Jobs
Interviews

344 Log Analysis Jobs - Page 3

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 6.0 years

0 Lacs

karnataka

On-site

As a Quality Assurance Tech II at our client's company operating a marketplace for consumers, sellers, and content creators, you will play a crucial role in ensuring the quality and reliability of web-based workflows and tools across desktop and mobile platforms. Your responsibilities will include designing and executing test cases, collaborating closely with cross-functional teams, and contributing to the improvement of test coverage and process efficiency. You should have a basic knowledge of automation frameworks and scripting languages like Java and Python, along with experience working with Android Studio, Xcode, or similar IDEs. Familiarity with backend log analysis tools and Agile methodologies is essential. Strong written and verbal communication skills are required to write clear test reports, communicate effectively with team members, and push back when necessary. The ability to multitask, manage shifting priorities, and work independently under tight timelines is crucial for success in this role. Key responsibilities include creating, reviewing, and updating test cases based on new features and requirements, owning testing for new features from planning to release, and identifying software defects using test management and bug tracking tools. You will collaborate with developers, product managers, and program teams to understand functional specs and validate system integrations related to seller onboarding, brand verification, and APOB automation. Additionally, you will contribute to automation tasks, maintain existing scripts, perform sanity checks on production deployments, and analyze logs to identify root causes of failures. To qualify for this position, you should hold a Bachelor's degree in computer science, Engineering, or a related quantitative field, along with 2-4 years of hands-on manual testing experience in web applications. Proficiency in writing test cases, executing test plans, and filing bug reports, as well as familiarity with Agile environments and cross-browser testing, are necessary. Strong problem-solving skills, attention to detail, and the ability to take ownership, prioritize tasks, and meet deadlines with minimal supervision are key attributes for success. Excellent verbal and written communication skills are required to provide assertive feedback and challenge assumptions constructively. Join our team at TekWissen Group, an equal opportunity employer committed to supporting workforce diversity.,

Posted 1 month ago

Apply

0.0 - 2.0 years

2 - 6 Lacs

Mumbai

Work from Office

":" Job Title: L1 SOC Analyst LogRhythm SIEM Location: Mumbai, India Employment Type: Full-Time | Onsite About the Role: We are seeking a proactive and dedicated L1 SOC Analyst to join our Security Operations Center in Mumbai. The analyst will be the first line of defense, responsible for monitoring, triaging, and escalating security alerts using LogRhythm SIEM. This is an excellent opportunity for candidates looking to build a strong career in cybersecurity operations. Key Responsibilities: - Monitor security events and alerts through LogRhythm SIEM console - Perform initial analysis, classification, and triage of security incidents - Escalate genuine security incidents to L2 SOC team following defined procedures - Maintain incident logs, documentation, and shift handover reports - Support incident investigations by collecting relevant logs and evidence - Monitor health of SIEM log sources and report issues proactively - Follow SOC playbooks and response procedures with high attention to detail - Participate in shift-based operations (24x7 rotational shifts) Key Skills & Competencies: - 0.6 to 2 years of experience in SOC or cybersecurity monitoring role - Hands-on exposure to LogRhythm SIEM - Knowledge of security event types, log analysis, and basic networking concepts - Understanding of common security threats, malware, phishing, brute force, etc. - Good communication skills both written and verbal - Ability to work effectively under pressure and as part of a team Preferred Qualifications: - BachelorDegree in Information Security, Computer Science, or related field - LogRhythm Certificationsoptional but desirable - Security certifications like CompTIA Security+, CEH an added advantage ","

Posted 1 month ago

Apply

15.0 - 20.0 years

3 - 7 Lacs

Pune

Work from Office

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Security Platform Engineering Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are seeking a skilled Security Engineer with expertise in Google Chronicle SIEM, parser development, and foundational knowledge of cybersecurity. The ideal candidate will be responsible for analyzing security data and logs, ensuring accurate aggregation, normalization, tagging, and classification. You will work closely with log sources, particularly security and networking devices, to enhance our security monitoring capabilities. Roles & Responsibilities:Conduct security and data/log analysis, focusing on the aggregation, normalization, tagging, and classification of logs.Research, analyze, and understand log sources for security monitoring, with a particular focus on security and networking devices such as firewalls, routers, antivirus products, proxies, IDS/IPS, and operating systems.Validate log sources and indexed data, optimizing search criteria to improve search efficiency.Utilize automation tools to build and validate log collectors for parsing aggregated logs. Professional & Technical Skills: Proficiency in log analysis and SIEM tools, including but not limited to Google Chronicle, Splunk, ArcSight, and QRadar. Experience in SIEM content creation and reporting is essential.Strong experience in manual security log review and analysis, such as Windows Event Log and Linux Syslog, including incident classification, investigation, and remediation.Solid understanding of multiple attack vectors, including malware, Trojans, exploit kits, ransomware, phishing techniques, and APTs, as well as familiarity with attack techniques outlined in the OWASP Top 10.Knowledge of security and networking devices, including firewalls, routers, antivirus products, proxies, IDS/IPS, and operating systems.TCP/IP networking skills for packet and log analysis.Experience working with Windows and Unix platforms.Familiarity with databases is an advantage.Experience in GCP, AWS and Azure environments is a plus. Additional Information:- The candidate should have minimum 5 years of experience in Security Platform Engineering.- This position is based at our Pune office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply

2.0 - 6.0 years

0 Lacs

delhi

On-site

As a UAV Integration and Support Engineer at Zerodrag located in IIT-Delhi, New Delhi, you will have the opportunity to work with a team that specializes in developing cutting-edge avionics and communication systems for drones. Zerodrag is focused on creating high-performance systems for both FPV and enterprise UAV platforms, combining expertise in hardware, firmware, and flight testing. Your main responsibility will be to bring Zerodrag's hardware to life by assembling, testing, flying, and providing support for drones equipped with Zerodrag systems. This role is hands-on and field-oriented, making it ideal for individuals who are passionate about UAVs, problem-solving, and pushing the boundaries of innovation. Key Responsibilities: - Drone Assembly & Integration: Construct multirotor and fixed-wing drones using Zerodrag flight controllers, ESCs, GNSS, telemetry, and other avionics components. - System Testing: Verify the functionality of various components such as sensors, radios, and power systems through bench tests and integration checks. - Flight Testing: Perform field tests, adjust parameters, troubleshoot issues during flights, and communicate feedback to the engineering team. - Troubleshooting & Reporting: Identify and diagnose system issues, analyze logs, and document findings in a clear and structured manner. - Client Support: Assist customers with setup, debugging, and product support both remotely and on-site as needed. Requirements: - Hands-on experience in drone assembly and wiring - Knowledge of ArduPilot, PX4, Betaflight, and Inav platforms - Ability to conduct field testing, PID tuning, and basic log analysis - Proficiency in soldering, using multimeters, and basic diagnostic tools - Excellent communication and documentation skills Bonus Skills: - Experience in supporting enterprise drone clients - Background in RF systems, telemetry, or custom drone builds If you are enthusiastic about UAV technology, enjoy problem-solving challenges, and thrive in an innovative environment, this role at Zerodrag may be the perfect fit for you. Join us in shaping the future of drone avionics and communication systems.,

Posted 1 month ago

Apply

5.0 - 8.0 years

10 - 20 Lacs

Chennai

Work from Office

Job Title : Cybersecurity Analyst Fortinet, SIEM, and SOAR Expert Location : Chennai Experience : 5 to 8 Years Employment Type : Contract Job Summary : We are looking for an experienced Cybersecurity Analyst with a strong background in Fortinet firewall configuration , SIEM tools (like Splunk, QRadar, or SentinelOne), and SOAR platforms . The ideal candidate will be highly skilled in threat detection, incident response automation, and log analysis. A basic understanding of OT/IoT security concepts is desirable. Key Responsibilities : Configure and audit firewall rules in Fortinet environments Work with SIEM tools (e.g., Splunk, QRadar, SentinelOne) to: Monitor and analyze logs and security events Create and tune correlation rules and alerts Manage incident detection workflows Develop and manage automated playbooks in SOAR/XSOAR platforms Integrate security tools and enable automation for incident response Understand OT/IoT security threats and risk areas (hands-on experience not mandatory) Required Skills : Hands-on experience with Fortinet firewall configuration and policy audits Strong knowledge of at least one SIEM tool (Splunk, QRadar, or SentinelOne) Practical experience in log analysis , threat detection, and workflow creation Familiarity with SOAR tools and playbook development Basic understanding of OT/IoT security environments Good analytical and troubleshooting skills Ability to work in a fast-paced environment Preferred Qualifications : Certifications such as Fortinet NSE , Splunk Certified , etc. Experience in scripting/automation using Python , PowerShell , or similar tools Exposure to MITRE ATT&CK framework and incident response procedures

Posted 1 month ago

Apply

5.0 - 10.0 years

6 - 9 Lacs

Ghaziabad, Hyderabad

Work from Office

Kickstart or enhance career excellence by becoming a part of the BPMLinks family. Were always looking for talented professionals who share our passion and drive. QA Technical Analyst QA Technical Analyst Hitech City, Hyderabad Work from Office (EST) Job Summary: We are looking for a skilled and proactive Senior QA & Incident Management Engineer with at least 5 years of experience in software quality assurance, automation testing, and incident handling. The ideal candidate will have intermediate-level expertise in Kibana, Elasticsearch, and Selenium, along with a strong understanding of Incident Management and Root Cause Analysis (RCA). Required Skills: Strong understanding of Incident Management lifecycle and best practices. Must have knowledge of Kibana and Elasticsearch for log analysis and monitoring. Experience in conducting Root Cause Analysis and implementing preventive measures. Proficiency in QA methodologies, test case design, and defect tracking. Hands-on experience with Selenium WebDriver and automation frameworks. Excellent problem-solving and communication skills. . Max. file size: 40 MB.

Posted 1 month ago

Apply

3.0 - 8.0 years

4 - 8 Lacs

Panchkula

Work from Office

By continuing to use our website, you consent to the use of cookies. Please refer our Join Our Clan SOC Analyst L2 Description Job Description We re hiring a detail-oriented and experienced SOC Analyst L2 to join our Information Security Group (ISG) at Grazitti Interactive. In this role, you ll investigate complex incidents, perform in-depth threat analysis, lead proactive threat-hunting efforts, and mentor junior analysts. If you re looking to deepen your cybersecurity expertise, manage critical incidents, and contribute to a mature SOC environment, this opportunity is tailor-made for you. Skills Key Skills 2 3 years of experience in SOC or a similar cybersecurity-focused role Strong understanding of networking protocols, subnetting, routing, and addressing Proficient in Linux and Windows OS, system hardening, and architecture Deep understanding of Active Directory attacks and defense mechanisms Expertise in ELK Stack (Elasticsearch, Logstash, Kibana) for threat detection Experience in incident response, threat hunting, and forensic investigation Familiarity with OWASP Top 10, digital forensics, and malware analysis Proficiency in tools like TheHive, Cortex, MISP, OpenCTI, and Jira Ability to write detection rules for OWASP vulnerabilities and custom use cases Skilled in KQL, ESQL, and other query languages for log analysis Excellent communication and documentation skills Certifications like CompTIA Security+, CEH, OSDA, or BTL1 (preferred) Knowledge of frameworks such as MITRE ATT&CK and NIST CSF (a plus) Responsibilities Roles and Responsibilities Monitor security events and logs to detect advanced threats Conduct detailed investigations and lead real-time incident response Perform in-depth threat analysis using digital forensics tools Develop and optimize detection use cases and custom rules for SOC monitoring Harden Linux and Windows environments to prevent potential exploits Analyze threat intelligence and simulate attack scenarios to test detection readiness Collaborate across departments to embed cybersecurity into operations Mentor and guide junior SOC team members Regularly communicate security incidents and progress updates to stakeholders Position: SOC Analyst L2 Thank you for submitting your application. We will contact you shortly! Stay updated with us Life at Grazitti Share Your Profile We are always looking for the best talent to join our team * Skills Upload Your CV Thank you for sharing your profile with us. If it aligns with our requirements, we will reach out to you for the next steps in the process. Marketo Forms 2 Cross Domain request proxy frame This page is used by Marketo Forms 2 to proxy cross domain AJAX requests.

Posted 1 month ago

Apply

4.0 - 6.0 years

14 - 16 Lacs

Noida

Work from Office

Role: Pega Developer Location - Noida or Chennai Experience - 4 to 6 years Certification - CSSA (v7. x/v8. x) Responsibilities Collaborate with the business analyst to understand requirements. Conduct 1st level code reviews and ensure adherence to PEGA best practices Troubleshoot and resolve technical issues during development and post-production Technical support to junior developers Work closely with LSA to ensure best practices have been followed Contribute in PEGA upgrade programs Contribute in deployments Technical Skills Must be proficient in below topics Application Development (with case management) PEGA Rules and Rulesets Flow Design Connectors and Services Data Pages and Data Transformations Authentication and Authorization UI Design and Configuration Version Control and Rule Merging Performance Tuning Tracer and Log Analysis Automated Unit Testing Good hands-on in integration rules (SOAP, REST) Must be good hands-on in below rule types Decision rules Declarative rules Data pages (including Savable d-pages) Validation rules Data transforms and activities Flows and Flow Actions Queue processors and job schedulers Layouts Report definitions Multivariate circumstancing Access groups and roles Good to Have Knowledge of Scrum and Agile Knowledge of Customer Service PEGA framework Total Experience Expected: 04-06 years

Posted 1 month ago

Apply

5.0 - 9.0 years

9 - 14 Lacs

Mumbai, Bengaluru

Work from Office

Choosing Capgemini means choosing a company where you will be empowered to shape your career in the way youd like, where youll be supported and inspired by a collaborative community of colleagues around the world, and where you ll be able to reimagine what s possible. Join us and help the world s leading organizations unlock the value of technology and build a more sustainable, more inclusive world. Your Role Lead AppDynamics implementation and performance monitoring. Troubleshoot log feeds, field extraction, and Splunk performance issues. Propose automation opportunities and manage support cases. Coordinate post-deployment activities and weekly releases. Ensure stable systems through thorough release testing. Your Profile 69 years of experience in AppDynamics and observability tools. Strong in log analysis, automation, and performance tuning. Hands-on with Splunk, APIs, and release coordination. Skilled in troubleshooting and post-release support. Excellent communicator with client-facing experience. What you'll love about working here Flexible work optionHybrid Competitive salary and benefits package Career growth with SAP and cloud certifications Inclusive and collaborative work environment

Posted 1 month ago

Apply

2.0 - 6.0 years

0 Lacs

pune, maharashtra

On-site

As a Security Triage Analyst at Snowflake, you will be part of a global team and have the opportunity to learn from the industry's best-in-class experts. You will serve as the front-line of the Incident Response Team, where your responsibilities include determining the scope and impact of security alerts without breaching SLAs. This involves monitoring multiple alerting systems for both corporate IT and production environments. You will triage security alerts, take remediation actions, or escalate validated threats as necessary. By being part of this role, you will have the chance to hone your technical and analytical skills while gaining invaluable experience. Additionally, you will follow and contribute to incident response playbooks and runbooks. Our ideal Security Triage Analyst will possess a Bachelor's or Master's degree in Information Security or an equivalent discipline. They should have at least 2 years of experience on a Global SOC, Incident Response Team, or in a similar role. The candidate should be able to work from 5:00 AM to 2:00 PM IST, five days a week, on one of two shifts: Shift A (Sunday through Thursday) or Shift B (Tuesday through Saturday). Experience in analyzing emails for phishing, email header analysis, URL analysis, basic dynamic and static file analysis, and basic knowledge of SQL are required. The candidate should also have a fundamental understanding of cloud computing and infrastructure, including knowledge of virtual machines, web servers, load balancers, reverse proxies, firewalls, etc. Strong knowledge of networking basics such as TCP/IP, HTTP, DNS, subnetting, VLAN, NAT, and basic network and system forensic principles is essential. Experience with the Linux Command Line Interface, ability to analyze logs, and identify abnormal patterns is required. Basic understanding of containerization, object-oriented programming, and excellent communication skills are also necessary. Bonus points will be given for candidates with prior experience using Snowflake, Python programming, regular expressions, knowledge of APIs, experience working with low-code/no-code automation or SOAR platforms, and exposure to security assessment/design review and threat modeling. Certification in cloud platforms, familiarity with JIRA, ServiceNow, or other case management tools, and the ability to communicate investigative findings to technical staff are advantageous. Snowflake is experiencing rapid growth, and the team is expanding to support and accelerate this growth. We are looking for individuals who share our values, challenge conventional thinking, drive innovation, and contribute to building a future for themselves and Snowflake. For more details regarding the job location, salary, and benefits information for positions in the United States, please visit the Snowflake Careers Site at careers.snowflake.com.,

Posted 1 month ago

Apply

1.0 - 5.0 years

0 Lacs

chennai, tamil nadu

On-site

You will be joining our team as an Ad Tech Technical Support Specialist, where your primary responsibility will be troubleshooting and resolving issues related to advertising campaigns, programmatic deals, and platform integrations. Your technical expertise will play a crucial role in bridging the gap between advertisers, publishers, and our internal product and engineering teams. Your key responsibilities will include providing timely and accurate technical support to clients, focusing on campaign setup, delivery, performance issues, and deal troubleshooting. You will diagnose and resolve complex issues related to ad tags, tracking, discrepancies, targeting, and delivery in real-time bidding (RTB) environments. Additionally, you will understand and support private marketplace (PMP) and programmatic guaranteed (PG) deals involving DSPs, SSPs, and ad servers. Collaboration with advertisers, publishers, and internal stakeholders to ensure successful campaign execution and optimization will be essential. You will also be responsible for monitoring and troubleshooting integrations with third-party platforms such as Google Ad Manager, DV360, TAM, etc. Any unresolved issues will be escalated to the Engineering or Product teams, and you will follow up to ensure resolution. Documenting technical issues and solutions to build a knowledge base for internal and external users will be a part of your routine tasks. It is important to stay updated on the latest trends in ad technology and programmatic advertising to excel in this role. To be successful in this position, you should ideally have 1-3 years of experience in Ad Tech, preferably in a technical support, ad operations, or client-facing engineering role. A strong understanding of digital advertising ecosystems, including SSPs, DSPs, ad servers, and programmatic workflows, is required. Hands-on experience with campaign trafficking, deal setup (PMP, PG), and ad performance metrics will be beneficial. Familiarity with debugging, ad tag inspection, and log analysis is also essential. Strong communication skills and the ability to explain complex technical concepts to non-technical stakeholders are necessary. A problem-solving mindset with attention to detail will be key attributes for this role.,

Posted 1 month ago

Apply

5.0 - 9.0 years

15 - 19 Lacs

Bengaluru

Work from Office

RESG/GTS is the entity in charge of the entire IT infrastructure of Socit Gnrale. The RESG/GTS/SEC/SOC department, which corresponds to the Socit Gnrale SOC (SOC SG), is in charge of operational detection, incident response and prevention activities within the scope of GTS across the businesses. The mission of the SOC is to identify, protect, detect, respond and using the security platforms for the detection/reaction and prevention and resolution of security incidents. The SG SOC consists of Cyber Defense (incident management) Cyber Tools (management of SOC tools including the SIEM), Cyber Control (Prevention and Compliance) and Governance. This role is for a SOC L3(Lead Cyber Security Analyst) will be part of the GTS Security SOC team. In this role, you will involved in supporting India and global regional needs. The objectives of the Security Department (RESG/GTS/SEC) are to manage the strategy for all RESG/GTS in terms of security, technical standards, processes and tools, and thus to cover many cross-functional functions within the company and subsidiaries across all regions. Accountabilities Major Activities SOC Lead/L3 Lead and manage all high priority Critical Security Incidents including end to end incident mgmt. Support/help and guide the L1/L2 in managing complex issues/incidents Lead and engage in Study/POC of Tools and technologies aligning to the security roadmap Will be an expert in 1 or 2 key security technologies/tools globally and be part of the global SOC L3/Experts Example Areas: Threat Hunting, Forensic Analysis, IPS, EDR, DLP, etc. Contribution to the risk detection management approach, consistent with the SG MITRE Matrix approach and other industry standard relevant approaches Analysis support for complex investigations and improve reaction procedures/run book definitions/ enhancements Support for analyses on cybersecurity technical plans, analysis approach and incident management Identify different security tools and technologies to make security operations more effective. Identification of security gaps, mitigation strategy, implementation tracking till closure Work with various regional SOC and CERT teams on the security aspects an incidents where required Reporting to Function Head GTS SEC SOC

Posted 1 month ago

Apply

3.0 - 5.0 years

3 - 8 Lacs

Noida

Work from Office

Role: Pega Developer Location - Noida or Chennai Experience - 4 to 6 years Certification - CSSA (v7.x/v8.x) Responsibilities Collaborate with the business analyst to understand requirements. Conduct 1'st level code reviews and ensure adherence to PEGA best practices Troubleshoot and resolve technical issues during development and post-production Technical support to junior developers Work closely with LSA to ensure best practices have been followed Contribute in PEGA upgrade programs Contribute in deployments Technical Skills Must be proficient in below topics Application Development (with case management) PEGA Rules and Rulesets Flow Design Connectors and Services Data Pages and Data Transformations Authentication and Authorization UI Design and Configuration Version Control and Rule Merging Performance Tuning Tracer and Log Analysis Automated Unit Testing Good hands-on in integration rules (SOAP, REST) Must be good hands-on in below rule types Decision rules Declarative rules Data pages (including Savable d-pages) Validation rules Data transforms and activities Flows and Flow Actions Queue processors and job schedulers Layouts Report definitions Multivariate circumstancing Access groups and roles Good to Have Knowledge of Scrum and Agile Knowledge of Customer Service PEGA framework Total Experience Expected: 04-06 years

Posted 1 month ago

Apply

5.0 - 10.0 years

0 Lacs

chennai, tamil nadu

On-site

As a Cyber Defence Incident Responder within the Information Security Group, your primary responsibility is to investigate, analyze, and respond to cyber incidents within the network environment or enclave. You will be coordinating and providing expert technical support to enterprise-wide cyber defence technicians to resolve incidents efficiently. Your role will involve correlating incident data to identify vulnerabilities and make recommendations for expeditious remediation. You will analyze log files from various sources to detect potential threats to network security and perform cyber defence incident triage to determine scope, urgency, and impact. Additionally, you will be conducting real-time incident handling tasks to support Incident Response Teams, receiving and analyzing network alerts, and tracking incidents from detection to resolution. Furthermore, you will be writing and publishing cyber defence reports, collecting intrusion artifacts, and collaborating with law enforcement personnel as needed. In this role, you will also be responsible for coordinating incident response functions, performing trend analysis and reporting, and employing approved defence-in-depth principles to enhance security measures. It is essential to monitor external data sources to stay updated on cyber defence threats and collaborate with intelligence analysts to correlate threat assessment data effectively. To qualify for this position, you should have a Bachelor's degree in Commerce, Science, Arts, Business & Insurance, or Management Studies. Additionally, a Master's degree in Business Administration, Commerce, or Arts is preferred. A minimum of 5 to 10 years of relevant experience in cyber incident response is required for this role.,

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

navi mumbai, maharashtra

On-site

The main objective of this role is to analyze, identify, rectify & recommend specific improvement measures to enhance the security posture of the organization and safeguard sensitive information. The responsibilities include ensuring customer-centric cybersecurity, monitoring and safeguarding log sources and security access, planning for disaster recovery in case of security breaches, monitoring for attacks and intrusions, conducting log reviews, forensic analysis, and security assessments. The role also involves handling security incidents escalated by the L1 team in 24x7 rotational shifts, utilizing advanced analytics tools to identify emerging threat patterns and vulnerabilities, completing tactical security operations tasks, analyzing attacks for remedial action, creating incident reports and dashboards, coordinating with stakeholders on cyber security issues, maintaining an information security risk register, assisting with internal and external audits, and providing cyber security awareness training to colleagues. Additionally, providing advice and guidance to employees on issues such as spam and malicious emails is part of the role. Performance parameters for this role include customer centricity, measured by the timely resolution of security breaches for end users and stakeholders, and process adherence, measured by adherence to SLAs, response time, and resolution time TAT. Overall, the role requires a proactive approach to enhancing cybersecurity measures, effective communication with stakeholders, and meticulous attention to detail in analyzing and addressing security incidents to ensure the organization's security posture is robust and resilient.,

Posted 1 month ago

Apply

8.0 - 12.0 years

0 Lacs

pune, maharashtra

On-site

You will consult with the Capability Lead to deliver Web Application and API Protection for critical applications primarily on the Akamai platform. This includes monitoring and reviewing all tuning requests, conducting detailed log analysis to identify false positives, and optimizing WAF rules for improved accuracy and performance. Additionally, you will create and maintain comprehensive documentation for WAF tuning procedures, policies, and configurations. Your responsibilities will also involve developing, testing, and recommending WAF policies and rules tailored to specific applications and environments. You will proactively assist in identifying false positives and collaborate with cross-functional teams to ensure the seamless integration of WAF solutions into existing security infrastructure. Furthermore, you will work with Application teams to enable web application protection and deliver anti-bypass protection for on-premise applications currently using Akamai. You are expected to provide recommendations for WAF configuration based on best practices and security requirements, perform regular assessments and audits of WAF configurations to ensure optimal security posture, and compliance with industry standards. This includes maintaining evidence for audit and regulatory purposes and delivering monthly and quarterly business reviews for application owners to demonstrate the effectiveness of WAF control. To stay effective in this role, you must stay updated with the latest web security threats, vulnerabilities, and trends to continually enhance WAF effectiveness. You will evaluate, design, and deliver new and alternative WAAP features and solutions to ensure the best possible protection. Your key accountabilities include ensuring alignment with the capability lead and control owner to deliver consistent WAAP policies across multiple infrastructures. You will also ensure timely and accurate review and action on all WAF tuning requests, conduct thorough log analyses to effectively identify and mitigate false positives, and maintain comprehensive and up-to-date documentation for all WAF tuning procedures, policies, and configurations. Collaboration with cross-functional teams and application teams is essential for integrating WAF solutions seamlessly into existing security infrastructure and enabling WAF protection. You will also ensure connectivity to origin servers on-premise only comes through Akamai to prevent direct-to-origin attacks. Providing expert recommendations for WAF configurations based on best practices and current security requirements, performing service reviews with accountable service application owners, and staying informed about the latest web security threats, vulnerabilities, and trends are crucial aspects of this role. Additionally, you will review existing and new solutions to deliver best-in-class protections.,

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

pune, maharashtra

On-site

You will be responsible for designing, developing, and maintaining enterprise-grade search solutions using Apache Solr and SolrCloud. Your key tasks will include developing and optimizing search indexes and schema for various use cases such as product search, document search, or order/invoice search. Additionally, you will be required to integrate Solr with backend systems, databases, and APIs, implementing features like full-text search, faceted search, auto-suggestions, ranking, and relevancy tuning. It will also be part of your role to optimize search performance, indexing throughput, and query response time for efficient results. Your expertise in Apache Solr & SolrCloud, along with a strong understanding of Lucene, inverted index, analyzers, tokenizers, and search relevance tuning will be essential for this position. Proficiency in Java or Python for backend integration and development is required, as well as experience with RESTful APIs, data pipelines, and real-time indexing. Familiarity with Zookeeper, Docker, Kubernetes for SolrCloud deployments, and knowledge of JSON, XML, and schema design in Solr will also be necessary. Furthermore, your responsibilities will include ensuring data consistency and high availability using SolrCloud and Zookeeper for cluster coordination & configuration management. You will be expected to monitor the health of the search system and troubleshoot any issues that may arise in production. Collaboration with product teams, data engineers, and DevOps teams will be crucial for ensuring smooth delivery. Staying updated with new features of Apache Lucene/Solr and recommending improvements will also be part of your role. Preferred qualifications for this position include a Bachelors or Masters degree in Computer Science, Engineering, or a related field. Experience with Elasticsearch or other search technologies will be advantageous, as well as working knowledge of CI/CD pipelines and cloud platforms such as Azure. Overall, your role will involve working on search solutions, optimizing performance, ensuring data consistency, and collaborating with cross-functional teams for successful project delivery.,

Posted 1 month ago

Apply

2.0 - 6.0 years

0 Lacs

maharashtra

On-site

PCR is a fast-growing, dynamic, global FinTech company dedicated to revolutionizing the way wealthy families and their advisors manage financial assets and make financial decisions. We provide a secure, efficient, and scalable technology platform that consolidates and globally shares data from numerous banks, custodians, and fund managers. Trusted by over 250 firms spanning the wealth management spectrum, including leading global private banks, advisors, wealthy families, and wealth-tech firms. As a Statement Automation Tech at PCR, your mission is to deliver the highest level of straight-through processing with minimal human intervention. You will be utilizing Document Extraction and Optical Character Recognition (OCR) technologies, Robotic Process Automation (RPA) technologies, proprietary workflow and Dashboarding tools, as well as telemetry and log analysis tools to achieve this objective efficiently. Your day-to-day responsibilities will include planning and strategizing your day plan using reporting tools, developing new automation formats, remediating breaks in existing automation formats, reviewing and analyzing service tickets, and collaborating with team members for learning and improvement. You will be part of the Alternative Operations Team, working with a growing team of 17 members. To succeed in this role, you must demonstrate skills such as comfort in high-volume, metric-driven environments, being a curious self-starter with a drive to automate manual processes, adaptability to new processes and tools, attention to detail, and reliability in delivering solutions. Relevant experience in the alternative investment operations sector, proficiency with tools like UiPath, Xceptor, and JIRA, as well as managerial experience in handling a team will set you apart. Opportunities for advancement in PCR include mastering technical and process skills, transitioning to client-facing roles, supervisory opportunities, and exploring new technologies and processes within the Automation Team. The work schedule is Monday to Friday with shift timings from 12:00 pm to 9:00 pm. PCR values self-starters, learners, contributors, and creators who thrive on continuous improvement. The company is committed to providing employees with competitive compensation and benefits, training, advancement opportunities, flexibility, work-life balance, and a safe working environment. Diversity and inclusion are emphasized to drive innovation and collaboration, benefiting employees, clients, partners, and stakeholders. PCR is an Equal Opportunity Employer, prohibiting discrimination and harassment of any kind.,

Posted 1 month ago

Apply

1.0 - 5.0 years

0 Lacs

noida, uttar pradesh

On-site

As an Application & Product Support Specialist at TechRyde Private Limited, you will be responsible for providing technical support to clients regarding API-related issues and product functionalities. You will play a crucial role in ensuring smooth integration and operation of our software products, being the primary point of contact for resolving customer issues efficiently. Your key responsibilities will include providing technical support to clients through various channels such as email, chat, or calls, focusing on API-related issues. You will conduct API testing and troubleshooting using tools like Postman and Swagger, collaborating with internal teams to analyze, diagnose, and resolve integration or application issues. Additionally, you will assist customers in understanding and implementing APIs, maintain a deep understanding of the product ecosystem, and document common issues and solutions to create support documentation and knowledge base articles. To excel in this role, you should have at least 1-3 years of experience in technical support, API support, or product support roles. Strong knowledge of RESTful APIs, API documentation, and integration practices is essential. Hands-on experience with tools like Postman and Swagger, along with an understanding of the software development lifecycle and debugging techniques, will be beneficial. Excellent verbal and written communication skills, problem-solving abilities, and a proactive approach to technical issue resolution are also required. Preferred qualifications include experience with API authentication methods, familiarity with log analysis and debugging tools, and prior exposure to SaaS or cloud-based products. By joining TechRyde, you will have the opportunity to work on cutting-edge solutions in the hospitality and retail space, collaborate with global clients on diverse projects, and benefit from growth opportunities and ongoing learning & development support in a flexible and supportive work culture. If you are excited about contributing to innovative digital transformation services and possess the required skills and qualifications, please send your updated resume to hr@techryde.com with the subject line "API & Product Support Specialist Application.",

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

haryana

On-site

As a Software Environment Specialist at Amdocs, your role involves setting up, installing, and maintaining software environments for any product permutation. You will play a crucial part in coordinating with stakeholders to drive incidents and tickets to closure, ensuring activities are performed at a high level of quality and meeting Service Level Agreements. Taking ownership of operational and environment-related issues, you will proactively handle user problems, participate in root cause analysis, and engage in incident reviews following major incidents. Your responsibilities also include monitoring metrics, responding to customer inquiries, driving discussions during maintenance windows, and identifying automation areas for improvement. You will be tasked with ensuring compliance with internal audit processes, creating knowledge with repeatable procedures to reduce incidents, monitoring applications and services for timely incident restoration, and conducting advanced log analysis using tools like Splunk for proactive issue identification and troubleshooting. This role focuses on enhancing incident handling quality by strengthening the team's capabilities through advanced triaging, troubleshooting, and implementing basic automation. Your contribution will be vital in improving resolution times, operational efficiency, and overall incident quality. To excel in this role, you should possess technical competencies such as working knowledge of Microsoft tools, incident management tools like Jira, and monitoring tools like Splunk. ITIL/ITSM knowledge and certification, exposure to the telecom domain, and excellent communication skills are essential. Additionally, an infrastructure background with experience in server management, configuration, and troubleshooting is required. Your behavioral competencies should include effective communication and stakeholder management, adaptability, sense of urgency, analytical thinking, collaboration, proactive learning, and decision-making skills. Working in a multinational environment for a global market leader offers extensive professional development opportunities in a dynamic, multi-cultural organization that values innovation and employee growth. Join us at Amdocs, where we foster diversity and inclusivity, offering stellar benefits such as health insurance, paid time off, and parental leave, while providing a supportive workplace for passionate and dedicated individuals like you.,

Posted 1 month ago

Apply

1.0 - 6.0 years

3 - 8 Lacs

Chennai

Work from Office

Responsibilities & Key Deliverables Develop a deep understanding of EV powertrain systems including DC-DC converters, onboard chargers, battery packs, and e-motors. Review and analyse BMS circuit designs and CAN communication matrices, support diagnostics system development. Lead cross-functional teams (CFTs) to drive BMS feature realization with a focus on quality, cost, and timeline. Collaborate with suppliers during component development and validation phases. Validate BMS and CSC components at both component and vehicle levels using structured test cases. Write and execute test specifications and validation plans for battery pack systems. Analyse vehicle-level and pack-level logs to identify and resolve system-level issues. Handle and operate test equipment such as power supplies, data loggers, oscilloscopes, and battery cyclers. Apply knowledge of energy storage systems and electrification architectures (EV, HEV, PHEV, SHEV). Conduct DVP testing and participate in DFMEA reviews for risk mitigation Experience 3-6 years - BE/B Tech (Electrical Engineering / Electronics and Communication / Automobile engineering) OR 1-2 years - ME/M Tech (Electrical Engineering / Electronics and Communication / Automobile engineering) Industry Preferred Qualifications BE/B Tech (Electrical Engineering / Electronics and Communication / Automobile engineering) ME/M Tech (Electrical Engineering / Electronics and Communication / Automobile engineering) General Requirements Collaborate with Tier-1 ECU suppliers to understand and support calibration software and embedded systems. Apply strong knowledge of EV systems including DC-DC converters, onboard chargers, HV batteries, and e-motors. Work with vehicle E&E aggregates such as Body Control Modules, ABS/ESP, SRS/Airbag systems, and infotainment/HMI units. Analyse and validate in-vehicle networking systems using CAN and LIN protocols. Utilize VECTOR tools such as CANalyzer, CANoe, and VSignalyzer for communication analysis and diagnostics. Develop and maintain CAPL and CASL scripts for automation and testing (preferred). Support system-level debugging, fault tracing, and log analysis during vehicle testing and validation

Posted 1 month ago

Apply

11.0 - 14.0 years

55 - 60 Lacs

Noida, Ahmedabad, Mumbai (All Areas)

Work from Office

Dear Candidate, We are looking for a skilled Cybersecurity Analyst to monitor, detect, and respond to security threats. If you have expertise in threat intelligence, SIEM tools, and incident response, wed love to hear from you! Key Responsibilities: Monitor network traffic and systems for potential security threats. Investigate and analyze security incidents to prevent breaches. Implement security controls and best practices for data protection. Manage security tools such as SIEM, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and recommend mitigation strategies. Ensure compliance with security standards like ISO 27001, NIST, and GDPR. Required Skills & Qualifications: Strong knowledge of security frameworks and incident response. Experience with SIEM tools (Splunk, QRadar, ArcSight). Proficiency in scripting (Python, Bash, PowerShell) for security automation. Understanding of network protocols, firewalls, and VPN security. Knowledge of penetration testing and ethical hacking techniques. Soft Skills: Strong analytical and problem-solving skills. Excellent attention to detail and ability to work under pressure. Good communication and teamwork skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Delivery Manager Integra Technologies

Posted 1 month ago

Apply

3.0 - 8.0 years

6 - 9 Lacs

Noida

Work from Office

Monitor SIEM alerts and conduct incident detection/response. Collaborate within SOC, automate remediation, refine detection blocks, and support cyber defense initiatives. Required Candidate profile 3–5 yrs in SIEM, incident response, log analysis. Bachelor's in CS/IT/Cybersecurity. Security certification preferred (Security+, SC200). Python/PowerShell automation experience a plus.

Posted 1 month ago

Apply

1.0 - 5.0 years

0 Lacs

chennai, tamil nadu

On-site

As an IT professional, you will be responsible for installing, configuring, and maintaining servers, network devices, desktop/laptop systems, and other IT hardware/software components. Monitoring system performance, troubleshooting issues, and ensuring high availability, data integrity, and security compliance are key aspects of this role. You will provide technical support to end-users through ticketing tools, ensuring timely resolution and regular status updates. Coordination with hardware vendors (e.g., Dell, HP, Lenovo) and service providers for technical support, AMC, and procurement will also be part of your responsibilities. Managing the IT asset lifecycle, maintaining accurate inventory records, and ensuring periodic audits are essential tasks. Additionally, you will deploy and update antivirus solutions across the organization and assist in routine data backups, restorations, and user data migrations. Support for MS Office Suite (including Office 365) and Google Workspace (GSuite) applications will be required. You will perform operating system installations via USB or network boot and manage new system deployments efficiently. Efficiently troubleshooting and resolving IT-related incidents to minimize downtime and disruption to operations is crucial. You will handle floor-level IT operations and provide on-site technical support as required. Maintaining proper documentation related to IT assets, incidents, and configurations is an important part of the role. Hands-on experience with monitoring tools, log analysis, and system alerts is preferred, along with strong documentation skills and familiarity with IT policies and procedures. Excellent interpersonal and communication skills are necessary to work effectively with internal teams and external vendors. Being proactive, self-motivated, and able to prioritize tasks while handling multiple issues simultaneously is key to success in this role.,

Posted 1 month ago

Apply

3.0 - 8.0 years

5 - 10 Lacs

Pune

Work from Office

Position Summary We are seeking an experienced and proactive Tech Support Engineer to join our team. In this role, you will provide advanced technical support for complex issues that require deep troubleshooting, root cause analysis, and collaboration with development and operations, customer support teams. You will play a key role in ensuring system stability, maintaining high customer satisfaction, and driving continuous improvement of support processes. Education : Bachelor s in engineering degree or equivalent degree. Must have: 3+ years of experience with at least 1+ years in Tech Support. Strong experience in troubleshooting complex application, system, or network issues. Solid understanding of relevant technologies such as: Application servers, databases (e.g., SQL Server, PostgreSQL), C#, WebAPI Cloud platforms (Azure, AWS) Proficiency with log analysis tools, monitoring systems, and debugging tools. Experience in C#,.NET Core/.NET Framework Familiarity with ticketing and incident management systems (e.g., ServiceNow, Salesforce, Jira). Strong problem-solving skills and ability to work independently under pressure. Excellent problem-solving, debugging, and analytical skills. Nice to have: Experience with cloud platforms (Azure, AWS). Knowledge of CI/CD pipelines & DevOps concepts. Experience supporting mission-critical or customer-facing applications. Exposure to monitoring tools like Splunk, AppDynamics, or AppInsight, Datadog. Essential Duties and Responsibilities: Provide (Level 3) technical support for issues. Collaborate with development, QA, and infrastructure teams to resolve complex defects and performance issues. Analyze logs, monitor system behaviour, and simulate problems to reproduce issues. Develop and maintain knowledge base articles, troubleshooting guides, and best practices. Participate in deployment validations, release support, and post-release monitoring. Implement workarounds, patches, or configuration changes as needed to restore service. Ensure timely and professional communication with customers and stakeholders during incident resolution. Stay up to date with industry trends and emerging technologies to bring innovative ideas to the team.

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies