Jobs
Interviews

287 Log Analysis Jobs - Page 9

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

7.0 - 12.0 years

6 - 10 Lacs

Bengaluru

Work from Office

Were Celonis, the global leader in Process Mining technology and one of the worlds fastest-growing SaaS firms. We believe there is a massive opportunity to unlock productivity by placing data and intelligence at the core of business processes - and for that, we need you to join us. The Team: Our team is responsible for building the Celonis end-to-end Task Mining solution . Task Mining is the technology that allows businesses to capture user interaction (desktop) data, so they can analyze how people get work done, and how they can do it even better. We own all the related components, e.g. the desktop client, the related backend services, the data processing capabilities, and Studio frontend applications. The Role: Celonis is looking for a Senior Software Engineer to build new features and increase the reliability of our Task Mining solution. You would contribute to the development of our Task Mining Client so expertise on C# and .NET framework is required and knowledge of Java and Spring boot is a plus. The work you ll do: Implement highly performant and scalable desktop components to improve our existing Task Mining software Own the implementation of end to end solutions: leading the design, implementation, build and delivery to customers Increase the maintainability, reliability and robustness of our software Continuously improve and automate our development processes Document procedures, concepts, and share knowledge within and across teams Manage complex requests from support, finding the right technical solution and managing the communication with stakeholders Occasionally work directly with customers, including getting to know their system in detail and helping them debug and improve their setup. The qualifications you need: 7+ years of professional experience building .NET applications Passion for writing clean code that follows SOLID principles Hand-on experience in C# and .NET framework. Experience in user interface development using WPF and MVVM. Familiarity with Java, Spring framework is a plus. Familiarity with containerization technologies (i.e. Docker) Experience in REST APIs and/or distributed micro service architecture Experience in monitoring and log analysis capabilities (i.e. DataDog) Experience in writing and setting up unit and integration tests Experience in refactoring legacy components. Able to supervise and coach junior colleagues Experience interacting with customers is a plus. Strong communication skills. What Celonis Can Offer You: Pioneer Innovation: Work with the leading, award-winning process mining technology, shaping the future of business. Accelerate Your Growth: Benefit from clear career paths, internal mobility, a dedicated learning program, and mentorship opportunities. Receive Exceptional Benefits: Including generous PTO, hybrid working options, company equity (RSUs), comprehensive benefits, extensive parental leave, dedicated volunteer days, and much more . Prioritize Your Well-being: Access to resources such as gym subsidies, counseling, and well-being programs. Connect and Belong: Find community and support through dedicated inclusion and belonging programs. Make Meaningful Impact: Be part of a company driven by strong values that guide everything we do: Live for Customer Value, The Best Team Wins, We Own It, and Earth Is Our Future. Collaborate Globally: Join a dynamic, international team of talented individuals. Empowered Environment: Contribute your ideas in an open culture with autonomous teams. About Us: Celonis makes processes work for people, companies and the planet. The Celonis Process Intelligence Platform uses industry-leading process mining and AI technology and augments it with business context to give customers a living digital twin of their business operation. It s system-agnostic and without bias, and provides everyone with a common language for understanding and improving businesses. Celonis enables its customers to continuously realize significant value across the top, bottom, and green line. Celonis is headquartered in Munich, Germany, and New York City, USA, with more than 20 offices worldwide. Get familiar with the Celonis Process Intelligence Platform by watching this video . Celonis Inclusion Statement: At Celonis, we believe our people make us who we are and that The Best Team Wins . We know that the best teams are made up of people who bring different perspectives to the table. And when everyone feels included, able to speak up and knows their voice is heard - thats when creativity and innovation happen. Your Privacy: Any information you submit to Celonis as part of your application will be processed in accordance with Celonis Accessibility and Candidate Notices By submitting this application, you confirm that you agree to the storing and processing of your personal data by Celonis as described in our Privacy Notice for the Application and Hiring Process . Please be aware of common job offer scams, impersonators and frauds. Learn more here .

Posted 1 month ago

Apply

1.0 - 5.0 years

3 - 7 Lacs

Noida

Work from Office

Req ID: 327248 We are currently seeking a Archer IRM Developer to join our team in Noida, Uttar Pradesh (IN-UP), India (IN). Configure and develop solutions for customers on the Archer IRM platform Configure and develop integrated solutions for customers using the Archer IRM platform utilizing additional industry standard applications including SSO, web services integrations, import sets and table polling Design and configure complex configurations including advanced workflow, questionnaires, layouts, reports, data feeds and data imports, campaigns, dashboards, notifications, package installation and workflows, etc. Support and escalate issues and defects related to specific customer environments as required, provide incident support as required Perform system and unit testing, document results Develop documentation as required, per operational processes Follow the engagement model as determined by the engagement manager for projects, as needed Follow the standardized project implementation methodology

Posted 1 month ago

Apply

3.0 - 6.0 years

5 - 8 Lacs

Mumbai

Work from Office

The Networking Managed Services Engineer (L2) may also contribute to support on project work as and when required. What you'll be doing Key Responsibilities: Monitoring, technical and troubleshooting support and administration of firewall (FortiGate SD WAN) Ensure daily backup of Management servers and firewall. Troubleshooting access related issues due to firewall and IPS policies Prepare daily/weekly/monthly/half yearly/yearly compliance as per HSL requirement. Review monitoring alerts for the firewall for availability and performance using in-house deployed NMS tool Configure firewall/IPS/AV security policies on firewall. Modification/deletion/addition of rules/routes/policies as per requirements from HSL Provide audit evidence as and when required Assist OEM/HSL Project team in product upgrade/maintenance activities. Log analysis and reporting using native tool. Capacity management Incident management UAM and Firewall rule base review Change management process need to be followed. Service window for this engagement is 16/6 (two shifts) In absence of onsite resource, there should be an immediate replacement of the resource. Provision and configure FortiGate devices for SD-WAN functionality, including defining WAN links, VPN tunnels, and traffic shaping policies. Deploy and manage SD-WAN overlays to optimize network performance and reliability. Define and enforce traffic policies based on application types, quality of service (QoS) requirements, and security policies. Implement dynamic path selection and traffic steering rules to ensure efficient utilization of WAN links. Monitor the performance and health of SD-WAN links and devices using Fortinet management tools. Troubleshoot network connectivity issues, latency, and packet loss problems in the SD-WAN environment. Analyze traffic patterns and utilization statistics to identify potential bottlenecks and optimize network performance. Integrate security features such as firewall, intrusion prevention system (IPS), and web filtering with SD-WAN policies to ensure secure access to applications and data. Configure security policies to inspect and filter traffic at the WAN edge to protect against threats and vulnerabilities. Configure QoS policies to prioritize critical applications and traffic types over less important ones. Implement traffic shaping and bandwidth management techniques to ensure optimal performance for real-time applications like voice and video conferencing. Monitor network utilization and capacity trends to forecast future bandwidth requirements. Scale SD-WAN infrastructure to accommodate growing traffic demands and business needs. Maintain up-to-date documentation of SD-WAN configurations, policies, and procedures. Generate regular reports on network performance, uptime, and security events for management and compliance purposes. Implement changes to SD-WAN configurations following best practices and change management procedures. Coordinate with other IT teams to ensure seamless integration of SD-WAN changes with existing network infrastructure. End user support if any issue due to firewall policies. Support for DC/DR headend device for change management, daily operation,HW/SW upgrade, modification, maintenance activity and incident. Upgrade activity (hardware/software) need to be performed as per OEM recommendation for headend and branch devices. Closing of audit and VA points for headend and branch devices Support for existing inventory of fortigate appliances (Firewall, controller, AP, Analyzer) across DC,DR and branches. Coordinating and raise the case with ISP (MPLS/P2P/Internet) for link down/link flapping/high latency issue (Branch link and their hub DC/DR link) Coordinating with ISP for link configuration in the event of new link commissioning, link shifting, link bandwidth upgrade, change of service provider. (Branch link and their hub DC/DR link) Configuration of links on BGP/EIGRP/IGP and OSPF protocols Preparation of daily/monthly/quarterly link utilization report and publish to seniors Follow the change management process and generate the change ID before execution of any change Academic Qualifications and Certifications: Bachelor's degree or equivalent qualification in IT/Computing (or demonstrated equivalent work experience). Fortinet SDWAN certification or equivalent certification. Certifications relevant to the services provided (certifications carry additional weightage on a candidates qualification for the role).

Posted 1 month ago

Apply

5.0 - 10.0 years

9 - 13 Lacs

Bengaluru

Work from Office

? Identify gaps and weaknesses on current alerting platforms and recommend improvements to ensure evolving capabilities. Identify gaps and weaknesses on Data Loss Prevention platforms. Continually review existing risk scoring models and adjust accordingly to ensure proper focus on significant security events and business needs. Administrate of DLP solution and liaising with GRC & CISO function to configure policies and work on reporting, monitor and respond to different alerts generated from the DLP solution. Demonstrate a good understanding of incident response process and event escalations, repone to DLPs escalations reported by incident response team. Share recommendations to further identify sensitive data and strengthen security controls. Collaborate & partner with legal, compliance team to support customer privacy initiative and continue compliance with different regulations, to mature company data life cycle management with focus on data security. Ability to independently research and solve technical issues and Demonstrated integrity in a professional environment.

Posted 1 month ago

Apply

5.0 - 10.0 years

4 - 8 Lacs

Gurugram

Work from Office

Project Role : Software Development Engineer Project Role Description : Analyze, design, code and test multiple components of application code across one or more clients. Perform maintenance, enhancements and/or development work. Must have skills : Tagetik Planning Budgeting and Forecasting Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Software Development Engineer, you will analyze, design, code, and test multiple components of application code across one or more clients. Perform maintenance, enhancements, and/or development work. Show creativity in problem-solving and contribute to the growth of the team. Roles & Responsibilities:Support for dry runs Preparing and opening Tagetik & Integrations for quarterly submissions Load, maintaining FX rates integration Preparation, Validation and Sourcing the FX rates Loading of Ownership register changes Sourcing, preparing and checking of changes to Ownership Register Maintaining data mappings between Tagetik to external systems (inbound / Outbound) Maintaining and reconciling data between source system and Tagetik Consolidation Functional related Application Support for users during the reporting periods Data Checks and controls prior to each release UAT Individual User / Business unit specific reports build - Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work-related problems.- Collaborate with team members to analyze, design, and develop software solutions.- Participate in code reviews and provide constructive feedback.- Troubleshoot and debug software applications to ensure optimal performance.- Research and implement new technologies to enhance software capabilities.- Document software specifications and ensure code quality standards are met. Professional & Technical Skills: Maintenance Activities - Start/Stop Knowledge in Tagetik Excel Add-on Performing General Health checks in Tagetik If required** - Scheduling Jobs & Performing Data export & Import Tagetik Upgrade Skills Performance Tuning Log Analysis- Tagetik Consolidation- Must To Have Skills: Proficiency in Tagetik Planning Budgeting and Forecasting.- Strong understanding of statistical analysis and machine learning algorithms.- Experience with data visualization tools such as Tableau or Power BI.- Hands-on implementing various machine learning algorithms such as linear regression, logistic regression, decision trees, and clustering algorithms.- Solid grasp of data munging techniques, including data cleaning, transformation, and normalization to ensure data quality and integrity. Additional Information:- The candidate should have a minimum of 5 years of experience in Tagetik Planning Budgeting and Forecasting.- This position is based at our Gurugram office.- A 15 years full-time education is required. Qualification 15 years full time education

Posted 1 month ago

Apply

2.0 - 4.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Should have done SIEM Engineeringactivities for more than 2 years. Hands on Experience to Configure,manage, and maintain the Microsoft Sentinel SIEM platform including logmanagement, retention configurations, maintenance of logs at low cost. Monitor, analyze, investigate andrespond to security incidents in MS Sentinel by collaborating with the SOC teamand Customers. Should be able to Integrate/onboarddevices (Linux, Palo Alto, Fortinet, windows and other devices etc.) to Azuresentinel Should have expertise in integratingdata sources which are not supported by Sentinel tool OOB. Custom parserdevelopment and ability to solve technical issues in Sentinel. Troubleshoot and resolve issuesrelated to SIEM (Sentinel) infrastructure and integrations like logs notreporting to Sentinel. Creation of integration documentsand sending them to customers as per requirement. Strong Knowledge of different MicrosoftDefender products Generate and reviewWeekly/Monthly reports to provide insights on security posture and SIEMeffectiveness to Customers Regularly review use caseperformance and keep track of any fine tuning done to use cases includingidentifying scenarios where fine tuning can be done and effectively communicateto customer/internal for fine tuning. Act as single point of contact forthe client during any issues of Integration or Incidents. What you ll do: Creation and Fine Tuning inCustom KQL queries and functions for complex detection and monitoring Requirements. Knowledge of Workbooks creation, Building Playbooks (Enrichment andResponse) in Sentinel automation through logic apps. Preference should be given to candidateswho have completed expert training and certifications in Sentinel and Defender productsof Microsoft. Strong communication, collaborationand multi-tasking skills to work effectively with cross-functional teams andstakeholders. Relevant professionalcertifications such as: AZ-900, SC-900, SC-200, Certified Ethical Hacker (CEH)or any other SIEM Engineering certification. Stay updated with the latesttrends and developments in SIEM technologies and cybersecurity threats andutilize it in System if required. What we offer: Insurance Group Medical Coverage, Group Personal Accident, Group Term Life Insurance Rewards and Recognition Program,Employee Referral Program, Wellness Program and CSR Initiatives Maternity and Paternity Leaves Company Sponsored CertificationProgram

Posted 1 month ago

Apply

2.0 - 5.0 years

3 - 7 Lacs

Mumbai

Work from Office

The primary responsibility of this role is to provide advanced incident analysis and management within our SOC environment, while also leading the development and training of the L1 SOC team in incident analysis, parsers creation, rule views, and report management. The ideal candidate will have a strong background in cybersecurity, incident response, and leadership skills. Responsibilities: Advanced Incident Analysis: Utilize advanced tools and techniques to analyze and investigate security incidents detected within the organization's networks and systems. Incident Response: Lead incident response efforts, coordinating with internal and external stakeholders to mitigate and remediate security incidents promptly. Team Leadership: Provide mentorship and guidance to the L1 SOC team, assisting in the development of their skills in incident analysis, parser creation, rule views, and report management. Parser Creation: Develop and maintain parsers to enhance the capability of the SOC's security information and event management (SIEM) system in detecting and correlating security events. Rule View Management: Manage and optimize rule views within the SIEM platform to ensure accurate and timely detection of security threats. Report Management: Oversee the generation and distribution of security reports, including incident reports, trend analysis, and recommendations for improvement. Collaboration: Work closely with other teams within the organization, including IT operations, network engineering, and application development, to improve overall security posture and incident response capabilities. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. Equivalent work experience may be considered. Minimum of 3 years of experience in a SOC environment, with a focus on incident analysis and response. Strong understanding of cybersecurity principles, including threat detection, malware analysis, and vulnerability management. Experience with SIEM platforms (e.g., Securonix, QRadar) and familiarity with creating and managing parsers and rule views. Leadership experience, with the ability to mentor and motivate team members effectively. Excellent communication skills, both written and verbal, with the ability to convey complex technical concepts to non-technical stakeholders.

Posted 1 month ago

Apply

2.0 - 5.0 years

3 - 7 Lacs

Mumbai

Work from Office

Advanced Incident Analysis: Utilize advanced tools and techniques to analyze and investigate security incidents detected within the organization's networks and systems. Incident Response: Lead incident response efforts, coordinating with internal and external stakeholders to mitigate and remediate security incidents promptly. Team Leadership: Provide mentorship and guidance to the L1 SOC team, assisting in the development of their skills in incident analysis, parser creation, rule views, and report management. Parser Creation: Develop and maintain parsers to enhance the capability of the SOC's security information and event management (SIEM) system in detecting and correlating security events. Rule View Management: Manage and optimize rule views within the SIEM platform to ensure accurate and timely detection of security threats. Report Management: Oversee the generation and distribution of security reports, including incident reports, trend analysis, and recommendations for improvement. Collaboration: Work closely with other teams within the organization, including IT operations, network engineering, and application development, to improve overall security posture and incident response capabilities.

Posted 1 month ago

Apply

5.0 - 9.0 years

9 - 14 Lacs

Pune, Bengaluru

Work from Office

Assist in defining security Policies Standards and reference Architecture for Network design and deployment related to above technologies. Proactive analysis of Network for secure deployments, secure configurations against Global Security Best Practices. Assisting network design team with security inputs while designing an architecture for new offices/ branches/ data centres etc. for Security by Design. Developing network security standards and guiding network design to meet corporate requirements. Strategize and formulate high and low-level monitoring mechanism for security posture of network deployments and advise measures to improve them. Possess and maintain technical knowledge of aspects of DDoS mitigation, NAC, Internet Proxy, DNS etc. Conducting analysis of network security and Strategize and formulate high and low-level monitoring mechanism for DDoS mitigation, NAC, Internet Proxy, DNS. Taking proactive measures for enhancing the security posture of the Bank's network by studying the vulnerabilities issued/ published by various OEMs, internal and external agencies such as CERTetc. Working with internal and external business stakeholders on ensuring that IT infrastructure meet global network security standards. Produce and track metrics for the effectiveness and maturity of Secure network deployments.

Posted 1 month ago

Apply

5.0 - 9.0 years

9 - 14 Lacs

Bengaluru

Work from Office

Dedicated lead to work with the Happiest Minds Shared SOC team and ITteam to enhance the overall Incident response processes Run any critical incident response along with SOC and IT team Review and update the use caserepository as applicable to Happiest Minds Environment Work on root causeanalysis and remediations for alerts/incidents raised by customers Review andupdate existing automation playbooks Continuous updates of detectiontechniques Periodic threat hunting Use cases to prioritize based on thefindings from the threat and vulnerability management program

Posted 1 month ago

Apply

5.0 - 9.0 years

9 - 14 Lacs

Bengaluru

Work from Office

Implementation and Deployment: - Design and deploy IDS (ARMIS)solutions tailored to OT environments. - Develop comprehensive deploymentarchitectures, ensuring seamless integration with existing systems. - Configure and optimize network andfirewall settings to support IDS deployments. Data Network Security - IDS, Cybersecurity.

Posted 1 month ago

Apply

1.0 - 6.0 years

11 - 15 Lacs

Bengaluru

Work from Office

Cybersecurity, Azure Sentinel SIEM,MS Defender for Endpoints (EDR/ATP),AWS IAM,SOAR Concept, Fortinet FortiSOAR, Palo Alto Networks - Firewalls, Cortex XSOAR, Python We are seeking a Cybersecurity Analyst with 1-6years of experience in fundamental cybersecurity concepts, including SIEM, EDR, IAM, and SOAR platforms The ideal candidate should have a basic understanding of security automation and orchestration using platforms like FortiSOAR, Palo Alto XSOAR, and ThreatConnect (preferred) Experience with SOAR play book creation , integration etc Additionally, knowledge of Python scripting for automation and security tasks will be an added advantage

Posted 1 month ago

Apply

1.0 - 3.0 years

4 - 7 Lacs

Mumbai Suburban

Work from Office

Job Description: We are hiring a passionate and detail-oriented L2 Technical Support Engineer with 13 years of experience in supporting Java Spring Boot-based applications . This role requires hands-on experience in debugging backend services, analyzing logs, and coordinating with development teams to resolve production issues quickly and efficiently. Roles and Responsibilities: Provide Level 2 support for applications developed using Spring Boot and RESTful APIs Investigate issues by analyzing server logs, database queries, and API responses Use Git to fetch specific commits, understand version history, and collaborate with development teams Escalate critical issues to development or DevOps teams as necessary Handle application performance issues, integration failures, and user-reported bugs Use tools like Postman, Cloudwatch , and Linux command-line for investigation Maintain incident logs, RCA documents, and support runbooks Support deployment validation, UAT testing, and production rollout activities Work with stakeholders to ensure timely resolution of issues and updates Participate in on-call support rotation for critical production support Desired Candidate Profile: 1 to 3 years of experience in technical or application support Good understanding of Java, Spring Boot, and REST API concepts Experience with log analysis tools like Cloudwatch, ELK, Splunk, or Graylog Basic knowledge of Linux/Unix systems and scripting Familiarity with SQL databases like MySQL or SQL Server Proficiency with Git for version control and code navigation Strong problem-solving skills and willingness to learn quickly Good communication skills and ability to handle customer interactions professionally Preferred Skills: Experience with cloud platforms (AWS, Azure) Exposure to CI/CD pipelines and containerization (Docker, Kubernetes) Understanding of Microservices architecture Familiarity with monitoring tools (Grafana, Prometheus, New Relic)

Posted 1 month ago

Apply

2.0 - 4.0 years

6 - 9 Lacs

Pune

Work from Office

About Arctera Arctera keeps the world s IT systems working. We can trust that our credit cards will work at the store, that power will be routed to our homes and that factories will produce our medications because those companies themselves trust Arctera. Arctera is behind the scenes making sure that many of the biggest organizations in the world - and many of the smallest too - can face down ransomware attacks, natural disasters, and compliance challenges without missing a beat. We do this through the power of data and our flagship products, Insight, InfoScale and Backup Exec. Illuminating data also helps our customers maintain personal privacy, reduce the environmental impact of data storage, and defend against illegal or immoral use of information. It s a task that continues to get more complex as data volumes surge. Every day, the world produces more data than it ever has before. And global digital transformation - and the arrival of the age of AI - has set the course for a new explosion in data creation. Joining the Arctera team, you ll be part of a group innovating to harness the opportunity of the latest technologies to protect the world s critical infrastructure and to keep all our data safe. Job Title: Info Sec Analyst - Cloud Security Posture Management (CSPM) Location: Pune, India Job Type: Full-time Job Summary: The Cloud Security Operations Analyst will be responsible for monitoring, detecting, and responding to security threats in cloud environments (AWS, Azure, GCP) while managing Cloud Security Posture Management (CSPM) solutions. The role also involves incident response, threat analysis, and remediation of cloud security risks to ensure the organization s cloud security posture aligns with industry best practices and compliance standards. Key Responsibilities: Monitor and manage security alerts from CSPM tools (Crowdstrike CSPM, Zscaler CNAPP, Wiz, Prisma Cloud, etc.). Perform basic cloud security incident investigations and document findings. Support security monitoring and event triage within SOC/SIEM tools (Crowdstrike NextGen SIEM, Splunk, etc.). Assist in reviewing misconfigurations in cloud services and recommend remediation steps. Maintain documentation for cloud security policies and playbooks. Lead investigations of cloud security incidents and misconfigurations, including forensic analysis and threat intelligence correlation. Manage and fine-tune CSPM tools to reduce false positives and improve cloud security hygiene. Work closely with SOC teams to analyze and mitigate cloud-based threats, including IAM misconfigurations, API security, and data exposure risks. Provide security recommendations and remediation guidance to DevOps and Engineering teams. Assist in compliance initiatives (CIS, NIST, PCI-DSS) and cloud security audits. Lead incident post-mortems, identifying gaps and improving cloud security processes. Stay ahead of emerging cloud threats, vulnerabilities, and attack vectors to proactively strengthen the cloud security posture. Required Skills & Qualifications: 2-4 years of experience in cloud security, SOC operations, or cybersecurity. Basic understanding of cloud platforms (AWS, Azure, GCP) and their security controls. Knowledge of SIEM tools and log analysis for security events. Good experience with CSPM tools (such as CrowdStrike CSPM, or Zscaler CNAPP, or Wiz, or cloud-native security solutions). Basic understanding of SIEM integrations with cloud environments and log analysis techniques. Proficiency in threat intelligence, attack techniques (MITRE ATT&CK), and incident response methodologies. Experience in scripting and automation for security tasks. Certifications like AWS Security Specialty, AZ-500, or Security+ are a plus.

Posted 1 month ago

Apply

2.0 - 7.0 years

3 - 8 Lacs

Hyderabad

Work from Office

Candidate will be responsible for test execution of LTE protocol and performance, Should be having good analysis skills with a sound understanding of LTE Concepts. Responsibilities include test execution- with failure root cause analysis System acquisition, LTE Protocol testing. Understanding of LTE/5G/4G end-to-end flows Working experience on UEs and/or RAN side. Good understanding of L1/L2/L3 protocols on the Air interface Tools and Analytical Skills Log Analysis Experience Working experience with end-to-end setups Scripting experience on Keysight/Anite/Anritsu/R&S tools.

Posted 1 month ago

Apply

3.0 - 5.0 years

4 - 6 Lacs

Noida, New Delhi, Gurugram

Work from Office

Incident handling, forensic analysis, and VAPT SIEM tools cybersecurity frameworks Log analysis, monitoring, detecting and investigating security incidents and breaches. CEH,CSA,CompTIA Security+,GCIH,security incidents

Posted 1 month ago

Apply

1.0 - 3.0 years

3 - 4 Lacs

Kochi, Ernakulam

Work from Office

As an L1 Threat Hunter, you will work closely with SOC analysts and incident responders to identify, analyze, and escalate suspicious activity using a variety of tools and threat intelligence sources.

Posted 1 month ago

Apply

4.0 - 9.0 years

20 - 30 Lacs

Chennai

Remote

We are looking for a skilled TechOps Lead to manage and maintain our OTT platforms technical Operation. The ideal candidate will have experience in Application Support, Content Delivery Networks, Logging & Triaging, and Cloud-based technologie s. You will be responsible for ensuring high availability, scalability, and performance of our platform. You will be responsible for triaging issues and finding issues using trend analysis. Role & Responsibilities: Must be aware of end to end incident handling. Monitor, identify, and respond to incidents promptly to minimize business impact. Prioritize, classify, and escalate incidents based on severity and urgency. Coordinate and facilitate communication between stakeholders during incidents. Perform root cause analysis and implement preventive measures. Document incidents, resolutions, and generate performance reports. Provide Technical support by handling and consulting on BAU, Incidents for respective applications. Act as an escalation point for user issues and requests and from L1/L2 support. Report issues to senior management. Define, document, and maintain SLAs, technical documentation, and knowledge bases to support platform. Monitor application performance, identifying areas for improvement. Build and maintain effective and productive relationships with stakeholders in business, development, product, and third-party system providers. Facilitate coordination across L1/L2 and L3/engineering Teams to investigate and resolve ongoing platform or application issues impacting business. Candidate will have to work in shifts as part of Rota covering 24*7. In event of major outage or issues we may ask for flexibility to help provide appropriate cover. Weekend on-call coverage needs to be provided on rotational/need basis. Understand reliability metrics and enhance automation solutions for auto-healing and incident resolution. Understand and improve applications and plan for faster MTTD, MTTR, and auto healing Preferred candidate profile: 4 to 7 years in Application Support/SRE or a related field. Should have experience with any API monitoring tool (Experience with Datadog and Cora Logix is ideal) Knowledge of CDNs ( Akamai, Cloudflare etc.) and cloud-based technologies ( AWS,GCP, etc.) Comfortable with large scale production systems, configurations management, load balancing & distributed systems. Must be strong in backend development (80%) with some frontend experience (20% ) Experience with troubleshooting tools and techniques for FE,BE, API etc. Familiar with job scheduling tools: cron and experience with application monitoring tools. Knowledge of web services ( SOAP based and RESTful Web services ) Prior experience in L2/L3 support. Well versed with anyone of the Scripting language ( Shell, Python etc. ) Strong Problem-Solving Skills and attention to detail Should you be interested please share the updated copy of resume on Jyotsana.bisht@cloud-Kinetics.com

Posted 1 month ago

Apply

7.0 - 15.0 years

9 - 17 Lacs

Bengaluru

Work from Office

Required Skills Technology | Sentinel SIEM Tool Expert | Level 3 Support Technology | Securonix SIEM Tools Expert | Level 3 Support Technology | ArcSight SIEM Tools Administrator | Level 2 Support Technology | Cybersecurity General Administrator | Level 2 Support Technology | Network Traffic Analysis Administrator | Level 2 Support Education Qualification : Engineer - B.E / B.Tech / MCA Certification Mandatory / Desirable : Technology | CompTIA Security+/Certified SOC Analyst (CSA)/GIAC Security Essentials (GSEC)/Certified Ethical Hacker (CEH)/Cisco Certified CyberOps Associate/GIAC Certified Incident Handler (GCIH)/GIAC Security Operations Certified (GSOC) Delivery Skills required are: - Technical Expertise: - *Expert knowledge of threat detection techniques and tools. *Leading incident response efforts, including advanced techniques for containment, eradication, and recovery. *Conducting in-depth digital forensics investigations. *Expertise in configuring and optimizing SIEM (Security Information and Event Management) systems. Analytical Skills: - *Deep understanding of log analysis techniques and tools. *Identifying patterns and anomalies in large datasets. *Integrating threat intelligence into monitoring and response processes. *Staying updated on the latest threat intelligence and applying it to enhance security. Collaboration and Coordination: - *Working closely with other IT and security teams to ensure comprehensive security coverage. *Leading the coordination of response efforts during major incidents. *Ensuring effective communication and collaboration among all stakeholders. *Coordinating with external partners and vendors for specialized support. Continuous Improvement: - *Continuously evaluating and improving security processes and procedures. *Implementing lessons learned from incidents to enhance the overall security posture. *Contributing to the development and updating of security policies and procedures.

Posted 1 month ago

Apply

6.0 - 9.0 years

5 - 11 Lacs

Hyderabad, Chennai

Hybrid

Hiring for SOC Analyst in one of our Top Banking company @ Chennai & Hyderabad location Job Title: SOC Analyst Experience : 6 - 9 Years Department: Cybersecurity / Information Security Location: Chennai & Hyderabad Employment Type: Hybrid Mode - 3 days WFO and 2 days WFH . Job Summary: We are seeking a skilled and detail-oriented Security Operations Center (SOC) Analyst to join our cybersecurity team. The SOC Analyst will be responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents using a variety of tools and techniques. This role is critical to maintaining and improving our organization's security posture by ensuring real-time threat detection and incident response. Key Responsibilities: Monitor security alerts and events from SIEM tools (e.g., Splunk, QRadar, Microsoft Sentinel). Analyze and triage events to determine impact and severity. Investigate security incidents and provide incident reports with detailed analysis. Escalate validated threats and vulnerabilities to the appropriate teams and assist in mitigation efforts. Coordinate with IT teams to ensure containment, eradication, and recovery actions are taken for confirmed incidents. Perform threat intelligence analysis to support proactive detection and defense. Document incident handling procedures and maintain an incident knowledge base. Participate in continuous improvement of SOC operations, including playbooks and automation. Stay current on the latest cybersecurity trends, threats, and tools. Required Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field; or equivalent work experience. 13 years of experience in a SOC or information security role. Experience with SIEM platforms, IDS/IPS, firewalls, and endpoint protection tools. Understanding of TCP/IP, DNS, HTTP, VPN, and network protocols. Knowledge of common threat vectors, MITRE ATT&CK framework, and kill chain. Strong analytical and problem-solving skills. Excellent communication skills and ability to work under pressure. Preferred Qualifications: Certifications such as CompTIA Security+, CEH, GCIA, GCIH, or Splunk Certified Analyst. Experience with scripting (e.g., Python, PowerShell) for automation. Familiarity with cloud security monitoring (e.g., AWS GuardDuty, Azure Defender). Exposure to incident response frameworks and forensic tools. Work Schedule: [24x7 shift-based / Regular business hours / On-call rotation as applicable]

Posted 1 month ago

Apply

0.0 - 5.0 years

5 - 9 Lacs

Pune

Work from Office

Responsibilities: Monitor systems, respond to incidents. Collaborate with teams on threat management strategies. Manage access control & encryption. Maintain compliance standards. Conduct regular security assessments. Office cab/shuttle Food allowance Health insurance Provident fund

Posted 1 month ago

Apply

4.0 - 6.0 years

6 - 10 Lacs

Bengaluru

Work from Office

Understanding of network defence principles, common attack vectors, and attacker techniques. Technical baseline skills and the ability to acquire in-depth knowledge of network and host security technologies Basic Linux/Windows OS knowledge, firewall rules and policy fundamentals. Excellent analytical and problem-solving skills. Strong work ethic and commitment to accomplish assigned tasks with a sense of urgency. Windows, Linux, Network Security, Phishing, Splunk, Malware

Posted 1 month ago

Apply

1.0 - 3.0 years

5 - 10 Lacs

Gurugram

Work from Office

Title: Security Analyst (SOC & EDR) Location: Gurgaon, India Type: Hybrid (work from office) Job Description Who We Are: Fareportal is a travel technology company powering a next-generation travel concierge service. Utilizing its innovative technology and company owned and operated global contact centers, Fareportal has built strong industry partnerships providing customers access to over 600 airlines, a million lodgings, and hundreds of car rental companies around the globe. With a portfolio of consumer travel brands including CheapOair and OneTravel, Fareportal enables consumers to book-online, on mobile apps for iOS and Android, by phone, or live chat. Fareportal provides its airline partners with access to a broad customer base that books high-yielding international travel and add-on ancillaries. Fareportal is one of the leading sellers of airline tickets in the United States. We are a progressive company that leverages technology and expertise to deliver optimal solutions for our suppliers, customers, and partners. FAREPORTAL HIGHLIGHTS: Fareportal is the number 1 privately held online travel company in flight volume. Fareportal partners with over 600 airlines, 1 million lodgings, and hundreds of car rental companies worldwide. 2019 annual sales exceeded $5 billion. Fareportal sees over 150 million unique visitors annually to our desktop and mobile sites. Fareportal, with its global workforce of over 2,600 employees, is strategically positioned with 9 offices in 6 countries and headquartered in New York City. Job Overview We are seeking a proactive and knowledgeable Security Analyst to join our Information Security Operations (SecOps) team . This role will focus on SOC monitoring and Endpoint Detection and Response (EDR) using SentinelOne . The ideal candidate should have solid experience in threat monitoring, incident response, and SentinelOne tool handling. Key Responsibilities: Monitor and respond to SOC alerts and security incidents in real time. Analyze logs and alerts from SIEM and SentinelOne EDR platforms. Perform incident triage , escalation, and coordination with internal teams. Troubleshoot SentinelOne-related issues , including error resolution, agent communication, and performance problems. Understand and manage SentinelOne policies , ensure proper deployment, and make necessary adjustments for better coverage. Quickly identify the root cause of issues related to endpoint protection and take corrective actions. Coordinate with the IT team for issue resolution and endpoint remediation. Collaborate with teams to reduce false positives and improve alert accuracy. Maintain incident documentation , reports, and operational dashboards. Support in threat hunting , vulnerability detection, and other BAU (Business As Usual) security tasks. Required Skills & Qualification: Bachelors/Masters Degree in Computer Science, Information Systems, Engineering. 24 years of experience in SOC operations and endpoint security monitoring. Hands-on experience with SentinelOne EDR , including troubleshooting and policy management. Good knowledge of cybersecurity threats, incident response processes, and log analysis. Ability to investigate and resolve SentinelOne alerts and agent-related errors effectively. Experience working with SIEM tools (like Splunk, Qradar, etc.). Strong understanding of false positive tuning and threat detection improvement. Basic scripting knowledge (PowerShell, Python) is a plus. Good communication and analytical skills. Preferred Skills & Qualifications: CEH , CompTIA Security+ , or any other relevant security certification. Disclaimer This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Fareportal reserves the right to change the job duties, responsibilities, expectations or requirements posted here at any time at the Companys sole discretion, with or without notice.

Posted 1 month ago

Apply

2.0 - 5.0 years

1 - 4 Lacs

Hyderabad

Work from Office

Client Server Tech is looking for System Security / Engineer to join our dynamic team and embark on a rewarding career journey. Develop and implement system security strategies and solutions. Monitor and analyze security incidents and threats. Conduct incident response and investigation. Collaborate with cross-functional teams on security projects. Ensure compliance with security standards and regulations. Provide training and support on security best practices.

Posted 2 months ago

Apply

0.0 - 5.0 years

3 - 7 Lacs

Pune

Work from Office

Collaborate with cross-functional teams to identify and solve complex technical problems. Follow Agile methodologies (Scrum or Kanban) for project development. Stay updated with the latest technologies and industry trends. Your Key Responsibilities Develop and maintain Java applications using Core Java, Spring framework, JDBC, and threading. Implement multi-threaded, concurrent applications. Debug and troubleshoot applications through log analysis. Implement and manage data storage using relational and NoSQL databases. Use cloud platforms (Azure/GCP) and DevOps practices. Containerize applications using Docker and Kubernetes. Efficiently manage large-scale data processing tasks. Ensure seamless integration and communication between application components. Your skills and experience that will help you excel Proficiency in Core Java 17, threading, and concurrent programming. Expertise with Spring framework and JDBC. Hands-on experience with relational and NoSQL databases. Familiarity with cloud platforms (Azure/GCP). Experience with containerization (Docker/Kubernetes). Strong analytical, problem-solving, and debugging skills. Excellent communication, teamwork, and collaboration abilities. Nice-to-have: DevOps experience. About MSCI What we offer you Transparent compensation schemes and comprehensive employee benefits, tailored to your location, ensuring your financial security, health, and overall wellbeing. Flexible working arrangements, advanced technology, and collaborative workspaces. A culture of high performance and innovation where we experiment with new ideas and take responsibility for achieving results. A global network of talented colleagues, who inspire, support, and share their expertise to innovate and deliver for our clients. Global Orientation program to kickstart your journey, followed by access to our Learning@MSCI platform, LinkedIn Learning Pro and tailored learning opportunities for ongoing skills development. Multi-directional career paths that offer professional growth and development through new challenges, internal mobility and expanded roles. We actively nurture an environment that builds a sense of inclusion belonging and connection, including eight Employee Resource Groups. All Abilities, Asian Support Network, Black Leadership Network, Climate Action Network, Hola! MSCI, Pride & Allies, Women in Tech, and Women s Leadership Forum. . . To all recruitment agencies . Note on recruitment scams

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies