Home
Jobs

127 Log Analysis Jobs - Page 3

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 9.0 years

9 - 14 Lacs

Bengaluru

Work from Office

Naukri logo

Implementation and Deployment: - Design and deploy IDS (ARMIS)solutions tailored to OT environments. - Develop comprehensive deploymentarchitectures, ensuring seamless integration with existing systems. - Configure and optimize network andfirewall settings to support IDS deployments. Data Network Security - IDS, Cybersecurity.

Posted 2 weeks ago

Apply

1.0 - 6.0 years

11 - 15 Lacs

Bengaluru

Work from Office

Naukri logo

Cybersecurity, Azure Sentinel SIEM,MS Defender for Endpoints (EDR/ATP),AWS IAM,SOAR Concept, Fortinet FortiSOAR, Palo Alto Networks - Firewalls, Cortex XSOAR, Python We are seeking a Cybersecurity Analyst with 1-6years of experience in fundamental cybersecurity concepts, including SIEM, EDR, IAM, and SOAR platforms The ideal candidate should have a basic understanding of security automation and orchestration using platforms like FortiSOAR, Palo Alto XSOAR, and ThreatConnect (preferred) Experience with SOAR play book creation , integration etc Additionally, knowledge of Python scripting for automation and security tasks will be an added advantage

Posted 2 weeks ago

Apply

1.0 - 3.0 years

4 - 7 Lacs

Mumbai Suburban

Work from Office

Naukri logo

Job Description: We are hiring a passionate and detail-oriented L2 Technical Support Engineer with 13 years of experience in supporting Java Spring Boot-based applications . This role requires hands-on experience in debugging backend services, analyzing logs, and coordinating with development teams to resolve production issues quickly and efficiently. Roles and Responsibilities: Provide Level 2 support for applications developed using Spring Boot and RESTful APIs Investigate issues by analyzing server logs, database queries, and API responses Use Git to fetch specific commits, understand version history, and collaborate with development teams Escalate critical issues to development or DevOps teams as necessary Handle application performance issues, integration failures, and user-reported bugs Use tools like Postman, Cloudwatch , and Linux command-line for investigation Maintain incident logs, RCA documents, and support runbooks Support deployment validation, UAT testing, and production rollout activities Work with stakeholders to ensure timely resolution of issues and updates Participate in on-call support rotation for critical production support Desired Candidate Profile: 1 to 3 years of experience in technical or application support Good understanding of Java, Spring Boot, and REST API concepts Experience with log analysis tools like Cloudwatch, ELK, Splunk, or Graylog Basic knowledge of Linux/Unix systems and scripting Familiarity with SQL databases like MySQL or SQL Server Proficiency with Git for version control and code navigation Strong problem-solving skills and willingness to learn quickly Good communication skills and ability to handle customer interactions professionally Preferred Skills: Experience with cloud platforms (AWS, Azure) Exposure to CI/CD pipelines and containerization (Docker, Kubernetes) Understanding of Microservices architecture Familiarity with monitoring tools (Grafana, Prometheus, New Relic)

Posted 2 weeks ago

Apply

2.0 - 4.0 years

6 - 9 Lacs

Pune

Work from Office

Naukri logo

About Arctera Arctera keeps the world s IT systems working. We can trust that our credit cards will work at the store, that power will be routed to our homes and that factories will produce our medications because those companies themselves trust Arctera. Arctera is behind the scenes making sure that many of the biggest organizations in the world - and many of the smallest too - can face down ransomware attacks, natural disasters, and compliance challenges without missing a beat. We do this through the power of data and our flagship products, Insight, InfoScale and Backup Exec. Illuminating data also helps our customers maintain personal privacy, reduce the environmental impact of data storage, and defend against illegal or immoral use of information. It s a task that continues to get more complex as data volumes surge. Every day, the world produces more data than it ever has before. And global digital transformation - and the arrival of the age of AI - has set the course for a new explosion in data creation. Joining the Arctera team, you ll be part of a group innovating to harness the opportunity of the latest technologies to protect the world s critical infrastructure and to keep all our data safe. Job Title: Info Sec Analyst - Cloud Security Posture Management (CSPM) Location: Pune, India Job Type: Full-time Job Summary: The Cloud Security Operations Analyst will be responsible for monitoring, detecting, and responding to security threats in cloud environments (AWS, Azure, GCP) while managing Cloud Security Posture Management (CSPM) solutions. The role also involves incident response, threat analysis, and remediation of cloud security risks to ensure the organization s cloud security posture aligns with industry best practices and compliance standards. Key Responsibilities: Monitor and manage security alerts from CSPM tools (Crowdstrike CSPM, Zscaler CNAPP, Wiz, Prisma Cloud, etc.). Perform basic cloud security incident investigations and document findings. Support security monitoring and event triage within SOC/SIEM tools (Crowdstrike NextGen SIEM, Splunk, etc.). Assist in reviewing misconfigurations in cloud services and recommend remediation steps. Maintain documentation for cloud security policies and playbooks. Lead investigations of cloud security incidents and misconfigurations, including forensic analysis and threat intelligence correlation. Manage and fine-tune CSPM tools to reduce false positives and improve cloud security hygiene. Work closely with SOC teams to analyze and mitigate cloud-based threats, including IAM misconfigurations, API security, and data exposure risks. Provide security recommendations and remediation guidance to DevOps and Engineering teams. Assist in compliance initiatives (CIS, NIST, PCI-DSS) and cloud security audits. Lead incident post-mortems, identifying gaps and improving cloud security processes. Stay ahead of emerging cloud threats, vulnerabilities, and attack vectors to proactively strengthen the cloud security posture. Required Skills & Qualifications: 2-4 years of experience in cloud security, SOC operations, or cybersecurity. Basic understanding of cloud platforms (AWS, Azure, GCP) and their security controls. Knowledge of SIEM tools and log analysis for security events. Good experience with CSPM tools (such as CrowdStrike CSPM, or Zscaler CNAPP, or Wiz, or cloud-native security solutions). Basic understanding of SIEM integrations with cloud environments and log analysis techniques. Proficiency in threat intelligence, attack techniques (MITRE ATT&CK), and incident response methodologies. Experience in scripting and automation for security tasks. Certifications like AWS Security Specialty, AZ-500, or Security+ are a plus.

Posted 2 weeks ago

Apply

2.0 - 7.0 years

3 - 8 Lacs

Hyderabad

Work from Office

Naukri logo

Candidate will be responsible for test execution of LTE protocol and performance, Should be having good analysis skills with a sound understanding of LTE Concepts. Responsibilities include test execution- with failure root cause analysis System acquisition, LTE Protocol testing. Understanding of LTE/5G/4G end-to-end flows Working experience on UEs and/or RAN side. Good understanding of L1/L2/L3 protocols on the Air interface Tools and Analytical Skills Log Analysis Experience Working experience with end-to-end setups Scripting experience on Keysight/Anite/Anritsu/R&S tools.

Posted 2 weeks ago

Apply

3.0 - 5.0 years

4 - 6 Lacs

Noida, New Delhi, Gurugram

Work from Office

Naukri logo

Incident handling, forensic analysis, and VAPT SIEM tools cybersecurity frameworks Log analysis, monitoring, detecting and investigating security incidents and breaches. CEH,CSA,CompTIA Security+,GCIH,security incidents

Posted 2 weeks ago

Apply

1.0 - 3.0 years

3 - 4 Lacs

Kochi, Ernakulam

Work from Office

Naukri logo

As an L1 Threat Hunter, you will work closely with SOC analysts and incident responders to identify, analyze, and escalate suspicious activity using a variety of tools and threat intelligence sources.

Posted 2 weeks ago

Apply

4.0 - 9.0 years

20 - 30 Lacs

Chennai

Remote

Naukri logo

We are looking for a skilled TechOps Lead to manage and maintain our OTT platforms technical Operation. The ideal candidate will have experience in Application Support, Content Delivery Networks, Logging & Triaging, and Cloud-based technologie s. You will be responsible for ensuring high availability, scalability, and performance of our platform. You will be responsible for triaging issues and finding issues using trend analysis. Role & Responsibilities: Must be aware of end to end incident handling. Monitor, identify, and respond to incidents promptly to minimize business impact. Prioritize, classify, and escalate incidents based on severity and urgency. Coordinate and facilitate communication between stakeholders during incidents. Perform root cause analysis and implement preventive measures. Document incidents, resolutions, and generate performance reports. Provide Technical support by handling and consulting on BAU, Incidents for respective applications. Act as an escalation point for user issues and requests and from L1/L2 support. Report issues to senior management. Define, document, and maintain SLAs, technical documentation, and knowledge bases to support platform. Monitor application performance, identifying areas for improvement. Build and maintain effective and productive relationships with stakeholders in business, development, product, and third-party system providers. Facilitate coordination across L1/L2 and L3/engineering Teams to investigate and resolve ongoing platform or application issues impacting business. Candidate will have to work in shifts as part of Rota covering 24*7. In event of major outage or issues we may ask for flexibility to help provide appropriate cover. Weekend on-call coverage needs to be provided on rotational/need basis. Understand reliability metrics and enhance automation solutions for auto-healing and incident resolution. Understand and improve applications and plan for faster MTTD, MTTR, and auto healing Preferred candidate profile: 4 to 7 years in Application Support/SRE or a related field. Should have experience with any API monitoring tool (Experience with Datadog and Cora Logix is ideal) Knowledge of CDNs ( Akamai, Cloudflare etc.) and cloud-based technologies ( AWS,GCP, etc.) Comfortable with large scale production systems, configurations management, load balancing & distributed systems. Must be strong in backend development (80%) with some frontend experience (20% ) Experience with troubleshooting tools and techniques for FE,BE, API etc. Familiar with job scheduling tools: cron and experience with application monitoring tools. Knowledge of web services ( SOAP based and RESTful Web services ) Prior experience in L2/L3 support. Well versed with anyone of the Scripting language ( Shell, Python etc. ) Strong Problem-Solving Skills and attention to detail Should you be interested please share the updated copy of resume on Jyotsana.bisht@cloud-Kinetics.com

Posted 2 weeks ago

Apply

7.0 - 15.0 years

9 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Required Skills Technology | Sentinel SIEM Tool Expert | Level 3 Support Technology | Securonix SIEM Tools Expert | Level 3 Support Technology | ArcSight SIEM Tools Administrator | Level 2 Support Technology | Cybersecurity General Administrator | Level 2 Support Technology | Network Traffic Analysis Administrator | Level 2 Support Education Qualification : Engineer - B.E / B.Tech / MCA Certification Mandatory / Desirable : Technology | CompTIA Security+/Certified SOC Analyst (CSA)/GIAC Security Essentials (GSEC)/Certified Ethical Hacker (CEH)/Cisco Certified CyberOps Associate/GIAC Certified Incident Handler (GCIH)/GIAC Security Operations Certified (GSOC) Delivery Skills required are: - Technical Expertise: - *Expert knowledge of threat detection techniques and tools. *Leading incident response efforts, including advanced techniques for containment, eradication, and recovery. *Conducting in-depth digital forensics investigations. *Expertise in configuring and optimizing SIEM (Security Information and Event Management) systems. Analytical Skills: - *Deep understanding of log analysis techniques and tools. *Identifying patterns and anomalies in large datasets. *Integrating threat intelligence into monitoring and response processes. *Staying updated on the latest threat intelligence and applying it to enhance security. Collaboration and Coordination: - *Working closely with other IT and security teams to ensure comprehensive security coverage. *Leading the coordination of response efforts during major incidents. *Ensuring effective communication and collaboration among all stakeholders. *Coordinating with external partners and vendors for specialized support. Continuous Improvement: - *Continuously evaluating and improving security processes and procedures. *Implementing lessons learned from incidents to enhance the overall security posture. *Contributing to the development and updating of security policies and procedures.

Posted 2 weeks ago

Apply

6.0 - 9.0 years

5 - 11 Lacs

Hyderabad, Chennai

Hybrid

Naukri logo

Hiring for SOC Analyst in one of our Top Banking company @ Chennai & Hyderabad location Job Title: SOC Analyst Experience : 6 - 9 Years Department: Cybersecurity / Information Security Location: Chennai & Hyderabad Employment Type: Hybrid Mode - 3 days WFO and 2 days WFH . Job Summary: We are seeking a skilled and detail-oriented Security Operations Center (SOC) Analyst to join our cybersecurity team. The SOC Analyst will be responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents using a variety of tools and techniques. This role is critical to maintaining and improving our organization's security posture by ensuring real-time threat detection and incident response. Key Responsibilities: Monitor security alerts and events from SIEM tools (e.g., Splunk, QRadar, Microsoft Sentinel). Analyze and triage events to determine impact and severity. Investigate security incidents and provide incident reports with detailed analysis. Escalate validated threats and vulnerabilities to the appropriate teams and assist in mitigation efforts. Coordinate with IT teams to ensure containment, eradication, and recovery actions are taken for confirmed incidents. Perform threat intelligence analysis to support proactive detection and defense. Document incident handling procedures and maintain an incident knowledge base. Participate in continuous improvement of SOC operations, including playbooks and automation. Stay current on the latest cybersecurity trends, threats, and tools. Required Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field; or equivalent work experience. 13 years of experience in a SOC or information security role. Experience with SIEM platforms, IDS/IPS, firewalls, and endpoint protection tools. Understanding of TCP/IP, DNS, HTTP, VPN, and network protocols. Knowledge of common threat vectors, MITRE ATT&CK framework, and kill chain. Strong analytical and problem-solving skills. Excellent communication skills and ability to work under pressure. Preferred Qualifications: Certifications such as CompTIA Security+, CEH, GCIA, GCIH, or Splunk Certified Analyst. Experience with scripting (e.g., Python, PowerShell) for automation. Familiarity with cloud security monitoring (e.g., AWS GuardDuty, Azure Defender). Exposure to incident response frameworks and forensic tools. Work Schedule: [24x7 shift-based / Regular business hours / On-call rotation as applicable]

Posted 2 weeks ago

Apply

0.0 - 5.0 years

5 - 9 Lacs

Pune

Work from Office

Naukri logo

Responsibilities: Monitor systems, respond to incidents. Collaborate with teams on threat management strategies. Manage access control & encryption. Maintain compliance standards. Conduct regular security assessments. Office cab/shuttle Food allowance Health insurance Provident fund

Posted 2 weeks ago

Apply

4.0 - 6.0 years

6 - 10 Lacs

Bengaluru

Work from Office

Naukri logo

Understanding of network defence principles, common attack vectors, and attacker techniques. Technical baseline skills and the ability to acquire in-depth knowledge of network and host security technologies Basic Linux/Windows OS knowledge, firewall rules and policy fundamentals. Excellent analytical and problem-solving skills. Strong work ethic and commitment to accomplish assigned tasks with a sense of urgency. Windows, Linux, Network Security, Phishing, Splunk, Malware

Posted 3 weeks ago

Apply

1.0 - 3.0 years

5 - 10 Lacs

Gurugram

Work from Office

Naukri logo

Title: Security Analyst (SOC & EDR) Location: Gurgaon, India Type: Hybrid (work from office) Job Description Who We Are: Fareportal is a travel technology company powering a next-generation travel concierge service. Utilizing its innovative technology and company owned and operated global contact centers, Fareportal has built strong industry partnerships providing customers access to over 600 airlines, a million lodgings, and hundreds of car rental companies around the globe. With a portfolio of consumer travel brands including CheapOair and OneTravel, Fareportal enables consumers to book-online, on mobile apps for iOS and Android, by phone, or live chat. Fareportal provides its airline partners with access to a broad customer base that books high-yielding international travel and add-on ancillaries. Fareportal is one of the leading sellers of airline tickets in the United States. We are a progressive company that leverages technology and expertise to deliver optimal solutions for our suppliers, customers, and partners. FAREPORTAL HIGHLIGHTS: Fareportal is the number 1 privately held online travel company in flight volume. Fareportal partners with over 600 airlines, 1 million lodgings, and hundreds of car rental companies worldwide. 2019 annual sales exceeded $5 billion. Fareportal sees over 150 million unique visitors annually to our desktop and mobile sites. Fareportal, with its global workforce of over 2,600 employees, is strategically positioned with 9 offices in 6 countries and headquartered in New York City. Job Overview We are seeking a proactive and knowledgeable Security Analyst to join our Information Security Operations (SecOps) team . This role will focus on SOC monitoring and Endpoint Detection and Response (EDR) using SentinelOne . The ideal candidate should have solid experience in threat monitoring, incident response, and SentinelOne tool handling. Key Responsibilities: Monitor and respond to SOC alerts and security incidents in real time. Analyze logs and alerts from SIEM and SentinelOne EDR platforms. Perform incident triage , escalation, and coordination with internal teams. Troubleshoot SentinelOne-related issues , including error resolution, agent communication, and performance problems. Understand and manage SentinelOne policies , ensure proper deployment, and make necessary adjustments for better coverage. Quickly identify the root cause of issues related to endpoint protection and take corrective actions. Coordinate with the IT team for issue resolution and endpoint remediation. Collaborate with teams to reduce false positives and improve alert accuracy. Maintain incident documentation , reports, and operational dashboards. Support in threat hunting , vulnerability detection, and other BAU (Business As Usual) security tasks. Required Skills & Qualification: Bachelors/Masters Degree in Computer Science, Information Systems, Engineering. 24 years of experience in SOC operations and endpoint security monitoring. Hands-on experience with SentinelOne EDR , including troubleshooting and policy management. Good knowledge of cybersecurity threats, incident response processes, and log analysis. Ability to investigate and resolve SentinelOne alerts and agent-related errors effectively. Experience working with SIEM tools (like Splunk, Qradar, etc.). Strong understanding of false positive tuning and threat detection improvement. Basic scripting knowledge (PowerShell, Python) is a plus. Good communication and analytical skills. Preferred Skills & Qualifications: CEH , CompTIA Security+ , or any other relevant security certification. Disclaimer This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Fareportal reserves the right to change the job duties, responsibilities, expectations or requirements posted here at any time at the Companys sole discretion, with or without notice.

Posted 3 weeks ago

Apply

2.0 - 5.0 years

1 - 4 Lacs

Hyderabad

Work from Office

Naukri logo

Client Server Tech is looking for System Security / Engineer to join our dynamic team and embark on a rewarding career journey. Develop and implement system security strategies and solutions. Monitor and analyze security incidents and threats. Conduct incident response and investigation. Collaborate with cross-functional teams on security projects. Ensure compliance with security standards and regulations. Provide training and support on security best practices.

Posted 3 weeks ago

Apply

0.0 - 5.0 years

3 - 7 Lacs

Pune

Work from Office

Naukri logo

Collaborate with cross-functional teams to identify and solve complex technical problems. Follow Agile methodologies (Scrum or Kanban) for project development. Stay updated with the latest technologies and industry trends. Your Key Responsibilities Develop and maintain Java applications using Core Java, Spring framework, JDBC, and threading. Implement multi-threaded, concurrent applications. Debug and troubleshoot applications through log analysis. Implement and manage data storage using relational and NoSQL databases. Use cloud platforms (Azure/GCP) and DevOps practices. Containerize applications using Docker and Kubernetes. Efficiently manage large-scale data processing tasks. Ensure seamless integration and communication between application components. Your skills and experience that will help you excel Proficiency in Core Java 17, threading, and concurrent programming. Expertise with Spring framework and JDBC. Hands-on experience with relational and NoSQL databases. Familiarity with cloud platforms (Azure/GCP). Experience with containerization (Docker/Kubernetes). Strong analytical, problem-solving, and debugging skills. Excellent communication, teamwork, and collaboration abilities. Nice-to-have: DevOps experience. About MSCI What we offer you Transparent compensation schemes and comprehensive employee benefits, tailored to your location, ensuring your financial security, health, and overall wellbeing. Flexible working arrangements, advanced technology, and collaborative workspaces. A culture of high performance and innovation where we experiment with new ideas and take responsibility for achieving results. A global network of talented colleagues, who inspire, support, and share their expertise to innovate and deliver for our clients. Global Orientation program to kickstart your journey, followed by access to our Learning@MSCI platform, LinkedIn Learning Pro and tailored learning opportunities for ongoing skills development. Multi-directional career paths that offer professional growth and development through new challenges, internal mobility and expanded roles. We actively nurture an environment that builds a sense of inclusion belonging and connection, including eight Employee Resource Groups. All Abilities, Asian Support Network, Black Leadership Network, Climate Action Network, Hola! MSCI, Pride & Allies, Women in Tech, and Women s Leadership Forum. . . To all recruitment agencies . Note on recruitment scams

Posted 3 weeks ago

Apply

3.0 - 4.0 years

12 - 14 Lacs

Mumbai, Delhi / NCR, Bengaluru

Work from Office

Naukri logo

We are hiring a Workforce Support Analyst (Workforce Software) with 3+ years of total experience and at least 2+ years of relevant experience in Workforce Time & Attendance systems. The ideal candidate should be a certified Workforce Software professional (PT101, PT102) with hands-on experience in troubleshooting, managing support tickets, performing root cause analysis, and responding to user queries. A bachelors degree in Business, Information Systems, or equivalent experience is required. Strong communication skills, ERP knowledge, and reporting tool proficiency are desirable. This is a hybrid role open across India, working in UK or EST shifts, with telephonic interviews and background verification required. Skills : - Workforce Support Analyst, Workforce Software, Time and Attendance, Production Support, Troubleshooting, Log Analysis, Root Cause Analysis, Workforce System Configuration, Lookup Tables Maintenance, User Support, Functional Support, Technical Support, ERP Functional Knowledge, Reporting Tools, PT101 Certification, PT102 Certification, Certified Workforce Software Professional, Business Systems, Information Systems, Hybrid Job India, UK Shift, EST Shift, Telephonic Interview, Workforce Management, Workforce Software Support Location : - Mumbai, Delhi / NCR, Bengaluru , Kolkata, Chennai, Hyderabad, Ahmedabad, Pune, Hybrid

Posted 3 weeks ago

Apply

5.0 - 10.0 years

13 - 23 Lacs

Hyderabad, Pune, Bengaluru

Hybrid

Naukri logo

Primary Skills ITSM automation SME, conversational AI architects and consultants RPA automation, self-healing solutions architects and consultants Observability tools (APM and infra) SMEs AI Ops architects and consultants L3 solutions architects and consultants CloudOps / FinOps consultants AI architects, Agentic AI SMEs Role and Responsibilities Hands on experience on ITSM automation, should have worked as SME, conversational AI architects and consultants. have the working experience with L3 solutions architects on Gen AI driven impact analysis, Gen AI driven code generation Excellent problem solving/analytical skills and complex troubleshooting methods. Excellent presentation, verbal, and written communication skills. Good and adaptable with : ITSM, ServiceNow (interchangeable with SNOW), NowAssist, BMC Helix, BMC Remedy, BMC Helix RemedyForce

Posted 3 weeks ago

Apply

6.0 - 11.0 years

14 - 16 Lacs

Bengaluru

Work from Office

Naukri logo

Minimum Qualifications 6+ years of experience in security engineering, detection engineering, or cloud security. Strong expertise in application security, API security, and SaaS-specific threat detection. Experience with SIEM, SOAR, and detection-as-code tools (e.g., Splunk, OpenSearch, KQL, Sigma). Proficiency in log analysis, security telemetry engineering, and anomaly detection in cloud applications. Experience integrating security controls into SaaS applications and microservices. Good programming and automation skills. Preferred Qualifications Experience with automated threat simulations, MITRE ATTCK mappings, and adversary emulation. Knowledge of risk quantification methods and security metrics for executive reporting. Familiarity with cloud-native security tools. Hands-on experience in threat intelligence-driven detection engineering. Security certifications (e.g., GIAC GCDA/GCFA, AWS Security Specialty, GCP Security Engineer, OSCP). 1. SaaS-Application Centric Detection Research Engineering Develop and refine application-layer security detections for FAaaS, Spectra, and other critical LoBs, focusing on business logic abuse, API security threats, and identity-based attacks. Research and engineer detections for SaaS-specific attack vectors. Leverage detection-as-code frameworks (e.g., Sigma, OpenSearch, KQL) to automate the development and tuning of detection rules. Work closely with application security teams to enhance telemetry and ensure that security observability is embedded in SaaS products. 2. Proactive Security Controls Mitigative Capabilities Move beyond traditional monitoring by implementing proactive security controls to mitigate threats before exploitation. Collaborate with development teams to integrate security controls into SaaS applications for real-time anomaly detection and automated response. Drive continuous security validation efforts through automated adversary simulation and detection effectiveness testing. 3. Cross-Team Integration Real-Time Threat Intelligence Sharing Drive collaboration between Detection Engineering, Incident Response, and Red Teams by aligning detection research with real-world attack simulations and post-incident learnings. Develop automated feedback loops to reduce false positives, false negatives, and coverage gaps. Work with Incident Response to develop automated triage and enrichment mechanisms for SaaS security incidents. 4. Risk-Based Detection Engineering Security Metrics Shift towards a risk-based detection approach, ensuring that high-impact threats are prioritized based on their potential financial and reputational consequences. Provide executive-level visibility into detection efficacy by quantifying the impact of mitigated threats and aligning detection efforts with business risk. Develop security dashboards and reporting to communicate detection outcomes, including risk coverage, adversary trends, and operational efficiency. 5. Proactive Threat Hunting Data Anomaly Analysis Expand threat hunting and anomaly detection capabilities to identify previously unknown threats affecting SaaS customers and cloud applications. Utilize advanced data analytics and behavioral anomaly detection to identify stealthy attacks that evade traditional detection methods. Reduce reliance on SOC-driven escalations by proactively analyzing security telemetry for signs of compromise. Work closely with data scientists to enhance the use of ML/AI-driven security analytics for predictive threat detection. #LI-DNI

Posted 3 weeks ago

Apply

5.0 - 10.0 years

12 - 17 Lacs

Mumbai

Work from Office

Naukri logo

i. BE/B. TECH/BCA/B.SC/M.SC/MCA/M. Tech-(Computers/Electronics/IT) ii. Minimum one certification such as CEH/CPTC/OSCP/ECSA/CEPT and/or equivalent. iii. Having at least 5+ years of post-qualification relevant work experience including appearance before court of law while presenting the extracted cyber evidence. iv. Experience of managing large scale digital evidence media. v. Comprehensive knowledge on forensic digital device data preservation, acquisition, analysis and documentation. vi. Experience in-depth practical knowledge on Ethical Hacking, Penetration Testing, OSINT, Deep and Dark Net Investigations. vii. Experience in handling real-life cyber- crime cases would be preferred. viii. Experience in investigation on Web Defacement/Site Down activities ix. Experience in investigation of Email and VOIP call Analysis and trace Down Methods. x. Experience in investigation on Web SMS/Image/Reverse Image/Video Source tracing methods. xi. Experience in practical knowledge multiple enterprise and open source which have industry benchmark. xii. Experience in comprehensive knowledge on System, Mobile Forensics, Internet Forensics, Cloud Forensics, CC Footage/AV Forensics, Database Forensics, Network Forensics, Malware Forensics, Stegano and Crypto Forensics, Memory Forensics, UAV Forensics and /or other variety of Forensic formats. xiii. Experience in-depth practical knowledge on Malware Forensics, Memory Analysis, Ethical Hacking, Penetration Testing, OSINT, Deep and Dark Net Investigations, Advanced persistent threats (APTs), Sophisticated analysis of malware, cyber security incident (Packet tracing, Web Logs, taking a copy of the mail store and aggregated log analysis), performing threat modeling, and producing intelligence threat assessments. xiv. Experience in practical knowledge on multiple enterprise, open-source tools, Static and Dynamic Malware Analysis Tools. xv. Experience in generating forensic documents for case investigation. xvi. Graduation from premier institutes (IITs, NITs, NFSL, IIIT, etc.) shall be preferred. xvii. Bug-bounty program winners will be preferred. .

Posted 3 weeks ago

Apply

2.0 - 5.0 years

7 - 17 Lacs

Ahmedabad

Hybrid

Naukri logo

Role & responsibilities • Responsible for maintaining the technical knowledge of the customer environment. • Responsible for updating the technical documents in the Support & Application Management knowledge base. • Analyze log files, provide corrective measures, and propose technical preventive solutions to the First Line team or the customer success associate. • Spar with project members about technical/functional workarounds in the model in case of defining a correction due to an incident. • May execute hotfixes in the model on Production environments. • Responsible for defining clear instruction (documentation and training) towards the front office team for incidents, service requests, or executing predictive maintenance. • Responsible for maintaining an internal Reference environment. • Contact 3rd party suppliers related to incidents or service requests. • Responsible to execute deployment of DELMIA Quintiq applications in the customer production environment to conform release instructions from the project team. • Provides input on new functional/technical opportunities to the Client Executive. • Help to improve the internal and external Continuous Services processes. • As part of the Continuous Services team, you will have direct contact with customers around the world regarding updates to their raised incidents or service requests. Preferred candidate profile Technical competencies: Basic understanding about Windows Server Operating Systems. Hands-on experience using Java/C++/C#.NET, PowerShell or similar object-oriented languages. Experience with databases like SQL Server or Oracle is nice-to-have. Experience with Log Analysis, application, and system performance analysis. Basic understanding of TCP/IP Networking would be added advantage. Previous experience with DELMIA Quintiq would be added advantage. Competence requirements: • Strong analytical and troubleshooting skills. • Persistence and pro-active attitude. • Creative problem-solving skills. • Problem management skills. • Customer and result-oriented. • Excellent communication skills. • Highly customer and result-focused. • Sense of Ownership • Service and quality focus/mindset • Excellent English reading, writing, and conversation. • Flexible (After completion of probation period it is expected to be ready to work in rotational shifts). Interested and eligible candidates can apply directly or can share their updated resume with the current CTC, expected CTC, and Notice Period on careers-in@thelogicfactory.com

Posted 3 weeks ago

Apply

6.0 - 11.0 years

4 - 8 Lacs

Mumbai, Bengaluru

Work from Office

Naukri logo

The SOC Analyst is responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents using a variety of tools and technologies. This role is critical in protecting the organizations digital assets and ensuring compliance with security policies and standards. Monitor SIEM systems and security tools for suspicious activity. Analyze and respond to security incidents and threats. Stay updated on threat intelligence and attack trends. Review logs from firewalls, IDS/IPS, and antivirus tools. Escalate critical incidents and document findings. Support vulnerability management and remediation tracking. Configure and tune security tools like SIEM and EDR. Ensure compliance with security policies and audits. Collaborate with IT and network teams on investigations. Contribute to process improvements and incident playbooks. Primary Skills SIEM (e.g., Splunk, QRadar, ArcSight) Incident Response Log Analysis Threat Intelligence Secondary Skills Scripting (Python, PowerShell, Bash) Cloud Security (AWS, Azure, GCP) Endpoint Detection and Response (EDR)

Posted 3 weeks ago

Apply

4.0 - 7.0 years

0 - 2 Lacs

Bengaluru

Hybrid

Naukri logo

Job Title: Functional Analyst Location: Bangalore Work Mode: Hybrid (2 to 3 days in office per week) Experience: 4 to 7 years Job Summary: We are seeking a detail-oriented and proactive Functional Analyst with 47 years of experience in business analysis, process modeling, and functional specification. The ideal candidate must possess strong skills in UML , BPMN , and SQL , and should be capable of translating business requirements into functional solutions. Key Responsibilities: Conduct detailed requirement elicitation and business process analysis through interactions with stakeholders. Translate business needs into clear functional specifications and use cases. Create process models and system diagrams using UML and BPMN standards. Collaborate with cross-functional teams including developers, QA, and business stakeholders. Document and maintain requirements traceability throughout the project lifecycle. Perform data analysis using SQL to support requirement validation and decision-making. Drive stakeholder meetings and ensure alignment between business objectives and technical implementation. Act as a liaison between business teams and technical teams to ensure successful delivery. Mandatory Skills: Strong hands-on experience in UML (Use Cases, Activity Diagrams, Sequence Diagrams) Proficiency in creating BPMN models using tools like Visio, Bizagi, or similar Good knowledge of SQL for data analysis and validation Proven experience in requirement gathering, analysis , and functional documentation Strong understanding of business process modeling and reengineering Good to Have: Exposure to Agile or Scrum environments Experience in preparing BRD, FSD, and user stories Knowledge of enterprise tools like JIRA, Confluence, or similar Qualifications: Bachelor's degree in Computer Science, Information Technology, Business, or a related field 4 to 7 years of relevant experience as a Functional Analyst or Business Analyst

Posted 3 weeks ago

Apply

4.0 - 5.0 years

6 - 7 Lacs

Hyderabad

Work from Office

Naukri logo

Provide advanced incident response and threat analysis in a Security Operations Center (SOC). Lead investigations, conduct forensics, and manage escalated security incidents to minimize risks and ensure data protection.

Posted 3 weeks ago

Apply

4.0 - 5.0 years

6 - 7 Lacs

Hyderabad

Work from Office

Naukri logo

Implement and manage security protocols in Operational Technology (OT) environments, ensuring the protection of industrial control systems, SCADA, and other critical infrastructure from cyber threats.

Posted 3 weeks ago

Apply

4.0 - 5.0 years

6 - 7 Lacs

Karnataka

Work from Office

Naukri logo

Implement and manage Splunk for monitoring and analyzing machine data to ensure system performance and security.

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies