Home
Jobs
Companies
Resume

55 Logrhythm Jobs

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

About QpiAI At QPiAI, we are leading the effort to discover optimal AI and Quantum systems in Life sciences, Healthcare, Transportation, Finance, Industrial, and Space technologies. QPiAI is building a full stack Enterprise Quantum Computers. QPiAI Quantum hardware team is responsible for designing and characterization of Quantum Processor, Cryogenic Quantum Control Circuits, RF Control Hardware, and QPiAI ASGP. Job Summary: We are looking for a skilled and proactive Cybersecurity Analyst/Engineer to protect the organization's digital assets, systems, and networks from cyber threats. The ideal candidate will be responsible for identifying security risks, monitoring security events, and implementing protective measures to ensure the confidentiality, integrity, and availability of information systems. Key Responsibilities: Monitor, analyze, and respond to security alerts and incidents. Conduct vulnerability assessments and penetration testing. Configure and maintain firewalls, antivirus software, and intrusion detection/prevention systems (IDS/IPS). Implement and enforce security policies, procedures, and best practices. Manage user access controls, multi-factor authentication, and identity management systems. Support compliance efforts for industry standards such as ISO 27001, GDPR, HIPAA, or NIST. Conduct regular audits and risk assessments to identify security gaps. Investigate and report on security breaches and incidents. Provide security awareness training for employees. Keep systems and security tools up to date with the latest patches and updates. Participate in disaster recovery and business continuity planning. Required Skills and Qualifications: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field. 2–5 years of experience in a cybersecurity role (analyst, engineer, or equivalent). Strong knowledge of network security, endpoint protection, and cloud security principles. Experience with SIEM tools (e.g., Splunk, QRadar, LogRhythm). Familiarity with common threat intelligence platforms and frameworks (MITRE ATT&CK, OWASP). Understanding of firewalls, VPNs, IDS/IPS, and endpoint detection and response (EDR). Working knowledge of operating systems (Windows, Linux) and scripting languages (PowerShell, Python) is a plus. Relevant certifications such as CompTIA Security+, CEH, CISSP, or CISM are preferred. Soft Skills: Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Ability to work independently and collaboratively in a team environment. Attention to detail and ability to manage multiple tasks effectively. Show more Show less

Posted 14 hours ago

Apply

3.0 years

5 - 7 Lacs

Bengaluru

On-site

About VOIS: VO IS (Vodafone Intelligent Solutions) is a strategic arm of Vodafone Group Plc, creating value and enhancing quality and efficiency across 28 countries, and operating from 7 locations: Albania, Egypt, Hungary, India, Romania, Spain and the UK.Over 29,000 highly skilled individuals are dedicated to being Vodafone Group’s partner of choice for talent, technology, and transformation. We deliver the best services across IT, Business Intelligence Services, Customer Operations, Business Operations, HR, Finance, Supply Chain, HR Operations, and many more.#VOIS About VOIS India: In 2009, VO IS started operating in India and now has established global delivery centres in Pune, Bangalore and Ahmedabad. With more than 14,500 employees, VO IS India supports global markets and group functions of Vodafone, and delivers best-in-class customer experience through multi-functional services in the areas of Information Technology, Networks, Business Intelligence and Analytics, Digital Business Solutions (Robotics & AI), Commercial Operations (Consumer & Business), Intelligent Operations, Finance Operations, Supply Chain Operations and HR Operations and more. Role Purpose: The purpose of this role (CDA- Cyber Defence Analyst) is to provide security analyst expertise and contribute to the success of the Cyber Security Operations Center (‘SOC’). The role reports into the AM & T Team Lead and is responsible to identify and validate threats by data analysis (e.g. log file information, consolidated event / alert data, firewall data) with the wide range of security tools and cyber Defence products. The role will deliver qualified analysis about actual threats and indications / recommendations how the associated risk can be investigated and responded The position works closely together with the Senior Cyber Defense Analysts / security incident manager and provide the technical security expertise in order to provide professional security analysis reports for further corrective actions and security measures. Core competencies, knowledge and experience: 3+ year’s relevant experience in Cyber Security- SOC , SIEM, Event /Alert Analysis, Security Incident investigation and management. Must have an understanding about network and security concepts, SIEM technologies (ArcSight / Splunk / QRadar, Logrhythm, etc.) Must have Industry recognized security certifications like CEH, CCNA Cyber Ops, Security + , Must have excellent analytical skills and communication skills Should be able to follow defined triage playbooks. Aspire to learn about new threats in Cyber Security apply the skills on daily investigation and protect Vodafone against new threats. Must have technical / professional qualifications: Degree in Computer Science/ Information Technology/ Engineering or similar Prior experience in Cyber Security SOC. Prior experience in event analysis and triage. Good knowledge in Networking and security concepts Experience of global customer handling A reputation for self-motivation, integrity, cultural sensitivity and strong interpersonal skills VOIS Equal Opportunity Employer Commitment VO IS is proud to be an Equal Employment Opportunity Employer. We celebrate differences and we welcome and value diverse people and insights. We believe that being authentically human and inclusive powers our employees’ growth and enables them to create a positive impact on themselves and society. We do not discriminate based on age, colour, gender (including pregnancy, childbirth, or related medical conditions), gender identity, gender expression, national origin, race, religion, sexual orientation, status as an individual with a disability, or other applicable legally protected characteristics.As a result of living and breathing our commitment, our employees have helped us get certified as a Great Place to Work in India for four years running. We have been also highlighted among the Top 10 Best Workplaces for Millennials, Equity, and Inclusion , Top 50 Best Workplaces for Women , Top 25 Best Workplaces in IT & IT-BPM and 10th Overall Best Workplaces in India by the Great Place to Work Institute in 2024. These achievements position us among a select group of trustworthy and high-performing companies which put their employees at the heart of everything they do.By joining us, you are part of our commitment. We look forward to welcoming you into our family which represents a variety of cultures, backgrounds, perspectives, and skills! Apply now, and we’ll be in touch!

Posted 2 days ago

Apply

0 years

0 Lacs

Jaipur, Rajasthan, India

On-site

Linkedin logo

Must have hands-on working on SIEM Implementation Projects(any two of the below in order of preference) • LogRhythm • FortiSIEM • ArcSight • Splunk/Securonix/Azure Sentinel 3. Experience in Installation, Configuration and Troubleshooting of various SIEM Components. 4. Experience in Supported and Non-Supported Devices Integration with SIEM. 5. Experience in Custom parser Development(Regex based and SQL based) 6. Experience in SIEM Architecture design and distributed Architecture Implementation. 7. Experience in design, Implement, Finetune SIEM Usecases(Cross Corelated Usecases, Threat Based Usecases and Mitre based Usecases) 8. Experience in UEBA – Integrations and Usecases 9. Experience working in a large team and customer facing role. 10. Experience deploying standard SOAR playbooks deployment. 11. Knowledge on Python or PowerShell scripting and APIs. 12. Knowledge on various Cloud Components and relevant functionality and logging(Ex: S3 Bucket, Event Hub, Cloudtrail, Cloudwatch etc.) 13. Should have OEM Certifications in SIEM 14. Security Certifications – CEH, Comptia Security+ or Similar. Roles and Responsibilities: 1. Engage with Customers during the project lifecycle as Technical SPOC and ensure the Implementation is done smoothly. 2. Coordinate internally and customer teams for technical requirements and issues resolutions. 3. Work on device onboarding, Usecases creation, Parser development which are part of project scope and success criteria 4. Technical SPOC for customer meetings, BRM sessions and other workshops held during the project lifecycle. 5. Work on Internal SOC team for successful handover of the projects for SOC monitoring Go-live 6. Engage with Cross Functional teams for Cloud Logsources integration with SIEM. 7. Build project technical documentations including HLD, LLD and other technical documents. 8. Adhere to project delivery processes and Tata Communications internal processes for successful project delivery. 9. Publish weekly and daily status updates to Customer and work support TPM to send the weekly status reports. 10. Contribute to Threat Management practice development - SOPs, Developments, Automations etc. 11. Effectively collaborate with internal and external teams. 12. Support pre-sales for technical pointers and inputs. Show more Show less

Posted 2 days ago

Apply

3.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

About VOIS VO IS (Vodafone Intelligent Solutions) is a strategic arm of Vodafone Group Plc, creating value and enhancing quality and efficiency across 28 countries, and operating from 7 locations: Albania, Egypt, Hungary, India, Romania, Spain and the UK.Over 29,000 highly skilled individuals are dedicated to being Vodafone Group’s partner of choice for talent, technology, and transformation. We deliver the best services across IT, Business Intelligence Services, Customer Operations, Business Operations, HR, Finance, Supply Chain, HR Operations, and many more.#VOIS About VOIS India In 2009, VO IS started operating in India and now has established global delivery centres in Pune, Bangalore and Ahmedabad. With more than 14,500 employees, VO IS India supports global markets and group functions of Vodafone, and delivers best-in-class customer experience through multi-functional services in the areas of Information Technology, Networks, Business Intelligence and Analytics, Digital Business Solutions (Robotics & AI), Commercial Operations (Consumer & Business), Intelligent Operations, Finance Operations, Supply Chain Operations and HR Operations and more. Role Purpose The purpose of this role (CDA- Cyber Defence Analyst) is to provide security analyst expertise and contribute to the success of the Cyber Security Operations Center (‘SOC’). The role reports into the AM & T Team Lead and is responsible to identify and validate threats by data analysis (e.g. log file information, consolidated event / alert data, firewall data) with the wide range of security tools and cyber Defence products. The role will deliver qualified analysis about actual threats and indications / recommendations how the associated risk can be investigated and responded The position works closely together with the Senior Cyber Defense Analysts / security incident manager and provide the technical security expertise in order to provide professional security analysis reports for further corrective actions and security measures. Core Competencies, Knowledge And Experience 3+ year’s relevant experience in Cyber Security- SOC , SIEM, Event /Alert Analysis, Security Incident investigation and management. Must have an understanding about network and security concepts, SIEM technologies (ArcSight / Splunk / QRadar, Logrhythm, etc.) Must have Industry recognized security certifications like CEH, CCNA Cyber Ops, Security + , Must have excellent analytical skills and communication skills Should be able to follow defined triage playbooks. Aspire to learn about new threats in Cyber Security apply the skills on daily investigation and protect Vodafone against new threats. Must Have Technical / Professional Qualifications Degree in Computer Science/ Information Technology/ Engineering or similar Prior experience in Cyber Security SOC. Prior experience in event analysis and triage. Good knowledge in Networking and security concepts Experience of global customer handling A reputation for self-motivation, integrity, cultural sensitivity and strong interpersonal skills VOIS Equal Opportunity Employer Commitment VO IS is proud to be an Equal Employment Opportunity Employer. We celebrate differences and we welcome and value diverse people and insights. We believe that being authentically human and inclusive powers our employees’ growth and enables them to create a positive impact on themselves and society. We do not discriminate based on age, colour, gender (including pregnancy, childbirth, or related medical conditions), gender identity, gender expression, national origin, race, religion, sexual orientation, status as an individual with a disability, or other applicable legally protected characteristics.As a result of living and breathing our commitment, our employees have helped us get certified as a Great Place to Work in India for four years running. We have been also highlighted among the Top 10 Best Workplaces for Millennials, Equity, and Inclusion , Top 50 Best Workplaces for Women , Top 25 Best Workplaces in IT & IT-BPM and 10th Overall Best Workplaces in India by the Great Place to Work Institute in 2024. These achievements position us among a select group of trustworthy and high-performing companies which put their employees at the heart of everything they do.By joining us, you are part of our commitment. We look forward to welcoming you into our family which represents a variety of cultures, backgrounds, perspectives, and skills! Apply now, and we’ll be in touch! Show more Show less

Posted 2 days ago

Apply

0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Note: This job profile may include more than one business title job description. See below for each job descriptions listed out by *Business Title. Keep only the job description details required for job requisitions. Junior Network Engineer, Tier 2 Role Summary: The Junior Network Engineer, Tier 2 position is perfect for someone that has little to no experience. As a junior engineer within the Tier 2 organization, you will be provided mentorship and guidance from experienced engineers, and you will be able to work on different customers’ technologies and products. Job Scope/Supervision: The Junior Network Engineer, Tier 2 will be in direct contact with other Tier 2 Teams, Tier 1 teams, Supplier Management Team, Incident Managers and other teams within the company, depending on the problem and difficulties faced Duties And Responsibilities: Main job responsibilities are: Work over different customer and backbone environments Configure and manage devices we provide to our end customers Troubleshoot problems within GTT’s network Participate in direct communication with customers and third party companies aiming to resolve the problem Communicate internally with Incident Managers and Tier 1 engineers, providing help and assistance over different customers’ problems Network Engineer, Tier 2 Role Summary: The Network Engineer is a hybrid position with the primary role to assist in the smooth operation of GTT’s Global Network under the supervision of the Network Operations Manager. This is a large-scale network spanning the globe and is built on a multi-platform environment. The role is varied and demands a totally flexible approach to all tasks associated with this position. Job Scope/Supervision: The successful candidate should be comfortable working within an expanded and very fast-paced team environment. Duties And Responsibilities: Transport Assisting in customer test & turn-up (DWDM/ADM/Ethernet) Customer circuit troubleshooting with the aid of industry-standard test equipment Liaising with all GTT NOC Engineers and Network Operations departments in other countries Report writing and creating/maintaining inventories Assisting in the management of a Planned Preventative Maintenance program and schedules Network installations Non-routine duties will be allocated as deemed necessary Facilities Monitoring Contractors and training other members of staff when applicable. Generate site documentation such as maintaining records and files, preparing reports, and ordering supplies and equipment Periodically inspect the equipment, locate, and correct problems before breakdowns occur Ability to replace items such as circuit breakers, fuses, switches, lamps, electrical & electronic components, and cable When working with more complex items of plant, they may work with engineers, engineering technicians, or industrial machinery installation, repair, and maintenance workers Supervise planned works, carrying out postmortems upon completion to assess the efficiency / financial worth and lessons learned from said works Aim to constantly reduce operational running costs Review / authorize and manage MOPS (method of procedures) RA’s (Risk Assessments) and back out plans prior to on-site works taking place assessing all potential risks and consequences relating to specific works Provide hands-on and technical assistance during an emergency Network Security Engineer, Tier 2 Role Summary: The security engineering team is key to develop and maintain GTT cloud network and security platforms, both in managed services and Cloud ecosystems, more focused in ensuring of optimal levels of platform performance and capacity, maintaining as well high levels of cost efficiency. Support operational teams with last tier support, as well as SOC team projects and platform implementations. Whenever needed, it may be required to support the implementation of customer specific solutions and Service Transition process. A good part of the time will be spent running projects, both for customers and Internal systems. Job Scope/Supervision: On a regular basis it will be requested to perform vulnerability assessments and develop action plans to mitigate vulnerabilities found across GTT estate. Duties And Responsibilities: Implement, maintain and develop security platforms across regions and manage all aspects of their life cycle, as per product and architecture teams requirements; Act as technical escalation point whenever needed for Incident and Problem Management; Create and maintain platform documentation to comply with GTT ITIL approach and support several certifications GTT has like ISO 27001, ISO 20000, PCI DSS and BSI. Help manage vendor relationship for security platforms; Perform technical audits as required to verify customer and platform standards are met and maintained; Perform on-going performance tuning and resource optimization as required. It is expected that the role is able to help to improve and automate processes related to management throughout service lifecycle Applies ITIL and Agile methodology to the role in a DevOps spirit, following best practice standards and processes, without jeopardizing agility and flexibility. Adheres to GTT security policies and report incidents to the appropriate operations functions. Assists in the Continual Process Improvement (CPI) program as needed Work on assigned tasks and projects as directed by management. Network Technician, Media Role Summary: Provide front line support for all media products which will include managing OU bookings, OU activations, event support, dedicated service management and maintaining the health and welfare of the network. Duties And Responsibilities: Primary contact for all incoming customer calls and email. Booking and activation of occasional use media services. Managing media events from testing through completion. Documenting clearly and effectively information in the Trouble Ticket system and SharePoint for communication to other staff, to open tickets and follow up on escalated problems. Monitoring, troubleshooting & correcting media service and network problems. Diagnosing troubles identified by network monitoring and working to resolve issues. Working with various third parties (Engineers, Provisioners, Infrastructure Vendors, Customers, and Developers) to narrow down problems and achieve resolution. Protecting services around internal and external network maintenance events. SD-WAN Engineer, Tier 2 Role Summary: The Enterprise Operations Center team manages and maintains the top-tier enterprise customers for GTT during European business hours (8hr shifts between 8 am to 8 pm, Monday to Friday). The team is highly skilled ICT engineers who are responsible of deliver a world-class customer experience. Job Scope/Supervision: Tier 2 support for customer incidents and long-term problems focused on SDWAN platforms Owns incidents, resolves them swiftly, and drives through to final fix, working with customers and other internal and external teams as appropriate. Duties And Responsibilities: Working with the vendors’ TACs regarding platform issues Provides concise and relevant action plans for teams to resolve network and customer issues efficiently. Working on a broad range of SDWAN Vendors and products: Silver Peak, VeloCloud, and Fortinet. Working on a broad range of security Vendors and products: Palo Alto and Fortinet Uses a detailed understanding of operational capabilities to support operations acceptance of new infrastructure and non-standard bids. Pro-active problem management based on technical and trend analysis to ensure service stability and preventative action is taken where possible Configuration of network elements and migration of services Ensure operational processes are followed and deliver best-in-class technical support while maintaining a stable and resilient network. Security Analyst (Threat Intelligence) Role Summary: Working out of GTT’s Advanced Services Centre of Excellence, the TIC team focuses on providing SIEM, secure hosting and network services that meet and exceed government and certification body standards. The team work closely with our high value customer base to deliver a wide range of services including Security Incident & Event management, Secure Networking and Secure Hosting. As part of the Advanced Services division, Threat Intelligence Centre is a highly rewarding and challenging team for network, systems, and security analysts. The GTT SIEM platform is used to identify customer security incidents; one of the security analysts’ primary tasks is to take the output of the SIEM environment and perform deep analysis of the event; leading our customers to a remediation action that successfully mitigates the risk to their corporate and hosted environments. Responsible for providing tier 1 technical expertise in the support of both hardware and software solutions. Primarily Microsoft Windows, VMware, Cisco UCS, NetApp, Palo Alto, Cisco ASR and LogRhythm SIEM. Duties And Responsibilities: Providing analysis of SIEM alerts leading to enhanced customer security Work with customers to enhance security incident response procedures Enhance internal investigation process and identify additional toolsets required for rapid incident turnaround Be part of a 24/7 customer support team providing first level diagnosis for our hosting and network customers. Identifying improvements and advising on best practice. Manage 3rd party vendor support as required. Adhere to team processes and the direction of the SM, TIC. Work with Senior analysts / engineers to implement platform optimizations and tuning through structured change process Perform upgrades to SIEM environment from operating system to application to ensure highest level of platform security Maintain and enhance specific customer environments including firewalls, switches, and hosting platforms Voice Network Engineer Role Summary: The Network Management Centre (NMC) manages and maintains GTT’s pan-European network 24x7. As a highly intelligent and efficient break/fix organization, with a strong focus on consistency and process, it works with other parts of GTT to deliver a world-class customer experience. Job Scope/Supervision: Service Desk, Tier 3 Voice (TSS), Incident and Problem Management Duties And Responsibilities: Provide proactive fault resolution support for Voice/ VoIP cases or when the Service Desk/ NOC front line team is unable to resolve a customer and/or network fault or where a fault has been escalated according to SLA requirements. Use network tools to monitor core network and customer services. Proactively initiate incident management process. Perform diagnostics on all Voice network and customer faults. Generate action plans to troubleshoot all Voice network and customer faults. Track the incident management of proactive and reactive issues through the Trouble Ticket system. Management and Technical escalation of Trouble Tickets in line with the process. Coordinate NOC activities with local Field Operations and Vendor/Supplier representatives to diagnose and fix faults across a pan-European network Liaise with customer representatives to progress fault resolution. Support local Field operations with maintenance activities. Works in the NOC on a 24x7 shift rota. Reporting security incidents to the appropriate operations functions on detection. Comply with GTT Security Management controls, and security policies and report security incidents to the line manager Physical Security Monitoring Show more Show less

Posted 3 days ago

Apply

7.0 - 9.0 years

0 Lacs

Delhi, India

On-site

Linkedin logo

SIEM Implementation Lead Experience: 7-9 years Location: Pune Employment Type: Full-time Job Overview We are looking for an experienced SIEM Implementation Lead to manage and drive end-to-end SIEM deployments across enterprise environments. The ideal candidate will have deep technical expertise in security monitoring, incident detection, and security architecture using SIEM platforms. Key Responsibilities (KRAs) Lead the design, implementation, and configuration of SIEM platforms (e.g., Splunk, QRadar, ArcSight, LogRhythm) Integrate security data sources and ensure effective log management across all layers Define and tune use cases, correlation rules, and alerting mechanisms Work with SOC and IT teams to refine alert triaging and incident escalation workflows Perform SIEM health checks, capacity planning, and optimization Document SIEM architecture, configurations, and operational procedures Ensure compliance with relevant regulations (e.g., GDPR, HIPAA, ISO 27001) Required Skillsets Hands-on experience with leading SIEM tools (e.g., Splunk, IBM QRadar, ArcSight) Deep understanding of log parsing, normalization, and data ingestion techniques Strong knowledge of cybersecurity frameworks (e.g., MITRE ATT&CK, NIST) Experience in scripting languages (e.g., Python, Bash) for automation Familiarity with firewall, IDS/IPS, antivirus, endpoint security solutions Strong leadership and project management skills Certifications like SIEM Engineer, CISSP, or GCIA preferred (ref:hirist.tech) Show more Show less

Posted 3 days ago

Apply

1.0 - 3.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. About The Role We are seeking a skilled SIEM Administrator to manage and optimize different SIEM solutions. The ideal candidate will be responsible for system administration, log integration, troubleshooting, Deployment, Implementation and maintaining security posture for the organization. Key Responsibilities SIEM Administration: Install, configure, maintain, and upgrade SIEM components. (IBM Qradar SIEM, DNIF, Splunk & Securonix). Log Management Onboard, parse, and normalize logs from various data sources (firewalls, servers, databases, applications, etc.) Custom log source integration and parser development. System Monitoring & Troubleshooting Ensure SIEM tools are functioning optimally. Monitor & regular health check perform for SIEM tools. troubleshoot system errors and resolve performance issues. Conduct regular performance tuning and capacity planning Perform root cause analysis for system failures & performance issues. Optimize system performance and storage management for SIEM Integration & Automation Integrate third-party security tools (firewalls, EDR, threat intelligence feeds) with SIEM. Compliance & Audits Ensure log retention policies comply with regulatory standards. Develop & enforce SIEM access controls & user roles/permissions. Documentation & Training Document system configurations, SOP’s & troubleshooting documents. Prepare monthly/ weekly reports and PPT, onboarding documentation as per business/ client requirement. Dashboard & Report Development Create & maintain custom dashboards & reports Optimize searches & reports for performance and efficiency. Other Knowledge Base Hands on experience with Linux OS & Windows OS Basic to mediator level knowledge in networking skills Should be familiar with Azure, AWS or GCP products Required Skills & Qualifications B.E/B.Tech degree in computer science, Cybersecurity, or related field (preferred). 1-3 years experience as Soc Admin Strong knowledge of SIEM architecture, log sources, and event correlation. Proficiency in log management, regular expressions, and network security concepts. Experience integrating SIEM with various security tools (firewalls, IDS/IPS, antivirus, etc.). Scripting knowledge (Python, Bash, or PowerShell) is a plus. Training or Certificate on Splunk or IBM Qradar Preferred. Soft Skills Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Ability to work independently and in a team. Must Have Skills Hands-on experience with SIEM tools like IBM QRadar, Splunk, Securonix, LogRhythm, Microsoft Sentinel, DNIF etc. Proficiency in IBM Qradar & Splunk administration Configuring, maintaining, and troubleshooting SIEM solutions. Log source integration, parsing, and normalization. Strong knowledge of TCP/IP, DNS, HTTP, SMTP, FTP, VPNs, proxies, and firewall rules. Familiarity with Linux and Windows system administration. Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted. Show more Show less

Posted 5 days ago

Apply

4.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. About The Role We are seeking a skilled SIEM Administrator to manage and optimize different SIEM solutions. The ideal candidate will be responsible for system administration, log integration, troubleshooting, Deployment, Implementation and maintaining security posture for the organization. Key Responsibilities SIEM Administration: Install, configure, maintain, and upgrade SIEM components. (IBM Qradar SIEM, DNIF, Splunk & Securonix). Log Management Onboard, parse, and normalize logs from various data sources (firewalls, servers, databases, applications, etc.) Custom log source integration and parser development. System Monitoring & Troubleshooting Ensure SIEM tools are functioning optimally. Monitor & regular health check perform for SIEM tools. troubleshoot system errors and resolve performance issues. Conduct regular performance tuning and capacity planning Perform root cause analysis for system failures & performance issues. Optimize system performance and storage management for SIEM Integration & Automation Integrate third-party security tools (firewalls, EDR, threat intelligence feeds) with SIEM. Compliance & Audits Ensure log retention policies comply with regulatory standards. Develop & enforce SIEM access controls & user roles/permissions. Documentation & Training Document system configurations, SOP’s & troubleshooting documents. Prepare monthly/ weekly reports and PPT, onboarding documentation as per business/ client requirement. Dashboard & Report Development Create & maintain custom dashboards & reports Optimize searches & reports for performance and efficiency. Hands on experience with Linux OS & Windows OS Basic to mediator level knowledge in networking skills Should be familiar with Azure, AWS or GCP products Basic Qualifications B.E./B.Tech in Computers or related field (preferred). 4+ Years of Experience in SOC Administration. Strong knowledge of SIEM architecture, log sources, and event correlation. Preferred Qualifications Proficiency in log management, regular expressions, and network security concepts. Experience integrating SIEM with various security tools (firewalls, IDS/IPS, antivirus, etc.) Scripting knowledge (Python, Bash, or PowerShell) is a plus. Training or Certificate on Splunk or IBM Qradar Preferred. Experience with SIEM tools like IBM QRadar, Splunk, Securonix, LogRhythm, Microsoft Sentinel, DNIF etc. Proficiency in IBM Qradar & Splunk administration. Configuring, maintaining, and troubleshooting SIEM solutions. Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted. Show more Show less

Posted 5 days ago

Apply

20.0 years

0 Lacs

Gurgaon, Haryana, India

On-site

Linkedin logo

Rackspace Security (Public Cloud) Security Engineer L3 (Endpoint Security) About Rackspace Cyber Defence Rackspace Cyber Defence is our next generation cyber defence and security operations capability that builds on 20+ years of securing customer environments to deliver proactive, risk-based, threat-informed and intelligence driven security services. Our purpose is to enable our customers to defend against the evolving threat landscape across on-premises, private cloud, public cloud and multi-cloud workloads. Our goal is to go beyond traditional security controls to deliver cloud-native, DevOps-centric and fully integrated 24x7x365 cyber defence capabilities that deliver a proactive , threat-informed , risk-based , intelligence-driven approach to detecting and responding to threats. Our mission is to help our customers: Defend against new and emerging risks that impact their business Reduce their attack surface across private cloud, hybrid cloud, public cloud, and multi-cloud environments Reduce their exposure to risks that impact their identity and brand Develop operational resilience Maintain compliance with legal, regulatory and compliance obligations What we’re looking for To support our continued success and deliver a Fanatical Experience™ to our customers, Rackspace Cyber Defence is looking for an Indian based Security Engineer, with a specialism in Endpoint Security to support Rackspace’s strategic customers. This role is particularly well-suited to a self-starting, experienced and motivated Sr. Security Engineer, who has a proven record of accomplishment in the design, delivery, management, operation and continuous improvement of enterprise-level Endpoint Security platforms or delivering Managed Endpoint Detection & Response (EDR) services to customers. The primary focus will be on the design, implementation, management, operation and continuous improvement of cloud-native Endpoint Detection & Response (EDR) platforms such as Crowdstrike Falcon or Microsoft Defender for Endpoint; used by the Rackspace Cyber Defence Center to deliver managed security services to our customers. You will also be required to liaise closely with the customer’s key stakeholders, which may include incident response and disaster recovery teams as well as information security. Key Accountabilities Ensure the Customer’s operational and production environment remains healthy and secure at all the times Assist with customer onboarding – customer/device onboarding, policy configuration, platform configuration and service transition to security operations team(s). Advance platform administration. Critical platform incident handling & closure. As an SME, act as an L3 escalation and point of contact for SecOps Analysts during an incident response process As an SME, act as a champion and centre of enablement by delivering training, coaching and thought leadership across Endpoint Security and Endpoint Detection & Response. Develop and document runbooks, playbooks and knowledgebase articles that drive best practice across teams. Drive continuous improvement of Rackspace Managed EDR services through custom development, automation and integration; in collaboration with SecOps Engineering and other Security Engineering team(s) Maintain close working relationships with relevant teams and individual key stakeholders, such as incident response and disaster recovery teams as well as information security etc. Co-ordinate with vendor for issue resolution. Required to work flexible timings Skills & Experience Should have 8+ years experience in Security Engineering Experience working in either large, enterprise environments or managed security services environments with a focus on Endpoint Detection & Response Experience of working with cloud native Endpoint Security and Endpoint Detection & Response (EDR) tools such as Crowdstrike, Microsoft Defender for Endpoint and/or Microsoft Defender for Cloud Experience of working in two (or more) of the following additional security domains: o SIEM platforms such as Microsoft Sentinel (preferred), Google Chronicle, Splunk, QRadar, LogRhythm, Securonix etc. o AWS (Amazon Web Services) Security Hub including AWS Guard Duty, AWS Macie, AWS Config and AWS CloudTrail . Experience of analysing malware and email headers, and has skills in network security, intrusion detection and prevention systems; operating systems; risk identification and analysis; threat identification and analysis and log analysis Experience of security controls, such as network access controls; identity, authentication, and access management controls (IAAM); and intrusion detection and prevention controls Knowledge of security standards (good practice) such as NIST, ISO27001, CIS (Center for Internet Security), OWASP and Cloud Controls Matrix (CCM) etc Knowledge of scripting and coding with languages such as Terraform, python, javascript, golang, bash and/or powershell Knowledge of Malware reverse engineering, threat detection and threat hunting. Computer science, engineering, or information technology related degree (although not a strict requirement) Holds one, or more, of the following certificates (or equivalent): - o Microsoft Certified: Azure Security Engineer Associate (AZ500) o Microsoft Certified: Security Operations Analyst Associate (SC-200) o Systems Security Certified Practitioner (SSCP) o Certified Cloud Security Professional (CCSP) o GIAC Certified Incident Handler (GCIH) o GIAC Security Operations Certified (GSOC) o CrowdStrike admin Certified A highly self-motivated and proactive individual who wants to learn and grow and has an attention to detail A great analyser, trouble-shooter and problem solver who understands security operations, programming languages and security architecture Highly organised and detail oriented. Ability to prioritise, multitask and work under pressure An individual who shows a willingness to go above and beyond in delighting the customer A good communicator who can explain security concepts to both technical and non-technical audiences About Rackspace Technology We are the multicloud solutions experts. We combine our expertise with the world’s leading technologies — across applications, data, and security — to deliver end-to-end solutions. We have a proven record of advising customers based on their business challenges, designing solutions that scale, building and managing those solutions, and optimizing returns into the future. Named a best place to work, year after year according to Fortune, Forbes, and Glassdoor, we attract and develop world-class talent. Join us on our mission to embrace technology, empower customers and deliver the future. More about Rackspace Technology Though we are all different, Rackers thrive through our connection to a central goal: to be a valued member of a winning team on an inspiring mission. We bring our whole selves to work every day. And we embrace the notion that unique perspectives fuel innovation and enable us to best serve our customers and communities around the globe. We welcome you to apply today and want you to know that we are committed to offering equal employment opportunity without regard to age, colour, disability, gender reassignment or identity or expression, genetic information, marital or civil partner status, pregnancy or maternity status, military or veteran status, nationality, ethnic or national origin, race, religion or belief, sexual orientation, or any legally protected characteristic. If you have a disability or special need that requires accommodation, please let us know. Show more Show less

Posted 5 days ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Linkedin logo

: When you join Verizon You want more out of a career. A place to share your ideas freely even if theyre daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What Youll Be Doing... The Threat Management Center (TMC) serves as the initial point of defense for Verizon's networks and information systems, safeguarding them against internal misconduct and cyber-attacks. The TMC Advanced Cyber Defense (TMC-ACD) team is tasked with responding to, investigating, hunting and managing all incidents. Collectively, the teams strive to protect Verizon's employees, customers, brand reputation, and revenue streams through proactive identification, response, and mitigation of potential threats that could adversely affect Verizon or its business partners. What Were Looking For... Verizon is looking for an innovative and motivated professional who will be responsible for safeguarding the Verizon enterprise. This individual will work on identified threats and will neutralize them through proactive hunting and detection, incident response and mitigation strategies, and ensure continuous operation of Verizons on-prem and cloud environments. The Digital Forensics & Incident Response role is an opportunity to work in a fast paced collaborative environment defending Verizon from current and future cyber threats. This position plays a critical role in Verizons enterprise computing defense. Executing the Incident Response Lifecycle to drive threat remediation and identify strategic countermeasures improving future defenses. Operating as a trusted advisor on threat analysis during incidents for incident management teams and other stakeholders by following cybersecurity response methodologies such as the NIST CyberSecurity Framework. Serving as a primary point of contact during assigned on-call shifts, responding promptly to incidents, escalations, and critical alerts to minimize downtime and mitigate risks to the enterprise. Deploying security tools and leveraging logs and endpoint forensic analysis in order to complete a detailed and accurate assessment of security alerts and threats affecting the Verizon enterprise and cloud infrastructure. Assisting with the development of security controls for multiple platforms via automated capabilities by using advanced analysis and forensic techniques. Driving identification, analysis, and remediation activities to ensure compliance with relevant regulatory requirements, industry standards, and best practices related to security and data privacy. Providing assistance and analytical evaluations for high-priority and significant security incidents, including composing extensive and comprehensive analysis summaries and facilitating incident-related discussions. Identifying gaps in detections and collaborating with teams across Cyber Security to mitigate threats and improve the overall security posture. Recommending ways to mature and advance the preventive and defensive capabilities of the TMC. This includes leveraging data and knowledge to clearly communicate the use case for alert creation. Collaborating with cross-functional teams to respond, identify, and analyze the root cause of a cybersecurity incident. Conducting risk assessments, in-depth analysis, and forensic investigations to determine the root cause and impact of incidents. Enhancing, and/or implementing DFIR playbooks to ensure cohesive response repeatability. Assisting with producing operational read-outs and case reviews for peers and leadership that accurately capture the effectiveness of the DFIR organization. Continuously honing to build and maintain knowledge, skills, and abilities needed to maintain proficiency in producing thorough and accurate digital forensic analysis. Enhancing techniques, workflows and processes of security controls, compliance assessments, and DFIR procedures to drive the TMC operational and strategic growth (continuous improvement). Where you'll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Youll Need To Have Bachelor's degree or four or more years of work experience. Four or more years of relevant experience required, demonstrated through work experience and/or military experience. Experience working in Digital Forensic, Incident Response, and/or a Security Operations Center (SOC) environment(s). Even better if you have one or more of the following: Awareness of cyber based adversarial frameworks including MITRE ATT&CK and Lockheed Martins Cyber Kill Chain. Proficient knowledge of the cyber threat landscape including types of adversaries, campaigns, and the motivations that drive them. Experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents. Programming and Scripting Experience to enhance automations, ad-hoc forensic analysis and speed-up response times. Previous experience with log aggregation platforms such as Splunk, Elastic, Snowflake, LogRhythm, etc. Proficient in understanding Operating Systems and their architectures: Windows, Unix/Linux, and MacOS Operating Systems. Demonstrates leadership and mentoring skills to help advance the overall capabilities of the TMC organization. Ability to work in a highly collaborative environment needing strong communication, presentation, and leadership-like skills. Exhibits initiative, follow-up and follow through with commitments. Certifications like: Network , Security , CISSP, EnCE, CFCE, C|EH, C|HFI, GCFA, GCFE, GCIH and/or cloud-specific security certifications (e.g. AWS Certified Security - Specialty, Microsoft Certified: Azure Security Engineer Associate, Google Cloud Certified Professional Cloud Security Engineer). If Verizon and this role sound like a fit for you, we encourage you to apply even if you dont meet every even better qualification listed above. #CISO Where youll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Locations Hyderabad, India Chennai, India Show more Show less

Posted 1 week ago

Apply

6.0 years

0 Lacs

Andaman and Nicobar Islands, India

On-site

Linkedin logo

Rockwell Automation is a global technology leader focused on helping the world’s manufacturers be more productive, sustainable, and agile. With more than 28,000 employees who make the world better every day, we know we have something special. Behind our customers - amazing companies that help feed the world, provide life-saving medicine on a global scale, and focus on clean water and green mobility - our people are energized problem solvers that take pride in how the work we do changes the world for the better. We welcome all makers, forward thinkers, and problem solvers who are looking for a place to do their best work. And if that’s you we would love to have you join us! Job Description Job Summary: In this role, you will be an integral part of the IT organization. The candidate need to have a demonstrated understanding of Information Security, Computer Networking, the Software Development Life Cycle (SDLC) and an extensive experience in interacting with customers. Candidate must have Security Information and Event Management (SIEM) expertise and be willing to get trained on the company platform and products. You will report to the Cyber Security Manager. Your Responsibilities This is a technical, hands-on role to focus on maintaining the SIEM platform, working with team members and stakeholders as well as training and enabling teams for successful adoption of the SIEM platform. Manage platform, agent, and app\add-on log source integration upgrades. Develop alerts, reports, data models, dashboards, and connectors to support custom user requirements. Recognise patterns and inconsistencies that could indicate complex cyber-attacks. Develop SIEM correlation rules to detect new threats beyond current capabilities. Assist with designing and documenting work processes. Perform log file analysis as and when required. Develop recommendations in collaboration with other team members to maximise Enterprise capabilities in prevention, detection, analysis, containment, eradication, and recovery from cyber-attacks. Contribute to CTI (Cyber Threat Intelligence) data gathering, reporting, and analysis activities. Leverage automation and orchestration solutions to automate repetitive tasks. Research and explore new avenues to by using the latest technologies and cybersecurity standards. The Essentials - You Will Have Bachelor's degree in cyber security, Computer Science, Information Systems, Software Engineering, Computer Engineering or related field, or equivalent work experience. Typically requires a minimum of 6 years of experience in the Information Security field. 1+ years of experience in SIEM and UEBA solutions such as Splunk, LogRhythm and Elastic. Understanding of log collection methodologies and aggregation techniques such as Syslog, NXlog and Windows Event Forwarding. Working knowledge of cloud platforms such as AWS, Azure and GCP. The Preferred - You Might Also Have Strong knowledge of at least one programming or scripting language (ex. Python, PowerShell, PHP, Perl) is preferrable. Understanding of security models and frameworks (ex. MITRE ATT&CK, MITRE D3FEND, Cyber Kill Chain (CKC)). Demonstrated experience providing customer-driven solutions or service. Ability to communicate effectively with all levels of an organisation from Engineering, Operations to C-level audiences. Security certifications (Security+, GSEC, GCIH, GCIA, CISSP, NCSF etc.) will be an added advantage. Sentinel and Datalake experience are preferrable. Familiar with Risk-based Alerting (RBA) frameworks and implementation. Experienced in architecting, planning, deploying, and using SIEM or UEBA platforms. Experienced in integrating or using endpoint security and host-based intrusion detection solutions. Extensive knowledge and understanding of directory services. Demonstrated experience in one of the following fields Cyber Threat Intelligence, Incident Response, or Computer Forensics is preferrable. Having solid knowledge of one or more programming or scripting language such as Python, PowerShell, PHP and Perl is preferrable. What We Offer Our benefits package includes … Comprehensive mindfulness programmes with a premium membership to Calm. Volunteer Paid Time off available after 6 months of employment for eligible employees. Company volunteer and donation matching programme – Your volunteer hours or personal cash donations to an eligible charity can be matched with a charitable donation. Employee Assistance Program. Personalised wellbeing programmes through our OnTrack programme. On-demand digital course library for professional development. and other local benefits! At Rockwell Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles. Rockwell Automation’s hybrid policy aligns that employees are expected to work at a Rockwell location at least Mondays, Tuesdays, and Thursdays unless they have a business obligation out of the office. Show more Show less

Posted 1 week ago

Apply

7.0 - 9.0 years

0 Lacs

Thiruvananthapuram

On-site

7 - 9 Years 1 Opening Kochi, Trivandrum Role description L2 SOC Lead Experience : 7 to 9 years Location : Bangalore/Trivandrum/Kochi Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence Cyberproof is looking to hire a L2 team Lead for managing the existing shared services team. Role Proficiency: SOC Analyst L2 is an operational role, focusing on ticket quality and security incident deeper investigation and will be responsible to handle the escalated incidents from Level 1 team within SLA. The lead will be responsible for quality and ensuring processes are defined globally across all customers in Cyberproof. Responsibilities: SOC Analyst L2 would work closely with SOC L1 team, L3 team & customer and responsible for performing deeper analysis and need to interact with client in daily calls and need to take the responsibility of handling the True Positive incidents on time. When L1 escalates an incident to L2, need to conduct more analysis and, if needed, escalate to the customer/L3 team, or L2 analyst must advise L1 team members until the incident is resolved. Perform deep analysis to security incidents to identify the full kill chain Handle L2 and above level technical escalations from L1 Operations team and resolve within SLA. Identify the security gaps and need to recommend new rules/solution to L3/Customer Need to suggest finetuning for existing rules based on the high count/wherever required Create and manage the Incident handling playbook, process runbooks and ad-hoc documents whenever needed Respond to clients’ requests, concerns, and suggestions Proactively support L1 team during an incident. Performs and reviews tasks as identified in a daily task list. Ready to work in 24x7 rotational shift model including night shift Incident detection, triage, analysis and response. Coordinating with customers for their security related problems and providing solutions. Share knowledge to other analysts in their role and responsibilities Provide knowledge transfer to L1 such as advance hunting techniques, guides, cheat sheets etc Knowledge Experience: Experience of Managing L2 resources in a multi-location basis. Minimum of 3 years of experience in Cyber security, SOC At least 2 years of working in the SOC Proficient in Incident Management and Response Experience in leading a team of more than 9 analysts Experience in searching and log analysis in at least 2 of the below SIEM tools or more than 3 SIEM in total: Sentinel, QRadar, Splunk, LogRhythm, Google Chronicle Experience in analysis and response in at least 2 of the below EDR tools or more than 3 EDR in total:Crowd strike, MS Defender, Carbon Black, Cybereason, Sentinel One In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc. Up to date in cyber security and incidents; intermediate understanding of enterprise IT Infrastructure including Networks Firewalls OS Databases Web Applications etc. Understanding of ISMS principles and guidelines; relevant frameworks (e.g. ISO27001) Desirable – Training / Certification in Ethical Hacking/SIEM Tool etc. Additional Desired Skills: Strong verbal and written English communication Strong interpersonal and presentation skills Ability to work with minimal levels of supervision Responsible for working in a 24x7 Security Operation centre (SOC) environment. Essential Skills: Knowledge and hands-on experience with Azure Sentinel, Microsoft 365 Defender, Microsoft Defender for Cloud Apps & Identity Protection. Continuous Learning innovation and optimization: Ensure completion of learning programs as suggested by Managers Suggest ideas that will help innovation and optimization of processes. Help develop the ideas into proposals. Provide suggestions to reduce the manual work Teamwork Assist L1 team members where possible. About UST UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to operation. With deep domain expertise and a future-proof philosophy, UST embeds innovation and agility into their clients’ organizations. With over 30,000 employees in 30 countries, UST builds for boundless impact—touching billions of lives in the process.

Posted 1 week ago

Apply

6.0 years

4 - 6 Lacs

Bengaluru

On-site

Rockwell Automation is a global technology leader focused on helping the world’s manufacturers be more productive, sustainable, and agile. With more than 28,000 employees who make the world better every day, we know we have something special. Behind our customers - amazing companies that help feed the world, provide life-saving medicine on a global scale, and focus on clean water and green mobility - our people are energized problem solvers that take pride in how the work we do changes the world for the better. We welcome all makers, forward thinkers, and problem solvers who are looking for a place to do their best work. And if that’s you we would love to have you join us! Job Description Job Summary: In this role, you will be an integral part of the IT organization. The candidate need to have a demonstrated understanding of Information Security, Computer Networking, the Software Development Life Cycle (SDLC) and an extensive experience in interacting with customers. Candidate must have Security Information and Event Management (SIEM) expertise and be willing to get trained on the company platform and products. You will report to the Cyber Security Manager. Your Responsibilities: This is a technical, hands-on role to focus on maintaining the SIEM platform, working with team members and stakeholders as well as training and enabling teams for successful adoption of the SIEM platform. Manage platform, agent, and app\add-on log source integration upgrades. Develop alerts, reports, data models, dashboards, and connectors to support custom user requirements. Recognise patterns and inconsistencies that could indicate complex cyber-attacks. Develop SIEM correlation rules to detect new threats beyond current capabilities. Assist with designing and documenting work processes. Perform log file analysis as and when required. Develop recommendations in collaboration with other team members to maximise Enterprise capabilities in prevention, detection, analysis, containment, eradication, and recovery from cyber-attacks. Contribute to CTI (Cyber Threat Intelligence) data gathering, reporting, and analysis activities. Leverage automation and orchestration solutions to automate repetitive tasks. Research and explore new avenues to by using the latest technologies and cybersecurity standards. The Essentials - You Will Have: Bachelor's degree in cyber security, Computer Science, Information Systems, Software Engineering, Computer Engineering or related field, or equivalent work experience. Typically requires a minimum of 6 years of experience in the Information Security field. 1+ years of experience in SIEM and UEBA solutions such as Splunk, LogRhythm and Elastic. Understanding of log collection methodologies and aggregation techniques such as Syslog, NXlog and Windows Event Forwarding. Working knowledge of cloud platforms such as AWS, Azure and GCP. The Preferred - You Might Also Have: Strong knowledge of at least one programming or scripting language (ex. Python, PowerShell, PHP, Perl) is preferrable. Understanding of security models and frameworks (ex. MITRE ATT&CK, MITRE D3FEND, Cyber Kill Chain (CKC)). Demonstrated experience providing customer-driven solutions or service. Ability to communicate effectively with all levels of an organisation from Engineering, Operations to C-level audiences. Security certifications (Security+, GSEC, GCIH, GCIA, CISSP, NCSF etc.) will be an added advantage. Sentinel and Datalake experience are preferrable. Familiar with Risk-based Alerting (RBA) frameworks and implementation. Experienced in architecting, planning, deploying, and using SIEM or UEBA platforms. Experienced in integrating or using endpoint security and host-based intrusion detection solutions. Extensive knowledge and understanding of directory services. Demonstrated experience in one of the following fields Cyber Threat Intelligence, Incident Response, or Computer Forensics is preferrable. Having solid knowledge of one or more programming or scripting language such as Python, PowerShell, PHP and Perl is preferrable. What We Offer: Our benefits package includes … Comprehensive mindfulness programmes with a premium membership to Calm. Volunteer Paid Time off available after 6 months of employment for eligible employees. Company volunteer and donation matching programme – Your volunteer hours or personal cash donations to an eligible charity can be matched with a charitable donation. Employee Assistance Program. Personalised wellbeing programmes through our OnTrack programme. On-demand digital course library for professional development. ... and other local benefits! At Rockwell Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles. #LI-Hybrid #LI-RS1 Rockwell Automation’s hybrid policy aligns that employees are expected to work at a Rockwell location at least Mondays, Tuesdays, and Thursdays unless they have a business obligation out of the office.

Posted 1 week ago

Apply

0 years

0 Lacs

Chennai

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. CMS-TDR Senior As part of our EY-cyber security team, who shall work as SME for Microsoft Sentinel solutions in TDR team The opportunity We’re looking for Senior Consultant with expertise in Cloud Security solutions. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Your key responsibilities Architecting and implementation of cloud security monitoring platforms MS Sentinel Provide consulting to customers during the testing, evaluation, pilot, production, and training phases to ensure a successful deployment. Perform as the subject matter expert on Cloud Security solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. Securing overall cloud environments by applying cybersecurity tools and best practices Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. Content development which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Skills and attributes for success Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities. Expertise in content management in MS Sentinel Good knowledge in threat modelling. Experience in creating use cases under Cyber kill chain and Mitre attack framework Expertise in integrating critical devices/applications including unsupported (in-house built) by creating custom parsers Below mentioned experiences/expertise on Sentinel Develop a migration plan from Splunk/QRadar/LogRhythm to MS Sentinel Deep understanding of how to implement best practices for designing and securing Azure platform Experiencing advising on Microsoft Cloud Security capabilities across Azure platform Configure data digestion types and connectors Analytic design and configuration of the events and logs being digested Develop, automate, and orchestrate tasks(playbooks) with logic apps based on certain events Configure Sentinel Incidents, Workbooks, Hunt queries, Notebooks Experience in other cloud native security platforms like AWS and GCP is a plus Scripting knowledge (Python, Bash, PowerShell) Extensive knowledge of different security threats Good knowledge and experience in Security Monitoring Good knowledge and experience in Cyber Incident Response To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Demonstrate both technical acumen and critical thinking abilities. Strong interpersonal and presentation skills. Certification in Azure (any other cloud vendor certification is a plus) Ideally, you’ll also have People/Project management skills. What working at EY offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 week ago

Apply

3.0 - 5.0 years

0 - 0 Lacs

India

On-site

Development, implementation, monitoring, maintenance, and management of threats, security controls, processes, procedures and systems. Provides trusted advisor overview and management for information security projects and technical requirements. Provides threat management support for firewalls, intrusion detection systems, enterprise anti-virus, web application firewalls, and log monitoring tools. Manages internal/external vulnerability management program and oversight for code reviews or application security scan reviews as part of the Application Security management program. Manages the company’s Incident Response process in coordination with managed SOC vendor to monitor and respond to security alerts from all assets storing, processing, transmitting company confidential/sensitive data including PCI and PII data assets. Provides technical expertise in support of information technology assessments, penetration tests, and/or audits (PCI/SOX/HIPAA/other) of organizational automated systems and processes and will play a critical role in designing, maintaining and enhancing our organization's cybersecurity posture. Works closely with cross-functional teams to identify and implement robust security measures, detect, and respond to security incidents, and ensure the overall integrity and confidentiality of our systems and data. Essential Duties and Responsibilities Other duties may be assigned. In the event of absence, duties for this position will be overseen by the position to which it reports. Conducts analysis, develops technical and programmatic assessments, evaluates security engineering and integration initiatives and provides technical support to facilitate compliance with security policies, procedures, standards and guidelines. Identifies security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives. Analyze and review recent industry breaches for preventive cyber breach strategies. Provide threat intelligence research related to malware/virus identification. Responsible for reviewing and approving corporate, PCI In-scope firewall requests and WAF changes; perform WAF tuning as necessary. Monitor, report, and aid in the resolution of all security-related problems and discrepancies by monitoring assigned systems, maintaining documentation and provide management and any other appropriate areas with reporting as requested. Manage WAF, intrusion detection systems and in coordination with vendor SOC, ensure sufficient coverage to monitor PCI, PII, and all other assets storing, processing, transmitting company confidential/sensitive data. Ensure alerts from current and future systems are properly designed and monitored. Manage internal/external vulnerability management program and as appropriate expand scope of vulnerability scans, application/network penetration tests to cover enterprise and all systems/environments storing, processing, transmitting company confidential/sensitive data. Monitor intelligence sources for newly identified vulnerabilities, evaluate the risk such vulnerabilities pose to the organization's information and systems, and advise management of appropriate measures to eliminate or reduce the organization's risk or exposure to such vulnerabilities. Performs both internal/external vulnerability scanning and penetration testing. Analyzes information from those scans, as well as penetration tests, to mitigate and help IT stakeholders address system vulnerabilities. Provide technical support/oversight for code reviews or App scan reviews as part of Application Security management program. Provide technical support/oversight for security exception request process. Provide technical support for incident management and forensics. Monitor appropriate industry sources to maintain awareness of new security tools and techniques and research those tools and techniques that have the potential to improve the organization's ability to protect its information and infrastructure. Assist in the development of appropriate information security policies, standards, procedures, checklists, and guidelines using generally-recognized security concepts tailored to meet the requirements of the organization. Provide expertise to support timely resolution of findings from information technology assessments, penetration tests, and/or audits of organizational automated systems and processes; as appropriate, develop and communicate recommendations for improvement to management. Provide reporting metrics/create and maintain dashboards for department functions. Proficient in the use of Word, Excel. Assist manager/director in planning, time budgeting and scheduling work for completion. Participate in opportunities that enhance personal and professional growth and the accomplishment of career objectives through continuing education, seminars and participation in field-related professional organizations. Accountable for execution of assigned tasks from start to finish, while fully leveraging the disciplines expected of a cybersecurity engineer according to department standards, procedures and processes. Stay current with emerging issues affecting the Cybersecurity profession. Qualifications (Include Education and Specific Experience) Strong understanding of data network configuration and infrastructure concepts, including TCP/IP, DNS, routers, firewalls, web servers and security hierarchy including the application of encryption key infrastructures and authentication processes. Knowledge of cloud security concepts (Azure/AWS). Strong experience with IT security standards and best practice frameworks. (like ISO 27001/27002, NIST/NIST CSF, ITIL, PCI, SOX) In depth experience working with internet and web application security frameworks like SANS, OWASP. Detailed technical knowledge of hardening concepts and audit for Unix, Linux, Windows servers and desktop systems, AWS EC2 instances. Excellent understanding of common application, network, and operating system vulnerabilities, current threat vectors and mitigations. Strong working knowledge of networking, routing, protocols, ports and services. Working knowledge of System Information Event Monitoring (SIEM), Intrusion Detection and Prevention System (IDS/IPS), web application firewalls, vulnerability scanning tools, encryption capabilities, Network Access Controls (NAC), Data Loss Prevention (DLP), NMAP, Vulnerability scanners, Wireshark, and other security related tools Experience working with leading security WAF like Akamai, Cloudflare. Experience working with logging and file integrity monitoring tools like LogRhythm, NXLog, Splunk. Demonstrated experience in conducting security assessments. Demonstrated experience in investigating security issues related to Internet, server, desktop, laptop, tablet, and other mobile device security issues; OS patching, hardening and anti-virus. Ability to work with subject matter experts and 3rd party MSSP to coordinate activities to complete security related projects or tasks in a timely manner. Proficient with programming logic concepts, scripting experience (like Python, JavaScript, PowerShell) Strong communication and teamwork skills to collaborate with cross-functional teams and convey complex security concepts to non-technical stakeholders. Security certifications like CEH or CISSP are desired. • Bachelor’s degree in Computer Science, Information Security Management, Engineering or equivalent is required. • 3-5 years of experience in network and application security in a multiple operating system environment. Job Type: Full-time Pay: ₹7,000.00 - ₹20,000.00 per month Schedule: Monday to Friday Night shift US shift Work Location: In person

Posted 1 week ago

Apply

7.0 - 9.0 years

0 Lacs

Kochi, Kerala, India

On-site

Linkedin logo

Role Description L2 SOC Lead Experience : 7 to 9 years Location : Bangalore/Trivandrum/Kochi Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence Cyberproof is looking to hire a L2 team Lead for managing the existing shared services team. Role Proficiency SOC Analyst L2 is an operational role, focusing on ticket quality and security incident deeper investigation and will be responsible to handle the escalated incidents from Level 1 team within SLA. The lead will be responsible for quality and ensuring processes are defined globally across all customers in Cyberproof. Responsibilities SOC Analyst L2 would work closely with SOC L1 team, L3 team & customer and responsible for performing deeper analysis and need to interact with client in daily calls and need to take the responsibility of handling the True Positive incidents on time. When L1 escalates an incident to L2, need to conduct more analysis and, if needed, escalate to the customer/L3 team, or L2 analyst must advise L1 team members until the incident is resolved. Perform deep analysis to security incidents to identify the full kill chain Handle L2 and above level technical escalations from L1 Operations team and resolve within SLA. Identify the security gaps and need to recommend new rules/solution to L3/Customer Need to suggest finetuning for existing rules based on the high count/wherever required Create and manage the Incident handling playbook, process runbooks and ad-hoc documents whenever needed Respond to clients’ requests, concerns, and suggestions Proactively support L1 team during an incident. Performs and reviews tasks as identified in a daily task list. Ready to work in 24x7 rotational shift model including night shift Incident detection, triage, analysis and response. Coordinating with customers for their security related problems and providing solutions. Share knowledge to other analysts in their role and responsibilities Provide knowledge transfer to L1 such as advance hunting techniques, guides, cheat sheets etc Knowledge Experience Experience of Managing L2 resources in a multi-location basis. Minimum of 3 years of experience in Cyber security, SOC At least 2 years of working in the SOC Proficient in Incident Management and Response Experience in leading a team of more than 9 analysts Experience in searching and log analysis in at least 2 of the below SIEM tools or more than 3 SIEM in total: Sentinel, QRadar, Splunk, LogRhythm, Google Chronicle Experience in analysis and response in at least 2 of the below EDR tools or more than 3 EDR in total:Crowd strike, MS Defender, Carbon Black, Cybereason, Sentinel One In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc. Up to date in cyber security and incidents; intermediate understanding of enterprise IT Infrastructure including Networks Firewalls OS Databases Web Applications etc. Understanding of ISMS principles and guidelines; relevant frameworks (e.g. ISO27001) Desirable – Training / Certification in Ethical Hacking/SIEM Tool etc. Additional Desired Skills Strong verbal and written English communication Strong interpersonal and presentation skills Ability to work with minimal levels of supervision Responsible for working in a 24x7 Security Operation centre (SOC) environment. Essential Skills Knowledge and hands-on experience with Azure Sentinel, Microsoft 365 Defender, Microsoft Defender for Cloud Apps & Identity Protection. Continuous Learning Innovation And Optimization Ensure completion of learning programs as suggested by Managers Suggest ideas that will help innovation and optimization of processes. Help develop the ideas into proposals. Provide suggestions to reduce the manual work Teamwork Assist L1 team members where possible. Show more Show less

Posted 1 week ago

Apply

30.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Job Description ORACLE: As the provider of the world’s most complete, open and integrated business software and hardware systems, Oracle is dedicated to unleashing innovation by simplifying IT. With more than 30 years of information technology innovation, Oracle is the recognized industry leader in enterprise application and technology solutions. ORACLE CLOUD: Oracle Cloud is a Generation 2 enterprise cloud that delivers powerful compute and networking performance, a comprehensive portfolio of infrastructure and platform cloud services, and the world’s only self-driving autonomous database. Built from the ground up to meet the needs of mission-critical applications, Oracle Cloud supports all legacy workloads while delivering modern cloud development tools—so enterprises can bring their past and build their future. The comprehensive nature of Oracle Cloud is a key selection consideration for customers. Oracle has the broadest cloud portfolio in the industry, delivering a complete range of production-level, cross-functional business applications for each part of an organization with information and data shared seamlessly across Oracle Cloud Applications and other systems. Business users have the latest innovations at their fingertips across sales and marketing, customer service, finance and accounting, supply chain management, human capital and talent management—all enriched with social engagement and collaboration tools and an intuitive user interface that works on any mobile device. These applications have been architected on a modern and open cloud platform and infrastructure to simplify integration needs and lower an organization’s total cost of ownership. With such extensive functionality across business processes, customers can solve their business problems with complete solutions that give them end-to-end execution and complete visibility. Oracle IaaS is clearly differentiated, being far more performant, more secure, more reliable and cost efficient as compared to others in the market. Oracle has fundamentally innovated in the IaaS space and continues to gain market share aggressively. Oracle PaaS is anchored by Oracle Autonomous Database (ADB), which offers the most innovative “self-driving” capabilities in the data tier in the marketplace. Combine with ADB, Oracle cloud also offers a complete application development platform that includes app dev, security, integration, identity management, analytics, big data and AI/ML amongst other far broader capabilities. Partners with customers, sales, engineering and product teams to design, demonstrate and deploy Oracle Cloud architectures that address customer business problems. Drives Oracle Cloud customer consumption by accelerating the adoption of Oracle cloud services including discovery, design and deployment. Engages with strategic customers, builds leadership relationships at multiple levels within organizations in order to design and implement solutions. Works directly with customers to gather requirements, develop architectures and translates business needs into solutions. May implement solutions and ensure successful deployments through code development and scripting. Displays product/application understanding through highly customized presentation demonstrations to customers, and at conferences, and events. Supports customer from Proof of Concept (POC) through production deployment of services via resource configuration, planning, and customer education/training. Creates and distributes technical assets (white papers, solution code, blog posts, and video demonstrations). Serves as a leading contributor for customers and sales on technical cloud solutions and customer success. Identifies gaps and enhancements to influence engineering roadmaps for customer driven features. Leading contributor, may provide direction and mentoring to others. Work is non-routine and very complex, involving the application of advanced technical/business skills in area of specialization. May interact with C level. Maintains expertise by staying current on emerging technologies. Minimum qualifications include: 8 years experience with computer applications and tools required. Preferred but not required qualifications include: Bachelor of Science-level university degree in Computer Science, Math, Engineering from accredited university; and/or relevant 8 years technical experience. Advanced degree in relevant field of studies highly desirable. Expertise in and an in depth and thorough knowledge of competitive and industry knowledge in the field of computer applications and tools; System and application design; Implementation of advanced product features; Project management; Solving technical problems with customers in technical environments; Written and verbal communication and interpersonal skills; Needs analysis, positioning, and business justification. 8 years experience and expertise in the clear communication of technical information to others through presentations, demonstrations, written communication and consultative solutioning experience. Career Level - IC4 Responsibilities Come and join us! We are seeking a deeply technical individual to join our team where they will both lead and contribute to delivery of customer focused projects that involve migrating existing workloads to Oracle Cloud and building completely new architectures to support net new workloads in Oracle’s cloud. Project technology stacks we work with include existing legacy / On Premises software, Oracle’s Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) services, and other competitive technologies. While much of the focus of this role will revolve around delivery of identity and related cloud security technologies, a large portion of the work will also involve adjacencies including securing and configuring tenancies, networking, encryption and key or Certificate Management, Web Application Firewalls, SIEM technologies, vulnerability scanning, etc. While also interacting directly with customers the role involves regular work with the development organization to drive product improvements and innovations. This is a senior technical Cloud Delivery role, so the Cloud technical experience is the higher priority. A Cloud Security Engineer in our team is responsible for successful implementation of non-routine and complex business solutions ensuring high quality and timely delivery within budget to the customers’ happiness. Analyze business needs to help ensure Oracle’s solution meets the customers objectives by combining industry standard methodologies and product knowledge. Effectively applies Oracle’s methodologies and policies while adhering to contractual obligations, thereby minimizing Oracle’s risk and exposure. Exercises judgment and business acumen in selecting methods and techniques for effective project delivery on small to medium engagements. Provides direction and mentoring to junior resources on the delivery team. Ensures deliverables are acceptable and works closely with the Project Management Team to understand and manage project expectations. Collaborates with the consulting/delivery sales team by providing domain credibility. Helps with Technical solution scoping of project Comfortable working in a matrix management environment. Good communication skills to deal with internal collaborators, customers, and vendors. This individual should have a solid technical background and excellent problem-solving skills. Qualifications Individual should possess a deep knowledge of: Cloud or mobile security including OAuth, OpenID Connect, SAML federation, Single Sign-On. MFA and strong authentication. Identity management / governance, and provisioning. OR alternatively: Configuration of a secure tenancy in OCI, AWS, Azure, or GCP. Use and configuration of services such as OCI Cloud Guard, AWS Control Tower, Azure Security Center. Use and configuration of SIEM systems such as Splunk, QRadar, or LogRhythm. In addition to the above knowledge of fundamental enabling technologies including: Secure coding practices Network security SSL / TLS Encryption Key Management Certificate Management Intrusion Detection and Prevention Systems Data Loss Prevention Minimum Qualifications Minimum of 10 years of experience in progressively responsible information technology including. 5+ years of experience in developing, implementing, or architecting information systems 3+ years technical architecture experience integrating identity and access management software into cloud infrastructure and applications 2+ years experience in managing the security aspect of cloud deployments in OCI/Azure/AWS/GCP OR deployments of at least one identity and access management product such as: Oracle OAM/OIM/OVD/OID, CA/Netegrity SiteMinder/IdentityMinder/TransactionMinder, IBM Tivoli Identity Manager and/or Access Manager, Sun Identity Manager and/or Access Manager, Ping Access and/or Ping Federate, or similar Experience developing identity management strategies, architectures and implementation plans Experience with at least one of the following development environments/languages: Java / J2EE, Python, JavaScript, C#, c/C++ Preferred Experience And Qualifications Cloud Security Posture Management. Mobile Security. Cloud Security. Single Sign On. Enterprise Directory Architecture and Design including directory schema, namespace and replication topology experience. Resource Provisioning. Role Base Access Control. Experience with BEA WebLogic, IBM WebSphere or Tomcat. Hands on experience: (1) working with Oracle OCI, AWS, Azure or other major cloud providers, and (2) with Python programming and unit testing such as PyTest. Experience with Infrastructure as code concepts and CI/CD pipelines. Experience with DevOps concepts and Agile software development practices. Great documentational skills and approach of design and document first. Experience operating in a Linux/Unix environment. OCI certification highly desirable. Experience with one or more directories such as Active Directory, IBM Directory Server, SunONE Directory Server and Novell e-Directory. Familiarity with major operating systems, such as Microsoft Windows and Unix; mainframe security packages such as TopSecret, ACF2 and RACF; and/or leading packaged application solutions for ERP systems, CRM systems or portals. Solid understanding of virtual directories(e.g. Radiant Logic and OctetString). Familiarity with federated identity concepts (i.e. SAML, OAuth, OpenID Connect, WS-Federation). Familiarity with REST security concepts including OAuth, JSON, JWE, JWS, JWT, as well as others. Familiarity with web services security concepts such as SAML, WS-Security, XML-Sec. Experience leading business requirements gathering and translating those into system requirements. Experience facilitating business process design as it relates to managing identities and access privileges. Experience developing identity management governance plans. Understanding of current regulatory environment and related implications to identity management and security/audit compliance. Comfort with sophisticated, constantly evolving software development environments. Ability to learn new technologies quickly. Experience using distributed source code management systems (e.g. Git). Experience using ticket tracking systems (i.e. JIRA). Experience working with geographically distributed teams. Does this sound like you? If so, we hope to meet you! Qualifications Career Level - IC4 About Us As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s challenges. We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That’s why we’re committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_mb@oracle.com or by calling +1 888 404 2494 in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law. Show more Show less

Posted 1 week ago

Apply

30.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Description ORACLE: As the provider of the world’s most complete, open and integrated business software and hardware systems, Oracle is dedicated to unleashing innovation by simplifying IT. With more than 30 years of information technology innovation, Oracle is the recognized industry leader in enterprise application and technology solutions. ORACLE CLOUD: Oracle Cloud is a Generation 2 enterprise cloud that delivers powerful compute and networking performance, a comprehensive portfolio of infrastructure and platform cloud services, and the world’s only self-driving autonomous database. Built from the ground up to meet the needs of mission-critical applications, Oracle Cloud supports all legacy workloads while delivering modern cloud development tools—so enterprises can bring their past and build their future. The comprehensive nature of Oracle Cloud is a key selection consideration for customers. Oracle has the broadest cloud portfolio in the industry, delivering a complete range of production-level, cross-functional business applications for each part of an organization with information and data shared seamlessly across Oracle Cloud Applications and other systems. Business users have the latest innovations at their fingertips across sales and marketing, customer service, finance and accounting, supply chain management, human capital and talent management—all enriched with social engagement and collaboration tools and an intuitive user interface that works on any mobile device. These applications have been architected on a modern and open cloud platform and infrastructure to simplify integration needs and lower an organization’s total cost of ownership. With such extensive functionality across business processes, customers can solve their business problems with complete solutions that give them end-to-end execution and complete visibility. Oracle IaaS is clearly differentiated, being far more performant, more secure, more reliable and cost efficient as compared to others in the market. Oracle has fundamentally innovated in the IaaS space and continues to gain market share aggressively. Oracle PaaS is anchored by Oracle Autonomous Database (ADB), which offers the most innovative “self-driving” capabilities in the data tier in the marketplace. Combine with ADB, Oracle cloud also offers a complete application development platform that includes app dev, security, integration, identity management, analytics, big data and AI/ML amongst other far broader capabilities. Partners with customers, sales, engineering and product teams to design, demonstrate and deploy Oracle Cloud architectures that address customer business problems. Drives Oracle Cloud customer consumption by accelerating the adoption of Oracle cloud services including discovery, design and deployment. Engages with strategic customers, builds leadership relationships at multiple levels within organizations in order to design and implement solutions. Works directly with customers to gather requirements, develop architectures and translates business needs into solutions. May implement solutions and ensure successful deployments through code development and scripting. Displays product/application understanding through highly customized presentation demonstrations to customers, and at conferences, and events. Supports customer from Proof of Concept (POC) through production deployment of services via resource configuration, planning, and customer education/training. Creates and distributes technical assets (white papers, solution code, blog posts, and video demonstrations). Serves as a leading contributor for customers and sales on technical cloud solutions and customer success. Identifies gaps and enhancements to influence engineering roadmaps for customer driven features. Leading contributor, may provide direction and mentoring to others. Work is non-routine and very complex, involving the application of advanced technical/business skills in area of specialization. May interact with C level. Maintains expertise by staying current on emerging technologies. Minimum qualifications include: 8 years experience with computer applications and tools required. Preferred but not required qualifications include: Bachelor of Science-level university degree in Computer Science, Math, Engineering from accredited university; and/or relevant 8 years technical experience. Advanced degree in relevant field of studies highly desirable. Expertise in and an in depth and thorough knowledge of competitive and industry knowledge in the field of computer applications and tools; System and application design; Implementation of advanced product features; Project management; Solving technical problems with customers in technical environments; Written and verbal communication and interpersonal skills; Needs analysis, positioning, and business justification. 8 years experience and expertise in the clear communication of technical information to others through presentations, demonstrations, written communication and consultative solutioning experience. Career Level - IC4 Responsibilities Come and join us! We are seeking a deeply technical individual to join our team where they will both lead and contribute to delivery of customer focused projects that involve migrating existing workloads to Oracle Cloud and building completely new architectures to support net new workloads in Oracle’s cloud. Project technology stacks we work with include existing legacy / On Premises software, Oracle’s Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) services, and other competitive technologies. While much of the focus of this role will revolve around delivery of identity and related cloud security technologies, a large portion of the work will also involve adjacencies including securing and configuring tenancies, networking, encryption and key or Certificate Management, Web Application Firewalls, SIEM technologies, vulnerability scanning, etc. While also interacting directly with customers the role involves regular work with the development organization to drive product improvements and innovations. This is a senior technical Cloud Delivery role, so the Cloud technical experience is the higher priority. A Cloud Security Engineer in our team is responsible for successful implementation of non-routine and complex business solutions ensuring high quality and timely delivery within budget to the customers’ happiness. Analyze business needs to help ensure Oracle’s solution meets the customers objectives by combining industry standard methodologies and product knowledge. Effectively applies Oracle’s methodologies and policies while adhering to contractual obligations, thereby minimizing Oracle’s risk and exposure. Exercises judgment and business acumen in selecting methods and techniques for effective project delivery on small to medium engagements. Provides direction and mentoring to junior resources on the delivery team. Ensures deliverables are acceptable and works closely with the Project Management Team to understand and manage project expectations. Collaborates with the consulting/delivery sales team by providing domain credibility. Helps with Technical solution scoping of project Comfortable working in a matrix management environment. Good communication skills to deal with internal collaborators, customers, and vendors. This individual should have a solid technical background and excellent problem-solving skills. Qualifications Individual should possess a deep knowledge of: Cloud or mobile security including OAuth, OpenID Connect, SAML federation, Single Sign-On. MFA and strong authentication. Identity management / governance, and provisioning. OR alternatively: Configuration of a secure tenancy in OCI, AWS, Azure, or GCP. Use and configuration of services such as OCI Cloud Guard, AWS Control Tower, Azure Security Center. Use and configuration of SIEM systems such as Splunk, QRadar, or LogRhythm. In addition to the above knowledge of fundamental enabling technologies including: Secure coding practices Network security SSL / TLS Encryption Key Management Certificate Management Intrusion Detection and Prevention Systems Data Loss Prevention Minimum Qualifications Minimum of 10 years of experience in progressively responsible information technology including. 5+ years of experience in developing, implementing, or architecting information systems 3+ years technical architecture experience integrating identity and access management software into cloud infrastructure and applications 2+ years experience in managing the security aspect of cloud deployments in OCI/Azure/AWS/GCP OR deployments of at least one identity and access management product such as: Oracle OAM/OIM/OVD/OID, CA/Netegrity SiteMinder/IdentityMinder/TransactionMinder, IBM Tivoli Identity Manager and/or Access Manager, Sun Identity Manager and/or Access Manager, Ping Access and/or Ping Federate, or similar Experience developing identity management strategies, architectures and implementation plans Experience with at least one of the following development environments/languages: Java / J2EE, Python, JavaScript, C#, c/C++ Preferred Experience And Qualifications Cloud Security Posture Management. Mobile Security. Cloud Security. Single Sign On. Enterprise Directory Architecture and Design including directory schema, namespace and replication topology experience. Resource Provisioning. Role Base Access Control. Experience with BEA WebLogic, IBM WebSphere or Tomcat. Hands on experience: (1) working with Oracle OCI, AWS, Azure or other major cloud providers, and (2) with Python programming and unit testing such as PyTest. Experience with Infrastructure as code concepts and CI/CD pipelines. Experience with DevOps concepts and Agile software development practices. Great documentational skills and approach of design and document first. Experience operating in a Linux/Unix environment. OCI certification highly desirable. Experience with one or more directories such as Active Directory, IBM Directory Server, SunONE Directory Server and Novell e-Directory. Familiarity with major operating systems, such as Microsoft Windows and Unix; mainframe security packages such as TopSecret, ACF2 and RACF; and/or leading packaged application solutions for ERP systems, CRM systems or portals. Solid understanding of virtual directories(e.g. Radiant Logic and OctetString). Familiarity with federated identity concepts (i.e. SAML, OAuth, OpenID Connect, WS-Federation). Familiarity with REST security concepts including OAuth, JSON, JWE, JWS, JWT, as well as others. Familiarity with web services security concepts such as SAML, WS-Security, XML-Sec. Experience leading business requirements gathering and translating those into system requirements. Experience facilitating business process design as it relates to managing identities and access privileges. Experience developing identity management governance plans. Understanding of current regulatory environment and related implications to identity management and security/audit compliance. Comfort with sophisticated, constantly evolving software development environments. Ability to learn new technologies quickly. Experience using distributed source code management systems (e.g. Git). Experience using ticket tracking systems (i.e. JIRA). Experience working with geographically distributed teams. Does this sound like you? If so, we hope to meet you! Qualifications Career Level - IC4 About Us As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s challenges. We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That’s why we’re committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_mb@oracle.com or by calling +1 888 404 2494 in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law. Show more Show less

Posted 1 week ago

Apply

2.0 - 5.0 years

0 Lacs

India

On-site

Overview: ormation Security Analyst: Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Maintains hardware, software and network firewalls and encryption protocols. Administers security policies to control physical and virtual access to systems. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Job Code Tip: May be internal or external, client-focused, working in conjunction with Professional Services and outsourcing functions. May include company-wide, web-enabled solutions. Individuals whose primary focus is on developing, testing, debugging and deploying code or processing routines that support security protocols for an established system or systems should be matched to the appropriate Programmer or Programmer/Analyst family in the Information Technology/MIS functional area. Responsibilities: Should have process knowledge and technical knowledge on any of the SIEM tools ( like Qradar, LogRhythm, AlienVault, Splunk…etc). L2/L3 level is added advantage. Should have process knowledge and technical knowledge in AV tools like Symantec, McAfee, Trend Micro…etc. L2/L3 level is added advantage. Should have knowledge in managing Vulnerability tools and various remediation efforts. Review security logs generated by applications, devices and other systems, taking action or escalating to appropriate teams as needed. Enforce incident response service level agreement. Work with the global IT Security team to analyze, test and recommend tools to strengthen the security posture of the company Create and maintain operational reports allowing IT management team to understand the current and historical landscape of the IT security risks Vulnerability management assessment and remediation Participate in daily and ad-hoc meetings related to cyber security, controls and compliance, processes and documentation related tasks Research the latest information technology (IT) security trends Help plan and carry out an organization’s way of handling security Develop security standards and best practices for the organization Recommend security enhancements to management or senior IT staff Document security breaches and assess the damage they cause. Performs other duties as assigned Qualifications: B. Tech, B.E or M.C.A 2-5 years’ Experience working in a Security Operations Center 2 years minimum in the computer industry Knowledge working with complex Windows environments Knowledgeable in various security frameworks such as NIST 800-53 / NIST 800-171 / ISO27001 Knowledge in design and administration of security tools Good written and verbal communication skills

Posted 1 week ago

Apply

0 years

0 Lacs

Coimbatore, Tamil Nadu, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. CMS-TDR Senior As part of our EY-cyber security team, who shall work as SME for Microsoft Sentinel solutions in TDR team The opportunity We’re looking for Senior Consultant with expertise in Cloud Security solutions. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Your Key Responsibilities Architecting and implementation of cloud security monitoring platforms MS Sentinel Provide consulting to customers during the testing, evaluation, pilot, production, and training phases to ensure a successful deployment. Perform as the subject matter expert on Cloud Security solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. Securing overall cloud environments by applying cybersecurity tools and best practices Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. Content development which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Skills And Attributes For Success Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities. Expertise in content management in MS Sentinel Good knowledge in threat modelling. Experience in creating use cases under Cyber kill chain and Mitre attack framework Expertise in integrating critical devices/applications including unsupported (in-house built) by creating custom parsers Below mentioned experiences/expertise on Sentinel Develop a migration plan from Splunk/QRadar/LogRhythm to MS Sentinel Deep understanding of how to implement best practices for designing and securing Azure platform Experiencing advising on Microsoft Cloud Security capabilities across Azure platform Configure data digestion types and connectors Analytic design and configuration of the events and logs being digested Develop, automate, and orchestrate tasks(playbooks) with logic apps based on certain events Configure Sentinel Incidents, Workbooks, Hunt queries, Notebooks Experience in other cloud native security platforms like AWS and GCP is a plus Scripting knowledge (Python, Bash, PowerShell) Extensive knowledge of different security threats Good knowledge and experience in Security Monitoring Good knowledge and experience in Cyber Incident Response To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Demonstrate both technical acumen and critical thinking abilities. Strong interpersonal and presentation skills. Certification in Azure (any other cloud vendor certification is a plus) Ideally, you’ll also have People/Project management skills. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

India

Remote

Linkedin logo

About Us Our leading SaaS-based Global Growth Platform™ enables clients to expand into over 180 countries quickly and efficiently, without the complexities of establishing local entities. At G-P, we’re dedicated to breaking down barriers to global business and creating opportunities for everyone, everywhere. Our diverse, remote-first teams are essential to our success. We empower our Dream Team members with flexibility and resources, fostering an environment where innovation thrives and every contribution is valued and celebrated. The work you do here will positively impact lives around the world. We stand by our promise: Opportunity Made Possible. In addition to competitive compensation and benefits, we invite you to join us in expanding your skills and helping to reshape the future of work. At G-P, we assist organizations in building exceptional global teams in days, not months—streamlining the hiring, onboarding, and management process to unlock growth potential for all. About This Position The Role: As Information Security Analyst - SecOps , you will be responsible for securing and protecting our infrastructure, including managing and administering various security-related technologies, platforms, and tools. You'll also provide security expertise and guidance to the team on various security-related matters. This will support the implementation of the company security strategy, compliance and risk management plan. You must be willing to work within the EMEA business hours (between 12 pm IST - 9 pm IST, Monday-Friday). Key Responsibilities Investigate alerts, triage, deep dive, and come up with proper action items and remediation plans. Conduct investigation, containment, and other response activities with business stakeholders and groups. Compose incident analysis and finding reports for management, including gap identification and recommendations for improvement. Recommend or develop new detection logic and tune existing sensors/security controls. Participate in security incident response through in-depth, technical (log, forensic, malware, packet) analysis. Provide oversight of security alert detection and analysis capabilities across multiple technologies to ensure that security incidents are identified in a timely manner. Escalate and support potential security incidents in line with appropriate processes. Support communications of potential security incidents via multiple channels. Participate in the response of potential security incidents by identifying and communicating relevant supplementary information. Identify and analyze new and emerging threats to determine impacts to G-P and provide guidelines and recommendations pertaining to opportunities to strengthen G-P security posture. Assist with information security due diligence requests as needed. Provide security recommendations to other team members, management, and business stakeholders for solutions, enhancements to existing systems, and new security tools to help mitigate security vulnerabilities and automate repeatable tasks. Monitor, secure, and optimize AWS environments using tools like GuardDuty, CloudTrail, and Security Hub, ensuring compliance with security standards. Conduct security reviews, perform vulnerability assessments, recommend remediation actions, and manage security policies and access controls to monitor, protect, and govern data and applications across private and cloud environments. What We Are Looking For Education: Bachelor’s Degree in Information Technology, Computer Science, Business, or Engineering required, or equivalent experience. Experience: 5+ years of information security experience, preferably in the technology industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies and motives. Familiarity with computer network exploitation and network attack methodologies. Experience with cloud computing; AWS preferred Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+ Log analysis and security content development in SIEM solutions, e.g. Google SecOps, Splunk, IBM QRadar, LogRhythm, etc. Endpoint detection and response tools, e.g. CrowdStrike, SentinelOne, CyberArk EPM, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies like Secure Web Gateway, Private Access, IDS/IPS, firewalls, proxy servers, e.g. Netskope, Zscaler, Palo, Versa, etc. Log analysis and security content development in SIEM solutions, e.g. Google SecOps/Chronicle preferred, Splunk, IBM QRadar, LogRhythm, etc. Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Strong understanding of security as it relates to DevOps (specifically in CI/CD) Experience in SaaS, multi-tenant customer solutions Experience with AWS security tools and best practices, including IAM, VPC security, and encryption mechanisms. Strong understanding of security operations best practices, including email security, data loss prevention, vulnerability management, and the creation and enforcement of policies and rule-based access controls. Join G-P and be part of building a global security framework that enables opportunities across the world! We will consider for employment all qualified applicants who meet the inherent requirements for the position. Please note that background checks are required, and this may include criminal record checks. G-P. Global Made Possible. G-P is a proud Equal Opportunity Employer, and we are committed to building and maintaining a diverse, equitable and inclusive culture that celebrates authenticity. We prohibit discrimination and harassment against employees or applicants on the basis of race, color, creed, religion, national origin, ancestry, citizenship status, age, sex or gender (including pregnancy, childbirth, and pregnancy-related conditions), gender identity or expression (including transgender status), sexual orientation, marital status, military service and veteran status, physical or mental disability, genetic information, or any other legally protected status. G-P also is committed to providing reasonable accommodations to individuals with disabilities. If you need an accommodation due to a disability during the interview process, please contact us at careers@g-p.com. Show more Show less

Posted 1 week ago

Apply

0 years

6 - 9 Lacs

Hyderābād

Remote

Hyderabad, India Chennai, India Job ID: R-1076713 Apply prior to the end date: June 21st, 2025 When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What you’ll be doing... The Threat Management Center (TMC) serves as the initial point of defense for Verizon's networks and information systems, safeguarding them against internal misconduct and cyber-attacks. The TMC Advanced Cyber Defense (TMC-ACD) team is tasked with responding to, investigating, hunting and managing all incidents. Collectively, the teams strive to protect Verizon's employees, customers, brand reputation, and revenue streams through proactive identification, response, and mitigation of potential threats that could adversely affect Verizon or its business partners. What we’re looking for... Verizon is looking for an innovative and motivated professional who will be responsible for safeguarding the Verizon enterprise. This individual will work on identified threats and will neutralize them through proactive hunting and detection, incident response and mitigation strategies, and ensure continuous operation of Verizon’s on-prem and cloud environments. The Digital Forensics & Incident Response role is an opportunity to work in a fast paced collaborative environment defending Verizon from current and future cyber threats. This position plays a critical role in Verizon’s enterprise computing defense. Executing the Incident Response Lifecycle to drive threat remediation and identify strategic countermeasures improving future defenses. Operating as a trusted advisor on threat analysis during incidents for incident management teams and other stakeholders by following cybersecurity response methodologies such as the NIST CyberSecurity Framework. Serving as a primary point of contact during assigned on-call shifts, responding promptly to incidents, escalations, and critical alerts to minimize downtime and mitigate risks to the enterprise. Deploying security tools and leveraging logs and endpoint forensic analysis in order to complete a detailed and accurate assessment of security alerts and threats affecting the Verizon enterprise and cloud infrastructure. Assisting with the development of security controls for multiple platforms via automated capabilities by using advanced analysis and forensic techniques. Driving identification, analysis, and remediation activities to ensure compliance with relevant regulatory requirements, industry standards, and best practices related to security and data privacy. Providing assistance and analytical evaluations for high-priority and significant security incidents, including composing extensive and comprehensive analysis summaries and facilitating incident-related discussions. Identifying gaps in detections and collaborating with teams across Cyber Security to mitigate threats and improve the overall security posture. Recommending ways to mature and advance the preventive and defensive capabilities of the TMC. This includes leveraging data and knowledge to clearly communicate the use case for alert creation. Collaborating with cross-functional teams to respond, identify, and analyze the root cause of a cybersecurity incident. Conducting risk assessments, in-depth analysis, and forensic investigations to determine the root cause and impact of incidents. Enhancing, and/or implementing DFIR playbooks to ensure cohesive response repeatability. Assisting with producing operational read-outs and case reviews for peers and leadership that accurately capture the effectiveness of the DFIR organization. Continuously honing to build and maintain knowledge, skills, and abilities needed to maintain proficiency in producing thorough and accurate digital forensic analysis. Enhancing techniques, workflows and processes of security controls, compliance assessments, and DFIR procedures to drive the TMC operational and strategic growth (continuous improvement). Where you'll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. You’ll need to have: Bachelor's degree or four or more years of work experience. Four or more years of relevant experience required, demonstrated through work experience and/or military experience. Experience working in Digital Forensic, Incident Response, and/or a Security Operations Center (SOC) environment(s). Even better if you have one or more of the following: Awareness of cyber based adversarial frameworks including MITRE ATT&CK and Lockheed Martin’s Cyber Kill Chain. Proficient knowledge of the cyber threat landscape including types of adversaries, campaigns, and the motivations that drive them. Experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents. Programming and Scripting Experience to enhance automations, ad-hoc forensic analysis and speed-up response times. Previous experience with log aggregation platforms such as Splunk, Elastic, Snowflake, LogRhythm, etc. Proficient in understanding Operating Systems and their architectures: Windows, Unix/Linux, and MacOS Operating Systems Demonstrates leadership and mentoring skills to help advance the overall capabilities of the TMC organization. Ability to work in a highly collaborative environment needing strong communication, presentation, and leadership-like skills Exhibits initiative, follow-up and follow through with commitments Certifications like: Network+, Security+, CISSP, EnCE, CFCE, C|EH, C|HFI, GCFA, GCFE, GCIH and/or cloud-specific security certifications (e.g. AWS Certified Security - Specialty, Microsoft Certified: Azure Security Engineer Associate, Google Cloud Certified Professional Cloud Security Engineer) If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. #CISO Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Apply Now Save Saved Open sharing options Share Related Jobs Analyst IV-Threat Intel Save Hyderabad, India, +1 other location Technology Analyst IV-Threat Intel Save Hyderabad, India, +1 other location Technology Digital Forensics and Incident Response Analyst Save Temple Terrace, Florida, +3 other locations Technology Shaping the future. Connect with the best and brightest to help innovate and operate some of the world’s largest platforms and networks.

Posted 1 week ago

Apply

2.0 - 5.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Overview ormation Security Analyst: Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Maintains hardware, software and network firewalls and encryption protocols. Administers security policies to control physical and virtual access to systems. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Job Code Tip: May be internal or external, client-focused, working in conjunction with Professional Services and outsourcing functions. May include company-wide, web-enabled solutions. Individuals whose primary focus is on developing, testing, debugging and deploying code or processing routines that support security protocols for an established system or systems should be matched to the appropriate Programmer or Programmer/Analyst family in the Information Technology/MIS functional area. Responsibilities Should have process knowledge and technical knowledge on any of the SIEM tools ( like Qradar, LogRhythm, AlienVault, Splunk…etc). L2/L3 level is added advantage. Should have process knowledge and technical knowledge in AV tools like Symantec, McAfee, Trend Micro…etc. L2/L3 level is added advantage. Should have knowledge in managing Vulnerability tools and various remediation efforts. Review security logs generated by applications, devices and other systems, taking action or escalating to appropriate teams as needed. Enforce incident response service level agreement. Work with the global IT Security team to analyze, test and recommend tools to strengthen the security posture of the company Create and maintain operational reports allowing IT management team to understand the current and historical landscape of the IT security risks Vulnerability management assessment and remediation Participate in daily and ad-hoc meetings related to cyber security, controls and compliance, processes and documentation related tasks Research the latest information technology (IT) security trends Help plan and carry out an organization’s way of handling security Develop security standards and best practices for the organization Recommend security enhancements to management or senior IT staff Document security breaches and assess the damage they cause. Performs other duties as assigned Qualifications B. Tech, B.E or M.C.A 2-5 years’ Experience working in a Security Operations Center 2 years minimum in the computer industry Knowledge working with complex Windows environments Knowledgeable in various security frameworks such as NIST 800-53 / NIST 800-171 / ISO27001 Knowledge in design and administration of security tools Good written and verbal communication skills Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What you’ll be doing... The Threat Management Center (TMC) serves as the initial point of defense for Verizon's networks and information systems, safeguarding them against internal misconduct and cyber-attacks. The TMC Advanced Cyber Defense (TMC-ACD) team is tasked with responding to, investigating, hunting and managing all incidents. Collectively, the teams strive to protect Verizon's employees, customers, brand reputation, and revenue streams through proactive identification, response, and mitigation of potential threats that could adversely affect Verizon or its business partners. What we’re looking for... Verizon is looking for an innovative and motivated professional who will be responsible for safeguarding the Verizon enterprise. This individual will work on identified threats and will neutralize them through proactive hunting and detection, incident response and mitigation strategies, and ensure continuous operation of Verizon’s on-prem and cloud environments. The Digital Forensics & Incident Response role is an opportunity to work in a fast paced collaborative environment defending Verizon from current and future cyber threats. This position plays a critical role in Verizon’s enterprise computing defense. Executing the Incident Response Lifecycle to drive threat remediation and identify strategic countermeasures improving future defenses. Operating as a trusted advisor on threat analysis during incidents for incident management teams and other stakeholders by following cybersecurity response methodologies such as the NIST CyberSecurity Framework. Serving as a primary point of contact during assigned on-call shifts, responding promptly to incidents, escalations, and critical alerts to minimize downtime and mitigate risks to the enterprise. Deploying security tools and leveraging logs and endpoint forensic analysis in order to complete a detailed and accurate assessment of security alerts and threats affecting the Verizon enterprise and cloud infrastructure. Assisting with the development of security controls for multiple platforms via automated capabilities by using advanced analysis and forensic techniques. Driving identification, analysis, and remediation activities to ensure compliance with relevant regulatory requirements, industry standards, and best practices related to security and data privacy. Providing assistance and analytical evaluations for high-priority and significant security incidents, including composing extensive and comprehensive analysis summaries and facilitating incident-related discussions. Identifying gaps in detections and collaborating with teams across Cyber Security to mitigate threats and improve the overall security posture. Recommending ways to mature and advance the preventive and defensive capabilities of the TMC. This includes leveraging data and knowledge to clearly communicate the use case for alert creation. Collaborating with cross-functional teams to respond, identify, and analyze the root cause of a cybersecurity incident. Conducting risk assessments, in-depth analysis, and forensic investigations to determine the root cause and impact of incidents. Enhancing, and/or implementing DFIR playbooks to ensure cohesive response repeatability. Assisting with producing operational read-outs and case reviews for peers and leadership that accurately capture the effectiveness of the DFIR organization. Continuously honing to build and maintain knowledge, skills, and abilities needed to maintain proficiency in producing thorough and accurate digital forensic analysis. Enhancing techniques, workflows and processes of security controls, compliance assessments, and DFIR procedures to drive the TMC operational and strategic growth (continuous improvement). Where you'll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. You’ll Need To Have Bachelor's degree or four or more years of work experience. Four or more years of relevant experience required, demonstrated through work experience and/or military experience. Experience working in Digital Forensic, Incident Response, and/or a Security Operations Center (SOC) environment(s). Even better if you have one or more of the following: Awareness of cyber based adversarial frameworks including MITRE ATT&CK and Lockheed Martin’s Cyber Kill Chain. Proficient knowledge of the cyber threat landscape including types of adversaries, campaigns, and the motivations that drive them. Experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents. Programming and Scripting Experience to enhance automations, ad-hoc forensic analysis and speed-up response times. Previous experience with log aggregation platforms such as Splunk, Elastic, Snowflake, LogRhythm, etc. Proficient in understanding Operating Systems and their architectures: Windows, Unix/Linux, and MacOS Operating Systems Demonstrates leadership and mentoring skills to help advance the overall capabilities of the TMC organization. Ability to work in a highly collaborative environment needing strong communication, presentation, and leadership-like skills Exhibits initiative, follow-up and follow through with commitments Certifications like: Network+, Security+, CISSP, EnCE, CFCE, C|EH, C|HFI, GCFA, GCFE, GCIH and/or cloud-specific security certifications (e.g. AWS Certified Security - Specialty, Microsoft Certified: Azure Security Engineer Associate, Google Cloud Certified Professional Cloud Security Engineer) If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. #CISO Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Linkedin logo

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What you’ll be doing... The Threat Management Center (TMC) serves as the initial point of defense for Verizon's networks and information systems, safeguarding them against internal misconduct and cyber-attacks. The TMC Advanced Cyber Defense (TMC-ACD) team is tasked with responding to, investigating, hunting and managing all incidents. Collectively, the teams strive to protect Verizon's employees, customers, brand reputation, and revenue streams through proactive identification, response, and mitigation of potential threats that could adversely affect Verizon or its business partners. What we’re looking for... Verizon is looking for an innovative and motivated professional who will be responsible for safeguarding the Verizon enterprise. This individual will work on identified threats and will neutralize them through proactive hunting and detection, incident response and mitigation strategies, and ensure continuous operation of Verizon’s on-prem and cloud environments. The Digital Forensics & Incident Response role is an opportunity to work in a fast paced collaborative environment defending Verizon from current and future cyber threats. This position plays a critical role in Verizon’s enterprise computing defense. Executing the Incident Response Lifecycle to drive threat remediation and identify strategic countermeasures improving future defenses. Operating as a trusted advisor on threat analysis during incidents for incident management teams and other stakeholders by following cybersecurity response methodologies such as the NIST CyberSecurity Framework. Serving as a primary point of contact during assigned on-call shifts, responding promptly to incidents, escalations, and critical alerts to minimize downtime and mitigate risks to the enterprise. Deploying security tools and leveraging logs and endpoint forensic analysis in order to complete a detailed and accurate assessment of security alerts and threats affecting the Verizon enterprise and cloud infrastructure. Assisting with the development of security controls for multiple platforms via automated capabilities by using advanced analysis and forensic techniques. Driving identification, analysis, and remediation activities to ensure compliance with relevant regulatory requirements, industry standards, and best practices related to security and data privacy. Providing assistance and analytical evaluations for high-priority and significant security incidents, including composing extensive and comprehensive analysis summaries and facilitating incident-related discussions. Identifying gaps in detections and collaborating with teams across Cyber Security to mitigate threats and improve the overall security posture. Recommending ways to mature and advance the preventive and defensive capabilities of the TMC. This includes leveraging data and knowledge to clearly communicate the use case for alert creation. Collaborating with cross-functional teams to respond, identify, and analyze the root cause of a cybersecurity incident. Conducting risk assessments, in-depth analysis, and forensic investigations to determine the root cause and impact of incidents. Enhancing, and/or implementing DFIR playbooks to ensure cohesive response repeatability. Assisting with producing operational read-outs and case reviews for peers and leadership that accurately capture the effectiveness of the DFIR organization. Continuously honing to build and maintain knowledge, skills, and abilities needed to maintain proficiency in producing thorough and accurate digital forensic analysis. Enhancing techniques, workflows and processes of security controls, compliance assessments, and DFIR procedures to drive the TMC operational and strategic growth (continuous improvement). Where you'll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. You’ll Need To Have Bachelor's degree or four or more years of work experience. Four or more years of relevant experience required, demonstrated through work experience and/or military experience. Experience working in Digital Forensic, Incident Response, and/or a Security Operations Center (SOC) environment(s). Even better if you have one or more of the following: Awareness of cyber based adversarial frameworks including MITRE ATT&CK and Lockheed Martin’s Cyber Kill Chain. Proficient knowledge of the cyber threat landscape including types of adversaries, campaigns, and the motivations that drive them. Experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents. Programming and Scripting Experience to enhance automations, ad-hoc forensic analysis and speed-up response times. Previous experience with log aggregation platforms such as Splunk, Elastic, Snowflake, LogRhythm, etc. Proficient in understanding Operating Systems and their architectures: Windows, Unix/Linux, and MacOS Operating Systems Demonstrates leadership and mentoring skills to help advance the overall capabilities of the TMC organization. Ability to work in a highly collaborative environment needing strong communication, presentation, and leadership-like skills Exhibits initiative, follow-up and follow through with commitments Certifications like: Network+, Security+, CISSP, EnCE, CFCE, C|EH, C|HFI, GCFA, GCFE, GCIH and/or cloud-specific security certifications (e.g. AWS Certified Security - Specialty, Microsoft Certified: Azure Security Engineer Associate, Google Cloud Certified Professional Cloud Security Engineer) If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above. #CISO Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Show more Show less

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies