Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
1.0 - 5.0 years
0 Lacs
maharashtra
On-site
As a Surveillance Operator, you will be responsible for actively monitoring multiple screens to detect suspicious behavior, unusual activity, or potential security breaches. You will need to take prompt action when security alerts or incidents are detected, such as contacting security personnel or enlisting authority. It is crucial to keep accurate records of all surveillance activities, incidents, and any actions taken. Your role will also involve communicating with on-site security personnel or other relevant parties as needed. You will be expected to troubleshoot minor technical issues with the CCTV system and ensure adherence to data protection and privacy regulations. Additionally, prep...
Posted 1 month ago
7.0 - 12.0 years
13 - 17 Lacs
thiruvananthapuram
Work from Office
Perform forensic and malware analysis to detect, investigate, and resolve security incidents, including artifact classification and payload extraction Engage in proactive threat hunting and provide expert security assessments, utilizing EDR, SIEM, and other tools to understand and counteract the cybercrime landscape Communicate with IT stakeholders during incident response activities, ensuring effective containment, remediation, and accurate identification of compromise indicators Report on incident metrics, analyse findings, and develop reports to ensure comprehensive resolution and understanding of security events Act as an escalation point for incident response, shift lead, mentor junior ...
Posted 1 month ago
2.0 - 5.0 years
7 - 8 Lacs
bengaluru
Work from Office
Technical Skills: - *Identifying and analyzing potential threats and vulnerabilities using various tools and techniques. *Leading and managing the response to security incidents, including containment, eradication, and recovery. *Implementing and maintaining security monitoring systems, such as SIEM (Security Information and Event Management) tools. *Prioritizing and remediating vulnerabilities based on risk assessments. Operational Skills: - *Developing, implementing, and enforcing security policies, standards, and procedures. *Managing and maintaining secure configurations for systems, networks, and applications. *Overseeing the timely application of security patches and updates to systems...
Posted 1 month ago
3.0 - 7.0 years
7 - 11 Lacs
bengaluru
Work from Office
Your role and responsibilities We are seeking an experienced QRadar Incident Forensic Specialist to manage the deployment, configuration, and day-to-day operations of the QRadar SIEM platform while supporting incident response and forensic investigations. The ideal candidate will play a critical role in enhancing security monitoring, investigating incidents, and ensuring seamless SIEM operations. This role requires a blend of expertise in QRadar deployment, incident handling, and forensic analysis to improve the organization€™s security posture, Plan, design, and deploy QRadar SIEM environments including Incident forensic, ensuring proper integration with network devices, servers, and applic...
Posted 1 month ago
2.0 - 5.0 years
8 - 13 Lacs
bengaluru
Work from Office
We are looking for a Senior Python Developer with 6 8 years of experience to design and implement the integration between Zeek, Suricata, and downstream systems (Kafka/Logstash) The candidate will also play a key role in developing the correlation engine, routing/enrichment pipelines, and scaling the solution for high-throughput OT security monitoring Mandatory Skills: Expert-level Python (3-7+), with proven experience in building scalable back-end services Strong experience with streaming/data pipelines (, message queues, or similar) Familiarity with correlation engine development (rule-based, enrichment, anomaly detection) Experience in building microservices in Python (FastAPI, Flask, etc...
Posted 1 month ago
2.0 - 5.0 years
7 - 8 Lacs
bengaluru
Work from Office
Education Qualification : B Sc Skills : Primary -> Technology | Sentinel SIEM Tool Administrator | Level 2 Support | 2 - Knowledgeable Primary -> Technology | Securonix SIEM Tools Administrator | Level 2 Support | 2 - Knowledgeable Certification : Technology | Microsoft Certified: Security, Compliance, and Identity Fundamentals / CISSP/CISM/CEH/GIAC Certified Incident Handler/Certified SOC Analyst (CSA)/CompTIA Cybersecurity Analyst (CySA+)/Cisco Certified CyberOps Associate Delivery Skills required are: - Technical Skills: - *Identifying and analyzing potential threats and vulnerabilities using various tools and techniques *Leading and managing the response to security incidents, including ...
Posted 1 month ago
3.0 - 5.0 years
0 Lacs
gurgaon, haryana, india
Remote
Job Title- Cybersecurity Operation Analyst Position type- Full Time Work Location- Gurugram Working style- Remote People Manager role: No Required education and certifications critical for the role- Any Graduate or Post-Graduate (full time) Required years of experience - Minimum 3+ years of relevant experience Are you a Cyber Security professional with Security Monitoring and Incident response experience Are you looking for exposure to a wide range of cyber threats across a global footprint Willing to provide support on weekends and early morning shifts If yes, we would love to hear from you! Aon is recruiting for a cybersecurity operations analyst to join our team. This is a remote role tha...
Posted 1 month ago
5.0 - 10.0 years
12 - 17 Lacs
bengaluru
Work from Office
This Position reports to: IS Manager Are you ready to lead the charge in defending global digital infrastructure against cyber threats? At ABB Robotics, we are seeking a dynamic and experienced IS Global Security SecOps Manager to head our Security Operations Center (SOC). This is a high-impact leadership role where you will shape our threat detection, incident response, and security monitoring capabilities across all regions and digital business products. The position is global and the preferred locations are Poland, India, Spain, Italy, Sweden and China. Your responsibilities: Lead the design, implementation, and operation of the global Security Operations Center (SOC), ensuring resilience...
Posted 1 month ago
15.0 - 20.0 years
3 - 7 Lacs
chennai
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Accenture MxDR Ops Security Threat Analysis Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. You will provide services to safeguard information, infrastructures...
Posted 1 month ago
15.0 - 20.0 years
3 - 7 Lacs
chennai
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Accenture MxDR Ops Security Threat Analysis Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply your security skills to design, build, and protect enterprise systems, applications, data, assets, and people. Your typical day will involve collaborating with various teams...
Posted 1 month ago
5.0 - 8.0 years
5 - 9 Lacs
mumbai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 month ago
0.0 years
0 Lacs
bengaluru, karnataka, india
On-site
Company Summary DISH Network Technologies India Pvt. Ltd is a technology subsidiary of EchoStar. Our organization is at the forefront of technology, serving as a disruptive force and driving innovation and value on behalf of our customers. Our product portfolio includes Boost Mobile (consumer wireless), DISH TV (direct broadcast satellite), Sling TV (over-the-top service provider), Hughes (global satellite connectivity solutions) and Hughesnet (satellite internet). Our facilities in India are some of EchoStar's largest development centers outside the U.S. As a hub for technological convergence, our engineering talent is a catalyst for innovation in multimedia network and communications devel...
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
pune
Work from Office
About The Role We are seeking an experienced Senior CICS product engineer who is specialized in managing and maintaining IBMs CICS software. The ideal candidate will be responsible for full CICS lifecycle, including installation, configuration, maintenance. Lead the design, implementation, and maintenance of CICS MF infrastructure to ensure optimal performance, reliability, and availability. As a Product Engineer for CICS, you will work closely with the development, operations, and infrastructure teams to provide high-level technical expertise on CICS application lifecycle management. You will contribute to the overall strategic direction of the CICS systems in alignment with business object...
Posted 1 month ago
5.0 - 8.0 years
5 - 9 Lacs
kochi
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secur...
Posted 1 month ago
5.0 - 8.0 years
5 - 9 Lacs
mumbai
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secur...
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
noida
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secur...
Posted 1 month ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secur...
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secur...
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secur...
Posted 1 month ago
5.0 - 8.0 years
9 - 14 Lacs
pune
Work from Office
Job Description Must Have: Skill required: SIEM architect - Focusing on log source onboarding ,design architectures,work flows,Client stakeholder Interactions, understanding of overall network infrastructure. XSIAM Admin Looking after log source onboarding,Profiles/polices maintenance, usecase development, Integrations, playbooks, Platform support, Parser development Palo_XDR Admin Agent deployments/Troubleshooting, tailored policyprofile creations,alert handling, Threat Hunting,Agent maintenance Content Development Use case development(XQL),Threat hunting, Parser development, Python knowledge is required. XSIAM_SOAR Developer Custom integrations, Playbook Development Key Responsibilities Le...
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
chennai
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secur...
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
pune
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secur...
Posted 1 month ago
3.0 - 5.0 years
7 - 11 Lacs
pune
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of secur...
Posted 1 month ago
5.0 - 8.0 years
5 - 9 Lacs
hyderabad
Work from Office
Bluecoat Proxy Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of securi...
Posted 1 month ago
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
174558 Jobs | Dublin
Wipro
55192 Jobs | Bengaluru
EY
44116 Jobs | London
Accenture in India
37169 Jobs | Dublin 2
Turing
30851 Jobs | San Francisco
Uplers
30086 Jobs | Ahmedabad
IBM
27225 Jobs | Armonk
Capgemini
23907 Jobs | Paris,France
Accenture services Pvt Ltd
23788 Jobs |
Infosys
23603 Jobs | Bangalore,Karnataka