors would be beneficial. UST, a global digital transformation solutions provider, is seeking a candidate who can contribute to their mission of making a real impact through transformation. If you have a passion for technology, innovation, and collaboration, and are ready to join a dynamic team, this opportunity may be the perfect fit for you.,

Posted 1 month ago

Apply

2.0 - 6.0 years

0 Lacs

navi mumbai, maharashtra

On-site

You have a fantastic opportunity to join our team as a SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting professional with a minimum of 2 years of relevant experience. As a part of our team, you will be responsible for conducting Vulnerability assessment & Penetration testing (VAPT) as per the bank's regulatory and operational requirements. This includes External Penetration Testing of Bank's internet-facing Web, Mobile, Web services, Network, and Infrastructure on a periodic basis as per Bank's provided schedules. Your key roles and responsibilities will also include maintaining an up-to-date inventory of IT assets, regularly scanning and assessing systems for vulnerabilities, prioritizing vulnerabilities based on the risk and potential impact, conducting Continuous breach attack simulations, SCD (Secure Configuration Document) verifications, Anti-Malware & Malicious Content Scan, near real-time detection and monitoring of emerging vulnerabilities, and defining and measuring metrics to track the effectiveness of the VM program. To excel in this role, you are required to have a Professional Qualification and a certification such as Certified SOC Analyst (ECCouncil), Computer Hacking Forensic Investigator (ECCouncil), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH), or equivalent. Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA are preferred. If you have 2 to 5 years of experience in the field and are looking for a challenging opportunity in Navi Mumbai on a Fixed-Term Contract basis with a Face-to-Face interview type, then this role is perfect for you. Join us and be a part of a dynamic team dedicated to ensuring the security and integrity of our systems and data.,

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

navi mumbai, maharashtra

On-site

The role is based in Navi Mumbai and you will be required to attend a Face to Face Drive on 5th July (Saturday), with all rounds of the interview process scheduled for the same day. The ideal candidate should have an immediate to 45 days" notice period. Your main responsibilities will include round-the-clock threat monitoring and detection, as well as the analysis of any suspicious, malicious, and abnormal behavior. You will be responsible for alert triage, initial assessment, incident validation, severity determination, and urgency evaluation. Additionally, you will need to prioritize security alerts and create Incidents following Standard Operating Procedures (SOPs). It will be your duty to report and escalate incidents to stakeholders and conduct post-incident analysis. You will be expected to consistently triage incidents and provide recommendations using playbooks. Furthermore, you will be required to develop and maintain incident management and incident response policies and procedures. Part of your role will involve the preservation of security alerts and security incident artifacts for forensic purposes. You must adhere to Service Level Agreements (SLA) and Key Performance Indicators (KPIs) and work towards reducing the Mean Time to Detection and Response (MTTD & MTTR).,

Posted 1 month ago

Apply

2.0 - 6.0 years

0 Lacs

hyderabad, telangana

On-site

You are a Cybersecurity Implementation Engineer with at least 2 years of relevant experience, specializing in customer parser development, Yara rules creation, playbook implementation, and data ingestion techniques. In this role, you will be involved in designing and implementing cutting-edge cybersecurity solutions while collaborating with a team of skilled professionals. Your responsibilities will include developing custom parsers to extract and normalize data from various sources, designing and maintaining Yara rules for threat detection, creating playbook automation for incident response, and implementing data ingestion pipelines for analyzing security data. You will work closely with cross-functional teams to understand customer requirements, identify emerging threats, and provide technical support during security incident response activities. To qualify for this position, you should hold a Bachelor's degree in Computer Science, Information Security, or a related field. You must have hands-on experience in cybersecurity, data analysis, detection engineering, and implementing custom parsers for log and data normalization. Proficiency in creating and managing Yara rules, designing playbook automation, and utilizing tools like Demisto and Phantom is essential. Additionally, you should be familiar with data ingestion technologies, SIEM solutions such as Splunk and ELK, and possess excellent analytical, troubleshooting, and communication skills. If you are a dedicated cybersecurity professional with expertise in customer parser development, Yara rules creation, playbook implementation, and data ingestion techniques, we invite you to join our team. Help us in our mission to safeguard our organization and customers from cyber threats by sharing your updated profile at naveen.vemula@netenrich.com.,

Posted 1 month ago

Apply

4.0 - 8.0 years

0 Lacs

haryana

On-site

As an Infrastructure Security Architect at our organization, you will be responsible for designing and maintaining secure infrastructure systems to uphold the highest cybersecurity standards. Your role will be crucial in safeguarding systems and data against emerging threats, ensuring regulatory compliance, and maintaining operational resilience. You will play a key role in protecting digital assets from unauthorized access, disruptions, or misuse to maintain confidentiality, integrity, and availability. Developing and managing Data Loss Prevention (DLP) strategies will be essential to safeguard sensitive data both in motion and at rest. Additionally, you will be required to detect, analyze, and mitigate threats using tools such as XDR, Dark Web Hunting, and other threat intelligence solutions. Leading security incident response processes including investigation, containment, remediation, and post-mortem analysis will be part of your responsibilities. Regular risk assessments and security audits will also be conducted to ensure compliance with established standards like NIST, ISO 27001, or GDPR. Your role will involve evaluating existing and planned infrastructure to identify vulnerabilities and recommend architectural enhancements, along with collaborating across teams to integrate security by design principles into systems architecture. To qualify for this position, you should hold an M.Tech/B.Tech degree in Computer Science, Information Security, Information Technology, or a related field, and have at least 4 years of professional experience in infrastructure or cybersecurity roles. A deep understanding of network security, cloud security (AWS/Azure), firewalls, VPNs, IDS/IPS, and encryption protocols is necessary. Hands-on experience with SIEM, XDR, DLP, vulnerability scanners, and incident response tools will be beneficial. A strong grasp of compliance, governance, and regulatory frameworks such as ISO, NIST, and PCI DSS is also required. Preferred certifications for this role include CISSP, CISM, CEH, or related certifications, as well as Cloud Security Certifications like AWS Security Specialty or Azure Security Engineer Associate. Join our team and contribute to enhancing our organization's cybersecurity posture while ensuring the integrity of our infrastructure and data.,

Posted 1 month ago

Apply

2.0 - 7.0 years

1 - 5 Lacs

Mumbai, Navi Mumbai, Mumbai (All Areas)

Work from Office

JD: 2+ Years of Industry experience, daily hands-on activities of the incident response and analysis. Must be good in managing Incident Responses. Good understanding of cybersecurity concepts, threat types, and attack vectors. Familiarity with SIEM tools (e.g., Splunk, QRadar), firewalls, and endpoint protection. Knowledge of TCP/IP, DNS, HTTP, and other networking protocols. Strong analytical and communication skills. Willingness to work in rotational shifts, including nights and weekends. Monitor security alerts and events from SIEM, IDS/IPS, antivirus, and other security tools. Perform initial triage of security incidents to assess severity and potential impact. Escalate confirmed incidents to L2 analysts with relevant context and evidence. Assist in gathering logs, screenshots, and other artifacts for incident documentation. Follow predefined playbooks and standard operating procedures (SOPs) for incident handling. Maintain accurate and timely records of all incident-related activities. Support evidence collection and ensure logs are preserved for further analysis. Coordinate with internal IT teams for basic containment actions (e.g., isolating endpoints). Participate in shift-based operations to ensure 24x7 monitoring coverage. Role & responsibilities Preferred candidate profile 2+ Years of Industry experience, daily hands-on activities of the incident response and analysis. Must be good in managing Incident Responses. Good understanding of cybersecurity concepts, threat types, and attack vectors. Familiarity with SIEM tools (e.g., Splunk, QRadar), firewalls, and endpoint protection. Please fill below forms if you are interested for the same https://forms.cloud.microsoft/r/v0S2BXfWim

Posted 1 month ago

Apply

11.0 - 14.0 years

55 - 60 Lacs

Noida, Ahmedabad, Mumbai (All Areas)

Work from Office

Dear Candidate, We are looking for a skilled Cybersecurity Analyst to monitor, detect, and respond to security threats. If you have expertise in threat intelligence, SIEM tools, and incident response, wed love to hear from you! Key Responsibilities: Monitor network traffic and systems for potential security threats. Investigate and analyze security incidents to prevent breaches. Implement security controls and best practices for data protection. Manage security tools such as SIEM, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and recommend mitigation strategies. Ensure compliance with security standards like ISO 27001, NIST, and GDPR. Required Skills & Qualifications: Strong knowledge of security frameworks and incident response. Experience with SIEM tools (Splunk, QRadar, ArcSight). Proficiency in scripting (Python, Bash, PowerShell) for security automation. Understanding of network protocols, firewalls, and VPN security. Knowledge of penetration testing and ethical hacking techniques. Soft Skills: Strong analytical and problem-solving skills. Excellent attention to detail and ability to work under pressure. Good communication and teamwork skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Delivery Manager Integra Technologies

Posted 1 month ago

Apply

3.0 - 8.0 years

6 - 9 Lacs

Noida

Work from Office

Monitor SIEM alerts and conduct incident detection/response. Collaborate within SOC, automate remediation, refine detection blocks, and support cyber defense initiatives. Required Candidate profile 3–5 yrs in SIEM, incident response, log analysis. Bachelor's in CS/IT/Cybersecurity. Security certification preferred (Security+, SC200). Python/PowerShell automation experience a plus.

Posted 1 month ago

Apply

5.0 - 9.0 years

0 Lacs

surat, gujarat

On-site

The primary role of this position involves identifying, drafting, documenting, and continuously updating Information Security Policies & processes. You will be responsible for providing training, communication, awareness, and handling queries related to Information Security Policies & processes. Additionally, you will be involved in evaluating and testing existing security measures and mechanisms, as well as responding to incidents based on established standards. Designing, implementing, and maintaining DR / BCP strategies will also be a key responsibility. In this role, you will be expected to establish audit trails and develop reporting mechanisms, as well as coordinate the implementation and development of system developments and controls. Conducting audits of Information Security-related rights, logs, reports, etc., and reporting instances will be part of your duties. You will also be responsible for executing delegated tasks for Information Security and reporting to the IS Committee on the progress and implementation of various IS policies & processes. The ideal candidate should have a total experience of 60 months and hold a qualification of M.SC, MBA/PGDM, or MCA. The desired area of expertise for this role is being INFORMATION SECURITY CERTIFIED. The preferred gender for this position is male, and the job function falls under GRC. This job is based in Surat and does not require an audio/video profile.,

Posted 1 month ago

Apply

2.0 - 6.0 years

0 Lacs

pune, maharashtra

On-site

As a Level 2 SOC Security Analyst at Airtel, you will be responsible for conducting information security investigations in response to security incidents identified through various SOC entry channels such as SIEM, Tickets, Email, and Phone. You will act as a point of escalation to provide guidance and oversight on incident resolution and containment techniques. Your role will involve creating and maintaining SOC run books for SIEM tools, coordinating responses to information security incidents, and mentoring security analysts on various operational tasks related to risk management, information security controls, incident analysis, incident response, and SIEM monitoring. You will be required to document incidents from initial detection through final resolution, participate in vulnerability management, and assist in evaluating, recommending, implementing, and troubleshooting security solutions for new IT infrastructure systems. Effective communication with customers, teammates, and management is essential, along with preparing Monthly Executive Summary Reports for managed clients. Additionally, you will provide recommendations for tuning and optimizing security systems, SOC security processes, procedures, and policies. Your responsibilities will also include defining, creating, and maintaining SIEM correlation rules, customer build documents, security processes, and procedures while following ITIL practices for incident, problem, and change management. Staying up to date with emerging security threats and regulatory security requirements is crucial for this role. Preferred qualifications include Information Security professional designations such as CEH and CompTIA Security+. You will also be expected to perform other responsibilities and additional duties as assigned by the SOC Manager.,

Posted 1 month ago

Apply

4.0 - 9.0 years

0 Lacs

pune, maharashtra

On-site

You are a SAP Operations Engineer with 4 to 9 years of experience, specializing in SAP HANA and GCP. Your primary responsibility is to manage, monitor, and optimize SAP landscapes deployed in the cloud, focusing on ensuring uptime, performance, and operational efficiency of critical business SAP environments. Your key responsibilities include monitoring SAP systems on GCP, such as S/4HANA and HANA DB, performing routine maintenance, health checks, and patching activities, managing incident response, troubleshooting, and escalation procedures, as well as collaborating with GCP infrastructure and SAP Basis teams for continuous optimization. Your must-have skills include a strong background in managing SAP environments on GCP, deep understanding of SAP HANA administration and HA/DR setups, and proficiency in SAP system monitoring tools and logs. Preferred skills include experience with automation tools and alerting frameworks like Stackdriver and Prometheus, familiarity with backup/recovery processes, and knowledge of GCP IAM/roles. In addition to technical skills, soft skills such as being process-driven, dependable, and collaborative are essential for this role. You should also be proactive in identifying operational improvements to ensure smooth and resilient SAP operations on the cloud. Joining this role will give you the opportunity to work with modern tools to drive infrastructure excellence and support high-performing SAP systems for enterprise clients.,

Posted 1 month ago

Apply

5.0 - 9.0 years

0 Lacs

haryana

On-site

As an IT Security Architect Engineer with 5-8 years of experience, your role is to design and implement comprehensive security strategies to protect IT systems and ensure compliance with industry standards. Your focus will be on proactive risk management and creating a secure operational environment. You will be responsible for developing and implementing robust security frameworks for IT systems, applications, and networks. This includes conducting assessments and audits to identify and mitigate security risks effectively. In addition, you will establish and enforce security standards to ensure adherence to industry regulations and best practices. You will also monitor, analyze, and resolve security incidents while implementing corrective measures as part of incident response. Collaborating with teams to integrate security measures and promote a culture of security awareness is a key aspect of your role. You will also need to stay updated on emerging threats and technologies to continuously improve the organization's security posture. To excel in this role, you should possess behavioral competencies such as problem-solving, attention to detail, communication, adaptability, teamwork, critical thinking, technical knowledge, and presentation skills. Qualifications required for this position include an M.TECH or B.TECH degree.,

Posted 1 month ago

Apply

7.0 - 12.0 years

9 - 14 Lacs

Gurugram

Work from Office

Company Overview Incedo is a US-based consulting, data science and technology services firm with over 3000 people helping clients from our six offices across US, Mexico and India. We help our clients achieve competitive advantage through end-to-end digital transformation. Our uniqueness lies in bringing together strong engineering, data science, and design capabilities coupled with deep domain understanding. We combine services and products to maximize business impact for our clients in telecom, Banking, Wealth Management, product engineering and life science & healthcare industries. Working at Incedo will provide you an opportunity to work with industry leading client organizations, deep technology and domain experts, and global teams. Incedo University, our learning platform, provides ample learning opportunities starting with a structured onboarding program and carrying throughout various stages of your career. A variety of fun activities is also an integral part of our friendly work environment. Our flexible career paths allow you to grow into a program manager, a technical architect or a domain expert based on your skills and interests. Our Mission is to enable our clients to maximize business impact from technology by Harnessing the transformational impact of emerging technologies Bridging the gap between business and technology Role Description Position Description: Incedo is seeking a SOC Analyst (L3/Tier 3/Threat Hunter) to join our rapidly growing cybersecurity team! Role and responsibilities: Participate in a rotating SOC on-call; rotation is based on the number of team members. Provide first-line SOC support with timely triage, routing and analysis of SOC tasks. Researches, develops, and monitors custom visualizations. Researches, analyzes, and writes documents such as cybersecurity briefings for all levels of stakeholders from Tier 1-3 SOC, security engineering, and executives. Tunes and develops SIEM correlation logic for threat detection. Ensures documentation is accurate and complete, meets editorial and government specifications, and adheres to standards for quality, graphics, coverage, format, and style. Develop scripts using Python to automate IR functions, including (but not limited to) IOC ingestion and SIEM integration via REST APIs to minimize repetition of duties and automate tasks. Produce and review aggregated performance metrics. Perform Cyber Threat Assessment and Remediation Analysis Processing, organizing, and analyzing incident indicators retrieved from the client environment and correlating said indicators to various intelligence data. Assisting in the coordination with internal teams as well as in the creation of engagement deliverables for a multitude of activities, including but not limited to Insider Threats, Rule of Engagement (ROE), Threat Hunting, After Action Reports, and other artifacts to support testing, monitoring and protecting the enterprise. Investigate network and host detection and monitoring systems to advise engagement processes.Develop and Execute bash and python scripts to process discrete log files and extract specific incident indicators; develop tools to aid in Tier 1 and Tier 2 functions. Participate in on-call rotation for after-hours security and/or engineering issues. Participate in the increase of effectiveness and efficiency of the SOC, through improvements to each function as well as coordination and communication between support and business functions. Think critically and creatively while analyzing security events, network traffic, and logs to engineer new detection methods. Work directly with Security and SOC leadership on cyber threat intelligence reports to convert intelligence into useful detection. Technical Skills Required Experience / Skills: Minimum of nine (9) years technical experience 7+ years of experience in SOC, security operations, cyber technical analysis, threat hunting, and threat attribution assessment with increasing responsibilities. 3+ years of rule development and tuning experience 1+ years of Incident response Deep understanding of Cyber Threat TTPs, Threat Hunt, and the application of the MITRE Attack Framework Knowledge of security operations and attacker tactics Ability to identify cyber-attacks and develop monitoring logic Experience supporting 24x7x365 SOC operations including but not limited to Alert and notification activities- analysis/triage/response, Review and action on Threat Intel for IOCs and other operationally impactful information, initial review and triage of reported alerts and Incidents. Support alert and notification triage, review/analysis through resolution / close Manage multiple tickets/alerts in parallel, including end-user coordination. Demonstrated ability to evaluate events (through a triage process) and identify appropriate prioritization for response. Solid understanding and experience analyzing security events generated from security tools and devices not limited to QRadar, MS Sentinel, FireEye, Elastic, SourceFire, Malware Bytes, CarbonBlack/Bit9, Splunk, Prisma Cloud/Compute, Cisco IronPort, BlueCoat Experience and solid understanding of Malware analysis Demonstrated proficiencies with one or more toolsets such as QRadar, MS Sentinel, Bit9/CarbonBlack, Endgame, FireEye HX / CM / ETP, Elastic Kibana Experience and ability to use, contribute, develop and follow Standard Operating Procedures (SOPs) Nice-to-have skills In-depth experience with processing and triage of Security Alerts from multiple sources but not limited to: Endpoint security tools, SIEM, email security solutions, CISA, Threat Intel Sources Experience with scripting languages applied to SOC operations; for example, automating investigations with tools, automating IOC reviews, support SOAR development. Experience with bash, python, and Windows PowerShell scripting Demonstrated experience with triage and resolution of SOC tasks, including but not limited to vulnerability announcements, phishing email review, Tier 1 IR support, SIEM/Security Tools - alert analysis. Demonstrated experience and understanding of event timeline analysis and correlation of events between logs sources. Demonstrated experience with the underlying logs generated by operating systems (Linux/Windows), Network Security Devices, and other enterprise tools. Demonstrated proficiencies with an enterprise SIEM or security analytics solution, including the Elastic Stack or Splunk. Solid understanding and experience analyzing security events generated from security tools and devices not limited to: QRadar, MS Sentinel, Carbon Black, FireEye, Palo Alto, Cylance, and OSSEC Experience and solid understanding of Malware analysis Understanding of security incident response processes Qualifications Qualifications : Bachelors degree in computer science, Information Technology, or a related field. Experience of 5 years or 3 years relevant experience. Strong troubleshooting and problem-solving skills. Excellent communication and interpersonal skills. Ability to work independently and as part of a team. Strong organizational and time management skills. Willingness to work after hours and provide on-call support. Company Value

Posted 1 month ago

Apply

10.0 - 17.0 years

30 - 35 Lacs

Goregaon

Work from Office

Looking for someone who has strong hands-on experience on Security Incident Response,Vulnerability Management,Security tool operation, Threat and Vulnerability Identification. Must have relevant experiencewith design, implementation,management

Posted 1 month ago

Apply

10.0 - 17.0 years

30 - 35 Lacs

Thane

Work from Office

Looking for someone who has strong hands-on experience on Security Incident Response,Vulnerability Management,Security tool operation, Threat and Vulnerability Identification. Must have relevant experiencewith design, implementation,management

Posted 1 month ago

Apply

7.0 - 10.0 years

10 - 20 Lacs

Bengaluru

Hybrid

Role & responsibilities Lead the analysis and investigation of information security events (IDS/Proxy/SIEM/etc.) in a 24X7 SOC environment to immediately detect, verify, and respond swiftly to cyber threats, and remove false positive. Strong networking background. The analyst performs monitoring, research, assessment and analysis which requires demonstrable security incident response experience. Serve as a technical point of escalation and provide mentoring for L1 Security Operations Center (SOC) analysts. Handling security alerts on SIEM and Raise tickets based on the alerts. Follow ups with respective team to close the alerts, tickets. Analyze and assess security incidents and escalate to appropriate internal teams for additional assistance. Responsible for investigating incidents, analyzing attack methods, researching new defense techniques and tools, developing security policy, and documenting procedures for SOC. Malware analysis and other attack analysis to extract indicators of compromise. Perform data security event correlation between various systems. Prepare reports, summaries, and other forms of communication that may be both internal and client facing. Maintain familiarity with industry trends and security best practices. Ensure compliance to SLA, process adherence and process improvisation to achieve operational objectives. Periodic upgradation/creation of correlation rules based on emerging threats and requirement following MITRE Attack US-Cert and other TTP sources. Preferred candidate profile 5+ years working in the Security operations Centre. Bachelors degree in engineering or higher preferred Excellent knowledge of Intrusion Detection (deep TCP/IP knowledge, and Cyber security), various operating systems (Windows/UNIX), and web technologies (focusing on Internet security) Ability to read and understand packet level data Intrusion detection and prevention and Network Security Products (IDS/IPS, firewalls, etc) Host Security Products (HIPS, AV, scanners, etc) Knowledge of cutting edge threats and technologies effecting Web Application vulnerabilities and recent internet threats Exposure on Vulnerability assessment as well as penetration testing or forensic analysis fields are an advantage Experience working as part of a global team, spanning multiple time zones and cultures.

Posted 1 month ago

Apply

10.0 - 17.0 years

30 - 35 Lacs

Nashik

Work from Office

Looking for someone who has strong hands-on experience on Security Incident Response,Vulnerability Management,Security tool operation, Threat and Vulnerability Identification. Must have relevant experiencewith design, implementation,management

Posted 1 month ago

Apply

7.0 - 10.0 years

20 - 25 Lacs

Pune

Hybrid

Hi Everyone, I am on lookout for Sr Information Security Analyst -GSOC for leading product based MNC in Pune, Yerwada. Kindly refer below JD & share your resume on pallavi.ag@peoplefy.com Job description: 7 to 10 years of overall experience Experience with Security Information and Event Management (SIEM) systems (e.g., Splunk, ArcSight, Qradar) and GSOC Experience with vulnerability assessment tools and techniques. Experience with incident response frameworks and procedures. Knowledge of security standards and regulations (e.g., PCI DSS, GDPR) Looking for candidates who can join within 30 days

Posted 1 month ago

Apply

10.0 - 17.0 years

30 - 35 Lacs

Nagpur

Work from Office

Looking for someone who has strong hands-on experience on Security Incident Response,Vulnerability Management,Security tool operation, Threat and Vulnerability Identification. Must have relevant experiencewith design, implementation,management

Posted 1 month ago

Apply

10.0 - 17.0 years

30 - 35 Lacs

Navi Mumbai

Work from Office

Looking for someone who has strong hands-on experience on Security Incident Response, Vulnerability Management, Security tool operation, Threat and Vulnerability Identification. Must have relevant experience with design, implementation,management

Posted 1 month ago

Apply

10.0 - 17.0 years

30 - 35 Lacs

Hingoli

Work from Office

Looking for someone who has strong hands-on experience on Security Incident Response,Vulnerability Management, Security tool operation, Threat and Vulnerability Identification. Must have relevant experiencewith design, implementation,management

Posted 1 month ago

Apply

10.0 - 17.0 years

30 - 35 Lacs

Ulhasnagar

Work from Office

Looking for someone who has strong hands-on experience on Security Incident Response,Vulnerability Management,Security tool operation, Threat and Vulnerability Identification. Must have relevant experiencewith design, implementation,management

Posted 1 month ago

Apply

10.0 - 17.0 years

30 - 35 Lacs

Mumbai Suburban

Work from Office

Security Lead For one of the data center hybrid & IT Soln Provider Looking for someone who has strong hands-on experience on Security Incident Response,Vulnerability Management,Security tool operation, Threat and Vulnerability Identification. Must have relevant experiencewith design, implementation,management

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies