Jobs
Interviews

891 Qradar Jobs - Page 13

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 years

0 Lacs

Greater Kolkata Area

Remote

Line of Service Advisory Industry/Sector Not Applicable Specialism Operations Management Level Senior Associate Job Description & Summary At PwC, our people in business application consulting specialise in consulting services for a variety of business applications, helping clients optimise operational efficiency. These individuals analyse client needs, implement software solutions, and provide training and support for seamless integration and utilisation of business applications, enabling clients to achieve their strategic objectives. As a business application consulting generalist at PwC, you will provide consulting services for a wide range of business applications. You will leverage a broad understanding of various software solutions to assist clients in optimising operational efficiency through analysis, implementation, training, and support. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us. At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. Job Description & Summary: We are looking for an experienced Cloud Security Lead with deep technical expertise in Zscaler (ZIA/ZPA) and Fortinet security solutions. The ideal candidate will play a key role in architecting, implementing, and managing secure cloud on-prem and internet access strategies, supporting enterprise-wide digital transformation and security posture enhancement. Responsibilities: Zscaler Security Operations • Design, implement, and manage Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) solutions. • Configure SIPA (Secure Internet & Private Access) policies for optimized secure remote and internet access. • Perform regular reviews, audits, and optimization of Zscaler configurations to align with industry best practices. • Provide technical support and guidance to L1 and L2 teams for Zscaler-related issues. • Stay up to date on Zscaler enhancements, threat intelligence, and security features to ensure proactive defense. Fortinet and Network Security • Implement and manage Fortinet firewall and security solutions for perimeter and cloud-based infrastructure. • Configure Fortinet firewalls to support SD-WAN, secure edge, and hybrid cloud environments. • Work closely with networking teams to design secure network topologies integrating Fortinet technologies. Cloud Security and Compliance • Design and assess cloud-native security architectures for AWS, Azure, or GCP environments. • Conduct cloud security assessments, vulnerability scans, and risk remediation. • Align security strategies with industry standards like ISO 27001:2022, SOC 2, HIPAA, GDPR, and CIS v3.0.0. • Assist in external security audits and privacy assessments related to cloud workloads. Collaboration and Strategy • Collaborate with cross-functional teams (Security, IT, DevOps, Engineering) to embed security into cloud and network initiatives. • Act as a Subject Matter Expert (SME) for Zscaler and Fortinet technologies in solution design and customer engagements. • Maintain documentation on security controls, configurations, SOPs, and incident response playbooks. Required Skills and Qualifications: Experience in network and cloud security domains. • Proven hands-on experience with Zscaler ZIA/ZPA design, implementation, and operations. • Strong working knowledge of Fortinet firewalls and FortiManager, FortiAnalyzer. • Experience with SD-WAN, SDN, VPNs, and secure web gateway technologies. • Strong understanding of network security principles, SIEM, threat intelligence, and incident response. Knowledge of cloud compliance standards and risk frameworks (NIST, CIS, ISO). • Excellent communication skills and ability to work in cross-functional environments. • Strong documentation, presentation, and stakeholder management skills. • Experience in SOC environment will be a plus Mandatory skill sets: Zscaler ZIA / ZPA / SIPA • Fortinet FortiGate / FortiManager / FortiAnalyzer • SIEM platforms (Splunk, QRadar, etc.) • Firewall platforms: Fortinet, Palo Alto, Check Point, Juniper • Security Frameworks: ISO 27001, NIST, CIS Controls, HIPAA, GDPR Preferred skill sets: Zscaler Certified Professional – ZIA/ZPA • Fortinet Certified Professional (FCP) • CISSP / CCSP / CISM • Cloud Security certifications (AWS/Azure/GCP Security Specialty) Years of experience required: 5-8 Years of experience Education qualification: Graduate Engineer or Management Graduate Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Master Degree, Bachelor Degree Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills Splunk Administration Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Analytical Reasoning, Analytical Thinking, Application Software, Business Data Analytics, Business Management, Business Technology, Business Transformation, Communication, Creativity, Documentation Development, Embracing Change, Emotional Regulation, Empathy, Implementation Research, Implementation Support, Implementing Technology, Inclusion, Intellectual Curiosity, Learning Agility, Optimism, Performance Assessment, Performance Management Software {+ 16 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Available for Work Visa Sponsorship? Government Clearance Required? Job Posting End Date

Posted 3 weeks ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Do The candidate must have either played Product Development role for a reputable Product Company , like Google and its partnership . Should be well versed in the Application & cloud products from Google. - Should be able to Lead practice, own Strategy & execution - Build Assets - Own GTM/ Field initiatives - Should be well versed with the emerging trends, IT/business drivers for products and solutions development, crowd sourcing approachesin open source cloud platforms. - Good execution understanding of Cloud based application development using Google Technologies. - Must be able to handle conversation & relationship at CXO levels - Candidate should possess excellent communication skills - Familiarity with global working modelIndustry Leadership - Represent Wipro brand in various industry/vendor forums and events - Build connects with Business/IT Leadership and Industry Analysts Innovation & Product Engineering - Contribute towards Practice development strategy, methodology, and execution as per demand. - Market intelligence, industry outlook, conceptualize and assist in designing new solutions - Ideation of disruptive / future proof solutions to enable growth Alliances - Work with Google alliance teams and develop joint solutions - The candidate must have a background of Product Development role andwell versed in the Application & cloud products from Google. - Should be able to Lead practice, own Strategy & execution - Own GTM/ Field initiatives - Should be well versed with the emerging trends, IT/business drivers for products and solutions development, crowd sourcing approachesin open source cloud platforms. - Good execution understanding of Cloud based application development using Google Technologies. - Must be able to handle conversation & relationship at CXO levels - Candidate should possess excellent communication skills - Familiarity with global working modelIndustry Leadership - Represent Wipro brand in various industry/vendor forums and events - Build connects with Business/IT Leadership and Industry Analysts Innovation & Product Engineering - Contribute towards Practice development strategy, methodology, and execution as per demand. - Market intelligence, industry outlook, conceptualize and assist in designing new solutions - Ideation of disruptive / future proof solutions to enable growth Mandatory Skills: Automotive. Experience:3-5 Years.

Posted 3 weeks ago

Apply

7.0 - 12.0 years

16 - 20 Lacs

Bengaluru

Work from Office

Meet the Team The Security Operations Center (SOC) Security Investigator is responsible for investigating and responding to security issues within customer environments. Cisco Managed Security Services is looking for a Security Investigator who can analyze security events generated from network analytics, endpoint protection, and other security suites to determine the severity and outcome of any threats detected. The Security Investigator will provide remediation actions to the client based on the impact of these threats up to and including taking proactive responses for high priority events. You must be able to accurately identify and prioritize events, translate technical solutions for an audience of varying technical knowledge, and make customer impacting recommendations with the goal of ensuring customer satisfaction. l> Your Impact Take ownership of and conduct in-depth investigations into security events Document security investigations in a clear and concise manner Ensure that incoming client requests are addressed and worked in a timely manner Assist clients to address security incidents in an expedited manner Proactively hunt for suspicious or malicious activity not detected via automated alerts Work as a member of a team to prioritize incoming automated security events based on the impact and urgency of the events Provide knowledge sharing with the rest of the team Utilize threat intelligence to enrich and qualify security events Maintain knowledge of new tactics, techniques and procedures (TTP) in customer verticals Identify processes and procedures that are candidates for automation Minimum Qualifications Relevant degree in a technical field (Computer Science / Computer Engineering / Cybersecurity / Computer Networking) or related discipline with 9+ years equivalent experience Familiarity with incident handling, incident response frameworks, guidelines, and best practices (NIST, ISO, etc.) Passion for IT Security and staying up-to-date with current TTP's Experience with threat intelligence and open source threat intelligence Knowledge of enterprise network and computer environments and the common protocols and applications in these environments Preferred Qualifications Suggested certifications (OSCP,Sec+, CCIE - Security , CySA+,CCNA CyberOps, GCIH, GCIA, GCFA, GCFE, CEH) Working knowledge of Splunk admin and play book tuning Familiarity with MITRE ATT&CK framework Experience with a scripting/automation language (Python, BASH)

Posted 3 weeks ago

Apply

8.0 - 12.0 years

10 - 15 Lacs

Mumbai, Bengaluru

Work from Office

Your role We are seeking a proactive and experienced Security Operations Center (SOC) professional to join our cybersecurity team with 4+ years of experience . Depending on the level (Analyst, Lead, or Manager), the role will involve monitoring, analyzing, and responding to security incidents, managing SOC operations, and leading threat detection and response initiatives. Monitor SIEM systems and security tools for suspicious activity. Analyze and respond to security incidents and threats. Stay updated on threat intelligence and attack trends. Review logs from firewalls, IDS/IPS, and antivirus tools. Escalate critical incidents and document findings. Support vulnerability management and remediation tracking. Configure and tune security tools like SIEM and EDR. Ensure compliance with security policies and audits. Collaborate with IT and network teams on investigations. Contribute to process improvements and incident playbooks. Lead and mentor junior analysts (for Lead/Manager roles). Your profile SIEM (e.g., Splunk, QRadar, ArcSight) Incident Response /Log Analysis Threat Intelligence Scripting (Python, PowerShell) for automation EDR tools (e.g., CrowdStrike, Carbon Black) What you''ll love about working here You can shape yourcareerwith us. We offer a range of career paths and internal opportunities within Capgemini group. You will also get personalized career guidance from our leaders. You will get comprehensive wellness benefits including health checks, telemedicine, insurance with top-ups, elder care, partner coverage or new parent support via flexible work. At Capgemini, you can work oncutting-edge projectsin tech and engineering with industry leaders or createsolutionsto overcome societal and environmental challenges. Location - Bengaluru,Mumbai,,Pune

Posted 3 weeks ago

Apply

5.0 - 8.0 years

9 - 14 Lacs

Hyderabad

Work from Office

Role Purpose The purpose of the role is to support process delivery by ensuring daily performance of the Production Specialists, resolve technical escalations and develop technical capability within the Production Specialists. Do Oversee and support process by reviewing daily transactions on performance parameters Review performance dashboard and the scores for the team Support the team in improving performance parameters by providing technical support and process guidance Record, track, and document all queries received, problem-solving steps taken and total successful and unsuccessful resolutions Ensure standard processes and procedures are followed to resolve all client queries Resolve client queries as per the SLAs defined in the contract Develop understanding of process/ product for the team members to facilitate better client interaction and troubleshooting Document and analyze call logs to spot most occurring trends to prevent future problems Identify red flags and escalate serious client issues to Team leader in cases of untimely resolution Ensure all product information and disclosures are given to clients before and after the call/email requests Avoids legal challenges by monitoring compliance with service agreements Handle technical escalations through effective diagnosis and troubleshooting of client queries Manage and resolve technical roadblocks/ escalations as per SLA and quality requirements If unable to resolve the issues, timely escalate the issues to TA & SES Provide product support and resolution to clients by performing a question diagnosis while guiding users through step-by-step solutions Troubleshoot all client queries in a user-friendly, courteous and professional manner Offer alternative solutions to clients (where appropriate) with the objective of retaining customers and clients business Organize ideas and effectively communicate oral messages appropriate to listeners and situations Follow up and make scheduled call backs to customers to record feedback and ensure compliance to contract SLAs Build people capability to ensure operational excellence and maintain superior customer service levels of the existing account/client Mentor and guide Production Specialists on improving technical knowledge Collate trainings to be conducted as triage to bridge the skill gaps identified through interviews with the Production Specialist Develop and conduct trainings (Triages) within products for production specialist as per target Inform client about the triages being conducted Undertake product trainings to stay current with product features, changes and updates Enroll in product specific and any other trainings per client requirements/recommendations Identify and document most common problems and recommend appropriate resolutions to the team Update job knowledge by participating in self learning opportunities and maintaining personal networks Mandatory Skills: Security Incident Response. Experience: 5-8 Years.

Posted 3 weeks ago

Apply

5.0 - 8.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Bachelors degree in Computer Science, Information Security, or related field; or equivalent practical experience. Experience in a SOC or cybersecurity analyst role. Proficient in using Microsoft Sentinel, MS Unified SecOps/XDR, and other SIEM/EDR platforms. Strong knowledge of KQL and experience creating detection rules. Hands-on experience handling alerts and incidents from MDE & MDO. Ability to perform advanced analysis of logs, network flows, and security telemetry. Excellent problem-solving, analytical, and communication skills. Certifications such as CompTIA Security+, CEH, or equivalent are preferred. Mandatory Skills: Security Information Event Management. Experience: 5-8 Years.

Posted 3 weeks ago

Apply

1.0 - 3.0 years

0 - 3 Lacs

Chennai

Work from Office

Raksha Technologies is 25 years young, Pure Play Cyber Security System Integrator with its HQ in Chennai, with PAN India operations for Sales and Services. Focusing on Information Security Space, we have emerged as a pioneer in providing specialized end-to-end Quality Solutions to customers across India Products, Service, Training and Consultancy. Raksha Technologies, an ISO 9001 & 27001 Certified organization, with an Employee First-One Team culture approach, is a joyous place to work for 100+colleagues with high employee retention rate. We have been recognized by key vendors and Trade Magazines in the IT Industry with 80+Awards. We are what we repeatedly do...For making a difference, Raksha welcomes you. We are looking for an entry-level SOC Analyst who will monitor cyber security events, perform analysis and provide remediation activities. Job Title : SOC Analyst Experience : 1-3 Year Location : Chennai, India Job Type : Full Time Work Time : 24/7 (Rotational Shift) What you’ll do: Monitor and analyze cyber security event data from various sources Prioritize the cyber security events and perform the response measures Escalate the events/incidents to appropriate levels and stakeholders Create Security incident tickets and follow up till closure Tracking all identified critical assets and keep watch on log ingestion into SIEM tool Coordination with various teams for incident response and remediation related activities Provide effective communication to all stake holders to meet SLA Prepare Daily/weekly/Monthly dashboard reports and share with relevant stake holders About you: 1- 3 years of experience as Systems/Network/Information Security Analyst is preferred Should have basic knowledge in firewalls, ID/IPS, AV/EDR, Proxy, DNS, email, AD, etc. Understanding in Log formats of various security devices like Proxy, Firewall, IDS/IPS DNS Understanding of networking concepts like TCP/IP, LAN/WAN, Internet and Networking Technical Certifications (MCSE / CEH / CCNA / CCNP etc.) would be desirable Strong analytical and problem-solving skills Excellent communication and interpersonal skills Good to have a Diploma or Degree from CSE or IT background

Posted 3 weeks ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Gurugram

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: SPLUNK Security Analytics. Experience:3-5 Years.

Posted 3 weeks ago

Apply

6.0 years

0 Lacs

Hyderābād

On-site

Job requisition ID :: 86004 Date: Jul 11, 2025 Location: Hyderabad Designation: Manager Entity: Deloitte South Asia LLP Your potential, unleashed. India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks Overview: We are looking for an experienced Security Operations L3 Engineer to provide advanced-level support in monitoring, detecting, and responding to cybersecurity incidents. The L3 engineer will act as a senior escalation point, performing detailed threat analysis, handling complex incidents, and providing guidance to junior SOC team members. The ideal candidate will have deep expertise in incident response, threat hunting, and security monitoring tools, along with the ability to lead investigations and contribute to process improvements. Key Responsibilities: Incident Response (IR): Lead investigations and respond to advanced security incidents, providing root cause analysis, containment, eradication, and recovery recommendations. Threat Hunting: Proactively hunt for and analyze potential threats within the organization’s environment using SIEM tools, EDR, and threat intelligence feeds. Triage & Escalation: Act as the final escalation point for unresolved security incidents, assisting L1 and L2 teams with incident analysis and decision-making. Security Monitoring: Continuously monitor security tools (SIEM, EDR, IDS/IPS, etc.) to identify malicious activities, patterns, and anomalies. Forensic Analysis: Perform digital forensics and malware analysis on compromised systems to identify the nature of attacks and minimize future risks. SIEM Management: Tune and enhance SIEM rules, alerts, and dashboards to optimize detection capabilities and reduce false positives. Threat Intelligence Integration: Integrate and apply threat intelligence data to enrich detection capabilities and provide context to ongoing threats and incidents. Vulnerability Management: Collaborate with IT and security teams to assess and address vulnerabilities, ensuring timely patching and remediation. Process Improvement: Contribute to the development of incident response playbooks, procedures, and best practices to streamline SOC operations and improve response times. Mentorship & Training: Provide guidance and mentorship to L1 and L2 SOC analysts, conducting regular training sessions to enhance team capabilities. Reporting & Documentation: Produce detailed reports and metrics on incidents, threat activity, and overall SOC performance for both technical and executive audiences. Required Qualifications: Bachelor’s degree in Computer Science, Cybersecurity, or related field, or equivalent experience. 6+ years of experience in security operations, with at least 2 years in an L3 or senior-level role. Strong hands-on experience in security monitoring, incident response, and threat hunting. Proficiency with SIEM tools (QRadar, Splunk, ArcSight, etc.), EDR solutions, and other security monitoring tools. Expertise in network security, malware analysis, intrusion detection, and digital forensics. Experience working with frameworks such as MITRE ATT&CK, NIST, and SANS Incident Response. Preferred Certifications: CISSP, CISM, GCIH, GCFA, or other relevant cybersecurity certifications. Certification in specific SIEM platforms (e.g., IBM QRadar, Splunk). How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome… entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals. *Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices. At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution. In this regard, you may refer to a more detailed advisory given on our website at: https://www2.deloitte.com/in/en/careers/advisory-for-career-aspirants.html?icid=wn_

Posted 3 weeks ago

Apply

0 years

0 Lacs

Hyderābād

On-site

Job requisition ID :: 85201 Date: Jul 11, 2025 Location: Hyderabad Designation: Consultant Entity: Deloitte Touche Tohmatsu India LLP Your potential, unleashed. India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realise your potential amongst cutting edge leaders, and organisations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks Your work profile As Consultant in our Cyber Team you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: - Key Responsibilities & Desired qualifications We are seeking an experienced and proactive L2 SOC Analyst with expertise in SOAR Playbook development. The candidate will be responsible for managing, developing, and enhancing automation and orchestration workflows within SOAR. Key Requirements: Develop and maintain playbooks in SOAR for automated threat detection and response. Integrate various security tools (SIEM, EDR, threat intel feeds, etc.) into SOAR. Create custom automations/scripts using Python and XSOAR’s automation engine. Tune and optimize existing playbooks for performance, accuracy, and false positive reduction. Document playbook logic, automation scripts, and incident handling procedures. Provide mentorship and support to L1 analysts and contribute to SOC knowledge sharing. Strong hands-on experience with Cortex XSOAR and playbook development. Familiarity with Python scripting for automation in SOAR. Working knowledge of SIEM tools (e.g., Splunk, QRadar, Elastic). Good understanding of cybersecurity concepts: malware, phishing, MITRE ATT&CK, etc. Strong analytical and problem-solving skills. Ability to work independently and as part of a team in a fast-paced environment. Preferred Qualifications: Knowledge of incident response frameworks (NIST, SANS). SOAR Certified Automation Engineer. Location and way of working Base location: Hyderabad Professional is required to work from office Your role as Senior Execuive We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society. In addition to living our purpose, Senior Executive across our organization must strive to be: Inspiring - Leading with integrity to build inclusion and motivation Committed to creating purpose - Creating a sense of vision and purpose Agile - Achieving high-quality results through collaboration and Team unity Skilled at building diverse capability - Developing diverse capabilities for the future Persuasive / Influencing - Persuading and influencing stakeholders Collaborating - Partnering to build new solutions Delivering value - Showing commercial acumen Committed to expanding business - Leveraging new business opportunities Analytical Acumen - Leveraging data to recommend impactful approach and solutions through the power of analysis and visualization Effective communication – Must be well abled to have well-structured and well-articulated conversations to achieve win-win possibilities Engagement Management / Delivery Excellence - Effectively managing engagement(s) to ensure timely and proactive execution as well as course correction for the success of engagement(s) Managing change - Responding to changing environment with resilience Managing Quality & Risk - Delivering high quality results and mitigating risks with utmost integrity and precision Strategic Thinking & Problem Solving - Applying strategic mindset to solve business issues and complex problems Tech Savvy - Leveraging ethical technology practices to deliver high impact for clients and for Deloitte Empathetic leadership and inclusivity - creating a safe and thriving environment where everyone's valued for who they are, use empathy to understand others to adapt our behaviours and attitudes to become more inclusive. How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome… entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals. *Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices. At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution. In this regard, you may refer to a more detailed advisory given on our website at: https://www2.deloitte.com/in/en/careers/advisory-for-career-aspirants.html?icid=wn_

Posted 3 weeks ago

Apply

4.0 - 6.0 years

0 Lacs

Delhi

On-site

Job requisition ID :: 85976 Date: Jul 10, 2025 Location: Delhi Designation: Assistant Manager Entity: Deloitte Touche Tohmatsu India LLP Your potential, unleashed. India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks. Your work profile. We are seeking a skilled SOC Operations to manage, maintain, and enhance our SOC platform, ensuring effective monitoring, detection, and response to security incidents. The ideal candidate will have strong experience in SOC administration, threat detection, and SOC operations to provide continuous security improvements and support to the SOC team. Key Responsibilities: Conduct in-depth investigation of security incidents including data collection, root cause analysis, and recovery efforts, ensuring compliance with defined SLAs. Validate and fine-tune correlation rules, use-cases, and custom detections in SIEM tools to reduce false positives and improve detection fidelity. Propose new SIEM use cases with playbook creation based on threat intelligence, evolving TTPs, or internal security gaps. Conduct alert quality reviews, enhancing or retiring outdated detection logic and recommending improved strategies. Provide mentorship and analytical support to L1 analysts, helping them enhance detection and response capabilities. Continuously monitor SIEM and other security tools for alerts indicating potential threats, policy violations, or anomalies in the network. Lead incident response activities, focusing on containment and eradication of threats while ensuring forensic integrity for post-event analysis. Correlate data from various sources to identify security incidents and create actionable intelligence. Collaborate with cross-functional teams and subject matter experts to resolve complex technical issues swiftly. Review logs, metrics, and system behavior to identify patterns and early indicators of compromise. Document incidents, root cause, and resolution steps in a structured manner, and contribute to the refinement of incident response playbooks. Share security knowledge and threat insights across the team to promote continuous learning and improvement. Keep leadership informed of high-priority incidents and propose tactical/strategic countermeasures. Ensure adherence to internal policies, regulatory requirements, and industry best practices throughout all SOC processes. Required Skill Set: 4–6 years of professional experience in Information Security, SOC operations or incident response. Strong knowledge of cybersecurity frameworks and methodologies including MITRE ATT&CK, Cyber Kill Chain and NIST IR. God Knowledge in Cloud Security concepts and tools—experience with EDR, DLP, and Firewall technologies is a must. Deep understanding of core network and security principles (Operating systems, TCP/IP, ports, detection/IDS/IPS, etc.). Working knowledge of malware analysis and sandbox environments. Ability to interpret complex alerts and logs from diverse sources and translate them into practical response actions. Excellent communication, documentation, and collaboration skills to interact with stakeholders at all levels. How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome… entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals. *Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices. At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution. In this regard, you may refer to a more detailed advisory given on our website at: https://www2.deloitte.com/in/en/careers/advisory-for-career-aspirants.html?icid=wn_

Posted 3 weeks ago

Apply

7.0 - 12.0 years

15 - 22 Lacs

Chennai

Work from Office

Role & responsibilities 6+ years of experience in cybersecurity operations with solid L3-level incident handling. Hands-on expertise with endpoint security solutions (CrowdStrike, SentinelOne, Microsoft Defender ATP, Carbon Black, etc.). Strong proficiency in conducting demos and technical evaluations for R&D or pre-deployment scenarios. In-depth understanding of SIEM platforms, EDR, network security, and intrusion detection. Experience with malware analysis, threat intelligence, and reverse engineering is a plus. Knowledge of Windows, Linux, and cloud environments (AWS/Azure/GCP). Familiarity with security frameworks (NIST, MITRE ATT&CK, SANS). Scripting skills (Python, PowerShell, Bash) for automation. Relevant certifications preferred: CISSP, OSCP, CEH, GCIA, GCIH .

Posted 3 weeks ago

Apply

8.0 - 10.0 years

14 - 20 Lacs

Gurugram

Work from Office

Purpose of the Role As a Senior Information Security Analyst supporting the Yum! Cybersecurity team, you will act as a primary escalation point within the SOC for the SIEM platform and major incident investigations. This is a global role that supports over 53,000 restaurants across 150+ countries. The role involves responding to, researching, and addressing complex network security events while collaborating with brand Security and IT teams, as well as third-party service providers. Occasional on-call duties may be required. Responsibilities Investigate and resolve escalated security alerts using enterprise SIEM platforms (e.g., QRadar). Document investigations thoroughly, communicate with stakeholders, and ensure full resolution of issues. Gather, analyze, and summarize threat intelligence for internal stakeholders. Identify SIEM tuning opportunities and develop new use cases. Provide oversight for threat and vulnerability management and communicate risk observations to leadership. Collaborate with Subject Matter Experts across Security Services to optimize processes and improve the security service model. Partner with the Log Collection and Platform team to implement automation and efficiency measures. Lead brand collaboration calls to communicate detection trends, resolution statuses, and follow-up actions. Minimum Requirements: BTECH / Degree in Cybersecurity, Information Technology, or equivalent experience. 8-10 Years experience in a high-performance SOC or cybersecurity operations environment. 2-3 years of foundational IT experience (e.g. service desk, network operations, etc) ertifications such as GCIH, GSOC, GMON, GSEC, CCNA, Security+, or Network+ preferred. Experience with enterprise-grade SIEM platforms (e.g., QRadar, LogRhythm, CrowdStrike). Strong technical knowledge in IDS/IPS, firewalls, routers, and endpoint security. Familiarity with frameworks such as the Cyber Kill Chain. Demonstrated experience with threat analysis, event triage, and incident root-cause identification. Strong interpersonal and communication skills across technical and non-technical audiences. Experience with red/blue team or tabletop exercises. Time management and critical thinking in high-pressure environments. Preferred Requirements

Posted 3 weeks ago

Apply

1.0 - 3.0 years

0 - 3 Lacs

Mumbai, Mumbai Suburban, Navi Mumbai

Work from Office

Hi, We have an opening for Cyber Butler role for Mumbai location,(Trident & Oberio hotel) - on partners payroll PFB JD and confirm on the same. If you’re interested then please share your resume and let me know. Key Responsibilities : Responsibilities: • L0 Support for Jio CPE infra in Hotel. • L0 Support for Resident, Non-Resident Guests & Belvedere • L0 Support for Hotel Staff for “Team Internet” • Wi-Fi assistance for Events/Conferences. • First point of contact for Troubleshooting WiFi network related Incidents. • Escort Field/Jio engineers during incident/Project Work. • Ensure Periodic Wi-Fi Audits for Guest Rooms. Qualification and Work Experience Qualification : B.Sc. / BE /B Tech Work experience : 1-3 Years • CCNA trained Preferred • Excellent communications skill to handle premium users • Promptness and Discipline Excellent interpersonal and communication skills. • Well Groomed as per Hospitality industry standard If you’re interested please share below mention details for the same. Location Preferred location Current Co Experience Current CTC Expected CTC Notice Period Offer in Hand Highest Education SSC % HSC % Graduation % University Name Please share the details on below mail ID: ashwini.chakor@ril.com Regards, Ashwini Chakor

Posted 3 weeks ago

Apply

6.0 - 8.0 years

15 - 20 Lacs

Gurugram

Hybrid

The Information Security Analyst I is an early-career role designed for individuals with a foundational knowledge in cybersecurity and IT systems. Under direct supervision, they support incident detection and response within the Security Operations Center (SOC), using enterprise security tools to monitor and triage events. As an Information Security Analyst I, you will frequently interact with members of all brand Security and IT teams as well as third-party platform providers. In this dynamic, global environment, you will be responsible for responding to, researching, and addressing network security events. On-call duties are expected. Responsibilities Independently investigate alerts using a SIEM platform (e.g., QRadar) and escalate potential incidents. Perform triage on security events. Investigate and document findings for stakeholders through a ticketing system. Analyze relevant threat intelligence and communicate findings to senior level analyst and management. Identify opportunities for rule tuning and use case improvements to communicate with leadership. Collaborate with other Security Services Subject Matter Experts to deliver a consistent and effective security service. Work efficiently by establishing runbooks and standard operating procedures where needed. Track evolving cyber threats and trends to ensure coverage of activity is implemented. Minimum Requirements: BTECH / Degree in Cybersecurity or Information Technology or equivalent work experience. 6-8 Years of experience in a cybersecurity role, preferably in a SOC environment. 2-3 years of IT experience (e.g. service desk, network operations) Industry certifications such as Security+, Network+, or CCNA preferred. Foundational knowledge of network protocols (e.g., TCP/IP), intrusion detection systems, and cybersecurity principles. Familiarity with SIEM platforms and incident ticketing workflows. Awareness of security frameworks such as the Cyber Kill Chain. Effective time management and critical thinking skills. Strong desire to learn and develop technical cybersecurity skills. Excellent verbal and written communication skills. Ability to work in a fast-paced, collaborative team environment.

Posted 3 weeks ago

Apply

10.0 years

0 Lacs

Hyderabad, Telangana, India

Remote

About Client: Our Client is a global IT services company headquartered in Southborough, Massachusetts, USA. Founded in 1996, with a revenue of $1.8B, with 35,000+ associates worldwide, specializes in digital engineering, and IT services company helping clients modernize their technology infrastructure, adopt cloud and AI solutions, and accelerate innovation. It partners with major firms in banking, healthcare, telecom, and media. Our Client is known for combining deep industry expertise with agile development practices, enabling scalable and cost-effective digital transformation. The company operates in over 50 locations across more than 25 countries, has delivery centers in Asia, Europe, and North America and is backed by Baring Private Equity Asia. Job Title: BeyondTrust Developer/ BeyondTrust Support Key Skills: Vaulting, Session Management, Credential Rotation, AAPM,PRA,EPM,IAM Job Locations: Hyderabad Experience: 6 – 10 Years Budget: Based on your Experience Education Qualification : Any Graduation Work Mode: Hybrid Employment Type: Contract Notice Period: Immediate - 15 Days Interview Mode: 2 Rounds of Technical Interview + Including Client round Job Description: JD for BeyondTrust Developer Skill: Deep hands-on expertise with BeyondTrust products: BeyondTrust Password Safe (Vaulting, Session Management, Credential Rotation, AAPM). BeyondTrust Privileged Remote Access (PRA) and Jumpoint architecture. BeyondTrust Endpoint Privilege Management (EPM) policy creation and troubleshooting. Strong understanding of Identity and Access Management (IAM) concepts: Authentication, Authorization, Single Sign-On (SSO), Multi-Factor Authentication (MFA). Roles and Responsibilities: · Ensure BeyondTrust deployments align with security best practices, compliance requirements (e.g., SOC 2, NIST, Zero Trust), and organizational policies. · Deeply understand and manage integrations between BeyondTrust products and other critical enterprise systems. · Troubleshoot complex integration issues with Identity Providers (IdPs) like Active Directory, Azure AD (Entra ID), Okta, Ping Identity, and other LDAP sources. · Work with SIEM/SOAR platforms (e.g., Splunk, Microsoft Sentinel, IBM QRadar) to ensure proper logging, alerting, and automated responses for BeyondTrust events. · Collaborate on integrations with ITSM tools (e.g., ServiceNow) for streamlined incident, problem, and change management workflows. · Develop and implement advanced monitoring strategies for BeyondTrust components to proactively identify performance bottlenecks, security anomalies, and potential failures. JD for BeyondTrust Support: Skills Deep hands-on expertise with BeyondTrust products BeyondTrust Password Safe (Vaulting, Session Management, Credential Rotation, AAPM). BeyondTrust Privileged Remote Access (PRA). BeyondTrust Endpoint Privilege Management (EPM) policy creation and troubleshooting. Experience in administration and maintenance of BeyondTrust components Thorough understanding of BeyondTrust integration with various platforms, such as different LDAP providers, Windows servers, UNIX servers, Databases and networking devices Knowledge of CyberArk PAM solutions Scripting skills: PowerShell is essential; Python or Bash is a plus for automation tasks. Basic understanding of SQL Server administration and querying. Strong understanding of modern cybersecurity principles, Zero Trust, and least privilege. Excellent problem-solving and communication skills to work cross-functionally with security, compliance, and IT teams. Prior experience with Agile practices such as Kanban or Scrum Roles and Responsibilities Support BeyondTrust solutions and services to securely manage privileged accounts and credentials across CUSTOMER platforms, systems and applications. Perform health check monitoring on all BeyondTrust severs to ensure consistent availability of system to end user. Troubleshoot and resolve technical issues related to BeyondTrust components and integrations. Monitor logs and events for Windows, UNIX and User identity management platforms to provide views of misuse or malicious activities. Participate in incident and response activities, including investigation and mitigation of security incidents involving privileged accounts. Interested Candidates please share your CV to jyothi.a@people-prime.com

Posted 3 weeks ago

Apply

6.0 - 11.0 years

15 - 30 Lacs

Pune

Work from Office

Role & responsibilities Deploy, configure, and administer IBM QRadar SIEM environments. Perform data source onboarding and integration , ensuring successful log collection from various systems (e.g., Windows, Linux, firewalls, network devices). Monitor system health and performance, and ensure proper event flow in QRadar. Work closely with SOC teams to develop, test, and optimise security use cases. Provide support and troubleshooting for QRadar-related issues and incidents. Collaborate with clients and internal stakeholders to understand requirements and deliver appropriate solutions. Document deployment steps, configurations, and standard operating procedures. Continuously assess and improve SIEM configurations and rule tuning for enhanced detection capabilities. Maintain up-to-date knowledge of SIEM technologies, security trends, and threat landscapes Preferred candidate profile Proven experience in QRadar SIEM administration and deployment . Strong knowledge of SIEM fundamentals and security operations workflows. Hands-on experience with both Linux and Windows operating systems. Proficiency in data source integration and log ingestion techniques . Good understanding of SOC use cases, incident response , and threat detection. Strong analytical and problem-solving skills. Excellent customer communication and stakeholder management skills. Ability to create detailed and clear technical documentation.

Posted 3 weeks ago

Apply

3.0 - 8.0 years

4 - 8 Lacs

Bengaluru

Work from Office

About The Role Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time educationRole Summary :The SOC Analyst plays a critical role in the first line of cyber defense by monitoring and triaging security alerts generated by Microsoft Sentinel. This role is responsible for identifying potential threats through continuous monitoring of security dashboards, performing initial analysis, executing predefined response actions, and escalating incidents based on severity. The analyst will work closely with L2/L3 analysts to ensure timely escalation and incident closure while maintaining accuracy and SLA adherence. This role is ideal for individuals developing their skills in SIEM operations and security monitoring with a focus on Microsofts security ecosystem.Key Responsibilities- Monitor Microsoft Sentinel dashboards and respond to alerts.- Perform initial triage, classification, and correlation of security events.- Trigger and monitor predefined SOAR playbooks.- Create and update incident tickets with all required details.- Escalate validated incidents to L2/L3 teams for deeper investigation.- Support daily SOC health checks and Sentinel connector status reviews Skills Required- 4-8 years of experience in SOC / IT security.- Basic knowledge of Microsoft Sentinel and KQL.- Familiarity with Defender for Endpoint, Identity, and Microsoft 365 Security.- Ability to follow runbooks, good verbal and written communication. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Information and Event Management (SIEM) Operations.- Strong understanding of incident response processes and procedures.- Experience with security monitoring tools and techniques.- Knowledge of compliance frameworks and regulations related to cybersecurity.- Ability to analyze security incidents and provide actionable insights. Additional Information:- The candidate should have minimum 3 years of experience in Security Information and Event Management (SIEM) Operations.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 3 weeks ago

Apply

15.0 - 25.0 years

12 - 16 Lacs

Bengaluru

Work from Office

About The Role Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 15 year(s) of experience is required Educational Qualification : be btech mtech Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability. You will be responsible for ensuring the successful execution of projects, utilizing our method, tools, training, and assets. Your role will involve overseeing the entire project lifecycle, from planning and design to implementation and post-implementation support. You will collaborate with cross-functional teams and stakeholders to ensure the delivery of high-quality security solutions. Roles & Responsibilities:- Expected to be a SME with deep knowledge and experience.- Should have Influencing and Advisory skills.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Expected to provide solutions to problems that apply across multiple teams.- Lead the implementation and delivery of Security Services projects.- Utilize global delivery capability, including method, tools, training, and assets.- Oversee the entire project lifecycle, from planning and design to implementation and post-implementation support.- Collaborate with cross-functional teams and stakeholders to ensure the delivery of high-quality security solutions. Professional & Technical Skills: - Must Have Skills: Proficiency in Security Information and Event Management (SIEM). Proficiency in consulting (solutioning work with presales, RFP's, estimation), client management, SOC Delivery- Strong understanding of security principles and best practices.-Deep expertise in SIEM, SOAR and Incident Response- Experience in designing and implementing security solutions.- Knowledge of security frameworks and standards (e.g., ISO 27001, NIST).- Experience in conducting security assessments and audits.- Good To Have Skills: Experience with security incident response and threat intelligence.- Familiarity with security technologies and tools (e.g., firewalls, IDS/IPS, SIEM).- Knowledge of cloud security and emerging trends in the security industry. Additional Information:- The candidate should have a minimum of 15 years of experience in Security Information and Event Management (SIEM).- This position is based at our Bengaluru office.- A B.e B.tech M.tech is required. Qualification be btech mtech

Posted 3 weeks ago

Apply

3.0 - 8.0 years

4 - 8 Lacs

Bengaluru

Work from Office

About The Role Project Role : Security Delivery Practitioner Project Role Description : Assist in defining requirements, designing and building security components, and testing efforts. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time educationRole Summary :The SOC Analyst plays a critical role in the first line of cyber defense by monitoring and triaging security alerts generated by Microsoft Sentinel. This role is responsible for identifying potential threats through continuous monitoring of security dashboards, performing initial analysis, executing predefined response actions, and escalating incidents based on severity. The analyst will work closely with L2/L3 analysts to ensure timely escalation and incident closure while maintaining accuracy and SLA adherence. This role is ideal for individuals developing their skills in SIEM operations and security monitoring with a focus on Microsofts security ecosystem.Key Responsibilities-Monitor Microsoft Sentinel dashboards and respond to alerts.-Perform initial triage, classification, and correlation of security events.-Trigger and monitor predefined SOAR playbooks.-Create and update incident tickets with all required details.-Escalate validated incidents to L2/L3 teams for deeper investigation.-Support daily SOC health checks and Sentinel connector status reviews. Professional & Technical Skills: -Must To Have Skills: Proficiency in Security Information and Event Management (SIEM).-Strong understanding of cloud security principles and frameworks.-Experience with security incident response and management.-Knowledge of regulatory compliance requirements related to cloud security.-Familiarity with security tools and technologies used in cloud environments.-Experience in SOC / IT security.-Basic knowledge of Microsoft Sentinel and KQL.-Familiarity with Defender for Endpoint, Identity, and Microsoft 365 Security.-Ability to follow runbooks, good verbal and written communication. Additional Information:-The candidate should have minimum 3 years of experience in Security Information and Event Management (SIEM).-This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 3 weeks ago

Apply

3.0 - 8.0 years

4 - 8 Lacs

Bengaluru

Work from Office

About The Role Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time educationRole Summary :The SOC Analyst plays a critical role in the first line of cyber defense by monitoring and triaging security alerts generated by Microsoft Sentinel. This role is responsible for identifying potential threats through continuous monitoring of security dashboards, performing initial analysis, executing predefined response actions, and escalating incidents based on severity. The analyst will work closely with L2/L3 analysts to ensure timely escalation and incident closure while maintaining accuracy and SLA adherence. This role is ideal for individuals developing their skills in SIEM operations and security monitoring with a focus on Microsofts security ecosystem. Roles & Responsibilities-Monitor Microsoft Sentinel dashboards and respond to alerts.-Perform initial triage, classification, and correlation of security events.-Trigger and monitor predefined SOAR playbooks.-Create and update incident tickets with all required details.-Escalate validated incidents to L2/L3 teams for deeper investigation.-Support daily SOC health checks and Sentinel connector status reviews. Professional & Technical Skills: -Experience in SOC / IT security.-Basic knowledge of Microsoft Sentinel and KQL.-Familiarity with Defender for Endpoint, Identity, and Microsoft 365 Security.-Ability to follow runbooks, good verbal and written communication.-Must To Have Skills: Proficiency in Security Information and Event Management (SIEM).-Strong understanding of cloud security principles and frameworks.-Experience with security incident response and management.-Knowledge of regulatory compliance requirements related to cloud security.-Familiarity with security tools and technologies used in cloud environments. Additional Information:-The candidate should have minimum 3 years of experience in Security Information and Event Management (SIEM).-This position is based at our Bengaluru office.-A 15 years full time education is required. Qualification 15 years full time education

Posted 3 weeks ago

Apply

2.0 - 5.0 years

1 - 5 Lacs

Pune

Work from Office

About The Role Job Title - Security Operations Center (SOC) Operator Management Level : CL11 Analyst / CL 10 Senior Analyst Location: Pune, PDC3C, Hinjewadi Must have skills: Excellent verbal and written communication skills Access control alarm monitoring CCTV monitoring Risk monitoring Handling safety / security related calls from employees Good to have skills: Experience in Global Security Operations Center / Regional Security Operations Center Sending mass notification / people advisory to employees / travel advisories Job Summary : The SOC Operator will be responsible for assessing, analyzing, and responding to incidents related to safety and security for the APAC region. The role requires daily use of tools/systems (e.g., access control, video management, risk feeds) to detect the impact to Accentures people, products, property, or brand image and alert the appropriate response stakeholders. Specifically, incidents may range from extreme weather conditions, political instability, crime, terror, civil unrest, and other personnel issues. In addition, the Operator will be responsible for customer service tasks to provide critical information and assistance to travelers, static employees, and potentially third parties. This role will be based in Hinjewadi, Pune, Maharashtra and reports to the SOC Shift Supervisor. Roles & Responsibilities: Monitor and operate security systems including access control and CCTV, along with environmental monitoring and mass notification systems. Respond quickly and initiate action related to alarms, phone calls, and environmental monitoring and alerting systems Notify, assist, and direct external emergency personnel and internal resources as necessary Dispatch security officers or law enforcement personnel for alarm response, calls for service, and emergency situations Execute protocols and communicate at all levels across the APAC region to employees, site security leads, safety & security staff, or contracted officers as needed Manage information flows to and from an incident Maintain operational logs, conduct daily shift checklists, handover reports, and incident reports Ensure all forms of communication, such as e-mails, phone conversations, and client interactions, are conducted in a courteous and professional manner, confidentially, and documented appropriately Coordinate with Accentures Corporate Security regional leads on incident detection and management Coordinate with Accentures Corporate executive protection leads on incident detection and management Ensure that complete and accurate information is entered into the incident management system Utilize and execute protocols and standard operating procedures to effectively manage global incidents. Monitor travel safety and security of the company's staff Maintain situational awareness of current global current events. Monitor and respond to global alerts and events affecting company facilities and employees providing immediate information and assistance as needed Initiate mass communication notifications as required Notify leadership of events affecting business operations and employees Ensure proper handling of highly confidential information. Perform other duties assigned by supervisors related to security and safety Additional Information: Experience with CCTV/video management and access control systems such as Genetec video solutions or CCure 9000 Experience with protective intelligence monitoring tools such as Everbridge and ISOS Tracker Great active listening skills Rapport building skills Patient and empathetic attitude Adaptability and flexibility Ability to analyze threats and envision potential or real time impact to operations Ability to respond quickly and calmly to emergencies and stressful situations by exercising proper judgment and decision-making skills Strong Customer Service skills Strong consensus, team building and negotiating skills Ability to work overtime on short notice Strong cultural sensitivities Be able to type a minimum of 35 words per min Excellent written and verbal communication skills Ability to multitask in a fast-paced, at times stressed work environment Strong team player Comfortable with high-tech work environment, and constant learning of new tools and innovations Proficient in Microsoft Windows and Office Suite About Our Company | Accenture Qualification Experience: Minimum 2 year(s) of experience is required Educational Qualification: Degree in any stream

Posted 3 weeks ago

Apply

15.0 - 25.0 years

12 - 16 Lacs

Nagpur

Work from Office

About The Role Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : Security Delivery Governance Good to have skills : Identity Access Management (IAM), Security Information and Event Management (SIEM)Minimum 15 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Roles & Responsibilities:- Expected to be a SME with deep knowledge and experience.- Should have Influencing and Advisory skills.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Expected to provide solutions to problems that apply across multiple teams.- Lead and manage the Security Delivery team effectively.- Develop and implement Security Delivery Governance strategies.- Collaborate with cross-functional teams to ensure successful project delivery. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Delivery Governance.- Good To Have Skills: Experience with Identity Access Management (IAM), Security Information and Event Management (SIEM).- Strong understanding of security principles and best practices.- Experience in developing and implementing security policies and procedures.- Knowledge of regulatory compliance requirements related to security.- Excellent communication and leadership skills. Additional Information:- The candidate should have a minimum of 15 years of experience in Security Delivery Governance.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 3 weeks ago

Apply

3.0 - 7.0 years

9 - 10 Lacs

Mumbai

Work from Office

Paramatrix Technologies Pvt. Ltd is looking for SOC Analyst L3 to join our dynamic team and embark on a rewarding career journey Monitor and analyze security events and incidents, identifying and investigating potential threats Maintain the security of our network and systems by implementing security controls and best practices Work closely with the rest of the security team to ensure that our systems and networks are secure and compliant with industry standards Maintain accurate documentation and reports on security events and incidents Communicate effectively with team members and other stakeholders to ensure that security issues are addressed in a timely and effective manner Stay up to date with the latest security technologies and threats

Posted 3 weeks ago

Apply

1.0 - 3.0 years

6 - 9 Lacs

Ahmedabad

Work from Office

Narnarayan Shastri Institute of Technology IFSCS is looking for Cyber Security Professional to join our dynamic team and embark on a rewarding career journey Threat Detection and Analysis: Monitor network traffic, system logs, and security alerts to detect and analyze potential security threats, such as malware, intrusions, and unauthorized access Incident Response: Develop and execute incident response plans to address and mitigate security incidents and breaches Vulnerability Assessment: Identify vulnerabilities in software, hardware, and network configurations, and recommend patches and security updates Security Monitoring: Continuously monitor and analyze security events, assess system vulnerabilities, and recommend security enhancements Security Policies and Procedures: Develop and enforce security policies, standards, and procedures to ensure a consistent and secure computing environment Access Control: Implement and manage access control systems, including user authentication, authorization, and password policies Security Tools: Utilize a range of security tools, such as intrusion detection systems (IDS), intrusion prevention systems (IPS), firewalls, antivirus software, and data encryption

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies