Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
4.0 - 8.0 years
0 Lacs
haryana
On-site
You should have strong knowledge and expertise in MS Sentinel SIEM engineering and administrative activities. Operational profiles are not eligible for this position. Your experience in the SIEM engineering role should be more than 4 years, and you must possess problem-solving and people management skills. Your responsibilities will include building custom analytical rules, tuning them, creating automation through Azure logic apps, managing the entire product feature, and configuring end-to-end solutions. Proficiency in forming KQL queries and functions for complex detection and monitoring requirements is essential. You should have in-depth knowledge of the MITRE attack framework and be skilled in developing analytical rules and custom dashboards/workbooks across the framework. Additionally, expertise in log management, retentions, maintenance of logs, access management, and development of custom dashboards based on varied requirements is required. You must have a proven track record of implementing Sentinel advanced features, efficient log collection mechanisms, deployment and maintenance of log forwarders, and local agents. Integrating data sources that are not supported by Sentinel tool OOB, custom parser development, and resolving technical issues in Sentinel are crucial requirements. Ability to prepare and maintain policy and procedure documentations related to SIEM technology, as well as proficiency in handling content from the content hub and log analytics workspace, are essential. Participation in customer or client reviews, global certifications regarding security controls in SIEM, and understanding compliance and regulatory requirements are desirable. Candidates who have completed Sentinel Ninja Level 400 Training and Certification will be preferred. Knowledge of Microsoft Sentinel pricing, Microsoft defender products, Microsoft Cloud services, and Azure Arc is beneficial. Collaboration with stakeholders to address technical issues and support complex business, security, and operational requirements is expected. Furthermore, you should be able to work with vendor technical support groups to resolve issues effectively. Hands-on experience in Microsoft Defender XDR stack will be an added advantage. About Virtusa: Virtusa values teamwork, quality of life, and professional and personal development. You will be joining a global team of 30,000 individuals who care about your growth and offer exciting projects, opportunities, and exposure to state-of-the-art technologies throughout your career with us. At Virtusa, collaboration and a team-oriented environment are highly regarded. We provide a dynamic space for great minds to nurture new ideas and strive for excellence.,
Posted 3 days ago
2.0 - 6.0 years
0 Lacs
punjab
On-site
You have a strong development background in Microsoft Technologies, with a primary focus on ASP.NET, MVC, JavaScript, and JQuery. Your ability to work on existing products and implement suitable changes for feature development is essential. You have hands-on experience with Docker and SQL Server. Your experience includes handling XML, JSON, and HTML efficiently. You are familiar with various architecture styles and APIs such as REST and RPC. You excel in debugging issues, troubleshooting, and resolving them effectively. It would be a plus if you have prior exposure to JavaScript frameworks like Angular, Vue, Bootstrap, Node, or React. Overall, you have at least 2+ years of experience in the industry. As an individual, you are independent and require minimal daily guidance. Any previous experience in Redis Caching, log management, and performance management will be advantageous for this role.,
Posted 3 days ago
3.0 - 8.0 years
22 - 25 Lacs
Mumbai
Work from Office
Essential Services : Role & Location fungibility At ICICI Bank, we believe in serving our customers beyond our role definition, product boundaries, and domain limitations through our philosophy of customer 360-degree. In essence, this captures our belief in serving the entire banking needs of our customers as One Bank, One Team. To achieve this, employees at ICICI Bank are expected to be role and loc ation-fungible with the understanding that Banking is an essential service .The role descriptions give you an overview of the responsibilities, it is only directional and guiding in nature. About the role We are looking for a skilled professional to join our Information Security Team as an Infrastructure Cloud Risk Assessment Manager. The candidate is expected to have a solid understanding and experience of major cloud-native architectures, expertise in identity and access management, familiarity with various data encryption methods, and knowledge of cloud compliance regulations. Key Responsibilities Identifying Vulnerabilities: Understanding of cloud architecture review, and virtualization. Conduct cloud security assessments, across but not limited to the following domains: * Network and Perimeter Security *Data Protection and Backup Management * Identity and Access Management * Log Management and Monitoring Analysis Identify and analyse the risks associated. Provide recommendations for the identified findings and develop the road-map. Implement Security Measures Develop and implement robust security measures for cloud environments, ensuring the confidentiality, integrity, and availability of data. Contribute in creating and enforcing security policies, procedures, and best practices across the organization. Reporting Contribute in creating and enforcing security policies, procedures, and best practices across the organization. Collaborate Work closely with cross-functional teams to integrate security controls seamlessly into cloud-based architectures and applications. Collaborate with other IT professionals, including network engineers, developers, and system administrators, to integrate cloud security measures into existing systems and processes. Qualifications & Skills Educational Qualification: Engineering Graduate in CS, IT, EC or InfoSec, CyberSec or MCA equivalent. Certifications Relevant certifications such as CISSP, CISM, AWS Certified Security, etc. Compliance Assist in securing the IT landscape/ecosystem built on-premises and multi-cloud environment. As an enterprise Network Security architect in the security domain crafted to ensure availability, reliability, security and performance and resilient architecture to address customers/client business challenges and accelerate technology adoption to improve the product services. AWS/Azure cloud security architecture, design, operations and service orchestration, including application security, architectural concepts, compliance requirements, data security, design requirements, infrastructure security, legal requirements, process and platform. Technical Skills Proficient in cloud security assessment, across all the deployment and service models IaaS, PaaS, SaaS. Experience with the cloud-native services across major cloud service providers (AWS, GCP, Azure, OCI). Control on security by design principle of applications hosted in public cloud (Azure, AWS, GCP, OCI). Technical understanding on zero-trust architecture and micro segmentation. Hands-on experience with SIEM (Security Information and Event Management) tools to proactively monitor, analyse, and respond to security incidents. Communication skills Outstanding communication abilities. Ability to effectively communicate the required recommendations. About the Business Group ICICI Banks Information Security Group believes in providing services to its customers in the safest and secure manner keeping in mind that data protection for its customers is as important as providing quality banking services across the spectrum. The CIA triad of Confidentiality, Integrity, and Availability is at the heart of building a comprehensive information security framework. The Bank also lays emphasis on customer elements like protection from phishing, adaptive authentication, awareness initiatives, and provide easy to use protection and risk configuration ability in the hands of customers. The Bank also undertakes campaigns to create awareness among customers on security aspects while banking through digital channels.
Posted 3 days ago
1.0 - 4.0 years
4 - 8 Lacs
Bengaluru
Work from Office
Jobs 03/18/2020 Carmatec is looking for passionate DevOps Engineers to be a part of our InstaCarma team Not only will you have the chance to make your mark as an established DevOps Engineer, but you will also get to work and interact with seasoned professionals deeply committed to revolutionize the Cloud scenario, Job Responsibilities Work on Infrastructure provisioning/configuration management too ls We use Packer, Terraform and Chef, Develop automation tools/scripts We use Bash/Python/Ruby Responsible for Continuous integration and artefact management We use Jenkins and Artifactory Setup automated deployment pipelines for microservices running as Docker containers, Setup monitoring, alerting and metrics scraping for java/scala/play applications using Prometheus and Graylog2 integrated with PagerDuty and Hipchat for alerting,reporting and monitoring, Will be doing on-call Production support an d related Incident Management, reporting & Postmortem, Create runbooks, wikis for incidents, troubleshooting performed etc Be a proactive member of your team by sharing knowledge, Resource scheduling,orchestration using Mesos/Marathon Work closely with development teams to ensure that platforms are designed with operability in mind Function well in a fast-paced, rapidly changing environment, Required Skills A basic understanding of DevOps tools and automation framework Outstanding organization, documentation, and communication skills, Must be skilled in Linux System Administration (Ubuntu/Centos) Knowledge of AWS is a must (EC2, EBS, S3, Route53, Cloudfront, SG, IAM, RDS etc) Strong foundation in Docker internals and troubleshooting, Should know at least one configuration management tool Chef/Ansible/Puppet Good to have experience at least in one scripting language Bash/Python/Ruby Experience is an atleast one NoSQL Database Systems is a plus Elasticsearch / Mongodb / Redis / Cassandra Experience in a CI tool like Jenkins is preferred, Good understanding of how a 3-tier architecture works, Basic knowledge in any revision control tools like Git/Subversion etc Should have experience working with monitoring tools like Nagios, Newrelic etc Should be proficient in log management using tools like rsyslog, logstash etc Working knowledge of the following items cron, haproxy/nginx, lvm, MySql, BIND (DN S), iptables, Experience in Atlassian Tools Jira, Hipchat,Confluence will be a plus, Experience: 5+ years Location: Bangalore If the above description is of your interest, please revert to us with your updated resume to teamhr@carmatec Apply now Apply now Show
Posted 4 days ago
2.0 - 6.0 years
0 Lacs
kolkata, west bengal
On-site
As a DevOps Engineer with AWS certification, you will be responsible for implementing, maintaining, monitoring, and supporting the IT infrastructure. Your role will involve developing custom scripts to support Continuous Integration & Deployment processes and integrating various tools for automation based on target architecture. You will create packaging, deployment documentation, and scripts for production builds and assist agile development teams with builds and releases. Your key responsibilities will include implementing release automation solutions, branching & merging strategies, and providing guidance to the team on build & deployment automation issues. You will design and implement release orchestration solutions for medium or large-sized projects, ensuring efficient and effective deployment processes. To be successful in this role, you must have a minimum of 2 years of experience with AWS, a background in Linux/Unix Administration, and proficiency in using a variety of Open-Source Tools. Hands-on experience with AWS services like RDS, EC2, ELB, EBS, S3, SQS, Code Deploy, and Cloud Watch is essential. Strong skills in managing SQL and MySQL databases, as well as experience with Web Servers like Apache, Nginx, Lighttpd, and Tomcat, will be valued. You should be proficient in docker & Kubernetes deployment scripts, GIT, Jenkins, and cluster setup. Experience in environment setup, connectivity, support levels, system security compliance, and data security is required. Additionally, you should have expertise in application and infrastructure planning, testing, development, centralized configuration management, log management, and dashboards to ensure smooth operations. If you are a proactive and skilled DevOps Engineer with a passion for automation and infrastructure management, and meet the above requirements, we invite you to join our team in Kolkata for this full-time on-site position.,
Posted 1 week ago
2.0 - 3.0 years
5 - 5 Lacs
Thiruvananthapuram
Work from Office
Overview: We are looking for a skilled SIEM Administrator to manage and maintain Security Information and Event Management (SIEM) solutions such as Innspark , LogRhythm , or similar tools. This role is critical to ensuring effective security monitoring, log management, and event analysis across our systems. Key Responsibilities: Design, deploy, and manage SIEM tools (e.g., Innspark, LogRhythm, Splunk). Develop and maintain correlation rules, s, dashboards, and reports. Integrate logs from servers, network devices, cloud services, and applications. Troubleshoot log collection, parsing, normalization, and event correlation issues. Work with security teams to improve detection and response capabilities. Ensure SIEM configurations align with compliance and audit requirements. Perform routine SIEM maintenance (e.g., patching, upgrades, health checks). Create and maintain documentation for implementation, architecture, and operations. Participate in evaluating and testing new SIEM tools and features. Support incident response by providing relevant event data and insights. Required Qualifications: Bachelor's degree in Computer Science, Information Security, or related field. 3+ years of hands-on experience with SIEM tools. Experience with Innspark, LogRhythm, or other SIEM platforms (e.g., Splunk, QRadar, ArcSight). Strong knowledge of log management and event normalization. Good understanding of cybersecurity concepts and incident response. Familiarity with Windows/Linux OS and network protocols. Scripting knowledge (e.g., Python, PowerShell) is a plus. Strong troubleshooting, analytical, and communication skills. Industry certifications (CEH, Security+, SSCP, or vendor-specific) are a plus. Key Skills: SIEM Tools (Innspark, LogRhythm, Splunk) Troubleshooting Log Management & Analysis Scripting (optional) Security Monitoring Skills Siem,Splunk,Troubleshooting Required Skills Siem,Splunk,Troubleshooting
Posted 1 week ago
2.0 - 3.0 years
5 - 5 Lacs
Thiruvananthapuram
Work from Office
Overview: We are looking for a skilled SIEM Administrator to manage and maintain Security Information and Event Management (SIEM) solutions such as Innspark , LogRhythm , or similar tools. This role is critical to ensuring effective security monitoring, log management, and event analysis across our systems. Key Responsibilities: Design, deploy, and manage SIEM tools (e.g., Innspark, LogRhythm, Splunk). Develop and maintain correlation rules, s, dashboards, and reports. Integrate logs from servers, network devices, cloud services, and applications. Troubleshoot log collection, parsing, normalization, and event correlation issues. Work with security teams to improve detection and response capabilities. Ensure SIEM configurations align with compliance and audit requirements. Perform routine SIEM maintenance (e.g., patching, upgrades, health checks). Create and maintain documentation for implementation, architecture, and operations. Participate in evaluating and testing new SIEM tools and features. Support incident response by providing relevant event data and insights. Required Qualifications: Bachelor's degree in Computer Science, Information Security, or related field. 3+ years of hands-on experience with SIEM tools. Experience with Innspark, LogRhythm, or other SIEM platforms (e.g., Splunk, QRadar, ArcSight). Strong knowledge of log management and event normalization. Good understanding of cybersecurity concepts and incident response. Familiarity with Windows/Linux OS and network protocols. Scripting knowledge (e.g., Python, PowerShell) is a plus. Strong troubleshooting, analytical, and communication skills. Industry certifications (CEH, Security+, SSCP, or vendor-specific) are a plus. Key Skills: SIEM Tools (Innspark, LogRhythm, Splunk) Troubleshooting Log Management & Analysis Scripting (optional) Security Monitoring Skills Siem,Splunk,Troubleshooting Required Skills Siem,Splunk,Troubleshooting
Posted 1 week ago
5.0 - 10.0 years
6 - 10 Lacs
Gurugram
Work from Office
Role Description : As a Senior Cloud Security Specialist at Incedo, you will be responsible for designing and implementing security solutions for cloud-based environments. You will work with clients to understand their security needs and design security solutions that meet those needs. You will be skilled in cloud security technologies such as Amazon Web Services (AWS) Security, Microsoft Azure Security, or Google Cloud Platform (GCP) Security and have experience with security architecture design patterns such as multi-factor authentication and encryption. Roles & Responsibilities: Good-to-Have Skills (Mandatory) 1. Cloud access provisioning & automation 2. Log management, SQL, dashboards, reporting 3. Security architecture review & recommendations 4. Database programming/administration 5. Experience with security process documentation 6. Ability to act as a security SME. Technical Skills : Must-Have Skills 1. 5+ years in public cloud (AWS, Azure) 2. Strong cloud and network security knowledge 3. Experience with security tools (vulnerability scanners, IDS/IPS, firewalls, endpoint protection) 4. CI/CD and automated security testing 5. Proficient in scripting/programming (Python, Bash) 6. Experience with Unix/Linux and networking 7. Strong collaboration and communication skills Qualifications 4-6 years of work experience in relevant field B.Tech/B.E/M.Tech or MCA degree from a reputed university. Computer science background is preferred
Posted 1 week ago
9.0 - 12.0 years
5 - 5 Lacs
Hyderabad
Work from Office
Role Proficiency: Manage a team of Threat Intelligence analysts who oversee delivering the hands-on service to customers and and act as an incident manager with highly technical skills during escalated cyber incidents. Responsible for developing the service to meet market standards. Develop forensic methodologies and dictate the threat hunting methodology to align with the changing cyber landscape and lead the forensic and proactive hunting disciplines into the most advanced techniques in the market. Develop the analysts' technical skills. Effectively communicate with stakeholder. Study the market and help expand the TI service. Outcomes: Stay on top of cyber security news from the clear deep and dark web daily. Pay attention to industry news security threats outside of their network and the intentions of potentially threatening entities. Mentor the team on best practice workflows and procedures to achieve their full potential and to increase level of security posture of customers. Solve complex forensics and hunting issues being escalated by team members and be the highest escalation point for all Operations teams. Define processes and workflows to optimize the work of the CTI analysts. Ensure documentation included in ThreatConnect/ CDC as predefined / agreed standards. Learn from review process for continuous improvement. Communicate and report appropriately as per defined process. Improve and automate response and hunting processes to increase efficiency of the services. Engage with sales teams to drive potential customers to purchase the services and increase CyberProof's margin goals Constantly strive to upgrade team workflows. Measures of Outcomes: CTI weekly recommendations tuning the hunting query etc. Number of threat intelligence finished reports including threat landscape and asset-based intelligence delivered by the analysts Customer satisfaction - upsells new customers customer engagement. Evidence of skill development including training certification etc. Ideas suggested that will help innovation and optimization of processes. Increased productivity and efficiency of the service by focusing on automating activities. Outputs Expected: Collection: Working with OSINT sources. Using WEBINT techniques to collect and enrich intelligence data. Develop and maintain deep web sources. Processing and analysis: Analyse the threat data into a finished report including technical recommendations MITRE ATT&CK mapping and valid IOCs. Complete documentation including annotation in ThreatConnect / CDC to ensure audit trail as per defined standards and quality requirements. In accordance with the defined process ensure that the defined reports are created and published to stakeholders. Continuous Learning innovation and optimization Ensure completion of analysts learning programs. Innovate new processes and workflows to deploy proactivity in all aspects to address complex threats and risks. Communicate with stakeholder: Effectively communicate with customers to deliver timely and accurate Threat Intelligence. Communicate with other teams to collaborate in the development of the Threat Intelligence service and the other offerings of the company. Present finished intelligence to team members management and clients. Learning and Development: Continuously learn new technologies and stay updated on cyber threats. Create innovative research reports (global trends cross clients collaboration with other teams in the company). Develop the analysts' technical skills Sales and service development: Understand the sales cycle and contribute to increase sales. Understand product development and influence on its design. Assist with Marketing efforts to showcase our Intelligence and research Actively help develop new services Skill Examples: User level skills in use of CDC ThreatConnect Sixgill IntSights VT Premium. Ability to manage incidents and collaborating several team activities in parallel streams to handle incident holistically. Excellent logical problem-solving ability and analytical skills for intelligence processing and analysis. Good time management skills Great oral and written communication skills. Presentation skills Sales skills to increase the uptake of services Designing skills for product development Programming languages such as Python and PowerShell Data analytics tools - SQL BI reports Knowledge Examples: Knowledge Examples Understanding of cybersecurity threat landscape and a deep understanding of computer intrusion activities incident response techniques tools and procedures. Understanding of enterprise IT Infrastructure including Networks OS Databases Web Applications etc. Deep and proven knowledge in baseline operating system internals network communications and user behavior. Thorough knowledge of digital forensics methodology as well as security architecture system administration and networking (including TCP/IP DNS HTTP SMTP) Experience conducting research in the areas of WEBINT OSINT social media platforms and virtual HUMINT. Experience with security assessment tools such as NMAP Netcat Nessus and Metasploit is a plus. Desirable - Training / Certification in Ethical Hacking etc. Additional Comments: Requirements: To be successful in this role, you should meet the following requirements: - 5+ years of technical experience in IT or IT Security, for example as a network or operating system administrator. - Expert level knowledge and demonstrated experience of common log management suites, Security Information and Event Management (SIEM), EDR, Email Protection, Case Management & other cyber security tools. - Expert level knowledge and demonstrated experience of common cybersecurity technologies such as IDS / IPS / HIPS, Advanced Anti-malware prevention and analysis, Firewalls, Proxies, MSS, etc. - Good knowledge and technical experience of 3rd party cloud computing platforms such as AWS, Azure, and Google. - Good knowledge and demonstrated experience of common operating systems and platforms to include Windows, Linux, UNIX, Oracle, Citrix, GSX Server, iOS, OSX, etc. - Good knowledge of common network protocols such as TCP, UDP, DNS, DHCP, IPSEC, HTTP, etc. and network protocol analysis suits. - Functional knowledge of scripting, programming and/or development of bespoke tooling or solutions to solve unique problems. - Good knowledge of key information risk management and security related standards including OWASP, ISO2700x series, PCI DSS, GLBA, EU data security and privacy acts, FFIEC guidelines and NIST standards - Good knowledge and demonstrated experience in incident response tools, techniques and process for effective threat containment, mitigation, and remediation. - Formal education and advanced degree in Computer Science or similar and/or commensurate demonstrated work experience in the same. - CEH, EnCE, SANS GSEC, GCIH, GCIA CISSP or any similar Certifications. Required Skills Cyber Security,Anti Malware,Firewall,Proxies
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
noida, uttar pradesh
On-site
NTT DATA is seeking an Identity and Access Management-Cisco -TECH SOLNS. ARCH. SR. SPECIALIST ADVISOR to join the team in Noida, Uttar Pradesh, India. As a candidate for this role, you are expected to have experience in core areas such as Authentication, Authorization, and Accounting, NAC (Network Access Control), and troubleshooting. The ideal candidate will have a strong background in the administration, upkeep, and upgrade of Cisco ISE solutions, along with a deep understanding of network security concepts, Authentication, Authorization, and Accounting protocols, endpoint profiling, posture assessments, BYOD, Guest, pxGrid, DNAC integration with ISE, and network access control (NAC) technologies. Responsibilities: Design and Implementation: Collaborate with infra and security teams to design, implement, and customize Cisco ISE solutions, integrating third-party solutions to enhance security posture and meet regulatory requirements. AAA Configuration: Review and configure Authentication, Authorization, and Accounting protocols on Cisco ISE for secure network access, ensuring best practices are followed. Endpoint Profiling: Develop and maintain endpoint profiling policies to classify and manage devices based on their characteristics. Network Access Control (NAC): Deploy and manage NAC solutions using Cisco ISE to enforce security policies and ensure compliance. Policy Management: Define and manage access control policies, posture assessments, and identity-based access controls within Cisco ISE. Integration and Collaboration: Collaborate with network, security, and IT teams to integrate Cisco ISE with other security solutions, identity providers, and network infrastructure components. Troubleshooting and Support: Diagnose and resolve complex issues related to Cisco ISE configurations, authentication failures, load balancer, licensing, and network access problems. Documentation and Training: Maintain comprehensive documentation of Cisco ISE configurations, policies, and procedures. Provide training and knowledge transfer to team members. Upgrade and Patch Management: Plan and execute upgrades, patches, and maintenance activities for Cisco ISE deployments to ensure system stability and security. Collaborate with Cisco TAC for issue resolution. Integration and Collaboration: Collaborate with network engineers, security teams, and IT stakeholders to integrate Cisco ISE with other security solutions and network infrastructure components. About NTT DATA: NTT DATA is a trusted global innovator of business and technology services, serving 75% of the Fortune Global 100. With experts in more than 50 countries and a strong partner ecosystem, our services include business and technology consulting, data and artificial intelligence, industry solutions, application development, and more. We are committed to helping clients innovate, optimize, and transform for long-term success. As a part of NTT Group, we invest in R&D to support organizations and society in the digital future. Visit us at us.nttdata.com.,
Posted 2 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Bengaluru
Work from Office
Administering and maintaining Deep security systems to ensure the security of IT Infrastructure Monitoring and analysing security alerts to identify potential threats. Ensure proper integration with existing system Troubleshooting and debugging of Problems related to TrendMicro Deep security manager and agent TrendMicro Deep Security Agent management (Agent Installation, Reconciliation, Troubleshooting etc. Fine-tuning of policies in Deep security features such as FIM, Log Inspection, IPS, Firewall, A Developing and updating security policies and procedures related to Deep security (SOP, SCD, NDA etc.) Anti-malware module etc Log monitoring and incident investigation. Maintaining, generating & analysing all deep security related reports Manager version upgradation and capacity management. Should take up with OEM in case of any Deep security related issue reported Ensuring compliance with industry standards, regulations and best practice Mandatory Skills: Antivirus Microsoft EDR XDR Experience : 5-8 Years.
Posted 2 weeks ago
1.0 - 4.0 years
6 - 7 Lacs
Chandigarh
Work from Office
Job roles and responsibilities: Local server management, deployment, updates, and infrastructure security Ensuring efficient data storage, retrieval, and compliance Database schema design, indexing, and optimization for chatbot data Managing backups, disaster recovery plans, and server health monitoring Support data pipelines, log management, and real-time analytics Ensure integration with chatbot logs, feedback storage, and performance metrics Last Date of Apply: 27th July 2025
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
chennai, tamil nadu
On-site
You are a Splunk Developer with AWS knowledge who can start immediately. This is a contract position with an MNC company based in Chennai. You should have at least 5 years of experience. As a Datadog Monitoring & Application Support Engineer, you will be responsible for ensuring the smooth and reliable operation of critical applications and infrastructure. Leveraging your expertise in Datadog, AWS, and Splunk, you will proactively monitor, troubleshoot, and resolve issues to ensure optimal performance and availability. Your responsibilities will include implementing, maintaining, and enhancing Datadog monitoring dashboards and alerts, analyzing monitoring data for performance bottlenecks, providing support for application-related issues, monitoring and managing AWS resources, configuring and maintaining Splunk indexes, participating in incident response activities, and effectively communicating technical information to both technical and non-technical audiences. To qualify for this role, you must have strong experience with Datadog monitoring and alerting, experience with AWS cloud services such as EC2, and experience with Splunk log management and analysis. It is essential to stay current on the latest technologies and best practices in monitoring, application support, and cloud computing.,
Posted 2 weeks ago
2.0 - 5.0 years
2 - 3 Lacs
Chennai
Work from Office
Role & responsibilities The Centralised CRM Helpdesk Executive will act as the first point of contact for customers across all regions, delivering prompt and personalized assistance. The role involves handling inbound and outbound calls, managing cases, Opportunities and leads through Salesforce, and building customer engagement through lifecycle-based communications. Key Responsibilities: 1. Case Handling and Routing in Salesforce Log customer complaints, queries, and feedback as cases in Salesforce Service Cloud. Ensure accurate routing of cases to relevant departments, stores, or escalation teams. Track and follow up on unresolved cases to ensure timely closures. 2. Lead Management from DTH (Direct-to-Home) Activities Capture and manage leads from doorstep marketing initiatives. Enter leads into Salesforce CRM and assign them to the appropriate store/sales team. Track lead progress and assist in improving conversion rates. 3. Opportunity Follow-Up Monitor and follow up on active opportunities in Salesforce to encourage conversions. Coordinate with the respective sales teams for timely customer engagement and updates. Escalate unresponsive or stagnant opportunities to higher authorities as needed. 4. Birthday and Anniversary Calls Make proactive calls to customers on birthdays and anniversaries as part of the relationship-building campaign. Offer special greetings, exclusive offers, and record customer feedback. Log all interactions in Salesforce. 5. Inbound and Outbound Calls Manage incoming calls from customers for queries, feedback, and product information. Conduct outbound calls for appointment confirmations, follow-ups, promotional campaigns, and satisfaction surveys. Document all call details and customer interactions in Salesforce. Preferred candidate profile Any Graduate with at least 2 to 4 years of experience in customer service or CRM support roles. Familiar with Salesforce (Service Cloud/Sales Cloud) and cloud telephony systems is preferred. Should be multi linguistic - Tamil, Kannada, Telugu, and English
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
haryana
On-site
The Technical Account Managers in our company play a crucial role in meeting customer expectations and assisting them in effectively utilizing their observability and security data. We are seeking dedicated, sharp, and humble professionals with a proven track record of technical customer-facing experience. As a Technical Account Manager, you will serve as a trusted advisor, guiding our customers through their monitoring, security, and observability journey. This role requires a unique blend of high technical expertise and a strong focus on customer satisfaction, renewal, and expansion. Responsibilities: - Address customers" technical challenges by leveraging the platform, integrating new data, and existing integrations. - Gain a deep understanding of customers" technical requirements and business objectives to consistently deliver new artifacts and value. - Lead the onboarding process, from implementing new integrations to providing training and troubleshooting support. - Demonstrate expertise in the Log Management/Observability markets to assist customers with best technical practices. - Develop a tailored game plan for each customer based on data analysis and specific needs. - Cultivate relationships and collaborate with technical counterparts to drive product adoption. - Conduct Quarterly Business Reviews (QBRs) with customers to review delivered value and address their ongoing needs. - Advocate for customer requirements internally and influence the product development roadmap. - Collaborate with the Sales team on renewals, upsells, cross-sells, and expansion opportunities. Requirements: - Background knowledge of DevOps/Cloud/Observability. - Industry expertise and insights on Monitoring, Observability, Log Management, and SIEM. - Hands-on experience in technical integrations and complex troubleshooting. - Previous experience in customer-facing roles with exceptional customer communication skills. - Proficiency in English communication, both written and verbal. - Strong presentation skills to establish credibility with executives. - Hands-on experience in Engineering/DevOps is advantageous. - Proficiency in coding in high-level programming languages like Java, Go, Python is a plus. - BSc degree in Computer Science/Engineering is beneficial. - Experience in SAAS B2B software companies is a bonus. Join our team as a Technical Account Manager and be a key player in delivering exceptional service and value to our customers while driving business growth and success.,
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Data Privacy. Experience: 5-8 Years.
Posted 3 weeks ago
3.0 - 8.0 years
7 - 17 Lacs
Coimbatore
Remote
Role Overview As an AWS DevOps Engineer, youll own the end-to-end infrastructure lifecyclefrom design and provisioning through deployment, monitoring, and optimization. Youll collaborate closely with development teams to implement Infrastructure as Code, build robust CI/CD pipelines, enforce security and compliance guardrails, and integrate next-gen tools like Google Gemini for automated code-quality and security checks. Summary DevOps Engineer with 3+ years of experience in AWS infrastructure, CI/CD, and IaC, capable of designing secure, production-grade systems with zero-downtime deployments. The ideal candidate excels in automation, observability, and compliance within a collaborative engineering environment. Top Preferred Technologies: Terraform – core IaC tool for modular infrastructure design Amazon ECS/EKS (Fargate) – container orchestration and deployment GitHub Actions / AWS CodePipeline + CodeBuild – modern CI/CD pipelines Amazon CloudWatch – observability, custom metrics, and centralized logging IAM, KMS & GuardDuty – for access control, encryption, and threat detection SSM Parameter Store – for secure config and secret management Python / Bash / Node.js – for scripting, automation, and Lambda integration Key Responsibilities Infrastructure as Code (IaC): Design, build, and maintain Terraform (or CloudFormation) modules for VPCs, ECS/EKS clusters, RDS, ElastiCache, S3, IAM, KMS, and networking across multiple Availability Zones. Produce clear architecture diagrams (Mermaid or draw.io) and documentation. CI/CD Pipeline Development: Implement GitHub Actions or AWS CodePipeline/CodeBuild workflows to run linting, unit tests, Terraform validation, Docker builds, and automated deployments (zero-downtime rolling updates) to ECS/EKS. Integrate unit tests (Jest, pytest) and configuration-driven services (SSM Parameter Store). Monitoring & Alerting: Define custom CloudWatch metrics (latency, error rates), create dashboards, and centralize application logs in CloudWatch Logs with structured outputs and PII filtration. Implement CloudWatch Alarms with SNS notifications for key thresholds (CPU, replica lag, 5xx errors). Security & Compliance: Enable and configure GuardDuty and AWS Config rules (e.g., public-CIDR security groups, unencrypted S3 or RDS). Enforce least-privilege IAM policies, key-management with KMS, and secure secret storage in SSM Parameter Store. Innovative Tooling Integration: Integrate Google Gemini (or similar) into the CI pipeline for automated Terraform security scans and generation of actionable “security reports” as PR comments. Documentation & Collaboration: Maintain clear README files, module documentation, and step-by-step deployment guides. Participate in code reviews, design discussions, and post-mortems to continuously improve our DevOps practices. Required Qualifications Experience: 3+ years in AWS DevOps or Site Reliability Engineering roles, designing and operating production-grade cloud infrastructure. Technical Skills: Terraform (preferred) or CloudFormation for IaC. Container orchestration: ECS/Fargate or EKS with zero-downtime deployments. CI/CD: GitHub Actions, AWS CodePipeline, and CodeBuild (linting, testing, Docker, Terraform). Monitoring: CloudWatch Dashboards, custom metrics, log centralization, and alarm configurations. Security & Compliance: IAM policy design, KMS, GuardDuty, AWS Config, SSM Parameter Store. Scripting: Python, Bash, or Node.js for automation and Lambda functions. Soft Skills: Strong problem-solving mindset and attention to detail. Excellent written and verbal communication for documentation and cross-team collaboration. Ability to own projects end-to-end and deliver under tight timelines. Wil have to attend Coimbatore office on request (Hybrid) Preferred Qualifications Hands-on experience integrating third-party security or code-analysis APIs (e.g., Google Gemini, Prisma Cloud). Familiarity with monitoring and observability best practices, including custom metric creation. Exposure to multi-cloud environments or hybrid cloud architectures. Certification: AWS Certified DevOps Engineer – Professional or AWS Certified Solutions Architect – Associate.
Posted 3 weeks ago
3.0 - 7.0 years
12 - 20 Lacs
Pune
Work from Office
About the Role We are seeking a skilled SIEM Administrator to manage and optimize different SIEM solutions. The ideal candidate will be responsible for system administration, log integration, troubleshooting, Deployment, Implementation and maintaining security posture for the organization. Key Responsibilities SIEM Administration: Install, configure, maintain, and upgrade SIEM components. (IBM Qradar SIEM, DNIF, Splunk & Securonix). Log Management: Onboard, parse, and normalize logs from various data sources (firewalls, servers, databases, applications, etc.) Custom log source integration and parser development. System Monitoring & Troubleshooting: Ensure SIEM tools are functioning optimally. Monitor & regular health check perform for SIEM tools. troubleshoot system errors and resolve performance issues. Conduct regular performance tuning and capacity planning Perform root cause analysis for system failures & performance issues. Optimize system performance and storage management for SIEM Integration & Automation : Integrate third-party security tools (firewalls, EDR, threat intelligence feeds) with SIEM. Compliance & Audits: Ensure log retention policies comply with regulatory standards. Develop & enforce SIEM access controls & user roles/permissions. Documentation & Training: Document system configurations, SOP’s & troubleshooting documents. Prepare monthly/ weekly reports and PPT, onboarding documentation as per business/ client requirement. Dashboard & Report Development: Create & maintain custom dashboards & reports Optimize searches & reports for performance and efficiency. Hands on experience with Linux OS & Windows OS Basic to mediator level knowledge in networking skills Should be familiar with Azure, AWS or GCP products Basic Qualifications B.E./B.Tech in Computers or related field (preferred). 4+ Years of Experience in SOC Administration. Strong knowledge of SIEM architecture, log sources, and event correlation. Preferred Qualifications Proficiency in log management, regular expressions, and network security concepts. Experience integrating SIEM with various security tools (firewalls, IDS/IPS, antivirus, etc.) Scripting knowledge (Python, Bash, or PowerShell) is a plus. Training or Certificate on Splunk or IBM Qradar Preferred. Experience with SIEM tools like IBM QRadar, Splunk, Securonix, LogRhythm, Microsoft Sentinel, DNIF etc. Proficiency in IBM Qradar & Splunk administration. Configuring, maintaining, and troubleshooting SIEM solutions. Strong analytical and problem-solving skills. Excellent communication and documentation abilities.
Posted 3 weeks ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
As a DevOps Engineer at Facility & Energy Management, you will be an integral part of a dedicated team of innovators and problem solvers working towards sustainable impact. You will play a crucial role in crafting cutting-edge software solutions that help facilities optimize energy consumption, reduce costs, and enhance operational efficiency. If you have a passion for technology and delivering high-quality software solutions, this opportunity is for you! In this role, you will be responsible for designing and implementing comprehensive infrastructure plans and strategies. Your collaboration with cross-functional teams, including product owners, designers, and architects, will ensure alignment and innovation in software development. Additionally, you will have the opportunity to mentor junior DevOps engineers, fostering their growth and ensuring adherence to best practices and DevOps standards. You will work in a dynamic environment with more than 30 colleagues, striving to create market-leading software solutions for Facility & Energy Management. Your work will involve utilizing cutting-edge technologies and processes such as Kubernetes, Docker, AI, Pair Programming, Mob Programming, Continuous Integration, Continuous Learning, and Microservices. Key Responsibilities: - Develop and maintain infrastructure as code (IaC) using tools like Terraform & Azure Bicep - Implement and maintain Continuous Integration and Continuous Delivery (CI/CD) pipelines (Github CI) - Perform system monitoring using Prometheus and Grafana - Manage log management and distributed tracing with Tempo, Azure Application Insights, OpenTelemetry, and Grafana - Manage cloud environments, primarily Azure with exposure to AWS - Utilize Docker and Kubernetes for containerization and orchestration Ideal Candidate Requirements: - Bachelor's degree or higher in computer science/information science or equivalent - Experience with Docker and Kubernetes - Proficiency in SQL Server, Azure Database, and PostgreSQL - Solid understanding of infrastructure and automation programming Nice-to-Have Skills: - Experience with C# development on .Net tech stack - Familiarity with microservices architecture - Experience with Kafka - Experience in setting up and monitoring Azure App Services, Function App & Logic App If you are ready to dive into the world of cutting-edge technology, drive innovation at lightning speed, and contribute to a sustainable and efficient future, we would love to connect with you for this exciting opportunity. Apply now and be part of a team that is shaping the future of Facility & Energy Management software solutions.,
Posted 3 weeks ago
0.0 - 2.0 years
2 - 3 Lacs
Gurugram
Work from Office
Profile Summary We are seeking a detail-oriented and proactive System Monitoring Executive to oversee employee system activities using tracking software, maintain daily system logs , and ensure compliance with IT and organizational policies. The role involves monitoring user behaviour, identifying unusual patterns, and preparing structured reports for management review. Key Roles and Responsibilities Monitor employee system activities using a mobile-friendly tracking app Maintain a structured database of daily system logs and user activity Identify irregularities or non-compliance in system usage Generate regular reports for management and escalate issues if needed Ensure confidentiality and integrity of monitoring data Collaborate with HR/IT to support compliance and productivity goals Must have basic technical knowledge and familiarity with monitoring tools Knowledge and Skills Required Education: Bachelors or Master’s completed Experience: 6 months to 2 years of hands-on experience with employee/system monitoring tools (e.g., Handy, etc.) Proficiency in MS Excel, report preparation, IT systems, basic troubleshooting , and user behaviour analytics Excellent communication (written & verbal) Interpersonal and problem-solving skills Strong analytical and observation skills with attention to detail. High level of discretion, integrity, and confidentiality. Ability to work independently and proactively.
Posted 4 weeks ago
5.0 - 7.0 years
5 - 5 Lacs
Thiruvananthapuram
Work from Office
Overview: We are looking for a skilled SIEM Administrator to manage and maintain Security Information and Event Management (SIEM) solutions such as Innspark , LogRhythm , or similar tools. This role is critical to ensuring effective security monitoring, log management, and event analysis across our systems. Key Responsibilities: Design, deploy, and manage SIEM tools (e.g., Innspark, LogRhythm, Splunk). Develop and maintain correlation rules, s, dashboards, and reports. Integrate logs from servers, network devices, cloud services, and applications. Troubleshoot log collection, parsing, normalization, and event correlation issues. Work with security teams to improve detection and response capabilities. Ensure SIEM configurations align with compliance and audit requirements. Perform routine SIEM maintenance (e.g., patching, upgrades, health checks). Create and maintain documentation for implementation, architecture, and operations. Participate in evaluating and testing new SIEM tools and features. Support incident response by providing relevant event data and insights. Required Qualifications: Bachelor's degree in Computer Science, Information Security, or related field. 5+ years of hands-on experience with SIEM tools. Experience with Innspark, LogRhythm, or other SIEM platforms (e.g., Splunk, QRadar, ArcSight). Strong knowledge of log management and event normalization. Good understanding of cybersecurity concepts and incident response. Familiarity with Windows/Linux OS and network protocols. Scripting knowledge (e.g., Python, PowerShell) is a plus. Strong troubleshooting, analytical, and communication skills. Industry certifications (CEH, Security+, SSCP, or vendor-specific) are a plus. Key Skills: SIEM Tools (Innspark, LogRhythm, Splunk) Troubleshooting Log Management & Analysis Scripting (optional) Security Monitoring Job location: Thiruvananthpuram Notice period: Immediate Required Skills Siem,Splunk,Troubleshooting
Posted 1 month ago
3.0 - 5.0 years
4 - 8 Lacs
Hyderabad
Work from Office
3-5 years of experience in IT operations and maintenance. Hands-on experience with Grafana, Zabbix, Azure Monitor, and ELK Log Management. Experience with large-scale monitoring system setup and maintenance. Good exposure to commonly used ITSM tools, including PagerDuty and ServiceNow. Basic understanding of public cloud knowledge, including IaaS, PaaS, and SaaS. Proactive approach to identifying problems, performance bottlenecks, and areas for improvement. Primary Skills Configure and implement end-to-end monitoring solutions for applications and infrastructure. Configure and maintain log analytic tools for applications and infrastructure. Develop mock-up views and build workable dashboards following a defined methodology based on briefings from various stakeholders. Short Description Open to work in 24*7 Shift. Microsoft Azure Monitor PagerDuty ELK Log Management
Posted 1 month ago
12.0 - 15.0 years
15 - 20 Lacs
Chennai
Work from Office
The Lead Analyst, Cybersecurity Operations will be part of the Cybersecurity team that analyzes, implements, monitors, troubleshoots, and audits the cybersecurity of the Frontier network infrastructure. The analyst provides timely and comprehensive intelligence on internal/external threats for detection, monitoring, threat hunting, and incident response. The scope of environment includes system-monitoring platforms, anti-virus, DLP, URL filtering, and PCI environments. The analyst will be responsible for performing alert analysis, incident response, digital forensics, and supporting penetration remediation on applications/systems. Essential Functions Monitor, investigate, analyze, respond, and report to cyber incidents identified through detection/response platforms. Lead support to Management in detecting and responding to cybersecurity alerts and incident activity. Responsible for engaging and escalating incidents to Cyber Operations Management and other Cyber Incident Response Team members. Actively support incident response activities, efforts, and training exercises (e.g., incidents, tabletops, threat simulations) and be the lead incident response analyst. Actively drive risk reduction efforts for known cyber security vulnerabilities and known attack traffic patterns/indicators of compromise (IOC). Actively monitor security threats and risks, provide in-depth incident analysis, evaluate security incidents, provide proactive threat research, and recommend mitigation strategies. Evaluate and determine if/when cybersecurity violations have occurred through examination of network/application logs, open-source research, vulnerability and configuration scan data, and user provided reports. Proactively conduct investigations, analysis, and evaluation of projects to determine cybersecurity risk and feasibility as required. Administer, maintain, tune, and perform heath checks on cybersecurity products and services (such as: secure mail gateway, SIEM, IDS/IPS, EDR, vulnerability management, brand monitoring, threat intelligence, security rating, DDoS, web proxy, file integrity monitoring (FIM), data loss prevention (DLP), User Entity Behavioral Analytics (UEBA), and other). Provide and implement recommendations for new technical controls to help mitigate security vulnerabilities. Responsible for leading the vulnerability management program functions including hosting weekly meetings with Stakeholders and the operations team, creating and tracking tickets for all vulnerabilities, holding stakeholder teams to meet SLAs, and reporting to the Manager of Cybersecurity on a weekly basis. Actively perform threat hunting activities in the environment to detect cyber threats in the network. Coordinate and support purple, red, and blue team engagements. Provide cybersecurity technical assistance when needed by system/application owners. Support multiple day-to-day cybersecurity tasks and projects efforts. Provide regular status updates to Management on projects and remediation efforts. Solid understanding of cybersecurity policies and procedures, ability to draft, modify and create standard operating procedures (SOPs) for use of other team members. Support organizational Security Awareness Training efforts (suggest training topics, coordinate phishing campaigns, enable awareness to end-users in support of incidents). Support vulnerability assessments functions (such as: enterprise pen testing, application pen testing, static/dynamic testing, scorecard assessments). Participate and support afterhours/on-call rotation requirements for cybersecurity incidents. Responsible for developing, monitoring, and tracking cyber security metrics on a recurring basis, including creating Powerpoint slide decks for presentations. Coordinate response and remediation efforts across various departments in a cooperative and beneficial manner. Responsible for maintaining Incident Response documentation and auditing member contact information on at least a semi-annual basis or as needed. Responsible for attending all vendor meetings and acts as the point of contact for our Cybersecurity vendors. Demonstrate ownership and understanding of tasks when engaging with other team members. Provide leadership, guidance and partnership to Analyst(s) and Senior Analyst(s). Responsible for the onboarding and training of new analysts to the Cybersecurity Operations team. Provide support to management team. Qualifications Bachelors degree in computer science, technology, or equivalent combination of education and relevant experience (required). 6+ years of relevant IT/Cybersecurity experience (required). 5+ years in security operations with hands-on experience with enterprise cybersecurity products, such as Qualys, SentinelOne, Proofpoint, Office365, Microsoft Defender for Cloud, Microsoft Defender for Identity (required). 5+ years of SIEM (security information and event management) platform experience (required). 4+ years supporting adversary tactics and techniques based on MITRE attack framework (required). Knowledge of cyber security standards and frameworks such as ISO 27001, NIST CSF, NIST-800- 53, PCI DSS ASV (highly desired). Hands-on experience with tools like PowerShell, Vulnerability Management suite, Wireshark, and NMAP (required). Position Description Industry cybersecurity certification: CompTIA: Security+ or Pentest+, CEH, CISSP, OCSP, SANS: GCIH or GSEC, CISSP, ISACA: CISA or CISM, Security+, SSCP, or CCNA (required, or willing to attain within 3 months of start date). Hands-on Cloud infrastructure (Azure/AWS/GCP) cybersecurity remediation experience (desirable). Hands-on experience with next-gen endpoint detection/response (EDR), Enterprise Firewall, IPS, Log Management, Cisco, and Checkpoint experience (desirable). URL Filtering (web proxy) and troubleshooting experience (desirable). Solid
Posted 1 month ago
4.0 - 7.0 years
8 - 11 Lacs
Pune
Work from Office
For IR L2-Position: 5Yrs+ hands on Exp. Ready to work for Rotational shifts.(24*7), T Location: Pune Roles and Responsibilities For Soc/IR L2-Role: 5Yrs+ hands on Exp. Ready to work for Rotational shifts.(24*7) Roles and Responsibilities Key Skills: 1.SIEM tool exp-preferably Arc sight, 2. Log Analysis 3.Incident Response 4.DLP experience 5.Investigation Knowledge 6.Rules creation 7.Alert management. 8.Network monitoring Tool (Cisco Nbad) 9.Use case Creation Key Responsibilities To handle the daily monitoring of information security events. To function as an intrusion analyst by examining security events for context, appropriateness and criticality To act as an information security researcher to provide insight and understanding of new and existing information security threats Key Operational Activities Daily checklists and tasks Log analysis and review Vulnerability management activities Alert analysis Investigation of suspicious security event activity Maintain and enforce adherence to corporate standards, policies and procedure Please share your profile to anwar.shaik@locuz.com
Posted 1 month ago
5.0 - 10.0 years
10 - 16 Lacs
Bengaluru
Work from Office
Role Overview: We are seeking to recruit qualified Managers for our IT Security practice within our IT consulting division that carries out security assessments, threat and vulnerability assessment, penetration testing, source code reviews, managed security services, network scanning, configuration reviews, etc. for our clients. The position is based in Middle East (Kuwait) Responsibilities include business development, client relationship management, resource planning, project delivery management, IT security practice management and other related activities for our clients in Banking & Financial, Investment, Oil & Gas, Hospitality, Telecom, Government and Regulatory industries. Candidate should be capable of: managing IT security projects delivery reviewing systems architecture / design to assess and improve information security assess the current state security posture, envision future state and provide implementation roadmaps to our clients in IT security projects provide enterprise security strategy and project manage IT security solution implementation advise clients on ISO 27001 standards and manage ISO 27001 project implementation perform risk assessment and advice on risk treatment plan develop IT security policies, procedures and baseline standards prepare, discuss and finalize IT security assessement reports conduct ethical hacking or penetration testing carry out application source code reviews identify potential new business opportunities and assist in conversion of opportunities end-to-end assisting in IT security practice management activities maintain healthy relationship with all levels of the client personnel at all times handle multiple assignments across various industries, etc. Skills: The candidate should possess the following experience and skills: Hands-on experience of nearly 5 years in IT security consulting, implementation and maintenance of IT security solutions such as Firewalls, Anti-Virus System, Security Management Systems, IDS / IPS and other similar solutions IT security consulting experience or worked in industry with the primary responsibility of managing IT security solutions Worked / used various IT security tools, scripts, programs to carry out penetration tests and risk assessments Exposure to a well structured risk assessment techniques Strong oral and written communication skills Team player and management skills Exceptional skills in client relationship management Business development and practice management skills Preference will be given to those candidates who have IT security product certifications Work Experience & Education: Mandatory Academic qualifications: BE / B.Tech or any graduation Mandatory professional qualifications: CISA / CISSP / CISM / CEH / CHFI / GIAC / CCIE or equivalent qualifications or equivalent qualifications Product Qualifications : Microsoft, Cisco, Unix/Linux, Storage and IT Security products (Firewall, Switches, IDS / IPS, GRC Software, SIEM / Log Management, Identity / Access Controls Software, or other products). Preference will be given to those candidates who have IT security product certifications. Preference will be given to those candidates who have qualifications and experience in SCADA, Process Control Networks, Cyber Security Management, Forensic Investigations, PCI DSS and PA DSS domains. Hands-on experience in conducting VAPT assignments, ISO 27001 engagements, Implementation of remedial control in Microsoft and Cisco environment Expected Travel Candidate is required to travel as needed on projects within the Middle East including Saudi Arabia. The travel duration generally tend to be in the range of two weeks to four weeks at one stretch.
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough