Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
4.0 - 5.0 years
6 - 7 Lacs
Hyderabad
Work from Office
Manage FireEye NX, ETP, and Zscaler security solutions to monitor, detect, and respond to cybersecurity threats. You will configure and manage security appliances to protect against threats. Expertise in FireEye and Zscaler is required.
Posted 1 month ago
4.0 - 5.0 years
6 - 7 Lacs
Hyderabad
Work from Office
Monitor and manage security incidents using ArkSight for event and log management. Respond to threats, perform risk assessments, and implement security protocols to protect organizational data and IT infrastructure from breaches.
Posted 1 month ago
2.0 - 4.0 years
4 - 6 Lacs
Chennai
Work from Office
Implement and manage cybersecurity measures to protect enterprise systems from external and internal threats. You will monitor, identify, and respond to security incidents. Expertise in network security, threat detection, and incident response is required.
Posted 1 month ago
4.0 - 5.0 years
6 - 7 Lacs
Hyderabad
Work from Office
Implement and manage security solutions using Broadcom/CA tools, including SiteMinder and MFA/Advanced Authentication. Ensure secure access and protect enterprise systems from unauthorized access.
Posted 1 month ago
4.0 - 6.0 years
6 - 8 Lacs
Chennai
Work from Office
Provide Level 2 support in Security Operations Centers (SOC), focusing on SIEM tools and threat detection. You will investigate and resolve security incidents, escalate critical issues, and ensure system integrity. Expertise in SIEM, threat detection, and incident response is essential.
Posted 1 month ago
5.0 - 8.0 years
7 - 17 Lacs
Bengaluru
Work from Office
Greetings from Teamware Solutions a division of Quantum Leap Consulting Pvt. Ltd We are hiring a Consultant_DLP (Data Loss Prevention) Work Mode: Onsite; 5 days WFO Geography they support - US Work timings: 24x7 Rotational Shift Locations: Bengaluru Experience: 4 -8 Years ( Only Male ) Notice Period: Immediate to 15 days Qualification: BTECH/BCA/MBA/MCA strong knowledge of TPRM Interview process: 2-3 rounds Responsibilities Monitor and respond to alerts generated from the DLP systems to other technologies Understand and follow the incident response process through event escalations Follow processes to maintain the DLP system Utilize Splunk and Symantec DLP to respond to, investigate, triage and prevent client data loss via email and web Implement DLP fine-tuning rules/policies via Symantec DLP Track and present DLP metrics and findings on a monthly basis to senior management 3+ years of experience in information security preferably in the areas of incident response, investigations Experience working with SIEM solutions (Splunk, LogRhythm, QRadar, etc.) Hands on experience & working knowledge of ZScaler tools (Preferably) Certifications (e.g., GCIH, CISSP, CCSP) are preferred Familiarity performing packet analysis Zscaler : Zscaler provides users with seamless,secure and reliable access to applications and data. Please let me know if you are interested in this position and send me the resumes to netra.s@twsol.com
Posted 1 month ago
15.0 - 20.0 years
12 - 16 Lacs
Gurugram
Work from Office
Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : Microsoft Azure Sentinel Good to have skills : Security Information and Event Management (SIEM) OperationsMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will be responsible for leading the implementation and delivery of Security Services projects. Your typical day will involve coordinating with various teams to ensure that projects are executed efficiently, utilizing our global delivery capabilities, including methods, tools, training, and assets. You will engage with stakeholders to align project goals with organizational objectives, ensuring that security measures are effectively integrated into the overall project framework. Your role will also require you to monitor project progress, address any challenges that arise, and facilitate communication among team members to foster a collaborative work environment. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Develop and implement best practices for security project delivery.- Mentor junior team members to enhance their skills and knowledge. Professional & Technical Skills: - Must To Have Skills: Proficiency in Microsoft Azure Sentinel.- Good To Have Skills: Experience with Security Information and Event Management (SIEM) Operations.- Strong understanding of cloud security principles and practices.- Experience with incident response and threat management.- Familiarity with compliance frameworks and security standards. Additional Information:- The candidate should have minimum 5 years of experience in Microsoft Azure Sentinel.- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
5.0 - 10.0 years
4 - 8 Lacs
Bengaluru
Work from Office
Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Security Information and Event Management (SIEM) Operations Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for a Level 2 Security Engineer to strengthen our detection and response operations using Microsoft Sentinel and Microsoft Defender for Endpoint (MDE). The role focuses on writing advanced KQL queries for hunting and alert tuning, investigating incidents using Sentinel tools. You will help defend against modern cyber threats, contribute to incident investigations, and work closely with senior engineers to mature our detection capabilities. Roles & Responsibilities:- Develop and fine-tune advanced KQL queries for threat hunting and anomaly detection in Microsoft Sentinel.- Investigate security incidents using Sentinel Incident Graph, Timeline, and related tools to analyze relationships and attack paths.- Utilize Sentinel Fusion to understand and correlate alerts for complex incidents.- Perform deep endpoint investigations using Microsoft Defender for Endpoint (MDE).- Analyzing process trees, alerts, and device timeline.- Supporting remediation actions.- Understanding and leveraging EDR capabilities.- Document incident findings, provide recommendations for containment and eradication, and assist in incident reporting.- Assist in managing and maintaining Sentinel workspaces and data connectors (e.g., Azure AD, Syslog, MDE).- Correlate alerts and artifacts (e.g., IPs, hashes, user accounts) across multiple data sources to build a comprehensive incident picture.- Contribute to improving detection rules, watchlists, and hunting queries based on attacker TTPs aligned with MITRE ATT&CK.- Collaborate with Level 3 engineers, incident responders, and cloud/security architects to enhance detection and response processes.- Support red/blue team exercises by providing incident insights and improving rule effectiveness.- Strong analytical thinking and ability to investigate complex incidents.- Clear and effective communicator with both technical and non-technical stakeholders.- Eagerness to learn from senior engineers and grow technical depth.- Detail-oriented, proactive, and team-focused.- Ability to work calmly under pressure during active incidents. Professional & Technical Skills: - 5+ years in Security Operations, Incident Response, or Threat Hunting roles.- Strong experience writing and tuning KQL queries for Sentinel hunting and detection rules.- Hands-on experience investigating incidents using Sentinel Incident Graph, Timeline, and Fusion alerts.- Solid understanding of Microsoft Defender for Endpoint (MDE) including process analysis, alerts, and EDR telemetry.- Familiarity with MITRE ATT&CK, alert mapping, and detection engineering fundamentals.- SC-200:Microsoft Security Operations Analyst (strongly preferred)- AZ-500:Microsoft Azure Security Technologies- MITRE ATT&CK Defender (MAD) certificate (nice to have).- SC-900:Microsoft Security, Compliance and Identity Fundamentals Additional Information:- The candidate should have minimum 3 years of experience.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
8.0 - 12.0 years
13 - 17 Lacs
Hyderabad, Chennai
Work from Office
Job Details: Skill: Network Security Architect Experience: 8+ Years Notice Period: Immediate Joiners Employee type : C2H Key Responsibilities: The Network Security Architect is responsible for researching, designing and implementing secure business focused solutions that meet or exceed corporate policies and government mandates. This includes developing roadmap and migration strategies for existing architecture. Specific tasks include, but are not limited to the following: Research,design & advocate new technologies,architectures and security products that will support security requirements for the enterprise and its customers, Business partners and vendors. Meet other planners in the organization to translate Business needs into functional, available systems that deliver services quickly and conveniently while incorporating the right level of security, executing transition to relevant operations team. Work closely with enterprise architects,other functional area architects and specialists to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently,and to meet business objectives and regulatory requirements Practical understanding of cybersecurity frameworks. Strong Firewall knowledge ( IPSEC VPN,UTM/IPS,DoS Policy,SSL inspection) Ability to manage high impact Priority 1 incidents Strong Cloud Security/CASB/Web Proxy knowledge Cloud Solutions on-Prem Solutions Strong Remote Access technologies knowledge. Experience with managed devices-unmanaged devices/2FA/MFA solutions. Scripting skills Qualifications, Experience and Competency Requirements: Education: Bachelor's Degree in Information Technology or related Computer Science/Technical area Experience Essential: 8-10 years 5 years minimally of Network Security experience Firewall background 3 years minimally experience working in large organizations Firewall/Web Proxy/Remote Access/Cloud experience Strong technical Documentation skills Network Diagrams/Knowledge based articles Articulate Pragmatic Self-Aware Desirable: CISSP Certification CCNA other industry standard security certifications Cloud migration experience Fortigate Firewalls McAfee Web Gateways/ Pulse Secure Appliances Netskope Firemon Qradar Splunk FortiManager FortiAnalyzer Specific Skill Requirement Firewall/Web Proxy/Remote Access/Cloud experience Network Diagrams/Knowledge based articles.
Posted 1 month ago
10.0 - 15.0 years
8 - 11 Lacs
Bengaluru
Work from Office
PF Detection is mandatory Primary Skills: 10+ years in penetration testing, 4+ years in stakeholder management, attack surface management tool (Crowdstrike Falcon, Darktrace, Qualsys etc) Job details: Lead and plan attack surface detection for NAB group Provide direction for NAB in usage of Attack surface scanning Promote the usage of ASM scanning
Posted 1 month ago
0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. CMS-TDR Senior As part of our EY-cyber security team, who shall work as SME for Microsoft Sentinel solutions in TDR team The opportunity We’re looking for Senior Consultant with expertise in Cloud Security solutions. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Your Key Responsibilities Architecting and implementation of cloud security monitoring platforms MS Sentinel Provide consulting to customers during the testing, evaluation, pilot, production, and training phases to ensure a successful deployment. Perform as the subject matter expert on Cloud Security solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. Securing overall cloud environments by applying cybersecurity tools and best practices Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. Content development which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Skills And Attributes For Success Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities. Expertise in content management in MS Sentinel Good knowledge in threat modelling. Experience in creating use cases under Cyber kill chain and Mitre attack framework Expertise in integrating critical devices/applications including unsupported (in-house built) by creating custom parsers Below mentioned experiences/expertise on Sentinel Develop a migration plan from Splunk/QRadar/LogRhythm to MS Sentinel Deep understanding of how to implement best practices for designing and securing Azure platform Experiencing advising on Microsoft Cloud Security capabilities across Azure platform Configure data digestion types and connectors Analytic design and configuration of the events and logs being digested Develop, automate, and orchestrate tasks(playbooks) with logic apps based on certain events Configure Sentinel Incidents, Workbooks, Hunt queries, Notebooks Experience in other cloud native security platforms like AWS and GCP is a plus Scripting knowledge (Python, Bash, PowerShell) Extensive knowledge of different security threats Good knowledge and experience in Security Monitoring Good knowledge and experience in Cyber Incident Response To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Demonstrate both technical acumen and critical thinking abilities. Strong interpersonal and presentation skills. Certification in Azure (any other cloud vendor certification is a plus) Ideally, you’ll also have People/Project management skills. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 1 month ago
4.0 - 9.0 years
12 - 16 Lacs
Bengaluru
Work from Office
About us As a Fortune 50 company with more than 400,000 team members worldwide, Target is one of the worlds most recognized brands and one of Americas leading retailers. Target as a tech companyAbsolutely. We are the behind-the-scenes powerhouse that fuels Targets passion and commitment to cutting-edge innovation. We anchor every facet of one of the worlds best-loved retailers with a strong technology framework that relies on the latest tools and technologiesand the brightest peopleto deliver incredible value to guests online and in stores. Behind the brand our guests love, is a culture of continual innovation and right now, we are up to big things. The Cyber Fusion Centre is the heart of Targets security team and a place where innovation happens daily. Interested in a culture that combines invention and creative freedom, ongoing learning, engineering excellence, and stellar outcomesWe are, too thats why we work here. Join our team to take new enterprise security solutions from concept to release, collaborating with both software & security engineers to innovate on helping defend Targets network using cutting-edge technologies.We are seeking a Senior Threat Detection Engineer to join our world class cybersecurity-cyber defence team. The ideal candidate will be responsible for designing, implementing, and optimizing threat detection mechanisms to protect the organization from advanced cyber threats.About The Role/Key Responsibilities: Threat Detection Development : Design and implement detection rules, signatures, and analytics to identify malicious activities in real-time. Develop use cases and correlation rules in SIEM and other detection platforms. Create automated processes to improve detection efficiency and reduce response times. Security Monitoring & Optimization : Continuously monitor and tune rules to reduce false positives by improving rule fidelity and ensuring actionable alerts. Stay updated with emerging threat landscapes to enhance detection capabilities. Incident Support : Collaborate with Incident Response (IR) and Threat Hunting teams to provide context and insights during investigations. Participate in post-incident reviews to refine detection strategies based on lessons learned. Collaboration & Reporting : Work with Cyber Threat Intelligence (CTI) teams to integrate threat intelligence into detection mechanisms. Document and present detection engineering activities, findings, and recommendations to stakeholders. About You/Qualifications: Bachelors degree in Cybersecurity, Computer Science, or related field (or equivalent experience). 4+ years of experience in threat detection, incident response or related roles. Demonstrates a deep subject matter expertise with threat detection, response, and mitigation Capable of identifying detection opportunities sourced from threat data Exhibits an understanding of concepts such as Pyramid of Pain, MITRE ATT&CK, and other organizing frameworks Hands-on experience with security tools such as SIEM (Splunk, ElasticSearch, Zeek, SIGMA, Suricata and YARA technologies) Host based detection experience leveraging Sysmon, CrowdStrike Falcon, etc. Cloud based detection within GCP and AWS Proficiency in scripting and automation (Python, PowerShell, etc.) Deep knowledge of network protocols, operating systems, and attack techniques. Excellent problem-solving and communication skills. Stays current with new technologies via formal training and self-directed education Why Join Us Be part of a forward-thinking world class cybersecurity team. Opportunities for professional growth and continuous learning. Useful Links- Life at Target- https://india.target.com/ Benefits- https://india.target.com/life-at-target/workplace/benefits Culture- https://india.target.com/life-at-target/diversity-and-inclusion
Posted 1 month ago
5.0 - 7.0 years
7 - 10 Lacs
Pune, Chennai, Bengaluru
Work from Office
Immediate Openings on SIEM Engineer _Contract_Pan India Notice Period :Immediate. Type : Contract Key Accountabilities Building, maintaining, and operating Splunk Enterprise and Splunk Enterprise Security SaaS Solution Building Co-relation searches for Cyber Operation requirements Evaluating and analysing business requirements and designing suitable solutions, challenging requirements where necessary Managing, co-ordinating and implementing technical project activities and enhancements to services Conducting Incident/ Problem/ Recovery activities Supporting the Joint Operations Centre and incident response teams for detected security events. Creating and maintaining accurate and high-quality documentation Supporting Operational effectiveness audit Structure phased deliverables to link long term vision with time-boxed activities. Support the project delivery phase including testing and training, to ensure the agreed business solutions are delivered successfully. Work closely with developers and testers, to ensure delivery of the functionality on time and with quality. Stakeholder Management and Leadership Negotiate and solicit engagement and support at all levels of the organisation, particularly where support is low or challenging. Communicate clearly and regularly. Typically faces off to AVP VP level stakeholders. Considers the impact of their actions and decisions on key stakeholders, seeking to deliver a positive outcome for those involved. Decision-making and Problem Solving Apply evaluative judgement and analytical skills to operate effectively within a complex and changing environment. Understand the requirements and perspectives of stakeholders and integrate into their understanding of complex situations. Demonstrates a broad understanding of how the bank operates and the metrics used to measure performance Analyses problems and evaluates options in a logical and systematic way. Seeks the advice of stakeholders to better create clarity in complex situations, understand problems, evaluate options and make decisions What were looking for: Knowledge of Splunk Enterprise architecture, distributed components (indexer clusters, forwarders, search head clusters, deployment servers) , knowledge of Splunk Cloud Knowledge of Splunk Enterprise Security at administration and use case level Knowledge on on-boarding new data into Splunk, Splunk Forwarders - data ingestion, extraction. Knowledge of the Common Information Model, data models, enrichment, and automation Good experience on Splunk add-Ons installation configuration to bring security logs into Splunk. Good understanding of the Security Domain. Documentation skills in order to provide high quality documentation for internal customers and technical teams.
Posted 1 month ago
2.0 - 7.0 years
2 - 6 Lacs
Mumbai
Work from Office
B2 Role L1/ L2 Support resource ( 2 years experience in DLP) Daily Summary Report with list of activities to be shared on daily. Configure Client tasks Purge events on frequent basis Help Desk Support Support in Troubleshooting during Agent installation Providing VPN evidences Support user in installation or uninstallation of Agents Support in resolving Agent Communication issues Support in Agent Upgrade Generate and share MIS reports with end user Troubleshooting Policy related issues Whitelisting of IPs, PF IDs Sharing of granular details of Infringements. Provide Root cause analysis documents
Posted 1 month ago
6.0 - 11.0 years
8 - 18 Lacs
Hyderabad
Hybrid
Immediate Openings on Trellix Endpoint Security PAN INDIA - Contract Skills:Trellix Endpoint Security LOCATION : PAN INDIA Period :Immediate Employment Mode : Contract Description Evaluation Criteria Description Job Title Email security Analyst L2 Skill Name PGP email encryption Personal Qualities - Excellent written and verbal communication skills - Ability to multi-task, prioritize, coordinate, work well under pressure and meet deadlines Key Responsibilities PGP Key Management: Generate, store, and distribute public/private key pairs for email encryption. Manage key lifecycle, including key rotation, revocation, and expiration. Encryption Implementation: Implement PGP encryption on company email systems (e.g., Outlook, Thunderbird).
Posted 1 month ago
6.0 - 8.0 years
8 - 14 Lacs
Bengaluru
Work from Office
6-8 Years experience on creating Design documents, Implementation/ Change Management Plans or Optimization of reports (beyond day-to-day routine operations) is a must. Expertise in Implement &/or design (design is must) of one of the following - Priority is Firewall and good if candidates have hands on exp on Identity solutions, Email Security, Web Security/Proxy, Cloud Security. Cisco ISE is a plus
Posted 1 month ago
6.0 - 11.0 years
4 - 8 Lacs
Hyderabad
Work from Office
Immediate Openings on Security Consultants with Vulnerability _Contract_Pan India 6+ Years Security Consultants with Vulnerability Pan India Period :Immediate. Type Contract Description 7 + Years Security Consultants with Vulnerability tools exp like Qualys or Tenable (prefer Qualys) and ServiceNow. Experience with Vulnerability tools such as Qualys or Tenable (prefer Qualys) and ServiceNow .
Posted 1 month ago
5.0 - 8.0 years
12 - 13 Lacs
Gurgaon
On-site
Job Title: Security Incident Analyst – L3 Location: Gurugram (Client Location) Shift: Rotational Shifts Experience: 5 to 8 Years Notice Period: Immediate to 15 Days CTC: ₹12 – 13 LPA Hiring Partner: Nurture HRM About the Role: We are looking for a skilled and proactive Security Incident Analyst – L3 to join our team at the client site in Gurugram. The ideal candidate will bring strong technical expertise in incident response, threat analysis, and security operations with hands-on experience in advanced security tools. This is a great opportunity for someone who thrives in high-stakes environments and wants to take ownership of complex security challenges. Key Responsibilities: 1. Incident Response and Management Lead the response to high-severity incidents including data breaches, malware outbreaks, and targeted cyber-attacks. Handle escalations from SOC Level 1 and Level 2 analysts and guide containment and remediation activities. 2. Advanced Threat Analysis Conduct deep-dive analysis of security alerts from tools such as SIEM, EDR, firewalls, and network traffic monitoring systems. Classify and prioritize incidents based on potential impact and urgency. 3. Security Tools & Monitoring Administer and fine-tune security tools (SIEM, IDS/IPS, EDR) for enhanced detection and quicker response. Develop and maintain detection use cases, correlation rules, and incident response playbooks. 4. Collaboration & Knowledge Sharing Provide mentorship to L1 and L2 SOC analysts, fostering growth and upskilling within the team. Lead post-incident reviews to identify lessons learned and enhance SOC capabilities. Job Requirements: Certifications (Preferred): GIAC Certified Incident Handler (GCIH) Certified Information Systems Security Professional (CISSP) Other relevant cybersecurity certifications Experience: Minimum 5 years in a Security Operations Center (SOC) or Incident Response role. Must have experience in SIEM administration and tuning. Technical Skills: Strong knowledge in network, endpoint, cloud, and application security. In-depth experience in incident detection, investigation, and containment. Proficiency with SIEM platforms (preferably QRadar, Splunk). Experience with EDR tools (e.g., CrowdStrike, Carbon Black), IDS/IPS, and firewalls. Familiarity with threat intelligence sources (OSINT, commercial feeds). Ability to correlate threat intelligence with incidents and recommend preventive measures. Qualifications: Bachelor's degree in Computer Science, Cybersecurity, or a related discipline. To Apply: Interested candidates can share their updated resume at recruitment@nurturehrm.com Job Type: Full-time Pay: ₹1,200,000.00 - ₹1,300,000.00 per year Schedule: Day shift Work Location: In person
Posted 1 month ago
6.0 years
0 Lacs
Nashik, Maharashtra, India
On-site
🚨 We're Hiring: Cybersecurity Lead – Now in Nashik! 📍 Location: Nashik 🕐 Experience: 6+ years ** Immediate joiners** Key Skills & Experience: Network Security: 3+ years securing networks, configuring firewalls (Palo Alto, Sophos), IDS/IPS, VPNs, and using tools like Nessus/Qualys Cloud Security: 2+ years securing AWS, Azure, or GCP environments, including IAM, encryption, and container/serverless security Security Operations: 3+ years with SIEMs (Splunk, QRadar), threat hunting, and incident response Infrastructure Security: 2+ years in endpoint/server hardening, patch management, and tools like CrowdStrike, SentinelOne, and Axonius Application Security: Experience in secure SDLC, DevSecOps, SAST/DAST (Burp Suite, OWASP ZAP), and CI/CD security Proficiency in scripting (Python, Bash) and strong knowledge of container/cloud security (Docker, Kubernetes) ✅ Network & Cloud Security (AWS, Azure, GCP) ✅ SIEM, Incident Response & Threat Hunting ✅ Application & Infrastructure Security ✅ DevSecOps, SAST/DAST, CI/CD security ✅ Tools: Palo Alto, Splunk, Burp Suite, CrowdStrike, Docker/Kubernetes Qualifications: Bachelor’s degree in Cybersecurity, Computer Science, Software Engineering, or a related field Preferred certifications: CISSP, CSSLP, CEH, CompTIA Security+ 📩 Apply now: apoorva.chauhan@aptohr.com #Cybersecurity #NashikJobs #HiringNow #Infosec #SecurityLead #CloudSecurity #ApplicationSecurity #SIEM #DevSecOps #AptoHR
Posted 1 month ago
6.0 - 11.0 years
30 - 35 Lacs
Pune
Work from Office
: Job TitleThreat Intelligence Analyst Corporate TitleAVP LocationPune, India Role Description As a Threat Intelligence A VP in the Threat Intelligence and Assessment function, you will play a critical role in safeguarding the organization from cyber threats. In this role, you will be responsible for identifying, assessing, and mitigating threats, you will provide mitigation recommendations in response to evolving threats. You will be required to analyse complex technical issues and develop bank specific solutions while collaborating with diverse teams and stakeholders. This role will also consist of delivering against projects and strategic initiatives to continuously enhance the banks capabilities in responding to threats. What well offer you , 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities Pro-actively identify threats and track threat actors, TTPs, and ongoing campaigns to produce timely actionable intelligence. Produce threat assessments to support threat mitigation activities. Analyse multiple data/intelligence sources and sets to identify patterns of activity that could be attributed to threats and develop informed recommendations. Conduct analysis on files/binaries, packet captures, and supporting materials to extract relevant artifacts, observables, and IOCs. Proactively drive improvements of internal processes, procedures, and workflows. Participate in the testing and integration of new security monitoring tools. Meet strict deadlines to deliver high quality reports on threats, findings, and broader technical analysis. Take ownership for personal career development and management, seeking opportunities to develop personal capability and improve performance contribution. Develop and maintain relationships with internal stakeholders, external intelligence sharing communities. Your skills and experience 5+ years of experience in cybersecurity, with a focus on threat intelligence, analysis, and mitigation Strong operational background in intelligence related operations with experience in Open-Source Intelligence (OSINT) techniques Operational understanding of computing/networking (OSI Model or TCP/IP). Knowledge on the functions of security technologies such as IPS/IDS, Firewalls, EDR, etc A good or developing understanding of virtual environments and cloud (e.g., VSphere, Hypervisor, AWS, Azure, GCP) Demonstrated knowledge and keen interest in tracking prominent cyber threat actor groups, campaigns and TTPs in line with industry standards Knowledge of or demonstratable experience in working with intelligence lifecycle, intelligence requirements and Mitre ATT&CK Framework Non-Technical Experience Investigative and analytical problem solving skills Excellent verbal and written communication; to both technical and non-technical audiences. Self-motivated with ability to work with minimal supervision. Education and Certifications Preferred - Degree in computer science, networking, engineering, or other field associated with cyber, intelligence or analysis. Desired Experience or Certifications CISSP, CISM, GIAC, GCTI, GCIH, GCFE, GCFA, GREM, GNFA, Security+, CEH How well support you . . . . About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htm We strive for a culture in which we are empowered to excel together every day. This includes acting responsibly, thinking commercially, taking initiative and working collaboratively. Together we share and celebrate the successes of our people. Together we are Deutsche Bank Group. We welcome applications from all people and promote a positive, fair and inclusive work environment.
Posted 1 month ago
0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Company profile : Netenrich boosts the effectiveness of organizations’ security and digital operations so they can avoid disruption and manage risk. Resolution Intelligence CloudTM is our native-cloud data analytics platform for enterprises and services providers that need highly scalable, multitenant security operations and/or digital operations management. Resolution Intelligence Cloud transforms security and operations data into intelligence that organizations can act on before critical issues occur. More than 3,000 customers and managed service providers rely on Netenrich to deliver secure operations at scale. Position: Cybersecurity Enterprise Sales – SIEM Engineering Focus Location: Hyderabad/Bangalore/Mumbai Role Overview: We are seeking a dynamic and results-driven Cybersecurity Enterprise Sales professional to join our team. This role is focused on selling advanced cybersecurity solutions, including SIEM, SOAR , and Adaptive MDR offerings , to mid-to-large enterprises. The ideal candidate will have a strong foundation in cybersecurity operations , particularly SIEM engineering , and a proven track record in enterprise technology sales . Key Responsibilities: · Develop and execute a strategic sales plan to meet and exceed quarterly and annual sales targets. · Identify, qualify, and pursue new business opportunities in enterprise accounts. · Conduct engaging product presentations and solution demonstrations to prospective clients. · Understand customer security needs and map solutions accordingly, with a focus on SIEM, SOAR, and MDR. · Lead contract negotiations and close deals. · Build and maintain long-term relationships with key stakeholders and channel partners. · Stay current on the latest cybersecurity trends and emerging technologies. · Collaborate with internal technical and product teams to align solutions with customer needs. Required Qualifications: · Bachelor's degree in Business, Computer Science, Information Security, or a related field. · Experience in cybersecurity sales , with a focus on enterprise customers . · Hands-on understanding of SIEM tools (e.g., Splunk, IBM QRadar, Securonix) and security operations workflows . · Proven ability to meet or exceed sales targets in a complex, solution-oriented environment. · Excellent communication, presentation, and negotiation skills. · Self-starter with the ability to work independently and cross-functionally. Preferred Skills: · Experience selling MDR, SIEM, SOAR , or AI-driven security solutions . · Familiarity with SaaS security platforms and cloud security posture management . · Background in threat detection, incident response , or SIEM engineering is a strong plus. Share your updated profile at naveen.vemula@netenrich.com
Posted 1 month ago
8.0 - 15.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Key Responsibilities 1. Demonstrated expertise in configuring, managing, and troubleshooting Fortinet Firewall systems. 2. Proficient in the operation and management of Cisco Layer 3 switches. 3. Comprehensive experience in managing core network infrastructure, including environments with multiple Internet Leased Lines (ILLs), firewalls, and Layer 3 switches operating in high availability (HA) mode, spanning multiple floors and integrating with data center connectivity. 4. Strong knowledge of Point-to-Point (P2P) and IPsec VPN tunnels, including configuration and maintenance. 5. Solid understanding of endpoint security tools such as Netskope, CrowdStrike, and CoSoSys Endpoint Protector. 6. Basic familiarity with IBM QRadar (Security Information and Event Management - SIEM tool). 7. Hands-on experience with LAN, WLAN, and WAN technologies. 8. Proven background in network security, with a focus on secure architecture and incident response. 9. Foundational understanding of Business Continuity Planning (BCP) in relation to network infrastructure. 10. Strong analytical and problem-solving abilities with a methodical approach to troubleshooting. 11. Highly self-motivated and capable of working independently while also being an effective contributor in a collaborative team setting. 12. Reliable and adaptable, with the flexibility to respond to changing requirements and priorities. Qualifications: 1. 8 to 15 years of progressive experience in the field of information technology, with a focus on network and security domains. 2. Proven track record in network and cybersecurity operations, including the design, implementation, and management of secure and scalable network infrastructures. 3. Exceptional time management and prioritization skills, with the ability to effectively manage multiple tasks and deliverables in a dynamic, high-pressure environment.
Posted 1 month ago
2.0 - 4.0 years
4 - 6 Lacs
Chennai
Work from Office
The Cyber Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security domain.
Posted 1 month ago
2.0 - 4.0 years
4 - 6 Lacs
Hyderabad
Work from Office
The Cyber Security E2 role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security E2 domain.
Posted 1 month ago
4.0 - 8.0 years
7 - 16 Lacs
Bengaluru
Hybrid
Greetings from Teamware Solutions a division of Quantum Leap Consulting Pvt. Ltd We are hiring a Consultant_DLP (Data Loss Prevention) Work Mode: Onsite; 5 days WFO Geography they support - US Work timings: 24x7 Rotational Shift; ( No female candidates) Locations: Bengaluru Experience: 4 -8 Years Notice Period: Immediate to 15 days Qualification: BTECH/BCA/MBA/MCA strong knowledge of TPRM Interview process: 2-3 rounds Qualifications: Three+ years of experience in information security preferably in the areas of incident response, investigations Bachelors degree from an accredited college/university or equivalent professional experience Understanding of Data Loss Prevention Experience working with SIEM solutions (Splunk, LogRhythm, QRadar, etc.) Familiarity performing packet analysis Hands on experience & working knowledge of ZScaler tools (Preferably) Additional Qualifications for Senior Associate: Three years of experience with information security or in a technology related field Strong knowledge base in operations, enterprise networking, systems evaluation and architecture Certifications (e.g., GCIH, CISSP, CCSP) are preferred Detailed, control oriented, and thorough Previous experience as a member of an Incident Response team is a plus. Please let me know if you are interested in this position and send me the resumes to netra.s@twsol.com
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39817 Jobs | Dublin
Wipro
19388 Jobs | Bengaluru
Accenture in India
15458 Jobs | Dublin 2
EY
14907 Jobs | London
Uplers
11185 Jobs | Ahmedabad
Amazon
10459 Jobs | Seattle,WA
IBM
9256 Jobs | Armonk
Oracle
9226 Jobs | Redwood City
Accenture services Pvt Ltd
7971 Jobs |
Capgemini
7704 Jobs | Paris,France