Security Engineer 4

5 - 8 years

7 - 10 Lacs

Posted:1 day ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

What you ll do (key responsibilities)

Security research threat modeling

Investigate emerging TTPs, business-logic abuse patterns, and identity/OAuth attack paths.
Build and maintain adversary playbooks mapped to MITRE ATTCK; drive coverage roadmaps.

Detection engineering (detection-as-code)

Ship high-quality detections using Sigma/KQL/SPL/OSQuery/eBPF, versioned as code with CI/CD.
Instrument cloud/SaaS telemetry pipelines; reduce noise via tuning, suppression, and risk scoring.

AI-assisted analytics

Apply ML for anomaly detection, clustering, and outlier triage; prototype LLM/RAG assistants for playbook generation, enrichment, and hypothesis-driven hunts.
Partner with data teams to productionize models with feedback loops (precision/recall tracked).

Threat intelligence integration

Build ingestion/enrichment pipelines (TIPs, OSINT, ISACs, vendor feeds); normalize IOCs/TTPs.
Correlate TI with detections hunts; drive proactive hardening and hypothesis creation.

Proactive controls response acceleration

Recommend/implement preventive controls (authz hardening, rate limits, token binding, WAF rules).
Automate response (SOAR/runbooks), shrinking MTTD/MTTR with measurable impact.

Metrics continuous improvement

Own coverage and efficacy KPIs (FPR/FNR, time-to-detect, time-to-close, alert fatigue).
Run post-incident detection reviews and continuously up-level our catalog.
Minimum qualifications
5 8+ years in security engineering/detection engineering/threat research for cloud/SaaS.
Applied AI/ML experience for security (feature engineering, anomaly detection, basic model evaluation).
Strong detection content skills (Sigma/KQL/SPL/OSQuery/eBPF) and detection-as-code practices (Git, tests, CI/CD).
Demonstrated threat hunting experience (hypothesis-led, telemetry-driven) at scale.
Hands-on with SIEM/SOAR and cloud-native telemetry (e.g., AWS/GCP/Azure, Kubernetes, API logs).
Solid programming for automation/data wrangling (Python/Go) and comfort with SQL.
Working knowledge of MITRE ATTCK, adversary emulation, and identity-centric threats (SSO/OIDC/OAuth).
Preferred qualifications
Built TI pipelines/TIP integrations; mapping intel detections/hunts/playbooks.
Experience tuning detections to reduce false positives without losing recall; risk-based alerting.
Responsible for advanced planning, design and build of security systems, applications, environments and architectures; oversees the implementation of security systems, applications, environments and architectures and ensures compliance with information security standards and corporate security policies and procedures.
Provides technical advice and direction to support the design and development of secure architectures. May participate in an incident management team, bringing advanced-level skills to respond to security events in line with Oracle incident response playbooks. Investigates purported intrusions and breaches, and oversees root cause analysis. Coordinates incidents with other business units and may act as Incident Commander of serious incidents. Develops new methods, and playbooks, as well as sophisticated scripts, applications, and tools, and trains others in their use. May participate in an incident management team, responding to security events in line with Oracle incident response playbooks. Investigates purported intrusions and breaches, and oversees root cause analysis. Coordinates incidents with other business units and may act as incident commander of serious incidents. Participates in developing new methods, playbooks throughout Oracle. Evaluates existing and proposed technical architectures for security risk, provides technical advice to support the design and development of secure architectures and recommends security controls to mitigate those risks. Evaluations of internal security architecture may include design assessment, risk assessment, and threat modeling. Brings advanced-level skills to research, evaluate, track, and manage information security threats and vulnerabilities in situations where in-depth analysis of ambiguous information is required, and where computer programming/scripting knowledge is required. Work with Senior management to develop and implement a multi-year security roadmap Focus on operational and strategic level tasks, and provide counsel and guidance to the junior level security operations engineers in the department.

Mock Interview

Practice Video Interview with JobPe AI

Start Python Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Python Skills

Practice Python coding challenges to boost your skills

Start Practicing Python Now
Oracle logo
Oracle

Information Technology

Redwood City

RecommendedJobs for You

chennai, tamil nadu, india

chennai, tamil nadu, india

chennai, tamil nadu, india

bengaluru, karnataka, india

bengaluru, karnataka, india

Bengaluru / Bangalore, Karnataka, India