1585 Security Monitoring Jobs - Page 15

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 5.0 years

3 - 7 Lacs

mumbai

Work from Office

Advanced Incident Analysis: Utilize advanced tools and techniques to analyze and investigate security incidents detected within the organization's networks and systems. Incident Response: Lead incident response efforts, coordinating with internal and external stakeholders to mitigate and remediate security incidents promptly. Team Leadership: Provide mentorship and guidance to the L1 SOC team, assisting in the development of their skills in incident analysis, parser creation, rule views, and report management. Parser Creation: Develop and maintain parsers to enhance the capability of the SOC's security information and event management (SIEM) system in detecting and correlating security event...

Posted 1 month ago

AI Match Score
Apply

6.0 - 10.0 years

10 - 20 Lacs

bengaluru

Work from Office

Required Skill: 6+ years of technical experience in Information Security. Experience with SIEM tools (Qradar, Splunk, Logrhythm, Solarwinds, etc.) Experience in Azure Sentinel Familiarity with common IDS/IPS and Firewalls (Snort, Cisco, Fortigate, Sourcefire) Familiarity with incident response process and activities Familiarity with TCP/IP protocol, OSI Seven Layer Model Knowledge of Windows, Unix-based systems, architectures, and network security devices Intermediate level of knowledge of LAN and WAN technologies Must have a solid understanding of information technology, information security domains Knowledge of security best practices and concepts Desired certifications: Security+, C|EH, N...

Posted 1 month ago

AI Match Score
Apply

8.0 - 13.0 years

13 - 17 Lacs

chennai

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NA Minimum 5 year of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collab...

Posted 1 month ago

AI Match Score
Apply

4.0 - 9.0 years

1 - 3 Lacs

kolkata

Work from Office

Job Purpose To ensure the safety and security of the companys people, property, assets, and brand reputation by effectively supervising security personnel across the manufacturing unit, retail showrooms, and corporate office. The Security Supervisor will monitor security operations, train and guide guards, enforce safety protocols, and report security-related incidents. Key Responsibilities 1. Supervision & Monitoring Oversee daily deployment, attendance, and duty rosters of all security guards at manufacturing units, retail outlets, and office premises. • Conduct regular site inspections and patrols to ensure guards are alert and following post instructions. • Monitor access control, CCTV s...

Posted 1 month ago

AI Match Score
Apply

4.0 - 9.0 years

3 - 7 Lacs

gurugram

Work from Office

Notice Period: Immediate . Job Description 1. 4 to 8 years of exp in Security Analyst. 2. 2 to 3 Years of exp in Fine-tune SIEM rules to reduce false positive and remove false negatives. 3. Good exp in SOC (Security Operation Center)

Posted 1 month ago

AI Match Score
Apply

4.0 - 7.0 years

5 - 9 Lacs

bengaluru

Work from Office

JD: Monitor overnight batch jobs on LIVE system Sound knowledge of Operating system V7R3, V7R4 and V7R5 Ensuring all daily tasks are completed on time for all environments. Ensure the timely and correct running of the regular processes Managing the user profiles. Checking that all system backups have run successfully in BRMS Experience in BRMS network Checking and resolving any errors in the message queue Checking and dealing with support calls and service requests logged through the service desk Supporting the security monitoring software Supporting the messenger Halcyon monitoring tool Experience on Native & Advanced job Scheduler Maintaining printers on the iSeries Experience on Tape Libr...

Posted 1 month ago

AI Match Score
Apply

4.0 - 8.0 years

5 - 9 Lacs

bengaluru, karnataka, india

On-site

Role & responsibilities SOC L2 Qradar : Incident Triage and Escalation : Review security alerts and incidents, determine severity, and escalate to the appropriate teams (e.g., L3, incident response) when necessary. Security Monitoring : Leverage SIEM tools like QRadar to actively monitor security events, correlate data, and detect abnormal patterns or potential threats. Root Cause Analysis : Investigate security incidents thoroughly to identify the root cause, using log analysis and threat intelligence to gain deeper insights. Incident Response : Coordinate and contribute to the response efforts during active security incidents, ensuring rapid mitigation and recovery. Threat Hunting : Proact...

Posted 1 month ago

AI Match Score
Apply

2.0 - 6.0 years

0 Lacs

maharashtra

On-site

As a Network Operations Associate at NTT DATA, your role involves continuous monitoring of network and systems, immediate response to alerts and incidents, documentation of incidents and resolutions, and initial incident assessment and triage. You must possess a graduate degree with Certification for Network Operations and have 2-4 years of work experience in network operations. Additionally, you are required to hold an associate level certification of the OEM. Your responsibilities will include: - Basic issue resolution or escalation to L2/L3 as needed - User support and troubleshooting - Logging and tracking of incidents in the ticketing system - Providing on-field support (Hands and Feet ...

Posted 1 month ago

AI Match Score
Apply

8.0 - 12.0 years

0 Lacs

uttar pradesh

On-site

As a Security Analysis Sr. Specialist Advisor at NTT DATA in Noida, Uttar Pradesh, India, your role involves overseeing and coordinating information security services for customers. Acting as a trusted partner, you will collaborate with clients to understand, anticipate, and recommend risk mitigation strategies while ensuring the overall protection of customer information assets. Your responsibilities will include: - Ensuring delivery of information security services in compliance with contracts and relevant standards - Collaborating with clients on defining and implementing information security policies and procedures - Evaluating new security products and technologies, making recommendatio...

Posted 1 month ago

AI Match Score
Apply

6.0 - 11.0 years

7 - 11 Lacs

hyderabad, pune, bengaluru

Work from Office

Job Details Skills - Microsoft Sentinel Experience - 6+Years Location - Hyderabad,Bengaluru,Pune, Chennai. Job type - Contract to HIRE Primary Skills: Strong experience with Microsoft Sentinel architecture, including workspaces, playbooks, and automation. Expertise in Azure Cloud, including Azure Defender for cloud, XDR(MDE/MDI/MDO), and Azure EntraID. Proficiency in KQL and other scripting languages for automation. Secondary Skills: Experience with SIEM solutions and security monitoring tools such as Splunk. Knowledge of network security, identity management, and cloud security best practices. Strong analytical and problem-solving skills. Certifications such as Microsoft Certified: Security...

Posted 1 month ago

AI Match Score
Apply

10.0 - 19.0 years

36 - 48 Lacs

noida

Work from Office

Responsibilities: * Develop security frameworks, manage risks, ensure compliance. * Secure server infrastructure on Windows Server and Linux Server. * Implement network security measures with firewalls and IDS. Health insurance

Posted 1 month ago

AI Match Score
Apply

5.0 - 9.0 years

20 - 25 Lacs

pune

Work from Office

About the Role We are seeking a highly skilled Security Consultant to join our Cisco Secure Access Helpdesk team. The ideal candidate should have a strong foundation in network security, with hands-on experience in deploying and managing security solutions to ensure secure network access and data protection. This role requires expertise in any or all of the following technologies - SASE solutions such as Zscaler and Prisma Access, Cisco Umbrella, VPN deployments such as Cisco AnyConnect, and Next generation firewall configurations. Key Responsibilities Cisco Secure Access Implementation & Migration Deploy and manage Cisco Secure Access SSE solution for assigned customer. Migrate from existin...

Posted 1 month ago

AI Match Score
Apply

4.0 - 6.0 years

2 - 3 Lacs

navi mumbai

Work from Office

We are seeking a talented Production Support Engineer with a minimum of 2+ years of experience, who will be responsible for providing technical support to customers using Java-based applications and certain composition engines like Quadient, OpenText, etc. Provide optimal solutions for the core problems, code fixes, diagnose and fix operational issues. Roles and Responsibilities: Perform trouble shooting, analysis, research and resolution using advanced query and programming skills, Conducts root cause analysis. Look for areas of improvement in monitoring, application stability. Should be open to learn FCI\u2019s inhouse Product and other technologies and excel them. Communicate with line of...

Posted 1 month ago

AI Match Score
Apply

5.0 - 8.0 years

12 - 22 Lacs

pune

Work from Office

Position Summary: We are seeking a highly skilled Security Consultant to join our Cisco Secure Access Helpdesk team. The ideal candidate should have a strong foundation in network security, with hands-on experience in deploying and managing security solutions to ensure secure network access and data protection. This role requires expertise in any or all of the following technologies - SASE solutions such as Zscaler and Prisma Access, Cisco Umbrella, VPN deployments such as Cisco AnyConnect, and Next generation firewall configurations. Key Roles & Responsibilities: Cisco Secure Access Implementation & Migration: Deploy and manage Cisco Secure Access SSE solution for assigned customer. Migrate...

Posted 1 month ago

AI Match Score
Apply

10.0 - 16.0 years

19 - 20 Lacs

gurugram

Work from Office

Manage On-premises servers and their performance Manage network bandwidth LAN WAN VPN Devices security monitoring Enable network and security monitoring using checkpoint (existing tool) Liaise with SAP AMS vendor for any application related infra req

Posted 1 month ago

AI Match Score
Apply

1.0 - 6.0 years

2 - 4 Lacs

pune

Work from Office

Designation: Cyber Security Trainer Experience: 1-6 Yrs Salary: As per Company standards. Work mode: Work form Office Notice Period: Immediately Job Location: Shivaji Nagar, Pune Job Description: We are seeking an experienced and knowledgeable Cybersecurity Trainer to deliver high- quality training sessions to students and professionals. The ideal candidate will have strong expertise in cybersecurity tools, practices, and frameworks, along with the ability to explain complex concepts in a clear and engaging manner. Key Responsibilities: • Design, develop, and deliver cybersecurity training programs (online/offline). • Conduct sessions on core areas such as: Network Security Ethical Hacking &...

Posted 1 month ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

bengaluru

Work from Office

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...

Posted 1 month ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

pune

Work from Office

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...

Posted 1 month ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

bengaluru

Work from Office

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...

Posted 1 month ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

pune

Work from Office

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...

Posted 1 month ago

AI Match Score
Apply

3.0 - 5.0 years

7 - 11 Lacs

bengaluru

Work from Office

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...

Posted 1 month ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

hyderabad

Work from Office

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...

Posted 1 month ago

AI Match Score
Apply

3.0 - 5.0 years

7 - 11 Lacs

mumbai

Work from Office

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...

Posted 1 month ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

pune

Work from Office

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...

Posted 1 month ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

noida

Work from Office

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secu...

Posted 1 month ago

AI Match Score
Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies