Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 5.0 years
3 - 7 Lacs
Gurugram
Work from Office
Why Join Siemens? At Siemens, you will be part of a global leader committed to innovation, quality, and excellence. This role offers the opportunity to work on challenging projects, develop professionally, and make a significant impact in the electrical and instrumentation domain, particularly within power plant and renewable energy projects. If you are passionate about leading a talented team and driving technical excellence, we encourage you to apply. As Siemens Energy, "We energize society" by supporting our customers to make the transition to a more sustainable world, based on innovative technologies and our ability to turn ideas into reality. We do this by Expanding renewables Transforming conventional power Strengthening electrical grids Driving industrial decarbonization Securing the supply chain and necessary minerals Looking for challenging role? If you really want to make a difference - make it with us Siemens Energy (SE) is a global pacesetter in energy, helping customers to meet the evolving demands of today's industries and societies. SE comprises broad competencies across the entire energy value chain and offers a uniquely comprehensive portfolio for utilities, independent power producers, transmission system operators and the oil and gas industry. Products, solutions and services address the extraction, processing and the transport of oil and gas as well as power generation in central and distributed thermal power plants and power transmission in grids. With global headquarters in Munich in Germany and more than 88,000 employees in over 80 countries, Siemens energy has a presence across the globe and is a leading innovator for the energy systems of today and tomorrow, as it has been for more than 150 years. Your new role "“ challenging and future-oriented You would be responsible for all system administration requirements like installation, upgrades, and updates of DCS Systems (SPPA T3000) before the delivery of components to customers as well as during the after-sales service phase. You would be part of remote service support center and would support customers in troubleshooting of problems faced by customer. As part of your profile there would be requirement of travelling to many project sites during installation as well as service phase of I&C Systems. You have great opportunity to work with global remote support centers and global teams We don't need superheroes, just super minds You're a bachelor's in engineering with 3 to 5 years of experience in system administration of Instrumentation & Control (I&C)/PLC systems. You've great knowledge and experience of DCS & PLC Systems You've great knowledge of SPPA T3000 control system and "˜know-how' on the system administration and troubleshooting would be an added advantage. You've great knowledge of network implementation including switches, firewalls, router etc. You've professional exposure in implementation of cyber solutions like NIDS, Application Whitelisting, Domain Controller, SIEM Solutions would be added advantage. We've got quite a lot to offer. How about you? This role is based in Gurgaon, where you'll get the chance to work with teams impacting entire cities, countries "“ and the shape of things to come. We're Siemens. A collection of over 379,000 minds building the future, one day at a time in over 200 countries. We're dedicated to equality, and we welcome applications that reflect the diversity of the communities we work in. All employment decisions at Siemens are based on qualifications, merit and business need. Bring your curiosity and imagination and help us shape tomorrow.
Posted 2 months ago
5.0 years
0 Lacs
India
On-site
About Us At SentinelOne, we’re redefining cybersecurity by pushing the limits of what’s possible—leveraging AI-powered, data-driven innovation to stay ahead of tomorrow’s threats. From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We’re looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you’re excited about solving complex challenges in bold, innovative ways, we’d love to connect with you. Who are we? The Data team is tasked with providing a world-class data platform that enables unrivalled cost, performance, and scalability for SentinelOne and our customers. The exponential growth in volumes of data, users of data, and types of data calls for a new modern architecture that addresses the new data requirements for enterprise organizations. Help us get this platform into the hands of customers and support them in their mission to affordably collect and retain their most critical asset - data. SentinelOne is shaping the converged future of security and data through its unified data platform. This is a unique opportunity to operate in an emerging ‘startup’ like environment within SentinelOne to build and scale our data business beyond just security use cases. What are we looking for? We are looking for a team member who puts the customer first and is passionate about solving problems with creativity, compassion, and technical acumen. You will need to bring a combination of technical, business, strategic and problem-solving skills to the team to support pre-sales efforts and as a data subject matter expert to the larger SentinelOne team. Looking for an individual who is smart, passionate about data, and who brings a sense of joy and teamwork to everything they do. As a Sr. Solutions Engineer, you will illustrate SentinelOne's value to prospective customers. We need a self-starter who excels in a high-paced startup environment and thrives on pitching revolutionary technology to many areas of an organisation, including C-level executives, security engineers, IT operations, DevOps, and Engineering professionals. They should be willing to “wear many hats” and step up and drive solutions to problems related to external and internal needs. This individual will be instrumental in accelerating our sales, strategic initiatives, and growing SentinelOne. What skills and knowledge should you bring? 5+ years of experience as a Solutions (Sales) Engineer or Architect BS/BA degree or equivalent technical experience is desired, but love a well-rounded candidate with a broad range of interests and talents Strong background with big data platforms (Cassandra, Hadoop, etc.), data lakes (Snowflake, DataBricks), streaming analytics (Kafka), log management (ElasticSearch, SumoLogic, etc.), or SIEM (Splunk, Devo, Qradar, Exabeam, etc.) Some code writing proficiency is desired (C/C++, Shell, Perl, Python) Experience with RegEx and writing parsers Background in cloud providers (AWS, Azure, Google)and technologies such as Kubernetes Ability to demonstrate product value and use cases, both customer-specific and generic. Demonstrable experience in objection handling and positioning against competitive or alternative technologies, including how to transition to new data pipelines Use concise written and oral communication skills to effectively lead business and technical presentations, demonstrations, and conversations with both executives and technical audiences. Fluency in English is required. Must have demonstrable experience successfully selling to mid-to-large customers and working across an organisation to get technical buy-in and acceptance Drive the Evaluation/POC through a defined process. Provide timely consultation and build a strong relationship with the technical buyer or champion. Provide 1st-level technical support throughout the sales process with involvement as it is transitioned to customer success. Availability to travel to visit prospects and customers (usually no more than 20-25% and as required) What will you do? The principal responsibilities for this position are to generate revenue from Strategic Accounts across the region through following up on multiple lead sources, developing new clients and selling directly to customers while leveraging our channel community. In this position, you will: Run a sophisticated sales process from prospecting to closure Partner with our channel team to drive both net new and recurring revenue Partner with channel managers to build pipeline and grow the assigned territory Become an insider within the Cyber Security Industry and become an expert in SentinelOne products Stay well educated and informed about SentinelOne's competitive landscape and how to sell the value of our solutions and services when compared to the relevant competitors in the Next Generation Endpoint market space. Consistently meet or exceed sales quotas Why us? You will be joining a cutting-edge company where you will tackle extraordinary challenges and work with the very best in the industry. Health Insurance Industry-leading gender-neutral parental leave Paid Company Holidays Paid Sick Time Employee stock purchase program Employee assistance program Gym membership reimbursement Wifi/Cell phone reimbursement Numerous company-sponsored events, including regular happy hours and team-building events SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. SentinelOne participates in the E-Verify Program for all U.S. based roles. Show more Show less
Posted 2 months ago
2.0 - 5.0 years
2 - 5 Lacs
Bengaluru
Work from Office
Varonis is looking for Security Analyst to join our dynamic team and embark on a rewarding career journey. Defining, planning, implementing, maintaining, and upgrading security measures, policies, and controls Assisting with the creation of updates and training programs to secure the network and train the employees Keeping the security systems up to date Monitoring security access and maintaining the relevant data Conducting vulnerability testing and risk analyses to assess security and performing internal and external security audits Analyzing security breaches to identify the cause and to update incidence responses and disaster recovery plans
Posted 2 months ago
2 - 3 years
0 Lacs
Kochi, Kerala, India
On-site
Role Description Job Title: L1 SOC Analyst Experience : 2 to 3 years Location: Trivandrum, Kochi, Chennai, Bangalore, Hyderabad Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. Job Responsibilities Eyes on the glass monitoring of the SOAR/SIEM platform for the detection of SOC Level 1 Analysis 24*7*365 Shifts on a rotational basis - Performing the Monitoring, Detection and Response Adherence to Shift Schedules, shift hand-over and completion of activities designated for the shift within the designated SLAs and KPIs Familiarity with SIEM Platforms such as Splunk, Sentinel, QRadar etc Perform Triage, Investigation, context enrichment and opening of Incident, as per the documented playbooks. Ability to learn additional security tools and platforms depending on the situational needs and ability to operate on those tools in optimum levels – such as DDOS Detection Tools, End-point security tools, EDR and MDR tools, DLP Tools, Phishing investigation tools etc Familiarity with OpenSource Intelligence tools. Professionalism in documenting Security Incidents, Investigation findings and reasoning Must Have Skills Monitoring and investigation experience on 1 or more SIEM tools and/or SOAR Platforms Experience in any of the SIEM Platforms such as Splunk, Sentinel, QRadar etc Minimum of 2 years of experience in Information Security In depth operational experience with SIEM technologies. Demonstrated process orientation and ability to manage out of the ordinary cyber threat detection and investigation steps Strong communicator and fluent in English and ability to work smoothly with multinational clients Aptitude and interest towards Cyber security concepts and evolution of new offence and defense methodologies Good To Have Skills Certifications such as CEH, CCNA, CISSP, CISSP or on common SOC Tools/Platforms Show more Show less
Posted 2 months ago
2 - 3 years
0 Lacs
Trivandrum, Kerala, India
On-site
Role Description Job Title: L1 SOC Analyst Experience : 2 to 3 years Location: Trivandrum, Kochi, Chennai, Bangalore, Hyderabad Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. The primary role of a SOC Level 1 Analyst is to serve as the frontline defense, managing first triage and ranking of security cases, and initiating the threat detection and response processes for client-related security events. The Analyst is integral to the MDR, working collaboratively with other teams to ensure high quality of service, and will be given opportunities for professional growth in cybersecurity. The position entails conducting inquiry procedures as dictated by CyberProof methodology and contributing insights on the case investigation and detection quality. Principal Duties Quickly respond to and classify all incoming security cases, ensuring that incidents are appropriately escalated to the right analyst within the predefined SLA period during the Analyst's shift. Conduct the first triage investigations into the assigned cases using a blended approach based on tools integrated into the SOAR platform and document all collected evidence and conclusions. At the shift's commencement, diligently review all new information in the SOAR, through the Teams channel, shared mailbox, and any other designated communication mediums to ensure readiness to continue or start case the investigation and address client queries. Facilitate a smooth handoff to the next team at the end of the shift, ensuring continuous and seamless security monitoring. Remain to any procedural inconsistencies or issues and proactively report these to the team leader or upper analytical layer (L2) for resolution or consultation. Should uncertainty or complex issues arise, elevate the matter promptly to a senior L1 Analyst or Shift and Technical Leads before resorting to the L2 team. Support the Lead Analysts and the L2 team in the extraction and compilation of data needed for the preparation of Weekly, Monthly, and Quarterly Business Review (QBR) documentation. Skills And Qualifications At least 1 year of experience as a security analyst Proficient in investigating s related to phishing, malware, and similar threats. Solid understanding of computer security and networking concepts Experience with SIEM or similar security tools (Splunk or Qradar or Sentinel). Knowledgeable about endpoint protection tools Skilled in analyzing network traffic, interpreting logs, and examining packet capture. Strong critical thinking and analytical abilities Excellent written and verbal communication skills Experience managing and analyzing s from security tools is a plus. Familiarity with cloud solutions is advantageous. Relevant certifications are a plus. Skills SOC Analysis,MItre Analysis,Invetigation,Sentinel Show more Show less
Posted 2 months ago
2 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Bring more to life. Are you ready to accelerate your potential and make a real difference within life sciences, diagnostics and biotechnology? At Cytiva, one of Danaher’s 15+ operating companies, our work saves lives—and we’re all united by a shared commitment to innovate for tangible impact. You’ll thrive in a culture of belonging where you and your unique viewpoint matter. And by harnessing Danaher’s system of continuous improvement, you help turn ideas into impact – innovating at the speed of life. Working at Cytiva means being at the forefront of providing new solutions to transform human health. Our incredible customers undertake life-saving activities ranging from fundamental biological research to developing innovative vaccines, new medicines, and cell and gene therapies. At Cytiva you will be able to continuously improve yourself and us – working on challenges that truly matter with people that care for each other, our customers, and their patients. Take your next step to an altogether life-changing career. Learn about the Danaher Business System which makes everything possible. The Security Operations Analyst is responsible for monitoring, analyzing, and responding to security incidents to protect the organization’s digital assets and infrastructure. By proactively identifying threats and vulnerabilities, they play a critical role in minimizing risk and ensuring business continuity. This position reports to the Senior Manager, Security Operations and is part of the Information Security Team which operates globally. This will be an on-site role, based at our office in Bangalore working as part of a global team. At Cytiva, our vision is, to advance future therapeutics from discovery to delivery. What you will do: Perform advanced security incident analysis and digital forensics to identify threats and mitigate risks. Lead complex security investigations, including malware analysis, network traffic analysis, and endpoint detection. Provide guidance to L1 and L2 SOC analysts, improving the quality of information coming into the Security Operations team. Investigate and respond to escalated security incidents in a timely manner. Collaborate with our engineering teams to optimize and fine-tune SIEM (e.g., Splunk, Microsoft Sentinel, Elastic Security) and other security tools. Conduct proactive threat hunting to uncover hidden threats and vulnerabilities within the organization. Partner with other IT and security teams to improve the organization's security posture. Produce detailed reports and recommendations for remediation and security improvements, including hosting post incident reviews with wider technical teams. Who you are: Minimum 5+ years of experience in a corporate IT environment, with at least 2 years in an L3 or senior analyst role. Deep knowledge of security frameworks such as MITRE ATT&CK, NIST, CIS Controls, and ISO 27001. Experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar, ArcSight) and EDR/XDR solutions. Vendor certifications are a plus. Hands-on experience with incident response, threat hunting, and forensic investigations. Familiarity with cloud security (AWS, Azure, Google Cloud) and modern attack techniques. Certifications such as OSCP, CEH are a plus. It would be a plus if you also possess previous experience in: Scripting and automation (Python, PowerShell, Bash) to improve SOC processes SME in EDR, SIEM, UBA, DLP or Data Security Operation Technology (OT) environments Cytiva, a Danaher operating company, offers a broad array of comprehensive, competitive benefit programs that add value to our lives. Whether it’s a health care program or paid time off, our programs contribute to life beyond the job. Check out our benefits at Danaher Benefits Info. Join our winning team today. Together, we’ll accelerate the real-life impact of tomorrow’s science and technology. We partner with customers across the globe to help them solve their most complex challenges, architecting solutions that bring the power of science to life. For more information, visit www.danaher.com. At Danaher, we value diversity and the existence of similarities and differences, both visible and not, found in our workforce, workplace and throughout the markets we serve. Our associates, customers and shareholders contribute unique and different perspectives as a result of these diverse attributes. Show more Show less
Posted 2 months ago
4 - 6 years
0 Lacs
Bengaluru, Karnataka, India
On-site
At Juniper, we believe the network is the single greatest vehicle for knowledge, understanding, and human advancement the world has ever known. To achieve real outcomes, we know that experience is the most important requirement for networking teams and the people they serve. Delivering an experience-first, AI-Native Network pivots on the creativity and commitment of our people. It requires a consistent and committed practice, something we call the Juniper Way. Position:L2 Technical Support Engineer – Network Management Experience : 4-6 years Location: Bangalore About Team: The team is responsible for providing technical support and troubleshooting for Juniper’s Network Management Systems (NMS) and Juniper Secure Analytics (JSA) platforms. The team specializes in diagnosing complex issues, performing root cause analysis, and delivering solutions to ensure optimal network performance and security. This team plays a pivotal role in maintaining the reliability and resilience of Juniper-powered networks through comprehensive support for NMS and JSA platforms. Relevant work experience: 4 - 6 yrs.; with a bachelor’s degree in Computer Science or related domain. Role Description: Deliver high-quality technical assistance for NMS and SIEM products like JUNOS Space Platform and Apps, Security Analytics (JSA) Provide hardware and software technical support, including configuration assistance and troubleshooting of devices and other peripheral networking equipment. Document and reproduce customer related networking problems and work closely with L3 teams for timely resolution. Be a customer advocate for documentation, timely resolution of issues, for problem reproduction and escalation. Work with L3 team to develop product trainings and contribute towards knowledge base articles. Ability to troubleshoot and debug complex, unique networks with mixed media and protocols. Timely completion of training and certification as assigned Ability to mentor newly hired support engineers and peers in technical areas of specialty. Skill Set Required: Must have working knowledge of network and service management concepts, networking protocols [L2-L7], high availability, Virtualization and Scripting Must have hands on experience with Linux system level troubleshooting Must be experienced in handling large-scale software applications deployment, configuration [config files and script based] and debugging. Extensive background in internetworking, TCP/IP, LAN, WAN and Security technologies required. Superior verbal, written communication and customer handling skills. Experience with Network Management/Element Management Products (understanding of FCAPS, SNMP) and areas such as CLI, NMS Northbound Interfaces, XML and XSLT is desirable. Experience with any Security Information and Event Management (SIEM) product like Arcsight, QRadar, RSA NetWitness Suite, SolarWinds Log & Event Manager, McAfee Enterprise Security Manager etc. Hands on experience with deploying and troubleshooting Virtual Machine (VMWare or KVM), and understanding of K8s, dockers and containers. Knowledge of ScreenOS and JUNOS based devices a plus. Hands on Experience with scripting like Shell, Python, Ansible etc a plus Certification on Juniper products or any relevant certifications are a plus. About Juniper Networks Juniper Networks challenges the inherent complexity that comes with networking and security in the multicloud era. We do this with products, solutions and services that transform the way people connect, work and live. We simplify the process of transitioning to a secure and automated multicloud environment to enable secure, AI-driven networks that connect the world. Additional information can be found at Juniper Networks (www.juniper.net) or connect with Juniper on Twitter, LinkedIn and Facebook. WHERE WILL YOU DO YOUR BEST WORK? Wherever you are in the world, whether it's downtown Sunnyvale or London, Westford or Bengaluru, Juniper is a place that was founded on disruptive thinking - where colleague innovation is not only valued, but expected. We believe that the great task of delivering a new network for the next decade is delivered through the creativity and commitment of our people. The Juniper Way is the commitment to all our colleagues that the culture and company inspire their best work-their life's work. At Juniper we believe this is more than a job - it's an opportunity to help change the world. At Juniper Networks, we are committed to elevating talent by creating a trust-based environment where we can all thrive together. If you think you have what it takes, but do not necessarily check every single box, please consider applying. We’d love to speak with you. Additional Information for United States jobs: ELIGIBILITY TO WORK AND E-VERIFY In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire. Juniper Networks participates in the E-Verify program. E-Verify is an Internet-based system operated by the Department of Homeland Security (DHS) in partnership with the Social Security Administration (SSA) that allows participating employers to electronically verify the employment eligibility of new hires and the validity of their Social Security Numbers. Information for applicants about E-Verify / E-Verify Información en español: This Company Participates in E-Verify / Este Empleador Participa en E-Verify Immigrant and Employee Rights Section (IER) - The Right to Work / El Derecho a Trabajar E-Verify® is a registered trademark of the U.S. Department of Homeland Security. Juniper is an Equal Opportunity workplace. We do not discriminate in employment decisions on the basis of race, color, religion, gender (including pregnancy), national origin, political affiliation, sexual orientation, gender identity or expression, marital status, disability, genetic information, age, veteran status, or any other applicable legally protected characteristic. All employment decisions are made on the basis of individual qualifications, merit, and business need. Show more Show less
Posted 2 months ago
0 years
0 Lacs
Bengaluru, Karnataka, India
Remote
The Sr. QA Analyst will provide deep level analysis for client investigations utilizing customer provided data sources, audit, and monitoring tools at both the government and enterprise level. The Sr. Threat Analyst will work closely with our Technology Engineers, Architects, and Threat Analysts to service customers. How You’ll Make An Impact High level professional writing experience regarding documenting and reporting on potential security incidents identified in customer environments to include timeline of events. Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets. Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc. Perform knowledge transfers, document, and train clients regarding mitigation of identified threats. Provide ongoing recommendations to peers and customers on tuning and best practices. Actively research current threats and attack vectors being exploited in the wild Actively work with analysts and perform investigations on escalations. Ability to discuss security posture with multiple clients and make recommendations to better their holistic security approach. Provide gap analysis for clients to better their security posture. Maintain and develop SOPs for threat analyst team. Develop and maintain Playbooks and runbooks. Work with internal teams to increase efficiency and effectiveness of security analysis provided by the threat analysis team. Training of new analysts on security and tools Create and maintain Content Catalog based on security essentials and the evolving threat landscape. Provide quality assurance (QA) review of security alerts handled by Team members. Conduct regular security audits to ensure compliance with industry standards and regulations. Evaluate security controls, policies, and procedures. Identify vulnerabilities and enhance remediation actions. What We’re Looking For Five years of full-time professional experience in the Information Security field Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment as a point of escalation. Excellent time management, reporting, and communication skills including customer interactions and executive presentations. Data analysis using SIEM, Database tools, and Excel. Experience troubleshooting security devices and SIEM. Ability to create and maintain content within SIEM environments and make recommendations to clients to better their visibility. IDS monitoring/analysis with tools such as Sourcefire and Snort Experience with SIEM platforms preferred (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk) a plus. Experience with audit tools, MS office, Power BI Knowledge of security information and event management (SIEM) systems. Understanding of cloud security and virtualization. Direct (E.g., SQL Injection) versus indirect (E.g., cross-site scripting) attacks Experience with the following attacks: Web Based Attacks and the OWASP Top 10, Network Based DoS, Brute force, HTTP Based DoS, Denial of Service, Network Based / System Based Attacks. Familiarity with SANS top 20 critical security controls Understand the foundations of enterprise Windows security including Active Directory, Windows security architecture and terminology, Privilege escalation techniques, Common mitigation controls and system hardening. Anti-Virus (AV) and Host Based Intrusion Prevention (HIPS) Experience in monitoring at least one commercial AV solution such as (but not limited to) McAfee/Intel, Symantec, Sophos, or Trend Micro Ability to identify common false positives and make suggestions on tuning. Understanding of root causes of malware and proactive mitigation Propagation of malware in enterprise environments Familiarity with web-based exploit kits and the methods employed by web-based exploit kits. Familiarity with concepts associated with Advanced Persistent Threats and “targeted malware.” Experience and understanding of malware protection tools (FireEye) and controls in an enterprise environment. Covert channels, egress, and data exfiltration techniques Familiarity with vulnerability scoring systems such as CVSS. Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks This team provides 24/7 support. This role requires shift flexibility, including the ability to rotate between days, mids, and nights. What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer (EEO). All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, status as an individual with a disability, veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time. Show more Show less
Posted 2 months ago
35 years
0 Lacs
Indore, Madhya Pradesh, India
On-site
Were looking for an experienced and strategic Cyber Security Engineer with 35 years of hands-on expertise in securing enterprise environments. The ideal candidate will be responsible for enhancing the organizations security posture by proactively identifying risks, implementing defense mechanisms, and driving compliance initiatives across systems, networks, and applications. Experience: 35 Years Location: Indore Job Type: Full-time Bond: 1 Year Key Responsibilities Design, implement, and maintain robust cybersecurity architectures and defense strategies. Lead vulnerability assessments, threat modeling, penetration testing, and risk mitigation. Monitor and manage SIEM systems to detect, analyze, and respond to threats in real-time. Collaborate with infrastructure, DevOps, and development teams to embed security across the SDLC. Define, update, and enforce security policies, SOPs, and incident response plans. Conduct periodic internal/external audits and coordinate compliance efforts (ISO 27001, GDPR, etc.). Investigate security breaches and generate detailed post-incident reports. Evaluate and recommend advanced tools and technologies for endpoint, network, and cloud security. Deliver cybersecurity awareness training to internal teams and stakeholders. Technical Skills Required Strong understanding of security frameworks (NIST, ISO 27001, CIS Controls). Deep knowledge of firewalls, VPNs, IDS/IPS, endpoint protection, and network monitoring tools. Hands-on with tools such as Wireshark, Metasploit, Nessus, Nmap, Burp Suite, and SIEM platforms like Splunk, ELK, or QRadar. Solid experience with cloud security (AWS, Azure, or GCP). Competency in scripting or automation using Python, PowerShell, or Bash. Familiarity with secure configuration management and patch management practices. Excellent analytical, documentation, and incident management skills. Show more Show less
Posted 2 months ago
2 - 6 years
1 - 5 Lacs
Thane, Navi Mumbai, Mumbai (All Areas)
Work from Office
SIEM (Microsoft Sentinel, Wazuh, Splunk, QRadar Azure Security Center multi-cloud environments (AWS, Azure, GCP) SOAR, Azure Sentinel Note: Sentinel One not required
Posted 2 months ago
5 - 6 years
11 - 15 Lacs
Thane
Work from Office
OT Cybersecurity Engineer for Digital Industries Customer Services, India About Siemens Accelerating transformation for industries For us, it all starts and ends with our customers. Maximizing value for them is what drives us! Combining the real world of automation with the digital world of information technology opens up completely new possibilities for our customers in all industries, empowering them to make better decisions and enable them to accelerate their transformation to become a Digital Enterprise. With our unique portfolio, we can make a decisive contribution to sustainable industrial innovation transforming the everyday and creating a better tomorrow for societies and people around the world. Cybersecurity for Industry We give Cybersecurity for Industry the highest priority in successful digitalization, so we place it at the center of our development of innovative products, solutions, and services. We rely on the multilayer Defense in Depth concept strengthened by Zero Trust principles. This ensures reliable and always up-to-date protection on all levels, thanks to three pillars plant security, network security, and system integrity including Industrial Cybersecurity Services. At Digital Industries we create and implement digital manufacturing concepts for our vertical customer based on the Digital Enterprise software suite, TIA, MindSphere, Industrial Edge and Industrial cybersecurity offerings from Digital Industries. Are you passionate about safeguarding critical infrastructure and ensuring the security of industrial control systems? Join our team as a Cybersecurity Engineer and play a pivotal role in protecting our ICS and SIS systems, networks, and information. About The Role Key Responsibilities: Security MeasuresEngineer, implement, and monitor robust security measures to protect ICS and SIS systems, related networks, and sensitive information. System Security RequirementsIdentify and define system security requirements to ensure comprehensive protection. Security ArchitectureDesign and develop detailed cybersecurity architectures and designs, adhering to industry-standard blueprints and best practices. Implementing Backup Solutions and ManagementImplement and manage system backup technologies like Acronis, Veritas, Veeam and other providers, overseeing installation and deployment. Threat Detection and Vulnerability monitoringImplement solution like Claroty or Nozomi at ICS for the customers. Installing remediation to risk score for the customer. Endpoint SecurityDeploy and manage endpoint security and application control solutions from providers like McAfee, as well as SIEM solutions such as McAfee, Splunk, and Q-radar etc. Network SecurityImplement and manage network-based firewalls (e.g., Siemens, Fortinet, Palo Alto, CISCO), network troubleshooting, and intrusion detection products. Network ManagementInstall and manage network management solutions like SiNEC NMS, SolarWinds, WhatsUp Gold etc. Firmware UpdatesConduct firmware updates for various automation control systems, switches, and firewalls. Domain Controller ConfigurationConfigure and deploy domain controller settings and policies to defined computer groups as per approved list for ICS. Host-Based SecurityImplement host-based security technologies, including antivirus, data leakage prevention, host IPS, whitelisting, and anomaly detection. Installation and TestingPerform installation, configuration, and testing activities at both factory and customer sites, with experience in Factory Acceptance Testing (FAT) and Site Acceptance Testing (SAT). DocumentationPrepare comprehensive system documentation, including functional design specifications, backup systems documentation, firewall configurations, network diagrams, system architectures, asset inventory, FAT and SAT procedures, and operation & maintenance manuals. Experience 5 to 6 years of experience in working for OT Security systems design, implementation and consulting with at least some experience in industrial automation systems design. Proven experience in cybersecurity, particularly in ICS. Strong understanding of cybersecurity principles and best practices. Proficiency in managing backup technologies, endpoint security, SIEM solutions, and network-based firewalls. Hands-on experience with network management solutions and firmware updates. Ability to configure domain controllers and implement host-based security technologies. Excellent documentation skills and experience with FAT and SAT procedures. Education o Bachelor"™s degree in engineering (Electrical Engineering, Computer Engineering, or related field). A degree in Cybersecurity is preferred. o Valid certification in OT security (e.g., CISSP, GICSP, OSCP) would be additional advantage. Business Travel You will be in the delivery and implementation team and hence should be willing to travel and experience various manufacturing sites across India
Posted 2 months ago
2 - 3 years
7 - 11 Lacs
Bengaluru
Work from Office
Introduction Siemens Healthineers develops MedTech products that support better patient outcomes with greater efficiencies, giving providers confidence that they need to meet the clinical, operational, and financial challenges of a changing healthcare landscape. With 70,000+ employees Siemens Healthineers is one of the world"™s largest suppliers of technology to the healthcare industry. As a global leader in medical imaging, laboratory diagnostics, and healthcare information technology, we have a keen understanding of the entire patient care continuum"”from prevention and early detection to diagnosis and treatment. Brief Description: An Information Security Management system is maintained to address the complex challenges and threats in the rapidly evolving digital landscape and fulfill the organization"™s purpose and values. As an Information Security Professional, you will play an essential role in implementing and maintaining our Information Security requirements in accordance with ISO27001 and other relevant regulatory standards. You will gain expertise in driving implementation of various Information security topics in a cross-collaborative environment. What are my key Responsibilities? Assist the implementation and continuous improvement of the ISO27001 Information Security Management System (ISMS). Conduct regular risk assessments and internal audits to ensure compliance with ISO27001 standards. Ensure adherence to all relevant regulatory requirements as directed by the Global Cybersecurity Governance Organization and country specific cybersecurity requirements. Assist to Develop and maintain policies, procedures, and process documentation to meet the Information Security requirements. Work closely with various departments to collect and analyze operational security measures and help integrate measures into all aspects of operations without the need for follow-ups or reminders. Assist project teams for information security inquiries and incident response. Monitor and respond to security incidents and breaches, ensuring timely resolution and documentation of incidents. Assist with Planning, coordinating, conducting and preparing detailed audit reports for internal and external audits to assess the effectiveness of the information security program. Follow up on audit recommendations to ensure timely implementation of corrective actions. Maintain a comprehensive audit trail for all information security activities and initiatives. What do I need to qualify for this job? Bachelor"™s degree in engineering, Information Security, Computer Science, or a related field with 4-6 years of working experience. Minimum of 2-3 years of hands-on experience in information security, with a focus on implementing ISO27001. Strong understanding of ISO 27001 requirements, information security principles, risk management, IT infrastructure set up and regulatory requirements. Good understanding of ISO 27701 PIMS standards. Proven ability to work independently and collaboratively with cross-functional teams. Excellent communication, presentation and interpersonal skills. Self-directed with an ability to take ownership and accountability of assigned tasks. Familiarity with Software development best practices for ensuring security. Previous experience with Software quality assurance responsibilities will be preferred. Highly Recommended to have completed Lead Implementor certification in ISO 27001 standard . What else do I need to know? Siemens Healthineers is dedicated to equality and we welcome applications that reflect the diversity of the communities we work in. All employment decisions at Siemens Healthineers are based on qualifications, merit and business need. Bring your curiosity and imagination and help us shape tomorrow. We are looking forward to receiving your online application. Please ensure you complete all areas of the application form to the best of your ability as we will use the data to review your suitability for the role.
Posted 2 months ago
2 - 5 years
11 - 16 Lacs
Sahibzada Ajit Singh Nagar
Work from Office
About Zscaler Serving thousands of enterprise customers around the world including 40% of Fortune 500 companies, Zscaler (NASDAQ: ZS) was founded in 2007 with a mission to make the cloud a safe place to do business and a more enjoyable experience for enterprise users. As the operator of the world’s largest security cloud, Zscaler accelerates digital transformation so enterprises can be more agile, efficient, resilient, and secure. The pioneering, AI-powered Zscaler Zero Trust Exchange™ platform, which is found in our SASE and SSE offerings, protects thousands of enterprise customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Named a Best Workplace in Technology by Fortune and others, Zscaler fosters an inclusive and supportive culture that is home to some of the brightest minds in the industry. If you thrive in an environment that is fast-paced and collaborative, and you are passionate about building and innovating for the greater good, come make your next move with Zscaler. At Zscaler, our Customer Success Organization is a global, customer-focused team dedicated to delivering high-impact experiences and identifying innovative solutions. We leverage valuable data and research to provide expert, hands-on support starting from the implementation phase and beyond, ensuring customers achieve their goals and leverage our technology to its fullest potential. Together, we create a customer-centric culture that fosters success, adoption, and continuous growth. We're looking for an experienced DLP Engineer to join our Customer Success team. Reporting to the Product Support Manager, you'll be responsible for: Providing Level II technical support for DLP solutions, including incident resolution, troubleshooting, and root cause analysis Assisting customers with DLP-related issues via phone, email, and remote sessions, ensuring timely and effective resolution Managing and prioritizing support cases, ensuring SLAs are met and customer satisfaction is maintained while resolving the customers’ issues Maintaining detailed documentation of support activities, including case notes, troubleshooting steps, and resolutions Contributing to the development and maintenance of a knowledge base, including creating and updating technical articles and FAQs What We're Looking for (Minimum Qualifications) Bachelor’s degree in Computer Science, Information Technology, or a related field, or equivalent work experience Minimum of 3-5 years of experience in technical support, with at least 2 years focused on DLP/CASB solutions Proficiency in DLP technologies and tools (e.g., Symantec DLP, McAfee DLP, Forcepoint DLP, etc.) What Will Make You Stand Out (Preferred Qualifications) Relevant certifications (CompTIA Security+, DLP vendor certifications) are a plus #LI-HYBRID #LI-RR1 At Zscaler, we are committed to building a team that reflects the communities we serve and the customers we work with. We foster an inclusive environment that values all backgrounds and perspectives, emphasizing collaboration and belonging. Join us in our mission to make doing business seamless and secure. Our Benefits program is one of the most important ways we support our employees. Zscaler proudly offers comprehensive and inclusive benefits to meet the diverse needs of our employees and their families throughout their life stages, including: Various health plans Time off plans for vacation and sick time Parental leave options Retirement options Education reimbursement In-office perks, and more! By applying for this role, you adhere to applicable laws, regulations, and Zscaler policies, including those related to security and privacy standards and guidelines. Zscaler is committed to providing equal employment opportunities to all individuals. We strive to create a workplace where employees are treated with respect and have the chance to succeed. All qualified applicants will be considered for employment without regard to race, color, religion, sex (including pregnancy or related medical conditions), age, national origin, sexual orientation, gender identity or expression, genetic information, disability status, protected veteran status, or any other characteristic protected by federal, state, or local laws. See more information by clicking on the Know Your Rights: Workplace Discrimination is Illegal link. Pay Transparency Zscaler complies with all applicable federal, state, and local pay transparency rules. Zscaler is committed to providing reasonable support (called accommodations or adjustments) in our recruiting processes for candidates who are differently abled, have long term conditions, mental health conditions or sincerely held religious beliefs, or who are neurodivergent or require pregnancy-related support.
Posted 2 months ago
3 - 8 years
6 - 13 Lacs
Noida
Work from Office
Managed Services SOC Manager Job Summary: The Security Operations Center (SOC) Security L-2 Analyst serves in a SOC team, is responsible for conducting information security investigations as a result of security incidents identified by the Level-1 security analysts who are monitoring the security consoles from various SOC entry channels (SIEM, Tickets, Email and Phone). The L2 SOC Security Analyst is expected to have a solid understanding of information security and computer systems concepts and should be ready to work in shifts. An engineer in this position act as a point of escalation for Level-1 SOC security analysts in support of information security investigations to provide guidance and oversight on incident resolution and containment techniques. Job Description : Responsible for conducting information security investigations as a result of security incidents identified by the Level 1 security analyst who are monitoring the security consoles from various SOC entry channels (SIEM, Tickets, Email and Phone), Act as a point of escalation for Level-1 SOC security analysts in support of information security investigations to provide guidance and oversight on incident resolution and containment techniques. Should have experience in Developing new correlation rules & Parser writing Experience in Log source integration Act as the lead coordinator to individual information security incidents. Mentor security analysts regarding risk management, information security controls, incident analysis, incident response, SIEM monitoring, and other operational tasks (tools, techniques, Procedures) in support of technologies managed by the Security Operations Center. Document incidents from initial detection through final resolution. Participate in security incident management and vulnerability management processes. Coordinate with IT teams on escalations, tracking, performance issues, and outages. Works as part of a team to ensure that corporate data and technology platform components are safeguarded from known threats. Communicate effectively with customers, teammates, and management. Prepare Monthly Executive Summary Reports for managed clients and continuously improve their content and presentation. Provide recommendations in tuning and optimization of security systems, SOC security process, procedures and policies. Define, create and maintain SIEM correlation rules, customer build documents, security process and procedures. Follow ITIL practices regarding incident, problem and change management. Staying up-to-date with emerging security threats including applicable regulatory security requirements. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Publish weekly reports to applicable teams Generate monthly reports on SOC activity Secondary skills like AV, HIPS, DCS, VA/ PT desirable Required Technical Expertise Must have experience in SIEM Management tool (QRADAR) Should have certifications like, ITIL, CCNA, CEH, VA (Product) Certification, CISM Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host based firewalls, Anti-Malware, HIDS General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows NT
Posted 2 months ago
5 - 10 years
20 - 27 Lacs
Hyderabad
Remote
Job Role : SentinelOne Migration Engineer /SIEM Engineer--Work From Home Experience : 5 to 11 Yrs Key Skills: SIEM Administration, SIEM Implementation, SIEM Migration, Integration Notice Period : 0 to 30 days Mode of Work : Remote( 06:00 PM to 03:00 AM IST) Should be willing to work in Second shift Company: Cyber Towers, Quadrant 3, 3rd floor, Madhapur, Hyderabad -- 500081. Job Overview: We are seeking a talented and highly motivated SentinelOne Migration SIEM Engineer to join our Dedicated Defense group. As a key member of our team, you will be responsible for deploying and maintaining SentinelOne's AI SIEM to enhance threat detection, response, and overall security posture. This is an exciting opportunity for an individual with expertise in SIEM technologies, aiming to help safeguard critical systems and data from evolving cyber threats. Responsibilities: Integration & Optimization: Integrate and optimize SentinelOne AI SIEM to improve visibility and automate threat detection workflows. Threat Detection: Utilize SentinelOnes AI-powered analytics to dashboard reports and automate critical reporting functions Automation & Playbook Development: Develop automated detection and response playbooks based on SentinelOne data feeds, streamlining incident management and reducing time to resolution. Collaboration & Knowledge Sharing: Work closely with other security and IT teams to share threat intelligence, optimize SIEM use, and contribute to security strategy development. Reporting & Documentation: Develop and maintain dashboards, reports, and documentation related to SentinelOne deployment, performance, and incident metrics. Continuous Improvement: Continuously evaluate SentinelOne's capabilities and other relevant security tools to recommend improvements and refine detection capabilities. Required Qualifications: Bachelors degree in Computer Science, Information Security, or a related field (or equivalent experience). 1+ year of experience working with SentinelOne AI SIEM Hands-on experience with other SIEM platforms (Splunk, IBM QRadar, Microsoft Sentinel, etc.) and integrating them with endpoint security tools. Strong understanding of cybersecurity principles, threat detection, and SIEM management. Proficiency in scripting and automation (Python, PowerShell, etc.). Experience with cloud security (AWS, Azure, GCP) and cloud-native SIEM solutions is a plus. Preferred Qualifications: SentinelOne certification (or equivalent industry certifications). Knowledge of compliance frameworks (e.g., NIST, ISO 27001, GDPR, etc.) and how they apply to security operations. Key Skills: Technical Skills: SentinelOne platform, SIEM tools, security automation, machine learning for cybersecurity, network security. Analytical Skills: Strong ability to analyze large datasets and correlate logs/events. Communication Skills: Excellent verbal and written communication skills for collaborating with cross-functional teams and providing clear reporting. Problem-Solving: Strong troubleshooting skills with the ability to resolve complex security issues quickly and effectively.
Posted 2 months ago
4 - 8 years
3 - 8 Lacs
Bengaluru
Work from Office
Role & responsibilities SOC L2 Qradar : Incident Triage and Escalation : Review security alerts and incidents, determine severity, and escalate to the appropriate teams (e.g., L3, incident response) when necessary. Security Monitoring : Leverage SIEM tools like QRadar to actively monitor security events, correlate data, and detect abnormal patterns or potential threats. Root Cause Analysis : Investigate security incidents thoroughly to identify the root cause, using log analysis and threat intelligence to gain deeper insights. Incident Response : Coordinate and contribute to the response efforts during active security incidents, ensuring rapid mitigation and recovery. Threat Hunting : Proactively search for hidden threats within the network, looking for unusual activity or patterns that may indicate compromise or vulnerabilities. Log Analysis : Deep dive into logs (from firewalls, IDS/IPS, endpoints, etc.) to detect suspicious behavior and correlate events for comprehensive insights. False Positive Reduction : Work on refining SIEM alerts to minimize false positives, improving detection efficiency and alert quality. Collaboration with L3 and Other Teams : Communicate findings and assist L3 analysts or other internal teams with deeper investigations and remediation actions. Documentation and Reporting : Accurately document incidents, their findings, and remediation steps, and generate reports for management and stakeholders. Continuous Learning and Improvement : Stay updated on the latest security threats, attack techniques, and tools, and contribute to improving security processes and detection capabilities.
Posted 2 months ago
1 - 4 years
2 - 5 Lacs
Thrissur
Work from Office
Job Title: SOC Analyst L1 Company: Aujas Cybersecurity Location: [Thrissur] Experience: 0 -2 Years Employment Type: Full-Time Job Summary: We are hiring an entry-level SOC Analyst (L1) to join our Security Operations Center. The candidate will monitor security events, perform initial analysis, and escalate incidents as per standard procedures. Key Responsibilities: Monitor and analyze security alerts from SIEM tools (e.g.QRadar,Arcsight) Perform basic triage and escalate incidents Support incident response and reporting Work in 24x7 rotational shifts Requirements: Basic knowledge of cybersecurity, networking, and SIEM tools Good communication and analytical skills Willing to work in shifts
Posted 2 months ago
5 - 8 years
12 - 20 Lacs
Pune, Chennai, Bengaluru
Work from Office
Role & responsibilities Bachelors degree in Computer Science, Information Technology, Cybersecurity, or a related field; Master’s degree preferred. Lead and mentor the SOC team, fostering a culture of continuous improvement and collaboration. Oversee the day-to-day operations of the SOC, ensuring efficient incident detection, response, and recovery processes Collaborate with IT and business units to integrate cybersecurity measures into existing and new technology deployments Manage cybersecurity projects, including the selection and implementation of state-of-the-art security tools and technologies. Conduct regular security assessments, penetration testing, and proactive threat hunting to identify and mitigate potential security vulnerabilities. Relevant cybersecurity certifications such as CISSP, CISM, CEH, or GIAC. At least 5 years of experience in cybersecurity, with a minimum of 3 years in a leadership role within an SOC environment. Extensive knowledge of and experience with cybersecurity regulations and standards. Proficient in managing and configuring security technologies (e.g., SIEM, firewall, IDS/IPS, EDR, and vulnerability management tools). Demonstrated ability to lead and develop high-performing teams. Excellent problem-solving, communication, and presentation skills. Must be a flexible to work in US Shift
Posted 2 months ago
2 - 5 years
2 - 6 Lacs
Hyderabad
Work from Office
SOC T1 Analyst What you will do Let’s do this. Let’s change the world. In this vital role you will responsible for the initial response to security events and incidents within a 24/7 Cybersecurity Operations Center (CSOC). This role involves following established procedures to investigate security events, providing feedback to improve processes, and assisting in the incident response lifecycle. Additionally, the associate will participate in knowledge-sharing sessions and correlate security alerts across platforms. Roles & Responsibilities: Follow established procedures to triage, investigate and respond to security events and incidents. Provide feedback to senior analysts to improve, review, and optimize existing procedures and documentation. Correlate security alerts from various platforms based on common elements. Participate in and lead CSOC Tier 1 knowledge-sharing and learning sessions. Assist incident responders in coordinating the response, containment, eradication, recovery, and lessons learned phases of the incident response lifecycle. What we expect of you We are all different, yet we all use our unique contributions to serve patients. Basic Qualifications: Bachelor’s degree with 1 to 3 yeras of experience in Security Operations or related field OR Diploma with 4 to 7 year of experience in Security Operations or related field Solid understanding of security technologies and their core functionality Experience in analyzing cybersecurity threats with up-to-date knowledge of attack vectors and the cyber threat landscape. Ability to prioritize tasks effectively and solve problems efficiently in a diverse, global team environment. Good knowledge of Windows and/or Linux systems. Preferred Qualifications: Familiarity with CSOC operations and incident response procedures. Experience with security alert correlation across different platforms. Professional Certifications: CompTIA Security+ (preferred) CEH (preferred) GSEC (preferred) MTA Security Fundamentals (preferred) Soft Skills: Strong communication and collaboration skills, especially when working with global teams. Ability to prioritize and manage tasks in high-pressure situations. Critical thinking and problem-solving abilities in cybersecurity contexts. A commitment to continuous learning and knowledge sharing. Work Hours: This position requires you to work a later shift and may be assigned a second or third shift schedule. Candidates must be willing and able to work during evening or night shifts, as required. Potential Shifts (subject to change based on business requirements)Second Shift2:00pm – 10:00pm IST; Third Shift10:00 pm – 7:00 am IST. What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Posted 2 months ago
3 - 7 years
5 - 9 Lacs
Gurugram
Work from Office
AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. AtAHEAD, we prioritize creating a culture of belonging,where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer,anddo not discriminatebased onan individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, maritalstatus,or any other protected characteristic under applicable law, whether actual or perceived. We embraceall candidatesthatwillcontribute to the diversification and enrichment of ideas andperspectives atAHEAD. Requirements: Proficient with Active Directory and related concepts Familiar with access control methods (RBAC/ABAC) Working knowledge of identity lifecycle management processes and challenges Hands-on experience with cybersecurity tools that function in the following spacesPAM / PIM / IAM, DLP, SOAR (XSIAM), Microsoft Security, AWS Security, Red Teaming / AppSec, Isolated Recovery Environments (IREs) Experience with identity federation and SSO solutions PAM experience or familiarity with specific vendor tools Able to speak to PAM best practices Understanding of the principle of least privilege, separation of duties Experience with REST API and app integration Experience configuring, guiding, or overseeing access review and certification, role management Past participation in identity steering committee Understanding of PIM, JIT, conditional access Familiarity with US compliance and regulatory frameworks that inform identity requirements Qualifications: 6+ years of working knowledge of one or more Identity-Based Security SolutionsOkta, Sailpoint, Delinea, BeyondTrust, CyberArk, etc. Any of the following preferred but not required Security+, CISSP, any vendor-specific certifications related to Identity products Willingness to travel to support client projects and shadowing opportunities (50+ % of the time) Why AHEAD: Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between. We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning. USA Employment Benefits include - Medical, Dental, and Vision Insurance - 401(k) - Paid company holidays - Paid time off - Paid parental and caregiver leave - Plus more! See benefits https://www.aheadbenefits.com/ for additional details. The compensation range indicated in this posting reflects the On-Target Earnings (OTE) for this role, which includes a base salary and any applicable target bonus amount. This OTE range may vary based on the candidates relevant experience, qualifications, and geographic location.
Posted 2 months ago
5 - 10 years
4 - 8 Lacs
Bengaluru
Work from Office
Project Role : Security Delivery Practitioner Project Role Description : Assist in defining requirements, designing and building security components, and testing efforts. Must have skills : Splunk Good to have skills : Risk Management Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Practitioner, you will assist in defining requirements, designing and building security components, and testing efforts. Your day will involve collaborating with teams, contributing to key decisions, and providing solutions to problems across multiple teams. Main Skill1. Splunk or Microsoft Sentinel or Google Chronicle Use Case Management2. Risk Based Alerts and Risk Incidents3. Asset and Identities4. Security Incident Response, Standard Operations Procedure Knowledge Must have Skills: 1. Development, Testing and Fine Tuning of Splunk content like Use Cases, Dashboards, Reports, Lookups, Macros, etc.2. Risk Based Alerts and Risk Incidents3. Asset and Identities Framework in Splunk4. Incident Response, Standard Operations Procedure Knowledge5. MITRE Attack Framework Good to Have Skills: 1. Splunk Architecture Cloud, Microsoft Sentinel, Google Chronicle2. Source Integrations various sources3. Event Parsing, Event Type definition, Data Model, Regex 4. Custom integrations for enrichment, Threat Intelligence Feeds, SOAR5. Azure DevOps Roles & Responsibilities1. Architecture and strategy:Candidate must have ability to understand and implement use cases on security tools (Splunk, Phantom) to improve Accenture's overall security posture by identifying gaps in use cases or processes that can be actioned by our engineers. It also includes the ability to develop and communicate a security strategy that addresses the unique risks and challenges of Accentures Security environments.2. Leadership:Candidate must have ability to lead and influence cross-functional teams. It includes the ability to communicate effectively with stakeholders, build consensus, and manage conflict. 3. Technical:The candidate should be able to understand existing security use cases and develop new ones in tools requiring technical development, scripting, or complex rule creations, managing, and implementing broad security concepts.4. Operational:Candidate must have ability to develop and implement security controls, as well as the ability to monitor and analyze security events and incidents. Technical Experience1. Splunk Enterprise Security, Microsoft Sentinel, Google Chronicle2. Azure DevOps3. Custom Tools Development4. Security Incident ManagementProfessional Experience1. At least 5-7 years of experience on IT Security / SOC / Cyber Defense2. Graduation – BE3. Proficient use of English, advanced communication skills.4. Security Certifications are a plus - CCSK, GPEN, GCCC, GMOB, GSEC, ESCA, Security +, CEHRole Description: Support SIEM detection content creation for notables with a focus on Risk Based Alerting. Create and maintain documentation on new or existing detections, integrations, and dependencies. Interface with our SOC to pilot new content, process feedback, update incident response guidelines. Engage in fine-tuning of existing detections to increase signal/noise ratio and reduce false positives. Additional Information: The candidate should have a minimum of 5 years of experience in Splunk This position is based at our Bengaluru office A 15 years full time education is required Qualification 15 years full time education
Posted 2 months ago
5 - 8 years
5 - 12 Lacs
Bengaluru
Work from Office
https://zrec.in/jXrSD?source=CareerSite
Posted 2 months ago
5 - 8 years
0 Lacs
Kanayannur, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Senior (CTM – Threat Detection & Response) KEY Capabilities: Experience in working with Splunk Enterprise, Splunk Enterprise Security & Splunk UEBAMinimum of Splunk Power User CertificationGood knowledge in programming or Scripting languages such as Python (preferred), JavaScript (preferred), Bash, PowerShell, Bash, etc.Perform remote and on-site gap assessment of the SIEM solution.Define evaluation criteria & approach based on the Client requirement & scope factoring industry best practices & regulationsConduct interview with stakeholders, review documents (SOPs, Architecture diagrams etc.) Evaluate SIEM based on the defined criteria and prepare audit reportsGood experience in providing consulting to customers during the testing, evaluation, pilot, production and training phases to ensure a successful deployment.Understand customer requirements and recommend best practices for SIEM solutions. Offer consultative advice in security principles and best practices related to SIEM operationsDesign and document a SIEM solution to meet the customer needsExperience in onboarding data into Splunk from various sources including unsupported (in-house built) by creating custom parsersVerification of data of log sources in the SIEM, following the Common Information Model (CIM)Experience in parsing and masking of data prior to ingestion in SIEMProvide support for the data collection, processing, analysis and operational reporting systems including planning, installation, configuration, testing, troubleshooting and problem resolutionAssist clients to fully optimize the SIEM system capabilities as well as the audit and logging features of the event log sourcesAssist client with technical guidance to configure end log sources (in-scope) to be integrated to the SIEMExperience in handling big data integration via SplunkExpertise in SIEM content development which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systemsHands-on experience in development and customization of Splunk Apps & Add-OnsBuilds advanced visualizations (Interactive Drilldown, Glass tables etc.)Build and integrate contextual data into notable eventsExperience in creating use cases under Cyber kill chain and MITRE attack frameworkCapability in developing advanced dashboards (with CSS, JavaScript, HTML, XML) and reports that can provide near real time visibility into the performance of client applications.Experience in installation, configuration and usage of premium Splunk Apps and Add-ons such as ES App, UEBA, ITSI etcSound knowledge in configuration of Alerts and Reports.Good exposure in automatic lookup, data models and creating complex SPL queries.Create, modify and tune the SIEM rules to adjust the specifications of alerts and incidents to meet client requirementWork with the client SPOC to for correlation rule tuning (as per use case management life cycle), incident classification and prioritization recommendationsExperience in creating custom commands, custom alert action, adaptive response actions etc. Qualification & experience: Minimum of 3 to 6 years’ experience with a depth of network architecture knowledge that will translate over to deploying and integrating a complicated security intelligence solution into global enterprise environments. Strong oral, written and listening skills are an essential component to effective consulting.Strong background in network administration. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary.Must have knowledge of Vulnerability Management, Windows and Linux basics including installations, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting.Good to have below mentioned experience with designing and implementation of Splunk with a focus on IT Operations, Application Analytics, User Experience, Application Performance and Security ManagementMultiple cluster deployments & management experience as per Vendor guidelines and industry best practicesTroubleshoot Splunk platform and application issues, escalate the issue and work with Splunk support to resolve issuesCertification in any one of the SIEM Solution such as IBM QRadar, Exabeam, Securonix will be an added advantageCertifications in a core security related discipline will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 2 months ago
2 years
0 - 0 Lacs
Saibaba Colony, Coimbatore, Tamil Nadu
Work from Office
Key Responsibilities Design and deliver cybersecurity training programs (online or in-person) Create course materials, labs, and assessments aligned with industry standards Train students on cybersecurity fundamentals, ethical hacking, SOC analysis, SIEM tools, network security, and more Stay current with the latest cybersecurity trends, tools, and threats Support students during practical sessions, helping troubleshoot and explain real-world scenarios Evaluate student progress and provide constructive feedback Customize training content for different audiences (entry-level to advanced) Maintain records of attendance, assessments, and certifications Required Skills & Qualifications Bachelor’s degree in Computer Science, IT, Cybersecurity, or related field (or equivalent experience) 2+ years of hands-on cybersecurity experience (SOC, penetration testing, incident response, etc.) Experience in teaching, training, mentoring, or technical presentations Strong knowledge of: Network security concepts Ethical hacking tools (e.g., Kali Linux, Metasploit) Security frameworks (e.g., NIST, MITRE ATT&CK) SIEM tools (e.g., Splunk, QRadar) Excellent communication and presentation skills Industry certifications preferred: CompTIA Security+, CEH, CISSP, CISA, or similar Job Types: Full-time, Part-time Pay: ₹15,000.00 - ₹20,000.00 per month Schedule: Evening shift Monday to Friday Morning shift Rotational shift Weekend availability Work Location: In person
Posted 2 months ago
5 years
0 Lacs
Gurgaon, Haryana, India
Hybrid
Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Technical Services Implementation Engineer (L2) is a developing subject matter expert, responsible for ensuring that client solution requirements are resolved in line with Service Level Agreements (SLA). This role performs configurations, action installations and attend to break/fix events. What You'll Be Doing Key Responsibilities: B.E. /B. Tech in Computer Science/ Electronics /ECE / EE / ECS / IT Engineering/MCA/BCAAt least one SIEM solution certifications with one or more SIEM/ Security solutions (i.e., RSA NetWitness, Splunk ES, Elastic ELK, HP ArcSight, IBM QRadar Log Rhythm). At least one L3 level security certifications viz. CCIE/CISSP/CISA/CCNP etc. Minimum 7 years of experience in handling security related products& services in an organization and out of total experience, 5 years of minimum experience should be as an L2 in SOC management. Person should have adequate knowledge of Check point firewall and IPS and Cisco firewall and IPS, McAfee IPS, Web Application Firewall, DDOS and other security devicesAdministration of SIEM environment (eg: deployment of solution, user management, managing the licenses, upgrades and patch deployment, addition or deletion of log sources, configuration management, change management, report management, manage backup and recovery etc)Construction of SIEM content required to produce Content Outputs (e.g., filters, active lists, correlation rules, reports, report templates, queries, trends, variables)Integration of customized threat intelligence content feeds provided by the Threat Intelligence & Analytics serviceIdentifies possible sensor improvements to prevent incidentsCollects/updates threat intelligence feeds from various sourcesCreates situational awareness briefingsCo-ordinates with the different departments for incident analysis, containment and remediationLiaise with Security monitoring team to discover repeatable process that lead to new content developmentProvides engineering analysis and architectural design of technical solutionsDevice integration, Creation of Co relation rules and Parser developmentSound analytical and troubleshooting skillsGood Team Management and co-ordination skills Academic Qualifications and Certifications: Bachelor's degree or equivalent in Computer Science / Information Technology Degree or equivalent together with specialized training in new technologies and legacy systems or equivalent. Required Experience: Moderate level of experience in a technical implementation engineering or similar role. Demonstrated experience engaging with clients and conducting presentations. Demonstrated project administration and documentation experience. Workplace type: Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39817 Jobs | Dublin
Wipro
19388 Jobs | Bengaluru
Accenture in India
15458 Jobs | Dublin 2
EY
14907 Jobs | London
Uplers
11185 Jobs | Ahmedabad
Amazon
10459 Jobs | Seattle,WA
IBM
9256 Jobs | Armonk
Oracle
9226 Jobs | Redwood City
Accenture services Pvt Ltd
7971 Jobs |
Capgemini
7704 Jobs | Paris,France