Jobs
Interviews

891 Qradar Jobs - Page 30

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Lead the frontline of cyber defense. Join Hitachi Cyber as a Team Lead – Security Operations Center (SOC) and take charge of protecting global organizations from today’s most advanced threats. As a global leader in cybersecurity, Hitachi Cyber empowers businesses to stay ahead of evolving risks. Based in Pune-India, you’ll lead a team of skilled analysts, work with cutting-edge tools, and play a critical role in safeguarding digital infrastructures across industries. Your Mission: As SOC Team Lead, you’ll oversee day-to-day operations, mentor analysts, and ensure rapid, effective incident response. You’ll be the bridge between tactical execution and strategic security leadership. Key Responsibilities: Lead and manage a team of SOC analysts across shifts. Oversee real-time monitoring, triage, and incident response activities. Ensure adherence to SLAs, escalation protocols, and documentation standards. Collaborate with threat intelligence, engineering, and client teams to improve detection and response. Drive continuous improvement in SOC processes, playbooks, and automation. Provide coaching, performance reviews, and training to develop team capabilities. What We’re Looking For: 5+ years of experience in cybersecurity, with at least 2 years in a SOC leadership role. Strong knowledge of SIEM tools (e.g., Splunk, Sentinel, QRadar), EDR, and incident response frameworks. Experience managing 24/7 operations and working with global clients. Excellent leadership and communication skills in English . Relevant certifications (e.g., GCIA, GCIH, CISSP, or equivalent) are a plus. Why Join Hitachi Cyber? Work with global clients and cutting-edge technologies. Be part of a collaborative, high-performance security culture. Accelerate your career in a fast-growing, mission-driven company. Ready to lead the charge? Apply now and help shape the future of cybersecurity. Show more Show less

Posted 2 months ago

Apply

2.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Description and Requirements "At BMC trust is not just a word - it's a way of life!" We are an award-winning, equal opportunity, culturally diverse, fun place to be. Giving back to the community drives us to be better every single day. Our work environment allows you to balance your priorities, because we know you will bring your best every day. We will champion your wins and shout them from the rooftops. Your peers will inspire, drive, support you, and make you laugh out loud! We help our customers free up time and space to become an Autonomous Digital Enterprise that conquers the opportunities ahead - and are relentless in the pursuit of innovation! Our IS&T (Information Services and Technology) department provides all the required technology and operational support services to run our business here in BMC! We have over 200 servers on premises to support production, disaster recovery, databases, applications and over 1000 servers in Lab environment. IS&T is transformational not only for BMC but also for the customer experience, because we give a 360 degrees view to the customer about the products they should know, opportunities in the pipeline, and any service issues outstanding with the customer. We use cutting-edge technologies to manage BMC's infrastructure and showcase it to the customers – program is called BMC on BMC! We are seeking a proactive and technically capable Cyber Threat Management Engineer to join our cybersecurity threat management team. This early-career role is ideal for individuals with foundational experience in cybersecurity who are ready to grow their technical skills and contribute to BMC’s threat detection and response capabilities. You will play an integral part in identifying, analyzing, and mitigating cyber threats across BMC’s global environment. Here is how, through this exciting role, YOU will contribute to BMC's and your own success: Monitor and analyze data from security systems including open source and enterprise solutions. Effectively communicate identified threats and track remediations until completion. Participate in the investigation and technical analysis of security incidents and provide remediation guidance. Integrate threat intelligence feeds and use frameworks like MITRE ATT&CK to assess and defend against current adversary tactics. Contribute to automation initiatives to streamline threat detection, alerting, and response workflows. Support threat hunting and red team exercises. Document findings, techniques, and outcomes in knowledge bases and reports. To ensure you’re set up for success, you will bring the following skillset & experience: Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field—or equivalent hands-on experience. Foundational experience (e.g., 1–2 years) in cybersecurity operations, threat analysis, or incident response. Proficiency with at least one SIEM platform (e.g., Splunk, QRadar, Sentinel). Proficiency with enterprise solutions providing dark web monitoring, attack surface management, threat intelligence, and risk rating. Understanding of network protocols, operating systems, and cybersecurity fundamentals. Strong scripting or automation skills (e.g., Python, PowerShell, Bash) Excellent communication and documentation abilities. Whilst these are nice to have, our team can help you develop in the following skills: Familiarity with threat intelligence tools and frameworks (e.g., MISP, STIX/TAXII). Knowledge of cloud security practices (AWS, Azure, or GCP). Relevant certifications such as CompTIA Security+, CySA+, SC-200, or GIAC (GCIH, GCIA, GCTI). Curiosity for cybersecurity and continuous learning. Our commitment to you! BMC’s culture is built around its people. We have 6000+ brilliant minds working together across the globe. You won’t be known just by your employee number, but for your true authentic self. BMC lets you be YOU! If after reading the above, You’re unsure if you meet the qualifications of this role but are deeply excited about BMC and this team, we still encourage you to apply! We want to attract talents from diverse backgrounds and experience to ensure we face the world together with the best ideas! BMC is committed to equal opportunity employment regardless of race, age, sex, creed, color, religion, citizenship status, sexual orientation, gender, gender expression, gender identity, national origin, disability, marital status, pregnancy, disabled veteran or status as a protected veteran. If you need a reasonable accommodation for any part of the application and hiring process, visit the accommodation request page. < Back to search results BMC Software maintains a strict policy of not requesting any form of payment in exchange for employment opportunities, upholding a fair and ethical hiring process. At BMC we believe in pay transparency and have set the midpoint of the salary band for this role at 1,725,800 INR. Actual salaries depend on a wide range of factors that are considered in making compensation decisions, including but not limited to skill sets; experience and training, licensure, and certifications; and other business and organizational needs. The salary listed is just one component of BMC's employee compensation package. Other rewards may include a variable plan and country specific benefits. We are committed to ensuring that our employees are paid fairly and equitably, and that we are transparent about our compensation practices. ( Returnship@BMC ) Had a break in your career? No worries. This role is eligible for candidates who have taken a break in their career and want to re-enter the workforce. If your expertise matches the above job, visit to https://bmcrecruit.avature.net/returnship know more and how to apply. Show more Show less

Posted 2 months ago

Apply

4.0 - 8.0 years

3 - 7 Lacs

Mumbai

Work from Office

Daily assessment of vulnerabilities identified by infrastructure scan Evaluate rate and perform risk assessments on assets Prioritizing vulnerabilities discovered along with remediation timeline s Work with associated teams to explain vulnerabilities and remediation steps as required Maintain knowledge of the threat landscape Create reports and provide analysis on vulnerabilities for technical teams and leadership Skill Required Knowledge of application network and operating system security Experience with vulnerability and patch assessment Linux and windows experience Good understanding of Windows and Linux patching Knowledge of vulnerability scoring systems CVSS CMSS Experience on vulnerability scanning tools Excellent writing and presentation skills are required in order to communicate findings and status Primary Skills VMDR Policy Compliance Qualys Tenable Nessus Rapid7 Secondary Skills Excellent writing and presentation skills are required in order to communicate findings and statusCleary communicate priorities and escalation points procedures to other team members Detail oriented organized methodical follow up skills with an analytical thought process Experience performing dynamic scans static scans and penetration testing Development experienceProject management experience Innovative and efficiency focused Track trends and configure systems as required to reduce false positives from true events

Posted 2 months ago

Apply

3.0 - 6.0 years

0 Lacs

Kanayannur, Kerala, India

Remote

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Senior (CTM – Threat Detection & Response) KEY Capabilities: Experience in working with Splunk Enterprise, Splunk Enterprise Security & Splunk UEBA Minimum of Splunk Power User Certification Good knowledge in programming or Scripting languages such as Python (preferred), JavaScript (preferred), Bash, PowerShell, Bash, etc. Perform remote and on-site gap assessment of the SIEM solution. Define evaluation criteria & approach based on the Client requirement & scope factoring industry best practices & regulations Conduct interview with stakeholders, review documents (SOPs, Architecture diagrams etc.) Evaluate SIEM based on the defined criteria and prepare audit reports Good experience in providing consulting to customers during the testing, evaluation, pilot, production and training phases to ensure a successful deployment. Understand customer requirements and recommend best practices for SIEM solutions. Offer consultative advice in security principles and best practices related to SIEM operations Design and document a SIEM solution to meet the customer needs Experience in onboarding data into Splunk from various sources including unsupported (in-house built) by creating custom parsers Verification of data of log sources in the SIEM, following the Common Information Model (CIM) Experience in parsing and masking of data prior to ingestion in SIEM Provide support for the data collection, processing, analysis and operational reporting systems including planning, installation, configuration, testing, troubleshooting and problem resolution Assist clients to fully optimize the SIEM system capabilities as well as the audit and logging features of the event log sources Assist client with technical guidance to configure end log sources (in-scope) to be integrated to the SIEM Experience in handling big data integration via Splunk Expertise in SIEM content development which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Hands-on experience in development and customization of Splunk Apps & Add-Ons Builds advanced visualizations (Interactive Drilldown, Glass tables etc.) Build and integrate contextual data into notable events Experience in creating use cases under Cyber kill chain and MITRE attack framework Capability in developing advanced dashboards (with CSS, JavaScript, HTML, XML) and reports that can provide near real time visibility into the performance of client applications. Experience in installation, configuration and usage of premium Splunk Apps and Add-ons such as ES App, UEBA, ITSI etc Sound knowledge in configuration of Alerts and Reports. Good exposure in automatic lookup, data models and creating complex SPL queries. Create, modify and tune the SIEM rules to adjust the specifications of alerts and incidents to meet client requirement Work with the client SPOC to for correlation rule tuning (as per use case management life cycle), incident classification and prioritization recommendations Experience in creating custom commands, custom alert action, adaptive response actions etc. Qualification & experience: Minimum of 3 to 6 years’ experience with a depth of network architecture knowledge that will translate over to deploying and integrating a complicated security intelligence solution into global enterprise environments. Strong oral, written and listening skills are an essential component to effective consulting. Strong background in network administration. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary. Must have knowledge of Vulnerability Management, Windows and Linux basics including installations, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting. Good to have below mentioned experience with designing and implementation of Splunk with a focus on IT Operations, Application Analytics, User Experience, Application Performance and Security Management Multiple cluster deployments & management experience as per Vendor guidelines and industry best practices Troubleshoot Splunk platform and application issues, escalate the issue and work with Splunk support to resolve issues Certification in any one of the SIEM Solution such as IBM QRadar, Exabeam, Securonix will be an added advantage Certifications in a core security related discipline will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 months ago

Apply

3.0 - 6.0 years

0 Lacs

Trivandrum, Kerala, India

Remote

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Senior (CTM – Threat Detection & Response) KEY Capabilities: Experience in working with Splunk Enterprise, Splunk Enterprise Security & Splunk UEBA Minimum of Splunk Power User Certification Good knowledge in programming or Scripting languages such as Python (preferred), JavaScript (preferred), Bash, PowerShell, Bash, etc. Perform remote and on-site gap assessment of the SIEM solution. Define evaluation criteria & approach based on the Client requirement & scope factoring industry best practices & regulations Conduct interview with stakeholders, review documents (SOPs, Architecture diagrams etc.) Evaluate SIEM based on the defined criteria and prepare audit reports Good experience in providing consulting to customers during the testing, evaluation, pilot, production and training phases to ensure a successful deployment. Understand customer requirements and recommend best practices for SIEM solutions. Offer consultative advice in security principles and best practices related to SIEM operations Design and document a SIEM solution to meet the customer needs Experience in onboarding data into Splunk from various sources including unsupported (in-house built) by creating custom parsers Verification of data of log sources in the SIEM, following the Common Information Model (CIM) Experience in parsing and masking of data prior to ingestion in SIEM Provide support for the data collection, processing, analysis and operational reporting systems including planning, installation, configuration, testing, troubleshooting and problem resolution Assist clients to fully optimize the SIEM system capabilities as well as the audit and logging features of the event log sources Assist client with technical guidance to configure end log sources (in-scope) to be integrated to the SIEM Experience in handling big data integration via Splunk Expertise in SIEM content development which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Hands-on experience in development and customization of Splunk Apps & Add-Ons Builds advanced visualizations (Interactive Drilldown, Glass tables etc.) Build and integrate contextual data into notable events Experience in creating use cases under Cyber kill chain and MITRE attack framework Capability in developing advanced dashboards (with CSS, JavaScript, HTML, XML) and reports that can provide near real time visibility into the performance of client applications. Experience in installation, configuration and usage of premium Splunk Apps and Add-ons such as ES App, UEBA, ITSI etc Sound knowledge in configuration of Alerts and Reports. Good exposure in automatic lookup, data models and creating complex SPL queries. Create, modify and tune the SIEM rules to adjust the specifications of alerts and incidents to meet client requirement Work with the client SPOC to for correlation rule tuning (as per use case management life cycle), incident classification and prioritization recommendations Experience in creating custom commands, custom alert action, adaptive response actions etc. Qualification & experience: Minimum of 3 to 6 years’ experience with a depth of network architecture knowledge that will translate over to deploying and integrating a complicated security intelligence solution into global enterprise environments. Strong oral, written and listening skills are an essential component to effective consulting. Strong background in network administration. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary. Must have knowledge of Vulnerability Management, Windows and Linux basics including installations, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting. Good to have below mentioned experience with designing and implementation of Splunk with a focus on IT Operations, Application Analytics, User Experience, Application Performance and Security Management Multiple cluster deployments & management experience as per Vendor guidelines and industry best practices Troubleshoot Splunk platform and application issues, escalate the issue and work with Splunk support to resolve issues Certification in any one of the SIEM Solution such as IBM QRadar, Exabeam, Securonix will be an added advantage Certifications in a core security related discipline will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 2 months ago

Apply

6.0 years

3 - 5 Lacs

Hyderābād

On-site

ROLES & RESPONSIBILITIES Reviews alerts generated by SentinelOne and implements appropriate containment and mitigation measures Proficient in SIEM, with a focus on QRadar SIEM, as well as threat monitoring and hunting within SIEM environments. Analyzes payloads using JoeSandbox and escalates to the appropriate team as necessary Collaborates with the Forensics team to conduct threat hunting using identified Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) Assists the Tiger Team in targeted collections of systems based on identified malicious activities in the client's environment Conducts historical log reviews to support threat hunting efforts and ensures all malicious artifacts are mitigated in the SentinelOne console Examines client-provided documents and files to supplement the SOC investigation and mitigation strategy Conducts perimeter scans of client infrastructure and reports any identified vulnerabilities to the Tiger Team for appropriate escalation Manages client-related tasks within the ConnectWise Manage ticketing system as part of the Client Handling Lifecycle Creates user accounts in SentinelOne console for the client Generates Threat Reports showcasing activity observed within the SentinelOne product Executes passphrase exports as needed for client offboarding Submits legacy installer requests to ensure the team is properly equipped for deployment Provides timely alert notifications to the IR team of any malicious activity impacting our clients Assists with uninstalling/migrating SentinelOne Generates Ranger reports to provide needed visibility into client environments Manages and organizes client assets (multi-site and multi-group accounts) Applies appropriate interoperability exclusions relating to SentinelOne and client applications Performs SentinelOne installation / interoperability troubleshooting as needed Contributes to the overall documentation of SOC processes and procedures Participates in “Handler on Duty (HOD) shifts as assigned to support the TT client matters Internally escalates support ticket / alerts to Tier II-IV Analysts as needed May perform other duties as assigned by management SKILLS AND KNOWLEDGE Demonstrated knowledge of Windows and Unix operating systems Thorough understanding of Digital Forensics and Incident Response practices Proficiency in advanced analysis techniques for processing and reviewing large datasets in various formats Familiarity with TCP/IP and OSI Model concepts at a basic level Expertise in the Incident Response Life Cycle stages (Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned) Working knowledge of the MITRE ATT&CK framework at an intermediate level Proven ability to work independently and solve complex problems with little direction from management Highly detail-oriented and committed to producing quality work JOB REQUIREMENTS Associate’s degree and 6+ years of IT related experience or Bachelor’s Degree and 2-5 years related experience Current or previous knowledge of, or previous experience with, Endpoint Detection and Response (EDR) toolsets General knowledge of the Incident Handling Lifecycle Ability to communicate in both technical and non-technical terms both oral and written DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. PHYSICAL DEMANDS No physical exertion required Travel within or outside of the state Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. FLSA OVERTIME CATEGORY Job is exempt from the overtime provisions of the Fair Labor Standards Act. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. #LI Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. About Us Arete Incident Response is an elite team of the world’s leading cybersecurity and digital forensics experts who combat today’s sophisticated cyberattacks. We work tirelessly to provide unparalleled capabilities and solutions throughout the entire cyber incident life cycle. These include incident response readiness assessments and penetration tests as well as post-incident response, remediation, containment, and eradication services. We work in close collaboration with industry leaders and government agencies along with leading cybersecurity technology platforms to deliver an innovative, intelligence-based approach to solving our client’s toughest challenges. If you want to work with the most talented and experienced people in the industry with the desire to be a cyber hunter and industry expert, we want you to be a part of our team.

Posted 2 months ago

Apply

5.0 years

0 Lacs

Patel Nagar, Delhi, India

Remote

The remote work revolution is here to stay, especially in the tech industry. With Hyderabad fast becoming a major technology hub in India, there’s a massive surge in demand for high-paying work-from-home jobs for tech professionals. Whether you’re a software engineer, cloud architect, data analyst, or cybersecurity expert, companies are actively seeking skilled professionals who can work remotely. In this article, we’ll explore the top-paying WFH jobs for tech professionals in Hyderabad , the skills you need , companies hiring in 2025 , and answers to your most asked questions. 🌐 Why Tech Professionals Prefer Remote Work Work-from-home jobs offer more than just comfort and convenience. Here’s why tech professionals in Hyderabad are choosing remote roles: Higher salaries from international and pan-India companies Flexible schedules to balance work-life Opportunity to freelance or consult multiple clients No relocation or commute costs Access to global projects without leaving home 🧑‍💻 Top High-Paying Work from Home Jobs for Tech Professionals in Hyderabad Below are the most in-demand and well-paying remote jobs in Hyderabad for experienced and skilled techies. Full Stack Developer Overview: Tech companies are always hiring skilled full stack developers who can work on both frontend and backend development. Skills Required: HTML, CSS, JavaScript Node.js, React, Angular MongoDB, MySQL Git, RESTful APIs Top Employers: TCS Accenture Infosys Zoho Average Salary (Remote): ₹10–20 LPA Cloud Solutions Architect Overview: Cloud computing roles are in high demand with companies moving infrastructure to the cloud. Skills Required: AWS, Microsoft Azure, Google Cloud DevOps & Infrastructure as Code (IaC) Kubernetes, Docker Load balancing and cloud security Companies Hiring: Amazon Web Services (AWS) Tech Mahindra Microsoft Startups using microservices architecture Average Salary: ₹15–30 LPA Also Read: Best Work from Home Jobs in Hyderabad for Freshers and College Students Data Scientist / ML Engineer Overview: Data is the new oil, and Hyderabad companies are investing in predictive analytics, AI, and machine learning. Skills Required: Python, R TensorFlow, PyTorch SQL, Hadoop Data visualization tools (Tableau, Power BI) Top Recruiters: Deloitte Invesco Fractal Analytics Startups in fintech & healthtech Average Salary: ₹12–25 LPA Cybersecurity Analyst Overview: With remote work growing, cybersecurity experts are essential for data protection and risk management. Skills Required: Network security Firewalls, IDS/IPS Ethical hacking, penetration testing SIEM tools like Splunk, IBM QRadar Top Hiring Companies: HCL Technologies PwC Cognizant Global MNCs with security ops centers (SOCs) Average Salary: ₹10–22 LPA DevOps Engineer Overview: DevOps experts bridge the gap between development and operations, automating the deployment process. Skills Required: Jenkins, Docker, Kubernetes Terraform, Ansible CI/CD pipelines Git, scripting (Shell/Python) Hiring Companies: Accenture IBM Zensar SaaS startups Average Salary: ₹12–24 LPA Blockchain Developer Overview: With increased focus on Web3 and fintech in Hyderabad, blockchain is now a lucrative remote field. Skills Required: Solidity, Ethereum Smart contract development Web3.js, IPFS Crypto wallets and dApps Companies Hiring: CoinDCX WazirX Emerging fintech & Web3 startups Average Salary: ₹15–28 LPA AI / NLP Engineer Overview: Natural Language Processing is being used across chatbots, voice assistants, and automation tools. Skills Required: Python, spaCy, NLTK Transformers, HuggingFace Deep learning, BERT, GPT Top Employers: Google Hyderabad AI startups EdTech platforms Average Salary: ₹14–30 LPA Remote QA Automation Engineer Overview: Automation testers are crucial in agile development to ensure faster delivery and minimal bugs. Skills Required: Selenium, Cypress JMeter, Postman Jenkins, Maven Java, Python scripting Companies Hiring: Infosys Cognizant Product-based startups Average Salary: ₹8–18 LPA Remote Product Manager (Tech) Overview: For those with both technical and managerial acumen, PM roles are rewarding and fully remote in many firms. Skills Required: Agile methodologies JIRA, Asana UI/UX understanding Communication & leadership Companies Hiring: SaaS startups Healthtech firms Remote-first companies Average Salary: ₹20–35 LPA Freelance Tech Consultant Overview: Senior-level professionals often choose freelancing for better flexibility and pay per project. Services Offered: Software architecture Cloud migration Technical training & mentorship Best Platforms: Toptal Upwork Freelancer Earning Potential: ₹50,000 – ₹3 lakhs/month depending on projects Also Read: Genuine Work from Home Jobs in Kolkata Without Investment 💼 Top Companies Offering Remote Tech Jobs in Hyderabad (2025) Here’s a look at companies actively hiring tech professionals remotely: Company Roles Available Remotely TCS Full stack, Cloud, Testing, DevOps Cognizant Cybersecurity, Automation, Data Analytics Microsoft Azure, AI/ML, Product, QA Amazon India Cloud, NLP, Product Management Tech Mahindra DevOps, Security, Full Stack Accenture Data science, QA, Agile management Zoho Frontend, Backend, Cloud Invesco BI, Analytics, Cybersecurity Infosys Java, Python, QA Automation Technical Skills: 📚 Skills Needed for High-Paying Remote Tech Jobs Proficiency in modern programming languages Cloud technologies (AWS, Azure, GCP) CI/CD tools and automation platforms Machine learning and data analysis Cybersecurity frameworks Soft Skills: Communication and collaboration Remote work discipline Problem-solving abilities Time management Self-motivation and adaptability 🛠 Tools That Tech Professionals Should Master for Remote Work Tool / Platform Purpose GitHub / GitLab Version control and collaboration Slack / Microsoft Teams Team communication Zoom / Google Meet Video conferencing JIRA / Trello Project management Docker / Kubernetes Containerization and orchestration AWS / Azure Cloud services 📍 How to Find High-Paying Remote Tech Jobs in Hyderabad LinkedIn Use filters like “Remote” + “Hyderabad” in job search Connect with hiring managers and recruiters Naukri.com Create alerts for WFH roles Search roles by skill + remote (e.g., “AWS Developer remote”) AngelList (Wellfound) Great for startup jobs with high pay and equity options Toptal & Upwork For freelancers & consultants looking for global clients Company Career Pages Visit tech companies’ job portals and apply for remote listings 🚀 Tips to Land High-Paying Remote Tech Jobs Build a Strong GitHub Portfolio showcasing real projects Get Certified in AWS, Azure, Data Science, or Cybersecurity Update your LinkedIn with remote-ready skills Learn Communication Tools used by remote teams (Slack, Teams) Attend Virtual Tech Conferences to network with remote-first companies Highlight Remote Work Skills on your resume Prepare for Virtual Interviews with good camera setup and environment 🏁 Conclusion – High-Paying Work from Home Jobs in Hyderabad Remote work has become a reality — and Hyderabad, being a major tech city, is offering a goldmine of opportunities for tech professionals who prefer working from home. Whether you’re a developer, data analyst, cybersecurity expert, or DevOps engineer, there’s a high-paying work-from-home job waiting for you . By sharpening your skills, leveraging online platforms, and aligning with the needs of remote-first companies, you can build a successful tech career from the comfort of your home in Hyderabad. ❓ FAQs – High-Paying Work from Home Jobs in Hyderabad What are the best high-paying WFH jobs for techies in Hyderabad? Full stack developers, cloud architects, ML engineers, and DevOps engineers are some of the top-paying remote roles. Can I work remotely for international companies from Hyderabad? Yes. Platforms like Toptal, Upwork, and GitHub Jobs allow Indian professionals to work for global clients. What’s the minimum experience needed for high-paying remote jobs? Most roles require 2–5 years of experience, though startups often hire based on skills and projects. How do I verify if a remote tech job offer is genuine? Check company credentials, look for official email domains, and avoid paying any registration fees. Are cybersecurity roles available remotely? Absolutely. Many companies hire remote security analysts, penetration testers, and SOC professionals. How much can a cloud architect earn working from home? In Hyderabad, cloud architects working remotely can earn ₹15–30 LPA or more depending on skills and certifications. Which certifications help in getting high-paying WFH tech jobs? AWS Certified Solutions Architect, Azure Fundamentals, Google Cloud Engineer, Certified Ethical Hacker, and PMP. Is freelancing a good option for experienced tech professionals? Yes. Freelancing offers flexibility and competitive international pay, especially for experienced consultants. Are remote roles full-time or contract-based? Both. Many companies offer full-time remote roles with benefits, while others hire on a contract basis. What are the challenges of remote work in tech? Time zone differences, communication gaps, and the need for self-discipline. These can be managed with proper planning. Related Posts: Top Work from Home Jobs in Hyderabad Hiring Now Top 10 Remote Customer Service Jobs You Can Start Today The Pros and Cons of Working Remote Data Entry Jobs How to Land Your First Remote Entry-Level Job: Tips and Tricks How to Thrive in Remote Customer Service Jobs: Tips for Success Best Remote Customer Success Jobs You Can Work From Anywhere Top Remote Front End Developer Jobs Hiring in 2025 Top 10 Work from Home Jobs in Delhi Hiring Now Show more Show less

Posted 2 months ago

Apply

5.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Company Overview Team Geek Solutions is a dynamic IT solutions provider located in India, dedicated to delivering innovative and efficient technology services. Our mission is to empower businesses by harnessing cutting-edge technologies that drive growth and enhance operational efficiency. We value creativity, teamwork, and a commitment to excellence in everything we do. Our culture is rooted in collaboration and continuous learning, making Team Geek Solutions a fantastic place to advance your career in technology. Job Description We are looking for a Python Developer to join our cutting-edge development team as it grows. We want someone who is comfortable asking “why?” The ideal candidate is a divergent thinker who understands industry best practices and has experience with multiple coding languages. They are a team player possessing good analytical as well as technical skills. They are able to communicate and understand the logic behind technical decisions to non-tech stakeholders. They must be comfortable working in an agile environment and have the ability to “take the wheel” when necessary. Responsibilities Gather and analyze user requirements. Create clear technical specifications for reference and reporting. Analyze the third-party applications and identify the components to be integrated. Create innovative, scalable, fault-tolerant software solutions for our customers. Validate and ensure defined unit tests code coverage is achieved. Do code quality checks and code reviews regularly to ensure safe and efficient code. Ensure the setup of the deployment infrastructure and test environments. Work closely with project managers, teams, systems architects, and sales and marketing professionals to deliver project objectives. Continuously look to improve the organization's standards. Expand existing software to meet the changing needs of our key demographics. Requirements Mandatory Skills: Added Advantage Good to have skills: A Bachelor’s / Master’s Degree in Engineering or Information Technology. 5-7 years of software development experience with 4+ years of experience with the Python programming language. A thorough understanding of computer architecture, operating systems, and data structures. An in-depth understanding of the Internet, Cloud Computing & Services, and REST APIs. Must have experience with any one of the python frameworks like Flask / FastAPI / Django REST. Must know GIT and Python virtual environment. Must have experience with python requests module. Should have experience with creating and using python third-party libraries. Familiarity with SIEM tools like the Qradar app / Splunk app and Splunk add-on will be an advantage. Experience working with Linux/Unix and shell scripts. A meticulous and organized approach to work. A logical, analytical, and creative approach to problem-solving. A thorough, detail-oriented work style. Skills: rest,splunk add-on,unix,django rest,siem tools,flask,fastapi,django,git,unit testing,python virtual environment,qradar app,restful apis,agile methodologies,splunk app,shell scripts,linux,python requests module,python,aws,azure,google cloud platform Show more Show less

Posted 2 months ago

Apply

2.0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Skills: SIEM Tools, Intrusion Detection Systems, Incident Response, Threat Intelligence Platforms, Endpoint Detection and Response, Network Traffic Analysis, Log Analysis, Vulnerability Assessment Tools, Qualifications BE/ B.Tech/ M.Tech/ MCA with 60%+ throughout the academics. Security certifications like CEH or equivalent preferred. Experience And Skillset Minimum 2 +years hands-on experience with one or more SIEM tools (Log Logic, LogRhythm, Splunk, QRadar, ArcSight etc.). In-depth understanding of security threats (preferably OWASP Top 10 vulnerabilities), threat attack methods and the current threat environment. Proficient in Incident Management and Response. Basic knowledge of Windows and Unix environments. Knowledge of OSI Model, TCP/IP Protocols, network security. Knowledge about other security tools like Packet Analyzers, HIPS/NIPS, Network Monitoring tools, Cloud Security, AV, EDR, WAF etc. Responsibilities Responsible for working in a 24x7 Security Operation center (SOC) environment. Carry out investigation and correlation and work with the stakeholders towards mitigation and closure of security incidents. Monitor various dash boards from different security solutions on shift basis. Work with the engineering team for Sensor and SIEM rules fine-tuning. Prepare various management reports from SIEM and other security solutions. Provide analysis and trending of security log data from a large number of heterogeneous security devices. Provide threat and vulnerability analysis as well as security advisory services. Analyze and respond to previously undisclosed software and hardware vulnerabilities. Investigate, document, and report on information security issues and emerging trends. Seamlessly integrate with the team work culture, ensure proper information flow across shifts, prepare/take part in shift handovers. Communicate effectively by contributing significantly to the development and delivery of a variety of written and visual documents for diverse audiences. Location Navi Mumbai (On-Site) Show more Show less

Posted 2 months ago

Apply

2.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Skills: SIEM Tools, Intrusion Detection Systems, Incident Response, Threat Intelligence Platforms, Endpoint Detection and Response, Network Traffic Analysis, Log Analysis, Vulnerability Assessment Tools, Qualifications BE/ B.Tech/ M.Tech/ MCA with 60%+ throughout the academics. Security certifications like CEH or equivalent preferred. Experience And Skillset Minimum 2 +years hands-on experience with one or more SIEM tools (Log Logic, LogRhythm, Splunk, QRadar, ArcSight etc.). In-depth understanding of security threats (preferably OWASP Top 10 vulnerabilities), threat attack methods and the current threat environment. Proficient in Incident Management and Response. Basic knowledge of Windows and Unix environments. Knowledge of OSI Model, TCP/IP Protocols, network security. Knowledge about other security tools like Packet Analyzers, HIPS/NIPS, Network Monitoring tools, Cloud Security, AV, EDR, WAF etc. Responsibilities Responsible for working in a 24x7 Security Operation center (SOC) environment. Carry out investigation and correlation and work with the stakeholders towards mitigation and closure of security incidents. Monitor various dash boards from different security solutions on shift basis. Work with the engineering team for Sensor and SIEM rules fine-tuning. Prepare various management reports from SIEM and other security solutions. Provide analysis and trending of security log data from a large number of heterogeneous security devices. Provide threat and vulnerability analysis as well as security advisory services. Analyze and respond to previously undisclosed software and hardware vulnerabilities. Investigate, document, and report on information security issues and emerging trends. Seamlessly integrate with the team work culture, ensure proper information flow across shifts, prepare/take part in shift handovers. Communicate effectively by contributing significantly to the development and delivery of a variety of written and visual documents for diverse audiences. Location Navi Mumbai (On-Site) Show more Show less

Posted 2 months ago

Apply

170.0 years

0 Lacs

Greater Hyderabad Area

On-site

Area(s) of responsibility About Us Birlasoft, a global leader at the forefront of Cloud, AI, and Digital technologies, seamlessly blends domain expertise with enterprise solutions. The company’s consultative and design-thinking approach empowers societies worldwide, enhancing the efficiency and productivity of businesses. As part of the multibillion-dollar diversified CKA Birla Group, Birlasoft with its 12,000+ professionals, is committed to continuing the Group’s 170-year heritage of building sustainable communities. Job Title: Advanced Threat Management, Security Design, and Implementation Architect Job Summary: We are seeking a highly experienced Advanced Threat Management, Security Design, and Implementation Architect to lead our efforts in developing and deploying cutting-edge security solutions. The successful candidate will have deep expertise in advanced threat management, security architecture, and the implementation of robust security frameworks to protect an organization's critical assets. Key Responsibilities Design and implement advanced threat management strategies to identify, mitigate, and respond to security threats. Develop and maintain comprehensive security architectures that align with business goals and regulatory requirements. Lead security design initiatives for new and existing systems, ensuring robust protection against cyber threats. Oversee the implementation of security controls, policies, and procedures across the organization. In-depth knowledge of XDR Technology, SIEM, SOAR, SOC Architecture, Infrastructure and Data Security, Advisory and GRC Processes. Outstanding problem-solving skills and a strategic, analytical mindset, and be able to decipher the complex cybersecurity landscapes. Conduct strategies for vulnerability management and lead initiatives around effective VM in the organization. Collaborate with cross-functional teams to integrate security into the software development lifecycle (SDLC). Provide expert guidance on the latest security trends, tools, and technologies to enhance the organization’s security posture. Develop and deliver training programs to educate employees on security best practices and threat management. Ensure compliance with industry standards, regulations, and frameworks (e.g., NIST, ISO 27001). Professionalism, integrity, and a commitment to maintaining the highest ethical standards in conducting professional responsibilities Required Qualifications Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field. 10+ years of experience in advanced threat management, security design, and implementation. Proven expertise in developing and implementing security architectures and frameworks. Strong understanding of security assessment methodologies, vulnerability analysis, and penetration testing. Experience with security tools such as SIEM, SOAR, EDR, VM, Unified VM, ZTNA, IDS/IPS, firewalls, and endpoint protection, EASM, Deep/ Dark Web and Brand Protection. Excellent problem-solving skills and attention to detail. Strong communication and leadership skills. Experience with cloud security and securing hybrid environments. Preferred Qualifications Master’s degree in Information Security or a related field. Preferred certification in multiple SIEM and SOAR solution implementation (MS Sentinel, Splunk, Phantom, Swimlane, QRADAR) Relevant certifications such as CISSP, CISM, CEH, or OSCP. Show more Show less

Posted 2 months ago

Apply

2.0 - 3.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Company Overview Interactive Brokers Group, Inc. (Nasdaq: IBKR) is a global financial services company headquartered in Greenwich, CT, USA, with offices in over 15 countries. We have been at the forefront of financial innovation for over four decades, known for our cutting-edge technology and client commitment. IBKR affiliates provide global electronic brokerage services around the clock on stocks, options, futures, currencies, bonds, and funds to clients in over 200 countries and territories. We serve individual investors and institutions, including financial advisors, hedge funds and introducing brokers. Our advanced technology, competitive pricing, and global market help our clients to make the most of their investments. Barron's has recognized Interactive Brokers as the #1 online broker for six consecutive years. Join our dynamic, multi-national team and be a part of a company that simplifies and enhances financial opportunities using state-of-the-art technology. Position Overview Seeking a Security Analyst to join our Security Operations Center (SOC), focusing on incident response and threat detection. This role involves working with enterprise SIEM platforms, EDR solutions, and incident management tools to protect IBKR's global trading infrastructure. Key Responsibilities Triage and investigate security alerts using SIEM/EDR tools Execute incident response playbooks Perform malware analysis and IOC identification Create incident tickets and maintain documentation Conduct initial forensic data collection Support security event correlation and analysis Monitor suspicious endpoint activities Participate in 24x7 incident response coverage Required Technical Skills Experience with SIEM (Splunk/QRadar) EDR platforms (CrowdStrike/Carbon Black) Incident ticketing systems (ServiceNow/JIRA) Windows/Linux log analysis Network traffic analysis Malware detection tools IOC collection and analysis Basic forensic tools Required Experience 2-3 years SOC/IR experience L1/L2 alert analysis background Experience with incident playbooks Exposure to MITRE ATT&CK framework Understanding of kill chain methodology Basic threat intelligence usage Technical Environment SIEM platforms EDR solutions TIP platforms Forensic tools Network monitoring tools Vulnerability scanners Incident management systems Work Requirements Rotating shifts (24x7 SOC) Incident response handling Alert triage and escalation Documentation and reporting Team collaboration Growth Path Advanced IR certification support Threat hunting training Digital forensics exposure Technical skill development Senior analyst progression Company Benefits & Perks Competitive salary package. Performance-based annual bonus (cash and stocks). Hybrid working model (3 days office/week). Group Medical & Life Insurance. Modern offices with free amenities & fully stocked cafeterias. Monthly food card & company-paid snacks. Hardship/shift allowance with company-provided pickup & drop facility* Attractive employee referral bonus. Frequent company-sponsored team-building events and outings. Depending upon the shifts. The benefits package is subject to change at the management's discretion. Show more Show less

Posted 2 months ago

Apply

170.0 years

0 Lacs

Mulshi, Maharashtra, India

On-site

Area(s) of responsibility About Us Birlasoft, a global leader at the forefront of Cloud, AI, and Digital technologies, seamlessly blends domain expertise with enterprise solutions. The company’s consultative and design-thinking approach empowers societies worldwide, enhancing the efficiency and productivity of businesses. As part of the multibillion-dollar diversified CKA Birla Group, Birlasoft with its 12,000+ professionals, is committed to continuing the Group’s 170-year heritage of building sustainable communities. Job Title: Advanced Threat Management, Security Design, and Implementation Architect Job Summary: We are seeking a highly experienced Advanced Threat Management, Security Design, and Implementation Architect to lead our efforts in developing and deploying cutting-edge security solutions. The successful candidate will have deep expertise in advanced threat management, security architecture, and the implementation of robust security frameworks to protect an organization's critical assets. Key Responsibilities Design and implement advanced threat management strategies to identify, mitigate, and respond to security threats. Develop and maintain comprehensive security architectures that align with business goals and regulatory requirements. Lead security design initiatives for new and existing systems, ensuring robust protection against cyber threats. Oversee the implementation of security controls, policies, and procedures across the organization. In-depth knowledge of XDR Technology, SIEM, SOAR, SOC Architecture, Infrastructure and Data Security, Advisory and GRC Processes. Outstanding problem-solving skills and a strategic, analytical mindset, and be able to decipher the complex cybersecurity landscapes. Conduct strategies for vulnerability management and lead initiatives around effective VM in the organization. Collaborate with cross-functional teams to integrate security into the software development lifecycle (SDLC). Provide expert guidance on the latest security trends, tools, and technologies to enhance the organization’s security posture. Develop and deliver training programs to educate employees on security best practices and threat management. Ensure compliance with industry standards, regulations, and frameworks (e.g., NIST, ISO 27001). Professionalism, integrity, and a commitment to maintaining the highest ethical standards in conducting professional responsibilities Required Qualifications Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field. 10+ years of experience in advanced threat management, security design, and implementation. Proven expertise in developing and implementing security architectures and frameworks. Strong understanding of security assessment methodologies, vulnerability analysis, and penetration testing. Experience with security tools such as SIEM, SOAR, EDR, VM, Unified VM, ZTNA, IDS/IPS, firewalls, and endpoint protection, EASM, Deep/ Dark Web and Brand Protection. Excellent problem-solving skills and attention to detail. Strong communication and leadership skills. Experience with cloud security and securing hybrid environments. Preferred Qualifications Master’s degree in Information Security or a related field. Preferred certification in multiple SIEM and SOAR solution implementation (MS Sentinel, Splunk, Phantom, Swimlane, QRADAR) Relevant certifications such as CISSP, CISM, CEH, or OSCP. Show more Show less

Posted 2 months ago

Apply

10.0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Job Title: Lead Engineer – Security Operations Department: Engineering and Operations Location: Mumbai Reporting: Manager Security Operations Job Type: Full Time Shift: Rotational Shift PRE-REQUISITES Strong technical and subject matter expertise in at least four or more of the following security specialties: Firewall: Cisco, Palo Alto, Checkpoint, Fortinet, Zscaler, Barracuda VPN - IPSEC, SSL VPN: Ivanti, F5, Cisco, GlobalProtect NAC: Cisco ISE, Aruba ClearPass Unified Thread Management (UTM) SIEM products Qradar, Microsoft Sentinel etc. Load Balancers: F5 BigIP LTM/GTM, Citrix ADC Network Security (multi-vendor) experience. Cloud Infrastructure Mgmt.: Cloud stack, OpenStack, AWS, Azure, Netskope, PaloAlto Prisma Knowledge on scripting language like Python and automation Working knowledge and hands-on experience on Linux/Unix OS is desirable. Customer service experience preferably in a Global Operations Center environment Ticketing system knowledge Ability to workdays, evenings and weekends as required; 24x7 support in rotating shifts Flexibility with the ability to manage stressful situations and adapt to rapidly changing environments and requirements Analytical thinker willing to “think outside the box” to resolve customer impacting situations on first contact; understand customer pain Ability to work with Operations and Engineering on the priority of issues to resolve the urgent customer impacting issues first Aptitude and desire to learn advanced Network Security services. Creative, flexible thinker who is willing to take initiatives and share alternative solutions with peers and management Hands-on experience on Vulnerability Scanning, Penetration Testing Tools (Qualys, Nessus, Rapid7) Exceptional documentation and communication skills Ability to thrive in a fast paced, multi-cultural, customer-oriented environment MS Office proficiency RESPONSIBILITIES Incident Resolution Ticket resolution - work on trouble tickets, support the operation of advanced Network Security Services and take escalations Queue Management - keep a watch on queue and assign tickets Service Request - working on request for changes as per client requirements Perform the minor/major changes as per defined SoC process and work instructions Be a Subject Matter Expert (SME) on a few products Create Standard Operation Procedure Attend client calls and other technical meetings Assist in creation of Root Cause analysis (RCA) Security Performance Tuning Identify areas of Service Improvement Program (SIP) for key clients and reduce incidents Review code upgrade and test implement before rolling on to production Review documentation Recognize successful intrusions and compromises through review and analysis of relevant event detail information Review and update ROE on yearly basis Other Functions Work with hardware/software vendors to resolve problems Coordinate shifts and exchange handoff between various shifts Cross-train and mentor juniors Participate in various network and security related projects Perform other duties as assigned Any additional task given to the incumbent from time-to-time based on business needs TRAINING AND CERTIFICATION REQUIRED CCNA, CCSA, Fortinet NSE-4, PCNSE, CCIE, CEH EXPERIENCE Minimum 10 years of progressive, relevant experience and proven capability to work in a complex network environment EDUCATION Bachelor in Engineering - Computers/Electronics/Communication or related field Graduate/Post Graduate in Science/Maths/IT or related streams with relevant technology experience TECHNICAL AND OTHER SKILLS Knowledge of ITIL, ISO27K, SOC 2 will be beneficial Show more Show less

Posted 2 months ago

Apply

2.0 - 5.0 years

1 - 4 Lacs

Hyderabad

Work from Office

Client Server Tech is looking for System Security / Engineer to join our dynamic team and embark on a rewarding career journey. Develop and implement system security strategies and solutions. Monitor and analyze security incidents and threats. Conduct incident response and investigation. Collaborate with cross-functional teams on security projects. Ensure compliance with security standards and regulations. Provide training and support on security best practices.

Posted 2 months ago

Apply

1.0 years

0 Lacs

Navi Mumbai, Maharashtra

On-site

Job Title : Cyber Security Analyst Location : Navi Mumbai, Maharashtra Experience : Minimum 1 year Employment Type : Full-time Job Summary : We are seeking a proactive and detail-oriented Cyber Security Analyst with at least 1 year of hands-on experience in cybersecurity tools and operations. The ideal candidate will be responsible for protecting enterprise systems and networks, focusing on endpoint protection, proxy management, and threat analysis . Experience with McAfee, Netskope, and Zscaler is essential. Key Responsibilities : Monitor, investigate, and respond to security incidents and alerts across the organization’s infrastructure. Administer and maintain McAfee endpoint security tools and ensure up-to-date threat definitions. Manage web proxy solutions including Zscaler and Netskope , analyzing logs and enforcing policy-based controls. Identify and analyze potential threats using SIEM tools, and escalate as necessary. Collaborate with internal IT teams and external vendors to resolve security issues effectively. Perform vulnerability assessments and support compliance initiatives. Maintain detailed documentation of configurations, policies, and incident reports. Support audits and implement remediation plans based on security findings. Required Skills & Qualifications : Bachelor's degree in Computer Science, Information Technology, or related field. Minimum 1 year of experience in cyber security or information security domain. Hands-on experience with: McAfee Endpoint Security suite. Zscaler (Proxy & Internet Access solutions). Netskope Cloud Security Platform. Good understanding of firewall rules, threat detection, malware analysis, and data loss prevention (DLP). Familiarity with security incident management processes and tools like SIEM (e.g., Splunk, QRadar). Strong analytical and problem-solving skills. Excellent communication and documentation skills. Job Types: Full-time, Permanent Pay: Up to ₹85,000.00 per month Benefits: Internet reimbursement Supplemental Pay: Performance bonus Application Question(s): Do you have experience in these domains like Mcafee, Netskope, and Zscalar in Proxy? Experience: minimum: 1 year (Required) Language: English (Required) Location: Navi Mumbai, Maharashtra (Required) Work Location: In person

Posted 2 months ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

About Position: We at Persistent are looking for a Threat Hunter with experience in Threat Hunting, Malware Analysis. Role: Threat Hunter Location: Pune Experience: 5 to 10 years Job Type: Full Time Employment What You'll Do: 3+ years in threat hunting Job Summary: We are seeking a proactive and analytical Threat Hunter to join our cybersecurity team. The ideal candidate will be responsible for identifying, investigating, and mitigating advanced threats that evade traditional security defenses. Analyzing and reviewing and validating the logs from the log sources. Suggesting user case fine tuning, new use case creation. Troubleshooting SIEM issues related to log sources. Collaborating with other members of the SOC team, as well as internal and external stakeholders, to resolve complex security incidents. Keeping up to date with the latest cybersecurity threats, trends, and technologies to improve the efficiency and effectiveness of incident response. As a Threat Hunter, you will leverage threat intelligence, analytics, and internal telemetry to detect signs of compromise and anomalous behavior across the enterprise environment. Key Responsibilities: Proactively hunt for unknown threats in the environment using a hypothesis-driven approach Analyze large volumes of logs, telemetry, and data from EDR, SIEM, network traffic, and other sources Develop and refine detection logic to identify stealthy and novel threats. Expertise You'll Bring: Strong understanding of cyber kill chain, MITRE ATT&CK, and threat actor behavior Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel) Familiarity with EDR solutions (e.g., CrowdStrike, Carbon Black, Cisco Amp Microsoft Defender) Scripting skills in Python, PowerShell, or similar languages Benefits: Competitive salary and benefits package Culture focused on talent development with quarterly promotion cycles and company-sponsored higher education and certifications Opportunity to work with cutting-edge technologies Employee engagement initiatives such as project parties, flexible work hours, and Long Service awards Annual health check-ups Insurance coverage: group term life, personal accident, and Mediclaim hospitalization for self, spouse, two children, and parents Inclusive Environment: Persistent Ltd. is dedicated to fostering diversity and inclusion in the workplace. We invite applications from all qualified individuals, including those with disabilities, and regardless of gender or gender preference. We welcome diverse candidates from all backgrounds. We offer hybrid work options and flexible working hours to accommodate various needs and preferences. Our office is equipped with accessible facilities, including adjustable workstations, ergonomic chairs, and assistive technologies to support employees with physical disabilities. If you are a person with disabilities and have specific requirements, please inform us during the application process or at any time during your employment. We are committed to creating an inclusive environment where all employees can thrive. Our company fosters a values-driven and people-centric work environment that enables our employees to: Accelerate growth, both professionally and personally Impact the world in powerful, positive ways, using the latest technologies Enjoy collaborative innovation, with diversity and work-life wellbeing at the core Unlock global opportunities to work and learn with the industry’s best Let’s unleash your full potential at Persistent “Persistent is an Equal Opportunity Employer and prohibits discrimination and harassment of any kind.” Show more Show less

Posted 2 months ago

Apply

5.0 - 10.0 years

10 - 18 Lacs

Kolkata

Work from Office

We are looking for a highly experienced Senior Cybersecurity Engineer with advanced skills in Splunk, CrowdStrike, vulnerability management, and identity provider (IDP) systems. This role will be instrumental in building robust detection, response, and identity-integrated security capabilities to defend against evolving threats. The ideal candidate will have a hands-on, security engineering mindset and a proven track record working across endpoint protection, SIEM, and identity systems. Key Responsibilities: Deploy, manage, and optimize Splunk Enterprise Security (ES) for real-time detection, alerting, and correlation of security events. Design and build custom SPL queries, dashboards, and threat detection logic, integrating data from CrowdStrike, IDPs, and vulnerability scanners. Lead the vulnerability management program, including scanning (Qualys, Tenable, Rapid7), analysis, risk prioritization, and driving remediation. Maintain and configure CrowdStrike Falcon, including prevention policies, detection tuning, response playbooks, and integration with SIEM and SOAR platforms. Leverage CrowdStrike telemetry for threat hunting, endpoint investigations, and threat actor tracking. Integrate and manage IDP platforms (e.g., Okta, Azure AD, Entra ID) to secure identity access, enforce MFA/SSO, and detect anomalous user behavior. Correlate identity, endpoint, and vulnerability data to drive risk-based alerting and incident response. Collaborate with incident response, IAM, infrastructure, and compliance teams to maintain a resilient and auditable security posture. Required Qualifications: Bachelors degree in Computer Science, Cybersecurity, or related field. 5+ years of experience in cybersecurity roles with significant hands-on expertise in: Splunk (SPL, ES, dashboards, alerting) CrowdStrike Falcon (EDR management, threat hunting, integration) Vulnerability Management (Qualys, Tenable, or Rapid7) IDP platforms (Okta, Azure AD, Entra ID, etc.) Experience with scripting (Python, Bash, PowerShell) and API integrations. Familiarity with MITRE ATT&CK, threat modeling, CVSS, and Zero Trust principles. Preferred Certifications: Splunk Certified Architect or Admin CrowdStrike Certified Falcon Administrator (CCFA) or higher Okta Certified Professional or Azure Security Engineer Associate CISSP, OSCP, GIAC (GCIH, GMON, GCIA)

Posted 2 months ago

Apply

0 years

0 Lacs

Delhi

On-site

Job requisition ID :: 82284 Date: May 31, 2025 Location: Delhi Designation: Deputy Manager Entity: You will be responsible for managing and maintaining the IBM QRadar Security Information and Event Management (SIEM) platform. Your primary role will involve deploying, configuring, and optimizing the QRadar system to ensure effective security monitoring, event correlation, and threat detection within the organization's infrastructure. You will collaborate with security analysts, network engineers, and other IT teams to implement and maintain a robust security infrastructure.

Posted 2 months ago

Apply

7.0 years

22 - 25 Lacs

Gurgaon

On-site

Designation: SOC analyst L3 Experience: 7-15 Year Office Location: Sector 18, Gurugram Job Type: Full-time Job Summary: We are seeking an experienced and proactive SOC Analyst Level 3 to join our cybersecurity operations team. As a senior member of the Blue Team, you will lead threat detection, incident response, and threat hunting efforts using cutting-edge tools including SOAR and XDR platforms. You will also play a key role in mentoring junior analysts, fine-tuning detection mechanisms, and developing automated playbooks. Key Responsibilities: * Lead real-time monitoring and analysis of security events from various sources (XDR, SIEM, SOAR, etc.). * Coordinate and perform advanced threat hunting across endpoints, networks, and cloud environments. * Analyze alerts and incidents to identify false positives and true threats. * Manage and develop SOAR playbooks to improve response times and incident handling. * Correlate threat intelligence with internal events to identify potential risks. * Drive incident response efforts, including containment, eradication, and recovery. * Collaborate with cross-functional teams to remediate vulnerabilities and prevent recurrence. * Perform forensic analysis as part of post-incident review and root cause analysis. * Mentor and train SOC Level 1 and 2 analysts. * Maintain and optimize detection rules and signatures in XDR and SIEM platforms. * Document investigation findings, incident reports, and threat hunting activities. Required Skills & Qualifications: * 7+ years of experience in Security Operations, Incident Response, or Cyber Threat Detection. * Deep understanding of Blue Team methodologies and defense-in-depth strategies. * Hands-on experience with SOAR platforms (e.g., Cortex XSOAR, Splunk SOAR, or similar). * Strong experience with XDR solutions (e.g., Palo Alto Cortex XDR, Microsoft Defender XDR, SentinelOne). * Advanced threat hunting techniques using both manual and automated approaches. * Proficient in using SIEM tools (Splunk, QRadar, or similar) and correlating log data from multiple sources. * Knowledge of MITRE ATT&CK framework and its application in threat detection and response. * Strong scripting and automation skills (Python, PowerShell, etc.) for SOAR and data parsing. * Familiarity with EDR, NDR, IDS/IPS, and endpoint forensic tools. * Solid understanding of TCP/IP, network protocols, and operating system internals (Windows, Linux). * Excellent communication and analytical skills. Job Type: Full-time Pay: ₹2,200,000.00 - ₹2,500,000.00 per year Schedule: Day shift Night shift Work Location: In person

Posted 2 months ago

Apply

1.0 years

0 - 0 Lacs

Noida

On-site

Job Title: DLP Operations and Trellix Security Analyst Location: Noida, India Job Type: Full-time Experience: 1+ years Job Summary: We are seeking a skilled and detail-oriented DLP (Data Loss Prevention) Operations and Trellix Security Analyst to manage and enhance data protection mechanisms using Trellix (formerly McAfee) and other DLP tools. The role requires hands-on experience in managing DLP incidents, policies, and responding to data security breaches. Key Responsibilities: Monitor, triage, and respond to DLP alerts triggered by endpoint, network, and cloud data movement using Trellix DLP platform. Analyze and investigate DLP incidents to identify root causes and recommend mitigation actions. Administer and maintain Trellix DLP solutions including policy creation, updates, and exception handling. Coordinate with IT, Legal, and HR teams on DLP incident response and investigations. Generate periodic reports and dashboards for DLP events, trends, and policy violations. Perform periodic DLP rule tuning and false positive reduction. Ensure DLP systems are updated, patched, and compliant with security policies. Collaborate with the Information Security team to improve overall data protection strategy. Participate in internal and external audits related to data protection. Required Skills: Strong hands-on experience with Trellix DLP (formerly McAfee DLP) or similar platforms (Forcepoint, Symantec, Microsoft Purview). Knowledge of data classification , content inspection , regex patterns , incident workflows . Understanding of security frameworks such as ISO 27001, NIST, GDPR, and other data privacy regulations. Experience with SIEM tools (Splunk, QRadar) is a plus. Familiarity with endpoint security, email/web gateways, and data exfiltration methods. Excellent analytical, communication, and documentation skills. Qualifications: Bachelor’s degree in Computer Science, Information Security, or related field. Relevant certifications like CEH, CISA, Trellix/McAfee Certified Product Specialist , or DLP-specific certifications preferred. Minimum 3 years of experience in DLP operations or information security roles. Preferred Attributes: Proactive attitude and ability to work independently. Strong ethical standards and attention to data privacy. Ability to manage and prioritize multiple tasks in a fast-paced environment. Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹50,000.00 per month Benefits: Internet reimbursement Supplemental Pay: Performance bonus Application Question(s): Do you have experience in DLP Operation and Trellix? Experience: minimum: 1 year (Required) Language: English (Required) Location: Noida, Uttar Pradesh (Required) Work Location: In person

Posted 2 months ago

Apply

8.0 - 10.0 years

0 Lacs

Pune, Maharashtra, India

On-site

About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. Position Summary We are seeking an experienced and highly skilled Technical Lead with a strong background in Java/Python, SaaS architectures, firewalls and cybersecurity products, including SIEM and SOAR platforms. The ideal candidate will lead technical initiatives, design and implement scalable systems, and drive best practices across the engineering team. This role requires deep technical expertise, leadership abilities, and a passion for building secure and high-performing security solutions. Key Responsibilities Lead the design and development of scalable and secure software solutions using Java/Python. Architect and build SaaS-based cybersecurity applications, ensuring high availability, performance, and reliability. Provide technical leadership, mentoring, and guidance to the development team. Ensure best practices in secure coding, threat modeling, and compliance with industry standards. Collaborate with cross-functional teams including Product Management, Security, and DevOps to deliver high-quality security solutions. Design and implement security analytics, automation workflows and ITSM integrations. Drive continuous improvements in engineering processes, tools, and technologies. Basic Qualifications A bachelor’s or master’s degree in computer science, electronics engineering or a related field 8-10 years of software development experience, with expertise in Java and/or Python. Strong background in building SaaS applications with cloud-native architectures (AWS, GCP, or Azure). In-depth understanding of microservices architecture, APIs, and distributed systems. Experience with containerization and orchestration tools like Docker and Kubernetes. Knowledge of DevSecOps principles, CI/CD pipelines, and infrastructure as code (Terraform, Ansible, etc.). Strong problem-solving skills and ability to work in an agile, fast-paced environment. Excellent communication and leadership skills, with a track record of mentoring engineers. Preferred Qualifications Experience with cybersecurity solutions, including SIEM (e.g., Splunk, ELK, IBM QRadar) and SOAR (e.g., Palo Alto XSOAR, Swimlane). Knowledge of zero-trust security models and secure API development. Hands-on experience with machine learning or AI-driven security analytics. ‍ Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted. Show more Show less

Posted 2 months ago

Apply

3.0 - 1.0 years

0 Lacs

Noida, Uttar Pradesh

On-site

Job Title: DLP Operations and Trellix Security Analyst Location: Noida, India Job Type: Full-time Experience: 1+ years Job Summary: We are seeking a skilled and detail-oriented DLP (Data Loss Prevention) Operations and Trellix Security Analyst to manage and enhance data protection mechanisms using Trellix (formerly McAfee) and other DLP tools. The role requires hands-on experience in managing DLP incidents, policies, and responding to data security breaches. Key Responsibilities: Monitor, triage, and respond to DLP alerts triggered by endpoint, network, and cloud data movement using Trellix DLP platform. Analyze and investigate DLP incidents to identify root causes and recommend mitigation actions. Administer and maintain Trellix DLP solutions including policy creation, updates, and exception handling. Coordinate with IT, Legal, and HR teams on DLP incident response and investigations. Generate periodic reports and dashboards for DLP events, trends, and policy violations. Perform periodic DLP rule tuning and false positive reduction. Ensure DLP systems are updated, patched, and compliant with security policies. Collaborate with the Information Security team to improve overall data protection strategy. Participate in internal and external audits related to data protection. Required Skills: Strong hands-on experience with Trellix DLP (formerly McAfee DLP) or similar platforms (Forcepoint, Symantec, Microsoft Purview). Knowledge of data classification , content inspection , regex patterns , incident workflows . Understanding of security frameworks such as ISO 27001, NIST, GDPR, and other data privacy regulations. Experience with SIEM tools (Splunk, QRadar) is a plus. Familiarity with endpoint security, email/web gateways, and data exfiltration methods. Excellent analytical, communication, and documentation skills. Qualifications: Bachelor’s degree in Computer Science, Information Security, or related field. Relevant certifications like CEH, CISA, Trellix/McAfee Certified Product Specialist , or DLP-specific certifications preferred. Minimum 3 years of experience in DLP operations or information security roles. Preferred Attributes: Proactive attitude and ability to work independently. Strong ethical standards and attention to data privacy. Ability to manage and prioritize multiple tasks in a fast-paced environment. Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹50,000.00 per month Benefits: Internet reimbursement Supplemental Pay: Performance bonus Application Question(s): Do you have experience in DLP Operation and Trellix? Experience: minimum: 1 year (Required) Language: English (Required) Location: Noida, Uttar Pradesh (Required) Work Location: In person

Posted 2 months ago

Apply

2.0 - 5.0 years

2 - 6 Lacs

Hyderabad

Work from Office

Join Amgen’s Mission of Serving Patients At Amgen, if you feel like you’re part of something bigger, it’s because you are. Our shared mission—to serve patients living with serious illnesses—drives all that we do. Since 1980, we’ve helped pioneer the world of biotech in our fight against the world’s toughest diseases. With our focus on four therapeutic areas –Oncology, Inflammation, General Medicine, and Rare Disease– we reach millions of patients each year. As a member of the Amgen team, you’ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you’ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. What you will do Let’s do this. Let’s change the world. In this vital role you will be responsible for the initial response to security events and incidents within a 24/7 Cybersecurity Operations Center (CSOC). This role involves following established procedures to investigate security events, providing feedback to improve processes, and assisting in the incident response lifecycle. Additionally, the associate will participate in knowledge-sharing sessions and correlate security alerts across platforms. Roles & Responsibilities: Follow established procedures to triage, investigate and respond to security events and incidents. Provide feedback to senior analysts to improve, review, and optimize existing procedures and documentation. Correlate security alerts from various platforms based on common elements. Participate in and lead CSOC Tier 1 knowledge-sharing and learning sessions. Assist incident responders in coordinating the response, containment, eradication, recovery, and lessons learned phases of the incident response lifecycle. Basic Qualifications: Bachelor’s degree and 0 to 3 years of Security Operations experience OR related field experience Diploma and 4 to 7 years of Security Operations or related field experience Professional Certifications: CompTIA Security+ (preferred) CEH (preferred) GSEC (preferred) MTA Security Fundamentals (preferred) Must-Have Skills: Solid understanding of security technologies and their core functionality Experience in analyzing cybersecurity threats with up-to-date knowledge of attack vectors and the cyber threat landscape. Ability to prioritize tasks effectively and solve problems efficiently in a diverse, distributed team environment. Good knowledge of Windows and/or Linux systems. Familiarity with CSOC operations and incident response procedures. Experience with security alert correlation across different platforms. Preferred Qualifications: Good communication and collaboration skills, especially when working with global teams. Ability to prioritize and manage tasks in high-pressure situations. Critical thinking and problem-solving abilities in cybersecurity contexts. A commitment to continuous learning and knowledge sharing. Work Hours This position requires you to work a later shift and may be assigned a second or third shift schedule. Candidates must be willing and able to work during evening or night shifts, as required. Potential Shifts (subject to change based on business requirements)Second Shift2:00 pm – 10:00 pm IST; Third Shift10:00 pm – 7:00 am IST. What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.

Posted 2 months ago

Apply

18.0 - 22.0 years

25 - 30 Lacs

Mumbai

Work from Office

Job Title - Security Account Lead + Associate Director + IMU Management Level:5 Associate Director Location:Mumbai/ New Delhi Must have skills: Cyber Security with P&L responsibility and good networking and relationship building ability Good to have skills: Cyber Strategy, Cyber Protection, Cyber Resilience Job Summary : As a Security Account Lead (SAL), you will be a trusted advisor who builds and executes Accenture vision by combining the best of Accenture Security and the power of One Accenture to meet our clients needs and help them become cyber resilient business. This is a critical role on the client account leadership team. Roles & Responsibilities: - Drive Growth for Security Oversee the growth and management of account(s) Accountable for Security P&L for the account(s) Identify new opportunities for business development and expansion within the account(s) Create Value for Clients Truly understand client needs and partner quickly to respond and support client Act as C-Suite advisor, partner with the client across the breadth of security offerings and create connection to other service areas across Accenture Maintain strong brand reputation through exceptional delivery and value for clients Bring the best of Accenture and Security Leverage the best of Accenture and Security, including service offerings, innovations, solution tablets, industry perspectives and proof of value (PoV), to deliver value to our clients Bring in experts from across Accenture from other offerings in support of client needs Build Exceptional Relationships Build and nurture relationships as an integral part of the Accenture team Cultivate relationships across One Accenture and Ecosystems partners Inspire teams and act with a Growth Mindset Create an engaging project environment for people to learn and grow Demonstrate a positive, growth mindset with openness to new ideas, innovations, and opportunities that keep the team challenged Professional & Technical Skills: - Must Have Skills: Proficiency in the Cyber Security environment - Strong networking and relationship building skills in the Financial Services and Products domain i.e. Consumer goods, Life Sciences, Utilities, Resources, Manufacturing etc. Additional Information: - The ideal candidate will possess a strong background in cyber security field, along with a proven track record of delivering impactful solutions to clients. This position is based at either Mumbai or New Delhi location. About Our Company | AccentureQualification Experience: Minimum 18-22 years of progressive functional and consulting experience. Educational Qualification: Masters degree in business administration (MBA) or post graduate degree in management (PGDM) from premier institutes preferred

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies