Jobs
Interviews

4 Log Aggregation Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 7.0 years

0 Lacs

punjab

On-site

You have an exciting opportunity to join as a DevSecOps in Sydney. As a DevSecOps, you should have 3+ years of extensive Python proficiency and 3+ years of Java Experience. Your role will also require extensive exposure to technologies such as Javascript, Jenkins, Code Pipeline, CodeBuild, and AWS" ecosystem including AWS Well Architected Framework, Trusted Advisor, GuardDuty, SCP, SSM, IAM, and WAF. It is essential for you to have a deep understanding of automation, quality engineering, architectural methodologies, principles, and solution design. Hands-on experience with Infrastructure-As-Code tools like CloudFormation and CDK will be preferred for automating deployments in AWS. Moreover, familiarity with operational observability, including log aggregation, application performance monitoring, deploying auto-scaling and load-balanced / Highly Available applications, and managing certificates (client-server, mutual TLS, etc) is crucial for this role. Your responsibilities will include improving the automation of security controls, working closely with the consumer showback team on defining processes and system requirements, and designing and implementing updates to the showback platform. You will collaborate with STO/account owners to uplift the security posture of consumer accounts, work with the Onboarding team to ensure security standards and policies are correctly set up, and implement enterprise minimum security requirements from the Cloud Security LRP, including Data Masking, Encryption monitoring, Perimeter protections, Ingress / Egress uplift, and Integration of SailPoint for SSO Management. If you have any questions or need further clarification, feel free to ask.,

Posted 1 week ago

Apply

3.0 - 7.0 years

10 - 20 Lacs

Gurugram, Bengaluru

Hybrid

Job Overview: We are looking for Site Reliability Engineer (SRE) Tech Support to for our Cloud Site Reliability operations and ensure the smooth functioning of cloud infrastructure powered by OpenStack and Kubernetes. In this role, you will focus on monitoring, basic troubleshooting, and incident response, helping to maintain high system availability, reliability, and performance. You will be responsible for identifying and addressing simple issues, as well as escalating more complex problems to development team when needed. The ideal candidate should have a good understanding of cloud infrastructure (especially OpenStack and Kubernetes), containerized environments, and system monitoring. This position offers an excellent opportunity for someone looking to grow into a more advanced SRE or DevOps role. Key Responsibilities: Incident Monitoring, Triage & Resolution: Respond to system alerts, monitor infrastructure health using tools like Prometheus, Grafana, and Observability for both OpenStack and Kubernetes. Identify low-level issues and follow runbooks or predefined scripts to perform first-level triage. Investigate and resolve more complex issues compared to L0, such as Kubernetes pod crashes, network misconfigurations in OpenStack, and minor service disruptions. Work with tools like kubectl to troubleshoot Kubernetes pods and nodes, and OpenStack CLI to diagnose problems with VMs, storage, and networks System Health Checks: Perform daily health checks for Kubernetes pods, nodes, and OpenStack instances. Verify functionality of VMs, containers, and network services within the environment. Ticket Management: Log incidents and issues into a ticketing system (e.g., JIRA, ServiceNow) for tracking and escalation. Update incident tickets and provide relevant information for ongoing resolution efforts. Work closely with L2 and L3 engineers for complex troubleshooting or advanced system issues that require in-depth knowledge Automation & Scripting: Automate routine tasks, such as VM provisioning, pod deployments, or status checks, using basic scripting languages (Python, Bash). Improve automation workflows based on feedback and frequently encountered issues. Log Aggregation & Monitoring: Review logs and metrics collected from ELK Stack, Prometheus, Grafana, or other logging tools to detect trends and potential issues. Analyze logs and metrics from OpenStack and Kubernetes clusters to pinpoint underlying problems (e.g., high CPU usage, memory leaks). Skills & Qualifications: Familiarity with OpenStack architecture (e.g., Nova, Neutron, Cinder). Good understanding of Kubernetes components, including pods, services, deployments, and namespaces. Knowledge of Linux/Unix -based operating systems (e.g., Ubuntu, CentOS, Red Hat). Understanding of networking concepts like DNS, IP routing, and VLANs in cloud environments. Familiarity with monitoring tools like Prometheus, Grafana, Zabbix, or CloudWatch for alert management and system health monitoring . Troubleshooting & Incident Response : Experience in using log aggregation tools ( ELK stack, Splunk ) and interpreting logs for incident detection Ability to perform basic troubleshooting steps (e.g., restarting services, running basic shell commands) to resolve issues Strong communication skills to collaborate effectively Ability to document incidents, solutions, and troubleshooting steps clearly. Basic Scripting preferably in Python for Automation Certifications: Basic certifications such as CompTIA Linux+, AWS Certified Solutions Architect, Kubernetes Fundamentals (CKA), or OpenStack COA are a plus. Work Environment: Require working in shifts, on rotation basis covering evenings/nights, weekends, and holidays to ensure 24*7*365 availability of critical systems.

Posted 2 weeks ago

Apply

8.0 - 12.0 years

14 - 15 Lacs

Chandigarh, Pune, Chennai

Work from Office

Expert in Grafana dashboard design with Splunk, AppDynamics, Spark, and microservices integration. Skilled in Unix/Python scripting, log analysis, and real-time production monitoring. Mail:kowsalya.k@srsinfoway.com

Posted 1 month ago

Apply

15.0 - 17.0 years

0 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Scope: We are looking for a dynamic and strategic Vice President of Cyber Defense to lead our global cyber defense and incident response capabilities. This executive leader will own the detection, response, and mitigation of cyber threats, ensuring our organization is resilient in the face of a rapidly evolving threat landscape. The ideal candidate brings deep expertise in threat detection, SOC operations, incident response, and threat intelligence. This leader will partner across the business to build and maintain a world-class cyber defense program that proactively protects the company's assets, data, and reputation. Key Responsibilities: Cyber Defense Strategy & Operations: Develop and execute the company's cyber defense strategy, aligning with enterprise risk, compliance, and business objectives. Work with key stakeholders and business lines to ensure detection and response meet NIST CSF minimum baselines for global security operations and response. Lead 24/7/365 operations based on business need partner with Global Command and Site Reliability Teams to ensure baseline for all customer facing incidents, and internal company wide incidents are coordinated in a centralized operation center follow the sun model. Lead the global Security Operations Center (SOC), including 24/7 monitoring, detection, analysis, and response to cyber threats. Build out capabilities for detection and response for Tier 1, Tier 2, and Tier 3 security incidents and events. Implement and mature threat hunting, security analytics, and detection engineering programs. Ensure and validate Customer Incident Response and capabilities for onboarding mergers & acquisitions, new customers, and new environments as we grow and scale. Security Assessment and Continuous Threat Exposure Management:Identifying and fixing weaknesses in systems and networks including establish MTTD, MTTR, and MTTA for exposures, vulnerabilities, and potential threats. Incident Response:Investigating and responding to security breaches, including analyzing incidents and escalating them when necessary. Threat Detection and Prevention:Monitoring network traffic, system logs, and other data sources to identify potential threats and malicious activity. Security System Administration and Maintenance:Installing, configuring, and maintaining security tools like firewalls, antivirus software, and intrusion detection systems. Security Policy and Procedure Development:Creating and enforcing security policies and procedures to protect sensitive information. Security Training and Awareness:Educating employees about cybersecurity risks and best practices. Staying Up-to-Date:Keeping abreast of the latest security threats, vulnerabilities, and technologies. Threat Intelligence & Response: Build and manage a comprehensive threat intelligence function to anticipate and defend against advanced persistent threats (APTs) and zero-day vulnerabilities. Lead cyber incident response efforts, including containment, eradication, and post-incident reviews. Serve as a key escalation point during major security events and coordinate cross-functional response. Security Engineering & Automation: Oversee the development and deployment of tools and technologies that support threat detection, log aggregation, SIEM, SOAR, EDR, and XDR platforms. Drive automation and orchestration to increase efficiency and reduce time to detection/response. Hold QBRs with key security operations vendors to ensure compliance and SLAs are met with all contracts. Team Leadership & Development: Build, lead, and inspire a high-performing cyber defense team, including SOC analysts, incident responders, threat hunters, and detection engineers. Foster a culture of accountability, continuous learning, and proactive defense. Establish Career Development Plans and Growth for analysts, engineers, managers, and directors as the business grows and scales. Collaboration & Executive Engagement: Partner with IT, Infrastructure, Risk, Compliance, and Legal teams to align cyber defense practices with business needs. Provide executive-level reporting on threat landscape, risk posture, and incident metrics. Act as a thought leader and spokesperson on cyber defense strategy internally and externally. Qualifications: Bachelor's or Master's degree in Cybersecurity, Computer Science, Information Technology, or a related field. 15+ years of experience in cybersecurity, with at least 5 to 8 years in a senior leadership role overseeing SOC, incident response, or threat intelligence. Deep knowledge of security operations, threat detection techniques, MITRE ATT&CK, and NIST/ISO frameworks. Proven track record managing large-scale incident response, threat intelligence operations, and blue team functions. Experience with cloud security (AWS, Azure, GCP) and hybrid infrastructure defense. Strong executive presence and ability to communicate effectively with C-level stakeholders. Relevant certifications such as CISSP, GIAC, GCIA, GCIH, or equivalent are highly desirable. Our Values If you want to know the heart of a company, take a look at their values. Ours unite us. They are what drive our success - and the success of our customers. Does your heart beat like ours Find out here: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies