Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
10.0 - 14.0 years
17 - 22 Lacs
Bengaluru
Work from Office
Date 22 May 2025 Location: Bangalore, KA, IN Company Alstom At Alstom, we understand transport networks and what moves people. From high-speed trains, metros, monorails, and trams, to turnkey systems, services, infrastructure, signalling and digital mobility, we offer our diverse customers the broadest portfolio in the industry. Every day, 80,000 colleagues lead the way to greener and smarter mobility worldwide, connecting cities as we reduce carbon and replace cars. Could you be the full-time **Network Security Technical Expert** in **[Location]** were looking for Your future role Take on a new challenge and apply your **network security and design** expertise in a cutting-edge field. Youll work alongside **dedicated and innovative** teammates. You'll play a critical role in shaping our network ecosystem, ensuring its security, scalability, and efficiency to meet the demands of a global organization. Day-to-day, youll work closely with teams across the business (e.g., IT system administrators, security analysts, application developers, and business stakeholders), lead incident responses for security breaches, and develop comprehensive network architecture plans, among other responsibilities. Youll specifically take care of designing secure network architectures and implementing robust security solutions, but also ensure compliance with industry regulations and optimize network performance. Well look to you for: Developing and implementing network architecture plans for LANs, WANs, SDWAN, and Zero Trust Access (ZTNA). Designing and deploying security solutions such as firewalls, intrusion detection systems, and data loss prevention tools. Defining and enforcing security policies, including data encryption and user authentication protocols. Monitoring network performance and optimizing for stability and availability. Leading incident response efforts and mitigating network security breaches. Collaborating with cross-functional teams to align network solutions with business needs. Driving continuous improvement in network operations and ensuring adherence to compliance standards. All about you We value passion and attitude over experience. Thats why we dont expect you to have every single skill. Instead, weve listed some that we think will help you succeed and grow in this role: Bachelors or Masters degree in Engineering, Technology, or a related field. Expertise in network protocols (TCP/IP, routing protocols, MPLS). Deep understanding of network security concepts (firewalls, VPNs, intrusion detection/prevention systems). Familiarity with network automation tools and scripting languages (e.g., Python, Ansible). Knowledge of cloud network security architectures (AWS, Azure, GCP). A professional certification such as CCNA/CCNP/CCIE (or equivalent). Strong troubleshooting and analytical skills, with the ability to work independently on critical technical aspects of LAN/WAN technology. Experience in disaster recovery planning, resilience, and high-availability solutions. Proven ability to communicate technical concepts effectively to both technical and non-technical stakeholders. Strong interpersonal and leadership skills, with a collaborative mindset. Things youll enjoy Join us on a life-long transformative journey the rail industry is here to stay, so you can grow and develop new skills and experiences throughout your career. Youll also: Enjoy stability, challenges, and a long-term career free from monotonous daily routines. Work with cutting-edge security standards for network architecture and design. Collaborate with cross-functional teams and supportive colleagues. Contribute to innovative projects that make a tangible impact. Utilise our flexible and collaborative working environment. Steer your career in whatever direction you choose across functions and countries. Benefit from our investment in your development, through award-winning learning programs. Progress towards leadership roles or specialized technical paths. Benefit from a fair and dynamic reward package that recognizes your performance and potential, plus comprehensive and competitive social coverage (life, medical, pension). You dont need to be a train enthusiast to thrive with us. We guarantee that when you step onto one of our trains with your friends or family, youll be proud. If youre up for the challenge, wed love to hear from you! Important to note As a global business, were an equal-opportunity employer that celebrates diversity across the 63 countries we operate in. Were committed to creating an inclusive workplace for everyone. Important to note As a global business, were an equal-opportunity employer that celebrates diversity across the 63 countries we operate in. Were committed to creating an inclusive workplace for everyone.
Posted 3 hours ago
8.0 - 10.0 years
3 - 5 Lacs
Gurugram
Work from Office
AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. AtAHEAD, we prioritize creating a culture of belonging,where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer,anddo not discriminatebased onan individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, maritalstatus,or any other protected characteristic under applicable law, whether actual or perceived. SOC Analysts at AHEAD monitor customer environments and perform Incident Detection, Validation, and Incident Reporting. SOC Analysts are the frontline of SOC and are customer-facing representatives. SOC Analysts are responsible for triaging events, incidents, and reporting validated incidents to the customer for incident response. Incumbents will possess strong technical and analytical skills while providing accurate analysis of security related problems. They have a well-rounded networking background and are responsible for performing troubleshooting of customer issues. This individual is user focused and works to resolve client needs in a timely manner. These needs may involve resolving hardware/software failures, investigating, and responding to security threats, and making change request to the security policy of company devices. The SOC Analystis expected to monitor security feeds streaming from client servers, network devices, and end user workstations, operate and maintain network security equipmentat client locations. The Analystis expected to be familiar with a wide range of security tools and understand basic security fundamentals. TheAnalystwill perform information security event analysis and must possess knowledge of operating systems, TCP/IP networking, network attacks, attack signatures, defense countermeasures, vulnerability management, and log analysis. Roles & Responsibilities: Monitor and analyze network traffic and alerts Investigate intrusion attempts and perform in-depth analysis of exploits Provide network intrusion detection expertise to support timely and effective decision making of when to declare an incident Conduct proactive threat research Review security events that are populated in a Security Information and Event Management (SIEM) system Tuning of rules, filters, and policies for detection-related security technologies to improve accuracy and visibility Data mining of log sources to uncover and investigate anomalous activity, along with related items of interest Independently follow procedures to contain, analyze, and eradicate malicious activity Document all activities during an incident and provide leadership with status updates during the life cycle of the incident Incident management, response, and reporting Provide information regarding intrusion events, security incidents, and other threat indications and warning information to the client Track trends, statistics, and key figures for each assigned client Assist with the development of processes and procedures to improve incident response times, analysis of incident, and overall SOC functions Reporting Incident reports Security status reports Client-facing security meetings Position : Incident handling/response experience Working knowledge of common operating systems (Windows, Linux, etc.) and basic endpoint security principles Understanding ofanda strong desire to learn common security technologies (IDS, Firewall, SIEM, etc.) The ability to think creatively to find elegant solutions to complex problems Excellent verbal and written communication skills The desire to work both independently and collaboratively with a larger team A willingness to be challenged along with a strong appetite for learning 8-10years of experience in Information Security, Incident Response, etc. (or related field) Hands-on experience with common security technologies (IDS, Firewall, SIEM, etc.) Knowledge of common security analysis tools & techniques Understanding of common security threats, attack vectors, vulnerabilities and exploits Knowledge of regular expressions Education: BachelorsDegree in Computer Science, Information Security or related/equivalent educational or work experience One or more of the following certificationsCISSP, GCIA, Security+, CEH, ACSE
Posted 6 days ago
6.0 - 8.0 years
3 - 6 Lacs
Bengaluru / Bangalore, Karnataka, India
On-site
You should have a minimum of 6+ years relevant experience in the role High Technical knowledge of networks, network security and their configuration and operational processes. Proficient in Cisco Switching (catalyst, NX, upgrades and LAN security) and routing, Network Access Control, AAA, device build and upgrades Strong background and Experience with Physical and Virtual Appliances for VPN, Express Route, MPL Azure Network Security Groups, User Defined Routes, Load Balancers Good understanding and hands on experience on Firewall, Switches and Access Points), Palo Alto Next (On-Prem & Azure VM series) Generation firewall Solutions and Cisco ASA firewalls Good understanding and hands on experience of Cisco ISE Knowledgeable in Dynamic routing protocols such as OSPF, BGP etc. Strong background and Experience with Physical and Virtual Appliances for VPN, Express Route, MPL Working knowledge of data centers, their architecture, and standards, Handing day to day network and security related changes and requests and issue troubleshooting Certifications: CCNP (Is a must), PCNSE, CCNP Sec or related preferred
Posted 6 days ago
7.0 - 12.0 years
11 - 15 Lacs
Chennai
Work from Office
Candidate demonstrates excellent understanding of ICT design principles for Airport Terminal Building & Site wide ICT projects. Should be keen to quickly learn, adapt and perform in a project design delivery environment. Must possess multitasking skills with a strong zeal for accepting new design-based challenges. Should be a team player with excellent communication and team coordination skills along with excellent presentation skills. Experience preferred in Concept, Scheme & detailed designing of ICT systems like, Telecommunications space planning, Rack sizing for Storage, Servers, Switches etc., Heat load calculations, IT Power demand, Site wide ICT network design, Wireless data network, Voice and data network, Digital display / Signages, Master clock system, IP telephony, SMATV / IPTV, Structured cabling, Containment planning and routing, ICT tender specifications & design basis report, supporting airport ORAT, Authority/Telecom service provider design guidelines awareness, Master system integration, Electronic security surveillance, Access Control & intrusion detection, Public Address system, Building Automation & PLC SCADA system etc. Thorough understanding of Telecommunications Global Standard like ANSI/ TIA/EIA, Building cabling standard ISO/BS/IEC, BICSI, Data Centre Tier ratings, telecom service provider guidelines etc Building information modelling expertise3D modelling, clash coordination, Navis work review, BIM 360 software capability. Qualifications 7 to 12 years with BE/BTech/MTech in Electronics & Telecommunication/ Telecoms. Technical certifications OR equivalent will be an added advantage. Strong practical understanding of best practices within ICT, Telecom and ELV systems Qualifications Must have Bachelors degree in Electrical Engineering.
Posted 1 week ago
5.0 - 9.0 years
3 - 7 Lacs
Gurgaon / Gurugram, Haryana, India
On-site
Network L2 1) Strong Networking Skills - Cisco - Data L2/L3 , with 5-9 years of Work Experience. 2) Should have CCNP or equivalent Juniper certification. 3) Solid understanding of switching, TCP/IP, IP Addressing, routing, IP inter-networking technologies: Routing protocols (OSPF, BGP, RIP), Multicast, VPN, ACLs, NAT, VRRP, NSRP. 4) Solid understanding of Switching. Knowledge of VLANs, trunking, and spanning tree protocol 5) Experience with Authentication services such as TACACS+, RADIUS will be a plus. 6) Experience in resolving multiple complex technical problems for critical IT infrastructure ( L1/L2/L3 Networking Devices Switches, Routers, 7) Should have experience in providing expert technical knowledge to team of engineers in Configuration, Backup, Troubleshooting of Network Devices. 8) Hands on Experience onLinkProof ( Radware ) & Aruba AP will have added advantage. 9) Handle & Lead New Project / Technology or Architecture Implementation / De livery & Sustenance activities Onsite / Offsite 10) Familiarity with ITIL Concepts ( Incident, Problem, Change, Configuration Management etc ) is Must. 11) Diagnosing LAN/WAN issues across PAN India 12) Should be able to work 24*7 Security Management - L2 1.Should carry 5-9 years of Work Experince with CCSP/CCIE certification & Solid understanding and hands on exp on Palo Alto, Fortinet, Checkpoint and Cyberoam firewalls 2. Solid understanding of TCP/IP, IP, NAT, Multicasting is a must. 3. Strong knowledge of network security technologies, specifically firewalls, internet proxies, IPS, Anti-Spam Gateway and other security platforms like blue coat proxy & IPS ( NIDS/HIDS ), Websense (Zscaler) is preffered. 4. Should have experience in providing expert technical knowledge to team of engineers in Configuration, Backup, Troubleshooting of Security Devices. 5. Familiarity with ITIL Concepts ( Incident, Problem, Change, Configuration Management etc ) is Must. 6. Ability to solve problems quickly and completely. Ability to identify tasks which require automation and automate them. Ability to create reports on trend gap analysis and provide recommendation to address the risks. 7. Strong inter-personal and communication skills; making presentations to customer or client audiences or knowledge of network-based attacks and their mitigation. 8. Should be able to work 24*7
Posted 1 week ago
8.0 - 13.0 years
30 - 35 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
Responsibilities: Design and implement infrastructure to support Omnicell Cloud Platform Implement & Manage an Effective Observability Strategy for Omnicell Cloud Platform & IoT devices. Automate delivery of platform services using infrastructure-as-a-code. Collaborate with application and business stakeholders to ensure high-quality product is developed and deployed in production. Design and implement CI/CD pipelines. Required Knowledge and Skills: Extensive experience with observation tooling such as Datadog, Prometheus, Grafana, AWS CloudWatch Extensive experience with infrastructure deployment on AWS Expert knowledge of Containerization. Experience with Kubernetes Administration Experience with GitOps tools such as ArgoCD Expert knowledge of Infrastructure automation tools such as Terraform or Ansible Deep understanding of best practices for deploying, running and observing workloads in Kubernetes. Experience with one or more tools such as Kafka, Elasticsearch, NiFi, PostgreSQL Expert in Linux administration. Experience within incident management processes Basic Requirements: 8+ years of experience in software engineering Preferred Knowledge and Skills: Experience with security scanning tools. Experience with intrusion detection systems.
Posted 1 week ago
6.0 - 11.0 years
11 - 15 Lacs
Bengaluru
Work from Office
Senior Cybersecurity Analyst with a minimum of 6+ years of experience in thefield of Operation technology, particularly focusing on Endpoint Detection andResponse (EDR) and Intrusion Detection System #40;IDS#41; monitoringtools. The ideal candidate will have demonstrated expertise in Carbon Black AppControl. Carbon Black, MS Defender for Endpoints (EDR/ATP),Data Network Security - IDS, Unix Administration, Windows, Carbon Black, MS Defender for Endpoints (EDR/ATP), Data Network Security - IDS, Unix Administration, Windows. Senior Cybersecurity Analyst with a minimum of 6+ years of experience in the field of Operation technology, particularly focusing on Endpoint Detection and Response (EDR) and Intrusion Detection System (IDS) monitoring tools. The ideal candidate will have demonstrated expertise in Carbon Black App Control.
Posted 1 week ago
4.0 - 9.0 years
8 - 12 Lacs
Hyderabad
Work from Office
Job Description Job Purpose The ICE Cybersecurity DFIR team is responsible for defending critical financial infrastructure from Global Cyber threats. We leverage an evolving arsenal of controls that require technical proficiency as well as tenacity, professionalism, and strong communication skills. Responsibilities Email Triage - Evaluating staff reported emails for malicious intent Data Loss Prevention - Reviewing Daily DLP events for evidence of internal information leaving the network Operations - Handling end user support requests. Some examples of end-user requests: unblocking websites, permitting file uploads, modifying anti-virus policies, and testing email attachments. Incident Management Detect, document, investigate, and resolve security incidents in an efficient manner Intrusion Detection - Develop and tune anomaly detection capability to produce reliable actionable data Behavioral Analysis - Develop and implement criteria to identify anomalous user behavior leading indicating insider threat activity Desirable Knowledge and Experience University degree in Engineering, CIS, or related discipline Hands-on experience with Systems Administration Deep understanding of networking and its application Relevant Information Security experience Advancement Opportunity Seniority is determined by experience and demonstration of exceptional competencies including: Automation - Automating simple tasks using python increasing efficiency and continuity Counter Measures - Ability to design and implement preventative and corrective controls to counteract emerging threats Security Analytics - Efficiently distill actionable information from large data sets for reporting, hunting, and anomaly detection Proactive Threat Hunting - Develop and execute focused plans to discover advanced threats that evade traditional security controls Serve as a responsible Subject Matter Expert (SME) on one or more tools or technologies via learning, testing, implementing, enhancing, and educating.
Posted 1 week ago
5.0 - 9.0 years
13 - 17 Lacs
Noida
Work from Office
Primary/Essential Duties and Key Responsibilities Review, test, and implement security solutions related to Email Protection (eg. Proofpoint, Barracuda, SpamTitan, Mimecast, or Barracuda) DLP – Must have Public Cloud (eg. AWS, Azure, or GCP) – Must have ZTNA solutions (eg. Zscaler, Axis, Prisma Access) - Strongly encouraged. DDOS/WAF (eg. Cloudflare, Silverline, Cloud Armor) – Strongly encouraged. Firewalls/IDS/Network Detection and Response tools – Must have Assess network security architectures, document findings and recommendations based on industry best practices. Solid understanding of network protocols, including TCP/IP, DNS, DHCP, and routing protocols – Must have Define and review security policies to control access to systems. – Must Have Experience with firewall administration, VPN configuration, and network intrusion detection/prevention systems – Must Have Strong knowledge of security best practices and standards (e.g., ISO 27001, NIST) Relevant certifications such as CISSP, CISA, CISM, or CCNP Security are a plus Perform implementations and configuration of network security technologies Apply Zero Trust principals to control network access to resources Recommend, create, and maintain security configuration baselines to be used to harden systems Ensure all systems security operations and maintenance activities are properly documented and updated. Automate manual tasks for improved efficiencies (eg. infrastructure as code) Support Enterprise Risk with audits and compliance initiatives Assist in developing requirements and driving deliverables Knowledge, Skills and Abilities Strong knowledge and understanding of both network and application layer firewall concepts Hands-on experience with Enterprise Class firewalls Knowledge of security frameworks including NIST, ISO, CIS, OWASP 10, etc Understanding of SSL/TLS certificates and implementation (Private and public key infrastructure) Working knowledge with Powershell, Ansible, Terraform, RegEx, Chef or Puppet are preferred – nice to have Experience with Public Cloud provider infrastructure, system deployments and product release operations a plus Excellent written and verbal communication skills Excellent teamwork and collaboration skills Results oriented, high energy, self-motivated Required Qualifications Minimum five (5) years of experience in a Network Security Engineering role working with Firewalls, DDOS/WAF, IPS and ZTNA Bachelors or Masters in Information Systems, Information Security, or related fields; preferred but not required Industry recognized Security certification such as CSSP, CISSP, or Security+, etc
Posted 1 week ago
6.0 - 10.0 years
15 - 25 Lacs
Bengaluru
Work from Office
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Are you a tech-savvy problem-solver with a passion for ensuring optimal network performance? If so, look no further – Kyndryl is seeking a Network Support Engineer who will be the go-to expert for installing, maintaining, and troubleshooting computer networks. As our Network Support Engineer, you'll be working in a complex, multi-vendor environment, and will use your analytical skills to identify and resolve network issues, make configuration changes, and implement security policies. This role requires someone who can think on their feet, test and apply corrective actions (including emergency changes), and participate in change reviews as needed. And with the ever-changing nature of technology, you'll be constantly learning and growing in your role. You will work alongside a talented team of experts to plan and execute routine network changes, troubleshoot and solve network issues and outages, and maintain excellent communication with our end customers, project managers, and service engineers. You’ll be responsible for maintaining network components, monitoring network performance, and maintaining network security. You will also be providing user support for network-related issues, ensuring that our customers receive the highest level of support possible. If you're ready to take on a fast-paced and rewarding role in the world of network support, apply to join the Kyndryl team today! You will be responsible to collaborate and communicate effectively with cross-functional teams, including technical and non-technical stakeholders, to ensure timely resolution of network-related issues. You will maintain network security through the implementation of various security protocols, including firewalls, intrusion detection systems, and access control lists and major incident handling. Responsible to monitor network performance and analyze network traffic, utilizing network monitoring tools to proactively identify and resolve potential issues. Your Future at Kyndryl Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Skills and Experience 8+ years of working experience in Networking. Proven knowledge and experience in Network security, WAN, trouble-shooting, switching, routing Firewall on Cisco, Juniper and Fortigate devices. Strong understanding of ITIL (Information Technology Infrastructure Library) framework and best practices. Experience in design and implement complex network solutions that meet the business requirements of our clients. Install, configure, and maintain network equipment, including switches, routers, firewalls, NSX, WIFI, and virtual private networks (VPNs). Troubleshoot and resolve network-related issues, both proactively and reactively. Participate in an on-call rotation for critical network incidents and issues outside of business hours. Create and maintain technical documentation for all network-related processes, architectures, and solutions. Preferred Skills and Experience Experience on Physical and Logical firewall devices. CCNP certification or equivalent knowledge. Bachelor's Degree. Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 1 week ago
5.0 - 8.0 years
3 - 7 Lacs
Chennai
Work from Office
Job Information Job Opening ID ZR_1924_JOB Date Opened 06/05/2023 Industry Technology Job Type Work Experience 5-8 years Job Title Splunk Content Development City Chennai Province Tamil Nadu Country India Postal Code 600001 Number of Positions 5 We are looking for a content development engineer or L2 level SOC SIEM engineer with hands-on experience in developing new rules, use cases based on various log sources including Cloud Security log sources and integrating various log sources with SIEM Platform. Roles and Responsibilities: Creating and implementing new threat detection content, rules and use cases to deploy in SIEM platform with different data sets like Proxy, VPN, Firewall, DLP, etc. Assisting with process development and process improvement for Security Operations to include creation/modification of SOPs, Playbooks, and Work instructions. Developing custom content based on threat intelligence and threat hunting results. Identifying gaps in the existing security controls and develop/propose new security controls. SIEM Engineering and knowledge of integrating various log sources with any SIEM platform. Custom parsing of logs being ingested into the SIEM Platform Job : 3+ years of experience working in the field of Content development and experience in delivering and/or building content on any of the SIEM tools like Splunk/Arc-sight /QRadar/Nitro ESM/etc. Deep understanding of MITRE ATT&CK Framework. Experience in SOC Incident analysis with an exposure to information security technologies such as Firewall, VPN, Intrusion detection tools, Malware tools, Authentication tools, endpoint technologies, EDR and cloud security tools. Good understanding of networking concepts. Experience interpreting, searching, and manipulating data within enterprise logging solutions (e.g. SIEM, IT Service Management (ITSM) tools, workflow, and automation) In depth knowledge of security data logs and an ability to create new content on advanced security threats on a need basis as per Threat Intelligence. Ability to identify gaps in the existing security controls. Good experience in writing queries/rules/use cases for security analytics (ELK, Splunk or any other SIEM platform) and deployment of content. Experience on EDR tools like Crowd-strike and good understanding on TTPs like Process Injection. Excellent communication, listening & facilitation skills Ability to demonstrate an investigative mindset. Excellent problem-solving skills. Preferred : Understanding of MITRE ATT&CK framework. Demonstrable experience in Use case /rule creation on any SIEM Platform. Chronicle Backstory/ YARA / Crowds trike rules is a plus. Location: Pan India check(event) ; career-website-detail-template-2 => apply(record.id,meta)" mousedown="lyte-button => check(event)" final-style="background-color:#2B39C2;border-color:#2B39C2;color:white;" final-class="lyte-button lyteBackgroundColorBtn lyteSuccess" lyte-rendered=""> I'm interested
Posted 1 week ago
1.0 - 5.0 years
1 - 2 Lacs
Bhopal, Pune, Ahmedabad
Work from Office
Position: CCTV Technician Location: Pune,Bhopal and Ahmedabad Experience:1 Years Salary:22000 in hand( no pf ) Skills: Installation, configuration and troubleshooting of fire alarm, CCTV, Access control, Intrusion Alarm. Call at: 7743003736
Posted 1 week ago
4.0 - 9.0 years
5 - 7 Lacs
Bangalore Rural
Work from Office
As a Project Engineer, your primary responsibility will be to provide exceptional maintenance and troubleshooting services to our customers in the region. You will oversee a comprehensive range of after-sales services, including managing service cases, performing routine maintenance, handling power shut-down services, and addressing any other customer concerns. In addition to your customer-facing duties, you will also play a key role in project implementation. This will involve coordinating with other parties and supporting security equipment installation, testing, commissioning, and system programming. As a valued member of the team, you will collaborate closely with your colleagues to achieve company objectives and deliver the highest quality of services possible. Overall, your focus will be on ensuring that our customers have an outstanding experience with our products and services. By leveraging your technical expertise and customer service skills, you will contribute to the ongoing success of our company. Main Responsibilities include: - Provide troubleshooting services, routine maintenance, power shutdown and all the other security service- related services to BluOcean customers. - Produce service reports to customers within the expected time. - Implement security projects with BluOcean standards and work to achieve the highest possible client satisfaction. - Test and commission system software and hardware. - Provide technical support to sales team members as required. - Provide system design and consultation to customers. - Conduct system training to customers. - Support overseas projects and service cases remotely. - Occasionally travel to overseas for projects or service cases. - Anything else that may be needed from time to time. These are the main qualifications we are looking for: - Previous related working experience with strong security system technical and troubleshooting skills is an advantage. Smart new Graduates are also welcome. - Basic IT knowledge in hardware, network and database. - Familiar with access control, CCTV and Alarm system products & system is an advantage. - Must be willing to work onsite. - Candidates who have project management experience is an advantage. - Experience with Lenel, GE, Cisco, S2, Avigilon, AMAG, Milestone systems is a clear advantage. - Good communication and coordination skills. - Client service oriented. - Quick learning ability. - Proficient in English (both Written and Verbal). Ability to communicate in other languages are a plus.
Posted 1 week ago
3.0 - 8.0 years
4 - 5 Lacs
Warangal, Hyderabad, Nizamabad
Work from Office
Total experience 3 years as Cyber Security Analyst. Knowledge on LogRhythm SIEM tool. Incident handling Total experience 3 years as Cyber Security Analyst. Knowledge on LogRhythm SIEM tool. Incident handling Job description 2-3 years of Experience in SIEM analyst and incident handling. B.E/B.Tech Roles and Responsibilities: 3+ years experience as a SOC analyst and any SIEM tool. Min 2+ years experience on LogRhythm SIEM. Responsible for alerts monitoring and incident handling. Perform the initial analysis and identify if any potential threat. Analyse security alerts and determine their validity and potential impact on the organization. Review and analyse security logs from various sources (e.g., firewalls, intrusion detection/prevention systems, and endpoint protection) Correlating logs from various security controls to gather more insight of the suspected event. Regularly preparing log monitoring reports and daily security report and proactively work on it. Document security incidents, including the steps taken to resolve them and any lessons learned. Ensure compliance with security policies, procedures, and regulatory requirement Work closely with other IT and security team members to enhance overall security posture. Coordinate with the L2 and L3 for any escalations. Knowledge on cyber kill chain and MITRE Attack frameworks and mythologies. Knowdledge on various cyber attacks in Cyber security world. Certifications: LogRhythm Security Analyst (LRSA) from LogRhythm University CEH
Posted 2 weeks ago
6.0 - 10.0 years
8 - 12 Lacs
Mumbai
Work from Office
Monitor network traffic for unusual activity and potential threats Configure and manage security tools such as firewalls, antivirus software, and intrusion detection systems. Required Candidate profile Provide technical advice on network security issues to staff and management. Respond to, investigate, and resolve security incidents and breaches
Posted 2 weeks ago
0.0 - 2.0 years
1 - 3 Lacs
Ahmedabad
Work from Office
Responsibilities: * Close sales through persuasive communication. * Manage customer relationships. * Maintain inventory levels. * Meet sales targets. * Collaborate with marketing team on promotions. Annual bonus Flexi working Shift allowance Over time allowance Travel allowance Sales incentives Performance bonus Retention bonus Mobile bill reimbursements Leave encashment
Posted 2 weeks ago
4.0 - 5.0 years
6 - 7 Lacs
Hyderabad
Work from Office
Oversee and maintain network security infrastructure. Configure firewalls, VPNs, intrusion detection systems, and conduct regular security assessments to protect the network from external and internal threats.
Posted 2 weeks ago
5.0 - 8.0 years
15 - 18 Lacs
Hyderabad / Secunderabad, Telangana, Telangana, India
Remote
Role & responsibilities :- Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Palo Alto Networks Prisma Access Secure Access Service Edge (SASE) Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : Related qualifications and certifications Summary: As a Security Engineer, you will be responsible for designing, building, and protecting enterprise systems, applications, data, assets, and people. Your typical day will involve applying security skills to safeguard information, infrastructures, applications, and business processes against cyber threats using Palo Alto Networks Prisma Access Secure Access Service Edge (SASE) technology. Roles & Responsibilities: Provide advanced context and role-based Identity, combined with Multifactor Authentication (MFA), are critical for securing Access for Authorized Users and Devices, for both on and off Network Access. Provide two types of ZTNA models upon McDonalds Authorization consisting of Client-initiated and Service-initiated ZTNA Application segmentation to restrict access based on strict role-based Access Control (RBAC) and risk-based policies; strong Multi-Factor Authentication (MFA); granular Application and role-based Access Control; enables service, Application, and Access Control; Application and Network visibility; private, encrypted connectivity to public and private Network applications and resources; isolation of mission critical Applications and Data; and secure hybrid and private Clouds. provide support for SAML 2.0 and/or Open ID Connect/OAUTH for authentication and authorization Allow for Customized RBAC Controls based Azure AD Groups ensure SSE Solution supports PKI. All communications are secured with support for McDonald's PKI issued certificates provide Secure Remote Application Access in Windows, MacOS, Android, and iOS Devices Professional & Technical Skills: Must To Have Skills: Expertise in Palo Alto Networks Prisma Access Secure Access Service Edge (SASE) technology. Good To Have Skills: Experience with other security technologies such as firewalls, intrusion detection and prevention systems, and security information and event management (SIEM) systems. Strong understanding of security concepts and principles. Experience in designing and implementing security solutions for enterprise systems, applications, data, assets, and people. Solid grasp of security risk assessment and management methodologies. Experience in conducting security audits and assessments to identify vulnerabilities and recommend remediation measures. Additional Information: The candidate should have a minimum of 5 years of experience in Palo Alto Networks Prisma Access Secure Access Service Edge (SASE) technology. The ideal candidate will possess a strong educational background in computer science, information technology, or a related field, along with a proven track record of delivering impactful security solutions.
Posted 2 weeks ago
3.0 - 8.0 years
5 - 10 Lacs
Warangal, Hyderabad, Nizamabad
Work from Office
Total experience 3 years as Cyber Security Analyst. Knowledge on LogRhythm SIEM tool. Incident handling Total experience 3 years as Cyber Security Analyst. Knowledge on LogRhythm SIEM tool. Incident handling Job description 2-3 years of Experience in SIEM analyst and incident handling. B.E/B.Tech Roles and Responsibilities: 3+ years experience as a SOC analyst and any SIEM tool. Min 2+ years experience on LogRhythm SIEM. Responsible for alerts monitoring and incident handling. Perform the initial analysis and identify if any potential threat. Analyse security alerts and determine their validity and potential impact on the organization. Review and analyse security logs from various sources (e.g., firewalls, intrusion detection/prevention systems, and endpoint protection) Correlating logs from various security controls to gather more insight of the suspected event. Regularly preparing log monitoring reports and daily security report and proactively work on it. Document security incidents, including the steps taken to resolve them and any lessons learned. Ensure compliance with security policies, procedures, and regulatory requirement Work closely with other IT and security team members to enhance overall security posture. Coordinate with the L2 and L3 for any escalations. Knowledge on cyber kill chain and MITRE Attack frameworks and mythologies. Knowdledge on various cyber attacks in Cyber security world. Certifications: LogRhythm Security Analyst (LRSA) from LogRhythm University CEH
Posted 2 weeks ago
2.0 - 5.0 years
4 - 7 Lacs
Chennai
Work from Office
PrimeGen Healthcare Laboratories Private Limited is looking for Network Administrator to join our dynamic team and embark on a rewarding career journey. A Network Administrator is responsible for the design, implementation, and maintenance of an organization's computer networks. Responsibilities : Designing and implementing network infrastructure, including LANs, WANs, and wireless networks. Installing and configuring network hardware, software, and protocols, including routers, switches, firewalls, and other network devices. Monitoring network performance and security, identifying and resolving issues proactively. Conducting regular network maintenance, such as firmware updates, patches, and security audits. Configuring and managing network security protocols, including firewalls, VPNs, and intrusion detection and prevention systems. Developing and maintaining network documentation, including network diagrams, procedures, and policies. A Network Administrator should have a strong understanding of network infrastructure, protocols, and security best practices. They should also have experience with network hardware and software, as well as experience with network management tools and techniques.
Posted 3 weeks ago
4.0 - 8.0 years
6 - 10 Lacs
Jaipur
Work from Office
ventureit global solutions is looking for Cybersecurity Specialist to join our dynamic team and embark on a rewarding career journey. A Cybersecurity Specialist is responsible for protecting an organization's information systems and networks from cyber threats such as hacking, data breaches, and viruses. The job duties may include: 1. Implementing and maintaining security measures such as firewalls, encryption, and intrusion detection systems. 2. Conducting risk assessments and security audits to identify vulnerabilities in the network. 3. Responding to security incidents and conducting investigations to determine the cause and impact. 4. Keeping up-to-date with the latest cybersecurity trends and technologies to ensure the organization stays protected. 5. Developing and implementing security policies and procedures to ensure the organization's compliance with industry standards and regulations. 6. Providing training and awareness to employees on cybersecurity best practices. 7. Collaborating with other IT and security teams to resolve security issues and integrate security into the overall IT strategy. The ideal candidate should have a strong technical background in cybersecurity, experience with security tools and technologies, and excellent problem-solving and communication skills.
Posted 3 weeks ago
4.0 - 7.0 years
8 - 9 Lacs
Bengaluru
Work from Office
Skill- Splunk Admin Developer and Enterprise security Educational Backgrounds Degree : A bachelors degree in computer science, Information Technology, Cybersecurity, or a related field is typically required. Certifications : Splunk ES Administrator or any other SIEM platform certification Detection Engineer Develop and implement detection rules and algorithms to identify potential threats. Analyse security logs and data to identify patterns indicative of malicious activity. Create and maintain tools that enhance detection capabilities, such as Security Information and Event Management systems. Regularly update detection mechanisms based on emerging threats and Vulnerabilities. Work with incident response teams to ensure effective communication and response to detected threats. Required Skills Proficiency in programming using Python, Bash scripting, PowerShell. In-depth understanding of security threats, vulnerabilities, and attack vectors. Strong skills in analysing large datasets and identifying anomalies. Experience with SIEM tools, Intrusion detection systems, and threat intelligence platforms. Ability to work effectively with cross-functional teams.
Posted 3 weeks ago
3.0 - 7.0 years
3 - 7 Lacs
Pune
Work from Office
About the Role We are seeking a skilled Senior Security Analyst to join our SOC team. The ideal candidate will have a strong background in SOC operation and ensure that the SOC team is performing its functions as required and to trouble shoot incidents and events. As a Senior Security Analyst shall also act as the technical SME, and handle critical SOC task, Incident, guiding Level 1 and Level 2, customer communications. Key Roles & Responsibilities: Incident Response and Management Lead the investigation of high-severity security incidents and breaches. Provide expert analysis for complex incidents that L1 and L2 analysts cannot resolve. Develop and execute incident response procedures, including containment, eradication, and recovery. Ensure proper escalation processes are followed for incidents requiring higher expertise. Communicate with stakeholders, such as management and IT teams, to ensure appropriate handling of incidents. Threat Hunting and Analysis Perform proactive threat hunting activities to identify potential vulnerabilities, threats, and attacks before they happen using Splunk / QRadar SIEM. Use threat intelligence feeds to enrich SOC operations and identify emerging threats. Analyze large volumes of security data to detect patterns and anomalies. Security Tool Management Oversee and optimize the usage of security monitoring tools such as Splunk/ QRadar SIEM (Security Information and Event Management), IDS/IPS (Intrusion Detection/Prevention Systems), and endpoint protection systems. Configure, update, and fine-tune security tools to improve detection capabilities and reduce false positives. Recommend new security tools and technologies to improve SOC operations. Log and Event Analysis Review logs from various sources (network, endpoints, servers, etc.) to identify security incidents. Ensure accurate log data collection and retention practices are followed. Provide in-depth analysis of security alerts and generate reports. Vulnerability Management Conduct vulnerability assessments and prioritize remediation activities for critical vulnerabilities. Collaborate with the IT and development teams to address security flaws and implement patches. Collaboration and Escalation Serve as the point of escalation for L1 and L2 SOC analysts when complex issues arise. Collaborate with other security teams, such as network security, application security, and IT operations, to ensure a comprehensive defense strategy. Work with external partners, including Managed Security Service Providers (MSSPs), to coordinate incident management and threat intelligence sharing. Security Policies and Best Practices Review and recommend improvements to security policies, procedures, and best practices. Ensure that the organization's security policies are being followed and advise on improvements. Conduct regular security awareness training for SOC staff and the broader organization. Reporting and Documentation Generate detailed reports on incidents, security posture, and threats for senior management and relevant stakeholders. Maintain incident logs and documentation to comply with regulatory and internal policies. Ensure all incidents are well-documented with root cause analysis, remediation efforts, and lessons learned. Continuous Improvement Analyze the effectiveness of the SOC's operations and suggest improvements to processes, workflows, and technologies. Stay updated on the latest cyber threats, tools, and techniques. Assist with the development and execution of simulations, exercises, and training to improve SOC capabilities. Compliance and Regulatory Requirements Ensure compliance with SLAs for all projects. Ensure SOC operations meet industry compliance requirements (e.g., GDPR, HIPAA, PCI DSS). Help in audits and compliance assessments related to security operations. Mentoring and Training Provide mentorship and training to junior SOC analysts (L1 and L2). Share knowledge on advanced attack techniques, response strategies, and threat detection methods. Report deviations and concerns to the SOC Manager Basic Qualifications: B.E/B.Tech in Computer Science, Information Technology, Cybersecurity, or a related field. 5+ year of experience and strong foundational knowledge in security operations, SIEM, or IT security. Basic understanding of cybersecurity concepts, networking fundamentals, and security monitoring. Knowledge of IT infrastructure, networking, and cybersecurity principles. Communicate effectively with customers, teammates, and management Excellent problem-solving skills and attention to detail. Strong communication and interpersonal skills. Preferred Qualifications: Certifications in ECIH/GCIH/CISM/CISSP etc. Splunk Certified candidate Exposure to SIEM solutions, specifically Splunk, Qradar ,DNIF or similar platforms. Familiarity with security tools such as EDR, XDR, WAF, DLP, email security gateways, and proxy solutions. Enthusiasm for learning and a strong interest in cybersecurity as a career. Ability to work in a team and adjust to rotational shifts in a high-stakes environment. Knowledge of cloud security and platforms (e.g., AWS, Azure, GCP)
Posted 3 weeks ago
7.0 - 12.0 years
6 - 12 Lacs
Gurgaon / Gurugram, Haryana, India
On-site
Key deliverables: Conduct client and vendor security assessments and audits Coordinate business continuity and penetration testing initiatives Maintain compliance with InfoSec standards and best practices Support incident response and audit readiness activities Role responsibilities: Review third-party security controls and practices Prepare responses for client InfoSec inquiries Work with GRC platforms to track compliance Ensure alignment with CISSP/CISA frameworks and audit standards
Posted 3 weeks ago
5.0 - 7.0 years
7 - 9 Lacs
Mumbai, Hyderabad, Pune
Work from Office
This role is a member of the larger Threat Detection Services organization, and will work alongside teams responsible for red teaming, intelligence analysis, and technical threat researchers. The individual filling this role will act as a senior leader within the organization helping to drive detection and response maturity, enable proactive monitoring strategies and participate in a wide range of larger cyber defense program activities. We are a geographically diverse team, with offices and personnel around the globe, making this a remote work position for the right candidate. To support these requirements in addition to the technical skills listed below ideal candidates will also have prior remote work experience and possess necessary soft skills to support their success. Provide prolonged, in-depth analysis of potential intrusions or security events, leveraging various data artifacts to determine the context of an event. Hands on security alerts creation and maintenance, workload automation. Maintain accurate and complete records of incidents and investigations. Execute incident response processes to respond to security threats and attacks. Create detection and mitigation rules based on indicators of compromise that align with industry threats. Assist in the design, evaluation, and implementation of new security technologies. Update incident response playbooks to minimize gaps in response processes. Extract and analyze malware to determine their nature. This may include either static code analysis or runtime/execution analysis or both. Impact Youll Make: 5-7 years of Network/Security/Incident Response experience. Advanced Operating System and Network knowledge. Experience identifying, investigating, and responding to complex attacks Experience with investigative technologies such as SIEM, packet capture analysis, host forensics and memory analysis tools Knowledge of at least one scripting language. Any Security related certification(s) Ability to work independently as well as collaboratively within a team. Ability to quickly grasp high-level technical concepts. Good communication and interpersonal skills. SANS SEC503: Intrusion Detection In-Depth (nice to have) SANS SEC504: Hacker Techniques, Exploits & Incident Handling (nice to have) This is a hybrid position and involves regular performance of job responsibilities virtually as well as in-person at an assigned TU office location for a minimum of two days a week. TransUnion Job Title Advisor, InfoSec Engineering
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2