Jobs
Interviews

287 Log Analysis Jobs - Page 10

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 4.0 years

12 - 14 Lacs

Mumbai, Delhi / NCR, Bengaluru

Work from Office

We are hiring a Workforce Support Analyst (Workforce Software) with 3+ years of total experience and at least 2+ years of relevant experience in Workforce Time & Attendance systems. The ideal candidate should be a certified Workforce Software professional (PT101, PT102) with hands-on experience in troubleshooting, managing support tickets, performing root cause analysis, and responding to user queries. A bachelors degree in Business, Information Systems, or equivalent experience is required. Strong communication skills, ERP knowledge, and reporting tool proficiency are desirable. This is a hybrid role open across India, working in UK or EST shifts, with telephonic interviews and background verification required. Skills : - Workforce Support Analyst, Workforce Software, Time and Attendance, Production Support, Troubleshooting, Log Analysis, Root Cause Analysis, Workforce System Configuration, Lookup Tables Maintenance, User Support, Functional Support, Technical Support, ERP Functional Knowledge, Reporting Tools, PT101 Certification, PT102 Certification, Certified Workforce Software Professional, Business Systems, Information Systems, Hybrid Job India, UK Shift, EST Shift, Telephonic Interview, Workforce Management, Workforce Software Support Location : - Mumbai, Delhi / NCR, Bengaluru , Kolkata, Chennai, Hyderabad, Ahmedabad, Pune, Hybrid

Posted 2 months ago

Apply

5.0 - 10.0 years

13 - 23 Lacs

Hyderabad, Pune, Bengaluru

Hybrid

Primary Skills ITSM automation SME, conversational AI architects and consultants RPA automation, self-healing solutions architects and consultants Observability tools (APM and infra) SMEs AI Ops architects and consultants L3 solutions architects and consultants CloudOps / FinOps consultants AI architects, Agentic AI SMEs Role and Responsibilities Hands on experience on ITSM automation, should have worked as SME, conversational AI architects and consultants. have the working experience with L3 solutions architects on Gen AI driven impact analysis, Gen AI driven code generation Excellent problem solving/analytical skills and complex troubleshooting methods. Excellent presentation, verbal, and written communication skills. Good and adaptable with : ITSM, ServiceNow (interchangeable with SNOW), NowAssist, BMC Helix, BMC Remedy, BMC Helix RemedyForce

Posted 2 months ago

Apply

6.0 - 11.0 years

14 - 16 Lacs

Bengaluru

Work from Office

Minimum Qualifications 6+ years of experience in security engineering, detection engineering, or cloud security. Strong expertise in application security, API security, and SaaS-specific threat detection. Experience with SIEM, SOAR, and detection-as-code tools (e.g., Splunk, OpenSearch, KQL, Sigma). Proficiency in log analysis, security telemetry engineering, and anomaly detection in cloud applications. Experience integrating security controls into SaaS applications and microservices. Good programming and automation skills. Preferred Qualifications Experience with automated threat simulations, MITRE ATTCK mappings, and adversary emulation. Knowledge of risk quantification methods and security metrics for executive reporting. Familiarity with cloud-native security tools. Hands-on experience in threat intelligence-driven detection engineering. Security certifications (e.g., GIAC GCDA/GCFA, AWS Security Specialty, GCP Security Engineer, OSCP). 1. SaaS-Application Centric Detection Research Engineering Develop and refine application-layer security detections for FAaaS, Spectra, and other critical LoBs, focusing on business logic abuse, API security threats, and identity-based attacks. Research and engineer detections for SaaS-specific attack vectors. Leverage detection-as-code frameworks (e.g., Sigma, OpenSearch, KQL) to automate the development and tuning of detection rules. Work closely with application security teams to enhance telemetry and ensure that security observability is embedded in SaaS products. 2. Proactive Security Controls Mitigative Capabilities Move beyond traditional monitoring by implementing proactive security controls to mitigate threats before exploitation. Collaborate with development teams to integrate security controls into SaaS applications for real-time anomaly detection and automated response. Drive continuous security validation efforts through automated adversary simulation and detection effectiveness testing. 3. Cross-Team Integration Real-Time Threat Intelligence Sharing Drive collaboration between Detection Engineering, Incident Response, and Red Teams by aligning detection research with real-world attack simulations and post-incident learnings. Develop automated feedback loops to reduce false positives, false negatives, and coverage gaps. Work with Incident Response to develop automated triage and enrichment mechanisms for SaaS security incidents. 4. Risk-Based Detection Engineering Security Metrics Shift towards a risk-based detection approach, ensuring that high-impact threats are prioritized based on their potential financial and reputational consequences. Provide executive-level visibility into detection efficacy by quantifying the impact of mitigated threats and aligning detection efforts with business risk. Develop security dashboards and reporting to communicate detection outcomes, including risk coverage, adversary trends, and operational efficiency. 5. Proactive Threat Hunting Data Anomaly Analysis Expand threat hunting and anomaly detection capabilities to identify previously unknown threats affecting SaaS customers and cloud applications. Utilize advanced data analytics and behavioral anomaly detection to identify stealthy attacks that evade traditional detection methods. Reduce reliance on SOC-driven escalations by proactively analyzing security telemetry for signs of compromise. Work closely with data scientists to enhance the use of ML/AI-driven security analytics for predictive threat detection. #LI-DNI

Posted 2 months ago

Apply

5.0 - 10.0 years

12 - 17 Lacs

Mumbai

Work from Office

i. BE/B. TECH/BCA/B.SC/M.SC/MCA/M. Tech-(Computers/Electronics/IT) ii. Minimum one certification such as CEH/CPTC/OSCP/ECSA/CEPT and/or equivalent. iii. Having at least 5+ years of post-qualification relevant work experience including appearance before court of law while presenting the extracted cyber evidence. iv. Experience of managing large scale digital evidence media. v. Comprehensive knowledge on forensic digital device data preservation, acquisition, analysis and documentation. vi. Experience in-depth practical knowledge on Ethical Hacking, Penetration Testing, OSINT, Deep and Dark Net Investigations. vii. Experience in handling real-life cyber- crime cases would be preferred. viii. Experience in investigation on Web Defacement/Site Down activities ix. Experience in investigation of Email and VOIP call Analysis and trace Down Methods. x. Experience in investigation on Web SMS/Image/Reverse Image/Video Source tracing methods. xi. Experience in practical knowledge multiple enterprise and open source which have industry benchmark. xii. Experience in comprehensive knowledge on System, Mobile Forensics, Internet Forensics, Cloud Forensics, CC Footage/AV Forensics, Database Forensics, Network Forensics, Malware Forensics, Stegano and Crypto Forensics, Memory Forensics, UAV Forensics and /or other variety of Forensic formats. xiii. Experience in-depth practical knowledge on Malware Forensics, Memory Analysis, Ethical Hacking, Penetration Testing, OSINT, Deep and Dark Net Investigations, Advanced persistent threats (APTs), Sophisticated analysis of malware, cyber security incident (Packet tracing, Web Logs, taking a copy of the mail store and aggregated log analysis), performing threat modeling, and producing intelligence threat assessments. xiv. Experience in practical knowledge on multiple enterprise, open-source tools, Static and Dynamic Malware Analysis Tools. xv. Experience in generating forensic documents for case investigation. xvi. Graduation from premier institutes (IITs, NITs, NFSL, IIIT, etc.) shall be preferred. xvii. Bug-bounty program winners will be preferred. .

Posted 2 months ago

Apply

2.0 - 5.0 years

7 - 17 Lacs

Ahmedabad

Hybrid

Role & responsibilities • Responsible for maintaining the technical knowledge of the customer environment. • Responsible for updating the technical documents in the Support & Application Management knowledge base. • Analyze log files, provide corrective measures, and propose technical preventive solutions to the First Line team or the customer success associate. • Spar with project members about technical/functional workarounds in the model in case of defining a correction due to an incident. • May execute hotfixes in the model on Production environments. • Responsible for defining clear instruction (documentation and training) towards the front office team for incidents, service requests, or executing predictive maintenance. • Responsible for maintaining an internal Reference environment. • Contact 3rd party suppliers related to incidents or service requests. • Responsible to execute deployment of DELMIA Quintiq applications in the customer production environment to conform release instructions from the project team. • Provides input on new functional/technical opportunities to the Client Executive. • Help to improve the internal and external Continuous Services processes. • As part of the Continuous Services team, you will have direct contact with customers around the world regarding updates to their raised incidents or service requests. Preferred candidate profile Technical competencies: Basic understanding about Windows Server Operating Systems. Hands-on experience using Java/C++/C#.NET, PowerShell or similar object-oriented languages. Experience with databases like SQL Server or Oracle is nice-to-have. Experience with Log Analysis, application, and system performance analysis. Basic understanding of TCP/IP Networking would be added advantage. Previous experience with DELMIA Quintiq would be added advantage. Competence requirements: • Strong analytical and troubleshooting skills. • Persistence and pro-active attitude. • Creative problem-solving skills. • Problem management skills. • Customer and result-oriented. • Excellent communication skills. • Highly customer and result-focused. • Sense of Ownership • Service and quality focus/mindset • Excellent English reading, writing, and conversation. • Flexible (After completion of probation period it is expected to be ready to work in rotational shifts). Interested and eligible candidates can apply directly or can share their updated resume with the current CTC, expected CTC, and Notice Period on careers-in@thelogicfactory.com

Posted 2 months ago

Apply

6.0 - 11.0 years

4 - 8 Lacs

Mumbai, Bengaluru

Work from Office

The SOC Analyst is responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents using a variety of tools and technologies. This role is critical in protecting the organizations digital assets and ensuring compliance with security policies and standards. Monitor SIEM systems and security tools for suspicious activity. Analyze and respond to security incidents and threats. Stay updated on threat intelligence and attack trends. Review logs from firewalls, IDS/IPS, and antivirus tools. Escalate critical incidents and document findings. Support vulnerability management and remediation tracking. Configure and tune security tools like SIEM and EDR. Ensure compliance with security policies and audits. Collaborate with IT and network teams on investigations. Contribute to process improvements and incident playbooks. Primary Skills SIEM (e.g., Splunk, QRadar, ArcSight) Incident Response Log Analysis Threat Intelligence Secondary Skills Scripting (Python, PowerShell, Bash) Cloud Security (AWS, Azure, GCP) Endpoint Detection and Response (EDR)

Posted 2 months ago

Apply

4.0 - 7.0 years

0 - 2 Lacs

Bengaluru

Hybrid

Job Title: Functional Analyst Location: Bangalore Work Mode: Hybrid (2 to 3 days in office per week) Experience: 4 to 7 years Job Summary: We are seeking a detail-oriented and proactive Functional Analyst with 47 years of experience in business analysis, process modeling, and functional specification. The ideal candidate must possess strong skills in UML , BPMN , and SQL , and should be capable of translating business requirements into functional solutions. Key Responsibilities: Conduct detailed requirement elicitation and business process analysis through interactions with stakeholders. Translate business needs into clear functional specifications and use cases. Create process models and system diagrams using UML and BPMN standards. Collaborate with cross-functional teams including developers, QA, and business stakeholders. Document and maintain requirements traceability throughout the project lifecycle. Perform data analysis using SQL to support requirement validation and decision-making. Drive stakeholder meetings and ensure alignment between business objectives and technical implementation. Act as a liaison between business teams and technical teams to ensure successful delivery. Mandatory Skills: Strong hands-on experience in UML (Use Cases, Activity Diagrams, Sequence Diagrams) Proficiency in creating BPMN models using tools like Visio, Bizagi, or similar Good knowledge of SQL for data analysis and validation Proven experience in requirement gathering, analysis , and functional documentation Strong understanding of business process modeling and reengineering Good to Have: Exposure to Agile or Scrum environments Experience in preparing BRD, FSD, and user stories Knowledge of enterprise tools like JIRA, Confluence, or similar Qualifications: Bachelor's degree in Computer Science, Information Technology, Business, or a related field 4 to 7 years of relevant experience as a Functional Analyst or Business Analyst

Posted 2 months ago

Apply

4.0 - 5.0 years

6 - 7 Lacs

Hyderabad

Work from Office

Provide advanced incident response and threat analysis in a Security Operations Center (SOC). Lead investigations, conduct forensics, and manage escalated security incidents to minimize risks and ensure data protection.

Posted 2 months ago

Apply

4.0 - 5.0 years

6 - 7 Lacs

Hyderabad

Work from Office

Implement and manage security protocols in Operational Technology (OT) environments, ensuring the protection of industrial control systems, SCADA, and other critical infrastructure from cyber threats.

Posted 2 months ago

Apply

4.0 - 5.0 years

6 - 7 Lacs

Karnataka

Work from Office

Implement and manage Splunk for monitoring and analyzing machine data to ensure system performance and security.

Posted 2 months ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Chennai

Work from Office

The Cyber Threat Detection and Development role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Threat Detection and Development domain.

Posted 2 months ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Mumbai

Work from Office

The Cyber Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security domain.

Posted 2 months ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Chennai

Work from Office

The Cyber Security E2 role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security E2 domain.

Posted 2 months ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Mumbai

Work from Office

The Firewall,WAF role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Firewall,WAF domain.

Posted 2 months ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Hyderabad

Work from Office

The Cyber Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security domain.

Posted 2 months ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Bengaluru

Work from Office

The Cyber Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security domain.

Posted 2 months ago

Apply

2.0 - 5.0 years

4 - 7 Lacs

Hyderabad

Work from Office

The Securonix/UEBA/SIEM, Tripwire IP360, Tripwire CCM, AWS Guardduty role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Securonix/UEBA/SIEM, Tripwire IP360, Tripwire CCM, AWS Guardduty domain.

Posted 2 months ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Karnataka

Work from Office

The Imperva DB security Engineer role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Imperva DB security Engineer domain.

Posted 2 months ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Mumbai

Work from Office

The Firewall,WAF role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Firewall,WAF domain.

Posted 2 months ago

Apply

2.0 - 5.0 years

4 - 7 Lacs

Hyderabad

Work from Office

The Securonix/UEBA/SIEM, Tripwire IP360, Tripwire CCM, AWS Guardduty role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Securonix/UEBA/SIEM, Tripwire IP360, Tripwire CCM, AWS Guardduty domain.

Posted 2 months ago

Apply

4.0 - 6.0 years

15 - 25 Lacs

Hyderabad

Work from Office

Job Summary 1.Job title SECURITY OPERATIONS 2.Job summary CASB Crowdstrike 3.Experience 5to8yrs 4.Required Skills Technical Skills- Security Change LifeCycle Mang Domain Skills- 5.Nice to have skills Techincal Skills- Incident Management Responsibilities Detailed knowledge of cloud infrastructure cloud networking and infrastructure concepts and various cloud resources like containers kubernetes clusters VMs IaC GitHub Terraform Log analysis and troubleshooting of security tools Troubleshooting testing Complete service requests from SOC Tools Used Jira GitHub GCP AWS or Azure console Chronicle Crowdstrike Proofpoint XSOAR Netskope

Posted 2 months ago

Apply

6.0 - 8.0 years

27 - 42 Lacs

Hyderabad

Work from Office

Job Summary Azure Cloud Security 3.Experience : 5to8yrs 4.Required Skills : Technical Skills : Security Domain Skills : 5.Nice to have skills : Domain Skills : 6.Technology : Data Security Responsibilities Detailed knowledge of cloud infrastructure cloud networking and infrastructure concepts and various cloud resources like containers kubernetes clusters VMs IaC GitHub Terraform Log analysis and troubleshooting of security tools Troubleshooting testing Complete service requests from SOC GCP Azure console Terraform GitHub Cloud infrastructure knowledgeexperience Security tool health monitoring maintenance updates

Posted 2 months ago

Apply

8.0 - 12.0 years

13 - 20 Lacs

Vadodara

Work from Office

Key Responsibilities: Linux Server Administration: Install, configure, manage, and maintain Linux-based systems (RHEL, CentOS, Ubuntu, etc.). Automation & Scripting: Develop and maintain automation scripts using Python and Bash for system monitoring, log analysis, and performance optimization. System Monitoring & Troubleshooting: Ensure high availability, monitor system performance, and resolve hardware/software issues. Security & Compliance: Implement security best practices, patch management, firewall rules, and user access controls.

Posted 2 months ago

Apply

8.0 - 12.0 years

13 - 20 Lacs

Kolkata

Work from Office

Key Responsibilities: Linux Server Administration: Install, configure, manage, and maintain Linux-based systems (RHEL, CentOS, Ubuntu, etc.). Automation & Scripting: Develop and maintain automation scripts using Python and Bash for system monitoring, log analysis, and performance optimization. System Monitoring & Troubleshooting: Ensure high availability, monitor system performance, and resolve hardware/software issues. Security & Compliance: Implement security best practices, patch management, firewall rules, and user access controls.

Posted 2 months ago

Apply

8.0 - 12.0 years

13 - 20 Lacs

Patna

Work from Office

Key Responsibilities: Linux Server Administration: Install, configure, manage, and maintain Linux-based systems (RHEL, CentOS, Ubuntu, etc.). Automation & Scripting: Develop and maintain automation scripts using Python and Bash for system monitoring, log analysis, and performance optimization. System Monitoring & Troubleshooting: Ensure high availability, monitor system performance, and resolve hardware/software issues. Security & Compliance: Implement security best practices, patch management, firewall rules, and user access controls.

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies