Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 4.0 years
12 - 14 Lacs
Mumbai, Delhi / NCR, Bengaluru
Work from Office
We are hiring a Workforce Support Analyst (Workforce Software) with 3+ years of total experience and at least 2+ years of relevant experience in Workforce Time & Attendance systems. The ideal candidate should be a certified Workforce Software professional (PT101, PT102) with hands-on experience in troubleshooting, managing support tickets, performing root cause analysis, and responding to user queries. A bachelors degree in Business, Information Systems, or equivalent experience is required. Strong communication skills, ERP knowledge, and reporting tool proficiency are desirable. This is a hybrid role open across India, working in UK or EST shifts, with telephonic interviews and background verification required. Skills : - Workforce Support Analyst, Workforce Software, Time and Attendance, Production Support, Troubleshooting, Log Analysis, Root Cause Analysis, Workforce System Configuration, Lookup Tables Maintenance, User Support, Functional Support, Technical Support, ERP Functional Knowledge, Reporting Tools, PT101 Certification, PT102 Certification, Certified Workforce Software Professional, Business Systems, Information Systems, Hybrid Job India, UK Shift, EST Shift, Telephonic Interview, Workforce Management, Workforce Software Support Location : - Mumbai, Delhi / NCR, Bengaluru , Kolkata, Chennai, Hyderabad, Ahmedabad, Pune, Hybrid
Posted 2 months ago
5.0 - 10.0 years
13 - 23 Lacs
Hyderabad, Pune, Bengaluru
Hybrid
Primary Skills ITSM automation SME, conversational AI architects and consultants RPA automation, self-healing solutions architects and consultants Observability tools (APM and infra) SMEs AI Ops architects and consultants L3 solutions architects and consultants CloudOps / FinOps consultants AI architects, Agentic AI SMEs Role and Responsibilities Hands on experience on ITSM automation, should have worked as SME, conversational AI architects and consultants. have the working experience with L3 solutions architects on Gen AI driven impact analysis, Gen AI driven code generation Excellent problem solving/analytical skills and complex troubleshooting methods. Excellent presentation, verbal, and written communication skills. Good and adaptable with : ITSM, ServiceNow (interchangeable with SNOW), NowAssist, BMC Helix, BMC Remedy, BMC Helix RemedyForce
Posted 2 months ago
6.0 - 11.0 years
14 - 16 Lacs
Bengaluru
Work from Office
Minimum Qualifications 6+ years of experience in security engineering, detection engineering, or cloud security. Strong expertise in application security, API security, and SaaS-specific threat detection. Experience with SIEM, SOAR, and detection-as-code tools (e.g., Splunk, OpenSearch, KQL, Sigma). Proficiency in log analysis, security telemetry engineering, and anomaly detection in cloud applications. Experience integrating security controls into SaaS applications and microservices. Good programming and automation skills. Preferred Qualifications Experience with automated threat simulations, MITRE ATTCK mappings, and adversary emulation. Knowledge of risk quantification methods and security metrics for executive reporting. Familiarity with cloud-native security tools. Hands-on experience in threat intelligence-driven detection engineering. Security certifications (e.g., GIAC GCDA/GCFA, AWS Security Specialty, GCP Security Engineer, OSCP). 1. SaaS-Application Centric Detection Research Engineering Develop and refine application-layer security detections for FAaaS, Spectra, and other critical LoBs, focusing on business logic abuse, API security threats, and identity-based attacks. Research and engineer detections for SaaS-specific attack vectors. Leverage detection-as-code frameworks (e.g., Sigma, OpenSearch, KQL) to automate the development and tuning of detection rules. Work closely with application security teams to enhance telemetry and ensure that security observability is embedded in SaaS products. 2. Proactive Security Controls Mitigative Capabilities Move beyond traditional monitoring by implementing proactive security controls to mitigate threats before exploitation. Collaborate with development teams to integrate security controls into SaaS applications for real-time anomaly detection and automated response. Drive continuous security validation efforts through automated adversary simulation and detection effectiveness testing. 3. Cross-Team Integration Real-Time Threat Intelligence Sharing Drive collaboration between Detection Engineering, Incident Response, and Red Teams by aligning detection research with real-world attack simulations and post-incident learnings. Develop automated feedback loops to reduce false positives, false negatives, and coverage gaps. Work with Incident Response to develop automated triage and enrichment mechanisms for SaaS security incidents. 4. Risk-Based Detection Engineering Security Metrics Shift towards a risk-based detection approach, ensuring that high-impact threats are prioritized based on their potential financial and reputational consequences. Provide executive-level visibility into detection efficacy by quantifying the impact of mitigated threats and aligning detection efforts with business risk. Develop security dashboards and reporting to communicate detection outcomes, including risk coverage, adversary trends, and operational efficiency. 5. Proactive Threat Hunting Data Anomaly Analysis Expand threat hunting and anomaly detection capabilities to identify previously unknown threats affecting SaaS customers and cloud applications. Utilize advanced data analytics and behavioral anomaly detection to identify stealthy attacks that evade traditional detection methods. Reduce reliance on SOC-driven escalations by proactively analyzing security telemetry for signs of compromise. Work closely with data scientists to enhance the use of ML/AI-driven security analytics for predictive threat detection. #LI-DNI
Posted 2 months ago
5.0 - 10.0 years
12 - 17 Lacs
Mumbai
Work from Office
i. BE/B. TECH/BCA/B.SC/M.SC/MCA/M. Tech-(Computers/Electronics/IT) ii. Minimum one certification such as CEH/CPTC/OSCP/ECSA/CEPT and/or equivalent. iii. Having at least 5+ years of post-qualification relevant work experience including appearance before court of law while presenting the extracted cyber evidence. iv. Experience of managing large scale digital evidence media. v. Comprehensive knowledge on forensic digital device data preservation, acquisition, analysis and documentation. vi. Experience in-depth practical knowledge on Ethical Hacking, Penetration Testing, OSINT, Deep and Dark Net Investigations. vii. Experience in handling real-life cyber- crime cases would be preferred. viii. Experience in investigation on Web Defacement/Site Down activities ix. Experience in investigation of Email and VOIP call Analysis and trace Down Methods. x. Experience in investigation on Web SMS/Image/Reverse Image/Video Source tracing methods. xi. Experience in practical knowledge multiple enterprise and open source which have industry benchmark. xii. Experience in comprehensive knowledge on System, Mobile Forensics, Internet Forensics, Cloud Forensics, CC Footage/AV Forensics, Database Forensics, Network Forensics, Malware Forensics, Stegano and Crypto Forensics, Memory Forensics, UAV Forensics and /or other variety of Forensic formats. xiii. Experience in-depth practical knowledge on Malware Forensics, Memory Analysis, Ethical Hacking, Penetration Testing, OSINT, Deep and Dark Net Investigations, Advanced persistent threats (APTs), Sophisticated analysis of malware, cyber security incident (Packet tracing, Web Logs, taking a copy of the mail store and aggregated log analysis), performing threat modeling, and producing intelligence threat assessments. xiv. Experience in practical knowledge on multiple enterprise, open-source tools, Static and Dynamic Malware Analysis Tools. xv. Experience in generating forensic documents for case investigation. xvi. Graduation from premier institutes (IITs, NITs, NFSL, IIIT, etc.) shall be preferred. xvii. Bug-bounty program winners will be preferred. .
Posted 2 months ago
2.0 - 5.0 years
7 - 17 Lacs
Ahmedabad
Hybrid
Role & responsibilities • Responsible for maintaining the technical knowledge of the customer environment. • Responsible for updating the technical documents in the Support & Application Management knowledge base. • Analyze log files, provide corrective measures, and propose technical preventive solutions to the First Line team or the customer success associate. • Spar with project members about technical/functional workarounds in the model in case of defining a correction due to an incident. • May execute hotfixes in the model on Production environments. • Responsible for defining clear instruction (documentation and training) towards the front office team for incidents, service requests, or executing predictive maintenance. • Responsible for maintaining an internal Reference environment. • Contact 3rd party suppliers related to incidents or service requests. • Responsible to execute deployment of DELMIA Quintiq applications in the customer production environment to conform release instructions from the project team. • Provides input on new functional/technical opportunities to the Client Executive. • Help to improve the internal and external Continuous Services processes. • As part of the Continuous Services team, you will have direct contact with customers around the world regarding updates to their raised incidents or service requests. Preferred candidate profile Technical competencies: Basic understanding about Windows Server Operating Systems. Hands-on experience using Java/C++/C#.NET, PowerShell or similar object-oriented languages. Experience with databases like SQL Server or Oracle is nice-to-have. Experience with Log Analysis, application, and system performance analysis. Basic understanding of TCP/IP Networking would be added advantage. Previous experience with DELMIA Quintiq would be added advantage. Competence requirements: • Strong analytical and troubleshooting skills. • Persistence and pro-active attitude. • Creative problem-solving skills. • Problem management skills. • Customer and result-oriented. • Excellent communication skills. • Highly customer and result-focused. • Sense of Ownership • Service and quality focus/mindset • Excellent English reading, writing, and conversation. • Flexible (After completion of probation period it is expected to be ready to work in rotational shifts). Interested and eligible candidates can apply directly or can share their updated resume with the current CTC, expected CTC, and Notice Period on careers-in@thelogicfactory.com
Posted 2 months ago
6.0 - 11.0 years
4 - 8 Lacs
Mumbai, Bengaluru
Work from Office
The SOC Analyst is responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents using a variety of tools and technologies. This role is critical in protecting the organizations digital assets and ensuring compliance with security policies and standards. Monitor SIEM systems and security tools for suspicious activity. Analyze and respond to security incidents and threats. Stay updated on threat intelligence and attack trends. Review logs from firewalls, IDS/IPS, and antivirus tools. Escalate critical incidents and document findings. Support vulnerability management and remediation tracking. Configure and tune security tools like SIEM and EDR. Ensure compliance with security policies and audits. Collaborate with IT and network teams on investigations. Contribute to process improvements and incident playbooks. Primary Skills SIEM (e.g., Splunk, QRadar, ArcSight) Incident Response Log Analysis Threat Intelligence Secondary Skills Scripting (Python, PowerShell, Bash) Cloud Security (AWS, Azure, GCP) Endpoint Detection and Response (EDR)
Posted 2 months ago
4.0 - 7.0 years
0 - 2 Lacs
Bengaluru
Hybrid
Job Title: Functional Analyst Location: Bangalore Work Mode: Hybrid (2 to 3 days in office per week) Experience: 4 to 7 years Job Summary: We are seeking a detail-oriented and proactive Functional Analyst with 47 years of experience in business analysis, process modeling, and functional specification. The ideal candidate must possess strong skills in UML , BPMN , and SQL , and should be capable of translating business requirements into functional solutions. Key Responsibilities: Conduct detailed requirement elicitation and business process analysis through interactions with stakeholders. Translate business needs into clear functional specifications and use cases. Create process models and system diagrams using UML and BPMN standards. Collaborate with cross-functional teams including developers, QA, and business stakeholders. Document and maintain requirements traceability throughout the project lifecycle. Perform data analysis using SQL to support requirement validation and decision-making. Drive stakeholder meetings and ensure alignment between business objectives and technical implementation. Act as a liaison between business teams and technical teams to ensure successful delivery. Mandatory Skills: Strong hands-on experience in UML (Use Cases, Activity Diagrams, Sequence Diagrams) Proficiency in creating BPMN models using tools like Visio, Bizagi, or similar Good knowledge of SQL for data analysis and validation Proven experience in requirement gathering, analysis , and functional documentation Strong understanding of business process modeling and reengineering Good to Have: Exposure to Agile or Scrum environments Experience in preparing BRD, FSD, and user stories Knowledge of enterprise tools like JIRA, Confluence, or similar Qualifications: Bachelor's degree in Computer Science, Information Technology, Business, or a related field 4 to 7 years of relevant experience as a Functional Analyst or Business Analyst
Posted 2 months ago
4.0 - 5.0 years
6 - 7 Lacs
Hyderabad
Work from Office
Provide advanced incident response and threat analysis in a Security Operations Center (SOC). Lead investigations, conduct forensics, and manage escalated security incidents to minimize risks and ensure data protection.
Posted 2 months ago
4.0 - 5.0 years
6 - 7 Lacs
Hyderabad
Work from Office
Implement and manage security protocols in Operational Technology (OT) environments, ensuring the protection of industrial control systems, SCADA, and other critical infrastructure from cyber threats.
Posted 2 months ago
4.0 - 5.0 years
6 - 7 Lacs
Karnataka
Work from Office
Implement and manage Splunk for monitoring and analyzing machine data to ensure system performance and security.
Posted 2 months ago
2.0 - 4.0 years
4 - 6 Lacs
Chennai
Work from Office
The Cyber Threat Detection and Development role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Threat Detection and Development domain.
Posted 2 months ago
2.0 - 4.0 years
4 - 6 Lacs
Mumbai
Work from Office
The Cyber Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security domain.
Posted 2 months ago
2.0 - 4.0 years
4 - 6 Lacs
Chennai
Work from Office
The Cyber Security E2 role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security E2 domain.
Posted 2 months ago
3.0 - 5.0 years
5 - 7 Lacs
Mumbai
Work from Office
The Firewall,WAF role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Firewall,WAF domain.
Posted 2 months ago
2.0 - 4.0 years
4 - 6 Lacs
Hyderabad
Work from Office
The Cyber Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security domain.
Posted 2 months ago
2.0 - 4.0 years
4 - 6 Lacs
Bengaluru
Work from Office
The Cyber Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security domain.
Posted 2 months ago
2.0 - 5.0 years
4 - 7 Lacs
Hyderabad
Work from Office
The Securonix/UEBA/SIEM, Tripwire IP360, Tripwire CCM, AWS Guardduty role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Securonix/UEBA/SIEM, Tripwire IP360, Tripwire CCM, AWS Guardduty domain.
Posted 2 months ago
2.0 - 4.0 years
4 - 6 Lacs
Karnataka
Work from Office
The Imperva DB security Engineer role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Imperva DB security Engineer domain.
Posted 2 months ago
3.0 - 5.0 years
5 - 7 Lacs
Mumbai
Work from Office
The Firewall,WAF role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Firewall,WAF domain.
Posted 2 months ago
2.0 - 5.0 years
4 - 7 Lacs
Hyderabad
Work from Office
The Securonix/UEBA/SIEM, Tripwire IP360, Tripwire CCM, AWS Guardduty role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Securonix/UEBA/SIEM, Tripwire IP360, Tripwire CCM, AWS Guardduty domain.
Posted 2 months ago
4.0 - 6.0 years
15 - 25 Lacs
Hyderabad
Work from Office
Job Summary 1.Job title SECURITY OPERATIONS 2.Job summary CASB Crowdstrike 3.Experience 5to8yrs 4.Required Skills Technical Skills- Security Change LifeCycle Mang Domain Skills- 5.Nice to have skills Techincal Skills- Incident Management Responsibilities Detailed knowledge of cloud infrastructure cloud networking and infrastructure concepts and various cloud resources like containers kubernetes clusters VMs IaC GitHub Terraform Log analysis and troubleshooting of security tools Troubleshooting testing Complete service requests from SOC Tools Used Jira GitHub GCP AWS or Azure console Chronicle Crowdstrike Proofpoint XSOAR Netskope
Posted 2 months ago
6.0 - 8.0 years
27 - 42 Lacs
Hyderabad
Work from Office
Job Summary Azure Cloud Security 3.Experience : 5to8yrs 4.Required Skills : Technical Skills : Security Domain Skills : 5.Nice to have skills : Domain Skills : 6.Technology : Data Security Responsibilities Detailed knowledge of cloud infrastructure cloud networking and infrastructure concepts and various cloud resources like containers kubernetes clusters VMs IaC GitHub Terraform Log analysis and troubleshooting of security tools Troubleshooting testing Complete service requests from SOC GCP Azure console Terraform GitHub Cloud infrastructure knowledgeexperience Security tool health monitoring maintenance updates
Posted 2 months ago
8.0 - 12.0 years
13 - 20 Lacs
Vadodara
Work from Office
Key Responsibilities: Linux Server Administration: Install, configure, manage, and maintain Linux-based systems (RHEL, CentOS, Ubuntu, etc.). Automation & Scripting: Develop and maintain automation scripts using Python and Bash for system monitoring, log analysis, and performance optimization. System Monitoring & Troubleshooting: Ensure high availability, monitor system performance, and resolve hardware/software issues. Security & Compliance: Implement security best practices, patch management, firewall rules, and user access controls.
Posted 2 months ago
8.0 - 12.0 years
13 - 20 Lacs
Kolkata
Work from Office
Key Responsibilities: Linux Server Administration: Install, configure, manage, and maintain Linux-based systems (RHEL, CentOS, Ubuntu, etc.). Automation & Scripting: Develop and maintain automation scripts using Python and Bash for system monitoring, log analysis, and performance optimization. System Monitoring & Troubleshooting: Ensure high availability, monitor system performance, and resolve hardware/software issues. Security & Compliance: Implement security best practices, patch management, firewall rules, and user access controls.
Posted 2 months ago
8.0 - 12.0 years
13 - 20 Lacs
Patna
Work from Office
Key Responsibilities: Linux Server Administration: Install, configure, manage, and maintain Linux-based systems (RHEL, CentOS, Ubuntu, etc.). Automation & Scripting: Develop and maintain automation scripts using Python and Bash for system monitoring, log analysis, and performance optimization. System Monitoring & Troubleshooting: Ensure high availability, monitor system performance, and resolve hardware/software issues. Security & Compliance: Implement security best practices, patch management, firewall rules, and user access controls.
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough