Home
Jobs

346 Security Monitoring Jobs - Page 14

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3 - 5 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: Microsoft Information Protection. Experience3-5 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

3 - 5 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: ServiceNow - GRC. Experience3-5 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

2 - 6 years

5 - 9 Lacs

Coimbatore

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT ? ? Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

2 - 6 years

5 - 9 Lacs

Hyderabad

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT ? ? Experience in wide range of DLP services - MIP/AIP, DAR, Policy . DLP policy - design, development, maintenance and fine tuning. Good stakeholder engagement experience - involvement in multiple projects. Good understanding of data controls and risk assessment. Experience in implementation of case management tool for DLP tickets. DLP tool - McAfee, Symantec.

Posted 1 month ago

Apply

5 - 9 years

7 - 11 Lacs

Pune

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ? ? Role: Cyber Security Analyst L3 Skill: Fortinet Firewall Location: Pune Fortigate Firewall and F5 Technical Engineer (About The Role ) Basic Knowledge Required Comprehensive knowledge of firewalls, load balancers, and Secure Network Access Control (NAC) operations. Solid understanding of both static and dynamic routing protocols. Fundamental skills in packet capture and analysis. Work Experience At least 3 years of experience exclusively with Fortigate Firewalls. Experience with at least one other firewall platform, such as Cisco or Palo Alto. At least 3 years of experience exclusively with F5 Load Balancers. Proficient in F5 LTM/GTM implementation, design, and L2/L3 troubleshooting, with experience in the APM module of F5. Roles and Responsibilities Regularly engage with customers via voice calls, emails, and remote screen sharing to resolve issues within the SLA. Document solutions provided to customers in the ticketing tool. Troubleshoot P1/P2 incidents by collaborating with different teams to ensure timely resolution within the SLA. Prepare RCA documentation using the appropriate RCA template. Implement best practices or preventive measures based on RCA action items. Be willing to work in a 24/7 environment

Posted 1 month ago

Apply

5 - 8 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: PingFederate. Experience5-8 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

1 - 3 years

6 - 10 Lacs

Ahmedabad

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: Fortinet Firewall. Experience1-3 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

3 - 8 years

11 - 13 Lacs

Pune

Work from Office

Naukri logo

Knowledge of operating systems, system administration, and application security. Proficiency in security tools and technologies Experience with incident response methodologies. Strong knowledge of IT security protocols, data privacy standards Required Candidate profile Certified Information Systems Security Professional (CISSP) Vulnerability Scanner/Nessus, CrowdStrike, Cisco Meraki, Forcepoint One. Experience with cloud security and network security.

Posted 1 month ago

Apply

1 - 3 years

2 - 5 Lacs

Bengaluru

Work from Office

Naukri logo

Title: SOC Analyst Location: Bangalore, India Role overview: As a SOC Analyst, you will be a crucial first responder to cybersecurity incidents, tasked with monitoring and analyzing threats, performing vulnerability assessments, and escalating critical issues to senior analysts. This role demands proficiency in managing and operating security tools, maintaining secure network traffic, addressing suspicious activities, and ensuring compliance with SLAs in a 24x7 operational environment. How you will create impact: Responsibilities: Incident response & analysis: Serve as the first responder during security events and when analysis of cyberattacks is required. Review incident alerts, run vulnerability tests, and escalate severe incidents to senior analysts in Tier 2. Technical Knowledge: Proficiency in Windows, Linux, networking, and incident handling in a 24x7 monitoring environment. SIEM and SLA Compliance: Knowledge on SIEM, adhere to SLA. Security Tool Management: Manage security tools - firewalls, intrusion detection and prevention technology. Network Defense: Must have the ability to defend the network. Tasks include monitoring, discovering, and analyzing possible threats. A SOC analyst should have the skills needed to maintain secure network traffic and respond to suspicious activities. Cloud and Operating System Expertise: Strong knowledge of Windows, Linux, and cloud platforms, along with networking fundamentals. Advanced Security Tools: Implement and manage security tools - firewalls, intrusion detection and prevention technology, threat and vulnerability management tools, data loss prevention tools, filtering technologies, traffic inspection solutions, reporting technology and data analytics platforms. Essential qualifications: 1-3 years of relevant experience in SOC. Should have BE/ B. Tech/BCA/MCA/ ME/M.Tech /B.Sc. (Computers)/M.Sc. (Computers) degree from a reputed University. Good to have knowledge in any programming languages- Python, C, Java Should possess strong communication skills, with the ability to effectively convey technical information to both technical and non-technical audiences, collaborate with team members, and provide clear and concise incident reports. Interview rounds & assessments: Table for Two: A brief chat with one of our Recruiters to assess your foundational competencies and provide an overview of TerraPay. Beyond the Bio: A discussion with an SME or the RM to evaluate your role-specific knowledge, problem-solving abilities, and gain a deeper understanding of the company and team dynamics. Manager Meetup: A comprehensive discussion about the role and responsibilities, expectations, and mapping out potential career growth. Hot Seat: A cultural fit round that includes an overview of the companys core values and long-term plans. Why TerraPay: TerraPay is a global money movement player on a mission to build a borderless financial world. We believe payments should be instant, reliable, transparent, seamless, and fully compliant. Registered and regulated across 31 global markets, we are a leading payment partner for banks, mobile wallets, money transfer operators, merchants, and financial institutions. We are proud to be a twice-certified Great Place to Work and were featured in the 2023 CB Insights Fintech 100 and the 2024 Financial Times 1000 lists. Our culture & core values: At TerraPay, we dont just talk about our values—we live by them. Humility, ownership & responsibility, entrepreneurship, global citizenship, and trusting empowerment are the principles that guide everything we do. If you’re looking for a career that offers abundant opportunities for innovation and a culture of excellence, TerraPay is the place to be. With comprehensive healthcare benefits, cab facilities for our India-based employees, and a generous leave policy, we’ve got you covered. Join us in one of our 10 offices worldwide and collaborate with a diverse team representing 40+ nationalities .

Posted 1 month ago

Apply

4 - 9 years

6 - 10 Lacs

Hyderabad

Work from Office

Naukri logo

Diverse Lynx is looking for SOC L2 Engineer to join our dynamic team and embark on a rewarding career journey Security Monitoring: Monitor security alerts and events from various sources, including security information and event management (SIEM) systems. Analyze and respond to security incidents, threats, and vulnerabilities. Incident Response: Conduct incident investigations, document findings, and implement corrective actions. Collaborate with incident response teams to contain and mitigate security incidents. Vulnerability Management: Conduct regular vulnerability assessments and coordinate remediation efforts. Stay informed about the latest security threats, vulnerabilities, and technologies. Security Infrastructure Management: Manage and maintain security technologies, such as firewalls, intrusion detection/prevention systems, and endpoint protection. Configure and fine-tune security tools to enhance detection and prevention capabilities. Log Analysis and Correlation: Analyze logs and security events for unusual or suspicious activity. Develop and implement correlation rules to enhance detection capabilities. Security Policy Enforcement: Enforce security policies and procedures to ensure compliance with industry standards and regulations. Recommend and implement improvements to security policies. Collaboration: Collaborate with other IT and security teams to ensure a coordinated response to security incidents. Provide support during security audits and assessments.

Posted 1 month ago

Apply

1 - 4 years

5 - 10 Lacs

Bengaluru

Work from Office

Naukri logo

Why Verifone For more than 30 years Verifone has established a remarkable record of leadership in the electronic payment technology industry. Verifone has one of the leading electronic payment solutions brands and is one of the largest providers of electronic payment systems worldwide. Job Summary: The Security Analyst will be responsible for monitoring our security infrastructure, identifying and responding to security threats, managing vulnerabilities, and contributing to the continuous improvement of our overall security posture. This role is crucial in safeguarding our organizations systems, data, and reputation against an ever-evolving landscape of cyber threats. Key Responsibilities: Security Monitoring & Alerting: Monitor security alerts and events from various sources, including SIEM, IDS/IPS, EDR, firewalls, and other security tools. Triage and investigate alerts to determine their severity, scope, and potential impact. Incident Detection & Response: Act as a first responder for security incidents, following established incident response plans. Conduct initial analysis, containment, eradication, and recovery activities. Document incident details, actions taken, and lessons learned. Escalate complex incidents to senior analysts or incident response teams as appropriate. Vulnerability Management: Perform regular vulnerability scans and assessments of our IT infrastructure, applications, and networks. Analyse scan results, priorities vulnerabilities, and track remediation efforts with relevant teams. Assist in the development and implementation of patching and remediation strategies. Security Tool Administration & Maintenance: Assist in the configuration, maintenance, and optimization of security tools and technologies. Ensure security tools are functioning correctly and generating accurate data. Log Analysis & Threat Hunting: Collect, analyze, and correlate log data from various systems to identify suspicious activity or potential threats. Proactively hunt for threats and indicators of compromise (IOCs) within the environment. Threat Intelligence: Stay informed about the latest cybersecurity threats, vulnerabilities, attack vectors, and mitigation techniques. Gather and analyze threat intelligence from various sources to enhance detection capabilities. Reporting & Documentation: Prepare regular reports on security incidents, vulnerability status, and overall security posture. Maintain accurate and detailed documentation of security procedures, configurations, and incident response activities. Collaboration & Support: Collaborate with IT teams, developers, and other business units to implement security best practices and address security concerns. Provide security-related support and guidance to end-users and internal teams. Assist with internal and external security audits and compliance activities (e.g., GDPR, ISO 27001). Skills and experience we desire: Bachelor s degree in computer science or related field 2+ years of hands-on experience with the design, implementation, and operation of enterprise vulnerability management. 2+ years experience supporting diverse IT systems, processes, or capabilities in large organizations 2+ years of solid understanding of industry best practices for hands on, security vulnerability remediation. 2+ years with SCCM, WSUS (or other, similar tools) running in an enterprise environment. 2+ years in scripting of packaged installation of patches, software, and configuration changes, including the knowledge and ability to write PowerShell scripts needed to automate patch management processes. Extensive experience with core vulnerability management scanners (e.g. Qualys, Tenable etc.). Strong knowledge of OWASP Top 10 and the ability to articulate application security risks and determine threat level. Technical understanding of a range of enterprise IT and cloud-based architectures and technologies such as networking, server infrastructure, operating systems, web applications, databases, containerization, mobile. Preferred certifications: Net+, Security+, OSCP, CEH, CISSP, GIAC (GSEC, GEVA, GPEN etc.)

Posted 1 month ago

Apply

3 - 8 years

6 - 13 Lacs

Noida

Work from Office

Naukri logo

Managed Services SOC Manager Job Summary: The Security Operations Center (SOC) Security L-2 Analyst serves in a SOC team, is responsible for conducting information security investigations as a result of security incidents identified by the Level-1 security analysts who are monitoring the security consoles from various SOC entry channels (SIEM, Tickets, Email and Phone). The L2 SOC Security Analyst is expected to have a solid understanding of information security and computer systems concepts and should be ready to work in shifts. An engineer in this position act as a point of escalation for Level-1 SOC security analysts in support of information security investigations to provide guidance and oversight on incident resolution and containment techniques. Job Description : Responsible for conducting information security investigations as a result of security incidents identified by the Level 1 security analyst who are monitoring the security consoles from various SOC entry channels (SIEM, Tickets, Email and Phone), Act as a point of escalation for Level-1 SOC security analysts in support of information security investigations to provide guidance and oversight on incident resolution and containment techniques. Should have experience in Developing new correlation rules & Parser writing Experience in Log source integration Act as the lead coordinator to individual information security incidents. Mentor security analysts regarding risk management, information security controls, incident analysis, incident response, SIEM monitoring, and other operational tasks (tools, techniques, Procedures) in support of technologies managed by the Security Operations Center. Document incidents from initial detection through final resolution. Participate in security incident management and vulnerability management processes. Coordinate with IT teams on escalations, tracking, performance issues, and outages. Works as part of a team to ensure that corporate data and technology platform components are safeguarded from known threats. Communicate effectively with customers, teammates, and management. Prepare Monthly Executive Summary Reports for managed clients and continuously improve their content and presentation. Provide recommendations in tuning and optimization of security systems, SOC security process, procedures and policies. Define, create and maintain SIEM correlation rules, customer build documents, security process and procedures. Follow ITIL practices regarding incident, problem and change management. Staying up-to-date with emerging security threats including applicable regulatory security requirements. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Publish weekly reports to applicable teams Generate monthly reports on SOC activity Secondary skills like AV, HIPS, DCS, VA/ PT desirable Required Technical Expertise Must have experience in SIEM Management tool (QRADAR) Should have certifications like, ITIL, CCNA, CEH, VA (Product) Certification, CISM Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host based firewalls, Anti-Malware, HIDS General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows NT

Posted 1 month ago

Apply

7 - 12 years

10 - 19 Lacs

Ahmedabad

Work from Office

Naukri logo

Safety of employees & assets in the State . Person Should be in a similar large role . Certified protection professional, intelligence/info collection skills, leadership qualities ; Basis Military/Police training/ certified protection specialists. Required Candidate profile Candidates experience should not be more than 15 years . vehicle monitoring during patrolling, day patrols, SOP and Processes , state liaison, man/ material movement management at sites

Posted 1 month ago

Apply

2 - 6 years

2 - 5 Lacs

Hyderabad

Work from Office

Naukri logo

IS Specialist OT Security What you will do Let’s do this. Let’s change the world. In this vital role you will [responsible for developing and implementing security strategies that protect industrial control systems (ICS), SCADA networks, and other manufacturing infrastructure components. This role ensures the integrity, availability, and confidentiality of OT environments by integrating security monitoring, risk management, and compliance efforts into industrial operations. The OT Security Engineer works closely with Security Operations, Engineering and Infrastructure, and Operations to safeguard systems against cyber threats. Key responsibilities include implementing security best practices for OT, managing vulnerabilities, and collaborating with stakeholders to enhance the security posture of OT environments. . Roles & Responsibilities: Define, lead, and implement security strategies for OT environments, focusing on Industrial Control Systems (ICS) and SCADA. Implement and manage OT-specific security monitoring tools, ensuring real-time detection and response to cyber threats. Collaborate with engineering and operational teams to integrate security measures into OT network architectures. Assess and mitigate vulnerabilities in OT environments, ensuring compliance with industry standards (e.g., NIST 800-82, IEC 62443). Support security incident response efforts, including forensic analysis and remediation of threats in industrial environments. Coordinate with vendors, partners, and government agencies to address OT cybersecurity challenges. Develop security policies, procedures, and guidelines tailored to OT environments. Provide training and awareness programs to operational teams regarding OT cybersecurity best practices. Maintain relationships with vendors and strategic partners to enhance security capabilities. What we expect of you We are all different, yet we all use our unique contributions to serve patients. The [vital attribute] professional we seek is a [type of person] with these qualifications. Basic Qualifications: Master’s degree with 4- 6years of experience in Information Systems or related field OR Bachelor’s degree with 6- 8years of experience Information Systems or related field OR Diploma with 10– 12years of experience in Information Systems or related field Preferred Qualifications: Must-Have Skills: Solid understanding of ICS, SCADA, and OT security principles Experience with network segmentation, firewalls, and intrusion detection systems in OT environments Knowledge of industrial protocols (e.g., Modbus, DNP3, BACnet, OPC, CIP) and their security implications Understanding of risk management frameworks (e.g., NIST 800-82, IEC 62443, NERC CIP) Experience with security monitoring and detection in OT environments Good-to-Have Skills: Experience with security assessments and penetration testing for OT networks Proficiency in security tools (e.g., Nozomi Networks, Dragos, Claroty, Armis) Knowledge of cloud security and how it integrates with OT environments Scripting and automation skills (e.g., Python, PowerShell) Familiarity with compliance and regulatory requirements for critical infrastructure Professional Certifications (please mention if the certification is preferred or required for the role): GICSP (Global Industrial Cyber Security Professional) – Preferred CISSP (Certified Information Systems Security Professional) – Preferred ISA/IEC 62443 Cybersecurity Certificate – Preferred CompTIA Security+ – Preferred Soft Skills: Excellent analytical and troubleshooting skills Strong verbal and written communication skills Ability to work effectively with global, virtual teams High degree of initiative and self-motivation Ability to manage multiple priorities successfully Team oriented, with a focus on achieving team goals Strong presentation and public speaking skills What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.

Posted 1 month ago

Apply

2 - 5 years

5 - 8 Lacs

Gurugram

Remote

Naukri logo

•Review and triage information security alerts, provide analysis and determine and track remediation and escalate as appropriate •Assist with log management and security information and event management (SIEM) solutions design and configuration Required Candidate profile Scripting in one of the common scripting languages (Python, Bash, Powershell) is an asset. CISSP Certification is a plus.

Posted 1 month ago

Apply

5 - 7 years

20 - 25 Lacs

Chennai

Work from Office

Naukri logo

Responsible for planning and designing new software and web applications. Analyzes, tests and assists with the integration of new applications. Documents all development activity. Assists with training non-technical personnel. Has in-depth experience, knowledge and skills in own discipline. Usually determines own work priorities. Acts as a resource for colleagues with less experience. Core Responsibilities Performs deployment, testing, and validation of networking and system components Recommends alterations and additions to existing designs to improve quality of products Works with operational teams to develop and improve monitoring solutions, plan and schedule maintenance, and implementing changes Develop standards and procedures for managing, monitoring, and updating systems and applications Communicates progress of work in progress, key initiatives, and walkthroughs on complex designs and architecture Works under immediate supervision - Typically reports to a supervisor or manager Employees at all levels are expected to: Bachelor s degree in computer science or similar, and at least 5+ years of experience in the field or in a related area Configuration Management: Continuously assess and optimize security configurations to adhere to best practices. Ensure all current attack vectors are addressed within these configurations. Technology experience and skillsets: o AWS: Cloudwatch, CloudFormation, OpsWorks o Open Source: Ansible, Apache Kafka, Apache Storm, Apache Hadoop, Apache Spark, Elastic, Hashicorp Terraform o Container Tools: Docker, Kubernetes o Monitoring and Visibility: Prometheus, Influxdb, Cloudwatch, Netdata, other time series database Should know basic: o Python o DNS setup o Networking Good operational experience with DevSecOps processes and expertise on network installations, e. g. firewalls, load balancing, VPCs, WAF, DNS, SSL, CDN, etc. distinguishes you Strong communication skills understanding the value of good documentation, ability to detail complex systems in simple language, and express concerns about design and architecture with appropriate solutions Alignment and Collaboration: Collaborate with the internal security team to establish consolidated standards and implement security scanning for artifacts and images to identify vulnerabilities during the deployment process. Cloud Security: Identify and implement a standardized approach for security monitoring and implementation across multi- and hybrid-cloud environments. Education Bachelors Degree While possessing the stated degree is preferred, Comcast also may consider applicants who hold some combination of coursework and experience, or who have extensive related professional experience.

Posted 1 month ago

Apply

8 - 12 years

25 - 35 Lacs

Noida, Gurugram, Delhi / NCR

Hybrid

Naukri logo

About KPMG in India KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant with local laws, regulations, markets and competition. KPMG has offices across India in Ahmedabad, Bengaluru, Chandigarh, Chennai, Gurugram, Hyderabad, Jaipur, Kochi, Kolkata, Mumbai, Noida, Pune, Vadodara and Vijayawada. KPMG entities in India offer services to national and international clients in India across sectors. We strive to provide rapid, performance-based, industry-focused and technology-enabled services, which reflect a shared knowledge of global and local industries and our experience Role & responsibilities: The candidate should be hands-on in managing Security Operations, SOC, Identify access management, Risk Management Should have worked on Blueprinting and Designing of SOC frameworks and implementation of SOC/SIEM solution and Enterprise Architecture Should be hands-on on security processes with good client and Market facing experience in India geography Should have worked on Designing, solutioning and Implementation of Cyber Security Frameworks - Security Operations Strategy, Vulnerability Management - Application & Infrastructure and Threat Intelligence and Analytics Preferred candidate profile : Should have worked on the below - M&A experience - Actively monitoring, analyzing & escalating SIEM alerts based on correlation rules, Active threat hunting on network flow, user behavior and threat intelligence Candidate should have expert level domain knowledge (Cyber Security), Threat Hunting, SIEM - Azure Sentinel, SIEM - (RSA / Splunk / LogRhythm/Qradar ), Ability to Comprehend Logs (HTTP, SMTP, Network), Operating systems and servers, Organizes Technical Sessions / Talks. Candidate should able to familiar with python Scripting & Windows Active Directory (Optional). Vulnerability Management Services - External & internal Vulnerability scanning, VMS tool Qualys & Kenna Administration, Application server & Vulnerability scanning Candidate should have expert level domain knowledge (Cyber Security), Vulnerability scans and recognizing vulnerabilities in security systems, Network analysis tools to identify vulnerabilities, Develop insights about the context of an organizations threat environment, Risk management processes, Network attack and a network attacks relationship to both threats and vulnerabilities. Candidate should have advance level understanding of Impact/risk assessments. Security Operations and Management experience - SOC Experience in Identity access, privilege access, vulnerability management Client facing - front end with the client- focused on engagements + Sales, BD + Capability Development Qualification: B.Tech / M.Tech/ MCA professional with 9-12 years of experience in the relevant role Should have strong hands on MS Power Point and MS Project Hands on experience and certification in any one SIEM (IBM QRadar, ArcSight, Azure Sentinel, Splunk) Security Certifications like CISSP, CISM, GIAC, Security+ etc Equal employment opportunity information KPMG India has a policy of providing equal opportunity for all applicants and employees regardless of their color, caste, religion, age, sex/gender, national origin, citizenship, sexual orientation, gender identity or expression, disability or other legally protected status. KPMG India values diversity and we request you to submit the details below to support us in our endeavor for diversity. Providing the below information is voluntary and refusal to submit such information will not be prejudicial to you.

Posted 1 month ago

Apply

7 - 12 years

15 - 22 Lacs

Pune

Work from Office

Naukri logo

For Soc L3-Position: 7Yrs+ hands on Exp. Ready to work for Rotational shifts.(24*7), Team management & Shift roaster Location: Pune Roles and Responsibilities Key Skills: 1.SIEM tool exp-preferably Arc sight. 2. Log Analysis 3.Incident Response 4.DLP experience 5.Investigation Knowledge 6.Rules creation 7.Alert management. 8.Use case Creation 9.Team management 10.Shift Roaster 11.Monthly reports Key Responsibilities To handle the daily monitoring of information security events. To function as an intrusion analyst by examining security events for context, appropriateness and criticality To act as an information security researcher to provide insight and understanding of new and existing information security threats Key Operational Activities Daily checklists and tasks Log analysis and review Vulnerability management activities Alert analysis Investigation of suspicious security event activity Maintain and enforce adherence to corporate standards, policies and procedures Please share your profile to anwar.shaik@locuz.com

Posted 1 month ago

Apply

4 - 9 years

7 - 11 Lacs

Hyderabad

Work from Office

Naukri logo

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT ? ? Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

5 - 8 years

16 - 21 Lacs

Chennai, Pune

Work from Office

Naukri logo

IT Risk and Governance Selected candidate to support our client, APAC based Investment bank, in IT risk and governance profile. JOB SUMMARY: The client is seeking an experienced and proactive 1st line Risk and Governance candidate. The successful candidate will play a crucial role in Client’s Regional team in driving 1st line IT risk management, and Identity Access Management activities for all business units. KEY RESPONSIBILITIES Drive 1st line IT risk management activities regionally through annual RCSA review, user security awareness campaigns, key risk indicator (KRI) metric reporting, IT issue management, IT dispensation and support management in different steering committee or risk reporting forums. Support client’s compliances to APAC regulatory requirement on Technology Risk Management and Cyber Security through various governance activities. Management and support for Identity Access Management related projects, operations, risk, and compliance activities. Work with Group Information Security team to ensure alignment of local country security controls with regional and group policy/standard/guideline. Manage all internal/external audits and regulatory inspections for Singapore and provide advisory on IT RFIs for Country LBUs. Provide support to third party security risk assessment associated with third party vendors and clients. Work closely with stakeholders from business, IT, 2nd line enterprise/operation risk, and group/external 3rd line auditor to ensure effective security controls in place. EXPERIENCE / QUALIFICATIONS 5-10 years working experiences in information security and/or IT Risk areas, preferably within financial institution, or from consulting firm. Proficiency and in-depth knowledge and experience in identity and access management. Knowledge and experience in IT risk management and an understanding of regulatory requirements particularly in the following domains: security risk management, change management, data leakage prevention, application security, cloud security, vulnerability management, security monitoring, security incident response and 3rd Party Security Risk. A plus to have knowledge on Privacy (PDPA) Ordinance/requirement of APAC countries. Can work independently with ownership and able to work with multiple IT stakeholders/leaders, 2nd line (OPS risk) and 3rd line (IT Audit) stakeholders. Either one or more of below IT security certificates CISSP, CISA, CISM, CCSP OTHER TRAITS Possess excellent communication skills, with the ability to effectively convey messages to diverse stakeholders effectively at all levels in different geographies. Can effectively navigate through a complex environment undergoing change and managing internal and external stakeholders to resolve issues with objectives aligned. Ability to deliver work within tight timescales, to budget and to a high quality. Exhibit proactiveness in identifying, articulating, and remediating gaps and issues.

Posted 1 month ago

Apply

0 - 1 years

0 Lacs

Bengaluru

Work from Office

Naukri logo

Security operations team is responsible for ensure that the Confidentiality, Integrity and availability of the organization is always protected. The person working in L1 SOC team operates the security monitoring solutions, reacting timely to security events as identified. The role requires working in shift schedule to cover 24/7. JOB FUNCTION AND RESPONSIBILITIES: Monitoring and analysis of cyber security events from various Security Tools. Triage security events and incidents, detect anomalies, and report remediation actions. Execution of SOC procedures Monitoring and timely release of quarantined emails. Analysis of phishing emails reported by internal end users. Escalation of incidents/tickets to be handled to L2/L3 SOC team members, when relevant. Follow up on remediation activities. Ensure completeness of the incident information. Triage on general information security tickets. First level contact for MSP to connect with for any support. QUALIFICATION: Pursuing/bachelors degree from an accredited college/university, with a specialized curriculum focused on Information Security. Keen to learn the security technologies and how security operates. Keen on entering the information security world and developing oneself in that direction. Reliability and overall good communication skills. we'll-developed logical thinking capabilities, in order to be able to investigate cases. Willing to work in shifts and weekend.

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies