Jobs
Interviews

8 Security Incident Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

10.0 - 16.0 years

25 - 27 Lacs

bengaluru

Hybrid

Role & responsibilities 10 to 16 years of experience in architecture, security reviews and requirement definition for complex product environments. Experience in threat modelling, code reviews, security testing, vulnerability detection, attacker exploit techniques, and methods for their remediation. Experience of deploying and securing containers, container orchestration and mesh technologies (such as EKS, K8S, ISTIO). Ability to articulate complex architectural challenges with the business leadership and product management teams. Serve as the primary liaison between business units, IT & functional leadership, and group cyber security teams. Manage and maintain the technology portfolio of enterprise information protection services. Ensure regular maintenance and timely upgrades of security systems & services to prevent downtime and enhance performance. Accountable for Security Incident Management. Maintain and improve security incident response procedures and playbooks. Oversee the daily monitoring and review of security event activities and cyber threat landscape to ensure ongoing and continued maturity of the organizations security controls in close coordination with SOC & MSS team Manage resolution of cyber security incidents and coordinate with engineering support for security systems. Identify and diagnose potential threats, including root cause analysis and after-action reviews to ensure security controls defend the enterprise against potential cyber threats Collect and analyses cybersecurity threats to develop a deep understanding and awareness of cyber threats and actor’s tactics, techniques and procedures (TTP) to derive and report indicators that help organisations detect and predict cyber incidents and protect systems and network from cyber threats. Proactively searches for undetected threats in networks and systems, identifies their indicators of compromise (IOCs), and recommend mitigation plan Reporting and Documentation Develop & streamline process and procedures for efficient security operations. Provide regular reports & metrics on service operations Perform routine audits on security of the infrastructure and present findings. Conduct periodic service review meetings with relevant stakeholders – both internal & external. Ensure adherence to security controls and policies

Posted Just now

Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

The primary responsibility of an Infoscion is to lead consulting engagements by providing high-quality and value-adding solutions to customers. This involves guiding the team through problem definition, diagnosis, solution design, development, and deployment. As an Infoscion, you will review proposals, analyze solutions, and identify potential risks for client business problems. Additionally, you will suggest change management strategies and communication mechanisms to manage change effectively. As part of your role, you will coach and mentor team members, provide subject matter training, and motivate the team through feedback and recognition. You will actively contribute to unit-level and organizational initiatives aimed at delivering high-quality consulting solutions while adhering to organizational guidelines. If you are passionate about helping clients navigate their digital transformation journey, this role offers an exciting opportunity to make a significant impact. In terms of technical requirements, proficiency in various domains such as Network, Data Networking, Application Security, Vulnerability Management, Data Security, Finacle Core Tech Product Configuration, Infrastructure Security, and Security Incident and Event Management (SIEM) is essential. Moreover, you are expected to have a good understanding of software configuration management systems, strong business acumen, awareness of industry trends, logical thinking, problem-solving skills, and the ability to collaborate effectively. Knowledge of industry domains, financial processes, pricing models, SDLC, agile methodologies, project management, and team management is also crucial. Preferred skills include expertise in Network, Data Networking, Network Management, Application Security, Vulnerability Management, Data Security, Infrastructure Security, Security Incident and Event Management (SIEM), SOC Operations, and GRC Tool implementation & maintenance (Servicenow GRC).,

Posted 5 days ago

Apply

3.0 - 10.0 years

0 Lacs

chennai, tamil nadu

On-site

Continue to make an impact with a company that is pushing the boundaries of what is possible. At NTT DATA, renowned for technical excellence, leading innovations, and making a difference for clients and society. Our workplace embraces diversity and inclusion, a place where you can continue to grow, belong, and thrive. Your career here is about believing in yourself, seizing new opportunities and challenges. It's about expanding your skills and expertise in your current role and preparing for future advancements. Encouraging you to take every opportunity to further your career within our global team. The Manager, Managed Services Operations is a management role, responsible for operating within a Region/Country or Services function. Accountable for service delivery at the highest level, ensuring client satisfaction and successful business operations continuation. Primary objective: Ensure managed service for all clients, maintaining operational IT infrastructure and systems. Deliver contracted Managed Services outcomes, assist in planning, building, and supporting managed services to meet business objectives. **Experience:** - Total 10 years experience with a minimum of 8 years in security-related products & services in a reputable organization. - 3 years minimum experience at L3 level. **Skills:** - Experience in 5 or more security areas (Firewall, Anti- ATP, NIPS, WAF, etc.). - Knowledge of Security Orchestration Automation and Response (SOAR), SIEM solutions, and DAM solutions. - Overall knowledge/experience of Architectural Design and Best practices on Network and Cyber Security. - Mandatory Certification: At least one Security certification - PMP/ITIL expert/CISA/CISM/CISSP **Key Responsibilities:** - Proactively monitor and drive service delivery. - Manage client incidents, provide solutions, evaluate regional client reviews. - Maintain accurate client information repository, create a list of client requirements. - Run managed services operations aligned with SMSO process. - Provide operational support, review training requirements, engage with clients. - Plan and implement service improvement priorities, ensure tracking and monitoring of performance. - Responsible for day-to-day running, resource planning, work allocation, and identifying improvement opportunities. **Knowledge and Attributes:** - Organizational and team management skills. - Excellent communication skills, ability to collaborate. - Understanding of budgets and cost management. - Time management, prioritization, delegation abilities. - Focus on client-centricity, business outcomes, and team guidance. - Ability to work across cultures and social groups, in pressurized environments, and adapt to change. **Academic Qualifications and Certifications:** - Bachelors degree in Information Technology or related field. - ITIL certification desirable. **Required Experience:** - Coaching and mentoring engineering teams. - Implementing continual service improvement initiatives and organizational change management. - Experience in domain towers like Network, Collaboration/Customer Experience, Cloud, Security, Data Center. **Workplace type:** On-site Working NTT DATA is an Equal Opportunity Employer.,

Posted 6 days ago

Apply

8.0 - 12.0 years

0 Lacs

haryana

On-site

You have an exciting opportunity at EthicalHat Cyber Security Pvt. Ltd. as a Security Operations Center Manager. In this role, you will play a crucial part in managing the Security Operations Center (SOC) and ensuring the effective and efficient operation of security processes. Your responsibilities will include directing the functions, processes, and operations of the SOC to maintain compliance with policies and procedures. You will lead the 24/7 operations of the SOC to ensure timely identification and resolution of security incidents, enhancing client security. Additionally, you will manage the SOC team, including shift scheduling, performance monitoring, and process adherence. As the SOC Manager, you will be responsible for managing the collection, documentation, and research of security incidents received via the SOC. You will provide realistic overviews of risks and threats to CISO/Senior Management and develop incident response management programs. Moreover, you will work closely with customers to ensure resolution management and customer satisfaction. Your role will also involve creating reports, dashboards, and metrics for SOC operations, conducting training exercises for staff, and establishing performance goals and priorities. Desired candidates should have at least 4 years of SOC experience and 10+ years of Security Operations management experience. The ideal candidate will possess good knowledge of SIEM concepts and experience with tools such as LogRhythm, Sourcefire, and Cisco AMP. Strong expertise in security operational services, including threat management, cyber investigations, and forensic investigations, is required. Advanced knowledge of information systems security standards and procedures, along with excellent time management and leadership skills, are essential for this role. If you have 8-12 years of relevant experience, excellent communication skills, and a strong understanding of networking and security fundamentals, we encourage you to apply for this challenging position at EthicalHat Cyber Security Pvt. Ltd.,

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

pune, maharashtra

On-site

The primary responsibility as an Infoscion is to actively support the consulting team in various project phases, such as problem definition, effort estimation, diagnosis, solution generation, design, and deployment. You will be tasked with exploring alternatives to recommended solutions through thorough research, including literature surveys, public domain information, vendor evaluations, etc., and developing proof of concepts. Additionally, you will be responsible for creating requirement specifications from business needs, defining processes, and detailed functional designs based on requirements. Configuring solution requirements, diagnosing issues, identifying root causes, seeking clarifications, and shortlisting solution alternatives will also be part of your role. Furthermore, you are expected to contribute to unit-level and organizational initiatives to deliver high-quality solutions that add value to customers. If you believe you possess the skills to assist clients in their digital transformation journey, this opportunity is tailored for you. In terms of technical requirements, proficiency in Technology Infrastructure Security, SOC Operations, Security Incident and Event Management (SIEM), Oracle Cloud Service, Cloud RightNow, and Desktop Workflow is essential. Moreover, you should be able to collaborate with clients to identify business challenges and contribute to refining, analyzing, and structuring relevant data for client deliverables. Staying abreast of the latest technologies and trends, possessing logical thinking, problem-solving skills, and the ability to collaborate effectively are also crucial. You should be capable of assessing current processes, pinpointing improvement areas, and recommending suitable technology solutions. Having knowledge in one or two industry domains is considered advantageous. Preferred Skills: - Technology: Infrastructure Security, SOC Operations - Technology: Infrastructure Security, Security Incident and Event Management (SIEM) - Technology: Security Operations, Threat Intelligence,

Posted 1 month ago

Apply

2.0 - 6.0 years

0 Lacs

karnataka

On-site

As an Infoscion, your primary responsibility will be to actively support the consulting team throughout various phases of the project. This includes tasks such as problem definition, effort estimation, diagnosis, solution generation, design, and deployment. You will be required to explore alternative solutions based on thorough research, including literature surveys, public domain information, and vendor evaluations. Building POCs will also be a part of your role. Creating requirement specifications from business needs, defining processes, and developing detailed functional designs based on requirements will be essential. Additionally, you will assist in configuring solution requirements on products, diagnosing any issues, identifying root causes, seeking clarifications, and shortlisting solution alternatives. Your contribution to unit level and organizational initiatives will focus on delivering high-quality, value-adding solutions to customers. Moreover, you should be able to work with clients to identify business challenges and refine, analyze, and structure relevant data to contribute to client deliverables. Remaining aware of the latest technologies and trends, showcasing logical thinking and problem-solving skills, and collaborating effectively are key attributes for this role. You will also need to assess current processes, identify areas for improvement, and propose suitable technology solutions based on one or two industry domain knowledge. Furthermore, having expertise in various domains such as Network Security Firewall & Policies, IDAM (Cyberark, Forgerock, Microsoft Identity Manager, Okta, Oracle Access Manager, Oracle Identity Manager, Ping/Federate, Sailpoint, Saviyant), Application Security, Cloud Security (AWS - GRC), Enterprise Mobility Solution (MS Azure AD, MS Azure RMS, MS Intune), Infrastructure Security (Security Incident and Event Management - SIEM - Splunk), and Network technologies (CISCO, Palo Alto) will be advantageous in fulfilling your responsibilities effectively. If you believe you possess the skills and experience to help clients navigate their digital transformation journey successfully, this opportunity is tailored for you.,

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

karnataka

On-site

As an Infoscion, you will play a vital role in the consulting team by actively supporting various phases of projects, such as problem definition, effort estimation, diagnosis, solution generation, design, and deployment. Your responsibilities will include exploring alternative solutions, conducting research through literature surveys, public domain information, vendor evaluations, etc., and developing proof of concepts (POCs). You will be tasked with creating requirement specifications based on business needs, defining processes, and detailed functional designs. Additionally, you will assist in configuring solution requirements, identifying and resolving issues, seeking clarifications, and proposing solution alternatives. Your contributions will focus on delivering high-quality, value-adding solutions to customers at both unit and organizational levels. Furthermore, you will collaborate with clients to understand their business challenges, refine and analyze relevant data, and contribute to client deliverables. It is essential to stay updated on the latest technologies and trends, showcase logical thinking, problem-solving abilities, and promote a collaborative work environment. You will be expected to evaluate current processes, pinpoint areas for improvement, and recommend suitable technology solutions. Industry domain knowledge, especially in network security, firewall policies, IDAM (Identity and Access Management) solutions like Cyberark, Forgerock, Microsoft Identity Manager, Okta, Oracle Access Manager (OAM), Oracle Identity Manager (OIM), Ping/Federate, Sailpoint, etc., will be beneficial. Your preferred skills should encompass expertise in various domains such as network security, application security, cloud security, enterprise mobility solutions, infrastructure security, etc. Familiarity with technologies like AWS - GRC, MS Azure AD, MS Azure RMS, MS Intune, CISCO technologies, Palo Alto, Splunk, among others, will be advantageous for this role. If you are enthusiastic about guiding clients through their digital transformation journey and possess the necessary skills and knowledge, this opportunity at Infosys is tailored for you.,

Posted 1 month ago

Apply

7.0 - 12.0 years

18 - 33 Lacs

Bengaluru

Remote

Job Summary : We are seeking a skilled and detail-oriented Information Security Specialist to join our team. This role will focus on implementing and maintaining security measures to protect our organizations digital assets, ensuring compliance with industry standards and mitigating security risks. Key Responsibilities : Develop and enforce security policies, standards, and procedures across the organization. Conduct regular security audits, vulnerability assessments. Identify, investigate, and respond to security incidents and breaches. Manage identity and access controls to safeguard data privacy. Monitor security events and manage incident responses. Collaborate with IT to implement security upgrades and patches. Conduct risk assessments, define security controls, and ensure the organization is compliant with industry standards (ISO 27001, NIST). Establish metrics and reporting for ongoing security assessments and improvements.

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies