Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 8.0 years
4 - 9 Lacs
Hyderabad, Mumbai (All Areas)
Work from Office
Greetings from Wysetek!! Wysetek leverage's 35 years of rich experience in providing Integrated Technology Solutions to SMEs and Large Corporations across India. We are recruiting for our Technology Solution Division Working Knowledge on Technology/ Product Knowledge (Any One): TrendMicro, Vision one Mode of Work: Onsite/Field Location & Position open for L1, L2 : Mumbai/Hyderabad - 8 (Onsite/Field) L3: 1 opening for Hyderabad - 1 (Onsite ) Job description Implementation & Troubleshooting Implementation of TrendMicro / Endpoint Encryption at client place as per the scope work and their requirement. Troubleshooting client issues and suggesting them best and optimal solution which can secure their systems and servers from theft attack. Giving remote and onsite support to the client. Escalating case to tech team whenever require. Closely working with endpoint encryption for enterprise. Firewall Endpoint Encryption Server Installation & SQL DB Installation for Trend Micro/ Firewall Endpoint Encryption Policy Server. As well as troubleshooting on encryption affected machine and issue resolutions. Closely working with Trend Micro or other antivirus product for enterprise. Trend Micro or other Antivirus Server Installation, Agent package creation, DLP policy management for enterprise users and antivirus agent troubleshooting as per the issue persist. Core Competencies Self-starter with a high energy level Ability to work with all levels of individuals. Good with Escalation matric know how Excellent communicator, both written and verbal Ability to articulate complex technical ideas. Ability to forecast accurately. Technical Experience: Degree qualified in a relevant field (B.E, B. Tech, Computer graduate) or equivalent experience in Implementation & troubleshooting on Load balancer / Web Application Firewall is essential. Relevant Certification will be advantageous. Please login to below link and share the details to help us evaluate better: https://forms.office.com/r/L2MBWkKNq3
Posted 3 weeks ago
3.0 - 7.0 years
2 - 6 Lacs
Hyderabad
Work from Office
Detailed job description - Skill Set: Technically strong hands-on Self-driven Good client communication skills Able to work independently and good team player Flexible to work in PST hour(overlap for some hours) Past development experience for Cisco client is preferred.
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Location: Only Bangalore Contract Security Specialist SOC Position Overview: The Security Analyst works as part of the Security Operations Center (SOC). Successful candidates will be analytical, familiar with multiple security technologies, and provide initial response to security alerts. Responsibilities: Monitors, reviews and interprets security alerts and notifications and provides initial response, analysis and case management Perform mitigation steps to ensure appropriate security event handling and escalate as necessary Become proficient in a variety of security tools within our security suite Examples: A/V, IDS/IPS, NAC, NGFW, SIEM Provide general security knowledge and recommendations to SOC team Provide feedback to information security engineers and assist with security sensor tuning efforts Communicate with technical vulnerability management and incident response teams to validate security events Perform tasks related to security incident response, such as monitoring and discovery Basic Qualifications Information Security experience via work/school Excellent written and verbal communication skills with the ability to explain technical concepts Self-motivated individual who can follow and maintain procedures Attention to detail and motivated to deliver exceptional quality Critical thinking skills Preferred Qualifications: Vendor and industry certifications in security analysis such as Security+, SANS or GIAC Linux and Windows systems administration experience Knowledge of security industry standard frameworks Examples: NIST 800-53, PCI-DSS, FedRamp Scripting or programming experience Examples: PowerShell, Python, RegEx Basic Qualifications Information Security experience via work/school Excellent written and verbal communication skills with the ability to explain technical concepts Self-motivated individual who can follow and maintain procedures Attention to detail and motivated to deliver exceptional quality Critical thinking skills Preferred Qualifications: Vendor and industry certifications in security analysis such as Security+, SANS or GIAC Linux and Windows systems administration experience Knowledge of security industry standard frameworks Examples: NIST 800-53, PCI-DSS, FedRamp Scripting or programming experience Examples: PowerShell, Python, RegEx Mandatory Skills: Security Log Monitoring. Experience: 5-8 Years.
Posted 3 weeks ago
2.0 - 4.0 years
2 - 4 Lacs
Bengaluru, Karnataka, India
Remote
Key Responsibilities: SDL Policy Adherence: Ensure firmware development aligns with Fluke's Security Development Lifecycle (SDL), embedding security best practices from the start Cross-Functional Security Collaboration: Partner with global development teams to embed security into product design, development, and testing Automate Security Scans: Collaborate with DevOps to integrate automated security scans into CI/CD pipelines and address vulnerabilities quickly Establish Security Requirements: Define and communicate security requirements for firmware projects to guide development teams Prioritize and Track Remediations: Assess and prioritize remediation based on risk, compliance, and product impact; track resolution status Incident Response Participation: Contribute firmware security expertise to investigate, contain, and resolve security incidents Compliance and Reporting: Track adherence to SDL policies and generate regular security compliance and posture reports for management Qualifications and Experience: Strong understanding of firmware development and secure development lifecycle (SDL) principles Hands-on experience with firmware security scanning tools such as Binwalk and Firmware Analysis Toolkit Familiarity with DevOps workflows and integrating security tools into CI/CD pipelines Proven ability to collaborate with remote, global development teams and influence security implementation Excellent written and verbal communication skills to convey complex security concepts effectively Strong analytical mindset and attention to detail for vulnerability prioritization and remediation Experience participating in incident response for embedded or firmware-related systems Education: Bachelor's degree in Cybersecurity, Computer Engineering, or related field, or equivalent work experience Preferred certifications: CEH, GSEC, or similar cybersecurity credentials
Posted 3 weeks ago
3.0 - 8.0 years
4 - 8 Lacs
Bengaluru
Work from Office
About The Role Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time educationRole Summary :The SOC Analyst plays a critical role in the first line of cyber defense by monitoring and triaging security alerts generated by Microsoft Sentinel. This role is responsible for identifying potential threats through continuous monitoring of security dashboards, performing initial analysis, executing predefined response actions, and escalating incidents based on severity. The analyst will work closely with L2/L3 analysts to ensure timely escalation and incident closure while maintaining accuracy and SLA adherence. This role is ideal for individuals developing their skills in SIEM operations and security monitoring with a focus on Microsofts security ecosystem.Key Responsibilities- Monitor Microsoft Sentinel dashboards and respond to alerts.- Perform initial triage, classification, and correlation of security events.- Trigger and monitor predefined SOAR playbooks.- Create and update incident tickets with all required details.- Escalate validated incidents to L2/L3 teams for deeper investigation.- Support daily SOC health checks and Sentinel connector status reviews Skills Required- 4-8 years of experience in SOC / IT security.- Basic knowledge of Microsoft Sentinel and KQL.- Familiarity with Defender for Endpoint, Identity, and Microsoft 365 Security.- Ability to follow runbooks, good verbal and written communication. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Information and Event Management (SIEM) Operations.- Strong understanding of incident response processes and procedures.- Experience with security monitoring tools and techniques.- Knowledge of compliance frameworks and regulations related to cybersecurity.- Ability to analyze security incidents and provide actionable insights. Additional Information:- The candidate should have minimum 3 years of experience in Security Information and Event Management (SIEM) Operations.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
3.0 - 8.0 years
4 - 8 Lacs
Bengaluru
Work from Office
About The Role Project Role : Security Delivery Practitioner Project Role Description : Assist in defining requirements, designing and building security components, and testing efforts. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time educationRole Summary :The SOC Analyst plays a critical role in the first line of cyber defense by monitoring and triaging security alerts generated by Microsoft Sentinel. This role is responsible for identifying potential threats through continuous monitoring of security dashboards, performing initial analysis, executing predefined response actions, and escalating incidents based on severity. The analyst will work closely with L2/L3 analysts to ensure timely escalation and incident closure while maintaining accuracy and SLA adherence. This role is ideal for individuals developing their skills in SIEM operations and security monitoring with a focus on Microsofts security ecosystem.Key Responsibilities-Monitor Microsoft Sentinel dashboards and respond to alerts.-Perform initial triage, classification, and correlation of security events.-Trigger and monitor predefined SOAR playbooks.-Create and update incident tickets with all required details.-Escalate validated incidents to L2/L3 teams for deeper investigation.-Support daily SOC health checks and Sentinel connector status reviews. Professional & Technical Skills: -Must To Have Skills: Proficiency in Security Information and Event Management (SIEM).-Strong understanding of cloud security principles and frameworks.-Experience with security incident response and management.-Knowledge of regulatory compliance requirements related to cloud security.-Familiarity with security tools and technologies used in cloud environments.-Experience in SOC / IT security.-Basic knowledge of Microsoft Sentinel and KQL.-Familiarity with Defender for Endpoint, Identity, and Microsoft 365 Security.-Ability to follow runbooks, good verbal and written communication. Additional Information:-The candidate should have minimum 3 years of experience in Security Information and Event Management (SIEM).-This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
2.0 - 5.0 years
1 - 5 Lacs
Pune
Work from Office
About The Role Job Title - Security Operations Center (SOC) Operator Management Level : CL11 Analyst / CL 10 Senior Analyst Location: Pune, PDC3C, Hinjewadi Must have skills: Excellent verbal and written communication skills Access control alarm monitoring CCTV monitoring Risk monitoring Handling safety / security related calls from employees Good to have skills: Experience in Global Security Operations Center / Regional Security Operations Center Sending mass notification / people advisory to employees / travel advisories Job Summary : The SOC Operator will be responsible for assessing, analyzing, and responding to incidents related to safety and security for the APAC region. The role requires daily use of tools/systems (e.g., access control, video management, risk feeds) to detect the impact to Accentures people, products, property, or brand image and alert the appropriate response stakeholders. Specifically, incidents may range from extreme weather conditions, political instability, crime, terror, civil unrest, and other personnel issues. In addition, the Operator will be responsible for customer service tasks to provide critical information and assistance to travelers, static employees, and potentially third parties. This role will be based in Hinjewadi, Pune, Maharashtra and reports to the SOC Shift Supervisor. Roles & Responsibilities: Monitor and operate security systems including access control and CCTV, along with environmental monitoring and mass notification systems. Respond quickly and initiate action related to alarms, phone calls, and environmental monitoring and alerting systems Notify, assist, and direct external emergency personnel and internal resources as necessary Dispatch security officers or law enforcement personnel for alarm response, calls for service, and emergency situations Execute protocols and communicate at all levels across the APAC region to employees, site security leads, safety & security staff, or contracted officers as needed Manage information flows to and from an incident Maintain operational logs, conduct daily shift checklists, handover reports, and incident reports Ensure all forms of communication, such as e-mails, phone conversations, and client interactions, are conducted in a courteous and professional manner, confidentially, and documented appropriately Coordinate with Accentures Corporate Security regional leads on incident detection and management Coordinate with Accentures Corporate executive protection leads on incident detection and management Ensure that complete and accurate information is entered into the incident management system Utilize and execute protocols and standard operating procedures to effectively manage global incidents. Monitor travel safety and security of the company's staff Maintain situational awareness of current global current events. Monitor and respond to global alerts and events affecting company facilities and employees providing immediate information and assistance as needed Initiate mass communication notifications as required Notify leadership of events affecting business operations and employees Ensure proper handling of highly confidential information. Perform other duties assigned by supervisors related to security and safety Additional Information: Experience with CCTV/video management and access control systems such as Genetec video solutions or CCure 9000 Experience with protective intelligence monitoring tools such as Everbridge and ISOS Tracker Great active listening skills Rapport building skills Patient and empathetic attitude Adaptability and flexibility Ability to analyze threats and envision potential or real time impact to operations Ability to respond quickly and calmly to emergencies and stressful situations by exercising proper judgment and decision-making skills Strong Customer Service skills Strong consensus, team building and negotiating skills Ability to work overtime on short notice Strong cultural sensitivities Be able to type a minimum of 35 words per min Excellent written and verbal communication skills Ability to multitask in a fast-paced, at times stressed work environment Strong team player Comfortable with high-tech work environment, and constant learning of new tools and innovations Proficient in Microsoft Windows and Office Suite About Our Company | Accenture Qualification Experience: Minimum 2 year(s) of experience is required Educational Qualification: Degree in any stream
Posted 3 weeks ago
5.0 - 10.0 years
12 - 20 Lacs
Pune
Work from Office
About the Role We are seeking a highly skilled Security Analyst (Level 2) to join our MSSP SOC team. The ideal candidate will have expertise in SIEM (Splunk, QRadar), XDR/EDR solutions, and security analysis with hands-on experience in investigating and responding to security alerts. This role requires proficiency in reviewing and analyzing Level 1 alerts, providing detailed recommendations, and engaging with customers for incident handling. The candidate should also have basic SIEM administration knowledge and Python scripting skills for troubleshooting and playbook development. Key Responsibilities Threat Detection & Response: Analyze and investigate security alerts, events, and incidents generated by SIEM, XDR, and EDR solutions. Incident Investigation & Handling: Conduct in-depth security incident investigations, assess impact, and take appropriate actions. Incident Escalation & Communication: Escalate critical incidents to Level 3 analysts or senior security teams while maintaining detailed documentation. Content Management: Develop and fine-tune correlation rules, use cases, and alerts in SIEM/XDR platforms to improve detection accuracy. Malware Analysis: Perform basic malware analysis and forensic investigation to assess threats. Customer Request Handling: Collaborate with customers to address security concerns, provide recommendations, and respond to inquiries. SIEM Administration: Assist in the administration and maintenance of SIEM tools like Splunk or QRadar, ensuring smooth operations. Automation & Playbooks: Utilize Python scripting for automation, troubleshooting, and playbook development to enhance SOC efficiency. Reporting & Documentation: Prepare detailed reports on security incidents, trends, and mitigation strategies. Basic Qualifications B.E/B. Tech degree in computer science, Information Technology, Masters in Cybersecurity 3+ years of experience in a SOC or cybersecurity operations role. Strong knowledge of SIEM tools (Splunk, QRadar) and XDR/EDR solutions. Hands-on experience in threat detection, security monitoring, and incident response. Knowledge of network security, intrusion detection, malware analysis, and forensics. Basic experience in SIEM administration (log ingestion, rule creation, dashboard management). Proficiency in Python scripting for automation and playbook development. Good understanding of MITRE ATT&CK framework, security frameworks (NIST, ISO 27001), and threat intelligence. Strong analytical, problem-solving, and communication skills. Ability to work in a 24x7 SOC environment (if applicable) Preferred Qualifications Certified SOC Analyst (CSA) Certified Incident Handler (GCIH, ECIH) Splunk Certified Admin / QRadar Certified Analyst CompTIA Security+ / CEH / CISSP (preferred but not mandatory
Posted 3 weeks ago
7.0 - 11.0 years
4 - 8 Lacs
Chennai, Tamil Nadu, India
On-site
Support cyber incident response actions to ensureproper assessment, containment, mitigation and documentation Perform in-depth analysis and investigative effortswhen events are escalated and determine next appropriatecontainment / remediation / eradication efforts. Research and Evaluate new technologies like Anti APTsolutions, SOAR, ,Deception technologies, Big Data forensic analytic tools, andassist in implementation of the same. Assist with defining and updating incident responseplaybooks to ensure tasks align with best practice Identify and propose areas for improvement within theSecurity Operations Centre. Responsible for driving execution of daily, weekly,and monthly metrics for statistical threats and KPIs. Coordinate with global stakeholder along with theSenior management during contingency scenarios/ high severity incidents toensure responsive actions are communicated in timely manner. ProfileDescription: Should have 7-11 years of specific InformationSecurity experience. Should have subject matter expertise in relevantareas, such as Incident Response, Forensic analysis, Malware analysis,Intrusion analysis and Crisis Management. Strong working knowledge on security tools, such asSIEM,AV,Vulnerability scanners,Proxies,WAF,Net flow,IDS and Forensic Tools. In-depth knowledge of malware families and networkattack vectors Demonstrated experience in an enterprise-levelincident response team or security operations centre. Log (network, security, access, OS, application, etc.) analysis skills and experience in relation to identifying and investigatingsecurity incidents. Strong knowledge of Operating System Internals (Linux,Windows. Etc) Should be familiar with security engineeringpractises, web/Application security, Cloud Security. Should have Scripting knowledge () Have sound analytical and problem solving skills Preferable be a GIAC,CISSP, CEH certified Professional Experience in product suites like Mcafee, Fireye,Crowd Strike, Cylance etc.
Posted 3 weeks ago
2.0 - 7.0 years
14 - 15 Lacs
Hyderabad
Work from Office
Minimum qualifications: Bachelor's degree or equivalent practical experience. 2 years of experience in analyzing cyber threats. Experience in security analysis, security assessment, risk analysis. Preferred qualifications: Bachelor s degree in Computer Science, Information Technology, or a related field. 5 years of experience in security operations or assurance. Experience in automation and cybersecurity. Experience in conducting security assessments or reviews to assess underlying risk. Proficiency in automation, process optimization, and security tools to improve assessment efficiency. Excellent written and verbal communication skills for clear and concise reporting. About the job The Enterprise Security Operations (ESO) team manages infrastructure security operations at scale globally across Google using process improvements and automation. ESO's work involves all aspects of information security and provides members with opportunities for growth and deeper investment in a variety of security domains.The Core team builds the technical foundation behind Google s flagship products. We are owners and advocates for the underlying design elements, developer platforms, product components, and infrastructure at Google. These are the essential building blocks for excellent, safe, and coherent experiences for our users and drive the pace of innovation for every developer. We look across Google s products to build central solutions, break down technical barriers and strengthen existing systems. As the Core team, we have a mandate and a unique opportunity to impact important technical decisions across the company. Responsibilities Conduct varied security reviews and assessments to ensure compliance with enterprise standards. Apply security judgment to approve/deny/escalate requests based on risk and policy alignment. Collaborate with internal teams, vendors, and business units to provide security guidance and facilitate informed decision-making. Identify and implement opportunities to automate workflows, streamline processes, and improve operational efficiency Develop an understanding of Google's internal security frameworks, controls, and policies.
Posted 3 weeks ago
5.0 - 10.0 years
8 - 13 Lacs
Hyderabad
Work from Office
Minimum qualifications: Bachelor's degree in Computer Science, Management Information Systems, a related technical field, or equivalent practical experience. 5 years of experience with SAP Security across various applications, including but not limited to S/4, BW, MDG,, FICO, Fiori, MM, GRC, BODS, BOBJ, EWM, Solution Manager. 3 years of experience leading teams in a technical capacity or leading technical risk analysis in an enterprise environment. Experience in SAP Governance, Risk, and Compliance (GRC) Ruleset and its usage for security analysis at user and role level. Experience testing authorizations for multiple environments, and coordinating testing with business and technical users. Preferred qualifications: 10 years of experience with SAP Security across various applications. Knowledge of SAP NetWeaver security. Knowledge of transaction auditing. Understanding of Sarbanes-Oxley (SOX) and other compliance requirements that may impact SAP Security. Ability to test authorizations for multiple environments and coordinates testing with business/technical users. Ability to communicate infrastructure level security concerns and work with technical teams to ensure such concerns are addressed. About the job A problem isn t truly solved until it s solved for all. That s why Googlers build products that help create opportunities for everyone, whether down the street or across the globe. As a Technical Program Manager at Google, you ll use your technical expertise to lead complex, multi-disciplinary projects from start to finish. You ll work with stakeholders to plan requirements, identify risks, manage project schedules, and communicate clearly with cross-functional partners across the company. You're equally comfortable explaining your team's analyses and recommendations to executives as you are discussing the technical tradeoffs in product development with engineers. In this role, you will be responsible for SAP security access and compliance for the organization in all SAP instances. You will work with the application owners, develop and support security priorities, create and maintain standards and procedures, and provide expertise in the area of SAP and other non-SAP applications as they relate to the security of any SAP instance. At Corp Eng, we build world-leading business solutions that scale a more helpful Google for everyone. As Google s IT organization, we provide end-to-end solutions for organizations across Google. We deliver the right tools, platforms, and experiences for all Googlers as they create more helpful products and services for everyone. In the simplest terms, we are Google for Googlers. Responsibilities Assist in the design and build of security authorizations, ensuring compliance to security policies and procedures, resolve access problems and handle security incidents. Be responsible for security administration for a variety of SAP applications/modules, including S/4, MDG, Fiori, FICO, EWM, Solution Manager, BODS, BOBJ, BW, GRC, etc. Lead SAP security tasks across full lifecycle projects from initial workshops and User Acceptance Testing (UAT) to regression testing, cutover, and hypercare activities, ensuring projects meet both security and compliance needs in a validated environment. Define, implement and maintain SAP security policies and procedures to support compliance with Sarbanes-Oxley (SOX), General Data Protection Regulation (GDPR) ensuring all processes meet requirements for a validated environment. Ensure audit readiness and establish protocols for continuous access review and regulatory compliance.
Posted 3 weeks ago
3.0 - 7.0 years
3 - 7 Lacs
Bengaluru
Work from Office
Roles & Responsibilities: 1.Handling alerts and incident on XDR platform 2.Alert & incident triage and analysis 3.Proactively investigating suspicious activities 4.Log all findings, actions taken, and escalations clearly in the XDR and ITSM platform 5.Execute predefined actions such as isolating blocking IPs or disabling user accounts, based on set protocols. 6.Adhere to established policies, procedures, and security practices. 7.Follow-up with tech team for incident closure 8.Participating in daily standup and review meeting 9.L2 Analyst has responsibility to closely track the incidents and support for closure. 10.Working with logsource and usecase management in integrating log sources and developing & testing usecase 11.Work & support on multiple cybersecurity tool (DLP, GRC, Cloudsec tool, DAM) 12.Developing SOP / instruction manual for L1 team 13.Guiding L1 team for triage/analysis and assist in clousure of cybersecurity alert and incidents 14.Handle XDR alerts and followup with customer team for agent updates 15.Escalate more complex incidents to L3 SME for deeper analysis. Key Responsibilities: Security Monitoring & Incident Response Governance Define and maintain security monitoring, threat detection, and incident response policies and procedures.Establish and mature a threat intelligence program, incorporating tactical and strategic threat feeds.Align SOC operations with evolving business risk priorities and regulatory frameworks.Platform & Toolset Management Evaluate, implement, and enhance SIEM platforms, ensuring optimal log ingestion, correlation, and rule effectiveness.Assess and manage deployment of EDR, XDR, SOAR, and Threat Intelligence solutions.Maintain and update incident response playbooks and automation workflows.Ensure consistent platform hygiene and technology stack effectiveness across SOC tooling.SOC Operations & Threat Detection Oversee 24x7 monitoring of security events and alerts across enterprise assets.Lead and coordinate proactive threat hunting across networks, endpoints, and cloud.Manage and support forensic investigations to identify root cause and recovery paths.Govern use case development, log source onboarding, and alert/event triage processes.Regulatory Compliance & Incident Management Ensure timely and accurate incident reporting in compliance with RBI, CERT-In, and other authorities.Retain logs in accordance with regulatory data retention mandates.Enforce and monitor security baselines for endpoints, in line with internal and regulatory standards.Advanced Threat Management & Reporting Plan, conduct, and report on Red Teaming and Purple Teaming exercises to test detection and response capabilities.Participate in and contribute to the Risk Operations Committee (ROC) meetings and initiatives.Review and track SOC effectiveness through KPIs, metrics, and regular reporting dashboards. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Required Qualifications: Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field.3-7 years of experience in SOC management, incident response, or cyber threat detection roles.Hands-on expertise with SIEM (e.g., Splunk, QRadar, Sentinel), EDR/XDR tools, and SOAR platforms.Proven experience in playbook development, forensics, and threat hunting methodologies.Strong understanding of RBI/CERT-In incident reporting guidelines and log retention requirements.Familiarity with MITRE ATT&CK, threat modeling, and adversary emulation techniques. Preferred technical and professional experience Preferred Certifications: GCIA, GCIH, GCFA, CISSP, OSCP, CEH, CHFI, or similar certifications
Posted 3 weeks ago
2.0 - 7.0 years
6 - 11 Lacs
Bengaluru
Work from Office
Roles & Responsibilities: 1.Handling alerts and incident on XDR platform 2.Alert & incident triage and analysis 3.Proactively investigating suspicious activities 4.Log all findings, actions taken, and escalations clearly in the XDR and ITSM platform 5.Execute predefined actions such as isolating blocking IPs or disabling user accounts, based on set protocols. 6.Adhere to established policies, procedures, and security practices. 7.Follow-up with tech team for incident closure 8.Participating in daily standup and review meeting 9.L1 Analyst has responsibility to closely track the incidents and support for closure. 10.Escalate more complex incidents to L2 analysts for deeper analysis. 11.Work & support on multiple cybersecurity tool (DLP, GRC, Cloudsec tool, DAM) 12.Handle XDR alerts and followup with customer team for agent updates Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Key Responsibilities: Security Monitoring & Incident Response Governance Define and maintain security monitoring, threat detection, and incident response policies and procedures.Establish and mature a threat intelligence program, incorporating tactical and strategic threat feeds.Align SOC operations with evolving business risk priorities and regulatory frameworks.Platform & Toolset Management Evaluate, implement, and enhance SIEM platforms, ensuring optimal log ingestion, correlation, and rule effectiveness.Assess and manage deployment of EDR, XDR, SOAR, and Threat Intelligence solutions.Maintain and update incident response playbooks and automation workflows.Ensure consistent platform hygiene and technology stack effectiveness across SOC tooling.SOC Operations & Threat Detection Oversee 24x7 monitoring of security events and alerts across enterprise assets.Lead and coordinate proactive threat hunting across networks, endpoints, and cloud.Manage and support forensic investigations to identify root cause and recovery paths.Govern use case development, log source onboarding, and alert/event triage processes.Regulatory Compliance & Incident Management Ensure timely and accurate incident reporting in compliance with RBI, CERT-In, and other authorities.Retain logs in accordance with regulatory data retention mandates.Enforce and monitor security baselines for endpoints, in line with internal and regulatory standards.Advanced Threat Management & Reporting Plan, conduct, and report on Red Teaming and Purple Teaming exercises to test detection and response capabilities.Participate in and contribute to the Risk Operations Committee (ROC) meetings and initiatives.Review and track SOC effectiveness through KPIs, metrics, and regular reporting dashboards. Preferred technical and professional experience Required Qualifications: Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field.2 years of experience in SOC management, incident response, or cyber threat detection roles.Hands-on expertise with SIEM (e.g., Splunk, QRadar, Sentinel), EDR/XDR tools, and SOAR platforms.Proven experience in playbook development, forensics, and threat hunting methodologies.Strong understanding of RBI/CERT-In incident reporting guidelines and log retention requirements.Familiarity with MITRE ATT&CK, threat modeling, and adversary emulation techniques.Preferred Certifications: GCIA, GCIH, GCFA, CISSP, OSCP, CEH, CHFI, or similar certifications"
Posted 3 weeks ago
5.0 - 7.0 years
7 - 9 Lacs
Bengaluru
Work from Office
Responsibilities First line review of all incoming cases to the Trust Office in Salesforce. Validate each case for accuracy and prepare for pickup. Responding to requests for information from internal sales teams regarding compliance and security matters for customers and prospects. Prepare and distribute weekly reporting from Salesforce Prepare and send Security and Trust assurance packet (STAP) to customers and prospects. Additional responsibilities and tasks as required and assigned Basic Qualifications Self-starter with excellent communication, collaborative, and presentation skills Minimum of 2 years of relevant experience in computer science, cyber security, governance risk and compliance, or related domains Experience with security control frameworks (e.g. SSAE16, ISO27001, NIST, PCI, SIG, CSA, HIPAA, HITRUST, FedRamp) Experience with Salesforce and Google workspace applications. Professional communicator in both verbal and written English Understanding of compliance and cyber security implications for business Experience with SaaS and cloud solutions environments Experience working with cross functional teams Strong analytical and communication skills Strong attention to detail, excellent organizational skills, and superior time management skills A very strong passion to learn and continuously improve A willingness to contribute to team discussions and challenge views Preferred Qualifications Degree qualified or higher in a relevant field or equivalent work experience Experience working with external customers regarding their compliance assessments and controls Independently driven, resourceful, and able to deliver results with minimal oversight; Strong sense of ownership, urgency, and drive Strong business acumen with the ability to engage with technical teams to present assessment results, risks and to participate in discussions around acceptable and compensating controls Experience working hands-on with cross-functional teams in assessing processes, risks and controls
Posted 3 weeks ago
8.0 - 10.0 years
4 - 8 Lacs
Pune
Work from Office
Visionet system private limited is looking for a highly motivated and talented Information Security Analyst to join a fast-paced, dynamic, and challenging environment. The ideal candidate must have in-depth experience assessing, designing and implementing enterprise scale solutions. You will monitor our computer networks for security issues, install security software, and document any security issues or breaches you find. To do well in this role you should have a bachelor's degree in computer science and experience in the information security field. Roles and Responsibilities As the Information Security Lead ( L2+ / L3 Level), your responsibilities will include but are not limited to, the following: Monitor security alerts and logs to detect and analyze potential security incidents. Investigate and respond to security events, ensuring timely identification and resolution. Develop and execute incident response plans to contain and eradicate security threats. Coordinate with cross-functional teams to implement security measures and prevent future incidents. Conduct post-incident analysis and documentation for continuous improvement. Perform digital forensics to analyze and understand the scope and impact of security incidents. Preserve and document evidence for potential legal and regulatory requirements. Work closely with IT, network, and application teams to ensure a cohesive approach to cybersecurity. Work with other teams to ensure company policies are followed and constantly improve the security of the organization and its customers Raise awareness of security policies and develop corresponding procedures. Design and conduct training for corporate security education and awareness programs. Define security requirements and review systems to determine compliance with established security standards. Establish and manage relations with vendors and related equipment suppliers Logical, analytical, investigative and auditing skills Communicate effectively with stakeholders, providing updates and recommendations. Maintain detailed records of security incidents, investigations, and resolutions. Prepare incident reports for management and regulatory compliance. Proficiency in using incident response tools and technologies. Strong knowledge of networking protocols, systems, and applications. Experience with security information and event management (SIEM) systems. Required Skills: Microsoft Sentinel and Microsoft Defender, Expertise in KQL Crowd Strike: EDR /XDR Threat Intelligence tools Recorded feature, Force point, Zscaler, Guard duty ITSM Tools (Preferably Service Now or similar) Knowledge of firewalls, antivirus and IDS/ IPS concepts Excellent analytical and problem-solving skills. Effective communication and interpersonal skills. Ability to work collaboratively in a team environment
Posted 3 weeks ago
6.0 - 9.0 years
6 - 16 Lacs
Kolkata, Chennai, Mumbai (All Areas)
Hybrid
We are seeking a highly motivated and detail-oriented Cybersecurity Analyst / SOC Engineer with proven experience in network traffic analysis , SIEM operations , and incident response . The ideal candidate will bring hands-on knowledge of Splunk , threat hunting , Windows/Linux security , and email threat analysis to help monitor, analyze, and respond to security threats across enterprise environments. Responsibilities: Monitor and analyze security logs and alerts from various sources including Splunk , ELK Stack , and Wireshark Build and maintain Splunk dashboards, correlation rules, and alerting mechanisms Perform incident triage , identifying and investigating indicators of compromise (IOCs) Conduct email threat analysis including SPF, DKIM, DMARC assessments Collaborate with cross-functional teams to respond to security incidents Implement and maintain SIEM configurations and integrations Execute forensic log analysis and generate reports from complex datasets Use threat intelligence platforms such as MITRE ATT&CK to identify adversary tactics Support vulnerability management and security assessments Contribute to automation scripts and documentation (Splunk admin-level preferred) Ensure compliance with security standards such as ISO 27001 Key Skills and Tools: SIEM Platforms : Splunk Enterprise Security, ELK Tools : Wireshark, Sysinternals Suite, Email Header Analysis, Threat Intel Platforms Operating Systems : Windows, Linux/Unix Scripting/Automation : Bash, SQL (basic level) Ticketing/Workflow : ServiceNow, familiarity with escalation procedures Other : Knowledge of firewall logs, IDS/IPS, endpoint triage Qualifications: Bachelors or Masters in Engineering, Networking, Cybersecurity, or related field Certifications: Splunk Admin, ESCP, Cyber Defense Analyst (CDA), FSNA, ITIL (preferred) Prior hands-on experience in a SOC environment or as a Security Analyst Familiarity with network engineering principles and infrastructure design (bonus)
Posted 4 weeks ago
8.0 - 13.0 years
10 - 15 Lacs
Bengaluru
Work from Office
The IBM Technology Expert Labs organization is looking for an IBM zSecurity Delivery Consultant with expertise in IBM Z, RACF and Security products to lead and deliver pre-sales and post-sales client engagements that enable the adoption of IBM zSecure Suite and IBM ZMFA Ideal candidates will have demonstrated a successful history of implementing IBM Zsecure Suite engagements, be familiar with sysplex architectural methods, can independently assess IT infrastructures, evaluate gaps in best practices and create IBM Security solution recommendations for client environments while displaying excellent collaboration and communication with Clients, Sellers, Business Partners and Colleagues by delivering reports to clients. You will be responsible for developing and delivering IBM Security architecture, and implementation of IBM Security products which may include: Implement security policies and procedures to protect the integrity, confidentiality, and availability of information extensive knowledge of security administration by using the zSecure suite products Designing and customizing the ZMFA features, based on the client requirements Integrating and designing security with IBM Guardium Data centre and Quantum safe solutions. Assisting with customer to extract the audit reports for system vulnerabilities and implement security measures to mitigate risks Providing technical guidance and skills transfer to customer personnel for IBM zSecure suite products, ZMFA features, IBM Guardium and Quantum safe Producing planning and implementation reports and documentation. Installation, configuration, testing and maintenance of IBM RACF, and related Z software Other technical tasks as necessary to accomplish successful customer outcomes Aid customers to migrate the other vendor security products to the IBM RACF And Z security software’s. This role requires a strong knowledge of the IBM Systems Z security and software ecosystem, focusing on Strong Security and IBM Zsecure, Guardium and Quantum safe, are needed. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Required Professional and Technical Expertise: 8+ years’ experience working with: RACF Security Administrators and capabilities of IBM zSecurity products including (zSecure ,ZMFA, Guardium and Quantum safe) z/OS RACF Security Administrators ,zSecure Admin Ability to migrate the other vendor security products to the RACF and IBM z Security related products. Successfully delivering IBM Z projects and/or architecting and planning infrastructures for customer’s Security Needs 5+ years’ experience in: Customer or executive facing communications, requirements analysis, documentation, and report presentations. Create and manage RACF user profiles, group profiles, and access rights Implement security policies, extracting the Security audit reports using the zSecure suite products and procedures to protect integrity of the system Ability to lead customer technical workshops up to 20+ people. Strong written and verbal communication skills EnglishFluent Preferred technical and professional experience Preferred Professional and Technical Expertise: Knowledge or experience with RACF, zsecure products suite, Guardium data center, ZMFA, Quantum safe Experience on Security Migrations (ACF2 to RACF or TSS to RACF) Practical SMP/E knowledge Assembler, JCL, REXX and CLIST knowledge
Posted 4 weeks ago
0.0 - 8.0 years
10 - 11 Lacs
Warangal, Hyderabad, Nizamabad
Work from Office
About Citco: The market leader. The premier provider. The best in the business. At Citco, we ve been the front-runner in our field since our incorporation in 1948 led to the evolution of the asset servicing sector itself. This pioneering spirit continues to guide us today as we innovate and expand, push beyond the boundaries of our industry, and shape its future. From working exclusively with hedge funds to serving all alternatives, corporations and private clients, our organization has grown immensely across asset classes and geographies. For us, this progress is a pattern that we ll only maintain as we move forward, always prioritizing our performance. So for those who want to play at the top of their game and be at the vanguard of their space, we say: Welcome to Citco. About the Team & Business Line: Fund Administration is Citco s core business, and our alternative asset and accounting service is one of the industry s most respected. Our continuous investment in learning and technology solutions means our people are equipped to deliver a seamless client experience. About You: You have a degree in Accounting, Finance, Economics, or related discipline Fluent in English (both written and verbal) Possess strong skills in using MS Excel - you are comfortable with formulas, understand the basics of macros and pivot tables, and are able to navigate and understand workbooks Intuitive feel and be a quick study of various software applications Proactive team player with excellent communication skills Our Benefits Your well-being is of paramount importance to us, and central to our success. We provide a range of benefits, training and education support, and flexible working arrangements to help you achieve success in your career while balancing personal needs. Ask us about specific benefits in your location. We embrace diversity, prioritizing the hiring of people from diverse backgrounds. Our inclusive culture is a source of pride and strength, fostering innovation and mutual respect. Citco welcomes and encourages applications from people with disabilities. Accommodations are available upon request for candidates taking part in all aspects of the selection. Your Role: Providing US tax compliance services for private equity funds or hedge funds and investment partnership clients involving a variety of investment strategies and fund structures Working on computation of taxable income and tax adjustments, security analysis, tax allocations and preparation of US tax forms Analyzing transactions for US Tax consequences Handling tax reporting for investors and tax filings You will interface with other areas of the firm Contributing to delivery of Schedule K 1s to investors on a timely basis Developing knowledge of US business tax Delivering high quality product Working on various projects within the tax department and be cross-trained and will assist in special projects as necessary
Posted 1 month ago
2.0 - 7.0 years
4 - 9 Lacs
Gurugram
Work from Office
Company: MMC Corporate Description: We are seeking a talented individual to join our GIS team at MMC Corporate This role will be based in Gurgaon. This is a hybrid role that has a requirement of working at least three days a week in the office. Global Cyber Defense Security Operations Center What can you expect We are looking for someone to join and grow in our Security Operations Center (SOC) in a technical analyst role on various daytime business hours shifts. As an Analyst, you will be responsible for analyzing security event data, assessing the potential impact of events, and creating recommendations to defend against emerging threats. You will follow security events through the triage and response lifecycle and document all processes in a centralized knowledgebase. In this role, you will participate in ongoing security incidents and continuous SOC initiatives, such as new content development and enrichment. Additionally, you will collaborate across multiple teams on various efforts to continue to strengthen the security posture of Marsh & McLennan Companies. What is in it for you Be able to work with a global team with a company with a strong brand and strong results to match. Be part of an organization with a culture of internal mobility, collaboration, valued partnership from the business and drive for innovation in data & analytics, including the latest AI technology Grow your career with direct exposure to Senior Technologists, Business Leaders, and s which provide access relevant volunteer and mentoring opportunities and interactions with counterparts in industry groups and client organizations. Competitive pay (salary and bonus potential), Full benefits package starting day one (medical, dental, vision, STD/LTD, life insurance, RSP (Retirement Savings Plan or TFSA (tax free savings account.) Entitled to vacation, floating holidays, time off to give back to your community, sick days, and national holidays. We will count on you to: Analyzing network traffic, endpoint security events, and other various log sources to identify threats, assess potential impact, and recommend mitigations Supporting other security functions and teams to ensure the holistic implementation of security controls, technologies, practices, and programs Contributing to the development and improvement of response processes, documentation, tool configurations, and detection logic Assisting in additional Security Operation Center initiatives, including playbook development and documentation, new rule creation, and tool evaluations Maintaining an operational knowledge of global threat trends, known threat actors, common tactics, techniques, and procedures (TTPs), and emerging security technologies Collaborating on Security Operation Center team training opportunities and other cross training opportunities Operating as a subject matter expert on various security topics across multiple domains Supporting 24x7 operations by assisting in ongoing incidents during non-standard hours What you need to have Undergraduate degree in Computer Science (CS), Computer Information Systems (CIS), other related degrees, or equivalent experience 2+ years of information security experience and/or 2-4 years of experience in security analysis in a non-security focused role Excellent critical thinking skills, with proven analytical expertise and the ability to learn adaptively Demonstrated effective verbal, written and interpersonal communication skills with the ability to communicate security concepts to both technical and non-technical audiences Demonstrated experience with security technologies and alerts, such as intrusion prevention and detection systems, web proxies, SIEM, SOAR, EDR, firewalls, web application scanner, vulnerability scanners, forensics tools, open-source tools, or other security technologies Knowledge in one or more of the following domainsNetwork Operations and Architecture, Operating Systems, Identity and Access Management, Programming, Cloud Computing, Databases, or Cryptography What makes you stand out Ability to operate independently in a dynamic, evolving environment with multiple inputs and tasks simultaneously Knowledge of common attacks, current threats, threat actors, and industry trends Familiarity with common security frameworks and models, such as MITRE ATT&CK, Lockheed Martin Cyber Kill Chain, The Diamond Model of Intrusion Analysis and NIST Cybersecurity Framework Professional or technical certifications, such as Security+, GIAC Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH), or other related certifications Why join our team: We help you be your best through professional development opportunities, interesting work and supportive leaders. We foster a vibrant and inclusive culture where you can work with talented colleagues to create new solutions and have impact for colleagues, clients and communities. Our scale enables us to provide a range of career opportunities, as well as benefits and rewards to enhance your well-being. Marsh McLennan(NYSEMMC) is the worlds leading professional services firm in the areas ofrisk, strategy and people. The Companys more than 85,000 colleagues advise clients in over 130 countries.With annual revenue of $23 billion, Marsh McLennan helps clients navigate an increasingly dynamic and complex environment through four market-leading businesses.Marshprovides data-driven risk advisory services and insurance solutions to commercial and consumer clients.Guy Carpenter develops advanced risk, reinsurance and capital strategies that help clients grow profitably and pursue emerging opportunities. Mercer delivers advice and technology-driven solutions that help organizations redefine the world of work, reshape retirement and investment outcomes, and unlock health and well being for a changing workforce. Oliver Wymanserves as a critical strategic, economic and brand advisor to private sector and governmental clients. For more information, visit marshmclennan.com, or follow us onLinkedInandX. Marsh McLennan is committed to embracing a diverse, inclusive and flexible work environment. We aim to attract and retain the best people and embrace diversity of age, background, caste, disability, ethnic origin, family duties, gender orientation or expression, gender reassignment, marital status, nationality, parental status, personal or social status, political affiliation, race, religion and beliefs, sex/gender, sexual orientation or expression, skin color, or any other characteristic protected by applicable law. Marsh McLennan is committed to hybrid work, which includes the flexibility of working remotely and the collaboration, connections and professional development benefits of working together in the office. All Marsh McLennan colleagues are expected to be in their local office or working onsite with clients at least three days per week. Office-based teams will identify at least one anchor day per week on which their full team will be together in person Marsh McLennan (NYSEMMC) is a global leader in risk, strategy and people, advising clients in 130 countries across four businessesMarsh, Guy Carpenter, Mercer and Oliver Wyman. With annual revenue of $24 billion and more than 90,000 colleagues, Marsh McLennan helps build the confidence to thrive through the power of perspective. For more information, visit marshmclennan.com, or follow on LinkedIn and X. Marsh McLennan is committed to embracing a diverse, inclusive and flexible work environment. We aim to attract and retain the best people and embrace diversity of age, background, caste, disability, ethnic origin, family duties, gender orientation or expression, gender reassignment, marital status, nationality, parental status, personal or social status, political affiliation, race, religion and beliefs, sex/gender, sexual orientation or expression, skin color, or any other characteristic protected by applicable law. Marsh McLennan is committed to hybrid work, which includes the flexibility of working remotely and the collaboration, connections and professional development benefits of working together in the office. All Marsh McLennan colleagues are expected to be in their local office or working onsite with clients at least three days per week. Office-based teams will identify at least one anchor day per week on which their full team will be together in person.
Posted 1 month ago
8.0 - 12.0 years
1 - 5 Lacs
Navi Mumbai
Work from Office
company name=Apptad Technologies Pvt Ltd., industry=Employment Firms/Recruitment Services Firms, experience=8 to 12 , jd= This role focuses on various functions including SOC onboarding incident response vulnerability remediation and security technology enhancements You will be responsible for managing and improving our security infrastructure monitoring threat events coordinating incident response tracking vulnerability remediation efforts and ensuring that security technologies are continuously assessed improved and implemented Primary Secondary Responsibilities SOC Security Operations Center Extended Support SOC Onboarding Extended Support Support the onboarding of new systems tools and environments into the SOC to ensure they are properly monitored for security incidents and events Assist with integrating security tools and providing training for SOC analysts SOC Incident Response Extended Support Provide extended support for incident response activities including the detection investigation and mitigation of security incidents Collaborate with internal teams and external partners to resolve security issues efficiently and effectively Vulnerability Remediation Tracking and Reporting Extended Support Track and report on vulnerability remediation efforts across the organization Ensure vulnerabilities are identified assessed and remediated in a timely manner Provide regular status reports to leadership on vulnerability management and risk reduction Security Technology Enhancements Assessment and Improvements Conduct assessments of existing security technologies tools and processes Identify areas for improvement and work with teams to implement enhancements to strengthen the organizations overall security posture AI and Automation in Cybersecurity Explore and implement AI and automation solutions to improve threat detection response efficiency and security operations Drive initiatives to automate repetitive tasks improve accuracy and reduce timetoresponse for security incidents New Security Technology Implementation Assist with the evaluation testing and implementation of new security technologies to enhance the organizations security capabilities Ensure that new technologies are aligned with the organizations security goals and can be effectively integrated into the existing environment , Title=Security Analyst, ref=6566372
Posted 1 month ago
5.0 - 10.0 years
6 - 7 Lacs
Pune
Work from Office
The Site Security Lead, assigned to one of Pinkertons largest global clients, will develop and implement a high degree of effective security strategies and policies, oversee incident and crisis management activities, provide security-related counsel, and complete security and investigative assignments while leading a team. Responsibilities Represent Pinkerton s core values of integrity, vigilance, and excellence.. Develop, implement, and review security strategies, policies and regulations. Conduct security analysis, audits, and training. Complete and/or assign security and investigative assignments. Oversee security incident response and crisis management activities. Manage and coordinate the security team s operations. Meet regularly with client representatives for status updates, address any actual or potential problems, provide support during service level changes, security planning, and assessments. Manage and prioritize safety and security projects. Maintain state required security licenses. Serve as a valued security subject matter expert. All other duties, as assigned. Qualifications High school diploma or GED, degree preferred, with five to ten years of physical security, incident and emergency response, and crisis management experience. (state licenses/certifications). Law enforcement, military, and/or security experience, preferred. Knowledgeable in security practices. Able to identify and adapt quickly to emerging situations. Sound problem resolution skills. Results-oriented and client focused. Able to identify and adapt quickly to emerging situations. Attentive to detail and accuracy. Team building and development skills. Able to thrive in a rapidly changing environment with limited instruction. Effective verbal, written, and presentation communication skills. Serve as an effective team leader. Computer skills; Microsoft Office. Working Conditions: With or without reasonable accommodation, requires the physical and mental capacity to effectively perform all essential functions; Regular computer usage. Occasional reaching and lifting of small objects and operating office equipment. Frequent sitting, standing, and/or walking. Travel, as required.
Posted 1 month ago
2.0 - 5.0 years
2 - 5 Lacs
Ahmedabad
Work from Office
AphelionCyber is looking for Security Analyst to join our dynamic team and embark on a rewarding career journeyDefining, planning, implementing, maintaining, and upgrading security measures, policies, and controls.Assisting with the creation of updates and training programs to secure the network and train the employees.Keeping the security systems up to date.Monitoring security access and maintaining the relevant data.Conducting vulnerability testing and risk analyses to assess security and performing internal and external security audits.Analyzing security breaches to identify the cause and to update incidence responses and disaster recovery plans.
Posted 1 month ago
4.0 - 9.0 years
6 - 11 Lacs
Noida
Work from Office
R1 RCM Inc. is a leading provider of technology-enabled revenue cycle management services which transform and solve challenges across health systems, hospitals and physician practices. Headquartered in Chicago, R1 is a publicly-traded organization with employees throughout the US and international locations. Our mission is to be the one trusted partner to manage revenue, so providers and patients can focus on what matters most. Our priority is to always do what is best for our clients, patients and each other. With our proven and scalable operating model, we complement a healthcare organizations infrastructure, quickly driving sustainable improvements to net patient revenue and cash flows while reducing operating costs and enhancing the patient experience. We are looking for a self-motivated Cybersecurity Analyst to join the R1 Cybersecurity Operations Team. We have a relentless focus on driving results for our customers and enabling them to invest more in patient care; in turn, this allows us to continue to grow our company and your career. The successful candidate must be well-versed in security operations, cyber security tools, intrusion detection, and secured networks. They will serve as an expert and be responsible for providing network and security operations technical analysis, assessment, and recommendations in the areas of real-time security situational awareness, operational network system and applications systems security monitoring. Responsibilities : Monitoring various security tools (e.g., Crowdstrike, Proofpoint, MS Sentinel, Azure VM ) to identify potential incidents, network intrusions, and malware events, etc. to ensure confidentiality, integrity, and availability of R1s architecture and information systems are protected Reviewing and analyzing log files to report any unusual or suspect activities. Utilize incident response use-case workflows to follow established and repeatable processes for triaging and escalating. Generating trouble tickets and performing initial validation and triage to determine whether incidents are security events using open-source intelligence (OSINT) Following established incident response procedures to ensure proper escalation, analysis and resolution of security incidents. Analyzing and correlating incident event data to develop preliminary root cause and corresponding remediation strategy. Providing technical support for new detection capabilities, recommendations to improve upon existing tools/capabilities to protect the R1s network, and assessments for High Value Assets. In this role, the successful candidate will maintain and monitor compliance with enterprise change management policies and procedures. Develop and maintain metrics & reports on the status of the R1 cyber security operations program. Attend and participate in Cyber security projects and the change management process. This includes interacting with business units and technical teams to understand what is coming and how their projects can be more secure from the beginning. As part of the overall Cybersecurity Operations Team, work in tandem with the security operations center (SOC), incident responders (when anomalous activity and host compromise occurs), and technology infrastructure and development team members. Participate in established incident response procedures to ensure proper escalation,analysisand resolution of security events and incidents. Managing and maintaining change detection and auditing tools Researching technology and application processing environments, operation, and associated user workflow to design, build, configure, implement, and document change compliance and audit rules within designated technologies. Reconciling changes detected by the system to authorized changes documented in service desk and change management applications. Analyzing large volumes of security event data from a variety of sources to identify suspicious and malicious activity. Documenting, logging and investigating security incidents. Performing case management throughout the incident lifecycle for moderately complex security incidents Design, build, and documenting security technology standards, processes, and operational workflows Operating and maintaining physical security monitoring systems Review, investigate, track, and monitor viruses and malware propagation and eradication throughout the enterprise. Monitoring compliance with enterprise security, compliance, and change management programs, policies, and processes Researching Threat Intelligence sources on the latest malware, trends, patches in order to keep the Security Program up-to-date. Providing metrics & reports on the status of tools, environments, and assets within the organization. Database and Application security to prevent attacks via Input Validation, Cross-Site Scripting, Buffer Overflowetc Required Qualifications : A minimum of 4 years of professional experience in an IT-related field Intermediate knowledge of security, monitoring, and networking technologies, tools, protocols and standards Knowledge of security policy, programs, process, and metrics CompTIA Security+ certification or equivalent professional experience in security operations Intermediate or advanced security, networking, or audit certification Recent experience with static and/or dynamic code review process Strong drive and passion to deliver distinctive end-products, a quick learner with a strong attention to detail and quality. Excellent interpersonal and communication skills Desired Qualifications: A Bachelors degree in a technical discipline (e.g., Computer Science, Business Analyst, etc.) Certification (or ability to obtain certification) in at least one of the following areasGeneral Security (CISSP), Incident Handling (GCIH), Cloud Security (GCLD, Cloud+, CCSK), and Ethical Hacking (CEH) Experience with advanced cyber security tools, network topologies, intrusion detection, and secured networks In-depth understanding of NIST SP 800-61,SOC 2 AICPA controls and frameworks. Working in an evolving healthcare setting, we use our shared expertise to deliver innovative solutions. Our fast-growing team has opportunities to learn and grow through rewarding interactions, collaboration and the freedom to explore professional interests. Our associates are given valuable opportunities to contribute, to innovate and create meaningful work that makes an impact in the communities we serve around the world. We also offer a culture of excellence that drives customer success and improves patient care. We believe in giving back to the community and offer a competitive benefits package. To learn more, visit:R1RCM.com. R1 RCM Inc. (the Company) is committed to the principles of equal employment opportunity. The Companys practices and employment decisions, including those regarding recruitment, hiring, assignment, promotion, compensation, benefits, training, discipline, and termination shall not be based on any persons age, color, national origin, citizenship status, physical or mental disability, medical condition, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status or any other characteristic protected by federal, state or local law. Furthermore, the Company is committed to providing a workplace free from harassment based on any of the foregoing protected categories. Working in an evolving healthcare setting, we use our shared expertise to deliver innovative solutions. Our fast-growing team has opportunities to learn and grow through rewarding interactions, collaboration and the freedom to explore professional interests. Our associates are given valuable opportunities to contribute, to innovate and create meaningful work that makes an impact in the communities we serve around the world. We also offer a culture of excellence that drives customer success and improves patient care. We believe in giving back to the community and offer a competitive benefits package. To learn more, visitr1rcm.com Visit us on Facebook
Posted 1 month ago
5.0 - 6.0 years
11 - 15 Lacs
Thane
Work from Office
OT Cybersecurity Engineer for Digital Industries Customer Services, India About Siemens Accelerating transformation for industries For us, it all starts and ends with our customers. Maximizing value for them is what drives us! Combining the real world of automation with the digital world of information technology opens up completely new possibilities for our customers in all industries, empowering them to make better decisions and enable them to accelerate their transformation to become a Digital Enterprise. With our unique portfolio, we can make a decisive contribution to sustainable industrial innovation- transforming the everyday and creating a better tomorrow for societies and people around the world. Cybersecurity for Industry We give Cybersecurity for Industry the highest priority in successful digitalization, so we place it at the center of our development of innovative products, solutions, and services. We rely on the multilayer Defense in Depth concept strengthened by Zero Trust principles. This ensures reliable and always up-to-date protection on all levels, thanks to three pillars- plant security, network security, and system integrity- including Industrial Cybersecurity Services. At Digital Industries we create and implement digital manufacturing concepts for our vertical customer based on the Digital Enterprise software suite, TIA, MindSphere, Industrial Edge and Industrial cybersecurity offerings from Digital Industries. Are you passionate about safeguarding critical infrastructure and ensuring the security of industrial control systemsJoin our team as a Cybersecurity Engineer and play a pivotal role in protecting our ICS and SIS systems, networks, and information. Key Responsibilities: Security MeasuresEngineer, implement, and monitor robust security measures to protect ICS and SIS systems, related networks, and sensitive information. System Security Identify and define system security requirements to ensure comprehensive protection. Security ArchitectureDesign and develop detailed cybersecurity architectures and designs, adhering to industry-standard blueprints and best practices. Implementing Backup Solutions and ManagementImplement and manage system backup technologies like Acronis, Veritas, Veeam and other providers, overseeing installation and deployment. Threat Detection and Vulnerability monitoringImplement solution like Claroty or Nozomi at ICS for the customers. Installing remediation to risk score for the customer. Endpoint SecurityDeploy and manage endpoint security and application control solutions from providers like McAfee, as well as SIEM solutions such as McAfee, Splunk, and Q-radar etc. Network SecurityImplement and manage network-based firewalls (e.g., Siemens, Fortinet, Palo Alto, CISCO), network troubleshooting, and intrusion detection products. Network ManagementInstall and manage network management solutions like SiNEC NMS, SolarWinds, WhatsUp Gold etc. Firmware UpdatesConduct firmware updates for various automation control systems, switches, and firewalls. Domain Controller ConfigurationConfigure and deploy domain controller settings and policies to defined computer groups as per approved list for ICS. Host-Based SecurityImplement host-based security technologies, including antivirus, data leakage prevention, host IPS, whitelisting, and anomaly detection. Installation and TestingPerform installation, configuration, and testing activities at both factory and customer sites, with experience in Factory Acceptance Testing (FAT) and Site Acceptance Testing (SAT). DocumentationPrepare comprehensive system documentation, including functional design specifications, backup systems documentation, firewall configurations, network diagrams, system architectures, asset inventory, FAT and SAT procedures, and operation & maintenance manuals. Experience 5 to 6 years of experience in working for OT Security systems design, implementation and consulting with at least some experience in industrial automation systems design. Proven experience in cybersecurity, particularly in ICS. Strong understanding of cybersecurity principles and best practices. Proficiency in managing backup technologies, endpoint security, SIEM solutions, and network-based firewalls. Hands-on experience with network management solutions and firmware updates. Ability to configure domain controllers and implement host-based security technologies. Excellent documentation skills and experience with FAT and SAT procedures. Education o Bachelors degree in engineering (Electrical Engineering, Computer Engineering, or related field). A degree in Cybersecurity is preferred. o Valid certification in OT security (e.g., CISSP, GICSP, OSCP) would be additional advantage. Business Travel You will be in the delivery and implementation team and hence should be willing to travel and experience various manufacturing sites across India
Posted 1 month ago
3.0 - 8.0 years
1 - 5 Lacs
Hyderabad
Work from Office
Urgent Opening for Security Analyst - Hyderabad Posted On 20th Dec 2016 11:18 AM Location Hyderabad Role / Position Security Analyst Experience (required) 3+ Description Our Client is a leading IT company Title :Security Analyst Location : Hyderabad Department Operations Overview: The Security Analyst will take ownership of existing Operations controls from Security Engineers, and then improve those controls. : Develop and execute the Security Operations function Identify systems and scan for network vulnerabilities. Partner with TechOps and others to ensure the vulnerabilities discovered are closed in a timely manner Assess vendors for information security risk and recommend whether or leadership should accept the risk Report metrics and escalate issues with management as appropriate Monitor security logs to detect intrusions Coordinate incident response With guidance from the Lead Security Engineer, assess new releases of the product for security issues and approve the release on behalf of Security Monitor Security controls to discover deviations. Follow up to resolve deviations Review and approve network firewall rule requests : 3+ years of Information Security experience 1 year of experience with network, server, or application administration Basic knowledge of programming and scripting languages as well as HTML Thorough and detail-oriented Available to meet with US colleagues during US Central Time hours every working night and sometimes during US Pacific Time hours Excellent communication and interpersonal skills Self-starter eager to take on new challenges at a growing, cloud-based company Preferred: Security certification (e.g. CISSP, OSCP, CEH) Experience with any SIEM tool in SOC environment (ArcSight, Splunk, RSA enVision,etc.) Experience with application security methodologies such as OWASP Experience responding to external audits Send Resumes to girish.expertiz@gmail.com -->Upload Resume
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough