Jobs
Interviews

891 Qradar Jobs - Page 28

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

30.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Job Description ORACLE: As the provider of the world’s most complete, open and integrated business software and hardware systems, Oracle is dedicated to unleashing innovation by simplifying IT. With more than 30 years of information technology innovation, Oracle is the recognized industry leader in enterprise application and technology solutions. ORACLE CLOUD: Oracle Cloud is a Generation 2 enterprise cloud that delivers powerful compute and networking performance, a comprehensive portfolio of infrastructure and platform cloud services, and the world’s only self-driving autonomous database. Built from the ground up to meet the needs of mission-critical applications, Oracle Cloud supports all legacy workloads while delivering modern cloud development tools—so enterprises can bring their past and build their future. The comprehensive nature of Oracle Cloud is a key selection consideration for customers. Oracle has the broadest cloud portfolio in the industry, delivering a complete range of production-level, cross-functional business applications for each part of an organization with information and data shared seamlessly across Oracle Cloud Applications and other systems. Business users have the latest innovations at their fingertips across sales and marketing, customer service, finance and accounting, supply chain management, human capital and talent management—all enriched with social engagement and collaboration tools and an intuitive user interface that works on any mobile device. These applications have been architected on a modern and open cloud platform and infrastructure to simplify integration needs and lower an organization’s total cost of ownership. With such extensive functionality across business processes, customers can solve their business problems with complete solutions that give them end-to-end execution and complete visibility. Oracle IaaS is clearly differentiated, being far more performant, more secure, more reliable and cost efficient as compared to others in the market. Oracle has fundamentally innovated in the IaaS space and continues to gain market share aggressively. Oracle PaaS is anchored by Oracle Autonomous Database (ADB), which offers the most innovative “self-driving” capabilities in the data tier in the marketplace. Combine with ADB, Oracle cloud also offers a complete application development platform that includes app dev, security, integration, identity management, analytics, big data and AI/ML amongst other far broader capabilities. Partners with customers, sales, engineering and product teams to design, demonstrate and deploy Oracle Cloud architectures that address customer business problems. Drives Oracle Cloud customer consumption by accelerating the adoption of Oracle cloud services including discovery, design and deployment. Engages with strategic customers, builds leadership relationships at multiple levels within organizations in order to design and implement solutions. Works directly with customers to gather requirements, develop architectures and translates business needs into solutions. May implement solutions and ensure successful deployments through code development and scripting. Displays product/application understanding through highly customized presentation demonstrations to customers, and at conferences, and events. Supports customer from Proof of Concept (POC) through production deployment of services via resource configuration, planning, and customer education/training. Creates and distributes technical assets (white papers, solution code, blog posts, and video demonstrations). Serves as a leading contributor for customers and sales on technical cloud solutions and customer success. Identifies gaps and enhancements to influence engineering roadmaps for customer driven features. Leading contributor, may provide direction and mentoring to others. Work is non-routine and very complex, involving the application of advanced technical/business skills in area of specialization. May interact with C level. Maintains expertise by staying current on emerging technologies. Minimum qualifications include: 8 years experience with computer applications and tools required. Preferred but not required qualifications include: Bachelor of Science-level university degree in Computer Science, Math, Engineering from accredited university; and/or relevant 8 years technical experience. Advanced degree in relevant field of studies highly desirable. Expertise in and an in depth and thorough knowledge of competitive and industry knowledge in the field of computer applications and tools; System and application design; Implementation of advanced product features; Project management; Solving technical problems with customers in technical environments; Written and verbal communication and interpersonal skills; Needs analysis, positioning, and business justification. 8 years experience and expertise in the clear communication of technical information to others through presentations, demonstrations, written communication and consultative solutioning experience. Career Level - IC4 Responsibilities Come and join us! We are seeking a deeply technical individual to join our team where they will both lead and contribute to delivery of customer focused projects that involve migrating existing workloads to Oracle Cloud and building completely new architectures to support net new workloads in Oracle’s cloud. Project technology stacks we work with include existing legacy / On Premises software, Oracle’s Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) services, and other competitive technologies. While much of the focus of this role will revolve around delivery of identity and related cloud security technologies, a large portion of the work will also involve adjacencies including securing and configuring tenancies, networking, encryption and key or Certificate Management, Web Application Firewalls, SIEM technologies, vulnerability scanning, etc. While also interacting directly with customers the role involves regular work with the development organization to drive product improvements and innovations. This is a senior technical Cloud Delivery role, so the Cloud technical experience is the higher priority. A Cloud Security Engineer in our team is responsible for successful implementation of non-routine and complex business solutions ensuring high quality and timely delivery within budget to the customers’ happiness. Analyze business needs to help ensure Oracle’s solution meets the customers objectives by combining industry standard methodologies and product knowledge. Effectively applies Oracle’s methodologies and policies while adhering to contractual obligations, thereby minimizing Oracle’s risk and exposure. Exercises judgment and business acumen in selecting methods and techniques for effective project delivery on small to medium engagements. Provides direction and mentoring to junior resources on the delivery team. Ensures deliverables are acceptable and works closely with the Project Management Team to understand and manage project expectations. Collaborates with the consulting/delivery sales team by providing domain credibility. Helps with Technical solution scoping of project Comfortable working in a matrix management environment. Good communication skills to deal with internal collaborators, customers, and vendors. This individual should have a solid technical background and excellent problem-solving skills. Qualifications Individual should possess a deep knowledge of: Cloud or mobile security including OAuth, OpenID Connect, SAML federation, Single Sign-On. MFA and strong authentication. Identity management / governance, and provisioning. OR alternatively: Configuration of a secure tenancy in OCI, AWS, Azure, or GCP. Use and configuration of services such as OCI Cloud Guard, AWS Control Tower, Azure Security Center. Use and configuration of SIEM systems such as Splunk, QRadar, or LogRhythm. In addition to the above knowledge of fundamental enabling technologies including: Secure coding practices Network security SSL / TLS Encryption Key Management Certificate Management Intrusion Detection and Prevention Systems Data Loss Prevention Minimum Qualifications Minimum of 10 years of experience in progressively responsible information technology including. 5+ years of experience in developing, implementing, or architecting information systems 3+ years technical architecture experience integrating identity and access management software into cloud infrastructure and applications 2+ years experience in managing the security aspect of cloud deployments in OCI/Azure/AWS/GCP OR deployments of at least one identity and access management product such as: Oracle OAM/OIM/OVD/OID, CA/Netegrity SiteMinder/IdentityMinder/TransactionMinder, IBM Tivoli Identity Manager and/or Access Manager, Sun Identity Manager and/or Access Manager, Ping Access and/or Ping Federate, or similar Experience developing identity management strategies, architectures and implementation plans Experience with at least one of the following development environments/languages: Java / J2EE, Python, JavaScript, C#, c/C++ Preferred Experience And Qualifications Cloud Security Posture Management. Mobile Security. Cloud Security. Single Sign On. Enterprise Directory Architecture and Design including directory schema, namespace and replication topology experience. Resource Provisioning. Role Base Access Control. Experience with BEA WebLogic, IBM WebSphere or Tomcat. Hands on experience: (1) working with Oracle OCI, AWS, Azure or other major cloud providers, and (2) with Python programming and unit testing such as PyTest. Experience with Infrastructure as code concepts and CI/CD pipelines. Experience with DevOps concepts and Agile software development practices. Great documentational skills and approach of design and document first. Experience operating in a Linux/Unix environment. OCI certification highly desirable. Experience with one or more directories such as Active Directory, IBM Directory Server, SunONE Directory Server and Novell e-Directory. Familiarity with major operating systems, such as Microsoft Windows and Unix; mainframe security packages such as TopSecret, ACF2 and RACF; and/or leading packaged application solutions for ERP systems, CRM systems or portals. Solid understanding of virtual directories(e.g. Radiant Logic and OctetString). Familiarity with federated identity concepts (i.e. SAML, OAuth, OpenID Connect, WS-Federation). Familiarity with REST security concepts including OAuth, JSON, JWE, JWS, JWT, as well as others. Familiarity with web services security concepts such as SAML, WS-Security, XML-Sec. Experience leading business requirements gathering and translating those into system requirements. Experience facilitating business process design as it relates to managing identities and access privileges. Experience developing identity management governance plans. Understanding of current regulatory environment and related implications to identity management and security/audit compliance. Comfort with sophisticated, constantly evolving software development environments. Ability to learn new technologies quickly. Experience using distributed source code management systems (e.g. Git). Experience using ticket tracking systems (i.e. JIRA). Experience working with geographically distributed teams. Does this sound like you? If so, we hope to meet you! Qualifications Career Level - IC4 About Us As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s challenges. We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That’s why we’re committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_mb@oracle.com or by calling +1 888 404 2494 in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law. Show more Show less

Posted 1 month ago

Apply

13.0 years

0 Lacs

Kochi, Kerala, India

On-site

Overview Role description Seasoned SOC Manager with over 13 years of experience in cybersecurity, including 8+ years of specialized expertise and more than 3 years in leadership roles within Security Operations Centers. Proven ability to lead high-performing SOC teams (L1–L3), drive operational excellence, and strengthen organizational security posture through strategic threat detection and incident response initiatives. Key Responsibilities Led 24x7 SOC operations, managing day-to-day activities and incident response efforts. Directed a multidisciplinary team of L1, L2, and L3 analysts to ensure effective threat monitoring and rapid response. Developed, implemented, and maintained SOC policies, playbooks, standard operating procedures (SOPs), and escalation workflows. Oversaw the end-to-end lifecycle of security incidents, including detection, triage, analysis, containment, eradication, and recovery. Acted as a key liaison between security teams, IT, application stakeholders, and executive leadership during incidents and investigations. Administered and optimized security technologies such as SIEM (Splunk, QRadar, ArcSight), SOAR platforms, EDR, IDS/IPS, and threat intelligence tools. Generated and presented regular reports on SOC performance metrics, threat trends, and incident outcomes to senior leadership. Led continuous improvement initiatives, including analyst training programs, process automation, and tool enhancements. Ensured SOC compliance with industry standards, security frameworks (MITRE ATT&CK, NIST, ISO 27001), and regulatory requirements (GDPR, HIPAA, PCI-DSS). Managed SOC staffing activities, including recruitment, onboarding, shift scheduling, and performance evaluations. Skills SOC, SIEM, Threat Monitoring Show more Show less

Posted 1 month ago

Apply

7.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Role Description Role Overview: We are seeking an experienced SIEM Platform Support Engineer to ensure the reliability, performance, and continuous improvement of our cybersecurity platforms. In this key role, you will provide hands-on technical support, manage platform maintenance, and collaborate closely with cross-functional teams to strengthen our security infrastructure. Your efforts will directly contribute to maintaining a resilient, secure, and high-performing environment. Key Responsibilities Deliver expert-level technical support for cybersecurity platforms, diagnosing and resolving incidents and issues in a timely manner. Monitor system health and performance metrics; proactively identify and resolve bottlenecks and inefficiencies. Conduct routine platform maintenance, including patch management, version upgrades, and configuration updates. Collaborate with security analysts, engineers, and infrastructure teams to implement enhancements and align platform capabilities with organizational security goals. Maintain comprehensive documentation for troubleshooting processes, system configurations, and support knowledge bases. Ensure all systems adhere to internal security policies, compliance standards, and industry best practices. Participate in an on-call rotation to address critical incidents and ensure 24/7 operational continuity. Qualifications Minimum of 7 years of experience in platform support, systems administration, or a related technical support role. Proficient in administering and troubleshooting Windows and Linux operating systems, with a solid understanding of networking fundamentals. Hands-on experience with SIEM platforms (e.g., Splunk, IBM QRadar, or similar). Strong analytical and problem-solving skills with a methodical and detail-oriented approach. Excellent communication skills with the ability to convey technical information clearly and effectively. Proven ability to work independently as well as collaboratively in a team environment. Industry certifications such as CompTIA Security+, Microsoft Certified: Azure Administrator, or similar are highly desirable. Skills SIEM Platform Admin Show more Show less

Posted 1 month ago

Apply

30.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Job Description ORACLE: As the provider of the world’s most complete, open and integrated business software and hardware systems, Oracle is dedicated to unleashing innovation by simplifying IT. With more than 30 years of information technology innovation, Oracle is the recognized industry leader in enterprise application and technology solutions. ORACLE CLOUD: Oracle Cloud is a Generation 2 enterprise cloud that delivers powerful compute and networking performance, a comprehensive portfolio of infrastructure and platform cloud services, and the world’s only self-driving autonomous database. Built from the ground up to meet the needs of mission-critical applications, Oracle Cloud supports all legacy workloads while delivering modern cloud development tools—so enterprises can bring their past and build their future. The comprehensive nature of Oracle Cloud is a key selection consideration for customers. Oracle has the broadest cloud portfolio in the industry, delivering a complete range of production-level, cross-functional business applications for each part of an organization with information and data shared seamlessly across Oracle Cloud Applications and other systems. Business users have the latest innovations at their fingertips across sales and marketing, customer service, finance and accounting, supply chain management, human capital and talent management—all enriched with social engagement and collaboration tools and an intuitive user interface that works on any mobile device. These applications have been architected on a modern and open cloud platform and infrastructure to simplify integration needs and lower an organization’s total cost of ownership. With such extensive functionality across business processes, customers can solve their business problems with complete solutions that give them end-to-end execution and complete visibility. Oracle IaaS is clearly differentiated, being far more performant, more secure, more reliable and cost efficient as compared to others in the market. Oracle has fundamentally innovated in the IaaS space and continues to gain market share aggressively. Oracle PaaS is anchored by Oracle Autonomous Database (ADB), which offers the most innovative “self-driving” capabilities in the data tier in the marketplace. Combine with ADB, Oracle cloud also offers a complete application development platform that includes app dev, security, integration, identity management, analytics, big data and AI/ML amongst other far broader capabilities. Partners with customers, sales, engineering and product teams to design, demonstrate and deploy Oracle Cloud architectures that address customer business problems. Drives Oracle Cloud customer consumption by accelerating the adoption of Oracle cloud services including discovery, design and deployment. Engages with strategic customers, builds leadership relationships at multiple levels within organizations in order to design and implement solutions. Works directly with customers to gather requirements, develop architectures and translates business needs into solutions. May implement solutions and ensure successful deployments through code development and scripting. Displays product/application understanding through highly customized presentation demonstrations to customers, and at conferences, and events. Supports customer from Proof of Concept (POC) through production deployment of services via resource configuration, planning, and customer education/training. Creates and distributes technical assets (white papers, solution code, blog posts, and video demonstrations). Serves as a leading contributor for customers and sales on technical cloud solutions and customer success. Identifies gaps and enhancements to influence engineering roadmaps for customer driven features. Leading contributor, may provide direction and mentoring to others. Work is non-routine and very complex, involving the application of advanced technical/business skills in area of specialization. May interact with C level. Maintains expertise by staying current on emerging technologies. Minimum qualifications include: 8 years experience with computer applications and tools required. Preferred but not required qualifications include: Bachelor of Science-level university degree in Computer Science, Math, Engineering from accredited university; and/or relevant 8 years technical experience. Advanced degree in relevant field of studies highly desirable. Expertise in and an in depth and thorough knowledge of competitive and industry knowledge in the field of computer applications and tools; System and application design; Implementation of advanced product features; Project management; Solving technical problems with customers in technical environments; Written and verbal communication and interpersonal skills; Needs analysis, positioning, and business justification. 8 years experience and expertise in the clear communication of technical information to others through presentations, demonstrations, written communication and consultative solutioning experience. Career Level - IC4 Responsibilities Come and join us! We are seeking a deeply technical individual to join our team where they will both lead and contribute to delivery of customer focused projects that involve migrating existing workloads to Oracle Cloud and building completely new architectures to support net new workloads in Oracle’s cloud. Project technology stacks we work with include existing legacy / On Premises software, Oracle’s Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) services, and other competitive technologies. While much of the focus of this role will revolve around delivery of identity and related cloud security technologies, a large portion of the work will also involve adjacencies including securing and configuring tenancies, networking, encryption and key or Certificate Management, Web Application Firewalls, SIEM technologies, vulnerability scanning, etc. While also interacting directly with customers the role involves regular work with the development organization to drive product improvements and innovations. This is a senior technical Cloud Delivery role, so the Cloud technical experience is the higher priority. A Cloud Security Engineer in our team is responsible for successful implementation of non-routine and complex business solutions ensuring high quality and timely delivery within budget to the customers’ happiness. Analyze business needs to help ensure Oracle’s solution meets the customers objectives by combining industry standard methodologies and product knowledge. Effectively applies Oracle’s methodologies and policies while adhering to contractual obligations, thereby minimizing Oracle’s risk and exposure. Exercises judgment and business acumen in selecting methods and techniques for effective project delivery on small to medium engagements. Provides direction and mentoring to junior resources on the delivery team. Ensures deliverables are acceptable and works closely with the Project Management Team to understand and manage project expectations. Collaborates with the consulting/delivery sales team by providing domain credibility. Helps with Technical solution scoping of project Comfortable working in a matrix management environment. Good communication skills to deal with internal collaborators, customers, and vendors. This individual should have a solid technical background and excellent problem-solving skills. Qualifications Individual should possess a deep knowledge of: Cloud or mobile security including OAuth, OpenID Connect, SAML federation, Single Sign-On. MFA and strong authentication. Identity management / governance, and provisioning. OR alternatively: Configuration of a secure tenancy in OCI, AWS, Azure, or GCP. Use and configuration of services such as OCI Cloud Guard, AWS Control Tower, Azure Security Center. Use and configuration of SIEM systems such as Splunk, QRadar, or LogRhythm. In addition to the above knowledge of fundamental enabling technologies including: Secure coding practices Network security SSL / TLS Encryption Key Management Certificate Management Intrusion Detection and Prevention Systems Data Loss Prevention Minimum Qualifications Minimum of 10 years of experience in progressively responsible information technology including. 5+ years of experience in developing, implementing, or architecting information systems 3+ years technical architecture experience integrating identity and access management software into cloud infrastructure and applications 2+ years experience in managing the security aspect of cloud deployments in OCI/Azure/AWS/GCP OR deployments of at least one identity and access management product such as: Oracle OAM/OIM/OVD/OID, CA/Netegrity SiteMinder/IdentityMinder/TransactionMinder, IBM Tivoli Identity Manager and/or Access Manager, Sun Identity Manager and/or Access Manager, Ping Access and/or Ping Federate, or similar Experience developing identity management strategies, architectures and implementation plans Experience with at least one of the following development environments/languages: Java / J2EE, Python, JavaScript, C#, c/C++ Preferred Experience And Qualifications Cloud Security Posture Management. Mobile Security. Cloud Security. Single Sign On. Enterprise Directory Architecture and Design including directory schema, namespace and replication topology experience. Resource Provisioning. Role Base Access Control. Experience with BEA WebLogic, IBM WebSphere or Tomcat. Hands on experience: (1) working with Oracle OCI, AWS, Azure or other major cloud providers, and (2) with Python programming and unit testing such as PyTest. Experience with Infrastructure as code concepts and CI/CD pipelines. Experience with DevOps concepts and Agile software development practices. Great documentational skills and approach of design and document first. Experience operating in a Linux/Unix environment. OCI certification highly desirable. Experience with one or more directories such as Active Directory, IBM Directory Server, SunONE Directory Server and Novell e-Directory. Familiarity with major operating systems, such as Microsoft Windows and Unix; mainframe security packages such as TopSecret, ACF2 and RACF; and/or leading packaged application solutions for ERP systems, CRM systems or portals. Solid understanding of virtual directories(e.g. Radiant Logic and OctetString). Familiarity with federated identity concepts (i.e. SAML, OAuth, OpenID Connect, WS-Federation). Familiarity with REST security concepts including OAuth, JSON, JWE, JWS, JWT, as well as others. Familiarity with web services security concepts such as SAML, WS-Security, XML-Sec. Experience leading business requirements gathering and translating those into system requirements. Experience facilitating business process design as it relates to managing identities and access privileges. Experience developing identity management governance plans. Understanding of current regulatory environment and related implications to identity management and security/audit compliance. Comfort with sophisticated, constantly evolving software development environments. Ability to learn new technologies quickly. Experience using distributed source code management systems (e.g. Git). Experience using ticket tracking systems (i.e. JIRA). Experience working with geographically distributed teams. Does this sound like you? If so, we hope to meet you! Qualifications Career Level - IC4 About Us As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s challenges. We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That’s why we’re committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_mb@oracle.com or by calling +1 888 404 2494 in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law. Show more Show less

Posted 1 month ago

Apply

3.0 - 5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Your potential, unleashed. India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks Your work profile As Assistant Manager in our Cyber Team you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: - We are looking for a skilled Cribl Data Engineer to design, manage, and optimize data pipelines that process and route machine data at scale. The ideal candidate will have hands-on experience with Cribl Stream , Cribl Edge , or Cribl Search , and a strong understanding of telemetry data workflows, observability tools, and data platforms like Splunk, Sentinel, Elastic, or S3. Design and build streaming data pipelines using Cribl Stream for routing, transforming, and enriching logs, metrics, and trace data. Configure data sources (e.g., Syslog, HEC, TCP, S3, Kafka) and destinations (e.g., Splunk, Sentinel, Elasticsearch, Data Lakes). Develop pipelines, routes, packs, and knowledge objects using Cribl’s UI and scripting features. Optimize data ingestion workflows to reduce costs, improve performance, and enhance data usability. Implement filtering, masking, sampling, and transformation logic using Cribl Functions (Regex, Eval, Lookup, JSON, etc.). Work with SIEM and observability teams to ensure clean, enriched, and correctly formatted data flows into tools like Splunk, Sentinel, S3, or OpenSearch. Monitor Cribl infrastructure and debug pipeline issues in real time using Cribl Monitoring and Health Checks. Implement version control, testing, and CI/CD for Cribl pipelines (using GitHub or GitLab). Participate in PoC evaluations, vendor integrations, and best practices documentation.\ Desired qualifications Education: Bachelor’s degree in Information Security, Computer Science, or a related field. A Master’s degree in Cybersecurity or Business Management is preferred. Experience: 3 to 5 Year Hands-on experience with Cribl Stream and knowledge of Cribl Edge or Cribl Search. Strong understanding of log formats (Syslog, JSON, CSV, Windows Event Logs, etc.) Familiarity with SIEM platforms like Splunk, Microsoft Sentinel, Elastic Stack, QRadar, or Exabeam. Proficient in regex, JSON transformations, and scripting logic. Comfortable with cloud platforms (AWS/Azure/GCP) and object storage systems (e.g., S3, Azure Blob). Familiarity with Kafka, Fluentd, Fluent Bit, Logstash, or similar tools is a plus. Location and way of working Base location: Noida/Gurgaon Professional is required to work from office. Your role as a Assistant Manager We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society. In addition to living our purpose, Senior Executive across our organization must strive to be: Inspiring - Leading with integrity to build inclusion and motivation Committed to creating purpose - Creating a sense of vision and purpose Agile - Achieving high-quality results through collaboration and Team unity Skilled at building diverse capability - Developing diverse capabilities for the future Persuasive / Influencing - Persuading and influencing stakeholders Collaborating - Partnering to build new solutions Delivering value - Showing commercial acumen Committed to expanding business - Leveraging new business opportunities Analytical Acumen - Leveraging data to recommend impactful approach and solutions through the power of analysis and visualization Effective communication – Must be well abled to have well-structured and well-articulated conversations to achieve win-win possibilities Engagement Management / Delivery Excellence - Effectively managing engagement(s) to ensure timely and proactive execution as well as course correction for the success of engagement(s) Managing change - Responding to changing environment with resilience Managing Quality & Risk - Delivering high quality results and mitigating risks with utmost integrity and precision Strategic Thinking & Problem Solving - Applying strategic mindset to solve business issues and complex problems Tech Savvy - Leveraging ethical technology practices to deliver high impact for clients and for Deloitte Empathetic leadership and inclusivity - creating a safe and thriving environment where everyone's valued for who they are, use empathy to understand others to adapt our behaviors and attitudes to become more inclusive. How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome… entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals. *Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices. At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution. Show more Show less

Posted 1 month ago

Apply

5.0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Your potential, unleashed. India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realise your potential amongst cutting edge leaders, and organisations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks. Your work profile As Assistant Manager in our Cyber Team you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: - We are looking for a highly skilled QRadar Implementation Engineer to design, deploy, and configure the QRadar SIEM platform across multiple customer environments within our MSSP platform. The ideal candidate will have strong expertise in QRadar implementation and the ability to customize solutions based on individual client requirements while ensuring scalable, efficient, and secure SIEM operations in a multi-tenant environment. Key Responsibilities: • QRadar Deployment & Configuration: Design and implement QRadar SIEM solutions for MSSP clients, including the installation and configuration of QRadar components (Console, Event Processors, Data Nodes, etc.). • Multi-Tenant Environment: Configure and maintain QRadar in a multi-tenant MSSP environment, ensuring proper segmentation and secure data handling for each client. • Log Source Integration: Integrate diverse log sources (network devices, endpoints, applications, cloud services) into QRadar for continuous monitoring and threat detection across different client environments. • Customization for Clients: Develop and customize correlation rules, dashboards, and alerts specific to client needs, including use cases tailored to each customer’s threat landscape. • Use Case Development: Work closely with client SOC teams to develop security use cases, tune rules, and optimize detection capabilities based on emerging threats and business requirements. • Performance Optimization: Ensure the optimal performance of QRadar across all tenants, including EPS management, storage, and event processing in high-volume environments. • Client Onboarding: Collaborate with internal and external teams for seamless onboarding of new clients onto the MSSP platform, ensuring successful integration with existing security tools and services. Security Monitoring and Threat Detection: Assist in the development of effective monitoring strategies, leveraging QRadar to detect and respond to threats for multiple clients. • Compliance and Reporting: Ensure that QRadar deployments align with regulatory requirements (PCI-DSS, GDPR, HIPAA, etc.) and provide detailed reporting and audits for each client as needed. • Troubleshooting & Support: Provide Level 2/3 support for QRadar issues, ensuring timely resolution of problems related to log ingestion, parsing, rule execution, and system performance. • System Upgrades & Maintenance: Plan and execute regular system upgrades, patching, and maintenance activities for QRadar instances across all client environments. Desired qualifications • Bachelor’s degree in Computer Science, Cybersecurity, or related field, or equivalent experience. • 5+ years of experience in deploying and managing QRadar SIEM in large-scale environments, preferably within an MSSP. • In-depth understanding of QRadar architecture, components, and deployment scenarios. • Strong experience in managing and securing multi-tenant SIEM environments. • Expertise in log source integration, event normalization, and tuning for different client environments. • Familiarity with scripting and automation tools (Python, Bash, etc.) for custom integrations and log parsing. • Solid understanding of networking and security technologies (firewalls, IDS/IPS, EDR, etc.). • Hands-on experience with security frameworks such as MITRE ATT&CK, NIST, or ISO 27001. Preferred Certifications: • IBM Certified QRadar SIEM Administrator or Architect. • CISSP, CEH, or other relevant cybersecurity certifications. Location and way of working • Base location: Mumbai/Gurgaon • Professional is required to work from office Your role as a Assistant Manager We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society. In addition to living our purpose, Senior Executive across our organization must strive to be: • Inspiring - Leading with integrity to build inclusion and motivation • Committed to creating purpose - Creating a sense of vision and purpose • Agile - Achieving high-quality results through collaboration and Team unity • Skilled at building diverse capability - Developing diverse capabilities for the future • Persuasive / Influencing - Persuading and influencing stakeholders • Collaborating - Partnering to build new solutions • Delivering value - Showing commercial acumen • Committed to expanding business - Leveraging new business opportunities. Analytical Acumen - Leveraging data to recommend impactful approach and solutions through the power of analysis and visualization • Effective communication – Must be well abled to have well-structured and well-articulated conversations to achieve win-win possibilities • Engagement Management / Delivery Excellence - Effectively managing engagement(s) to ensure timely and proactive execution as well as course correction for the success of engagement(s) • Managing change - Responding to changing environment with resilience • Managing Quality & Risk - Delivering high quality results and mitigating risks with utmost integrity and precision • Strategic Thinking & Problem Solving - Applying strategic mindset to solve business issues and complex problems • Tech Savvy - Leveraging ethical technology practices to deliver high impact for clients and for Deloitte • Empathetic leadership and inclusivity - creating a safe and thriving environment where everyone's valued for who they are, use empathy to understand others to adapt our behaviours and attitudes to become more inclusive. How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Show more Show less

Posted 1 month ago

Apply

7.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Introduction A career in IBM Consulting is rooted by long-term relationships and close collaboration with clients across the globe. You'll work with visionaries across multiple industries to improve the hybrid cloud and AI journey for the most innovative and valuable companies in the world. Your ability to accelerate impact and make meaningful change for your clients is enabled by our strategic partner ecosystem and our robust technology platforms across the IBM portfolio; including Software and Red Hat. Curiosity and a constant quest for knowledge serve as the foundation to success in IBM Consulting. In your role, you'll be encouraged to challenge the norm, investigate ideas outside of your role, and come up with creative solutions resulting in ground breaking impact for a wide network of clients. Our culture of evolution and empathy centers on long-term career growth and development opportunities in an environment that embraces your unique skills and experience. Your Role And Responsibilities Responsible for implementation partner to see project on track along with providing required reports to management and client Handle the project as well as BAU operations while ensuring high level of systems security compliance Coordinate with and act as an authority to resolve incidents by working with other information security specialists to correlate threat assessment data. Analyse data, such as logs or packets captures, from various sources within the enterprise and draw conclusions regarding past and future security incidents. Ready to support for 24/7 environment. Preferred Education Master's Degree Required Technical And Professional Expertise 7+ years of IT experience in security with at least 4+ Years in Security Operation Centre with SIEMs. B.E./ B. Tech/ MCA/ M.Sc. Maintaining SIEM/UEBA platform hygiene, Scripting, Automation SOAR Playbook Creation with Testing, with Change/Problem/Incident Management, with CP4S platform integration & dashboarding, Recovery Support. Expertise in Security Device Management SIEM, Arcsight, Qradar, incident response, threat hunting, Use case engineering, SOC analyst, device integration with SIEM. Working knowledge of industry standard risk, governance and security standard methodologies Proficient in incident response processes - detection, triage, incident analysis, remediation and reporting. Ability to multitask and work independently with minimal direction and maximum accountability. Preferred Technical And Professional Experience Preferred OEM Certified SOAR specialist + CEH Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work Intuitive individual with an ability to manage change and proven time management Proven interpersonal skills while contributing to team effort by accomplishing related results as needed Up-to-date technical knowledge by attending educational workshops, reviewing publications Show more Show less

Posted 1 month ago

Apply

2.0 - 5.0 years

0 Lacs

India

On-site

Overview: ormation Security Analyst: Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Maintains hardware, software and network firewalls and encryption protocols. Administers security policies to control physical and virtual access to systems. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Job Code Tip: May be internal or external, client-focused, working in conjunction with Professional Services and outsourcing functions. May include company-wide, web-enabled solutions. Individuals whose primary focus is on developing, testing, debugging and deploying code or processing routines that support security protocols for an established system or systems should be matched to the appropriate Programmer or Programmer/Analyst family in the Information Technology/MIS functional area. Responsibilities: Should have process knowledge and technical knowledge on any of the SIEM tools ( like Qradar, LogRhythm, AlienVault, Splunk…etc). L2/L3 level is added advantage. Should have process knowledge and technical knowledge in AV tools like Symantec, McAfee, Trend Micro…etc. L2/L3 level is added advantage. Should have knowledge in managing Vulnerability tools and various remediation efforts. Review security logs generated by applications, devices and other systems, taking action or escalating to appropriate teams as needed. Enforce incident response service level agreement. Work with the global IT Security team to analyze, test and recommend tools to strengthen the security posture of the company Create and maintain operational reports allowing IT management team to understand the current and historical landscape of the IT security risks Vulnerability management assessment and remediation Participate in daily and ad-hoc meetings related to cyber security, controls and compliance, processes and documentation related tasks Research the latest information technology (IT) security trends Help plan and carry out an organization’s way of handling security Develop security standards and best practices for the organization Recommend security enhancements to management or senior IT staff Document security breaches and assess the damage they cause. Performs other duties as assigned Qualifications: B. Tech, B.E or M.C.A 2-5 years’ Experience working in a Security Operations Center 2 years minimum in the computer industry Knowledge working with complex Windows environments Knowledgeable in various security frameworks such as NIST 800-53 / NIST 800-171 / ISO27001 Knowledge in design and administration of security tools Good written and verbal communication skills

Posted 1 month ago

Apply

8.0 - 13.0 years

10 - 15 Lacs

Mumbai

Work from Office

Total Experience: Experience 5 8 years Job Skills: Keep track of APTs groups (advanced persistent threats). Know APT Groups motivation, their tools & techniques, the malware they write, and C&C (command and control center), identify their targets. Threat intelligence analyst must have professional experience in cybersecurity. A Threat Researcher is responsible for identifying and analyzing potential threats to an organizations network and systems. They work to understand the tactics, techniques, and procedures (TTPs) used by threat actors to compromise systems and steal sensitive data. Threat Researchers are also responsible for developing and implementing strategies to detect, prevent, and mitigate these threats. Conducting research on emerging threats and Vulnerabilities. Analyzing Threat intelligence data to identify potential threats. Developing and implementing strategies to detect and prevent threats. Collaborating with other cybersecurity professionals to develop and implement security measures. Creating reports and presentations to communicate findings to management and other stakeholders. Ensure all the advisories received from regulatory and strategy partners are analyzed and processed in timely manner. All TI trackers are updated in near real time. Create reports/Dashboard for higher management. Collects data types and sources of information in addition to commonly collecting forms of threat data, i.e., malicious IPs and domains. Information from news and social media sources. Vulnerability data such as personally identifiable information. Performs sorting, filtering, indexing on raw data. Format and structure raw data. Take the result of several tools, data sources and combines those data points on a per-host basis, performing, investigating, and analyzing data. DisseminationDeliver the intelligence to the intended consumers at different levelsStrategic, Tactical, Operational, Technical. Provide Contextual Intel feeds to all the stacks which requires priority attention to protect HDFC assets. Regular training and knowledge sharing with the team. Collaboration with TH and RT and provide threat intel to SOC CD to create use case. There should be no audit points to come from the defined and existing process. Audit requirements should be fulfilled. Efficacy testing for new product as per industry best practice. Timely tracking and follow-ups on all open alerts/advisories. Timely escalation on open issues/tasks. Responding to all intelligence received from our Threat Intel partners and inform seniors or required escalation where required like Bank data leak/breach alerts. Doing in-house threat research from the open sources along with the help of our existing Threat Intel portal.

Posted 2 months ago

Apply

3.0 - 8.0 years

5 - 10 Lacs

Hyderabad

Work from Office

Information Security Engineer Vulnerability Management Analyst What you will do In this vital role is focused on identifying, assessing, prioritizing, and tracking the remediation of vulnerabilities across the organizations technology stack. The Vulnerability Management Analyst plays a key role in the security operations team by ensuring known vulnerabilities are managed through their lifecycle using structured processes and tools. The individual will analyze vulnerability scan data, correlate threat intelligence (e.g., KEV, EPSS), and work closely with infrastructure, application, and business teams to drive risk-based remediation. Roles & Responsibilities: Analyze vulnerability scan results from tools like Tenable, Qualys, or Rapid7 to identify security weaknesses across infrastructure and applications. Prioritize vulnerabilities using multiple criteria, including CVSS, KEV (Known Exploited Vulnerabilities), EPSS (Exploit Prediction Scoring System), asset criticality, and business context. Partner with IT and DevOps teams to track remediation progress and provide technical guidance on mitigation strategies. Monitor threat intelligence feeds to correlate vulnerabilities with current exploit activity. Create and maintain vulnerability metrics, dashboards, and reports for leadership and compliance teams. Support vulnerability assessment activities in cloud environments (AWS, Azure, etc.). Maintain documentation related to the vulnerability management lifecycle. Assist in policy and process development related to vulnerability and patch management. Participate in audits and compliance efforts (e.g., SOX, ISO, NIST, PCI). What we expect of you We are all different, yet we all use our unique contributions to serve patients. Masters degree and 1 to 3 years of experience in Cybersecurity, vulnerability management or information security operations OR Bachelors degree and 3 to 5 years of experience in Cybersecurity, vulnerability management or information security operations OR Diploma and 7 to 9 years of experience in Cybersecurity, vulnerability management or information security operations Must-Have Skills: Familiarity with vulnerability management tools (e.g., Tenable, Qualys, Rapid7). Understanding of CVSS scoring, vulnerability lifecycle, and remediation workflows. Basic knowledge of threat intelligence and how it applies to vulnerability prioritization. Working knowledge of network, operating system, and application-level security. Ability to analyze scan data and correlate it with business context and threat intelligence. Preferred Qualifications: Good-to-Have Skills: Experience with KEV, EPSS, and other threat-based scoring systems. Familiarity with patch management processes and tools. Exposure to cloud security and related scanning tools (e.g., Prisma Cloud, AWS Inspector). CompTIA Security+ GIAC GSEC / GCIH Qualys Vulnerability Management Specialist (QVMS) Tenable Certified Nessus Auditor (TCNA) Soft Skills: Analytical Thinking Ability to interpret complex data sets and assess risk effectively Attention to Detail Precision in identifying and tracking vulnerabilities and remediation status Communication Skills Ability to communicate technical findings to both technical and non-technical audiences Collaboration & Teamwork Able to work across IT, DevOps, and security teams to drive resolution Curiosity & Continuous Learning Willingness to know the latest with evolving threats and technologies Problem-Solving Approach Capability to identify solutions to security weaknesses in diverse environments

Posted 2 months ago

Apply

0 years

0 Lacs

Coimbatore, Tamil Nadu, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. CMS-TDR Senior As part of our EY-cyber security team, who shall work as SME for Microsoft Sentinel solutions in TDR team The opportunity We’re looking for Senior Consultant with expertise in Cloud Security solutions. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Your Key Responsibilities Architecting and implementation of cloud security monitoring platforms MS Sentinel Provide consulting to customers during the testing, evaluation, pilot, production, and training phases to ensure a successful deployment. Perform as the subject matter expert on Cloud Security solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. Securing overall cloud environments by applying cybersecurity tools and best practices Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. Content development which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Skills And Attributes For Success Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities. Expertise in content management in MS Sentinel Good knowledge in threat modelling. Experience in creating use cases under Cyber kill chain and Mitre attack framework Expertise in integrating critical devices/applications including unsupported (in-house built) by creating custom parsers Below mentioned experiences/expertise on Sentinel Develop a migration plan from Splunk/QRadar/LogRhythm to MS Sentinel Deep understanding of how to implement best practices for designing and securing Azure platform Experiencing advising on Microsoft Cloud Security capabilities across Azure platform Configure data digestion types and connectors Analytic design and configuration of the events and logs being digested Develop, automate, and orchestrate tasks(playbooks) with logic apps based on certain events Configure Sentinel Incidents, Workbooks, Hunt queries, Notebooks Experience in other cloud native security platforms like AWS and GCP is a plus Scripting knowledge (Python, Bash, PowerShell) Extensive knowledge of different security threats Good knowledge and experience in Security Monitoring Good knowledge and experience in Cyber Incident Response To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Demonstrate both technical acumen and critical thinking abilities. Strong interpersonal and presentation skills. Certification in Azure (any other cloud vendor certification is a plus) Ideally, you’ll also have People/Project management skills. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 months ago

Apply

12.0 - 15.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Introduction The mission of the IBM Storage Solutions Engineering Team is to engage with strategic OEM and ISV vendors that are aligned with the IBM Storage strategy to create short- and long-term alignment of roadmaps and GTM. This group is comprised of technology and business professionals who have intent on bringing to market impactful customer solutions based on the IBM Storage assets of today and the future. It will have influence over the product roadmaps and will evangelize everything we have to offer to our partners, our clients, and the worldwide market broadly. Your Role And Responsibilities The Storage Solutions Engineer will primarily be expected to: Contribute to defining clear requirements for the IBM Storage portfolio based on industry trends and key OEM/ISV strategies, in collaborative partnership with Storage Product Managers Design, develop, build, integrate, and test, validate, or otherwise certify differentiated workload-based solutions based on the IBM Storage portfolio of offerings combined with 3rd party technology from leading technology partners Provide education to customers and sales regarding our storage solutions in a wide variety of formats (e.g., blogs, white papers, reference architectures, videos, industry social media, trade shows, on-site briefings, etc.) Drive client success stories, references, and joint marketing opportunities between IBM Storage and our technology partners Help foster the feeling of being a trusted advisor with our customers when it comes to strategic storage solutions Enable cross-selling of other 3rd party solutions in the market Preferred Education Master's Degree Required Technical And Professional Expertise A strong candidate for the Storage Solutions Engineer position will possess a wide variety of skills, experiences, and attributes including: Demonstrated skill in performing the typical assignments and in achieving the primary goals listed above Experience of 12-15 years as a Solutions Architect, Technical Marketing Engineering, Corporate Systems Engineer, Technical Product Manager, Interoperability Test Engineer, Technical Sales Engineer, or similar role Discipline in program managing oneself and others to deliver on objectives Openness, transparency, and honesty with oneself and others as it pertains to intentions, objectives, plans, and execution A habit of facing and overcoming difficult technical and business challenges, or failing while putting forth one’s best effort, leaning, and forging on An innate desire to deeply learn new technologies and customer workloads with a strong understanding of the problems being solved and the business value derived A bias for action and results, viewing failure as necessary and educational Taking ownership of one’s tasks, contributing actively to projects and objectives, and understanding the impact of one’s performance on the team’s success A bias for exercising the principle of charity, interpreting the words and actions of others in the best, strongest, and most rational way possible Technology Areas It Is Expected That Storage Solutions Engineering Team Members Will Be Deeply Familiar With At Least a Few Relevant Technology Areas And Broadly Familiar With Several Others. Such Technology Areas (with Example Vendors And Products) Include Enterprise Storage: IBM, Dell-EMC, NetApp, Pure, DDN, HPE, Ceph, etc. Hyperconverged Infrastructure: Nutanix, HPE SimpliVity, Dell-EMC VxRail, Cohesity, Red Hat, Pivot3, etc. Virtualization: VMware, MS Hyper-V, Nutanix AOS, Red Hat OpenShift, KVM, SUSE, Citrix, etc. AI/ML: Nvidia, IronYun, Data Monsters, etc. Data Protection: Veeam, Commvault, Cohesity, Rubrik, etc. Database: SAP, Oracle, MS SQL Server, Snowflake, IBM Db2, MS Access, MySQL, MongoDB, PostgreSQL, ELK, MariaDB, Redis, Elasticsearch, Databricks, OpenText (Vertica), EnterpriseDB, etc. Server Infrastructure: IBM, Dell-EMC, Lenovo, Cisco, Supermicro, etc. Hyperscalar / Public Cloud: Amazon AWS, Google GCP, MS Azure, etc Data Security and Resiliency: IBM QRadar, IBM Gardium, Splunk, Thales Show more Show less

Posted 2 months ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What You’ll Be Doing... You'll be part of the "Verizon Global Infrastructure (VGI), Network & Information Security” group working on securing the network and infra devices, harden the operating systems, configurations and build use cases to automate these tasks. Protect against cyber threats within the VGS Technology organization. You will work with a team of cybersecurity engineers with network & infrastructure background, threat intelligence analysts to align common technologies and practices that fortify our applications, systems, IT network and infrastructure. Some of your daily responsibilities would be the following. Leveraging industry proven tools to identify and reduce Cyber Risks. Implementing next generation network security architecture, create advanced policies and controls against future threats. Ensuring effectiveness and coverage of security, policies and controls of VGS Network & Infrastructure, prioritizing risk level. Ensuring Security posture of VGS Network & Infrastructure, e.g., access management, vulnerabilities remediation, etc. Developing awareness, training & compliance programs focused on Network & Infrastructure Cyber Security practices. Coordinating activities like network, penetration testing, incident response, data collection etc by partnering with the CISO teams. Assisting in Crisis Management, Ransomware Recovery and Business Continuity planning. Identifying, investigating and resolving global security breaches / incidents. Developing and maintaining network and infrastructure security reporting dashboards and scorecards used to measure our Cyber Practice. Identifying opportunities and use cases for automation to remediate vulnerabilities , implement controls, orchestrate between tools and automate security practices. What we’re looking for... You are passionate about network security and automation as a career. You are self-driven and motivated, with good communication and analytical skills. You’re a sought-after team member that thrives in a dynamic work environment. You will be working with multiple partners from the business groups, so networking and managing effective working relationships should be your top most priority. You have an understanding of industry trends in all areas of Information Security. You'll need to have some of the skills listed below. Bachelor’s degree in Computer Science / Information Technology Engineering with four or more years of work experience. Four or more years of relevant work experience in network / information security, risk and compliance management. Understanding of network fundamentals, switching, routing protocols, load balancers, web proxies, firewalls and software defined networking solutions. Understanding of security fundamentals Confidentiality, Integrity, Availability, access control, Authentication, Authorization, Auditing secure design concepts like Experience in design and implementation of network security solutions like firewalls, intrusion detection and prevention systems, VPN , web proxies etc using vendor products like Cisco, Juniper, Checkpoint, Palo Alto etc Experience in managing public cloud infrastructure like AWS, Azure, GCP etc Experience working in any one of the SIEM / SOAR solutions like Splunk SOAR, Cortex XSOAR by Palo Alto Networks, IBM Security QRadar SOAR, Swimlane etc Experience working on IT ticketing systems like JIRA, Service Now and ability to partner and collaborate with other teams in the organization Experience with hosting security awareness campaigns, gamification and bug bounty programs will be an added advantage Strong analytical problem solving, communication and interpersonal skills Passion to stay abreast with emerging technologies, network security trends, tools and techniques. Even better if you have one or more of the following: Industry relevant security certifications Security+, OSCP, CEH, CISSP, GIAC etc Cloud relevant certifications CCSP, CCSK Strong expertise in at least one operating system Window or Linux. Strong Scripting expertise in any one of Python, R, Perl, Javascript, Powershell, bash , VBScript etc #Ntwk Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Show more Show less

Posted 2 months ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

Remote

When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What You’ll Be Doing... You'll be part of the "Verizon Global Infrastructure (VGI), Network & Information Security” group working on securing the network and infra devices, harden the operating systems, configurations and build use cases to automate these tasks. Protect against cyber threats within the VGS Technology organization. You will work with a team of cybersecurity engineers with network & infrastructure background, threat intelligence analysts to align common technologies and practices that fortify our applications, systems, IT network and infrastructure. Some of your daily responsibilities would be the following. Leveraging industry proven tools to identify and reduce Cyber Risks. Implementing next generation network security architecture, create advanced policies and controls against future threats. Ensuring effectiveness and coverage of security, policies and controls of VGS Network & Infrastructure, prioritizing risk level. Ensuring Security posture of VGS Network & Infrastructure, e.g., access management, vulnerabilities remediation, etc. Developing awareness, training & compliance programs focused on Network & Infrastructure Cyber Security practices. Coordinating activities like network, penetration testing, incident response, data collection etc by partnering with the CISO teams. Assisting in Crisis Management, Ransomware Recovery and Business Continuity planning. Identifying, investigating and resolving global security breaches / incidents. Developing and maintaining network and infrastructure security reporting dashboards and scorecards used to measure our Cyber Practice. Identifying opportunities and use cases for automation to remediate vulnerabilities , implement controls, orchestrate between tools and automate security practices. What we’re looking for... You are passionate about network security and automation as a career. You are self-driven and motivated, with good communication and analytical skills. You’re a sought-after team member that thrives in a dynamic work environment. You will be working with multiple partners from the business groups, so networking and managing effective working relationships should be your top most priority. You have an understanding of industry trends in all areas of Information Security. You'll need to have some of the skills listed below. Bachelor’s degree in Computer Science / Information Technology Engineering with four or more years of work experience. Four or more years of relevant work experience in network / information security, risk and compliance management. Understanding of network fundamentals, switching, routing protocols, load balancers, web proxies, firewalls and software defined networking solutions. Understanding of security fundamentals Confidentiality, Integrity, Availability, access control, Authentication, Authorization, Auditing secure design concepts like Experience in design and implementation of network security solutions like firewalls, intrusion detection and prevention systems, VPN , web proxies etc using vendor products like Cisco, Juniper, Checkpoint, Palo Alto etc Experience in managing public cloud infrastructure like AWS, Azure, GCP etc Experience working in any one of the SIEM / SOAR solutions like Splunk SOAR, Cortex XSOAR by Palo Alto Networks, IBM Security QRadar SOAR, Swimlane etc Experience working on IT ticketing systems like JIRA, Service Now and ability to partner and collaborate with other teams in the organization Experience with hosting security awareness campaigns, gamification and bug bounty programs will be an added advantage Strong analytical problem solving, communication and interpersonal skills Passion to stay abreast with emerging technologies, network security trends, tools and techniques. Even better if you have one or more of the following: Industry relevant security certifications Security+, OSCP, CEH, CISSP, GIAC etc Cloud relevant certifications CCSP, CCSK Strong expertise in at least one operating system Window or Linux. Strong Scripting expertise in any one of Python, R, Perl, Javascript, Powershell, bash , VBScript etc #Ntwk Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Show more Show less

Posted 2 months ago

Apply

5.0 years

0 Lacs

India

Remote

About Us Our leading SaaS-based Global Growth Platform™ enables clients to expand into over 180 countries quickly and efficiently, without the complexities of establishing local entities. At G-P, we’re dedicated to breaking down barriers to global business and creating opportunities for everyone, everywhere. Our diverse, remote-first teams are essential to our success. We empower our Dream Team members with flexibility and resources, fostering an environment where innovation thrives and every contribution is valued and celebrated. The work you do here will positively impact lives around the world. We stand by our promise: Opportunity Made Possible. In addition to competitive compensation and benefits, we invite you to join us in expanding your skills and helping to reshape the future of work. At G-P, we assist organizations in building exceptional global teams in days, not months—streamlining the hiring, onboarding, and management process to unlock growth potential for all. About This Position The Role: As Information Security Analyst - SecOps , you will be responsible for securing and protecting our infrastructure, including managing and administering various security-related technologies, platforms, and tools. You'll also provide security expertise and guidance to the team on various security-related matters. This will support the implementation of the company security strategy, compliance and risk management plan. You must be willing to work within the EMEA business hours (between 12 pm IST - 9 pm IST, Monday-Friday). Key Responsibilities Investigate alerts, triage, deep dive, and come up with proper action items and remediation plans. Conduct investigation, containment, and other response activities with business stakeholders and groups. Compose incident analysis and finding reports for management, including gap identification and recommendations for improvement. Recommend or develop new detection logic and tune existing sensors/security controls. Participate in security incident response through in-depth, technical (log, forensic, malware, packet) analysis. Provide oversight of security alert detection and analysis capabilities across multiple technologies to ensure that security incidents are identified in a timely manner. Escalate and support potential security incidents in line with appropriate processes. Support communications of potential security incidents via multiple channels. Participate in the response of potential security incidents by identifying and communicating relevant supplementary information. Identify and analyze new and emerging threats to determine impacts to G-P and provide guidelines and recommendations pertaining to opportunities to strengthen G-P security posture. Assist with information security due diligence requests as needed. Provide security recommendations to other team members, management, and business stakeholders for solutions, enhancements to existing systems, and new security tools to help mitigate security vulnerabilities and automate repeatable tasks. Monitor, secure, and optimize AWS environments using tools like GuardDuty, CloudTrail, and Security Hub, ensuring compliance with security standards. Conduct security reviews, perform vulnerability assessments, recommend remediation actions, and manage security policies and access controls to monitor, protect, and govern data and applications across private and cloud environments. What We Are Looking For Education: Bachelor’s Degree in Information Technology, Computer Science, Business, or Engineering required, or equivalent experience. Experience: 5+ years of information security experience, preferably in the technology industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies and motives. Familiarity with computer network exploitation and network attack methodologies. Experience with cloud computing; AWS preferred Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+ Log analysis and security content development in SIEM solutions, e.g. Google SecOps, Splunk, IBM QRadar, LogRhythm, etc. Endpoint detection and response tools, e.g. CrowdStrike, SentinelOne, CyberArk EPM, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies like Secure Web Gateway, Private Access, IDS/IPS, firewalls, proxy servers, e.g. Netskope, Zscaler, Palo, Versa, etc. Log analysis and security content development in SIEM solutions, e.g. Google SecOps/Chronicle preferred, Splunk, IBM QRadar, LogRhythm, etc. Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Strong understanding of security as it relates to DevOps (specifically in CI/CD) Experience in SaaS, multi-tenant customer solutions Experience with AWS security tools and best practices, including IAM, VPC security, and encryption mechanisms. Strong understanding of security operations best practices, including email security, data loss prevention, vulnerability management, and the creation and enforcement of policies and rule-based access controls. Join G-P and be part of building a global security framework that enables opportunities across the world! We will consider for employment all qualified applicants who meet the inherent requirements for the position. Please note that background checks are required, and this may include criminal record checks. G-P. Global Made Possible. G-P is a proud Equal Opportunity Employer, and we are committed to building and maintaining a diverse, equitable and inclusive culture that celebrates authenticity. We prohibit discrimination and harassment against employees or applicants on the basis of race, color, creed, religion, national origin, ancestry, citizenship status, age, sex or gender (including pregnancy, childbirth, and pregnancy-related conditions), gender identity or expression (including transgender status), sexual orientation, marital status, military service and veteran status, physical or mental disability, genetic information, or any other legally protected status. G-P also is committed to providing reasonable accommodations to individuals with disabilities. If you need an accommodation due to a disability during the interview process, please contact us at careers@g-p.com. Show more Show less

Posted 2 months ago

Apply

0 years

0 Lacs

Hyderābād

Remote

Hyderabad, India Chennai, India Job ID: R-1070016 Apply prior to the end date: June 21st, 2025 When you join Verizon You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the #VTeamLife. What you’ll be doing... You'll be part of the "Verizon Global Infrastructure (VGI), Network & Information Security” group working on securing the network and infra devices, harden the operating systems, configurations and build use cases to automate these tasks. Protect against cyber threats within the VGS Technology organization. You will work with a team of cybersecurity engineers with network & infrastructure background, threat intelligence analysts to align common technologies and practices that fortify our applications, systems, IT network and infrastructure. Some of your daily responsibilities would be the following. Leveraging industry proven tools to identify and reduce Cyber Risks. Implementing next generation network security architecture, create advanced policies and controls against future threats. Ensuring effectiveness and coverage of security, policies and controls of VGS Network & Infrastructure, prioritizing risk level. Ensuring Security posture of VGS Network & Infrastructure, e.g., access management, vulnerabilities remediation, etc. Developing awareness, training & compliance programs focused on Network & Infrastructure Cyber Security practices. Coordinating activities like network, penetration testing, incident response, data collection etc by partnering with the CISO teams. Assisting in Crisis Management, Ransomware Recovery and Business Continuity planning. Identifying, investigating and resolving global security breaches / incidents. Developing and maintaining network and infrastructure security reporting dashboards and scorecards used to measure our Cyber Practice. Identifying opportunities and use cases for automation to remediate vulnerabilities , implement controls, orchestrate between tools and automate security practices. What we’re looking for... You are passionate about network security and automation as a career. You are self-driven and motivated, with good communication and analytical skills. You’re a sought-after team member that thrives in a dynamic work environment. You will be working with multiple partners from the business groups, so networking and managing effective working relationships should be your top most priority. You have an understanding of industry trends in all areas of Information Security. You'll need to have some of the skills listed below. Bachelor’s degree in Computer Science / Information Technology Engineering with four or more years of work experience. Four or more years of relevant work experience in network / information security, risk and compliance management. Understanding of network fundamentals, switching, routing protocols, load balancers, web proxies, firewalls and software defined networking solutions. Understanding of security fundamentals Confidentiality, Integrity, Availability, access control, Authentication, Authorization, Auditing secure design concepts like Experience in design and implementation of network security solutions like firewalls, intrusion detection and prevention systems, VPN , web proxies etc using vendor products like Cisco, Juniper, Checkpoint, Palo Alto etc Experience in managing public cloud infrastructure like AWS, Azure, GCP etc Experience working in any one of the SIEM / SOAR solutions like Splunk SOAR, Cortex XSOAR by Palo Alto Networks, IBM Security QRadar SOAR, Swimlane etc Experience working on IT ticketing systems like JIRA, Service Now and ability to partner and collaborate with other teams in the organization Experience with hosting security awareness campaigns, gamification and bug bounty programs will be an added advantage Strong analytical problem solving, communication and interpersonal skills Passion to stay abreast with emerging technologies, network security trends, tools and techniques. Even better if you have one or more of the following: Industry relevant security certifications Security+, OSCP, CEH, CISSP, GIAC etc Cloud relevant certifications CCSP, CCSK Strong expertise in at least one operating system Window or Linux. Strong Scripting expertise in any one of Python, R, Perl, Javascript, Powershell, bash , VBScript etc #Ntwk Where you’ll be working In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager. Scheduled Weekly Hours 40 Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to race, gender, disability or any other legally protected characteristics. Apply Now Save Saved Open sharing options Share Related Jobs Secur Cslt IV-Ntwk & Info Sec Save Hyderabad, India, +1 other location Technology Engr III-Security Engrg Save Chennai, India, +1 other location Technology Engr IV-Security Engrg Save Chennai, India, +1 other location Technology Shaping the future. Connect with the best and brightest to help innovate and operate some of the world’s largest platforms and networks.

Posted 2 months ago

Apply

8.0 years

4 - 4 Lacs

Bengaluru

On-site

Join our Team About this opportunity: We are now looking for a Senior Security Engineer professional for our Managed Security team. This job role has accountability for researching, designing, engineering, implementing, and supporting security solutions in partnership with the respective stakeholders within Ericsson and / or customer organization and / or 3rd Party Providers. The professional will work alongside a highly skilled, diverse team, making sure that the information assets, that we are responsible to protect, are secured. What you will do: Design, implement, manage, monitor, and troubleshoot cybersecurity defenses, including configuration management, network security, systems security, and monitoring systems / tools. Participate in planning and audit scope development as well as project execution as a critical team member on complex technology related assessments. Play an active role in the design and execution of infrastructure initiatives to ensure an evolving adherence to industry best practices for information security. Lead the execution of the assessment of specific technical areas of a project, supervising other team members and providing coaching where needed. Perform Security Incident Management, including but not limited to: supporting SIEM tools, integrating logs into the tool, creating and modifying rules, investigating and resolving alerts, automating tasks. Research new and emerging threats to gain insight into the evolving threat landscape, and share knowledge with the team. Promote new ideas and new ways of executing projects and internal infrastructure enhancements. Innovate and automate repetitive activities and corrective actions, including broader automation initiatives. Analyzes and recommends security controls and procedures in business processes related to use of information systems and assets, and monitors for compliance Responds to information security incidents, including investigation of countermeasures to and recovery from computer-based attacks, unauthorized access, and policy breaches; interacts and coordinates with third-party incident responders, including law enforcement The skills you bring: Strong knowledge of information security Strong knowledge of SIEM tools (such as McAfee ESM, QRadar, ArcSight, Splunk, etc.), scanning tools (Nessus, Qualys, IBM AppScan, etc.) and PAM tools (BeyondTrust, CyberArk, etc.) Strong knowledge of both Linux-based and MS Windows-based system platforms with a strong technical understanding and aptitude for analytical problem-solving Strong understanding of enterprise, network, system and application level security issues Strong understanding of enterprise computing environments, distributed applications, and a strong understanding of TCP/IP networks along with available security controls (technical & process controls) for respective layers Good understanding of the system hardening processes, tools, guidelines and benchmarks Fundamental understanding of encryption technologies Participate in the out-of-hours on call rotation, providing technical support to the business for incidents Strong knowledge sharing and collaboration skills Deliver results and meet customer expectations Excellent communication skills; English is a must Key Qualifications: Education: BE/ B.Tech (Telecommunication/ Computer Science) Minimum years of relevant experience: 8 to 15 years experience with at least 8 years in IT and 7 years in Security ITIL certification, CCSP, OSCP, Security +, CISSP or similar will be an advantage Basic knowledge of telecommunications networks will be an added advantage Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Bangalore Req ID: 768176

Posted 2 months ago

Apply

0 years

0 Lacs

Kota, Rajasthan, India

On-site

Job description Job Description: SOC Trainer – ASD Academy Position: SOC Trainer (Security Operations Center Trainer) Course Duration: 15 Days Class Schedule: Monday to Friday (1.5 Hours per Day) Course Level: Beginner to Advanced Payout: ₹600 per Class Role Overview: ASD Academy is seeking an experienced SOC Trainer to deliver structured training sessions on Security Operations Center (SOC) practices. The trainer will be responsible for guiding students from beginner to advanced levels, ensuring they gain a comprehensive understanding of SOC principles, tools, and real-world applications. Key Responsibilities: ✔ Conduct engaging and interactive online/offline SOC training sessions (1.5 hours per day, Monday to Friday). ✔ Cover essential SOC topics, including SIEM, log analysis, threat detection, incident response, and security monitoring. ✔ Develop practical exercises, case studies, and hands-on labs to enhance student learning. ✔ Provide real-world insights and best practices to help students gain industry-ready skills. ✔ Assess student performance through assignments, quizzes, and live troubleshooting scenarios. ✔ Address student queries and mentor them throughout the course. Requirements: ✔ Strong knowledge of SOC operations, cybersecurity frameworks, and threat intelligence. ✔ Hands-on experience with SIEM tools (Splunk, QRadar, ArcSight, etc.) and security monitoring technologies. ✔ Prior experience in training, mentoring, or teaching cybersecurity concepts is a plus. ✔ Excellent communication skills and the ability to simplify complex cybersecurity concepts. ✔ Passion for cybersecurity education and a commitment to student success. Why Join Us? 🚀 Opportunity to mentor aspiring cybersecurity professionals. 🚀 Flexible training structure with well-defined curriculum support. 🚀 Work with an industry-leading cybersecurity training academy. If you’re passionate about cybersecurity education and have expertise in SOC operations, we’d love to have you on board! 📩 Apply Now: Send your CV and relevant experience details to hr@asdcybersecurity.in. Show more Show less

Posted 2 months ago

Apply

2.0 - 5.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Overview ormation Security Analyst: Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Maintains hardware, software and network firewalls and encryption protocols. Administers security policies to control physical and virtual access to systems. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Job Code Tip: May be internal or external, client-focused, working in conjunction with Professional Services and outsourcing functions. May include company-wide, web-enabled solutions. Individuals whose primary focus is on developing, testing, debugging and deploying code or processing routines that support security protocols for an established system or systems should be matched to the appropriate Programmer or Programmer/Analyst family in the Information Technology/MIS functional area. Responsibilities Should have process knowledge and technical knowledge on any of the SIEM tools ( like Qradar, LogRhythm, AlienVault, Splunk…etc). L2/L3 level is added advantage. Should have process knowledge and technical knowledge in AV tools like Symantec, McAfee, Trend Micro…etc. L2/L3 level is added advantage. Should have knowledge in managing Vulnerability tools and various remediation efforts. Review security logs generated by applications, devices and other systems, taking action or escalating to appropriate teams as needed. Enforce incident response service level agreement. Work with the global IT Security team to analyze, test and recommend tools to strengthen the security posture of the company Create and maintain operational reports allowing IT management team to understand the current and historical landscape of the IT security risks Vulnerability management assessment and remediation Participate in daily and ad-hoc meetings related to cyber security, controls and compliance, processes and documentation related tasks Research the latest information technology (IT) security trends Help plan and carry out an organization’s way of handling security Develop security standards and best practices for the organization Recommend security enhancements to management or senior IT staff Document security breaches and assess the damage they cause. Performs other duties as assigned Qualifications B. Tech, B.E or M.C.A 2-5 years’ Experience working in a Security Operations Center 2 years minimum in the computer industry Knowledge working with complex Windows environments Knowledgeable in various security frameworks such as NIST 800-53 / NIST 800-171 / ISO27001 Knowledge in design and administration of security tools Good written and verbal communication skills Show more Show less

Posted 2 months ago

Apply

10.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Job Title: Senior Engineer – Cybersecurity Location: Onsite – Gurugram, Haryana, India Company: Fluidech IT Services Private Limited Employment Type: Full-Time Company Overview Fluidech , an Esconet group company and a deemed public company , is a technology consulting and managed services firm specialising in cybersecurity . Founded in 2014 and headquartered in Gurugram—and today with a client base spanning over 100 organizations worldwide—Fluidech designs IT solutions aligned with business objectives, fostering trusted relationships and delivering measurable performance improvements. Established as a born-in-the-cloud company, Fluidech has evolved into a trusted technology partner that helps businesses build (Cloud & Infrastructure), automate (DevOps), and secure (Cyber Security services). Our solutions span diverse industry verticals, aligned with each client’s business goals. In addition to holding ISO 9001 and ISO 27001 certifications, and an award-winning cybersecurity team , the company has a strong value proposition in its GRC services across frameworks including but not limited to NCIIPC's CAF , SEBI's CSCRF , and others. Position Overview We are seeking a highly skilled and knowledgeable Senior Engineer – Cybersecurity , with relevant hands-on experience , to join our team onsite in Gurugram . This role requires a technically strong individual capable of designing, deploying, and optimizing cybersecurity solutions across different domains including infrastructure security, endpoint protection, cloud security, threat detection, and GRC support. The ideal candidate should possess deep expertise across cybersecurity domains, have a solution-oriented mindset, and hold relevant industry certifications. Key Responsibilities Design and implement cybersecurity solutions tailored to client environments and business needs. Perform threat modeling, risk assessment, and security architecture reviews across on-prem, cloud, and hybrid environments. Deploy and configure tools for network security, SIEM, EDR/XDR, DLP, IAM, firewalls, and other security technologies. Collaborate with internal teams and clients to create robust security strategies and roadmaps. Troubleshoot and resolve complex security issues across varied infrastructure stacks. Stay up to date on threat intelligence, vulnerabilities, and security trends to inform solution design. Mentor junior engineers and contribute to knowledge-sharing across the team. Qualifications & Skills Bachelor’s degree in Information Security, Computer Science, or related field. 10+ years of hands-on experience in cybersecurity engineering, solution design, or security architecture. Proficiency in tools and platforms such as: SIEM (e.g., Splunk, QRadar) EDR/XDR (e.g., CrowdStrike, SentinelOne) Firewalls, IDS/IPS, VPNs Cloud security (AWS, Azure, GCP native controls) Identity and Access Management (IAM, SSO, MFA) Vulnerability and compliance scanning tools Certifications (any of the following): CISSP, CISM, CEH, OSCP, CISA, AZ-500, or similar Have some exposure to support security audits and compliance assessments (e.g., ISO 27001, NCIIPC CAF, SEBI CSCRF). Excellent analytical, troubleshooting, and problem-solving skills. Strong documentation and client communication skills. Why Join Fluidech? Join a growing, award-winning company recognized for excellence in cybersecurity. Work alongside a passionate, innovative team focused on cutting-edge technologies. Lead and influence high-impact cybersecurity projects across diverse sectors. Be part of an organization that values transparency, trust, and continuous growth. Benefits Competitive compensation with performance-based incentives Health insurance and wellness support Learning & development opportunities, including certification support Cross-functional exposure and accelerated career growth Inclusive, engaging workplace with regular team-building activities Show more Show less

Posted 2 months ago

Apply

10.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Unilever Bengaluru, Karnataka, India Posted on Jun 5, 2025 Apply now Job Title: Cyber Security Forensics SME Location: UniOps Bangalore About Unilever Be part of the world’s most successful, purpose-led business. Work with brands that are well-loved around the world, that improve the lives of our consumers and the communities around us. We promote innovation, big and small, to make our business win and grow; and we believe in business as a force for good. Unleash your curiosity, challenge ideas and disrupt processes; use your energy to make this happen. Our brilliant business leaders and colleagues provide mentorship and inspiration, so you can be at your best. Every day, nine out of ten Indian households use our products to feel good, look good and get more out of life – giving us a unique opportunity to build a brighter future. Every individual here can bring their purpose to life through their work. Join us and you’ll be surrounded by inspiring leaders and supportive peers. Among them, you’ll channel your purpose, bring fresh ideas to the table, and simply be you. As you work to make a real impact on the business and the world, we’ll work to help you become a better you. About Uniops Unilever Operations (UniOps) is the global technology and operations engine of Unilever offering business services, technology, and enterprise solutions. UniOps serves over 190 locations and through a network of specialized service lines and partners delivers insights and innovations, user experiences and end-to-end seamless delivery making Unilever Purpose Led and Future Fit. Responsibilities The person in this role is expected to generate leads for the Incident Response team (based on forensic evidence) for timely containment and response actions. It is expected that the person leads all in-house investigations and also coordinates with external investigators/specialists in major incidents. Conducts forensics analysis of cyber security incidents to deduce RCA and understand the relevant threat (for example malware behaviour and TTP through static and dynamic analysis) and potential impact. Utilizes latest and advanced knowledge of SOC Technologies and Forensic technologies (such as Memory Forensics, Network Forensics, Filesystem Forensics, Malware analysis and Reverse Engineering, Device Forensics - HDD/SSD/Smart Phone) across various platforms (end-points, servers, AWS/Azure/GCP cloud) and Operating Systems (Windows, Linux, UNIX, Mac, AIX, etc.) for supporting Forensics investigations. Participates in scoping discussions with stakeholders for forensics capability projects and investigations to understand the requirement, identifies and communicates feasibility and approach, undertake and follow-up actions till timely delivery and successful conclusion. Ensures that all investigations are appropriately conducted and documented as per cardinal forensic principles and evidence handling (collection, analysis, sharing and preservation) is compliant to the process. Effectively and timely triage and respond to incident investigation. Key Requirements MANDATORY Strong ethics, communication and team skills Hands-on experience with Enterprise SIEM (like Splunk, QRadar, Sentinel, etc) and EDR tools (like Microsoft Defender, CrowdStrike Falcon, etc) Hands-on experience with Enterprise Forensics tools (like EnCase, FTK, AXIOM, etc) Hands-on experience in memory forensics, network forensics and malware analysis Minimum 10 years of enterprise experience in a global SOC (Security Operations Centre) / DFIR (Digital Forensics or Incident Response) domain. Working knowledge of at least one of the scripting tools: Python/ Perl/ PowerShell EnCase Certified Examiner (EnCE) GIAC Certification GCFE/ GCFA/ GREM/ GNFA At HUL, we believe that every individual irrespective of their race, colour, religion, gender, sexual orientation, gender identity or expression, age, nationality, caste, disability or marital status can bring their purpose to life. So apply to us, to unleash your curiosity, challenge ideas and disrupt processes; use your energy to make the world a better place. As you work to make a real impact on the business and the world, we’ll work to help you become a better you! Apply now See more open positions at Unilever Show more Show less

Posted 2 months ago

Apply

4.0 - 8.0 years

9 - 13 Lacs

Hyderabad

Work from Office

Information Protection Senior Advisor - HIH - Evernorth ABOUT EVERNORTH: Evernorthexists to elevate health for all, because we believe health is the starting point for human potential and progress. As champions for affordable, predictable and simple health care,we solve the problems others don’t, won’t or can’t. Position Overview In this role, you will provide hands-on software engineering and system architecture leadership for one of our Behavioral Health and Care Solutions Delivery teams. The focus of the work is to continue to enhance our market winning capabilities in the Behavioral Health and Care Solutions space. The Evernorth Technology strategy is fully aligned with our business strategy, resulting in an opportunity for you to influence in various directions – this includes technology\business direction but also recruiting and mentoring employees and influencing selection of and relationships with vendor resources to ultimately build and contribute within a world class Delivery Vertical. This is a hands-on position with visibility to the highest levels of Evernorth management who are motivated to see the successful results of our efforts. The solution focuses on enabling this change using the latest technologies and development techniques Responsibilities Provide expert architecture, engineering, and project support for key Okta CIAM initiatives. Regularly meet with application development teams throughout the enterprise to understand their specific Okta integration requirements and evaluate feasibility. Interface withvarious stakeholders to scope and planengineeringefforts to ensure project and feature launch success. Contribute to developing and executing a multi-year CIAM strategy and roadmap for enterprise stakeholders. Drive proof of concepts to determine solution approach and scope. Assist with Okta configuration and test data setup for applications. Assist application teams with issue resolution. Assist with the promotion of the application configuration to production Okta tenants. Participate in vendor and tool selection in alignment with solution architecture. Maintain a broad and deep technical understanding of the Okta product line and the underlying technologies and protocols. Participate in compliance and security reviews as necessary, including working closely with internal teams to build security, reliability, and scalability practices into the OKTA platform. Educate, evangelize, and share best practices, tool updates, and policy updates. Report key performance metrics to stakeholders. Qualifications Required Skills: Experience with technical large-scale Okta CIAM deployments in an enterprise setting. Working knowledge of Auth0/Okta in a CIAM implementation preferred. Previous experience in designing and architecting CIAM-enabling capabilities that delivered business objectives. Working experience implementing applications with modern authentication and authorization protocols (OAuth, OIDC, SAML). Experience with modern DevOps processes and an in-depth understanding of software engineering principles and practices. Advanced problem-solving skills and the ability to work collaboratively to resolve complex issues with innovative solutions. Experience and expert knowledge of Identity as a Service and Federation technologies (Okta, ISAM, TFIM, etc.). Experience with interpersonal, team building, communication, leadership, negotiation, and motivational skills. Demonstrated skill at creating technical documentation for complex processes and applications. Experience with Splunk, ServiceNow, QRADAR, JIRA Experience building web applications, incorporating both front and backend lang uages/frameworks is a plus. Experience with leading architectural efforts for cloud services. Self-motivated, adaptable, and able to prioritize and motivate others. Required Experience & Education 13-16 years of experience Bachelor’s degree preferred. About Evernorth Health Services Evernorth Health Services, a division of The Cigna Group, creates pharmacy, care and benefit solutions to improve health and increase vitality. We relentlessly innovate to make the prediction, prevention and treatment of illness and disease more accessible to millions of people. Join us in driving growth and improving lives.

Posted 2 months ago

Apply

7.0 - 12.0 years

5 - 9 Lacs

Mumbai

Work from Office

Key Responsibilities: Leadership and Team Management: Lead and manage the Internal Red Team and SOC Operations teams, ensuring effective collaboration and alignment with organizational security objectives. Provide mentorship and guidance to team members, fostering a culture of continuous learning and professional development. Conduct regular performance reviews and provide ongoing feedback and coaching. Red Team Operations: Plan, execute, and oversee red team exercises to identify and exploit vulnerabilities in systems, networks, and applications. Develop and maintain red team methodologies, tools, and documentation. Work closely with other security teams to remediate identified vulnerabilities and improve security defenses. SOC Operations Management: Oversee the daily operations of the SOC, ensuring efficient and effective monitoring, detection, and response to security incidents. Develop and maintain SOC processes, procedures, and documentation to ensure consistent and high-quality operations. Ensure the SOC is staffed 24/7, including managing schedules, shifts, and on-call rotations. Incident Response and Management: Coordinate and lead the response to major security incidents, including investigation, containment, eradication, and recovery. Develop and maintain an incident response plan and ensure the team is well-trained and prepared to handle incidents. Conduct post-incident reviews and develop lessons learned to improve future response efforts. Threat Intelligence and Analysis: Oversee the collection, analysis, and dissemination of threat intelligence to inform security operations and red team activities. Ensure the SOC team utilizes advanced threat detection tools and techniques to identify and mitigate threats. Collaborate with other teams to enhance threat intelligence capabilities and integrate with existing processes. Security Monitoring and Reporting: Ensure continuous monitoring of network traffic, system logs, and security alerts using SIEM (Security Information and Event Management) solutions. Develop and maintain metrics and dashboards to report on SOC and red team performance and security posture. Present regular reports and briefings to senior management on the state of security operations and key incidents. Policy and Compliance: Develop and enforce security policies, procedures, and standards in alignment with industry best practices and regulatory requirements. Ensure compliance with relevant regulations, such as GDPR, and PCI-DSS. Participate in security audits and assessments, and coordinate with external auditors as needed. Qualifications: Bachelors degree in Computer Science, Information Security, or a related field. Equivalent work experience may be considered. Minimum of 7 years of experience in cybersecurity, with at least 3 years in a management or leadership role overseeing red team and/or SOC operations. Strong understanding of offensive security practices, including penetration testing and red teaming methodologies. Experience with SOC operations, including incident response, threat detection, and SIEM tools such as Splunk, ArcSight, or QRadar. Knowledge of common attack vectors and techniques, such as phishing, malware, and ransomware. Familiarity with regulatory requirements and frameworks, such as NIST, ISO 27001, and GDPR. Relevant certifications, such as CISSP, CISM, OSCP, CEH, or GIAC, are highly desirable. Excellent leadership, communication, and interpersonal skills. Ability to work effectively under pressure and manage multiple priorities.

Posted 2 months ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Chennai

Work from Office

Job Information Job Opening ID ZR_1902_JOB Date Opened 29/04/2023 Industry Technology Job Type Work Experience 5-8 years Job Title SIEM - Splunk Content Developer City Chennai Province Tamil Nadu Country India Postal Code 600089 Number of Positions 5 3+ years of experience working in the field of Content development and experience in delivering and/or building content on any of the SIEM tools like Splunk/Arc sight /QRadar/Nitro ESM/etc. Deep understanding of MITRE ATT&CK Framework. Experience in SOC Incident analysis with an exposure to information security technologies such as Firewall, VPN, Intrusion detection tools, Malware tools, Authentication tools, endpoint technologies, EDR and cloud security tools. Good understanding of networking concepts. Experience interpreting, searching, and manipulating data within enterprise logging solutions (e.g. SIEM, IT Service Management (ITSM) tools, workflow, and automation) In depth knowledge of security data logs and an ability to create new content on advanced security threats on a need basis as per Threat Intelligence. Ability to identify gaps in the existing security controls. Good experience in writing queries/rules/use cases for security analytics (ELK, Splunk or any other SIEM platform) and deployment of content. Experience on EDR tools like Crowd strike and good understanding on TTPs like Process Injection. Excellent communication, listening & facilitation skills Ability to demonstrate an investigative mindset. Excellent problem-solving skills. Understanding of MITRE ATT&CK framework. Location: Pan India check(event) ; career-website-detail-template-2 => apply(record.id,meta)" mousedown="lyte-button => check(event)" final-style="background-color:#2B39C2;border-color:#2B39C2;color:white;" final-class="lyte-button lyteBackgroundColorBtn lyteSuccess" lyte-rendered=""> I'm interested

Posted 2 months ago

Apply

8.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Join our Team About this opportunity: We are now looking for a Senior Security Engineer professional for our Managed Security team. This job role has accountability for researching, designing, engineering, implementing, and supporting security solutions in partnership with the respective stakeholders within Ericsson and / or customer organization and / or 3rd Party Providers. The professional will work alongside a highly skilled, diverse team, making sure that the information assets, that we are responsible to protect, are secured. What you will do: Design, implement, manage, monitor, and troubleshoot cybersecurity defenses, including configuration management, network security, systems security, and monitoring systems / tools. Participate in planning and audit scope development as well as project execution as a critical team member on complex technology related assessments. Play an active role in the design and execution of infrastructure initiatives to ensure an evolving adherence to industry best practices for information security. Lead the execution of the assessment of specific technical areas of a project, supervising other team members and providing coaching where needed. Perform Security Incident Management, including but not limited to: supporting SIEM tools, integrating logs into the tool, creating and modifying rules, investigating and resolving alerts, automating tasks. Research new and emerging threats to gain insight into the evolving threat landscape, and share knowledge with the team. Promote new ideas and new ways of executing projects and internal infrastructure enhancements. Innovate and automate repetitive activities and corrective actions, including broader automation initiatives. Analyzes and recommends security controls and procedures in business processes related to use of information systems and assets, and monitors for compliance Responds to information security incidents, including investigation of countermeasures to and recovery from computer-based attacks, unauthorized access, and policy breaches; interacts and coordinates with third-party incident responders, including law enforcement The skills you bring: Strong knowledge of information security Strong knowledge of SIEM tools (such as McAfee ESM, QRadar, ArcSight, Splunk, etc.), scanning tools (Nessus, Qualys, IBM AppScan, etc.) and PAM tools (BeyondTrust, CyberArk, etc.) Strong knowledge of both Linux-based and MS Windows-based system platforms with a strong technical understanding and aptitude for analytical problem-solving Strong understanding of enterprise, network, system and application level security issues Strong understanding of enterprise computing environments, distributed applications, and a strong understanding of TCP/IP networks along with available security controls (technical & process controls) for respective layers Good understanding of the system hardening processes, tools, guidelines and benchmarks Fundamental understanding of encryption technologies Participate in the out-of-hours on call rotation, providing technical support to the business for incidents Strong knowledge sharing and collaboration skills Deliver results and meet customer expectations Excellent communication skills; English is a must Key Qualifications: Education: BE/ B.Tech (Telecommunication/ Computer Science) Minimum years of relevant experience: 8 to 15 years experience with at least 8 years in IT and 7 years in Security ITIL certification, CCSP, OSCP, Security +, CISSP or similar will be an advantage Basic knowledge of telecommunications networks will be an added advantage Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Noida Req ID: 768174 Show more Show less

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies