Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
8.0 - 12.0 years
13 - 20 Lacs
Salem
Work from Office
Key Responsibilities: Linux Server Administration: Install, configure, manage, and maintain Linux-based systems (RHEL, CentOS, Ubuntu, etc.). Automation & Scripting: Develop and maintain automation scripts using Python and Bash for system monitoring, log analysis, and performance optimization. System Monitoring & Troubleshooting: Ensure high availability, monitor system performance, and resolve hardware/software issues. Security & Compliance: Implement security best practices, patch management, firewall rules, and user access controls.
Posted 2 months ago
9.0 - 14.0 years
27 - 42 Lacs
Bengaluru
Work from Office
Job Summary: We are seeking a highly experienced SOC SME to lead complex incident response, design advanced detective controls, and perform proactive threat hunting across multi-platform environments. This role demands strong technical expertise in security operations and a proactive approach to threat mitigation. Work from Office - Bangalore location [Brookfield] Rotational and Night Shift applicable Mandatory Skill Set: 8+ years in Security Operations/Incident Response Hands-on with SIEM, SOAR, XDR platforms (e.g., Cortex XSIAM, Torq) Expertise in threat hunting and event analysis Knowledge of cyber frameworks: MITRE ATT&CK, NIST, Kill Chain Experience with EDR tools , network forensics , and log analysis Strong understanding of incident lifecycle and post-incident reporting Excellent analytical and communication skills Bachelor's degree in Computer Science or related field Key Responsibilities: Lead incident response (IR) and analyze complex security events Design and improve detective controls and alert use cases Conduct proactive threat hunting and trend analysis Stay updated on cyber threat landscape and threat actor TTPs Contribute to security innovation , tool enhancement, and process maturity Deliver detailed incident reports and post-mortem reviews Preferred Skills: Scripting: Python, PowerShell Cloud Security: AWS, Azure, GCP Certifications: CISSP, GIAC, CEH Strong grasp of defense-in-depth and layered security strategies
Posted 2 months ago
5.0 - 7.0 years
10 - 12 Lacs
Bengaluru
Work from Office
OPPORTUNITY OVERVIEW As a Platform Specialist Team Lead at ZeroFOX, you will join a team of highly skilled individuals working to prevent cyber attacks for enterprise-level commercial and government customers. Using our proprietary hybrid intelligence platform, this role specifically focuses on supporting existing customers by providing detailed analysis and contextualization regarding a variety of cyber risks. You will have the opportunity to research these risks, develop notification and alert packages, and present your findings to customers. Your goal: Keep our customers safe with detailed threat intelligence information, and present findings in a professional manner. Responsibilities: Analyze large volumes of data for customer-related risks. Create risk notification and alert packages for customers. Interface with customers and stakeholders to provide analysis reports and details. Support and respond to customer requests for further information and analysis. Responsible for communications with the customers including: phone, video, email, and authoring reports. Triage alerts for customers to give real time intelligence. Act as an escalation point for Tier 1 alert analysis, platform configuration, and trend analysis; Managing the team based on metric driven outcomes Serve as a resource for the Account Management team to explain the managed service. Act as a customer advocate internally, working across appropriate teams to solve customer challenges Support team productivity and outputs during assigned shifts. Identify opportunities for process improvement and efficiency. Provide coaching, training, and mentorship to team members. Act as a liaison between team members and upper management. Conduct regular performance evaluations and provide feedback to team members. Provide regular updates and reports on team progress to upper management. Required Qualifications: Attention to detail Experience working in a team environment and responsible for certain aspects of service delivery Ability to lead a team and be a point of contact as a subject matter expert Knowledge of the cyber threat environment including how the following sources of data enable cyber operations: major social networks (knowledge of emerging networks a big plus); dark web; domain abuse; analyze security incidents, such as account breaches, unauthorized access, or malicious content etc. Superior research and analysis skills Ability to convey complex ideas, trends, and information in a simple way (a writing sample will be requested as part of the interview process) Ability to extrapolate trends from mass amounts of disparate data Solid interpersonal and social skills Experience with other SaaS, cyber security, or social media products or services is preferred Must be willing to work alternative work schedule including partial weekends Big Bonus: Basic scripting capabilities: JavaScript, Python, or similar; at minimum being able to review and edit basic code structure Comfort working with a quickly growing team Ability to quickly adapt and recommend solutions as needed A self-starting mentality, when you find a problem, you alert the team, and fix ityou dont wait for the next task. Familiarity and comfort with producing superior work while meeting aggressive deadlines Benefits Competitive compensation Community-driven culture with employee events Generous time off Best-in-class benefits Fun, modern workspace Respectful and nourishing work environment, where every opinion is heard and everyone is encouraged to be an active part of the organizational culture
Posted 2 months ago
4.0 - 8.0 years
6 - 10 Lacs
Hyderabad
Work from Office
Security Specialist Location: Hyderabad Position: 1 Experience: 4 to 8 years pre sales discussions and design security architecture based on customer requirement. Implement firewalls, anti-virus software, log management, authentication systems, content filtering, Professional IT certifications will be added advantage
Posted 2 months ago
4.0 - 9.0 years
11 - 15 Lacs
Hyderabad
Work from Office
Key Responsibilities: Design, implement, and manage Palo Alto Networks solutions, including: Next-Gen Firewall (NGFW) EDR/XDR (Cortex XDR) SIEM/SOAR (Cortex XSIAM) Lead and support migration projects from legacy platforms (e.g., Splunk, Sentinel, QRadar) to Palo Alto Cortex XSIAM Work with clients to understand business requirements and deliver tailored cybersecurity solutions Perform threat hunting, alert tuning, policy configuration, and use case development Collaborate with global teams (onshore/offshore model) for delivery in sectors like Telecom, Finance, Retail, and Public Sector Support security assessments, integrations, and continuous improvement initiatives Required Skills & Qualifications: Strong hands-on experience in Palo Alto technologies (NGFW, Cortex XDR/XSIAM) Proven knowledge of cybersecurity operations, SOC processes, and incident response Experience with SIEM migration and integrations Understanding of threat intelligence, detection engineering, and automation Good knowledge of scripting (Python, PowerShell) and log analysis Excellent communication and client-facing skills Preferred Certifications: Palo Alto Networks Certifications, such as: PCNSE (Network Security Engineer) Cortex XDR/XSIAM certifications (if available) Additional certifications like CEH, CISSP, or relevant SIEM/EDR vendor certifications are a plus Why Join Us? Opportunity to work on cutting-edge XSIAM and XDR deployments Part of a growing global team delivering high-impact security projects Exposure to federal and enterprise-grade environments Flexible work culture with opportunities for on-site (Australia/US) engagements
Posted 2 months ago
2.0 - 5.0 years
5 - 9 Lacs
Noida
Work from Office
Optum is a global organization that delivers care, aided by technology to help millions of people live healthier lives. The work you do with our team will directly improve health outcomes by connecting people with the care, pharmacy benefits, data and resources they need to feel their best. Here, you will find a culture guided by inclusion, talented peers, comprehensive benefits and career development opportunities. Come make an impact on the communities we serve as you help us advance health optimization on a global scale. Join us to start Caring. Connecting. Growing together. Primary Responsibilities Monitor and analyze attempted efforts to compromise security protocols. Identify and investigate activities and conduct and provide analyses regarding results Collaborate with other Cyber Defense teams Review SIEM alerts and logs to identify and report possible security issues Serve as an escalation resource and mentor for other SOC analysts Perform investigations and escalation for complex or high severity security threats or incidents Work across the organization to define, develop, and refine correlation rules Participate in writing security status reports to provide system status, report potential and actual security violations and provide procedural recommendations Participate in knowledge sharing with other team members and industry collaboration organizations to advance the security monitoring program Participate in developing and supporting strategic plans and projects to meet Global Security and SOC goals and objectives Maintain an in-depth knowledge of common attack vectors, common security exploits, and countermeasures. Maintain a solid working knowledge of Information Security principles and practices Research the current information security and event monitoring trends, and keep up to date with SOC issues, technology, and industry best practices Coordinate evidence/data gathering and documentation and review Security Incident reports Assist in strategic initiatives Provide recommendations for improvements to security operational monitoring and incident response procedures based on operational insights Comply with the terms and conditions of the employment contract, company policies and procedures, and any and all directives (such as, but not limited to, transfer and/or re-assignment to different work locations, change in teams and/or work shifts, policies in regards to flexibility of work benefits and/or work environment, alternative work arrangements, and other decisions that may arise due to the changing business environment). The Company may adopt, vary or rescind these policies and directives in its absolute discretion and without any limitation (implied or otherwise) on its ability to do so Required Qualifications BS in Computer Science, Computer Engineering, Cyber Security, Forensics and/or equivalent work experience Security certifications (e.g. Security+, Network+, Cloud+, AZ-900 (Microsoft Azure Fundamental), SC-200 (Microsoft Security Operations Analyst, etc.) Experience in incident detection and response Experience working with network tools and technologies such as firewall (FW), proxies, IPS/IDS devices, full packet capture (FPC), and email platforms Willing to work in a team-oriented 24/7 environment; schedule flexibility as needed to work with a global team Preferred Qualifications Experience building use cases and performing log analysis using technology like KQL, Splunk, AlienVault, Q-radar etc. SOAR or Scripting experience using Python, PowerShell etc. At UnitedHealth Group, our mission is to help people live healthier lives and make the health system work better for everyone. We believe everyone-of every race, gender, sexuality, age, location and income-deserves the opportunity to live their healthiest life. Today, however, there are still far too many barriers to good health which are disproportionately experienced by people of color, historically marginalized groups and those with lower incomes. We are committed to mitigating our impact on the environment and enabling and delivering equitable care that addresses health disparities and improves health outcomes — an enterprise priority reflected in our mission.
Posted 2 months ago
10.0 - 14.0 years
8 - 10 Lacs
Noida, Gurugram, Delhi / NCR
Work from Office
threat hunting and intelligence analysis tools,malware analysis and threat detection, SOC operations, Malware Reverse Engineering, Exploit Development, SIEM, IDS/IPS, and other security tools, CTIA, GCIA,GCIH, OSCP+,GCTI Required Candidate profile malware, ransomware, application & network layer attacks,shell, Python, and PowerShell SIEM platform (e.g., Splunk, Elastic Stack) SQL queries,Threat Hunter & Threat Intelligence Analyst
Posted 2 months ago
1.0 - 6.0 years
1 - 4 Lacs
Mumbai, Thane, Navi Mumbai
Work from Office
This Opportunity is with a leading Fintech Company for their office in Thane location Role: SOC Executive Experience: 1 - 5 Years Job Description: Job Purpose: We are seeking a proactive and detail-oriented SOC Analyst with hands-on experience in SIEM tools such as ManageEngine Event Log Analyzer and SISA MDR. The ideal candidate will be responsible for monitoring, analysing, and responding to security incidents and events, managing alert configurations, and maintaining SOC operations including dashboards, asset inventories, and firewall analysis. This role is critical in the early detection and response to cybersecurity threats and in ensuring the overall security posture of the organization. Roles & Responsibilities: Operate and manage SIEM tools including ManageEngine EventLog Analyzer and SISA MDR to monitor and analyze security events in real-time. Deploy, configure, and manage log sources, and generate actionable reports using EventLog Analyzer. Perform in-depth log analysis and search for specific security events or anomalies within the SIEM environment. Onboard new devices and applications into the SIEM system, ensuring comprehensive log collection and visibility. Configure and fine-tune alert rules to identify potential threats and reduce false positives. Develop, maintain, and regularly update SOC dashboards to reflect current threat status and incident trends. Coordinate with support teams to raise Service Request Forms (SRFs), track ticket resolutions, and manage incident lifecycle activities. Define security policies and conduct vulnerability assessments using Nessus, analysing scan results for remediation planning. Continuously monitor SOC for suspicious activities such as DDoS attacks, port scanning, and unauthorized access attempts. Maintain an accurate asset inventory for SOC systems (desktops, laptops, servers) and verify that all Windows systems are properly licensed. Act as a first-level responder during security incidents, escalating issues such as bandwidth spikes, firewall violations, network outages, and unauthorized activities. Monitor and analyse firewall logs using FortiAnalyzer, identifying top sources/destinations, bandwidth-heavy applications, critical threats, and policy violations. Qualification/ Knowledge/ Skills/ Experience: Bachelors degree in information security, Computer Science, or related field. 1-2 years of relevant work experience. Proven experience with SIEM platforms (ManageEngine, SISA MDR) and vulnerability scanning tools (Nessus). Strong understanding of network protocols, firewall technologies, and incident response procedures. Experience in log analysis, alerting configuration, and SOC monitoring. Knowledge of Fortinet firewalls and experience with FortiAnalyzer preferred. Familiarity with security standards and compliance requirements. Good communication and documentation skills. Preferred Certifications: CompTIA Security+ / CySA+ EC-Council CEH GIAC (GCIH, GCIA) ManageEngine or Fortinet product certifications (preferred). Interested Candidates can share their CV's at priyal@topgearconsultants.com
Posted 2 months ago
5.0 - 10.0 years
5 - 15 Lacs
Hyderabad
Work from Office
Job Title: Security Operations Center (SOC) Analyst (Positios-02) Experience: 5 to 8 Years Location: Hyderabad Department: Cybersecurity / Security Operations Industry: IT Services / MSSP / Software / FinTech / Healthcare IT Job Summary: We are seeking an experienced and detail-oriented SOC Analyst (58 years) to join our cybersecurity team. The ideal candidate will be responsible for monitoring, detecting, investigating, and responding to cyber threats across the organization. The SOC Analyst will play a critical role in defending systems, applications, and data from security breaches and supporting incident response efforts, threat hunting, and continuous improvement of SOC processes. Key Responsibilities: Security Monitoring & Incident Response: Continuously monitor SIEM dashboards, threat intelligence feeds, and security alerts. Investigate and respond to security incidents, phishing attacks, malware infections, and anomalous activities. Triage alerts based on severity, business impact, and threat intelligence context. Perform root cause analysis and prepare incident reports with actionable recommendations. Escalate critical incidents to Tier 3/IR teams and collaborate during major security events. Threat Detection & Hunting: Conduct proactive threat hunting based on IOCs, TTPs, and threat intelligence reports. Analyse logs from endpoints, firewalls, IDS/IPS, cloud workloads, and third-party security solutions. Develop and fine-tune detection rules and correlation logic in SIEM (e.g., Splunk, Sumo Logic, Sentinel). Tool & Infrastructure Management: Work with EDR, NDR, DLP, SIEM, SOAR, and vulnerability management platforms. Support integration of new log sources and ensure completeness of logging for critical systems. Maintain threat detection playbooks and contribute to process automation via SOAR tools. Compliance & Reporting: Ensure security operations align with frameworks like NIST, ISO 27001, SOC 2, or HIPAA. Support security audit requirements by providing incident logs and response documentation. Generate periodic reports on incident trends, SOC performance, and threat landscape. Required Skills & Experience: 5–8 years of experience in a SOC environment or cybersecurity operations role. Strong knowledge of attack vectors, MITRE ATT&CK framework, and incident response lifecycle. Hands-on experience with SIEM (e.g., Splunk, Microsoft Sentinel, QRadar, LogRhythm). Familiarity with endpoint protection (CrowdStrike, SentinelOne, Defender ATP, etc.). Knowledge of Windows/Linux log analysis, firewall rules, and cloud security controls (Azure/AWS). Strong analytical thinking, attention to detail, and ability to work under pressure. Preferred Qualifications: Bachelor’s degree in Cybersecurity, Computer Science, or related field. Certifications such as CEH, GCIA, GCIH, CySA+, AZ-500, or Security+ are highly desirable. Experience working in a 24x7 SOC or with MSSP environments is a plus. Exposure to compliance-driven industries (finance, healthcare, SaaS) preferred. Soft Skills: Strong communication and documentation skills. Ability to collaborate across IT, DevOps, and security teams. Risk-aware mindset with a proactive approach to security operations. Work Mode: On-site / Hybrid / 24x7 Rotational Shifts if applicable Reporting To: SOC Manager / Head of Security Operations
Posted 2 months ago
2.0 - 6.0 years
8 - 9 Lacs
Mumbai
Work from Office
Diverse Lynx is looking for SOC Analyst to join our dynamic team and embark on a rewarding career journey. Monitor and analyze security events and incidents, identifying and investigating potential threats Maintain the security of our network and systems by implementing security controls and best practices Work closely with the rest of the security team to ensure that our systems and networks are secure and compliant with industry standards Maintain accurate documentation and reports on security events and incidents Communicate effectively with team members and other stakeholders to ensure that security issues are addressed in a timely and effective manner Stay up to date with the latest security technologies and threats
Posted 2 months ago
4.0 - 9.0 years
9 - 13 Lacs
Bengaluru
Work from Office
Diverse Lynx is looking for SOC Lead to join our dynamic team and embark on a rewarding career journey. Lead the SOC team and manage the organization's security operations Ensure that the SOC is staffed with skilled analysts and that the SOC team is executing their tasks efficiently and effectively Monitor and respond to security events and alerts to detect potential security incidents Manage security incidents and provide guidance on remediation Develop and maintain incident response plans and playbooks Collaborate with cross-functional teams to ensure security technologies, policies, and procedures align with business needs Develop and maintain security policies, standards, and procedures Conduct security awareness training for employees and contractors Experience with security information and event management (SIEM) tools such as Splunk or QRadar Excellent problem-solving and analytical skills Strong communication and interpersonal skills
Posted 2 months ago
6.0 - 8.0 years
17 - 25 Lacs
Gurugram
Work from Office
The Job Responsibilities: Your duties will include providing technical L2 support to both internal and external customers across our full suite of OTC Derivative products and FX for post-trade confirmation processing. Liaising with other team members, Product, Development and particularly the infrastructure teams as required for 3rd line escalation. Technical advisory will be required at times by Product and business or clients for solution delivery. Working directly with clients, to understand and resolve issues and liaising with delivery teams to ensure readiness for new platform releases. Based in our Gurgaon office, you will be responsible for handling escalations, identify and communicate technical resolutions in English. Your Profile What Were Looking For: University graduate or equivalent with background of bachelors in computer science. Ability to read and trace Java, C++ and/or scripting languages. Possess the understanding of PAAS and implementation with OpenShift. Experience or having high motivation to pick up cloud implementation on AWS. Experience in handling client issues and expectation management. Experience in Application Support, software development and deployment (SDLC). Good Unix skills, including scripting experience. Experience of XML and XSLT. Experience of databases including SQL scripting, preferably but not limited to Oracle. Good understanding of messaging platforms and protocols like FIX and IBM MQ. Understanding of networking principles, its practical uses and basic troubleshooting. Experience in encrypted connectivity channels utilizing SSL and TLS. Have experience of working in the Finance Industry. Knowledge of the Financial OTC Derivative and FX products. Good understanding of Application Support processes. Awareness of Derivatives products and post trade processing (desirable). Be flexible regarding hours including weekends and public holidays. Knowledge of financial protocols like FIX, FPmL, TOF etc Ability to understand Application architecture, and able to effectively navigate to the problem area. Ability to apply analytic methodology, such as trending, distribution etc., to get insight from application data to help troubleshooting.
Posted 2 months ago
7.0 - 12.0 years
7 - 12 Lacs
Akola
Work from Office
Job Description: Work with Product Owners to understand business requirements, translate into technical specifications and build "right" software. Discover true requirements, underlying feature requests and recommend alternative technical approaches and deliver the tasks in a timely manner. Perform code reviews for peers which provide feedback not only on code quality, but on design and implementation. Troubleshoot, investigate, and identify incidents using a combination of tracing, alerting and log analysis. Considering security, scalability, reliability, and performance of systems when developing Improve the code quality by implementing best practices. Provide on-call support during off hours to resolve any production issues. Spring boot 3.o migration experience. Great to have Experience with Tool Based Migration Experience to Spring Boot 3.o Qualification: Experience in Java 17, Spring Boot 3+, Microservice Architecture, Hibernate, Cloud 7+ years of development experience using Java, springboot and hibernate. 3+ years of experience developing web applications using thymeleaf/html. 3+ years of CI/CD experience using Jenkins or any other tool. Good verbal, interpersonal and written communication skills. Advanced skills in troubleshooting and resolving technical problems.
Posted 2 months ago
2.0 - 6.0 years
3 - 7 Lacs
Bengaluru
Work from Office
Must have strong design, development, and maintenance of Automic Workload Job scheduler Configure, manage, and troubleshoot Automic environments. Design and schedule jobs Develop and maintain scripts in Automic scripting language and other languages like Shell, batch, SQL, and Python Strong knowledge of SQL/PLSQL Troubleshoot issues, perform log analysis, and resolve problems within the Automic environment. Experience working in Agile methodology and working with client directly as required. Coordinate between onsite/offshore teams for collaboration Retail Domain Knowledge Knowledge of Git, CI/CD, and cloud technologies Experience in Production Support and ITSM process Be flexible and ready to work in shifts
Posted 2 months ago
8.0 - 13.0 years
4 - 8 Lacs
Pune
Work from Office
The Pore Pressure/Geomechanics Specialist provides support for well planning and execution by collaborating with the cross-disciplinary well delivery teams by developing geologically sound and compliant pore and fracture pressure forecasts and wellbore stability models. The specialist also assists in pressure detection efforts for wells and incorporates sub-surface related nonproductive time and drilling events into new forecasts. Primary Accountabilities Pore Pressure and Fracture Pressure Forecasting: For pore pressure, the specialist should be able to integrate offset well data such as measured pressures, connection gases, log data in context of the geological setting to generate a pore pressure forecast. For fracture gradient, there will be an emphasis on analysis and integration of data from multiple sources to generate a forecast e.g. log data, drilling data, Mini-frac/leak off data, Data from Lost Circulations Events and Geological Setting. Integrate work with others on the multi-disciplinary well planning team to optimize the design on the selection of drilling fluid type/weight, casing string design, setting depths, potential geo-hazards and mitigation techniques. Operational Support for Pore Pressure Detection as required for complex development or exploration wells in collaboration with the remote collaboration center; including real-time model calibration, kick analysis, gas and breathing analysis and losses investigations. Drillability Assessment: Develop wellbore strengthening model and implementation plan for drilling through depleted reservoirs. Wellbore stability analysis: Developing wellbore stability models as the basis for providing minimum mud weight recommendations for drilling and completing wells. There will be an emphasis on analysis and integration of data from multiple sources e.g. log data, drilling data, cavings analysis, image and caliper log analysis etc. Operational assessment: contribute to Reservoir Development Operating Limits, broaching analyses, zonal isolation assessment, alternate well design, deviation/abandonment risk assessments. Participate in risk assessments to represent the PPFG, zonal isolation and broaching risks. Participation in subsurface related non-productive time (NPT) analyses and investigations Support development and implementation of a world class PPFG and Geomechanics toolkit. Represent BP externally as required at industry meetings and JIPs etc. Coach for less experienced team members Essential Education Master s or PhD in Engineering, Science, Geoscience, Geomechanics or Mathematics Essential Criteria Minimum 8 years of experience in relevant oilfield (drilling PPFG/geomechanics) with operator or service company. The candidate must be familiar with PPFG, geomechanics, drilling and subsurface aspects of Well Planning and Execution. Desirable Criteria and Qualifications Previous PPFG experience with an operator; previous geomechanics experience such as wellbore stability and formation pressure integrity tests. Awareness of Geology, Petrophysics, Basin Modelling, Processing Geophysics, Reservoir Geomechanics, Drilling Engineering, Rig Systems, and Well Control. Software proficiency and coding capability (e.g., VBA, Python, Techlog and Petrel).
Posted 2 months ago
4.0 - 8.0 years
10 - 15 Lacs
Bengaluru
Work from Office
Senior SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This Senior SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Senior SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack Preferred technical and professional experience Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred ExperienceExperience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures
Posted 2 months ago
2.0 - 5.0 years
2 - 5 Lacs
Bengaluru
Work from Office
Varonis is looking for Security Analyst to join our dynamic team and embark on a rewarding career journey. Defining, planning, implementing, maintaining, and upgrading security measures, policies, and controls Assisting with the creation of updates and training programs to secure the network and train the employees Keeping the security systems up to date Monitoring security access and maintaining the relevant data Conducting vulnerability testing and risk analyses to assess security and performing internal and external security audits Analyzing security breaches to identify the cause and to update incidence responses and disaster recovery plans
Posted 2 months ago
2.0 - 7.0 years
15 - 16 Lacs
Bengaluru
Work from Office
The Consultant, Core Cyber Operations - SOC job enhances our security operations by supporting organization-wide cybersecurity threat detection and response processes. The ideal candidate will have a background in incident response, cybersecurity, security operations, and/or networking. This job is part of the team responsible for identifying, analyzing, and mitigating cyber threats, ensuring a robust security posture, and facilitating compliance with legal and regulatory requirements. With limited supervision, this job supports the following functions. Key Accountabilities SECURITY MONITORING: Continuously monitor security alerts and events using SIEM tools to identify potential threats. Analyze logs and network traffic to detect anomalies and suspicious activities. INCIDENT RESPONSE: Assist in the initial triage and investigation of security incidents. Follow established protocols to escalate incidents to senior analysts and document findings. LOG ANALYSIS: Perform detailed analysis of logs from various sources (e.g., EDR, firewalls, IDS/IPS, servers) to identify and investigate security incidents. THREAT INTELLIGENCE: Utilize threat intelligence feeds to stay informed about emerging threats. Apply this knowledge to enhance detection capabilities and improve response strategies. DOCUMENTATION: Document security incidents thoroughly, including steps taken and outcomes. Create and maintain process documentation to ensure consistent and efficient security operations. Qualifications ESSENTIAL FUNCTIONS INCIDENT RESPONSE: Leads and guides incident detection, response, and recovery processes to ensure effective and efficient management of cyber incidents. CYBER SERVICES VISIBILITY: Oversees the design and operation to assure situational visibility for all cyber services, including foundational cyber analytics and automation. THIRD PARTY COMPROMISE: Fosters partnerships on third party compromise response activities to address and mitigate risks associated with external entities. MINIMUM & TYPICAL YEARS OF WORK EXPERIENCE Minimum requirement of 2 years of relevant work experience. Typically reflects 3 years or more of relevant experience. Understanding of cybersecurity principles, threat detection, and incident response.
Posted 2 months ago
2 - 6 years
10 - 17 Lacs
Noida, Sector-142
Work from Office
Strong hands-on experience in SQL (MySQL/Postgres) and log analysis. Programming ability in Python, Node.js, or Java for debugging, automation, or support tooling. Experience with ITSM platforms such as ServiceNow or JIRA. Solid grasp of telephony and contact center systems SIP, IVR, ACD configurations, call routing logic. Excellent written and verbal communication skills with a global customer base. Prior experience in high-impact technical support or DevOps-style triage environments.
Posted 2 months ago
5 - 10 years
7 - 17 Lacs
Gurugram, Bengaluru, Mumbai (All Areas)
Work from Office
Role & responsibilities JD: This position is for a core team member at best a Technical Lead” NOT “Soc Manager” to supplement the firm’s growing cyber security monitoring function, starting from 5 to max 10yrs of experience having hands on L3/Engineering level work in most recent projects. The candidate will join a team currently responsible for: Providing first level response for security events including but not limited to intrusion detection, malware infections, denial of service attacks, privileged account misuse and network breaches. The event management includes triage, correlation and enrichment of individual events to either rule out as false positive, trigger standard detective and corrective responses, or escalating as a security incident. Improving the service level for security operations and monitoring. Creating and maintaining system documentation for security event processing. Expand the usage of security monitoring tools to improve the security of the environment based on business use cases or changes in threat landscape, root causes from security incident response, or output from security analytics Monitoring the Security Information and Event Management (SIEM) platform for security alerts. Providing metrics and reports around security monitoring by designing dashboards for asset owners and management consumption. Leveraging existing technologies within the organization to expand the scope of coverage of the security monitoring service. Provide technical and thought leadership within SOC by: o Teaching other SOC Analysts about both traditional and unconventional ways to detect, analyze, and mitigate security incidents and other anomalies o Regularly recommending new SOC practices and approaches to address program and process improvement Performs analysis duties, including: o Review of available logs to confirm there are adequate quantities and content to usefully provide Security Monitoring o Triage SIEM alerts to determine False Positive, Incident, or Technology Misconfiguration o Perform research at the request of Incident Response teams Perform case management activities to ensure successful BAU Security Monitoring Operations, including: o Documenting case activities in the system of record o Documenting current case notes sufficient for effective shift handover, as well as reviewing current status via teams, email or phone call o Engaging in all forms of communications (e.g. phone calls, instant-messaging, web page updates) to ensure cases are efficiently investigated by all approved parties, regardless of what company, department, or team to which they are a member Author Standard Operating Procedures (SOPs), such as: o Incident detection “use case” needs, logic, and implementation methods o “use case” alert triage workflows o Training documentation o Recommending, then implementing approved program improvements Reviews and analyzes complex data and information to provide insights, conclusions and actionable recommendations. Provides direction and guidance on reports and analyses and ensures recommendations are aligned with customer/business needs and capabilities. Ensures that all significant security concerns are addressed. Recommends course of action to mitigate risk and ensures that appropriate standards are established and published.
Posted 2 months ago
1 - 3 years
2 - 5 Lacs
Bengaluru
Work from Office
Title: SOC Analyst Location: Bangalore, India Role overview: As a SOC Analyst, you will be a crucial first responder to cybersecurity incidents, tasked with monitoring and analyzing threats, performing vulnerability assessments, and escalating critical issues to senior analysts. This role demands proficiency in managing and operating security tools, maintaining secure network traffic, addressing suspicious activities, and ensuring compliance with SLAs in a 24x7 operational environment. How you will create impact: Responsibilities: Incident response & analysis: Serve as the first responder during security events and when analysis of cyberattacks is required. Review incident alerts, run vulnerability tests, and escalate severe incidents to senior analysts in Tier 2. Technical Knowledge: Proficiency in Windows, Linux, networking, and incident handling in a 24x7 monitoring environment. SIEM and SLA Compliance: Knowledge on SIEM, adhere to SLA. Security Tool Management: Manage security tools - firewalls, intrusion detection and prevention technology. Network Defense: Must have the ability to defend the network. Tasks include monitoring, discovering, and analyzing possible threats. A SOC analyst should have the skills needed to maintain secure network traffic and respond to suspicious activities. Cloud and Operating System Expertise: Strong knowledge of Windows, Linux, and cloud platforms, along with networking fundamentals. Advanced Security Tools: Implement and manage security tools - firewalls, intrusion detection and prevention technology, threat and vulnerability management tools, data loss prevention tools, filtering technologies, traffic inspection solutions, reporting technology and data analytics platforms. Essential qualifications: 1-3 years of relevant experience in SOC. Should have BE/ B. Tech/BCA/MCA/ ME/M.Tech /B.Sc. (Computers)/M.Sc. (Computers) degree from a reputed University. Good to have knowledge in any programming languages- Python, C, Java Should possess strong communication skills, with the ability to effectively convey technical information to both technical and non-technical audiences, collaborate with team members, and provide clear and concise incident reports. Interview rounds & assessments: Table for Two: A brief chat with one of our Recruiters to assess your foundational competencies and provide an overview of TerraPay. Beyond the Bio: A discussion with an SME or the RM to evaluate your role-specific knowledge, problem-solving abilities, and gain a deeper understanding of the company and team dynamics. Manager Meetup: A comprehensive discussion about the role and responsibilities, expectations, and mapping out potential career growth. Hot Seat: A cultural fit round that includes an overview of the companys core values and long-term plans. Why TerraPay: TerraPay is a global money movement player on a mission to build a borderless financial world. We believe payments should be instant, reliable, transparent, seamless, and fully compliant. Registered and regulated across 31 global markets, we are a leading payment partner for banks, mobile wallets, money transfer operators, merchants, and financial institutions. We are proud to be a twice-certified Great Place to Work and were featured in the 2023 CB Insights Fintech 100 and the 2024 Financial Times 1000 lists. Our culture & core values: At TerraPay, we dont just talk about our values—we live by them. Humility, ownership & responsibility, entrepreneurship, global citizenship, and trusting empowerment are the principles that guide everything we do. If you’re looking for a career that offers abundant opportunities for innovation and a culture of excellence, TerraPay is the place to be. With comprehensive healthcare benefits, cab facilities for our India-based employees, and a generous leave policy, we’ve got you covered. Join us in one of our 10 offices worldwide and collaborate with a diverse team representing 40+ nationalities .
Posted 2 months ago
5 - 10 years
3 - 7 Lacs
Hyderabad
Work from Office
Required Experience 6 - 8 Years Skills PEGA, Pega Case Management img {max-height240px;} Must Have : Min 6 Years of hands-on Pega application design & development experience, Min 5+ years of Pega Case Management (CJCM) is a must. Hands on experience in performance analysis & code reviews using various Pega tools and performance improvement related development is a must. Issue Triaging & Log analysis capabilities (Kibana), also Flow Design understanding a must. Experience in integrating Pega applications with 3 rd party applications (CMS, Payment Systems, Other e-commerce systems) is a must. Pega, CSA, CSSA, PRPC, Case management, REST integration, Job scheduler, Queue Processor, Kafka, Agile Implement Pegas marketing solution, with a focus on outbound, inbound and real-time interactions etc. Working technical knowledge of integration (SOAP & REST) strategies, including web services Create marketing campaign functional requirements (such as segment identification, campaign steps, control groups, and contact frequencies) Good-to-Have : PEGA- CPDC Pega Decisioning (DCH HUB) experience a plus Pega RPA experience is a plus. Pega ML Studio experience is a plus. Verizon experience will be an Add-on. Sign in to apply Share this job
Posted 2 months ago
2 - 7 years
5 - 8 Lacs
Thane
Work from Office
Bachelors degree, Business Administration or any streamgraduation Job Description 1. Overall infrastructure complaintshandling of specific units. 2 Field support for all ashida unitsin wagle other premises 3 Support to all employees by timelyresolving their issues/grievances. 4 Complaints Log Analysis to bemaintained 5 Monitoring Control ofHousekeeping Security overall work. 6 Equipment survey and data monitoringcontrol 7 conducting Facility ManagementFeedback survey 8 Hands-on ERP SAP for invoiceprocessing.
Posted 2 months ago
4 - 9 years
6 - 10 Lacs
Hyderabad
Work from Office
Diverse Lynx is looking for SOC L2 Engineer to join our dynamic team and embark on a rewarding career journey Security Monitoring: Monitor security alerts and events from various sources, including security information and event management (SIEM) systems. Analyze and respond to security incidents, threats, and vulnerabilities. Incident Response: Conduct incident investigations, document findings, and implement corrective actions. Collaborate with incident response teams to contain and mitigate security incidents. Vulnerability Management: Conduct regular vulnerability assessments and coordinate remediation efforts. Stay informed about the latest security threats, vulnerabilities, and technologies. Security Infrastructure Management: Manage and maintain security technologies, such as firewalls, intrusion detection/prevention systems, and endpoint protection. Configure and fine-tune security tools to enhance detection and prevention capabilities. Log Analysis and Correlation: Analyze logs and security events for unusual or suspicious activity. Develop and implement correlation rules to enhance detection capabilities. Security Policy Enforcement: Enforce security policies and procedures to ensure compliance with industry standards and regulations. Recommend and implement improvements to security policies. Collaboration: Collaborate with other IT and security teams to ensure a coordinated response to security incidents. Provide support during security audits and assessments.
Posted 2 months ago
5 - 7 years
30 - 40 Lacs
Bengaluru
Remote
Technical Support Analyst - Fixed Income Trading Experience: 5 - 7 Years Exp Salary : USD 2,962-4,148 / month Preferred Notice Period : Within 30 Days Shift : 1:30PM to 10:30PM IST Opportunity Type: Remote Placement Type: Contractual Contract Duration: Full-Time, 06 Months (*Note: This is a requirement for one of Uplers' Clients) Must have skills required : application support / Technical support L2, Confluence, Financial Services, Log analysis, software release, Git, SQL Good to have skills : capital market regulations, financial markets, Help Desk, problem diagnosis, Rates Product SoftSolutions! SRL (One of Uplers' Clients) is Looking for: Support and Delivery Specialist (Remote) who is passionate about their work, eager to learn and grow, and who is committed to delivering exceptional results. If you are a team player, with a positive attitude and a desire to make a difference, then we want to hear from you. Role Overview Description Job Title: Support and Delivery Specialist Job Summary: Operates in direct contact with clients/traders/desk support in supporting them by mitigating emerging issues both in product usage and in planning and managing the delivery of new product versions or upgrades. Key Responsibilities: Perform the following as the second-level support: Owns, Manages, and resolves the issues reported by the end-user Manages system configurations Monitors daily procedures Collects product info and configuration for analysis Resolves independently the problems for which there is documentation Escalates and coordinates the interventions of higher level, when needed. Application support reference for Customer key contact Makes analysis and diagnosis of problems reported by First & Second Level support Executes testing and delivery of releases with the resolution of failures encountered Applies escalation procedures in case of serious malfunctions Application Delivery reference for Customer Project Manager Coordinates and plans delivery phases with internal and external Project Managers Reports activities to Client and Internal Audit. Coordinates with the entire SD&A Team Coordinates with the Development and Quality department Coordinates with customers technology partners and third-party suppliers Qualifications: Preference with a degree in Economics and Finance, Engineering, or Information Technology; ¢ Strong Interest in financial markets and/or Rates product pricing models; Proficiency in Microsoft Office, Git, Confluence, SQL Applications. At least 5 years of experience in a similar position Extensive experience in Help Desk and/or Technical Service support, with a preferred advantage to experience in software development/ software operation Ability to communicate with the customer despite critical moments Ability to Manage stress under difficult circumstances Detail oriented and inclination to get to the root of the problem. Self-starter and ability to work with minimum guidance. Exception written and verbal communication skill. Strong analytical skill Ability to analyze the data in the form of logs/configurations/system parameters to diagnose the problem. How to apply for this opportunity: Easy 3-Step Process: 1. Click On Apply! And Register or log in on our portal 2. Upload updated Resume & Complete the Screening Form 3. Increase your chances to get shortlisted & meet the client for the Interview! About Our Client: For more than 20 years the company has been delivering powerful, robust, and scalable fixed income trading technology to the largest and most forward-thinking trading institutions in the UK, Europe and the world. Our fixed income trading solutions have stood the test of time helping clients to navigate challenging market conditions with confidence, thrive in an ever-changing regulatory environment and gain a commercial and trading competitive edge. About Uplers: Our goal is to make hiring and getting hired reliable, simple, and fast. Our role will be to help all our talents find and apply for relevant product and engineering job opportunities and progress in their career. (Note: There are many more opportunities apart from this on the portal.) So, if you are ready for a new challenge, a great work environment, and an opportunity to take your career to the next level, don't hesitate to apply today. We are waiting for you!
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough