Jobs
Interviews

Optiv

26 Job openings at Optiv
Sr Quality Assurance Analyst I On-site, Bangalore Bengaluru,Karnataka,India 0 years Not disclosed Remote Full Time

The Sr. QA Analyst will provide deep level analysis for client investigations utilizing customer provided data sources, audit, and monitoring tools at both the government and enterprise level. The Sr. Threat Analyst will work closely with our Technology Engineers, Architects, and Threat Analysts to service customers. How You’ll Make An Impact High level professional writing experience regarding documenting and reporting on potential security incidents identified in customer environments to include timeline of events. Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets. Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc. Perform knowledge transfers, document, and train clients regarding mitigation of identified threats. Provide ongoing recommendations to peers and customers on tuning and best practices. Actively research current threats and attack vectors being exploited in the wild Actively work with analysts and perform investigations on escalations. Ability to discuss security posture with multiple clients and make recommendations to better their holistic security approach. Provide gap analysis for clients to better their security posture. Maintain and develop SOPs for threat analyst team. Develop and maintain Playbooks and runbooks. Work with internal teams to increase efficiency and effectiveness of security analysis provided by the threat analysis team. Training of new analysts on security and tools Create and maintain Content Catalog based on security essentials and the evolving threat landscape. Provide quality assurance (QA) review of security alerts handled by Team members. Conduct regular security audits to ensure compliance with industry standards and regulations. Evaluate security controls, policies, and procedures. Identify vulnerabilities and enhance remediation actions. What We’re Looking For Five years of full-time professional experience in the Information Security field Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment as a point of escalation. Excellent time management, reporting, and communication skills including customer interactions and executive presentations. Data analysis using SIEM, Database tools, and Excel. Experience troubleshooting security devices and SIEM. Ability to create and maintain content within SIEM environments and make recommendations to clients to better their visibility. IDS monitoring/analysis with tools such as Sourcefire and Snort Experience with SIEM platforms preferred (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk) a plus. Experience with audit tools, MS office, Power BI Knowledge of security information and event management (SIEM) systems. Understanding of cloud security and virtualization. Direct (E.g., SQL Injection) versus indirect (E.g., cross-site scripting) attacks Experience with the following attacks: Web Based Attacks and the OWASP Top 10, Network Based DoS, Brute force, HTTP Based DoS, Denial of Service, Network Based / System Based Attacks. Familiarity with SANS top 20 critical security controls Understand the foundations of enterprise Windows security including Active Directory, Windows security architecture and terminology, Privilege escalation techniques, Common mitigation controls and system hardening. Anti-Virus (AV) and Host Based Intrusion Prevention (HIPS) Experience in monitoring at least one commercial AV solution such as (but not limited to) McAfee/Intel, Symantec, Sophos, or Trend Micro Ability to identify common false positives and make suggestions on tuning. Understanding of root causes of malware and proactive mitigation Propagation of malware in enterprise environments Familiarity with web-based exploit kits and the methods employed by web-based exploit kits. Familiarity with concepts associated with Advanced Persistent Threats and “targeted malware.” Experience and understanding of malware protection tools (FireEye) and controls in an enterprise environment. Covert channels, egress, and data exfiltration techniques Familiarity with vulnerability scoring systems such as CVSS. Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks This team provides 24/7 support. This role requires shift flexibility, including the ability to rotate between days, mids, and nights. What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer (EEO). All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, status as an individual with a disability, veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time. Show more Show less

Sr. Engineer - Network Security I On-site, Bangalore Bengaluru,Karnataka,India 0 years None Not disclosed Remote Full Time

As a member of the Optiv Security Operations Department, an MSS TAC Engineer position provides frontline maintenance, remote support, and appliance/OS management and health monitoring to customers in a 24x7x365 TAC (Technical Assistance Center) environment. We’re looking for knowledge-seeking candidates who will be eager to dive into new things in a fast-paced and ever-changing environment. This role is fitting for those looking to trailblaze their career in network security. Operating as the first impression for Optiv clients in many cases, engineers deliver both third-party Authorized Support and Technology Management service lines and directly assist Optiv clients with their network and/or security-related issues and needs. These two service lines are often part of a much larger client-focused services agenda. Therefore, this position often plays a crucial part in helping to keep overall Optiv/client relationships successful. How You’ll Make An Impact Troubleshoot technical issues over the phone and via secure screen share. Host troubleshooting conference calls bridging multiple individuals from vendors, clients, third parties, etc. Responsible for initial triage of incoming client issues. Facilitate customer communication over the phone and email via a ticketing system. Document actions in ticketing systems to effectively communicate information to both internal resources and external customers. Respond in a timely manner (with published SLA) to incidents and support requests. Perform basic troubleshooting to diagnose common Network problems using fundamental TCP/IP network skills. Assist engineering staff with lab systems configuration. Update open ticket status for engineers and other technicians within the ticketing system. What We’re Looking For A minimum of Associate’s degree or equivalent from a two-year college or technical school in Information Technology, Information Security/Assurance, Network Administration, Engineering, or related area of study. Related experience and/or training in a technology environment or equivalent combination of education and experience. Fundamental knowledge and exposure to TCP/IP networking and security concepts. Entry-level desktop/networking experience, systems administration, and IT helpdesk experience, with exposure to Microsoft and UNIX/Linux-based operating systems. Strong soft skills. An active CCST (Cisco) or CCNA (Cisco) or Net+ (CompTIA) certification. Experience in one or more of the following is beneficial: Cato Networks, Juniper Networks, Check Point, Cisco Systems, Netskope, F5 Networks, Palo Alto Networks, Fortinet, HPE Aruba Networks, Ivanti (Connect Secure), Juniper Networks, Tanium, Zscaler A passion for information, network, and data security. Shift flexibility, including the ability to provide on-call support when needed. Demonstrated experience and success in a customer-focused satisfaction environment. Ability to work greater than 40 hours per week as needed. Ability to travel up to 10 percent of the time. What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Sr. Engineer - Crowdstrike | Onsite, Bangalore Bengaluru 6 years INR 6.0 - 7.925 Lacs P.A. Remote Part Time

About the job At Optiv, we’re on a mission to help our clients make their businesses more secure. We’re one of the fastest-growing companies in a truly essential industry. In your role at Optiv, you’ll be inspired by a team of the brightest business and technical minds in cybersecurity. We are passionate champions for our clients and know from experience that the best solutions for our clients’ needs come from working hard together. As part of our team, your voice matters, and you will do important work that has an impact, on people, businesses, and nations. Our industry and our company move fast, and you can be sure that you will always have room to learn and grow. We’re proud of our team and the important work we do to build confidence for a more connected world. How You'll Make An Impact Experience in Endpoint Security Platforms e.g. AV, EDR, XDR, DLP, Encryption, etc. Perform end to end platform engineering management for Security tools Good knowledge on Malware / Threats Working knowledge on endpoint security technologies like Antivirus, EDR, XDR, DLP, Encryption Performing regular checks on synchronization, monitoring and health checks Provide recommendation to Customer security team on changes to global policies. Analyze application & Configuration settings, Policies & custom rule sets, historical performance data & provide recommendations. Working knowledge of triaging malware alerts Working knowledge of security technologies such as SIEM, DLP, UEBA and hybrid/Cloud Security environments. What We're Looking For 6+ years of experience, hands on experience in tools like Crowdstrike, MS Defender for Endpoint. Flexible to work in Fixed Night shifts. Understanding of security by design principles and architecture level security concepts Knowledge of and experience with related Workstation and Server technologies. Knowledge on deployment tools and MDM tools Sound security engineering knowledge ( technical) to work collaboratively with the Tech Leads and software/products architects to ensure secure Products Good Knowledge on ITIL, Incident management, Change Management and Problem Management including analysis and response Understand and manage the requirements of being part of a 24x7 on-call operation, including but not limited to, shift hand-over, operational advice, guidance, support and escalation Good knowledge on reporting, documentation etc. What you can expect from Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups . Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice . If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Associate Engineer | On-site, Bangalore Bengaluru 1 - 3 years INR 6.0 - 7.925 Lacs P.A. Remote Part Time

The Associate Engineer - Security Automation/SOAR will be responsible for updating customer work requests and following operating procedures to perform AFC support tasks including health checks, reporting, work ticket acknowledgment and assignment, basic troubleshooting and other tasks as required for AFC service health and operation. The Associate Engineer will contribute to the development of knowledge base and troubleshooting information to expand the efficiency and performance of AFC services. This role requires the ability to develop skills on multiple security products and work closely with the staff of higher tiers, Service Delivery, and clients to provide ongoing communication of status and timely response to deliverables. How you'll make an impact: Hands on opportunity of implementation and development of SOAR solutions like Swimlane, Cortex XSOAR, Tines, devo, Exabeam SOAR, Splunk SOAR etc The primary purpose of this role is to act as the orchestration strategist in identifying incident response activity where mitigating controls would be automated. Identify mitigating controls through repetitive manual processes within the SOC Analyst community that complies with client security policy and industry best practices In concert with Senior Developers , within the "Proactive Hunting" process, translate complex, and non-complex Incident Response event patterns into an automated process mitigating control In coordination with SOC Operations, Service Delivery Manager, and Application Development Engineers, produce the requirements necessary to translate manual Incident Response events into automated mitigating controls using several industry standard platforms, research patterns to gain decision making criteria, and coding languages. What we're looking for: BE / BTech / ME / MTech/MCA in Computer Science or technology-related degree or equivalent work experience. 1 to 3 years of progressive software development or web development or security automation experience Understanding of security automation and development using opensource technologies Hands-on coding experience in the implementation of complex programming custom workflows. In-depth knowledge of algorithms, data structures, design patterns, and their applications. Solid programming background in Python, NodeJS, TypeScript, JavaScript, or other object-oriented languages. Strong NoSQL database and SQL knowledge including MongoDB, Postgres, or MySQL. Hands-on experience in any one of cloud platforms such as AWS, Azure or GCP and DevOps technologies including Kubernetes, Docker, and Terraform. Experience in an Agile DevOps engineering environment that effectively uses CI/CD pipelines (Jenkins, GitLab, Github). Experience on SOAR tools like Swimlane, Splunk SOAR, XSOAR is good to have. The candidate will most likely have spent time in every role of the SOC Operations, operating model Understand the computational decision making process in automating complex scenarios Strong collaboration skills that in turn translates efficient processes into automated decision making functions and determinations through the use of a wide range of industry standard platforms, data mining strategies, and investigative tools Excellent written and oral communicating skills Unrivalled ability to work with highly complex, technical individuals to translate computing technology into everyday communication topics Ability to explain highly technical standards, and solutions to junior personnel, and senior leadership Comprehend complex data sets, and create own algorithms if necessary to accomplish tasks Experienced in writing requirements documentation for data programming solutions Focus is developing automation scripts to interconnect security systems using a proprietary platform that uses python code to configure automation actions Security background preferred Experience in REST APIs, Data storage What you can expect from Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups . Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice . If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Associate Analyst - SOC, On-Site, Bangalore Bengaluru 1 - 2 years INR 6.0 - 8.0 Lacs P.A. Remote Full Time

The Associate Analyst will provide intrusion/incident monitoring and detection utilizing customer provided data sources, audit and monitoring tools at both the government and enterprise level. An Associate Threat Analyst is required to be flexible and adapt to change quickly. The Associate Threat Analyst will work closely with our Threat Analyst to service customers through our Managed Detection and Response offering. How you’ll make an impact Analyze, document and report on potential security incidents identified in customer environments. Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets. Provide triage on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc. Perform knowledge transfers, document, and triage client’s issues regarding mitigation of identified threats Provide ongoing recommendations customers on best practices Actively research current threats and attack vectors being exploited in the wild Utilize defined SOP’s and KB’s Performs other duties as assigned Complies with all policies and standards What we’re looking for 1-2 years of working with Incident Ticketing Systems (i.e. ServiceNow, Remedy, Remedy Force, Heat, etc.). required Desire to gain full-time professional experience in the Information Security field Excellent time management, reporting, communication skills, and ability to prioritize work Ability to generate comprehensive written reports and recommendations Write professional emails Previous experience as a point of escalation in a technical environment Customer interactions and working through various issues Base knowledge of contemporary security architectures/devices such as firewalls, routers, switches, load balancers, remote access technologies, anti-malware, SIEM, and AV Ability to work customer’s environments to report on critical security events Ability to troubleshoot technical problems and ask probing questions to find the root cause or a problem Queue management Data analysis using SIEM, Database tools such as Elastic, and Excel Experience troubleshooting security, network, and or endpoints IDS monitoring/analysis with tools such as Sourcefire and Snort Experience with SIEM platforms preferred (QRadar, LogRhythm, Exabeam, Securonix, and Splunk) Familiarity with web-based attacks and the OWASP Top 10 at a minimum Attack vectors and exploitation Mitigation, Active Directory Direct (E.g. SQL Injection) versus indirect (E.g. cross-site scripting) attacks Familiarity with SANS top 20 critical security controls Understand the foundations of enterprise Windows security including: Windows security architecture and terminology Common system hardening best practices Anti-Virus (AV) and Host Based Intrusion Prevention (HIPS) Experience in monitoring at least one commercial AV solution such as (but not limited to) Carbon Black, CrowdStrike, McAfee/Intel, Symantec, Sophos or Trend Micro Ability to identify common false positives and make suggestions on tuning Malware, Denial of Service Attacks, Brute force attacks Understanding of base malware propagation and attack vectors Propagation of malware in enterprise environments Experience with malware protection tools such as FireEye a plus. Understanding of malware mitigation controls in an enterprise environment. Network Based Attacks / System Based Attacks Familiarity with vulnerability scoring systems such as CVSS Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks Eligibility to obtain security clearance Shift flexibility, including the ability to provide on call support when needed Ability to work greater than 40 hours per week as needed This role is Work from Office role What you can expect from Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups . Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice . If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Engineer - SIEM | On-site, Bangalore Bengaluru 3 years INR 6.0 - 7.925 Lacs P.A. Remote Part Time

The Security Engineer will be responsible for creation of procedures, implementation of processes and development of staff for managing and maintaining security systems across internal and client environments. Experience and knowledge of SIEM or Situational Awareness are essential. The Security Engineer will work closely with Management, Senior Engineers, Threat Analysts, Solution Architects, other Security Engineers and clients to complete high profile, critical services to existing Managed Security Service clients. Serve as a primary responder for Managed Security customer systems, taking ownership of client configuration issues and tracking through resolution. How you'll make an impact 3+ years professional experience supporting and maintaining SIEM systems (Splunk). 2-3 years professional experience working with networks and network architecture. Experience with basic tuning of SIEM(Splunk) content. College degree or equivalent training with experience working in a Security Operations Center, Managed Security, or client network environment. Information security knowledge in one or more areas such as Enterprise end-point security products (i.e. McAfee e-Policy Orchestrator, Virus Scan, Anti-Spyware, Host Data Loss Protection, Endpoint Encryption, etc.) Security Information and Event Manager (SIEM), Firewall, Web Proxy, E-Mail and Web Gateway etc. to include Palo Alto / Checkpoint / Juniper / McAfee / Cisco / Blue Coat / Imperva etc. Understanding of network operations a must; ideal candidate will have worked with network engineering or network security analysis. Experience with SIEM(Splunk) content creation and reporting. Excellent time management, reporting, and communication skills. Superior IT problem-solving skills. Experience with Linux OS. Strong technical writing skills and the ability to explain complex problems to nontechnical teams. Experience working with clients in a service delivery function. Shift flexibility, including the ability to provide after-hours support when needed. Ability to work greater than 40 hours per week as needed. What we are looking for Bachelor of Science degree in Computer Science or related field is required. Experience working with Internal and client Ticketing and Knowledge Base Systems for Incident and Problem tracking as well as procedures. (i.e. Service Now, Jira, Confluence, etc.). General security knowledge (GIAC, CISSP, CCSE, CISA, HBSS, NSA, CEH, Cisco Security, Security +, or other security certifications). Knowledge of Linux and Windows Operating Systems. An understanding of a wide array of server grade applications such as: DBMS, Exchange, DNS, SMTP, IIS, Apache, SharePoint, Active Directory, Identity Management, Patch Management, LDAP, SQL, and others. Experience with SIEM security products: Splunk, Sentinel and infrastructure components such as proxies, firewalls, IDS/IPS, DLP etc. Hold Splunk Certifications (Architect) Excellent interpersonal skills Excellent communication skills - written, verbal and listening. The role demands the availability for US working hours (5PM (IST) to 2AM (IST)) This role is Work From Office role. What you can expect from Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups . Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice . If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Sr. Engineer- CrowdStrike | On-Site, Bangalore Bengaluru,Karnataka,India 5 - 8 years None Not disclosed Remote Full Time

Endpoint Senior Engineer, Cyber Operations is responsible for post-sales product and service implementation. Sr. Endpoint Engineers are responsible for completing assigned projects in a manner consistent with the team’s Operational Standard, which emphasizes the importance of providing exceptional customer service. They are also responsible for meeting consulting billing objectives. How You'll Make An Impact Experience in Endpoint Security Platforms e.g. AV, EDR, XDR, DLP, Encryption, etc. Good knowledge on Malware / Threats Working knowledge on endpoint security technologies like Antivirus, EDR, XDR (CrowdStrike, MS Defender, Sentinel One, Endgame), DLP, Encryption Performing regular checks on synchronization, monitoring and health checks Provide recommendation to Customer security team on changes to global policies. Analyze application & Configuration settings, Policies & custom rule sets, historical performance data & provide recommendations. Working knowledge of triaging malware alerts Working knowledge of security technologies such as SIEM, DLP, UEBA and hybrid/Cloud Security environments Understanding of security by design principles and architecture level security concepts Knowledge of and experience with related Workstation and Server technologies. Knowledge on deployment tools and MDM tools Sound security engineering knowledge (technical) so as to work collaboratively with the Tech Leads and software/products architects to ensure secure Products. Good Knowledge on ITIL, Incident Management, Change Management and Problem Management including analysis and response. Understand and manage the requirements of being part of a 24x7 on-call operation, including but not limited to, shift hand-over, operational advice, guidance, support and escalation. Good knowledge on reporting, documentation etc What We're Looking For Bachelor of Science degree in Computer Science or related field is required. Expertise with one or more of our core Technology Areas: Security Event Management, Content Protection (DLP, Encryption, Access Control), Endpoint Security typically obtained in 5-8 years. Thorough understanding of large-scale environments Strong presentation and verbal communication skills Process-oriented individual with strong attention to detail, and strong organizational skills. Excellent, detailed writing skills Expert knowledge of using Microsoft Office. Ability to build relationships with and influence other functional areas. Well-developed negotiation skills. Ability to build consensus. Strong interpersonal skills Ability to manage multiple tasks in parallel. This role demands the availability during US working hours(5PM(IST) to 2AM(IST)) This role is Work from Office role. What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Client Engagement Lead | Onsite, Bangalore Bengaluru,Karnataka,India 9 years None Not disclosed Remote Full Time

The Client Engagement Lead (CEL) manages engagements from inception to completion, identifying and documenting requirements, supporting clients on various information security initiatives, keeping all stakeholders apprised of program and budget status, and managing issues to resolution. Client Engagement Leads are responsible for the program health over the entire program life cycle (on-boarding, service activation, service continuation, renewal, decommission). CELs are also responsible for onboarding the program team, assigning individual responsibilities, identifying appropriate resources needed, and developing the schedule to ensure timely completion of projects and programs. Client Engagement Leads are expected to build trusting relationships with clients through the delivery of successful outcomes in alignment with Optiv’s commercial commitments. The Client Engagement Lead oversees all program activity with key client engagements across Advanced Fusion Center (AFC). The Client Engagement Lead may lead others contributors to program engagements such as Client Engagement Specialists, Project Managers and Subject Matter Experts. CELs are integral in building relationships with their client counterparts or key points of contact. They also contribute to business development efforts by identifying new opportunities and collaborating with the account leadership to support business growth with the client. How You'll Make An Impact Drive program and engagement progress across multiple client engagements with multiple capabilities, practices, communities, stakeholders and levels of oversight with assurance on maintaining progress, timeliness, and effective resource utilization rates on a weekly basis. Develop strategic program management delivery plans, detailed schedules, program deliverable controls, cost forecasting, risk management, issues forecast and resolution planning, resource burn-rate analysis, forecasting, and reporting, and daily task management. Partner with Operations teams to develop and communicate service delivery strategies across multiple internal practices and departments. Accountable for the progress of the overall engagement and all related projects that may comprise the program or solutions. Accountable for driving timelines by creating and maintaining schedules (including key deliverables, milestones, and dependencies), understanding the deliverables and the progress toward each milestone, identifying, and managing issues, risks, and other potential delays ahead of time, and identifying and driving resolution of all engagement related risks and issues. Demonstrate expert-level of knowledge of Program Management best practices, process and supporting systems to drive client outcomes. Identify, forecast, manage, control, and communicate risk management plans, issues, and impacts across multiple levels of leadership, operations and client. Ensure a common understanding by setting expectations in accordance with the Program Delivery Plan, to align the stakeholders and ensure the customers goals and expectations are achieved. Assist in the development of Program Management business delivery strategies, program health analysis & internal reporting. Lead the composition of program delivery schedules, resource models and granular execution plans Be able to perform work as an individual contributor while collaborating with multiple internal functions to best manage program delivery strategies from initial planning and on-boarding through ramp-down and closure. CEL acts as a single point of contact for our customers throughout the client engagement lifecycle. Communicate client concerns, questions and conflicts to internal stakeholders and take the necessary actions to resolve and/or troubleshoot challenges in a strategic manner. Assign tasks to program team members and ensure timely completion or adequate escalation. Generate and distribute program reports and lead program meetings to disseminate the appropriate information to the program team and stakeholders. Proactively monitor and report on engagement budget, margin and engagement resource variance to plan Works closely with the sales and account teams, demand and solution teams to scope program solution design, tools and reporting Analyze, report, and disseminate program status reports to Practice Leadership. What We're Looking For BA or BS in Computer Science, Management Information Systems, Engineering, Business or related field. 9+ years of experience in a client facing Program, Project or PMO role within a professional services organization, with emphasis on information security projects and programs. Demonstrated program management expertise and success managing cross-capability engagements across multiple clients. Superior analytical and problem-solving skills required. Strong influential skills, customer-focused program leadership capabilities. Management of information security engagements or operations required. Expert level experience with Program Management methodologies, best practices, and tools Experience interfacing with both clients and internal business partners required. Excellent written and verbal communication skills required including making clear and concise presentations to various audiences with an executive presence. Outstanding time management and organizational skills required. Ability to work independently with limited supervision required. Significant experience as a consultant providing security expertise to clients preferred. Current knowledge of security threats, solutions, security tools and network technologies strongly desired. What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Project Analyst | Onsite, Bangalore Bengaluru,Karnataka,India 1 - 3 years None Not disclosed Remote Full Time

The Project Operations Analyst provides a key role in the administration and daily support of security solution projects. The Project Operations Analyst supports Managers, Project Managers, Senior Managers, and Program Managers on projects, solutions, and programs with the daily administration tasks, internal coordination, project tracking, and reporting procedures necessary in delivering Optiv’s services. The Project Operations Analysts regularly communicate and collaborate with the Manager, Project Manager, Senior Manager, and Program Manager to support the daily administrative needs of various projects, including status reporting, project management tool project updates, tracking and reporting, developing and finalizing meeting minutes and additional administrative tasks, as needed. The Project Operations Analyst may be required to oversee stand-alone delivery initiatives based on the policies and procedures established in working within the PMO teams. The Project Operations Analyst will be required to balance multiple projects across various project teams. Strong organizational skills and the ability to prioritize tasks is a must. The Project Operations Analyst must master the internal business management practices of Optiv in order to gain an understanding of administrative tasks valuable in conducting business and further develop their carrier with Optiv. How You’ll Make An Impact Strong written and collaborative communication skills. Strong organizational skills. Display basic knowledge of Project Management techniques and strategies. Stand up and manage project document repository sites including document versioning and distribution. Review and approve project invoicing vs work complete and provide status updates to the project teams. Review and approve project expense reports. Compile internal and external project reporting documents and issue to the project teams for review. Drive the internal workflow processes for project deliverable Q/A, change order composition, versioning and tracking. Compile standardized project documents and project start-up packets aligned with the delivery technologies. Ensure timely project time entry across project/program team members. Assist the Experience and Resource management teams in aligning resources capabilities and availability to project timelines. Complete essential project-facing business management activities which include, but are not limited to the following: Project stand-up and closeout procedures Update and maintain project delivery strategies under the oversight of the Program/Project Manager Internal coordination and distribution of CSAT surveys and analysis. What We're Looking For 1-3 years of related experience required; specifically demonstrated success performing administrative tasks such as reporting, tracking and reporting, developing and finalizing meeting minutes, and additional administrative tasks. Project Management or project delivery experience preferred. Management of security-related projects desired. Familiarity with Project Management methodologies, best practices, and toolsets preferred. Experience interfacing with both clients and partners preferred. Excellent written and verbal communication skills are required. Outstanding time management and organizational skills are required. Ability to work independently with limited supervision required. Previous experience in a security services environment is preferred. Superior problem-solving skills required. Ability to work as a team player, strong interpersonal and communication skills required What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Project Analyst | Onsite, Bangalore Bengaluru,Karnataka,India 1 - 3 years INR Not disclosed Remote Full Time

The Project Operations Analyst provides a key role in the administration and daily support of security solution projects. The Project Operations Analyst supports Managers, Project Managers, Senior Managers, and Program Managers on projects, solutions, and programs with the daily administration tasks, internal coordination, project tracking, and reporting procedures necessary in delivering Optivs services. The Project Operations Analysts regularly communicate and collaborate with the Manager, Project Manager, Senior Manager, and Program Manager to support the daily administrative needs of various projects, including status reporting, project management tool project updates, tracking and reporting, developing and finalizing meeting minutes and additional administrative tasks, as needed. The Project Operations Analyst may be required to oversee stand-alone delivery initiatives based on the policies and procedures established in working within the PMO teams. The Project Operations Analyst will be required to balance multiple projects across various project teams. Strong organizational skills and the ability to prioritize tasks is a must. The Project Operations Analyst must master the internal business management practices of Optiv in order to gain an understanding of administrative tasks valuable in conducting business and further develop their carrier with Optiv. How Youll Make An Impact Strong written and collaborative communication skills. Strong organizational skills. Display basic knowledge of Project Management techniques and strategies. Stand up and manage project document repository sites including document versioning and distribution. Review and approve project invoicing vs work complete and provide status updates to the project teams. Review and approve project expense reports. Compile internal and external project reporting documents and issue to the project teams for review. Drive the internal workflow processes for project deliverable Q/A, change order composition, versioning and tracking. Compile standardized project documents and project start-up packets aligned with the delivery technologies. Ensure timely project time entry across project/program team members. Assist the Experience and Resource management teams in aligning resources capabilities and availability to project timelines. Complete essential project-facing business management activities which include, but are not limited to the following: Project stand-up and closeout procedures Update and maintain project delivery strategies under the oversight of the Program/Project Manager Internal coordination and distribution of CSAT surveys and analysis. What We&aposre Looking For 1-3 years of related experience required; specifically demonstrated success performing administrative tasks such as reporting, tracking and reporting, developing and finalizing meeting minutes, and additional administrative tasks. Project Management or project delivery experience preferred. Management of security-related projects desired. Familiarity with Project Management methodologies, best practices, and toolsets preferred. Experience interfacing with both clients and partners preferred. Excellent written and verbal communication skills are required. Outstanding time management and organizational skills are required. Ability to work independently with limited supervision required. Previous experience in a security services environment is preferred. Superior problem-solving skills required. Ability to work as a team player, strong interpersonal and communication skills required What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. Optiv Chips In encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optivs selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time. Show more Show less

Associate Analyst I On-site, Bangalore Bengaluru,Karnataka,India 2 years None Not disclosed Remote Full Time

The Associate Threat Analyst will provide intrusion/incident monitoring and detection utilizing customer provided data sources, audit and monitoring tools at both the government and enterprise level. An Associate Threat Analyst is required to be flexible and adapt to change quickly. The Associate Threat Analyst will work closely with our Threat Analyst to service customers through our Managed Detection and Response offering. How You’ll Make An Impact Analyze, document and report on potential security incidents identified in customer environments. Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets. Provide triage on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc. Perform knowledge transfers, document, and triage client’s issues regarding mitigation of identified threats Provide ongoing recommendations customers on best practices Actively research current threats and attack vectors being exploited in the wild Utilize defined SOP’s and KB’s Performs other duties as assigned Complies with all policies and standards What We’re Looking For Less than 2years of working with Incident Ticketing Systems (i.e. ServiceNow, Remedy, Remedy Force, Heat, etc.). required Desire to gain full-time professional experience in the Information Security field Excellent time management, reporting, communication skills, and ability to prioritize work Ability to generate comprehensive written reports and recommendations Write professional emails Previous experience as a point of escalation in a technical environment Customer interactions and working through various issues Base knowledge of contemporary security architectures/devices such as firewalls, routers, switches, load balancers, remote access technologies, anti-malware, SIEM, and AV Ability to work customer’s environments to report on critical security events Ability to troubleshoot technical problems and ask probing questions to find the root cause or a problem Queue management Data analysis using SIEM, Database tools such as Elastic, and Excel Experience troubleshooting security, network, and or endpoints IDS monitoring/analysis with tools such as Sourcefire and Snort Experience with SIEM platforms preferred (QRadar, LogRhythm, Exabeam, Securonix, and Splunk) Familiarity with web-based attacks and the OWASP Top 10 at a minimum Attack vectors and exploitation Mitigation, Active Directory Direct (E.g. SQL Injection) versus indirect (E.g. cross-site scripting) attacks Familiarity with SANS top 20 critical security controls Understand the foundations of enterprise Windows security including: Windows security architecture and terminology Common system hardening best practices Anti-Virus (AV) and Host Based Intrusion Prevention (HIPS) Experience in monitoring at least one commercial AV solution such as (but not limited to) Carbon Black, CrowdStrike, McAfee/Intel, Symantec, Sophos or Trend Micro Ability to identify common false positives and make suggestions on tuning Malware, Denial of Service Attacks, Brute force attacks Understanding of base malware propagation and attack vectors Propagation of malware in enterprise environments Experience with malware protection tools such as FireEye a plus. Understanding of malware mitigation controls in an enterprise environment. Network Based Attacks / System Based Attacks Familiarity with vulnerability scoring systems such as CVSS Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks Eligibility to obtain security clearance Shift flexibility, including the ability to provide on call support when needed This role is Work from Office and 24/7 shifts What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Associate Analyst I On-site, Bangalore Bengaluru,Karnataka,India 0 years INR Not disclosed Remote Full Time

The Associate Threat Analyst will provide intrusion/incident monitoring and detection utilizing customer provided data sources, audit and monitoring tools at both the government and enterprise level. An Associate Threat Analyst is required to be flexible and adapt to change quickly. The Associate Threat Analyst will work closely with our Threat Analyst to service customers through our Managed Detection and Response offering. How Youll Make An Impact Analyze, document and report on potential security incidents identified in customer environments. Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets. Provide triage on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc. Perform knowledge transfers, document, and triage clients issues regarding mitigation of identified threats Provide ongoing recommendations customers on best practices Actively research current threats and attack vectors being exploited in the wild Utilize defined SOPs and KBs Performs other duties as assigned Complies with all policies and standards What Were Looking For Less than 2years of working with Incident Ticketing Systems (i.e. ServiceNow, Remedy, Remedy Force, Heat, etc.). required Desire to gain full-time professional experience in the Information Security field Excellent time management, reporting, communication skills, and ability to prioritize work Ability to generate comprehensive written reports and recommendations Write professional emails Previous experience as a point of escalation in a technical environment Customer interactions and working through various issues Base knowledge of contemporary security architectures/devices such as firewalls, routers, switches, load balancers, remote access technologies, anti-malware, SIEM, and AV Ability to work customers environments to report on critical security events Ability to troubleshoot technical problems and ask probing questions to find the root cause or a problem Queue management Data analysis using SIEM, Database tools such as Elastic, and Excel Experience troubleshooting security, network, and or endpoints IDS monitoring/analysis with tools such as Sourcefire and Snort Experience with SIEM platforms preferred (QRadar, LogRhythm, Exabeam, Securonix, and Splunk) Familiarity with web-based attacks and the OWASP Top 10 at a minimum Attack vectors and exploitation Mitigation, Active Directory Direct (E.g. SQL Injection) versus indirect (E.g. cross-site scripting) attacks Familiarity with SANS top 20 critical security controls Understand the foundations of enterprise Windows security including: Windows security architecture and terminology Common system hardening best practices Anti-Virus (AV) and Host Based Intrusion Prevention (HIPS) Experience in monitoring at least one commercial AV solution such as (but not limited to) Carbon Black, CrowdStrike, McAfee/Intel, Symantec, Sophos or Trend Micro Ability to identify common false positives and make suggestions on tuning Malware, Denial of Service Attacks, Brute force attacks Understanding of base malware propagation and attack vectors Propagation of malware in enterprise environments Experience with malware protection tools such as FireEye a plus. Understanding of malware mitigation controls in an enterprise environment. Network Based Attacks / System Based Attacks Familiarity with vulnerability scoring systems such as CVSS Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks Eligibility to obtain security clearance Shift flexibility, including the ability to provide on call support when needed This role is Work from Office and 24/7 shifts What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. Optiv Chips In encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optivs selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time. Show more Show less

Sr. Engineer- CrowdStrike | On-Site, Bangalore Bengaluru,Karnataka,India 5 - 8 years INR Not disclosed Remote Full Time

Endpoint Senior Engineer, Cyber Operations is responsible for post-sales product and service implementation. Sr. Endpoint Engineers are responsible for completing assigned projects in a manner consistent with the teams Operational Standard, which emphasizes the importance of providing exceptional customer service. They are also responsible for meeting consulting billing objectives. How You&aposll Make An Impact Experience in Endpoint Security Platforms e.g. AV, EDR, XDR, DLP, Encryption, etc. Good knowledge on Malware / Threats Working knowledge on endpoint security technologies like Antivirus, EDR, XDR (CrowdStrike, MS Defender, Sentinel One, Endgame), DLP, Encryption Performing regular checks on synchronization, monitoring and health checks Provide recommendation to Customer security team on changes to global policies. Analyze application & Configuration settings, Policies & custom rule sets, historical performance data & provide recommendations. Working knowledge of triaging malware alerts Working knowledge of security technologies such as SIEM, DLP, UEBA and hybrid/Cloud Security environments Understanding of security by design principles and architecture level security concepts Knowledge of and experience with related Workstation and Server technologies. Knowledge on deployment tools and MDM tools Sound security engineering knowledge (technical) so as to work collaboratively with the Tech Leads and software/products architects to ensure secure Products. Good Knowledge on ITIL, Incident Management, Change Management and Problem Management including analysis and response. Understand and manage the requirements of being part of a 24x7 on-call operation, including but not limited to, shift hand-over, operational advice, guidance, support and escalation. Good knowledge on reporting, documentation etc What We&aposre Looking For Bachelor of Science degree in Computer Science or related field is required. Expertise with one or more of our core Technology Areas: Security Event Management, Content Protection (DLP, Encryption, Access Control), Endpoint Security typically obtained in 5-8 years. Thorough understanding of large-scale environments Strong presentation and verbal communication skills Process-oriented individual with strong attention to detail, and strong organizational skills. Excellent, detailed writing skills Expert knowledge of using Microsoft Office. Ability to build relationships with and influence other functional areas. Well-developed negotiation skills. Ability to build consensus. Strong interpersonal skills Ability to manage multiple tasks in parallel. This role demands the availability during US working hours(5PM(IST) to 2AM(IST)) This role is Work from Office role. What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. Optiv Chips In encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optivs selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time. Show more Show less

Associate Analyst I On-site, Bangalore Bengaluru,Karnataka,India 0 years INR Not disclosed Remote Full Time

The Associate Threat Analyst will provide intrusion/incident monitoring and detection utilizing customer provided data sources, audit and monitoring tools at both the government and enterprise level. An Associate Threat Analyst is required to be flexible and adapt to change quickly. The Associate Threat Analyst will work closely with our Threat Analyst to service customers through our Managed Detection and Response offering. How Youll Make An Impact Analyze, document and report on potential security incidents identified in customer environments. Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets. Provide triage on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc. Perform knowledge transfers, document, and triage clients issues regarding mitigation of identified threats Provide ongoing recommendations customers on best practices Actively research current threats and attack vectors being exploited in the wild Utilize defined SOPs and KBs Performs other duties as assigned Complies with all policies and standards What Were Looking For Less than 2years of working with Incident Ticketing Systems (i.e. ServiceNow, Remedy, Remedy Force, Heat, etc.). required Desire to gain full-time professional experience in the Information Security field Excellent time management, reporting, communication skills, and ability to prioritize work Ability to generate comprehensive written reports and recommendations Write professional emails Previous experience as a point of escalation in a technical environment Customer interactions and working through various issues Base knowledge of contemporary security architectures/devices such as firewalls, routers, switches, load balancers, remote access technologies, anti-malware, SIEM, and AV Ability to work customers environments to report on critical security events Ability to troubleshoot technical problems and ask probing questions to find the root cause or a problem Queue management Data analysis using SIEM, Database tools such as Elastic, and Excel Experience troubleshooting security, network, and or endpoints IDS monitoring/analysis with tools such as Sourcefire and Snort Experience with SIEM platforms preferred (QRadar, LogRhythm, Exabeam, Securonix, and Splunk) Familiarity with web-based attacks and the OWASP Top 10 at a minimum Attack vectors and exploitation Mitigation, Active Directory Direct (E.g. SQL Injection) versus indirect (E.g. cross-site scripting) attacks Familiarity with SANS top 20 critical security controls Understand the foundations of enterprise Windows security including: Windows security architecture and terminology Common system hardening best practices Anti-Virus (AV) and Host Based Intrusion Prevention (HIPS) Experience in monitoring at least one commercial AV solution such as (but not limited to) Carbon Black, CrowdStrike, McAfee/Intel, Symantec, Sophos or Trend Micro Ability to identify common false positives and make suggestions on tuning Malware, Denial of Service Attacks, Brute force attacks Understanding of base malware propagation and attack vectors Propagation of malware in enterprise environments Experience with malware protection tools such as FireEye a plus. Understanding of malware mitigation controls in an enterprise environment. Network Based Attacks / System Based Attacks Familiarity with vulnerability scoring systems such as CVSS Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks Eligibility to obtain security clearance Shift flexibility, including the ability to provide on call support when needed This role is Work from Office and 24/7 shifts What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. Optiv Chips In encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optivs selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time. Show more Show less

Sr. Analyst I On-site, Bangalore Bengaluru,Karnataka,India 0 years None Not disclosed Remote Full Time

The Sr. Threat Analyst will provide deep-level analysis for client investigations utilizing customer-provided data sources, audit, and monitoring tools at both the government and enterprise levels. The Senior Threat Analyst will work closely with our Technology Engineers, Architects, and Threat Analysts to service customers. How You'll Make An Impact High-level professional writing experience regarding documenting and reporting on potential security incidents identified in customer environments including timeline of events Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets. Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc. Perform knowledge transfers, document, and train clients regarding the mitigation of identified threats. Provide ongoing recommendations to peers and customers on tuning and best practices. Actively research current threats and attack vectors being exploited in the wild Actively work with analysts and perform investigations of escalations. Ability to discuss security posture with multiple clients and make recommendations to better their holistic security approach. Provide gap analysis for clients to better their security posture. Maintain and develop SOPs for the threat analyst team. Develop and maintain Playbooks and runbooks. Work with internal teams to increase the efficiency and effectiveness of security analysis provided by the threat analysis team. Training of new analysts on security and tools Create and maintain a Content Catalog based on security essentials and the evolving threat landscape. Provide quality assurance (QA) review of security alerts handled by Team members. What We’re Looking For Five or more years of full-time professional experience in the Information Security field Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment as a point of escalation. Excellent time management, reporting, and communication skills including customer interactions and executive presentations. Data analysis using SIEM, Database tools, and Excel. Experience troubleshooting security devices and SIEM. Ability to create and maintain content within SIEM environments and make recommendations to clients to better their visibility. IDS monitoring/analysis with tools such as Sourcefire and Snort Experience with SIEM platforms preferred (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk) is a plus. Direct (E.g., SQL Injection) versus indirect (E.g., cross-site scripting) attacks Experience with the following attacks: Web Based Attacks and the OWASP Top 10, Network-Based DoS, Brute force, HTTP Based DoS, Denial of Service, and Network-Based / System Based Attacks. Familiarity with SANS top 20 critical security controls Understand the foundations of enterprise Windows security including Active Directory, Windows security architecture and terminology, Privilege escalation techniques, Common mitigation controls and system hardening. Anti-virus (AV) and Host Based Intrusion Prevention (HIPS) Experience in monitoring at least one commercial AV solution such as (but not limited to) McAfee/Intel, Symantec, Sophos, or Trend Micro Ability to identify common false positives and make suggestions on tuning. Understanding of root causes of malware and proactive mitigation Propagation of malware in enterprise environments Familiarity with web-based exploit kits and the methods employed by web-based exploit kits. Familiarity with concepts associated with Advanced Persistent Threats and “targeted malware.” Experience and understanding of malware protection tools (FireEye) and controls in an enterprise environment. Covert channels, egress, and data exfiltration techniques Familiarity with vulnerability scoring systems such as CVSS. Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks The role demands the availability for US working hours 5PM (IST) to 3AM (IST) This role is Work From Office role. What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer (EEO). All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, status as an individual with a disability, veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Principal Analyst I On-site, Bangalore Bengaluru,Karnataka,India 9 years None Not disclosed Remote Full Time

The Principal Analyst will provide deep-level analysis for client investigations utilizing customer-provided data sources, audit, and monitoring tools at both the government and enterprise levels. The Principal Analyst will work closely with our Technology Engineers, Architects, and Threat Analysts to service customers. How You'll Make An Impact Operate independently in a geographically dispersed team, while maintaining situational awareness and keeping the team up to date Perform security monitoring and incident response activities across the networks, leveraging a variety of tools and techniques Detect incidents through proactive “hunting” across security-relevant data sets Thoroughly document incident response analysis activities Review investigations conducted by more junior analysts to ensure quality standards are met Develop new, repeatable methods for finding malicious activity across the networks Provide recommendations to enhance detection and protection capabilities Regularly present technical topics to technical and non-technical audiences Develop and follow detailed operational processes and procedures to appropriately analyze, escalate, and assist in the remediation of information security incidents Prioritize multiple high-priority tasks and formulate responses/recommendations to customers and team members in a fast-paced environment Provide assistance to other security teams Continually develop new technical skills and push overall team capabilities forward Engage with and mentor other team members Work with other teams on major engineering and architecture initiatives Be innovative with their understanding of attack methodologies, malware analysis, malicious toolkits, and how those may manifest within various security technologies Advanced proactive threat hunting Understands advanced adversary emulation concepts Advanced use case design for insider threat, operational, threat detection and response Review of defensive and detective controls to reduce client attack surface What We’re Looking For 9+ years operational experience assessing, reviewing, and remediating infrastructure vulnerabilities, CVE’s, and risks. Knowledge of third-party software vulnerabilities, security threat landscape, especially network and server threats Knowledge of cyber security threats and risks, vendor computing environments, basic systems, and network technologies. Experience with and understanding of CVE’s and CVSS scores Knowledge of compensating controls and mitigating factors. Knowledge of Information Security frameworks, guidelines, and standard methodologies. Knowledge of the Windows and / or Linux operating systems Knowledge and understanding of Cybersecurity controls and logging and monitoring tools. Ability to expertly interact with all levels of personnel Excellent verbal and written communication skills Strong in problem solving and analytical skills Ability to work on multiple projects by prioritizing and results oriented approach Good teammate with flexibility required for support operations Be well versed in the cyber threat landscape; have an advanced understanding and knowledge of what tactics and techniques are being used by adversaries; have an advanced understand and knowledge of what security controls and/or telemetry data is available to detect these tactics and techniques; and be familiar with cyber security incident response terminology, processes, and techniques. Moderate to complex investigations (multiple tools) including endpoint, UEBA, public cloud, SAAS and packet analysis Security use case design recommendations for threat detection Threat response activities such as quarantining host and other common response playbook activities Proactive threat hunting using multiple client tools Process development and documentation Application of threat intelligence to improve detection and response capabilities Extensive experience with the MITRE @ttack framework and associated tactics Extensive alert triage and endpoint investigations using technologies such as EDR Phishing analysis Malware analysis (does not include reverse engineering) MITRE attack framework expertise and understanding of common attack tactics used by threat actors Provide recommendations on tuning of security detection platforms and use cases to improve accuracy of detection DL NUMBER - Driver License, Valid and in State Upon Hire required CISSP Certified Information Systems Security Professional Upon Hire preferred Certified Information Security Manager (CISM) Upon Hire preferred Certified Information Systems Auditor (CISA) Upon Hire preferred This role is Work From Office role and 24/7 shifts What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Sr. Engineer-CrowdStrike | On-Site, Bangalore Bengaluru,Karnataka,India 5 - 8 years None Not disclosed Remote Full Time

Endpoint Senior Engineer, Cyber Operations is responsible for post-sales product and service implementation. Sr. Endpoint Engineers are responsible for completing assigned projects in a manner consistent with the team’s Operational Standard, which emphasizes the importance of providing exceptional customer service. They are also responsible for meeting consulting billing objectives. How You'll Make An Impact Experience in Endpoint Security Platforms e.g. AV, EDR, XDR, DLP, Encryption, etc. Good knowledge on Malware / Threats Working knowledge on endpoint security technologies like Antivirus, EDR, XDR (CrowdStrike, MS Defender, Sentinel One, Endgame), DLP, Encryption Performing regular checks on synchronization, monitoring and health checks Provide recommendation to Customer security team on changes to global policies. Analyze application & Configuration settings, Policies & custom rule sets, historical performance data & provide recommendations. Working knowledge of triaging malware alerts Working knowledge of security technologies such as SIEM, DLP, UEBA and hybrid/Cloud Security environments Understanding of security by design principles and architecture level security concepts Knowledge of and experience with related Workstation and Server technologies. Knowledge on deployment tools and MDM tools Sound security engineering knowledge (technical) so as to work collaboratively with the Tech Leads and software/products architects to ensure secure Products. Good Knowledge on ITIL, Incident Management, Change Management and Problem Management including analysis and response. Understand and manage the requirements of being part of a 24x7 on-call operation, including but not limited to, shift hand-over, operational advice, guidance, support and escalation. Good knowledge on reporting, documentation etc. What We're Looking For Bachelor of Science degree in Computer Science or related field is required. Expertise with one or more of our core Technology Areas: Security Event Management, Content Protection (DLP, Encryption, Access Control), Endpoint Security typically obtained in 5-8 years. Thorough understanding of large-scale environments Strong presentation and verbal communication skills Process-oriented individual with strong attention to detail, and strong organizational skills. Excellent, detailed writing skills Expert knowledge of using Microsoft Office. Ability to build relationships with and influence other functional areas. Well-developed negotiation skills. Ability to build consensus. Strong interpersonal skills Ability to manage multiple tasks in parallel. This role demands the availability during US working hours(5PM(IST) to 2AM(IST)) This role is Work from Office role. What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.

Client Engagement Lead | Onsite, Bangalore Bengaluru,Karnataka,India 9 - 11 years INR Not disclosed Remote Full Time

The Client Engagement Lead (CEL) manages engagements from inception to completion, identifying and documenting requirements, supporting clients on various information security initiatives, keeping all stakeholders apprised of program and budget status, and managing issues to resolution.? Client Engagement Leads are responsible for the program health over the entire program life cycle (on-boarding, service activation, service continuation, renewal, decommission).?CELs are also responsible for onboarding the program team, assigning individual responsibilities, identifying appropriate resources needed, and developing the schedule to ensure timely completion of projects and programs.? Client Engagement Leads are expected to build trusting relationships with clients through the delivery of successful outcomes in alignment with Optivs commercial commitments. The Client Engagement Lead oversees all program activity with key client engagements across Advanced Fusion Center (AFC).? The Client Engagement Lead may lead others contributors to program engagements such as Client Engagement Specialists, Project Managers and Subject Matter Experts. CELs are integral in building relationships with their client counterparts or key points of contact.? They also contribute to business development efforts by identifying new opportunities and collaborating with the account leadership to support business growth with the client. How You&aposll Make An Impact Drive program and engagement progress across multiple client engagements with multiple capabilities, practices, communities, stakeholders and levels of oversight with assurance on maintaining progress, timeliness, and effective resource utilization rates on a weekly basis. Develop strategic program management delivery plans, detailed schedules, program deliverable controls, cost forecasting, risk management, issues forecast and resolution planning, resource burn-rate analysis, forecasting, and reporting, and daily task management. Partner with Operations teams to develop and communicate service delivery strategies across multiple internal practices and departments.? Accountable for the progress of the overall engagement and all related projects that may comprise the program or solutions. Accountable for driving timelines by creating and maintaining schedules (including key deliverables, milestones, and dependencies), understanding the deliverables and the progress toward each milestone, identifying, and managing issues, risks, and other potential delays ahead of time, and identifying and driving resolution of all engagement related risks and issues. Demonstrate expert-level of knowledge of Program Management best practices, process and supporting systems to drive client outcomes. Identify, forecast, manage, control, and communicate risk management plans, issues, and impacts across multiple levels of leadership, operations and client. Ensure a common understanding by setting expectations in accordance with the Program Delivery Plan, to align the stakeholders and ensure the customers goals and expectations are achieved. Assist in the development of Program Management business delivery strategies, program health analysis & internal reporting. Lead the composition of program delivery schedules, resource models and granular execution plans Be able to perform work as an individual contributor while collaborating with multiple internal functions to best manage program delivery strategies from initial planning and on-boarding through ramp-down and closure. CEL acts as a single point of contact for our customers throughout the client engagement lifecycle. Communicate client concerns, questions and conflicts to internal stakeholders and take the necessary actions to resolve and/or troubleshoot challenges in a strategic manner. Assign tasks to program team members and ensure timely completion or adequate escalation. Generate and distribute program reports and lead program meetings to disseminate the appropriate information to the program team and stakeholders. Proactively monitor and report on engagement budget, margin and engagement resource variance to plan Works closely with the sales and account teams, demand and solution teams to scope program solution design, tools and reporting Analyze, report, and disseminate program status reports to Practice Leadership. ? What We&aposre Looking For BA or BS in Computer Science, Management Information Systems, Engineering, Business or related field. 9+ years of experience in a client facing Program, Project or PMO role within a professional services organization, with emphasis on information security projects and programs. Demonstrated program management expertise and success managing cross-capability engagements across multiple clients.? Superior analytical and problem-solving skills required. Strong influential skills, customer-focused program leadership capabilities. Management of information security engagements or operations required. Expert level experience with Program Management methodologies, best practices, and tools Experience interfacing with both clients and internal business partners required. Excellent written and verbal communication skills required including making clear and concise presentations to various audiences with an executive presence. Outstanding time management and organizational skills required. Ability to work independently with limited supervision required. Significant experience as a consultant providing security expertise to clients preferred. Current knowledge of security threats, solutions, security tools and network technologies strongly desired. What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. Optiv Chips In encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optivs selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time. Show more Show less

Sr. Engineer- Sailpoint | On-Site, Bangalore Bengaluru,Karnataka,India 6 - 8 years INR Not disclosed Remote Full Time

A SailPoint Senior Engineer focuses on developing, implementing, and maintaining identity and access management (IAM) solutions using SailPoint&aposs products. They handle tasks like user provisioning, access certifications, and integrations with other systems. Key responsibilities include designing, configuring, and testing SailPoint IdentityIQ and IdentityNow solutions, ensuring compliance, and providing support for IAM processes. How Youll Make An Impact Design, implement, and configure SailPoint IdentityIQ and IdentityNow solutions to meet business and security requirements. Develop and maintain lifecycle event workflows, rules, policies, and connectors for integrations with various systems. Manage user provisioning, deprovisioning, and access requests within SailPoint. Support access certification processes, including identifying roles, defining business processes, and managing certifications. Configure and maintain SailPoint workflows for various tasks like onboarding, offboarding, and access requests. Ensure compliance with regulatory requirements and security policies, conduct audits, and implement security measures. Troubleshoot and resolve issues related to identity lifecycle processes, provisioning, and deprovisioning, and provide user support. Implement and configure connectors between SailPoint and in-scope applications. Develop and execute test plans, test cases, and scripts for SailPoint functionalities, including UI, API, workflows, and integrations. Develop and maintain technical documentation for SailPoint solutions. What Were Looking For 6+ years of experience. Strong knowledge of SailPoint IdentityIQ and IdentityNow platforms. SailPoint certifications (e.g., SailPoint Certified IdentityIQ Engineer) are often preferred or required. Proficiency in IAM concepts, including identity lifecycle management, access provisioning, RBAC, and entitlement management. Familiarity with scripting languages (e.g., BeanShell), Java, and other programming languages as needed. Ability to troubleshoot complex technical issues and analyze data. Excellent communication skills to explain technical concepts to both technical and non-technical stakeholders. This role requires compulsory work from the office. Ready to work from Monday to Friday US working hours, Ready for on call Services. What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. Optiv Chips In encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optivs selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time. Show more Show less

Business Analyst - Threat Management Platform | Remote bengaluru,karnataka,india 1 - 4 years None Not disclosed Remote Full Time

At Optiv, we’re on a mission to help our clients make their businesses more secure. We’re one of the fastest growing companies in a truly essential industry. In your role at Optiv, you’ll be inspired by a team of the brightest business and technical minds in field. We are passionate champions for our clients and know from experience that the best solution for our clients’ needs come from working hard together. As part of our team, your voice matters, and you will do important work that has impact, on people, businesses, and nations. Our industry and our company move fast, and you can be sure that you will always have room to learn and grow. We’re proud of our team and the important work we do to build confidence for a more connected world. As a Threat Management Platform Business Analyst, you’ll play a pivotal role in supporting and enhancing our cybersecurity reporting ecosystem through the strategic management of the PlexTrac platform. You’ll analyze business processes, identify areas for improvement, and develop strategies to boost efficiency and productivity. This role is ideal for someone with 1 - 4 years of experience in cybersecurity or platform support who’s passionate about operational excellence, automation, and collaborative problem-solving. You’ll serve as the platform strategist, responsible for managing, optimizing, and evolving platform to support streamlined cybersecurity reporting and threat exposure workflows. Who We Are Looking For Serve as the primary point of contact for user onboarding, access management, and platform-related support. Gather and document detailed business and technical requirements for platform enhancements. Create and maintain documentation including business processes, user stories, and platform configurations. Identify repetitive reporting and workflow processes within security teams that can be centralized or automated using platform. Collaborate with Penetration Testers to translate technical assessment data into standardized, actionable reports and dashboards. Partner with Project Managers and Delivery Managers to refine platform requirements and improve user experience. Map current reporting workflows and propose future-state models that leverage platform’s capabilities. Participate in testing and validation of new features, workflows, and integrations. Conduct demos and walkthroughs of platform features for internal teams and new users. Provide regular updates to stakeholders on platform performance, usage trends, and enhancement roadmaps. How You’ll Make An Impact 1 - 4 years of experience in business analysis, platform enablement, or cybersecurity operations, ideally involving reporting or threat exposure management tools. Ability to gather, document, and translate business and technical requirements into actionable platform configurations and workflows. Experience conducting stakeholder demos, onboarding users, and managing access controls across enterprise platforms. Strong communication and facilitation skills to bridge gaps between technical teams, business stakeholders, and service delivery managers. A passion for improving security workflows and a curiosity for how platforms like PlexTrac can be leveraged for automation and efficiency. Analytical mindset with strong problem-solving skills and the ability to identify opportunities for process improvement and platform optimization. What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.