Jobs
Interviews

239 Security Analysis Jobs - Page 9

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 5.0 years

0 - 0 Lacs

Chennai

Work from Office

Role Proficiency: Resolve L1 Incident and service requests within agreed SLA Outcomes: 1) Monitor customer infrastructure using tools or defined SOPs to identify failures and mitigate the same by raising tickets with defined priority and severity2) Update SOP with updated troubleshooting instructions and process changes3) Mentor new team members in understanding customer infrastructure and processes4) Perform analysis for driving incident reduction5) Resolve L1 incidents and service requests Measures of Outcomes: 1) SLA Adherence2) Compliance towards runbook based troubleshooting process3) Time bound elevations and routing of tickets - OLA Adherence4) Schedule Adherence in managing ticket backlogs5) # of NCs in internal/external audits6) Number of KB changes suggested7) Production readiness of new joiners within agreed timeline by one-on-one mentorship8) % Completion of all mandatory training requirements9) Number of tickets reduced by analysis 10) Number of installation SR handled for endpoints / change tasks completed for infrastructure 11) Number of L1 tickets closed Outputs Expected: Monitoring: Understand Priority and Severity based on ITIL practice. Understand agreed SLA with customer and adhere. Repetitive analysis for finding high ticket generating Cis. Adhere to ITIL best practices Runbook Reference/Change: Follow runbook for troubleshooting record troubleshooting steps and provide inputs for runbook changes. Escalation/Elevation/Routing of tickets: Escalate within organization/customer peer in case of resolution delay. Understand OLA between delivery layers (L1 L2 L3 etc) adhere to OLA route the tickets to relevant queue initiate intimation respective teams/customer based on defiled process. Tickets Backlog/Resolution: Follow up on tickets based on agreed timelines manage ticket backlogs/last activity as per defined process. Resolve incidents and SRs within agreed timelines. Execute change tasks for infrastructure. Collaboration: Collaborate with different towers of delivery for ticket resolution (within SLA) document learnings for self-reference. Close/resole L1 tickets with help from respective tower. Actively participate in team/organization-wide initiatives. Installation: Install software software/tools and patches Stakeholder Management: Lead the customer and vendor calls. Organize meetings with different stake holders. Participate in RCA meetings. Process Adherence: Thorough understanding of organization and customer defined process. Consult with mentor when in doubt. Adherence to defined processes. Adhere to organization' s policies and business conduct. Training: On time completion of all mandatory training requirements of organization and customer. Provide On floor training and one-on-one mentorship for new joiners. Performance Management: Update FAST Goals in NorthStar track report and seek continues feedback from peers and manager. Set goals and provide feedback for mentees. Assist new team members to understand the customer environment. Skill Examples: 1) Good communication skills (Written verbal and email etiquette) to interact with different teams and customers2) Networking:a. Good in Monitoring tools and Device back up schedulingb. Basic DHCP and DNS configuration in routers and switchesc. Basic troubleshooting skills in 'show ip route' 'sh mac address-table' etcd. Static and dynamic IP routing protocols basics3) Server:a. Basic to intermediate powershell / BASH/Python scripting skillsb. Manual patch of QA serverc. Analyse space s from a server and engage Capacity Mgmt. team for disc expansion4) Storage and Back upa. Ability to handle Storage and Backup issues independentlyb. Ability to handle Vendor management Device management Storage array managementc. Perform Hardware upgrades firmware upgrades Vulnerability remediationd. Ticket analysis Storage and backup Performance management various trouble shootings5) Database:a. Patching and upgrading the DB server and application toolsb. Tweak queries making them run as fast as possiblec. Logical and Physical Schema design (indexing constraints partitioning etc.)d. Ability to visualize debug the end-to-end flow of business transaction model and applicationse. DB migration export/import Knowledge Examples: 1) Fair understanding of customer infrastructure ability to co-relate failures 2) Monitoring knowledge in infrastructure tools3) Networkinga. IP addressing and Subnetting knowledgeb. Preferably certified in Cisco's basic certification trackc. IOS upgradation knowledge and IOS patching knowledge4) Servera. Intermediate level knowledge in active directory DNS DHCP DFS IIS patch managementb. Strong knowledge in backup tools such as Veritas/Commvault/Windows backup storage concepts etcc. Strong Virtualization and basic cloud knowledged. AD group policy management group policy tools and troubleshooting GPO se. Basic AD object creation DNS concepts DHCP DFSf. Knowledge with tools like SCCM SCOM administration5) Storage and Backupa. In depth knowledge in Storage & Backup technology Storage allocation and reclamation Backup policy creation and managementb. Strong knowledge in server Network and virtualization technologies6) Toola. Knowledge in Infrastructure and application technologiesb. Understanding of monitoring concepts and processc. Understanding of key network monitoring protocols including SNMP NetFlow WMI syslog etcd. Knowledge in administration of tools like SCOM Solarwinds CA UIM Nagios ServiceNow etc7) Monitoringa. Good understanding of networking concepts and protocolsb. Knowledge in Server backup storage technologiesc. Desirable to have knowledge in SQL scriptingd. Knowledge in ITIL process8) Database:a. Knowledge of Database security9) Quality Analysisa. Exposure to FMEA audit practicesb. Exposure to technology/processes as per audit requirements.10) Working knowledge of MS Excel Word PPT Outlook etc. Additional Comments: Security Analyst IAM - Governance Roles & Responsibilities a. Execute IAM controls crucial to identity lifecycle management (e.g, access request, access administration, termination monitoring, access reconciliation, etc.) b. Execute role and user access certifications for applications and systems to ensure compliance with SOX (Sarbanes-Oxley) and SOC requirements. c. Maintain changes required to keep SOP's up to date d. Contribute to process improvement initiatives. Required Skills Iam,Security Analysis,Identity Access Management

Posted 3 months ago

Apply

6.0 - 8.0 years

9 - 13 Lacs

Bengaluru

Work from Office

Attention all experienced WebKit Developers! We are seeking a highly skilled Lead WebKit Developer to spearhead innovation in our browser engine and media application technologies. In this role, you will lead a team of developers, define technical strategies, and ensure the successful delivery of complex projects. As a technical authority, you will collaborate with stakeholders, architect cutting-edge solutions, and establish best practices for development and optimization. This is an opportunity to shape the future of user experiences and contribute to a forward-thinking organization as a technical leader. If you are a visionary technologist with a passion for advancing Browser Engine technologies, apply now! Primary Skills WebKit Development : Extensive experience in developing and maintaining WebKit and web-based Media applications. Programming Languages : Strong proficiency in C, C++ and Linux with exposure to common tools such as Python, Perl and CMake Web Standards and Protocols : Knowledge of HTTP, TCP/IP, TLS, WebSockets, and other web standards. Graphics : Experience with 2D drawing using OpenGL or similar frameworks Media : Knowledge of HTMLMediaElement, MSE, EME, general media-related knowledge Version Control : Experience with version control systems like Git. Problem-Solving : Excellent problem-solving skills and attention to detail. Communication and Collaboration : Strong communication and collaboration skills. Performance Optimization : Familiarity with performance profiling and optimization techniques, including multi-threaded programming and concurrency management to improve execution efficiency. Open-source contributions: Significant contributions to open-source projects, especially WebKit. Leadership and Strategic Thinking : Ability to lead teams, establish technical direction, and align project goals with organizational objectives. Agile Methodologies : Experience with Agile Scrum-based development. Good to have Skills: Deep understanding of HTML5, CSS, JavaScript, and common specifications. Knowledge of other web rendering engines like Blink (used in Chromium) and Gecko (used in Firefox). Knowledge of modern CI/CD pipelines such as Jenkins and GitLab CI/CD. Knowledge of web security best practices. Proven ability to manage cross-functional teams and complex deliverables. 6 to 8 years of relevant experience in C, C++, and WebKit development, with demonstrated leadership in browser engine and/or media technologies. Exposure to Linux and common development tools such as Python, Perl, and CMake. Proven experience in leading teams and driving complex projects to successful completion. Roles and Responsibilities Technical Leadership : Define and implement technical strategies for WebKit development and optimization, ensuring alignment with organizational goals. Development: Develop and maintain WebKit and features for scalable and efficient web-based Media applications. Feature Implementation : Architect and implement new features, ensuring high performance and scalability across platforms. Deployment : Evaluate, apply, and test CVE patches for WebKit to ensure security and reliability. Collaboration : Collaborate with cross-functional teams to define, design, and ship new features, using tools such as JIRA and Confluence. Performance Optimization : Optimize WebKit performance across various platforms (Mobile, Embedded Systems etc.) and devices. Team Management : Mentor and guide junior developers while managing project timelines, deliverables, and team productivity. Debugging : Debug and resolve complex issues related to WebKit Engine and functionality. Industry Awareness : Stay abreast of the latest WebKit developments and industry trends in Media space. Code Review : Conduct code reviews to ensure code quality and adherence to best practices. Documentation : Create and maintain technical documentation for the developed features and systems.

Posted 3 months ago

Apply

10.0 - 15.0 years

20 - 25 Lacs

Bengaluru

Work from Office

Manage internal/external audits (ISO, SOC 2), handle client questionnaires, ensure security compliance (ISO 27001, NIST), coordinate audits via OneTrust, test controls, review policies, and support InfoSec risk, GRC, and compliance processes. Required Candidate profile Looking for 8–12 yrs exp in InfoSec audits, ISO 27001, NIST, client questionnaires, OneTrust GRC, control testing. Good to have CISSP/ISO certs. Shift: 2–11 PM,

Posted 3 months ago

Apply

5.0 - 10.0 years

10 - 17 Lacs

Bengaluru

Work from Office

Diversity hiring for Cyber Security Engineer - 5 to 10 Years at Bangalore. Position Cyber Security Engineer Experience – 5 to 10 Years Location – Bangalore Job Description: 5-8 years of experience in cybersecurity engineering, preferably in the manufacturing or industrial control systems (ICS) sectors. Strong knowledge of cybersecurity principles, risk management, and threat analysis. Proficiency with cybersecurity tools and technologies used for monitoring, detection, and incident response. Familiarity with cybersecurity standards and regulations such as IEC 62443, ISO 27001, NIST, etc. Relevant certifications such as CISSP, CISM, CEH, or GIAC are preferred. If interested, please share cv on omkar@hrworksindia.com Regards, Omkar 8208497043

Posted 3 months ago

Apply

2.0 - 5.0 years

2 - 5 Lacs

Bengaluru

Work from Office

Varonis is looking for Security Analyst to join our dynamic team and embark on a rewarding career journey. Defining, planning, implementing, maintaining, and upgrading security measures, policies, and controls Assisting with the creation of updates and training programs to secure the network and train the employees Keeping the security systems up to date Monitoring security access and maintaining the relevant data Conducting vulnerability testing and risk analyses to assess security and performing internal and external security audits Analyzing security breaches to identify the cause and to update incidence responses and disaster recovery plans

Posted 3 months ago

Apply

3 - 8 years

11 - 13 Lacs

Pune

Work from Office

Knowledge of operating systems, system administration, and application security. Proficiency in security tools and technologies Experience with incident response methodologies. Strong knowledge of IT security protocols, data privacy standards Required Candidate profile Certified Information Systems Security Professional (CISSP) Vulnerability Scanner/Nessus, CrowdStrike, Cisco Meraki, Forcepoint One. Experience with cloud security and network security.

Posted 4 months ago

Apply

5 - 6 years

11 - 15 Lacs

Thane

Work from Office

OT Cybersecurity Engineer for Digital Industries Customer Services, India About Siemens Accelerating transformation for industries For us, it all starts and ends with our customers. Maximizing value for them is what drives us! Combining the real world of automation with the digital world of information technology opens up completely new possibilities for our customers in all industries, empowering them to make better decisions and enable them to accelerate their transformation to become a Digital Enterprise. With our unique portfolio, we can make a decisive contribution to sustainable industrial innovation transforming the everyday and creating a better tomorrow for societies and people around the world. Cybersecurity for Industry We give Cybersecurity for Industry the highest priority in successful digitalization, so we place it at the center of our development of innovative products, solutions, and services. We rely on the multilayer Defense in Depth concept strengthened by Zero Trust principles. This ensures reliable and always up-to-date protection on all levels, thanks to three pillars plant security, network security, and system integrity including Industrial Cybersecurity Services. At Digital Industries we create and implement digital manufacturing concepts for our vertical customer based on the Digital Enterprise software suite, TIA, MindSphere, Industrial Edge and Industrial cybersecurity offerings from Digital Industries. Are you passionate about safeguarding critical infrastructure and ensuring the security of industrial control systems? Join our team as a Cybersecurity Engineer and play a pivotal role in protecting our ICS and SIS systems, networks, and information. About The Role Key Responsibilities: Security MeasuresEngineer, implement, and monitor robust security measures to protect ICS and SIS systems, related networks, and sensitive information. System Security RequirementsIdentify and define system security requirements to ensure comprehensive protection. Security ArchitectureDesign and develop detailed cybersecurity architectures and designs, adhering to industry-standard blueprints and best practices. Implementing Backup Solutions and ManagementImplement and manage system backup technologies like Acronis, Veritas, Veeam and other providers, overseeing installation and deployment. Threat Detection and Vulnerability monitoringImplement solution like Claroty or Nozomi at ICS for the customers. Installing remediation to risk score for the customer. Endpoint SecurityDeploy and manage endpoint security and application control solutions from providers like McAfee, as well as SIEM solutions such as McAfee, Splunk, and Q-radar etc. Network SecurityImplement and manage network-based firewalls (e.g., Siemens, Fortinet, Palo Alto, CISCO), network troubleshooting, and intrusion detection products. Network ManagementInstall and manage network management solutions like SiNEC NMS, SolarWinds, WhatsUp Gold etc. Firmware UpdatesConduct firmware updates for various automation control systems, switches, and firewalls. Domain Controller ConfigurationConfigure and deploy domain controller settings and policies to defined computer groups as per approved list for ICS. Host-Based SecurityImplement host-based security technologies, including antivirus, data leakage prevention, host IPS, whitelisting, and anomaly detection. Installation and TestingPerform installation, configuration, and testing activities at both factory and customer sites, with experience in Factory Acceptance Testing (FAT) and Site Acceptance Testing (SAT). DocumentationPrepare comprehensive system documentation, including functional design specifications, backup systems documentation, firewall configurations, network diagrams, system architectures, asset inventory, FAT and SAT procedures, and operation & maintenance manuals. Experience 5 to 6 years of experience in working for OT Security systems design, implementation and consulting with at least some experience in industrial automation systems design. Proven experience in cybersecurity, particularly in ICS. Strong understanding of cybersecurity principles and best practices. Proficiency in managing backup technologies, endpoint security, SIEM solutions, and network-based firewalls. Hands-on experience with network management solutions and firmware updates. Ability to configure domain controllers and implement host-based security technologies. Excellent documentation skills and experience with FAT and SAT procedures. Education o Bachelor"™s degree in engineering (Electrical Engineering, Computer Engineering, or related field). A degree in Cybersecurity is preferred. o Valid certification in OT security (e.g., CISSP, GICSP, OSCP) would be additional advantage. Business Travel You will be in the delivery and implementation team and hence should be willing to travel and experience various manufacturing sites across India

Posted 4 months ago

Apply

6 - 8 years

7 - 8 Lacs

Hyderabad

Work from Office

Diverse Lynx is looking for Network Security Engineer to join our dynamic team and embark on a rewarding career journey Maintaining LAN, WLAN and architecture of the server as per the business policy Reporting the security analysis of findings Maintaining the regulatory systems about ISMS policy (Information System Management Systems) Developing the security authentication protocolMaintaining server and switches Maintaining & implementation of the SOP for Network security Knowledge of performing routing protocols (MPLS, HAIPE/IP, QOS and WAN) Monitoring of web security gateways, perimeter security, network access controls, endpoint security

Posted 4 months ago

Apply

3 - 4 years

0 Lacs

Bengaluru

Work from Office

At EY, you ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Description - External Tax Analyst - Analyst main responsibility is to validate client data, Study cash flow, portfolio and crude financial data provided by client, and prepare a draft income statement and balance sheet. You will work on computation of economic allocations and tax returns, security analysis, other tax adjustments and tax return preparation for Hedge funds and Mutual Fund clients and preparing financial statements for (CDO) clients. The opportunity When you join EY GCR EMEIA team, you will be at the heart of EYs critical mission to build a better working world by applying knowledge skills and experience in assisting clients in meeting their business Purpose. Your key responsibilities Validation of source data such as statutory accounts and other financial data for non-English speaking countries. Preparation of Financial statements and tax computation. Complete self-assure and quality check Demonstrate an understating of basic tax concepts and proactively increases tax knowledge through current tax developments. Ability to Validate low to medium levels of a client s financial activity in a year. Validate information provided to ensure accuracy and draft further information request to onshore team. Preparation of annual reports with notes and corporate tax returns. Self-assure quality check to source data, correct calculation, presentation and accuracy of the work performed. Skills and attributes for success Possess high degree of statistical and analyzing capabilities. Possess good communication Skills Demonstrate high degree of accounting and analytical skills. Demonstrate good computer knowledge - Good knowledge in MS Excel and a basic knowledge of other MS Office, Web- based applications. Be a team-player To qualify for the role, you must have Graduates/Post-graduates (BCom/BBM/MCom/MBA (Finance)) with: year of experience. Good communication and inter-personal skill to interact with GTH team and onshore team. Basic knowledge in MS office. Ideally, you ll also have Awareness of other taxes in the US Ability to read, interpret and apply the tax legislation What we look for We are looking for good tax Knowledge professionals with genuine interest in providing outstanding services to some of the world s most influential people. What we offer EY Global Delivery Services (GDS) is a dynamic and truly global delivery network. We work across six locations - Argentina, China, India, the Philippines, Poland and the UK - and with teams from all EY service lines, geographies and sectors, playing a vital role in the delivery of the EY growth strategy. From accountants to coders to advisory consultants, we offer a wide variety of fulfilling career opportunities that span all business disciplines. In GDS, you will collaborate with EY teams on exciting projects and work with well-known brands from across the globe. We ll introduce you to an ever-expanding ecosystem of people, learning, skills and insights that will stay with you throughout your career. Continuous learning: You ll develop the mindset and skills to navigate whatever comes next. Success as defined by you: We ll provide the tools and flexibility, so you can make a meaningful impact, your way. Transformative leadership: We ll give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You ll be embraced for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. At EY, you ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Description - External Tax Analyst - Analyst main responsibility is to validate client data, Study cash flow, portfolio and crude financial data provided by client, and prepare a draft income statement and balance sheet. You will work on computation of economic allocations and tax returns, security analysis, other tax adjustments and tax return preparation for Hedge funds and Mutual Fund clients and preparing financial statements for (CDO) clients. The opportunity When you join EY GCR EMEIA team, you will be at the heart of EYs critical mission to build a better working world by applying knowledge skills and experience in assisting clients in meeting their business Purpose. Your key responsibilities Validation of source data such as statutory accounts and other financial data for non-English speaking countries. Preparation of Financial statements and tax computation. Complete self-assure and quality check Demonstrate an understating of basic tax concepts and proactively increases tax knowledge through current tax developments. Ability to Validate low to medium levels of a client s financial activity in a year. Validate information provided to ensure accuracy and draft further information request to onshore team. Preparation of annual reports with notes and corporate tax returns. Self-assure quality check to source data, correct calculation, presentation and accuracy of the work performed. Skills and attributes for success Possess high degree of statistical and analyzing capabilities. Possess good communication Skills Demonstrate high degree of accounting and analytical skills. Demonstrate good computer knowledge - Good knowledge in MS Excel and a basic knowledge of other MS Office, Web- based applications. Be a team-player To qualify for the role, you must have Graduates/Post-graduates (BCom/BBM/MCom/MBA (Finance)) with: year of experience. Good communication and inter-personal skill to interact with GTH team and onshore team. Basic knowledge in MS office. Ideally, you ll also have Awareness of other taxes in the US Ability to read, interpret and apply the tax legislation What we look for We are looking for good tax Knowledge professionals with genuine interest in providing outstanding services to some of the world s most influential people. What we offer EY Global Delivery Services (GDS) is a dynamic and truly global delivery network. We work across six locations - Argentina, China, India, the Philippines, Poland and the UK - and with teams from all EY service lines, geographies and sectors, playing a vital role in the delivery of the EY growth strategy. From accountants to coders to advisory consultants, we offer a wide variety of fulfilling career opportunities that span all business disciplines. In GDS, you will collaborate with EY teams on exciting projects and work with well-known brands from across the globe. We ll introduce you to an ever-expanding ecosystem of people, learning, skills and insights that will stay with you throughout your career. Continuous learning: You ll develop the mindset and skills to navigate whatever comes next. Success as defined by you: We ll provide the tools and flexibility, so you can make a meaningful impact, your way. Transformative leadership: We ll give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You ll be embraced for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 4 months ago

Apply

5 - 10 years

4 - 8 Lacs

Bengaluru

Work from Office

Project Role : Security Delivery Practitioner Project Role Description : Assist in defining requirements, designing and building security components, and testing efforts. Must have skills : Splunk Good to have skills : Risk Management Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Practitioner, you will assist in defining requirements, designing and building security components, and testing efforts. Your day will involve collaborating with teams, contributing to key decisions, and providing solutions to problems across multiple teams. Main Skill1. Splunk or Microsoft Sentinel or Google Chronicle Use Case Management2. Risk Based Alerts and Risk Incidents3. Asset and Identities4. Security Incident Response, Standard Operations Procedure Knowledge Must have Skills: 1. Development, Testing and Fine Tuning of Splunk content like Use Cases, Dashboards, Reports, Lookups, Macros, etc.2. Risk Based Alerts and Risk Incidents3. Asset and Identities Framework in Splunk4. Incident Response, Standard Operations Procedure Knowledge5. MITRE Attack Framework Good to Have Skills: 1. Splunk Architecture Cloud, Microsoft Sentinel, Google Chronicle2. Source Integrations various sources3. Event Parsing, Event Type definition, Data Model, Regex 4. Custom integrations for enrichment, Threat Intelligence Feeds, SOAR5. Azure DevOps Roles & Responsibilities1. Architecture and strategy:Candidate must have ability to understand and implement use cases on security tools (Splunk, Phantom) to improve Accenture's overall security posture by identifying gaps in use cases or processes that can be actioned by our engineers. It also includes the ability to develop and communicate a security strategy that addresses the unique risks and challenges of Accentures Security environments.2. Leadership:Candidate must have ability to lead and influence cross-functional teams. It includes the ability to communicate effectively with stakeholders, build consensus, and manage conflict. 3. Technical:The candidate should be able to understand existing security use cases and develop new ones in tools requiring technical development, scripting, or complex rule creations, managing, and implementing broad security concepts.4. Operational:Candidate must have ability to develop and implement security controls, as well as the ability to monitor and analyze security events and incidents. Technical Experience1. Splunk Enterprise Security, Microsoft Sentinel, Google Chronicle2. Azure DevOps3. Custom Tools Development4. Security Incident ManagementProfessional Experience1. At least 5-7 years of experience on IT Security / SOC / Cyber Defense2. Graduation – BE3. Proficient use of English, advanced communication skills.4. Security Certifications are a plus - CCSK, GPEN, GCCC, GMOB, GSEC, ESCA, Security +, CEHRole Description: Support SIEM detection content creation for notables with a focus on Risk Based Alerting. Create and maintain documentation on new or existing detections, integrations, and dependencies. Interface with our SOC to pilot new content, process feedback, update incident response guidelines. Engage in fine-tuning of existing detections to increase signal/noise ratio and reduce false positives. Additional Information: The candidate should have a minimum of 5 years of experience in Splunk This position is based at our Bengaluru office A 15 years full time education is required Qualification 15 years full time education

Posted 4 months ago

Apply

3 - 5 years

12 - 17 Lacs

Gurugram

Work from Office

Job Title - S&CGN - Tech Strategy & Advisory - Security- GRC - -Analyst Management Level: 11-Analyst Location: Gurugram, DDC1A Must-have skills: Information Security Good to have skills: Strong problem-solving skills, adaptability to changing business needs, and expertise in cross-functional collaboration. Job Summary : This role involves driving strategic initiatives, managing business transformations, and leveraging industry expertise to create value-driven solutions. Roles & Responsibilities: Manage business operations, drive performance optimization, and lead cross-functional teams to achieve organizational objectives. Principal Duties and Responsibilities We are focused on helping our valued clients to design and implement large scale transformational programs to manage cyber threats. We enable our clients to define their overall cyber strategy by designing global and pan-enterprise programs that focus on reducing threats, evaluate their priorities, strengths and weaknesses and roll out large scale changes to achieve goals. If dynamic and fast-paced environments, cross-capability exposure, freedom to work and the ability to have a real impact on a rapidly growing team appeals to you, then that is what we are looking for. You'll join an ambitious team of highly motivated security specialists who interface with CIOs, CTOs, CISOs and CFOs in addressing their complex requirements on a day-to-day basis. We are looking for a Data Security expert, with a great eye for risk reduction and continual improvement opportunities. Following are some of the responsibilities that you will handle: Advise clients in understanding the problems and challenges in data security and work collaboratively with them to enhance capabilities Gather requirements, develop use cases, evaluate vendor solutions, develop architecture & design, and test data protection and data security solutions Design people, process and technology solutions to reduce the potential of data compromise Qualifications Bachelor's Degree in Engineering MBA Degree from Tier 1 College 6+ years of experience in multiple domains with expertise in Data Security Excellent analytical skills; able to breakdown complex problems, multi-faceted problems with actionable steps Exposure to Cloud and On-prem security requirements Experience Exposure and knowledge in at least 3 of the following Data Security domains: Data Security Assessment: Develop the Data Security framework, perform the assessment and generate roadmap Data Discovery, Classification, Handling and Inventory: Design Data classification and inventory programs including the use of data discovery tools Define and maintain data classification and labeling policies based on business and regulatory requirements Collaborate with business units to understand data protection needs and ensure the appropriate protection and handling of sensitive data Develop data retention and disposition policies to ensure compliance with retention requirements and relevant regulations. Design Data Classification Schema Information Rights Management (IRM) Design the information rights management use cases Develop the information rights management schema Evaluate the tools available in the market for IRM Design the strategy to implement IRM Develop the user supporting documents to implement IRM Data Obfuscation Design and develop encryption strategy and use cases for the databases, applications, servers, etc. Design PKI, Certificate Management and Key management strategy Map industry best practices around encryption tools like Keyfactor/Hashi Data Loss Prevention Design and develop use cases for DLP across endpoints, network, cloud, etc. Design the DLP rulesets based on the identified use cases Provide a comparative analysis of the DLP solutions and fitment report Identify the ways of circumventing existing DLP controls Develop high-level and low-level design documents Database Activity Monitoring Design the Database Activity Monitoring use cases Evaluate the landscape to ensure coverage for type of databases like Oracle, MySQL, applications, etc. Evaluate the CSPs native solutions and opportunities of integrating with SIEM/PAM etc. Cloud Access Security Broker (CASB) Develop use cases for CASB Evaluate the native CSPs control and develop a comparative analysis Design the several implementation modes of CASB based on the use cases Evaluate integration of CASB with other upstream and downstream solutions Professional & Technical Skills: - Relevant experience in the required domain. - Strong analytical, problem-solving, and communication skills. - Ability to work in a fast-paced, dynamic environment. Additional Information: - Opportunity to work on innovative projects. - Career growth and leadership exposure. About Our Company | Accenture Qualifications Experience: 3-5Years Educational Qualification: Any Degree

Posted 4 months ago

Apply

2 - 5 years

5 - 8 Lacs

Gurugram

Remote

•Review and triage information security alerts, provide analysis and determine and track remediation and escalate as appropriate •Assist with log management and security information and event management (SIEM) solutions design and configuration Required Candidate profile Scripting in one of the common scripting languages (Python, Bash, Powershell) is an asset. CISSP Certification is a plus.

Posted 4 months ago

Apply

4 - 6 years

6 - 8 Lacs

Bengaluru

Work from Office

About the role Today, there s more data and users outside the enterprise than inside, causing the network perimeter as we know it to dissolve. We realized a new perimeter was needed, one that is built in the cloud and follows and protects data wherever it goes, so we started Netskope to redefine Cloud, Network, and Data Security. Within Netskope Engineering, we have invented a Next Generation SaaS Security Posture Management (SSPM) tool that gives enterprises workload and compliance visibility to protect critical data within their numerous Software-as-a-Service deployments. The research team for this product works as content producers, pathfinders and minesweepers. The researchers duties are to discover the best solutions to the problems our customers are facing before they know they have them and to find flaws in our design choices before we engineer them. For this mission, we are looking for new security researchers to design new security-focused application integrations and develop new content for the platform. What s in it for you We believe Netskope s SSPM team is the best place for you to work if you seek: An opportunity to shape the design of a novel product and have a significant role on the impact it makes in the enterprise security domain. To solve intellectually rewarding problems with a meaningful purpose. A position with high agency and trust on how you choose to work. An amazing work environment, competitive compensation, benefits and great perks. The rest of the great reasons to join Netskope as described in https: / / www.netskope.com / company / careers What you will be doing Some examples of the problems the team needs to solve could include: Implement security and compliance content to the product. Help make the correct security configuration decisions on behalf of our customers. Investigate SaaS design and data models and translate them to security graphs consumed by the SPM product. Study API design, hardening manuals and security best practices to discover the essential security caveats of the target applications. Find novel solutions to provide visibility, security, compliance and remediation tools for enterprise SaaS application environments. Explore different threat vectors for cloud services. Support multiple stakeholders such as engineering, research, product management, customer success, and customer support teams as a domain expert. Public writing and presentation opportunities, such as publishing articles, blogs or papers in relevant conferences. Mentor, coach and lead a team of researchers to write detections that are of high quality. Required skills and experience A decent understanding of Information Security. SaaS specific security experience preferable. At least 4 - 6 years of experience in security domain (any of CSPM, DSPM, ASPM or the like) Experience from security analysis work, enterprise SaaS deployment hardening duties or from security content development. Proficient enough in scripting language ( Python, Shell ) of one s choice to be able to solve technical problems with code. Experience with public cloud security and other security solutions is an asset. Experience on novel product development, API-based automation and programming are great merits as well. Experience working with common database and search technologies such as SQL Experience working with big data frameworks such as Spark or BigQuery Additional Skills To perform this duty successfully, a candidate ideally has the following non-technical skills: Great written and verbal communication skills. Fast learning skills, intuitiveness and creativity. Comfortable working in unknown domains. Be opinionated and not afraid of expressing oneself. Precise, careful and detail oriented. Ability to work in a geo-distributed cross-functional group in asynchronous fashion. Education BSCS or equivalent required, MSCS or equivalent strongly preferred #LI-JB3

Posted 4 months ago

Apply

8 - 12 years

25 - 35 Lacs

Noida, Gurugram, Delhi / NCR

Hybrid

About KPMG in India KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant with local laws, regulations, markets and competition. KPMG has offices across India in Ahmedabad, Bengaluru, Chandigarh, Chennai, Gurugram, Hyderabad, Jaipur, Kochi, Kolkata, Mumbai, Noida, Pune, Vadodara and Vijayawada. KPMG entities in India offer services to national and international clients in India across sectors. We strive to provide rapid, performance-based, industry-focused and technology-enabled services, which reflect a shared knowledge of global and local industries and our experience Role & responsibilities: The candidate should be hands-on in managing Security Operations, SOC, Identify access management, Risk Management Should have worked on Blueprinting and Designing of SOC frameworks and implementation of SOC/SIEM solution and Enterprise Architecture Should be hands-on on security processes with good client and Market facing experience in India geography Should have worked on Designing, solutioning and Implementation of Cyber Security Frameworks - Security Operations Strategy, Vulnerability Management - Application & Infrastructure and Threat Intelligence and Analytics Preferred candidate profile : Should have worked on the below - M&A experience - Actively monitoring, analyzing & escalating SIEM alerts based on correlation rules, Active threat hunting on network flow, user behavior and threat intelligence Candidate should have expert level domain knowledge (Cyber Security), Threat Hunting, SIEM - Azure Sentinel, SIEM - (RSA / Splunk / LogRhythm/Qradar ), Ability to Comprehend Logs (HTTP, SMTP, Network), Operating systems and servers, Organizes Technical Sessions / Talks. Candidate should able to familiar with python Scripting & Windows Active Directory (Optional). Vulnerability Management Services - External & internal Vulnerability scanning, VMS tool Qualys & Kenna Administration, Application server & Vulnerability scanning Candidate should have expert level domain knowledge (Cyber Security), Vulnerability scans and recognizing vulnerabilities in security systems, Network analysis tools to identify vulnerabilities, Develop insights about the context of an organizations threat environment, Risk management processes, Network attack and a network attacks relationship to both threats and vulnerabilities. Candidate should have advance level understanding of Impact/risk assessments. Security Operations and Management experience - SOC Experience in Identity access, privilege access, vulnerability management Client facing - front end with the client- focused on engagements + Sales, BD + Capability Development Qualification: B.Tech / M.Tech/ MCA professional with 9-12 years of experience in the relevant role Should have strong hands on MS Power Point and MS Project Hands on experience and certification in any one SIEM (IBM QRadar, ArcSight, Azure Sentinel, Splunk) Security Certifications like CISSP, CISM, GIAC, Security+ etc Equal employment opportunity information KPMG India has a policy of providing equal opportunity for all applicants and employees regardless of their color, caste, religion, age, sex/gender, national origin, citizenship, sexual orientation, gender identity or expression, disability or other legally protected status. KPMG India values diversity and we request you to submit the details below to support us in our endeavor for diversity. Providing the below information is voluntary and refusal to submit such information will not be prejudicial to you.

Posted 4 months ago

Apply

3 - 8 years

15 - 20 Lacs

Hyderabad

Work from Office

Experience in automotive domain. Strong knowledge and skills on Cybersecurity software features development phases like Requirement Analysis, creating Proposals, Planning, deliverables execution, etc. Development experience in Autosar Crypto stack Required Candidate profile Automotive Security concepts, Sec-OC, HSM, AutoSAR Crypto Stack, Secure Boot, Secure Flashing, Debugging.

Posted 4 months ago

Apply

3 - 6 years

5 - 9 Lacs

Noida

Work from Office

Req ID: 319245 NTT DATA strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thinking organization, apply now. We are currently seeking a Security Analysis Senior Specialist to join our team in Noida, Uttar Pradesh (IN-UP), India (IN). Day to Day job Duties(what this person will do on a daily/weekly basis) Work as individual contributor in a team of Security Systems staff and help customers using ITIL methodology, process and ITSM tools following Standard Operating Procedures. In some situations, acts as a Lead for the account where he/she needs to directly work with ISM/CDE of the account along with the Manager. Timely reporting of issues to management and proactive approach for problem solving Responsible for Quality issues and find ways to mitigate gaps in process to avoid quality issues. Ensure all Service Management procedures are being followed by him/her and the entire team Builds deeper understanding of processes, procedures, customers and organization. Assists program or process development and implementation. Develops solutions to a variety of problems of moderate complexity. Applies research, information gathering and analytical and interpretation skills to problems of diverse scope. Works on assignments where considerable judgment and initiative are required in resolving problems and making choices, recommendations, or decisions. Involved with local or business specific engagement initiatives in support of broader programs Assumes responsibility to improve service, efficiency and quality of work. Contributes to area by ensuring quality of output. Basic Qualifications(what are the skills required to this job with minimum years of experience on each) User Access Provisioning, Good communication Skills & Customer Handling, Ticket Hygiene, Should have around 3 year of experiences on AD, Knpwledge Base Drafting, About NTT DATA NTT DATA is a $30 billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long term success. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies.Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure and connectivity. We are one of the leading providers of digital and AI infrastructure in the world. NTT DATA is a part of NTT Group, which invests over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. Visit us atus.nttdata.com NTT DATA endeavors to make https://us.nttdata.comaccessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact us at https://us.nttdata.com/en/contact-us. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications. NTT DATA is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status. For our EEO Policy Statement, please click here. If you'd like more information on your EEO rights under the law, please click here. For Pay Transparency information, please click here. Job Segment Consulting, Technology

Posted 4 months ago

Apply

2 - 6 years

2 - 6 Lacs

Chennai

Work from Office

Req ID: 318281 NTT DATA strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thinking organization, apply now. We are currently seeking a Security Analysis Specialist Advisor ISM to join our team in Chennai, Tamil Nadu (IN-TN), India (IN). Role Overview The NTT DATA Services Security Analysis Specialist Advisor works to ensure the seamless delivery of all information security services that NTT DATA provides to the customer. This is an individual contributor role in which the person acts as a trusted information security partner with the customer and works collaboratively to understand, anticipate and recommend risk mitigation while promoting the overall information security protection for the customer’s information assets. You will partner with client to align information security with the customer’s business strategy, security policies and regulatory and compliance requirements resulting in increased protection and reduced risk. Role Responsibilities (high level summary of key duties) The responsibilities of the Security Analysis Specialist Advisor include: Ensure the delivery of information security services to the customer in compliance with the contract and any applicable standards and regulatory requirements (e.g., PCI, SOX) Assist client in the definition and implementation of information security policies, strategies, procedures and settings to ensure confidentiality, integrity and availability of client’s environment and data Participate with customer in the strategic design process to translate security and business requirements into processes and systems; evaluating new / emerging security products and technologies and making recommendations to customer leadership in regards to the security posture impact on the organization Identify, review and recommend information security improvements as they relate to the achievement of the customer’s business goals and objectives Participate in internal and external audits for the customer (e.g., SOX, PCI) and coordinate information security services activities Drive remediation efforts related to information security; remediation may be from incidents, penetration tests, vulnerability scans, internal/external audits and Critical Practice assessments Identify information security weaknesses and/or gaps in the customer’s current operations and work with the customer to bring information security operations up to standards Participate and represent IT Security in Delivery/Operational meetings Review service management reports to ensure tickets (i.e., incidents, problems, requests, changes), related to information security, are being acknowledged, worked and Service Level Agreements are being met; provide direction on ticket remediation and ensure remediation is complete Required Qualifications: 6+ years of relevant experience Knowledge of standards / regulations impacting information security (e.g., PCI, HIPAA, SOX) Applied knowledge of risk management concepts Experience with information security internal & external audits, contract compliance, and quality initiatives Preferences: At least one of the following certificationsCISSP, SSCP, CISM, CEH Undergraduate or graduate degree Customer relationship management experience at the senior level Strong knowledge of systems and network administration (i.e., desktop, server) Knowledge and application of Globally Accepted Information Security Principles Strong knowledge of network security that pertains to communications, computer system environments and related infrastructures Thorough knowledge of server and desktop configurations that will protect systems from unauthorized access and software invasion About NTT DATA NTT DATA is a $30 billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long term success. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies.Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure and connectivity. We are one of the leading providers of digital and AI infrastructure in the world. NTT DATA is a part of NTT Group, which invests over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. Visit us atus.nttdata.com NTT DATA endeavors to make https://us.nttdata.comaccessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact us at https://us.nttdata.com/en/contact-us. This contact information is for accommodation requests only and cannot be used to inquire about the status of applications. NTT DATA is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status. For our EEO Policy Statement, please click here. If you'd like more information on your EEO rights under the law, please click here. For Pay Transparency information, please click here. Job Segment Network Administrator, Information Security, CRM, Consulting, Technology

Posted 4 months ago

Apply

1 - 3 years

2 - 4 Lacs

Pune

Work from Office

Security Analyst - J48925 REQUIRED EDUCATION/QUALIFICATIONS/EXPERIENCE Bachelors degree in information technology, information security, computer science, or related field One plus (1+) years of experience working with security solutions and technologies One plus (1+) years of experience working with information/endpoint/network security DESIRED EDUCATION/QUALIFICATIONS/EXPERIENCE Security Operations Center experience Experience with Endpoint Protection Platforms, Network Intrusion Protection Systems, and Web Application Firewalls REQUIRED SKILLS/ABILITIES Basic knowledge of security incident response processes Working knowledge of Information Security technologies (EDR, NDR, IPS, WAF, SIEM, etc.) Understanding of networking protocols (TCP/IP), security methodologies (ACL/NAC), and topologies Working knowledge of Windows and Linux OS Strong critical thinking and problem-solving skills Ability to communicate effectively with other team members Excellent attention to detail and follow-through to completion Ability to handle multiple tasks in a fast-paced and deadline-driven environment DESIRED SKILLS/ABILITIES Solid understanding of Information Security Methodology Working knowledge of analyzing, responding, and remediating network intrusions, web app, and server attacks Working knowledge of scripting (PowerShell, Bash, Python) Knowledge of containerization concepts and tools (Kubernetes, Docker, etc.) Knowledge of root cause determination Understanding of impacts to environment and clients WORKING ENVIRONMENT/PHYSICAL DEMANDS Work at assigned locations Perform tasks for long periods of time on a computer Regular attendance and a regular work schedule are essential functions of this job Work includes on call rotations as part of a 24/7/365 team Required Candidate profile Candidate Experience Should Be : 1 To 3 Candidate Degree Should Be : BE-Comp/IT,BE-Other

Posted 4 months ago

Apply

4 - 9 years

15 - 30 Lacs

Mumbai, Chennai

Hybrid

About Us At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day. One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. Were devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being. Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization. Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us! Global Business Services Global Business Services delivers Technology and Operations capabilities to Lines of Business and Staff Support Functions of Bank of America through a centrally managed, globally integrated delivery model and globally resilient operations. Global Business Services is recognized for flawless execution, sound risk management, operational resiliency, operational excellence and innovation. In India, we are present in five locations and operate as BA Continuum India Private Limited (BACI), a non-banking subsidiary of Bank of America Corporation and the operating company for India operations of Global Business Services. Process Overview The Global Information Security (GIS) is responsible for protecting Bank information systems, confidential and proprietary data, and customer information. The team develops the Banks Information Security strategy and policy, manages the Information Security program, identifies, and addresses vulnerabilities, Develops, deploys and manages a risk-based controls, portfolio, Manages and operates global security operations center that monitor, detect and respond to cybersecurity incidents. Job Description: This role provides daily operational support for the BISO ERP Governance and Strategy team, including the coordination of projects, forum and committee preparation, report generation, metric compliance and quality assurance, and process and procedure documentation. The individual will also help facilitate communication, awareness, and training. A large part of the role is coordinating the various projects and work activities that support the BISO ERP Exceptions Governance activities. Responsibilities include coordinating with cross-functional stakeholders, BISO SLT, and SISOs to support modifications and improvements to the BISO ERP Exception Review Framework and related projects, reports, metrics, documentation, and communication materials. Responsibilities: Creating and QAing Key Risk Review monthly reports, creating dashboards etc. Calculating the BISO Key Risk Review Deliverable Metrics which measure the creation, completeness, and deliverable of the KRRs. Producing and pulling metrics for Monthly Business Reviews Creating incident summaries every month and following along with GIS Incident Response team for better understandings Partners with the Phishing and Vishing metrics program owners monthly for data results delivery Coordinates with DLP, ADSF, BISO Exceptions teams to deliver their content in KRRs Serve as a coordinator for BISO ERP Governance metrics, reports, and supporting documentation. Work with leadership on curation and prioritization of projects and related work activities. Support BISO SLT and SISOs with development, enhancement of BISO ERP Governance materials. Perform QA of finalized content drafted by the BISO ERP Governance team. Closely partner with BISO Engagement Leads to ensure timely presentation, review, and modification of metrics. Facilitate weekly project and pipeline review meetings with BISO ERP Governance leadership. Support BISO teams on developing, implementing, and delivering relevant metrics and reports. Provide support for BISO ERP Exception Strategic planning and updates Pulling Metrics, Preparing Reports, Creating risk dashboards, Stakeholders management etc. Should have good knowledge in MS Office tools including MS Visio and Sharepoint Requirements : Education: Bachelor’s Degree or technology and cybersecurity background Certifications: CEH, CompTIA Security+, CISA, CRISC, CISM, CISSP (Good to have) Experience Range: 5 + years Foundational skills: Producing and pulling metrics for Monthly, Quarterly Business Reviews Creating and QA’ing Key Risk Review monthly reports, creating dashboards etc. Exemplary presentation and communication skills, specifically written communications Extensive knowledge of analyzing vulnerabilities and validation of remedial plans Good experience in performing Quality reviews, identifying gaps and following up with stakeholders on closing the observations Knowledge/Experience in Application security, Risk assessments, Cloud technologies, GRC (Governance, Risk, and Compliance) and/or third-party management with emphasis on security processes and controls Experience evaluating threats/risks posed by new technologies spanning networks, hardware, software, Ability to evaluate technology to ensure cyber-secure development that adheres to internal application policy, standards, and baselines. Bachelor’s degree in information technology, information security or related field Must be flexible to work during hours that needs collaboration with US partners. Desired skills: Highly skilled with all Microsoft tools Comfortable delivering messages across a wide spectrum of individuals having varying degrees of technical understanding Excellent critical thinking skills, attention to detail, thoroughness, diligence Contribute to create a positive team culture within a diverse workforce Strong risk awareness, including operational, compliance, and reputational risk Work independently and as part of a team to achieve team, bank objectives Work Timings: 13:30 – 22:30 IST Job Location: Chennai / Mumbai

Posted 4 months ago

Apply

6.0 - 9.0 years

0 - 3 Lacs

bangalore rural, bengaluru

Hybrid

JOB DESCRIPTION: Perimeter and cloud security Expert with an outstanding understanding of the latest practices and trends in edge security. Strong experience in Web application firewall and API Security. Good exposure to how to proactively combat OWASP top 10, Account take over , API and other bot external attacks . Evaluate, deploying and managing Akamai / AWS / Azure Web Application Firewall security configuration. Good knowledge of Email Security (EOP), Email Security Network IDS/IPS, WAF, DDoS Control and Cloud Security. Advance experience on Splunk or other SIEM (Security information and event management) Monitoring. Log Analysis Expertise - Web logs, NetFlow and Packet Analysis Analyzing web traffic patterns to improve protections. Reviewing policy enforcement change requests; interviewing submitters who have requested security configuration changes and require additional requirements gathering. Knowledge of Agile, DevSecOps, Open Source and a programming language is of substantial advantage Manage Cyber Incidents and other service incidents for WAF and other security technologies Behavioral We highly encourage you to apply (if you meet our requirement) because: Photon is a high-growth IT Services Company with 6000+ Professionals Photon partners with Worlds Leading Fortune 100 Clients offering our people best-in-class work culture and challenging projects. Photon believes in performance-driven work culture. A place where your actions, ideas and performance are respected, valued and rewarded.

Posted Date not available

Apply

3.0 - 7.0 years

3 - 7 Lacs

bengaluru

Work from Office

Roles & Responsibilities: 1.Handling alerts and incident on XDR platform 2.Alert & incident triage and analysis 3.Proactively investigating suspicious activities 4.Log all findings, actions taken, and escalations clearly in the XDR and ITSM platform 5.Execute predefined actions such as isolating blocking IPs or disabling user accounts, based on set protocols. 6.Adhere to established policies, procedures, and security practices. 7.Follow-up with tech team for incident closure 8.Participating in daily standup and review meeting 9.L2 Analyst has responsibility to closely track the incidents and support for closure. 10.Working with logsource and usecase management in integrating log sources and developing & testing usecase 11.Work & support on multiple cybersecurity tool (DLP, GRC, Cloudsec tool, DAM) 12.Developing SOP / instruction manual for L1 team 13.Guiding L1 team for triage/analysis and assist in clousure of cybersecurity alert and incidents 14.Handle XDR alerts and followup with customer team for agent updates 15.Escalate more complex incidents to L3 SME for deeper analysis. Key Responsibilities: Security Monitoring & Incident Response Governance Define and maintain security monitoring, threat detection, and incident response policies and procedures.Establish and mature a threat intelligence program, incorporating tactical and strategic threat feeds.Align SOC operations with evolving business risk priorities and regulatory frameworks.Platform & Toolset Management Evaluate, implement, and enhance SIEM platforms, ensuring optimal log ingestion, correlation, and rule effectiveness.Assess and manage deployment of EDR, XDR, SOAR, and Threat Intelligence solutions.Maintain and update incident response playbooks and automation workflows.Ensure consistent platform hygiene and technology stack effectiveness across SOC tooling.SOC Operations & Threat Detection Oversee 24x7 monitoring of security events and alerts across enterprise assets.Lead and coordinate proactive threat hunting across networks, endpoints, and cloud.Manage and support forensic investigations to identify root cause and recovery paths.Govern use case development, log source onboarding, and alert/event triage processes.Regulatory Compliance & Incident Management Ensure timely and accurate incident reporting in compliance with RBI, CERT-In, and other authorities.Retain logs in accordance with regulatory data retention mandates.Enforce and monitor security baselines for endpoints, in line with internal and regulatory standards.Advanced Threat Management & Reporting Plan, conduct, and report on Red Teaming and Purple Teaming exercises to test detection and response capabilities.Participate in and contribute to the Risk Operations Committee (ROC) meetings and initiatives.Review and track SOC effectiveness through KPIs, metrics, and regular reporting dashboards. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Required Qualifications: Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field.3-7 years of experience in SOC management, incident response, or cyber threat detection roles.Hands-on expertise with SIEM (e.g., Splunk, QRadar, Sentinel), EDR/XDR tools, and SOAR platforms.Proven experience in playbook development, forensics, and threat hunting methodologies.Strong understanding of RBI/CERT-In incident reporting guidelines and log retention requirements.Familiarity with MITRE ATT&CK, threat modeling, and adversary emulation techniques. Preferred technical and professional experience Preferred Certifications: GCIA, GCIH, GCFA, CISSP, OSCP, CEH, CHFI, or similar certifications

Posted Date not available

Apply

2.0 - 7.0 years

6 - 11 Lacs

bengaluru

Work from Office

Roles & Responsibilities: 1.Handling alerts and incident on XDR platform 2.Alert & incident triage and analysis 3.Proactively investigating suspicious activities 4.Log all findings, actions taken, and escalations clearly in the XDR and ITSM platform 5.Execute predefined actions such as isolating blocking IPs or disabling user accounts, based on set protocols. 6.Adhere to established policies, procedures, and security practices. 7.Follow-up with tech team for incident closure 8.Participating in daily standup and review meeting 9.L1 Analyst has responsibility to closely track the incidents and support for closure. 10.Escalate more complex incidents to L2 analysts for deeper analysis. 11.Work & support on multiple cybersecurity tool (DLP, GRC, Cloudsec tool, DAM) 12.Handle XDR alerts and followup with customer team for agent updates Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Key Responsibilities: Security Monitoring & Incident Response Governance Define and maintain security monitoring, threat detection, and incident response policies and procedures.Establish and mature a threat intelligence program, incorporating tactical and strategic threat feeds.Align SOC operations with evolving business risk priorities and regulatory frameworks.Platform & Toolset Management Evaluate, implement, and enhance SIEM platforms, ensuring optimal log ingestion, correlation, and rule effectiveness.Assess and manage deployment of EDR, XDR, SOAR, and Threat Intelligence solutions.Maintain and update incident response playbooks and automation workflows.Ensure consistent platform hygiene and technology stack effectiveness across SOC tooling.SOC Operations & Threat Detection Oversee 24x7 monitoring of security events and alerts across enterprise assets.Lead and coordinate proactive threat hunting across networks, endpoints, and cloud.Manage and support forensic investigations to identify root cause and recovery paths.Govern use case development, log source onboarding, and alert/event triage processes.Regulatory Compliance & Incident Management Ensure timely and accurate incident reporting in compliance with RBI, CERT-In, and other authorities.Retain logs in accordance with regulatory data retention mandates.Enforce and monitor security baselines for endpoints, in line with internal and regulatory standards.Advanced Threat Management & Reporting Plan, conduct, and report on Red Teaming and Purple Teaming exercises to test detection and response capabilities.Participate in and contribute to the Risk Operations Committee (ROC) meetings and initiatives.Review and track SOC effectiveness through KPIs, metrics, and regular reporting dashboards. Preferred technical and professional experience Required Qualifications: Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field.2 years of experience in SOC management, incident response, or cyber threat detection roles.Hands-on expertise with SIEM (e.g., Splunk, QRadar, Sentinel), EDR/XDR tools, and SOAR platforms.Proven experience in playbook development, forensics, and threat hunting methodologies.Strong understanding of RBI/CERT-In incident reporting guidelines and log retention requirements.Familiarity with MITRE ATT&CK, threat modeling, and adversary emulation techniques.Preferred Certifications: GCIA, GCIH, GCFA, CISSP, OSCP, CEH, CHFI, or similar certifications"

Posted Date not available

Apply

15.0 - 20.0 years

3 - 7 Lacs

bengaluru

Work from Office

Project Role :Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : SAP Security Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. Your typical day will involve collaborating with various teams to implement security measures, conducting risk assessments, and ensuring compliance with security policies. You will also engage in proactive monitoring of systems to identify vulnerabilities and respond to potential threats, all while maintaining a focus on safeguarding information and business processes against cyber threats. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Assist in the development and implementation of security policies and procedures.- Conduct regular security audits and assessments to identify vulnerabilities and recommend improvements. Professional & Technical Skills: - Must To Have Skills: Proficiency in SAP Security.- Strong understanding of security protocols and frameworks.- Experience with identity and access management solutions.- Knowledge of risk assessment methodologies and tools.- Familiarity with compliance standards such as ISO 27001 and GDPR. Additional Information:- The candidate should have minimum 3 years of experience in SAP Security.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted Date not available

Apply

15.0 - 20.0 years

3 - 7 Lacs

bengaluru

Work from Office

Project Role :Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : SAP Security Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. Your typical day will involve collaborating with various teams to implement security measures, conducting risk assessments, and ensuring compliance with security policies. You will also engage in proactive monitoring of systems to identify vulnerabilities and respond to potential threats, all while maintaining a focus on safeguarding information and business processes against cyber threats. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Assist in the development and implementation of security policies and procedures.- Conduct regular security audits and assessments to identify vulnerabilities and recommend improvements. Professional & Technical Skills: - Must To Have Skills: Proficiency in SAP Security.- Strong understanding of security protocols and best practices.- Experience with identity and access management solutions.- Familiarity with security compliance frameworks and regulations.- Ability to analyze security incidents and develop response strategies. Additional Information:- The candidate should have minimum 3 years of experience in SAP Security.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted Date not available

Apply

2.0 - 7.0 years

2 - 6 Lacs

mumbai

Work from Office

B2 Role L1/ L2 Support resource ( 2 years experience in DLP) Daily Summary Report with list of activities to be shared on daily. Configure Client tasks Purge events on frequent basis Help Desk Support Support in Troubleshooting during Agent installation Providing VPN evidences Support user in installation or uninstallation of Agents Support in resolving Agent Communication issues Support in Agent Upgrade Generate and share MIS reports with end user Troubleshooting Policy related issues Whitelisting of IPs, PF IDs Sharing of granular details of Infringements. Provide Root cause analysis documents

Posted Date not available

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies