Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
2.0 - 4.0 years
4 - 6 Lacs
Chennai
Work from Office
The Cyber Threat Detection and Development role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Threat Detection and Development domain.
Posted 3 weeks ago
2.0 - 4.0 years
4 - 6 Lacs
Mumbai
Work from Office
The Cyber Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security domain.
Posted 3 weeks ago
2.0 - 4.0 years
4 - 6 Lacs
Chennai
Work from Office
The Cyber Security E2 role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security E2 domain.
Posted 3 weeks ago
3.0 - 5.0 years
5 - 7 Lacs
Mumbai
Work from Office
The Firewall,WAF role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Firewall,WAF domain.
Posted 3 weeks ago
2.0 - 4.0 years
4 - 6 Lacs
Hyderabad
Work from Office
The Cyber Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security domain.
Posted 3 weeks ago
2.0 - 4.0 years
4 - 6 Lacs
Bengaluru
Work from Office
The Cyber Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security domain.
Posted 3 weeks ago
2.0 - 5.0 years
4 - 7 Lacs
Hyderabad
Work from Office
The Securonix/UEBA/SIEM, Tripwire IP360, Tripwire CCM, AWS Guardduty role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Securonix/UEBA/SIEM, Tripwire IP360, Tripwire CCM, AWS Guardduty domain.
Posted 3 weeks ago
2.0 - 4.0 years
4 - 6 Lacs
Karnataka
Work from Office
The Imperva DB security Engineer role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Imperva DB security Engineer domain.
Posted 3 weeks ago
3.0 - 5.0 years
5 - 7 Lacs
Mumbai
Work from Office
The Firewall,WAF role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Firewall,WAF domain.
Posted 3 weeks ago
2.0 - 5.0 years
4 - 7 Lacs
Hyderabad
Work from Office
The Securonix/UEBA/SIEM, Tripwire IP360, Tripwire CCM, AWS Guardduty role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Securonix/UEBA/SIEM, Tripwire IP360, Tripwire CCM, AWS Guardduty domain.
Posted 3 weeks ago
4.0 - 6.0 years
15 - 25 Lacs
Hyderabad
Work from Office
Job Summary 1.Job title SECURITY OPERATIONS 2.Job summary CASB Crowdstrike 3.Experience 5to8yrs 4.Required Skills Technical Skills- Security Change LifeCycle Mang Domain Skills- 5.Nice to have skills Techincal Skills- Incident Management Responsibilities Detailed knowledge of cloud infrastructure cloud networking and infrastructure concepts and various cloud resources like containers kubernetes clusters VMs IaC GitHub Terraform Log analysis and troubleshooting of security tools Troubleshooting testing Complete service requests from SOC Tools Used Jira GitHub GCP AWS or Azure console Chronicle Crowdstrike Proofpoint XSOAR Netskope
Posted 3 weeks ago
6.0 - 8.0 years
27 - 42 Lacs
Hyderabad
Work from Office
Job Summary Azure Cloud Security 3.Experience : 5to8yrs 4.Required Skills : Technical Skills : Security Domain Skills : 5.Nice to have skills : Domain Skills : 6.Technology : Data Security Responsibilities Detailed knowledge of cloud infrastructure cloud networking and infrastructure concepts and various cloud resources like containers kubernetes clusters VMs IaC GitHub Terraform Log analysis and troubleshooting of security tools Troubleshooting testing Complete service requests from SOC GCP Azure console Terraform GitHub Cloud infrastructure knowledgeexperience Security tool health monitoring maintenance updates
Posted 3 weeks ago
8.0 - 12.0 years
13 - 20 Lacs
Vadodara
Work from Office
Key Responsibilities: Linux Server Administration: Install, configure, manage, and maintain Linux-based systems (RHEL, CentOS, Ubuntu, etc.). Automation & Scripting: Develop and maintain automation scripts using Python and Bash for system monitoring, log analysis, and performance optimization. System Monitoring & Troubleshooting: Ensure high availability, monitor system performance, and resolve hardware/software issues. Security & Compliance: Implement security best practices, patch management, firewall rules, and user access controls.
Posted 3 weeks ago
8.0 - 12.0 years
13 - 20 Lacs
Kolkata
Work from Office
Key Responsibilities: Linux Server Administration: Install, configure, manage, and maintain Linux-based systems (RHEL, CentOS, Ubuntu, etc.). Automation & Scripting: Develop and maintain automation scripts using Python and Bash for system monitoring, log analysis, and performance optimization. System Monitoring & Troubleshooting: Ensure high availability, monitor system performance, and resolve hardware/software issues. Security & Compliance: Implement security best practices, patch management, firewall rules, and user access controls.
Posted 3 weeks ago
8.0 - 12.0 years
13 - 20 Lacs
Patna
Work from Office
Key Responsibilities: Linux Server Administration: Install, configure, manage, and maintain Linux-based systems (RHEL, CentOS, Ubuntu, etc.). Automation & Scripting: Develop and maintain automation scripts using Python and Bash for system monitoring, log analysis, and performance optimization. System Monitoring & Troubleshooting: Ensure high availability, monitor system performance, and resolve hardware/software issues. Security & Compliance: Implement security best practices, patch management, firewall rules, and user access controls.
Posted 3 weeks ago
8.0 - 12.0 years
13 - 20 Lacs
Salem
Work from Office
Key Responsibilities: Linux Server Administration: Install, configure, manage, and maintain Linux-based systems (RHEL, CentOS, Ubuntu, etc.). Automation & Scripting: Develop and maintain automation scripts using Python and Bash for system monitoring, log analysis, and performance optimization. System Monitoring & Troubleshooting: Ensure high availability, monitor system performance, and resolve hardware/software issues. Security & Compliance: Implement security best practices, patch management, firewall rules, and user access controls.
Posted 3 weeks ago
9.0 - 14.0 years
27 - 42 Lacs
Bengaluru
Work from Office
Job Summary: We are seeking a highly experienced SOC SME to lead complex incident response, design advanced detective controls, and perform proactive threat hunting across multi-platform environments. This role demands strong technical expertise in security operations and a proactive approach to threat mitigation. Work from Office - Bangalore location [Brookfield] Rotational and Night Shift applicable Mandatory Skill Set: 8+ years in Security Operations/Incident Response Hands-on with SIEM, SOAR, XDR platforms (e.g., Cortex XSIAM, Torq) Expertise in threat hunting and event analysis Knowledge of cyber frameworks: MITRE ATT&CK, NIST, Kill Chain Experience with EDR tools , network forensics , and log analysis Strong understanding of incident lifecycle and post-incident reporting Excellent analytical and communication skills Bachelor's degree in Computer Science or related field Key Responsibilities: Lead incident response (IR) and analyze complex security events Design and improve detective controls and alert use cases Conduct proactive threat hunting and trend analysis Stay updated on cyber threat landscape and threat actor TTPs Contribute to security innovation , tool enhancement, and process maturity Deliver detailed incident reports and post-mortem reviews Preferred Skills: Scripting: Python, PowerShell Cloud Security: AWS, Azure, GCP Certifications: CISSP, GIAC, CEH Strong grasp of defense-in-depth and layered security strategies
Posted 3 weeks ago
5.0 - 7.0 years
10 - 12 Lacs
Bengaluru
Work from Office
OPPORTUNITY OVERVIEW As a Platform Specialist Team Lead at ZeroFOX, you will join a team of highly skilled individuals working to prevent cyber attacks for enterprise-level commercial and government customers. Using our proprietary hybrid intelligence platform, this role specifically focuses on supporting existing customers by providing detailed analysis and contextualization regarding a variety of cyber risks. You will have the opportunity to research these risks, develop notification and alert packages, and present your findings to customers. Your goal: Keep our customers safe with detailed threat intelligence information, and present findings in a professional manner. Responsibilities: Analyze large volumes of data for customer-related risks. Create risk notification and alert packages for customers. Interface with customers and stakeholders to provide analysis reports and details. Support and respond to customer requests for further information and analysis. Responsible for communications with the customers including: phone, video, email, and authoring reports. Triage alerts for customers to give real time intelligence. Act as an escalation point for Tier 1 alert analysis, platform configuration, and trend analysis; Managing the team based on metric driven outcomes Serve as a resource for the Account Management team to explain the managed service. Act as a customer advocate internally, working across appropriate teams to solve customer challenges Support team productivity and outputs during assigned shifts. Identify opportunities for process improvement and efficiency. Provide coaching, training, and mentorship to team members. Act as a liaison between team members and upper management. Conduct regular performance evaluations and provide feedback to team members. Provide regular updates and reports on team progress to upper management. Required Qualifications: Attention to detail Experience working in a team environment and responsible for certain aspects of service delivery Ability to lead a team and be a point of contact as a subject matter expert Knowledge of the cyber threat environment including how the following sources of data enable cyber operations: major social networks (knowledge of emerging networks a big plus); dark web; domain abuse; analyze security incidents, such as account breaches, unauthorized access, or malicious content etc. Superior research and analysis skills Ability to convey complex ideas, trends, and information in a simple way (a writing sample will be requested as part of the interview process) Ability to extrapolate trends from mass amounts of disparate data Solid interpersonal and social skills Experience with other SaaS, cyber security, or social media products or services is preferred Must be willing to work alternative work schedule including partial weekends Big Bonus: Basic scripting capabilities: JavaScript, Python, or similar; at minimum being able to review and edit basic code structure Comfort working with a quickly growing team Ability to quickly adapt and recommend solutions as needed A self-starting mentality, when you find a problem, you alert the team, and fix ityou dont wait for the next task. Familiarity and comfort with producing superior work while meeting aggressive deadlines Benefits Competitive compensation Community-driven culture with employee events Generous time off Best-in-class benefits Fun, modern workspace Respectful and nourishing work environment, where every opinion is heard and everyone is encouraged to be an active part of the organizational culture
Posted 4 weeks ago
4.0 - 8.0 years
6 - 10 Lacs
Hyderabad
Work from Office
Security Specialist Location: Hyderabad Position: 1 Experience: 4 to 8 years pre sales discussions and design security architecture based on customer requirement. Implement firewalls, anti-virus software, log management, authentication systems, content filtering, Professional IT certifications will be added advantage
Posted 4 weeks ago
4.0 - 9.0 years
11 - 15 Lacs
Hyderabad
Work from Office
Key Responsibilities: Design, implement, and manage Palo Alto Networks solutions, including: Next-Gen Firewall (NGFW) EDR/XDR (Cortex XDR) SIEM/SOAR (Cortex XSIAM) Lead and support migration projects from legacy platforms (e.g., Splunk, Sentinel, QRadar) to Palo Alto Cortex XSIAM Work with clients to understand business requirements and deliver tailored cybersecurity solutions Perform threat hunting, alert tuning, policy configuration, and use case development Collaborate with global teams (onshore/offshore model) for delivery in sectors like Telecom, Finance, Retail, and Public Sector Support security assessments, integrations, and continuous improvement initiatives Required Skills & Qualifications: Strong hands-on experience in Palo Alto technologies (NGFW, Cortex XDR/XSIAM) Proven knowledge of cybersecurity operations, SOC processes, and incident response Experience with SIEM migration and integrations Understanding of threat intelligence, detection engineering, and automation Good knowledge of scripting (Python, PowerShell) and log analysis Excellent communication and client-facing skills Preferred Certifications: Palo Alto Networks Certifications, such as: PCNSE (Network Security Engineer) Cortex XDR/XSIAM certifications (if available) Additional certifications like CEH, CISSP, or relevant SIEM/EDR vendor certifications are a plus Why Join Us? Opportunity to work on cutting-edge XSIAM and XDR deployments Part of a growing global team delivering high-impact security projects Exposure to federal and enterprise-grade environments Flexible work culture with opportunities for on-site (Australia/US) engagements
Posted 4 weeks ago
2.0 - 5.0 years
5 - 9 Lacs
Noida
Work from Office
Optum is a global organization that delivers care, aided by technology to help millions of people live healthier lives. The work you do with our team will directly improve health outcomes by connecting people with the care, pharmacy benefits, data and resources they need to feel their best. Here, you will find a culture guided by inclusion, talented peers, comprehensive benefits and career development opportunities. Come make an impact on the communities we serve as you help us advance health optimization on a global scale. Join us to start Caring. Connecting. Growing together. Primary Responsibilities Monitor and analyze attempted efforts to compromise security protocols. Identify and investigate activities and conduct and provide analyses regarding results Collaborate with other Cyber Defense teams Review SIEM alerts and logs to identify and report possible security issues Serve as an escalation resource and mentor for other SOC analysts Perform investigations and escalation for complex or high severity security threats or incidents Work across the organization to define, develop, and refine correlation rules Participate in writing security status reports to provide system status, report potential and actual security violations and provide procedural recommendations Participate in knowledge sharing with other team members and industry collaboration organizations to advance the security monitoring program Participate in developing and supporting strategic plans and projects to meet Global Security and SOC goals and objectives Maintain an in-depth knowledge of common attack vectors, common security exploits, and countermeasures. Maintain a solid working knowledge of Information Security principles and practices Research the current information security and event monitoring trends, and keep up to date with SOC issues, technology, and industry best practices Coordinate evidence/data gathering and documentation and review Security Incident reports Assist in strategic initiatives Provide recommendations for improvements to security operational monitoring and incident response procedures based on operational insights Comply with the terms and conditions of the employment contract, company policies and procedures, and any and all directives (such as, but not limited to, transfer and/or re-assignment to different work locations, change in teams and/or work shifts, policies in regards to flexibility of work benefits and/or work environment, alternative work arrangements, and other decisions that may arise due to the changing business environment). The Company may adopt, vary or rescind these policies and directives in its absolute discretion and without any limitation (implied or otherwise) on its ability to do so Required Qualifications BS in Computer Science, Computer Engineering, Cyber Security, Forensics and/or equivalent work experience Security certifications (e.g. Security+, Network+, Cloud+, AZ-900 (Microsoft Azure Fundamental), SC-200 (Microsoft Security Operations Analyst, etc.) Experience in incident detection and response Experience working with network tools and technologies such as firewall (FW), proxies, IPS/IDS devices, full packet capture (FPC), and email platforms Willing to work in a team-oriented 24/7 environment; schedule flexibility as needed to work with a global team Preferred Qualifications Experience building use cases and performing log analysis using technology like KQL, Splunk, AlienVault, Q-radar etc. SOAR or Scripting experience using Python, PowerShell etc. At UnitedHealth Group, our mission is to help people live healthier lives and make the health system work better for everyone. We believe everyone-of every race, gender, sexuality, age, location and income-deserves the opportunity to live their healthiest life. Today, however, there are still far too many barriers to good health which are disproportionately experienced by people of color, historically marginalized groups and those with lower incomes. We are committed to mitigating our impact on the environment and enabling and delivering equitable care that addresses health disparities and improves health outcomes — an enterprise priority reflected in our mission.
Posted 4 weeks ago
10.0 - 14.0 years
8 - 10 Lacs
Noida, Gurugram, Delhi / NCR
Work from Office
threat hunting and intelligence analysis tools,malware analysis and threat detection, SOC operations, Malware Reverse Engineering, Exploit Development, SIEM, IDS/IPS, and other security tools, CTIA, GCIA,GCIH, OSCP+,GCTI Required Candidate profile malware, ransomware, application & network layer attacks,shell, Python, and PowerShell SIEM platform (e.g., Splunk, Elastic Stack) SQL queries,Threat Hunter & Threat Intelligence Analyst
Posted 4 weeks ago
1.0 - 6.0 years
1 - 4 Lacs
Mumbai, Thane, Navi Mumbai
Work from Office
This Opportunity is with a leading Fintech Company for their office in Thane location Role: SOC Executive Experience: 1 - 5 Years Job Description: Job Purpose: We are seeking a proactive and detail-oriented SOC Analyst with hands-on experience in SIEM tools such as ManageEngine Event Log Analyzer and SISA MDR. The ideal candidate will be responsible for monitoring, analysing, and responding to security incidents and events, managing alert configurations, and maintaining SOC operations including dashboards, asset inventories, and firewall analysis. This role is critical in the early detection and response to cybersecurity threats and in ensuring the overall security posture of the organization. Roles & Responsibilities: Operate and manage SIEM tools including ManageEngine EventLog Analyzer and SISA MDR to monitor and analyze security events in real-time. Deploy, configure, and manage log sources, and generate actionable reports using EventLog Analyzer. Perform in-depth log analysis and search for specific security events or anomalies within the SIEM environment. Onboard new devices and applications into the SIEM system, ensuring comprehensive log collection and visibility. Configure and fine-tune alert rules to identify potential threats and reduce false positives. Develop, maintain, and regularly update SOC dashboards to reflect current threat status and incident trends. Coordinate with support teams to raise Service Request Forms (SRFs), track ticket resolutions, and manage incident lifecycle activities. Define security policies and conduct vulnerability assessments using Nessus, analysing scan results for remediation planning. Continuously monitor SOC for suspicious activities such as DDoS attacks, port scanning, and unauthorized access attempts. Maintain an accurate asset inventory for SOC systems (desktops, laptops, servers) and verify that all Windows systems are properly licensed. Act as a first-level responder during security incidents, escalating issues such as bandwidth spikes, firewall violations, network outages, and unauthorized activities. Monitor and analyse firewall logs using FortiAnalyzer, identifying top sources/destinations, bandwidth-heavy applications, critical threats, and policy violations. Qualification/ Knowledge/ Skills/ Experience: Bachelors degree in information security, Computer Science, or related field. 1-2 years of relevant work experience. Proven experience with SIEM platforms (ManageEngine, SISA MDR) and vulnerability scanning tools (Nessus). Strong understanding of network protocols, firewall technologies, and incident response procedures. Experience in log analysis, alerting configuration, and SOC monitoring. Knowledge of Fortinet firewalls and experience with FortiAnalyzer preferred. Familiarity with security standards and compliance requirements. Good communication and documentation skills. Preferred Certifications: CompTIA Security+ / CySA+ EC-Council CEH GIAC (GCIH, GCIA) ManageEngine or Fortinet product certifications (preferred). Interested Candidates can share their CV's at priyal@topgearconsultants.com
Posted 4 weeks ago
5.0 - 10.0 years
5 - 15 Lacs
Hyderabad
Work from Office
Job Title: Security Operations Center (SOC) Analyst (Positios-02) Experience: 5 to 8 Years Location: Hyderabad Department: Cybersecurity / Security Operations Industry: IT Services / MSSP / Software / FinTech / Healthcare IT Job Summary: We are seeking an experienced and detail-oriented SOC Analyst (58 years) to join our cybersecurity team. The ideal candidate will be responsible for monitoring, detecting, investigating, and responding to cyber threats across the organization. The SOC Analyst will play a critical role in defending systems, applications, and data from security breaches and supporting incident response efforts, threat hunting, and continuous improvement of SOC processes. Key Responsibilities: Security Monitoring & Incident Response: Continuously monitor SIEM dashboards, threat intelligence feeds, and security alerts. Investigate and respond to security incidents, phishing attacks, malware infections, and anomalous activities. Triage alerts based on severity, business impact, and threat intelligence context. Perform root cause analysis and prepare incident reports with actionable recommendations. Escalate critical incidents to Tier 3/IR teams and collaborate during major security events. Threat Detection & Hunting: Conduct proactive threat hunting based on IOCs, TTPs, and threat intelligence reports. Analyse logs from endpoints, firewalls, IDS/IPS, cloud workloads, and third-party security solutions. Develop and fine-tune detection rules and correlation logic in SIEM (e.g., Splunk, Sumo Logic, Sentinel). Tool & Infrastructure Management: Work with EDR, NDR, DLP, SIEM, SOAR, and vulnerability management platforms. Support integration of new log sources and ensure completeness of logging for critical systems. Maintain threat detection playbooks and contribute to process automation via SOAR tools. Compliance & Reporting: Ensure security operations align with frameworks like NIST, ISO 27001, SOC 2, or HIPAA. Support security audit requirements by providing incident logs and response documentation. Generate periodic reports on incident trends, SOC performance, and threat landscape. Required Skills & Experience: 5–8 years of experience in a SOC environment or cybersecurity operations role. Strong knowledge of attack vectors, MITRE ATT&CK framework, and incident response lifecycle. Hands-on experience with SIEM (e.g., Splunk, Microsoft Sentinel, QRadar, LogRhythm). Familiarity with endpoint protection (CrowdStrike, SentinelOne, Defender ATP, etc.). Knowledge of Windows/Linux log analysis, firewall rules, and cloud security controls (Azure/AWS). Strong analytical thinking, attention to detail, and ability to work under pressure. Preferred Qualifications: Bachelor’s degree in Cybersecurity, Computer Science, or related field. Certifications such as CEH, GCIA, GCIH, CySA+, AZ-500, or Security+ are highly desirable. Experience working in a 24x7 SOC or with MSSP environments is a plus. Exposure to compliance-driven industries (finance, healthcare, SaaS) preferred. Soft Skills: Strong communication and documentation skills. Ability to collaborate across IT, DevOps, and security teams. Risk-aware mindset with a proactive approach to security operations. Work Mode: On-site / Hybrid / 24x7 Rotational Shifts if applicable Reporting To: SOC Manager / Head of Security Operations
Posted 4 weeks ago
2.0 - 6.0 years
8 - 9 Lacs
Mumbai
Work from Office
Diverse Lynx is looking for SOC Analyst to join our dynamic team and embark on a rewarding career journey. Monitor and analyze security events and incidents, identifying and investigating potential threats Maintain the security of our network and systems by implementing security controls and best practices Work closely with the rest of the security team to ensure that our systems and networks are secure and compliant with industry standards Maintain accurate documentation and reports on security events and incidents Communicate effectively with team members and other stakeholders to ensure that security issues are addressed in a timely and effective manner Stay up to date with the latest security technologies and threats
Posted 4 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
17062 Jobs | Dublin
Wipro
9393 Jobs | Bengaluru
EY
7759 Jobs | London
Amazon
6056 Jobs | Seattle,WA
Accenture in India
6037 Jobs | Dublin 2
Uplers
5971 Jobs | Ahmedabad
Oracle
5764 Jobs | Redwood City
IBM
5714 Jobs | Armonk
Tata Consultancy Services
3524 Jobs | Thane
Capgemini
3518 Jobs | Paris,France