Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
12.0 - 15.0 years
0 Lacs
bengaluru, karnataka, india
On-site
About ColorTokens At ColorTokens , we empower businesses to stay operational and resilient in an increasingly complex cybersecurity landscape. Breaches happenbut with our cutting-edge ColorTokens Xshield platform , companies can minimize the impact of breaches by preventing the lateral spread of ransomware and advanced malware. We enable organizations to continue operating while breaches are contained, ensuring critical assets remain protected. Our innovative platform provides unparalleled visibility into traffic patterns between workloads, OT/IoT/IoMT devices, and users, allowing businesses to enforce granular micro-perimeters, swiftly isolate key assets, and respond to breaches with agility. Recognized as a Leader in the Forrester Wave: Microsegmentation Solutions (Q3 2024) , ColorTokens safeguards global enterprises and delivers significant savings by preventing costly disruptions. Join us in transforming cybersecurity. Learn more at www.colortokens.com. Job Summary: Colortokens is seeking a SOC Manager to lead our Security Operations Center (SOC), leveraging Next-Gen SIEM to detect, respond to, and mitigate security threats. The ideal candidate will have deep expertise in modern SIEM platforms, threat intelligence, and incident response while managing customers and a team of security analysts. Job Title: SOC Manager Location: Bangalore Job Type: Full-time Department: Managed Services Key Responsibilities: 1. SOC Leadership & Operations Oversee 24/7 security monitoring, detection, and response operations. Manage, mentor, and train a team of SOC analysts, engineers, and incident responders. Develop and optimize SOC processes, playbooks, and runbooks for effective incident handling. Ensure continuous threat monitoring, analysis, and escalation in accordance with SLAs. 2. SIEM & Security Analytics Management Implement, manage, and optimize Next-Gen SIEM solutions (eg: Stellar Cyber, Cortex, Chronicle etc) Develop advanced detection rules, correlation logic, and behavioural analytics for real-time threat detection. Integrate SIEM with EDR, NDR, SOAR, Threat Intelligence, and Cloud Security tools. Ensure log management, normalization, and enrichment from various sources (firewalls, endpoints, cloud, IAM, etc.). 3. Threat Detection, Incident Response & Forensics Lead security investigations, threat hunting, and forensics analysis. Work with SOC analysts to triage and escalate security incidents (MITRE ATT&CK-based). Oversee the incident response process and conduct post-mortem analysis for continuous improvement. Collaborate with threat intelligence teams to enrich SIEM detections with contextual threat data. 4. Compliance, Reporting & Automation Ensure SOC operations align with regulatory standards (ISO 27001, NIST, GDPR, SOC 2, etc.). Develop automated detection & response workflows using SOAR (Security Orchestration, Automation, and Response). Generate SIEM dashboards, security reports, and executive summaries for stakeholders. Conduct tabletop exercises and Red/Blue team drills to enhance security readiness. 5. Customer & Stakeholder Engagement Act as the primary point of contact for key customers, ensuring high-quality service delivery. Collaborate with OEMs to address cybersecurity risks. Present threat intelligence reports, risk assessments, and incident trends to executive stakeholders. Drive continuous improvement initiatives based on customer feedback and security landscape changes. Customer SLA management and ensure CSAT of greater than 4.5/5 6. Business Support Work with pre-sales teams to respond to customer RFI/RFPs Responsible for upsell and cross-sell activities Enable/train sales teams across regions 7. Required Skills & Experience: Technical Expertise: 12-15 years of experience in SOC operations, SIEM, and cybersecurity incident response. Hands-on expertise with Next-Gen SIEM platforms. Proficiency in SOAR, EDR, XDR, Cloud Security (AWS/Azure/GCP), and threat intelligence tools. Strong knowledge of MITRE ATT&CK, Cyber Kill Chain, and NIST frameworks. Experience in log analysis, anomaly detection, and SIEM rule creation. Scripting skills in Python, PowerShell, or Regex for automation. Leadership & Soft Skills: Strong leadership experience in managing and mentoring SOC teams. Excellent incident response and crisis management abilities. Effective communication with technical and non-technical stakeholders including customers. Ability to collaborate with IT, DevOps, and security teams to enhance security posture. Preferred Certifications: ? CISSP (Certified Information Systems Security Professional) ? GCIA (GIAC Certified Intrusion Analyst) ? GCIH (GIAC Certified Incident Handler) ? SIEM Vendor Certifications Skills: SOC Manager, SOC Process, CISSP, Pre-Sales Activities, SOC Setup Experience. Show more Show less
Posted 2 weeks ago
8.0 - 12.0 years
16 - 25 Lacs
Pune, Bengaluru
Work from Office
Key Responsibilities: • Architecting & Designing Next-Gen SIEM/EDR. • Perform as the subject matter expert on any of the above solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. • Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. • Content development (Use case development) which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems • Work with the wider Delivery teams and customer to create SOC playbooks covering the SIEM and SOC setup • Create and configure SOAR workflows • Configure correlation searches and alerting including tweaking alerts to reduce false positives • Act as the SME for SIEM deployment and configure to assist delivery teams with the ingestion of data sources (AWS/Qualys) into the SIEM • Assist teams on implementation of SIEM alerts into Jira to track/manage alerts • Assist with setup and configuration of SIEM severity priorities in line with SLAs in both the SIEM, SOAR and Jira • Create and configure dashboards which can be used for reporting and incident response Skills Required Skills and Qualifications: • B. Tech./ B.E. with sound technical skills • Strong command on verbal and written English language. • Demonstrate both technical acumen and critical thinking abilities. • Strong interpersonal and presentation skills. • Minimum 10+ years of Hands-on experience of operating/implementing the above security tools. • Certification in any of the SIEM platforms is a plus
Posted 3 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
67493 Jobs | Dublin
Wipro
26746 Jobs | Bengaluru
Accenture in India
21683 Jobs | Dublin 2
EY
20113 Jobs | London
Uplers
14352 Jobs | Ahmedabad
Bajaj Finserv
13841 Jobs |
IBM
13289 Jobs | Armonk
Accenture services Pvt Ltd
12869 Jobs |
Amazon
12463 Jobs | Seattle,WA
Amazon.com
12066 Jobs |