Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
3.0 years
0 Lacs
Pune, Maharashtra, India
On-site
About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. About The Role We are seeking a highly skilled Security Analyst (Level 2) to join our MSSP SOC team. The ideal candidate will have expertise in SIEM (Splunk, QRadar), XDR/EDR solutions, and security analysis with hands-on experience in investigating and responding to security alerts. This role requires proficiency in reviewing and analyzing Level 1 alerts, providing detailed recommendations, and engaging with customers for incident handling. The candidate should also have basic SIEM administration knowledge and Python scripting skills for troubleshooting and playbook development. Key Responsibilities Threat Detection & Response: Analyze and investigate security alerts, events, and incidents generated by SIEM, XDR, and EDR solutions. Incident Investigation & Handling: Conduct in-depth security incident investigations, assess impact, and take appropriate actions. Incident Escalation & Communication: Escalate critical incidents to Level 3 analysts or senior security teams while maintaining detailed documentation. Content Management: Develop and fine-tune correlation rules, use cases, and alerts in SIEM/XDR platforms to improve detection accuracy. Malware Analysis: Perform basic malware analysis and forensic investigation to assess threats. Customer Request Handling: Collaborate with customers to address security concerns, provide recommendations, and respond to inquiries. SIEM Administration: Assist in the administration and maintenance of SIEM tools like Splunk or QRadar, ensuring smooth operations. Automation & Playbooks: Utilize Python scripting for automation, troubleshooting, and playbook development to enhance SOC efficiency. Reporting & Documentation: Prepare detailed reports on security incidents, trends, and mitigation strategies. Basic Qualifications B.E/B. Tech degree in computer science, Information Technology, Masters in Cybersecurity 3+ years of experience in a SOC or cybersecurity operations role. Strong knowledge of SIEM tools (Splunk, QRadar) and XDR/EDR solutions. Hands-on experience in threat detection, security monitoring, and incident response. Knowledge of network security, intrusion detection, malware analysis, and forensics. Basic experience in SIEM administration (log ingestion, rule creation, dashboard management). Proficiency in Python scripting for automation and playbook development. Good understanding of MITRE ATT&CK framework, security frameworks (NIST, ISO 27001), and threat intelligence. Strong analytical, problem-solving, and communication skills. Ability to work in a 24x7 SOC environment (if applicable) Preferred Qualifications Certified SOC Analyst (CSA) Certified Incident Handler (GCIH, ECIH) Splunk Certified Admin / QRadar Certified Analyst CompTIA Security+ / CEH / CISSP (preferred but not mandatory Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted. Show more Show less
Posted 2 weeks ago
1.0 years
0 Lacs
Navi Mumbai, Maharashtra
On-site
Job Title : Cyber Security Analyst Location : Navi Mumbai, Maharashtra Experience : Minimum 1 year Employment Type : Full-time Job Summary : We are seeking a proactive and detail-oriented Cyber Security Analyst with at least 1 year of hands-on experience in cybersecurity tools and operations. The ideal candidate will be responsible for protecting enterprise systems and networks, focusing on endpoint protection, proxy management, and threat analysis . Experience with McAfee, Netskope, and Zscaler is essential. Key Responsibilities : Monitor, investigate, and respond to security incidents and alerts across the organization’s infrastructure. Administer and maintain McAfee endpoint security tools and ensure up-to-date threat definitions. Manage web proxy solutions including Zscaler and Netskope , analyzing logs and enforcing policy-based controls. Identify and analyze potential threats using SIEM tools, and escalate as necessary. Collaborate with internal IT teams and external vendors to resolve security issues effectively. Perform vulnerability assessments and support compliance initiatives. Maintain detailed documentation of configurations, policies, and incident reports. Support audits and implement remediation plans based on security findings. Required Skills & Qualifications : Bachelor's degree in Computer Science, Information Technology, or related field. Minimum 1 year of experience in cyber security or information security domain. Hands-on experience with: McAfee Endpoint Security suite. Zscaler (Proxy & Internet Access solutions). Netskope Cloud Security Platform. Good understanding of firewall rules, threat detection, malware analysis, and data loss prevention (DLP). Familiarity with security incident management processes and tools like SIEM (e.g., Splunk, QRadar). Strong analytical and problem-solving skills. Excellent communication and documentation skills. Job Types: Full-time, Permanent Pay: Up to ₹85,000.00 per month Benefits: Internet reimbursement Supplemental Pay: Performance bonus Application Question(s): Do you have experience in these domains like Mcafee, Netskope, and Zscalar in Proxy? Experience: minimum: 1 year (Required) Language: English (Required) Location: Navi Mumbai, Maharashtra (Required) Work Location: In person
Posted 2 weeks ago
5.0 years
0 Lacs
Pune, Maharashtra, India
On-site
About Position: We at Persistent are looking for a Threat Hunter with experience in Threat Hunting, Malware Analysis. Role: Threat Hunter Location: Pune Experience: 5 to 10 years Job Type: Full Time Employment What You'll Do: 3+ years in threat hunting Job Summary: We are seeking a proactive and analytical Threat Hunter to join our cybersecurity team. The ideal candidate will be responsible for identifying, investigating, and mitigating advanced threats that evade traditional security defenses. Analyzing and reviewing and validating the logs from the log sources. Suggesting user case fine tuning, new use case creation. Troubleshooting SIEM issues related to log sources. Collaborating with other members of the SOC team, as well as internal and external stakeholders, to resolve complex security incidents. Keeping up to date with the latest cybersecurity threats, trends, and technologies to improve the efficiency and effectiveness of incident response. As a Threat Hunter, you will leverage threat intelligence, analytics, and internal telemetry to detect signs of compromise and anomalous behavior across the enterprise environment. Key Responsibilities: Proactively hunt for unknown threats in the environment using a hypothesis-driven approach Analyze large volumes of logs, telemetry, and data from EDR, SIEM, network traffic, and other sources Develop and refine detection logic to identify stealthy and novel threats. Expertise You'll Bring: Strong understanding of cyber kill chain, MITRE ATT&CK, and threat actor behavior Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel) Familiarity with EDR solutions (e.g., CrowdStrike, Carbon Black, Cisco Amp Microsoft Defender) Scripting skills in Python, PowerShell, or similar languages Benefits: Competitive salary and benefits package Culture focused on talent development with quarterly promotion cycles and company-sponsored higher education and certifications Opportunity to work with cutting-edge technologies Employee engagement initiatives such as project parties, flexible work hours, and Long Service awards Annual health check-ups Insurance coverage: group term life, personal accident, and Mediclaim hospitalization for self, spouse, two children, and parents Inclusive Environment: Persistent Ltd. is dedicated to fostering diversity and inclusion in the workplace. We invite applications from all qualified individuals, including those with disabilities, and regardless of gender or gender preference. We welcome diverse candidates from all backgrounds. We offer hybrid work options and flexible working hours to accommodate various needs and preferences. Our office is equipped with accessible facilities, including adjustable workstations, ergonomic chairs, and assistive technologies to support employees with physical disabilities. If you are a person with disabilities and have specific requirements, please inform us during the application process or at any time during your employment. We are committed to creating an inclusive environment where all employees can thrive. Our company fosters a values-driven and people-centric work environment that enables our employees to: Accelerate growth, both professionally and personally Impact the world in powerful, positive ways, using the latest technologies Enjoy collaborative innovation, with diversity and work-life wellbeing at the core Unlock global opportunities to work and learn with the industry’s best Let’s unleash your full potential at Persistent “Persistent is an Equal Opportunity Employer and prohibits discrimination and harassment of any kind.” Show more Show less
Posted 2 weeks ago
5.0 - 10.0 years
10 - 18 Lacs
Kolkata
Work from Office
We are looking for a highly experienced Senior Cybersecurity Engineer with advanced skills in Splunk, CrowdStrike, vulnerability management, and identity provider (IDP) systems. This role will be instrumental in building robust detection, response, and identity-integrated security capabilities to defend against evolving threats. The ideal candidate will have a hands-on, security engineering mindset and a proven track record working across endpoint protection, SIEM, and identity systems. Key Responsibilities: Deploy, manage, and optimize Splunk Enterprise Security (ES) for real-time detection, alerting, and correlation of security events. Design and build custom SPL queries, dashboards, and threat detection logic, integrating data from CrowdStrike, IDPs, and vulnerability scanners. Lead the vulnerability management program, including scanning (Qualys, Tenable, Rapid7), analysis, risk prioritization, and driving remediation. Maintain and configure CrowdStrike Falcon, including prevention policies, detection tuning, response playbooks, and integration with SIEM and SOAR platforms. Leverage CrowdStrike telemetry for threat hunting, endpoint investigations, and threat actor tracking. Integrate and manage IDP platforms (e.g., Okta, Azure AD, Entra ID) to secure identity access, enforce MFA/SSO, and detect anomalous user behavior. Correlate identity, endpoint, and vulnerability data to drive risk-based alerting and incident response. Collaborate with incident response, IAM, infrastructure, and compliance teams to maintain a resilient and auditable security posture. Required Qualifications: Bachelors degree in Computer Science, Cybersecurity, or related field. 5+ years of experience in cybersecurity roles with significant hands-on expertise in: Splunk (SPL, ES, dashboards, alerting) CrowdStrike Falcon (EDR management, threat hunting, integration) Vulnerability Management (Qualys, Tenable, or Rapid7) IDP platforms (Okta, Azure AD, Entra ID, etc.) Experience with scripting (Python, Bash, PowerShell) and API integrations. Familiarity with MITRE ATT&CK, threat modeling, CVSS, and Zero Trust principles. Preferred Certifications: Splunk Certified Architect or Admin CrowdStrike Certified Falcon Administrator (CCFA) or higher Okta Certified Professional or Azure Security Engineer Associate CISSP, OSCP, GIAC (GCIH, GMON, GCIA)
Posted 2 weeks ago
0 years
0 Lacs
Delhi
On-site
Job requisition ID :: 82284 Date: May 31, 2025 Location: Delhi Designation: Deputy Manager Entity: You will be responsible for managing and maintaining the IBM QRadar Security Information and Event Management (SIEM) platform. Your primary role will involve deploying, configuring, and optimizing the QRadar system to ensure effective security monitoring, event correlation, and threat detection within the organization's infrastructure. You will collaborate with security analysts, network engineers, and other IT teams to implement and maintain a robust security infrastructure.
Posted 2 weeks ago
7.0 years
22 - 25 Lacs
Gurgaon
On-site
Designation: SOC analyst L3 Experience: 7-15 Year Office Location: Sector 18, Gurugram Job Type: Full-time Job Summary: We are seeking an experienced and proactive SOC Analyst Level 3 to join our cybersecurity operations team. As a senior member of the Blue Team, you will lead threat detection, incident response, and threat hunting efforts using cutting-edge tools including SOAR and XDR platforms. You will also play a key role in mentoring junior analysts, fine-tuning detection mechanisms, and developing automated playbooks. Key Responsibilities: * Lead real-time monitoring and analysis of security events from various sources (XDR, SIEM, SOAR, etc.). * Coordinate and perform advanced threat hunting across endpoints, networks, and cloud environments. * Analyze alerts and incidents to identify false positives and true threats. * Manage and develop SOAR playbooks to improve response times and incident handling. * Correlate threat intelligence with internal events to identify potential risks. * Drive incident response efforts, including containment, eradication, and recovery. * Collaborate with cross-functional teams to remediate vulnerabilities and prevent recurrence. * Perform forensic analysis as part of post-incident review and root cause analysis. * Mentor and train SOC Level 1 and 2 analysts. * Maintain and optimize detection rules and signatures in XDR and SIEM platforms. * Document investigation findings, incident reports, and threat hunting activities. Required Skills & Qualifications: * 7+ years of experience in Security Operations, Incident Response, or Cyber Threat Detection. * Deep understanding of Blue Team methodologies and defense-in-depth strategies. * Hands-on experience with SOAR platforms (e.g., Cortex XSOAR, Splunk SOAR, or similar). * Strong experience with XDR solutions (e.g., Palo Alto Cortex XDR, Microsoft Defender XDR, SentinelOne). * Advanced threat hunting techniques using both manual and automated approaches. * Proficient in using SIEM tools (Splunk, QRadar, or similar) and correlating log data from multiple sources. * Knowledge of MITRE ATT&CK framework and its application in threat detection and response. * Strong scripting and automation skills (Python, PowerShell, etc.) for SOAR and data parsing. * Familiarity with EDR, NDR, IDS/IPS, and endpoint forensic tools. * Solid understanding of TCP/IP, network protocols, and operating system internals (Windows, Linux). * Excellent communication and analytical skills. Job Type: Full-time Pay: ₹2,200,000.00 - ₹2,500,000.00 per year Schedule: Day shift Night shift Work Location: In person
Posted 2 weeks ago
1.0 years
0 - 0 Lacs
Noida
On-site
Job Title: DLP Operations and Trellix Security Analyst Location: Noida, India Job Type: Full-time Experience: 1+ years Job Summary: We are seeking a skilled and detail-oriented DLP (Data Loss Prevention) Operations and Trellix Security Analyst to manage and enhance data protection mechanisms using Trellix (formerly McAfee) and other DLP tools. The role requires hands-on experience in managing DLP incidents, policies, and responding to data security breaches. Key Responsibilities: Monitor, triage, and respond to DLP alerts triggered by endpoint, network, and cloud data movement using Trellix DLP platform. Analyze and investigate DLP incidents to identify root causes and recommend mitigation actions. Administer and maintain Trellix DLP solutions including policy creation, updates, and exception handling. Coordinate with IT, Legal, and HR teams on DLP incident response and investigations. Generate periodic reports and dashboards for DLP events, trends, and policy violations. Perform periodic DLP rule tuning and false positive reduction. Ensure DLP systems are updated, patched, and compliant with security policies. Collaborate with the Information Security team to improve overall data protection strategy. Participate in internal and external audits related to data protection. Required Skills: Strong hands-on experience with Trellix DLP (formerly McAfee DLP) or similar platforms (Forcepoint, Symantec, Microsoft Purview). Knowledge of data classification , content inspection , regex patterns , incident workflows . Understanding of security frameworks such as ISO 27001, NIST, GDPR, and other data privacy regulations. Experience with SIEM tools (Splunk, QRadar) is a plus. Familiarity with endpoint security, email/web gateways, and data exfiltration methods. Excellent analytical, communication, and documentation skills. Qualifications: Bachelor’s degree in Computer Science, Information Security, or related field. Relevant certifications like CEH, CISA, Trellix/McAfee Certified Product Specialist , or DLP-specific certifications preferred. Minimum 3 years of experience in DLP operations or information security roles. Preferred Attributes: Proactive attitude and ability to work independently. Strong ethical standards and attention to data privacy. Ability to manage and prioritize multiple tasks in a fast-paced environment. Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹50,000.00 per month Benefits: Internet reimbursement Supplemental Pay: Performance bonus Application Question(s): Do you have experience in DLP Operation and Trellix? Experience: minimum: 1 year (Required) Language: English (Required) Location: Noida, Uttar Pradesh (Required) Work Location: In person
Posted 2 weeks ago
8.0 - 10.0 years
0 Lacs
Pune, Maharashtra, India
On-site
About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. Position Summary We are seeking an experienced and highly skilled Technical Lead with a strong background in Java/Python, SaaS architectures, firewalls and cybersecurity products, including SIEM and SOAR platforms. The ideal candidate will lead technical initiatives, design and implement scalable systems, and drive best practices across the engineering team. This role requires deep technical expertise, leadership abilities, and a passion for building secure and high-performing security solutions. Key Responsibilities Lead the design and development of scalable and secure software solutions using Java/Python. Architect and build SaaS-based cybersecurity applications, ensuring high availability, performance, and reliability. Provide technical leadership, mentoring, and guidance to the development team. Ensure best practices in secure coding, threat modeling, and compliance with industry standards. Collaborate with cross-functional teams including Product Management, Security, and DevOps to deliver high-quality security solutions. Design and implement security analytics, automation workflows and ITSM integrations. Drive continuous improvements in engineering processes, tools, and technologies. Basic Qualifications A bachelor’s or master’s degree in computer science, electronics engineering or a related field 8-10 years of software development experience, with expertise in Java and/or Python. Strong background in building SaaS applications with cloud-native architectures (AWS, GCP, or Azure). In-depth understanding of microservices architecture, APIs, and distributed systems. Experience with containerization and orchestration tools like Docker and Kubernetes. Knowledge of DevSecOps principles, CI/CD pipelines, and infrastructure as code (Terraform, Ansible, etc.). Strong problem-solving skills and ability to work in an agile, fast-paced environment. Excellent communication and leadership skills, with a track record of mentoring engineers. Preferred Qualifications Experience with cybersecurity solutions, including SIEM (e.g., Splunk, ELK, IBM QRadar) and SOAR (e.g., Palo Alto XSOAR, Swimlane). Knowledge of zero-trust security models and secure API development. Hands-on experience with machine learning or AI-driven security analytics. Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted. Show more Show less
Posted 2 weeks ago
3.0 - 1.0 years
0 Lacs
Noida, Uttar Pradesh
On-site
Job Title: DLP Operations and Trellix Security Analyst Location: Noida, India Job Type: Full-time Experience: 1+ years Job Summary: We are seeking a skilled and detail-oriented DLP (Data Loss Prevention) Operations and Trellix Security Analyst to manage and enhance data protection mechanisms using Trellix (formerly McAfee) and other DLP tools. The role requires hands-on experience in managing DLP incidents, policies, and responding to data security breaches. Key Responsibilities: Monitor, triage, and respond to DLP alerts triggered by endpoint, network, and cloud data movement using Trellix DLP platform. Analyze and investigate DLP incidents to identify root causes and recommend mitigation actions. Administer and maintain Trellix DLP solutions including policy creation, updates, and exception handling. Coordinate with IT, Legal, and HR teams on DLP incident response and investigations. Generate periodic reports and dashboards for DLP events, trends, and policy violations. Perform periodic DLP rule tuning and false positive reduction. Ensure DLP systems are updated, patched, and compliant with security policies. Collaborate with the Information Security team to improve overall data protection strategy. Participate in internal and external audits related to data protection. Required Skills: Strong hands-on experience with Trellix DLP (formerly McAfee DLP) or similar platforms (Forcepoint, Symantec, Microsoft Purview). Knowledge of data classification , content inspection , regex patterns , incident workflows . Understanding of security frameworks such as ISO 27001, NIST, GDPR, and other data privacy regulations. Experience with SIEM tools (Splunk, QRadar) is a plus. Familiarity with endpoint security, email/web gateways, and data exfiltration methods. Excellent analytical, communication, and documentation skills. Qualifications: Bachelor’s degree in Computer Science, Information Security, or related field. Relevant certifications like CEH, CISA, Trellix/McAfee Certified Product Specialist , or DLP-specific certifications preferred. Minimum 3 years of experience in DLP operations or information security roles. Preferred Attributes: Proactive attitude and ability to work independently. Strong ethical standards and attention to data privacy. Ability to manage and prioritize multiple tasks in a fast-paced environment. Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹50,000.00 per month Benefits: Internet reimbursement Supplemental Pay: Performance bonus Application Question(s): Do you have experience in DLP Operation and Trellix? Experience: minimum: 1 year (Required) Language: English (Required) Location: Noida, Uttar Pradesh (Required) Work Location: In person
Posted 2 weeks ago
0.0 years
0 Lacs
Delhi
On-site
Job requisition ID :: 82284 Date: May 31, 2025 Location: Delhi Designation: Deputy Manager Entity: You will be responsible for managing and maintaining the IBM QRadar Security Information and Event Management (SIEM) platform. Your primary role will involve deploying, configuring, and optimizing the QRadar system to ensure effective security monitoring, event correlation, and threat detection within the organization's infrastructure. You will collaborate with security analysts, network engineers, and other IT teams to implement and maintain a robust security infrastructure.
Posted 2 weeks ago
2.0 - 5.0 years
2 - 6 Lacs
Hyderabad
Work from Office
Join Amgen’s Mission of Serving Patients At Amgen, if you feel like you’re part of something bigger, it’s because you are. Our shared mission—to serve patients living with serious illnesses—drives all that we do. Since 1980, we’ve helped pioneer the world of biotech in our fight against the world’s toughest diseases. With our focus on four therapeutic areas –Oncology, Inflammation, General Medicine, and Rare Disease– we reach millions of patients each year. As a member of the Amgen team, you’ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you’ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. What you will do Let’s do this. Let’s change the world. In this vital role you will be responsible for the initial response to security events and incidents within a 24/7 Cybersecurity Operations Center (CSOC). This role involves following established procedures to investigate security events, providing feedback to improve processes, and assisting in the incident response lifecycle. Additionally, the associate will participate in knowledge-sharing sessions and correlate security alerts across platforms. Roles & Responsibilities: Follow established procedures to triage, investigate and respond to security events and incidents. Provide feedback to senior analysts to improve, review, and optimize existing procedures and documentation. Correlate security alerts from various platforms based on common elements. Participate in and lead CSOC Tier 1 knowledge-sharing and learning sessions. Assist incident responders in coordinating the response, containment, eradication, recovery, and lessons learned phases of the incident response lifecycle. Basic Qualifications: Bachelor’s degree and 0 to 3 years of Security Operations experience OR related field experience Diploma and 4 to 7 years of Security Operations or related field experience Professional Certifications: CompTIA Security+ (preferred) CEH (preferred) GSEC (preferred) MTA Security Fundamentals (preferred) Must-Have Skills: Solid understanding of security technologies and their core functionality Experience in analyzing cybersecurity threats with up-to-date knowledge of attack vectors and the cyber threat landscape. Ability to prioritize tasks effectively and solve problems efficiently in a diverse, distributed team environment. Good knowledge of Windows and/or Linux systems. Familiarity with CSOC operations and incident response procedures. Experience with security alert correlation across different platforms. Preferred Qualifications: Good communication and collaboration skills, especially when working with global teams. Ability to prioritize and manage tasks in high-pressure situations. Critical thinking and problem-solving abilities in cybersecurity contexts. A commitment to continuous learning and knowledge sharing. Work Hours This position requires you to work a later shift and may be assigned a second or third shift schedule. Candidates must be willing and able to work during evening or night shifts, as required. Potential Shifts (subject to change based on business requirements)Second Shift2:00 pm – 10:00 pm IST; Third Shift10:00 pm – 7:00 am IST. What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Posted 2 weeks ago
18.0 - 22.0 years
25 - 30 Lacs
Mumbai
Work from Office
Job Title - Security Account Lead + Associate Director + IMU Management Level:5 Associate Director Location:Mumbai/ New Delhi Must have skills: Cyber Security with P&L responsibility and good networking and relationship building ability Good to have skills: Cyber Strategy, Cyber Protection, Cyber Resilience Job Summary : As a Security Account Lead (SAL), you will be a trusted advisor who builds and executes Accenture vision by combining the best of Accenture Security and the power of One Accenture to meet our clients needs and help them become cyber resilient business. This is a critical role on the client account leadership team. Roles & Responsibilities: - Drive Growth for Security Oversee the growth and management of account(s) Accountable for Security P&L for the account(s) Identify new opportunities for business development and expansion within the account(s) Create Value for Clients Truly understand client needs and partner quickly to respond and support client Act as C-Suite advisor, partner with the client across the breadth of security offerings and create connection to other service areas across Accenture Maintain strong brand reputation through exceptional delivery and value for clients Bring the best of Accenture and Security Leverage the best of Accenture and Security, including service offerings, innovations, solution tablets, industry perspectives and proof of value (PoV), to deliver value to our clients Bring in experts from across Accenture from other offerings in support of client needs Build Exceptional Relationships Build and nurture relationships as an integral part of the Accenture team Cultivate relationships across One Accenture and Ecosystems partners Inspire teams and act with a Growth Mindset Create an engaging project environment for people to learn and grow Demonstrate a positive, growth mindset with openness to new ideas, innovations, and opportunities that keep the team challenged Professional & Technical Skills: - Must Have Skills: Proficiency in the Cyber Security environment - Strong networking and relationship building skills in the Financial Services and Products domain i.e. Consumer goods, Life Sciences, Utilities, Resources, Manufacturing etc. Additional Information: - The ideal candidate will possess a strong background in cyber security field, along with a proven track record of delivering impactful solutions to clients. This position is based at either Mumbai or New Delhi location. About Our Company | AccentureQualification Experience: Minimum 18-22 years of progressive functional and consulting experience. Educational Qualification: Masters degree in business administration (MBA) or post graduate degree in management (PGDM) from premier institutes preferred
Posted 2 weeks ago
3.0 - 6.0 years
2 - 6 Lacs
Pune
Work from Office
Template Job Title - Security Operations Center (SOC) Operator Management Level : CL11 Analyst / CL 10 Senior Analyst Location: Pune, PDC3C, Hinjewadi Must have skills: Excellent verbal and written communication skills Access control alarm monitoring CCTV monitoring Risk monitoring Handling safety / security related calls from employees Good to have skills: Experience in Global Security Operations Center / Regional Security Operations Center Sending mass notification / people advisory to employees / travel advisories Job Summary : The SOC Operator will be responsible for assessing, analyzing, and responding to incidents related to safety and security for the APAC region. The role requires daily use of tools/systems (e.g., access control, video management, risk feeds) to detect the impact to Accentures people, products, property, or brand image and alert the appropriate response stakeholders. Specifically, incidents may range from extreme weather conditions, political instability, crime, terror, civil unrest, and other personnel issues. In addition, the Operator will be responsible for customer service tasks to provide critical information and assistance to travelers, static employees, and potentially third parties. This role will be based in Hinjewadi, Pune, Maharashtra and reports to the SOC Shift Supervisor. Roles & Responsibilities: Monitor and operate security systems including access control and CCTV, along with environmental monitoring and mass notification systems. Respond quickly and initiate action related to alarms, phone calls, and environmental monitoring and alerting systems Notify, assist, and direct external emergency personnel and internal resources as necessary Dispatch security officers or law enforcement personnel for alarm response, calls for service, and emergency situations Execute protocols and communicate at all levels across the APAC region to employees, site security leads, safety & security staff, or contracted officers as needed Manage information flows to and from an incident Maintain operational logs, conduct daily shift checklists, handover reports, and incident reports Ensure all forms of communication, such as e-mails, phone conversations, and client interactions, are conducted in a courteous and professional manner, confidentially, and documented appropriately Coordinate with Accentures Corporate Security regional leads on incident detection and management Coordinate with Accentures Corporate executive protection leads on incident detection and management Ensure that complete and accurate information is entered into the incident management system Utilize and execute protocols and standard operating procedures to effectively manage global incidents. Monitor travel safety and security of the company's staff Maintain situational awareness of current global current events. Monitor and respond to global alerts and events affecting company facilities and employees providing immediate information and assistance as needed Initiate mass communication notifications as required Notify leadership of events affecting business operations and employees Ensure proper handling of highly confidential information. Perform other duties assigned by supervisors related to security and safety Additional Information: Experience with CCTV/video management and access control systems such as Genetec video solutions or CCure 9000 Experience with protective intelligence monitoring tools such as Everbridge and ISOS Tracker Great active listening skills Rapport building skills Patient and empathetic attitude Adaptability and flexibility Ability to analyze threats and envision potential or real time impact to operations Ability to respond quickly and calmly to emergencies and stressful situations by exercising proper judgment and decision-making skills Strong Customer Service skills Strong consensus, team building and negotiating skills Ability to work overtime on short notice Strong cultural sensitivities Be able to type a minimum of 35 words per min Excellent written and verbal communication skills Ability to multitask in a fast-paced, at times stressed work environment Strong team player Comfortable with high-tech work environment, and constant learning of new tools and innovations Proficient in Microsoft Windows and Office Suite About Our Company | Accenture (do not remove the hyperlink) Qualification Experience: Minimum 2 year(s) of experience is required Educational Qualification: Degree in any stream
Posted 2 weeks ago
15.0 - 25.0 years
12 - 16 Lacs
Bengaluru
Work from Office
Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : Security Governance Good to have skills : NAMinimum 15 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Roles & Responsibilities:- Expected to be a SME with deep knowledge and experience.- Should have Influencing and Advisory skills.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Expected to provide solutions to problems that apply across multiple teams.- Lead and mentor junior team members.- Develop and implement security governance frameworks.- Ensure compliance with security policies and regulations. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Delivery Governance.- Good To Have Skills: Experience with Identity Access Management (IAM), Security Information and Event Management (SIEM), Managed Cloud Security Services.- Strong understanding of security governance principles.- Experience in implementing security controls and measures.- Knowledge of risk management and compliance frameworks. Additional Information:- The candidate should have a minimum of 15 years of experience in Security Delivery Governance.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
3.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : Microsoft Azure Sentinel Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Developer, you will be responsible for designing, building, and configuring applications to meet business process and application requirements. You will play a crucial role in developing innovative solutions to enhance business operations and efficiency. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Develop and implement software solutions to meet business requirements.- Collaborate with team members to design and optimize applications.- Troubleshoot and resolve technical issues in application development.- Stay updated with the latest technologies and trends in application development.- Provide technical guidance and support to junior team members. Professional & Technical Skills: - Must To Have Skills: Proficiency in Microsoft Azure Sentinel.- Strong understanding of cloud computing principles.- Experience with Azure services like Azure Functions, Azure Logic Apps.- Knowledge of DevOps practices and tools.- Hands-on experience in developing and deploying applications on Azure.- Good To Have Skills: Experience with Azure Security Center. Additional Information:- The candidate should have a minimum of 3 years of experience in Microsoft Azure Sentinel.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
15.0 - 20.0 years
12 - 16 Lacs
Gurugram
Work from Office
Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : Integrated Security Risk Management Good to have skills : Security GovernanceMinimum 18 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Roles & Responsibilities:- Expected to be a SME with deep knowledge and experience.- Should have influencing and Advisory skills.- Engage with multiple teams and responsible for team decisions.- Expected to provide solutions to problems that apply across multiple teams, and provide solutions to business area problems.- Lead the implementation and delivery of Security Services projects.- Utilize global delivery capability including methods, tools, training, and assets.- Provide expert advice and guidance on security governance.- Collaborate with various teams to ensure effective security solutions. Professional & Technical Skills: - Must To Have Skills: Proficiency in Integrated Security Risk Management.- Good To Have Skills: Experience with Security Governance.- Strong understanding of security risk management principles.- Knowledge of security governance frameworks and best practices.- Experience in leading security service delivery projects.- Excellent communication and leadership skills. Additional Information:- The candidate should have a minimum of 18 years of experience in Integrated Security Risk Management.- This position is based at our Gurugram office.- A 15 years full-time education is required. Qualification 15 years full time education
Posted 2 weeks ago
3.0 - 8.0 years
5 - 9 Lacs
Pune
Work from Office
Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : Microsoft Azure Sentinel Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Developer, you will be responsible for designing, building, and configuring applications to meet business process and application requirements. You will play a crucial role in developing solutions to enhance business operations and efficiency. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Collaborate with cross-functional teams to analyze business requirements and translate them into technical solutions.- Develop and implement software solutions to meet business needs.- Conduct code reviews and ensure code quality and best practices are followed.- Troubleshoot and debug applications to resolve issues in a timely manner.- Stay updated on emerging technologies and trends to suggest improvements and innovative solutions. Professional & Technical Skills: - Must To Have Skills: Proficiency in Microsoft Azure Sentinel.- Strong understanding of cloud computing principles and experience with Azure services.- Experience in designing and implementing scalable and secure applications on Azure cloud.- Knowledge of DevOps practices and tools for continuous integration and deployment.- Hands-on experience with monitoring, logging, and alerting tools for cloud-based applications. Additional Information:- The candidate should have a minimum of 3 years of experience in Microsoft Azure Sentinel.- This position is based at our Pune office.- A 15 years full-time education is required. Qualification 15 years full time education
Posted 2 weeks ago
15.0 - 25.0 years
12 - 16 Lacs
Bengaluru
Work from Office
Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : Security Delivery Governance Good to have skills : Identity Access Management (IAM), Security Information and Event Management (SIEM)Minimum 15 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Roles & Responsibilities:- Expected to be a SME with deep knowledge and experience.- Should have Influencing and Advisory skills.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Expected to provide solutions to problems that apply across multiple teams.- Lead and mentor junior team members.- Develop and implement security governance frameworks.- Ensure compliance with security policies and regulations. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Delivery Governance.- Good To Have Skills: Experience with Security Information and Event Management (SIEM), Identity Access Management (IAM).- Strong understanding of security governance principles.- Experience in implementing security controls and measures.- Knowledge of security risk management.- Ability to conduct security assessments and audits. Additional Information:- The candidate should have a minimum of 15 years of experience in Security Delivery Governance.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
3.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : Microsoft Azure Sentinel Good to have skills : DevOpsMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Developer, you will design, build, and configure applications to meet business process and application requirements. You will collaborate with teams to ensure seamless integration and functionality of applications. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work-related problems.- Develop and implement software solutions to meet business requirements.- Collaborate with cross-functional teams to ensure application functionality.- Conduct code reviews and provide feedback for continuous improvement.- Stay updated with industry trends and technologies for enhancing applications.- Assist in troubleshooting and resolving application issues. Professional & Technical Skills: - Must To Have Skills: Proficiency in Microsoft Azure Sentinel.- Good To Have Skills: Experience with DevOps.- Strong understanding of cloud computing principles and practices.- Knowledge of software development lifecycle and methodologies.- Experience in designing and implementing scalable applications.- Familiarity with security protocols and best practices. Additional Information:- The candidate should have a minimum of 3 years of experience in Microsoft Azure Sentinel.- This position is based at our Bengaluru office.- A 15 years full-time education is required. Qualification 15 years full time education
Posted 2 weeks ago
3.0 - 8.0 years
13 - 17 Lacs
Gurugram
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Endpoint Extended Detection and Response Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are seeking a skilled cybersecurity professional with hands-on experience in managing and optimizing CrowdStrike EDR, FIM, Host Firewall, MxDR solutions. As a CrowdStrike EDR Specialist, you will play a critical role in endpoint threat detection, incident response, and continuous monitoring of the enterprise environment to identify and remediate cyber threats. Roles & Responsibilities:-Deploy, configure, and maintain CrowdStrike Falcon EDR agents across enterprise endpoints.-Monitor CrowdStrike dashboards and alerts for suspicious activity, malware, and unauthorized behavior.-Investigate, analyze, and respond to endpoint-related security incidents.-Create and tune detection rules, indicators of compromise (IOCs), and response workflows.-Collaborate with SOC teams, IT administrators, and incident responders on security investigations.-Perform threat hunting using CrowdStrike Falcon and other tools.-Develop reports and dashboards that provide visibility into the EDR environment and incident trends.-Ensure EDR platform integration with SIEM and other cybersecurity tools.-Stay updated on emerging threats and recommend configuration or policy improvements.-Knowledge and Exposure on Service Now ticketing for Incident Management, Problem Management and Change Management. Professional & Technical Skills: -Experience in a EDR (CrowdStrike) or threat detection role.-Strong hands-on experience with CrowdStrike Falcon EDR (deployment, policy management, investigation, etc.).-Solid understanding of malware, endpoint threats, and attack vectors.-Familiarity with MITRE ATT&CK framework and threat intelligence principles.-Experience with scripting (PowerShell, Python, etc.) and automation tools is a plus.-Knowledge of SIEM platforms (Splunk, QRadar, etc.) and their integration with EDR.-Relevant certifications preferred (e.g., CrowdStrike CCFA, FIM, Azure Fundamental). Additional Information:- The candidate should have minimum 3 years of experience in Endpoint Extended Detection and Response.- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field (or equivalent experience).- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
15.0 - 20.0 years
3 - 7 Lacs
Bengaluru
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : CyberArk Privileged Access Management Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. Your typical day will involve collaborating with various teams to implement security measures, conducting risk assessments, and ensuring compliance with security policies. You will also engage in proactive monitoring of security systems and respond to potential threats, all while maintaining a focus on safeguarding information and business processes against cyber threats. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Develop and implement security protocols and procedures to enhance the overall security posture.- Conduct regular security audits and assessments to identify vulnerabilities and recommend improvements. Professional & Technical Skills: - Must To Have Skills: Proficiency in CyberArk Privileged Access Management.- Experience with identity and access management solutions.- Strong understanding of security frameworks and compliance standards.- Familiarity with incident response and threat detection methodologies.- Knowledge of network security principles and practices. Additional Information:- The candidate should have minimum 7.5 years of experience in CyberArk Privileged Access Management.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
15.0 - 20.0 years
3 - 7 Lacs
Bengaluru
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : ForgeRock Access Management Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. Your typical day will involve collaborating with various teams to implement security measures, conducting risk assessments, and ensuring compliance with security policies. You will also engage in proactive monitoring of security systems to identify potential threats and vulnerabilities, while continuously improving security protocols to safeguard the organizations information and infrastructure. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Conduct regular security audits and assessments to identify vulnerabilities and recommend improvements.- Develop and implement security policies and procedures to ensure compliance with industry standards. Professional & Technical Skills: - Must To Have Skills: Proficiency in ForgeRock Access Management.- Good To Have Skills: Experience with identity and access management solutions.- Strong understanding of security protocols and frameworks.- Experience with incident response and threat analysis.- Familiarity with cloud security practices and technologies. Additional Information:- The candidate should have minimum 7.5 years of experience in ForgeRock Access Management.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
7.0 - 12.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Work with asset owners to ensure the timely and efficient collection of computer security events and logs for the purpose of detecting and responding to information security incidents. Roles & Responsibilities:- Lead the implementation and delivery of Security Services projects- Leverage global delivery capability for successful project execution- Ensure adherence to project timelines and quality standards Professional & Technical Skills- Proficiency in any Security Information and Event Management (SIEM)- Experience with Security Risk Assessment, Google SecOps- Strong understanding of security principles and practices- Experience in implementing security solutions- Knowledge of threat detection and incident response- Ability to analyze and interpret security data- Engage with multiple teams and contribute on key decisions- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Provide solutions to problems for their immediate team and across multiple teams- Verify custom reports, manage log source groups, and validate log sources with client- Maintain a close partnership with SIEM on feature requests, upgrade planning, and product roadmap alignment- Focus on content creation regarding advanced threat analysis (rules, variables, trending, watch lists, etc.) of incoming data and for self-monitoring of the solution itself.- Perform supporting tasks such as system hardening, high availability configurations, and developing backup strategies.- Identify and implement Automation opportunities in project- Troubleshoot issues with log sources or systems with vendor, and report system defects as needed- Coordinate & lead the technical discussions with Client/vendors.- Identify root cause of security incidents.- Implement SOC best practices to deliver business outcomes Professional & Technical Skills: -Experience in Information Security, Risk Management, Infrastructure Security and Compliance- Experience on SOC Operation-Experience in working UBA and Advanced Threat Detection- Any Security device Installations, Configuration, and troubleshooting (e.g., firewall, IDS, etc.)- Hands on experience in any SIEM tool- Mid-level expertise in UNIX, Linux, and Windows- Experience working in a diversified, virtual environment.-Scripting experience in any language- Experience in data manipulation and regular expressions- Experience with Database installation & configuration- Certifications such as CISSP, ITIL, CISA, CISM, GIAC-GCIA, AWS/Azure/Cloud based Certifications- Advanced Certification from any SIEM vendor on products such as ArcSight, QRadar, McAfee Nitro, RSA SA, SPLUNK, Google SecOps etc. Additional Information:- The candidate should have a minimum of 7.5 years of experience in Security Information and Event Management (SIEM)- This position is based at our Bengaluru office- A 15 years full time education is required Qualification 15 years full time education
Posted 2 weeks ago
5.0 - 9.0 years
8 - 12 Lacs
Bengaluru
Work from Office
About Us Capco, a Wipro company, is a global technology and management consulting firm. Awarded with Consultancy of the year in the British Bank Award and has been ranked Top 100 Best Companies for Women in India 2022 by Avtar & Seramount . With our presence across 32 cities across globe, we support 100+ clients across banking, financial and Energy sectors. We are recognized for our deep transformation execution and delivery. WHY JOIN CAPCO You will work on engaging projects with the largest international and local banks, insurance companies, payment service providers and other key players in the industry. The projects that will transform the financial services industry. MAKE AN IMPACT Innovative thinking, delivery excellence and thought leadership to help our clients transform their business. Together with our clients and industry partners, we deliver disruptive work that is changing energy and financial services. #BEYOURSELFATWORK Capco has a tolerant, open culture that values diversity, inclusivity, and creativity. CAREER ADVANCEMENT With no forced hierarchy at Capco, everyone has the opportunity to grow as we grow, taking their career into their own hands. DIVERSITY & INCLUSION We believe that diversity of people and perspective gives us a competitive advantage. Location- Bangalore/Pune Work Mode - Hybrid (3 Days) Experience - 6+ Years Experienced in Project/Program PMO Experienced in handling stakeholders in different geos Experienced in working with Global customers Experienced in Project/Program Financials/budgeting and tracking Experienced in RAID log management Experienced in setting up steerco meetings and chairing it Experienced in working on executive reports/steerco deck/etc Experienced in working for financial services customers/projects Have thorough understanding on Project SDLC/governance Good communication skills Willing to work in UK shift timing WHY JOIN CAPCO You will work on engaging projects with some of the largest banks in the world, on projects that will transform the financial services industry. We offer A work culture focused on innovation and creating lasting value for our clients and employees Ongoing learning opportunities to help you acquire new skills or deepen existing expertise A flat, non-hierarchical structure that will enable you to work with senior partners and directly with clients A diverse, inclusive, meritocratic culture We offer: A work culture focused on innovation and creating lasting value for our clients and employees Ongoing learning opportunities to help you acquire new skills or deepen existing expertise A flat, non-hierarchical structure that will enable you to work with senior partners and directly with clients
Posted 2 weeks ago
6.0 - 11.0 years
4 - 8 Lacs
Mumbai, Bengaluru
Work from Office
The SOC Analyst is responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents using a variety of tools and technologies. This role is critical in protecting the organizations digital assets and ensuring compliance with security policies and standards. Monitor SIEM systems and security tools for suspicious activity. Analyze and respond to security incidents and threats. Stay updated on threat intelligence and attack trends. Review logs from firewalls, IDS/IPS, and antivirus tools. Escalate critical incidents and document findings. Support vulnerability management and remediation tracking. Configure and tune security tools like SIEM and EDR. Ensure compliance with security policies and audits. Collaborate with IT and network teams on investigations. Contribute to process improvements and incident playbooks. Primary Skills SIEM (e.g., Splunk, QRadar, ArcSight) Incident Response Log Analysis Threat Intelligence Secondary Skills Scripting (Python, PowerShell, Bash) Cloud Security (AWS, Azure, GCP) Endpoint Detection and Response (EDR)
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The demand for professionals with expertise in QRadar is on the rise in India. As organizations prioritize cybersecurity and threat detection, the need for skilled individuals who can effectively use QRadar to monitor, detect, and respond to security incidents is increasing. Job seekers looking to enter this field or advance their careers can find promising opportunities in various cities across India.
These cities have a high concentration of tech companies and cybersecurity firms actively seeking professionals with QRadar skills.
The salary range for QRadar professionals in India varies based on experience levels:
Salaries may vary depending on factors such as company size, location, and individual skills.
A typical career path for a QRadar professional may include the following progression:
Advancement to higher positions often requires gaining experience, acquiring additional certifications, and demonstrating expertise in handling complex security challenges.
In addition to expertise in QRadar, professionals in this field may benefit from having skills in:
Having a well-rounded skill set can enhance job prospects and open up opportunities for career growth.
As you explore opportunities in the QRadar job market in India, make sure to prepare thoroughly, showcase your skills and experience confidently, and stay updated on the latest trends in cybersecurity. With the right combination of expertise and determination, you can build a successful career in this dynamic and rewarding field. Good luck!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2