Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 8.0 years
5 - 9 Lacs
Bengaluru
Work from Office
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Microsoft Endpoint Protection. Experience: 5-8 Years.
Posted 2 months ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Privilege Password Management CyberArk. Experience: 3-5 Years.
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
Mumbai
Work from Office
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Checkpoint Firewalls and VPN. Experience: 5-8 Years.
Posted 2 months ago
3.0 - 5.0 years
7 - 11 Lacs
Bengaluru
Work from Office
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Palo Alto Networks - Firewalls. Experience: 3-5 Years.
Posted 2 months ago
1.0 - 3.0 years
6 - 10 Lacs
Hyderabad
Work from Office
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: OKTA - Identity and Access Management. Experience: 1-3 Years.
Posted 2 months ago
3.0 - 5.0 years
7 - 11 Lacs
Pune
Work from Office
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Mandatory Skills: Managed Security Services - MSS. Experience: 3-5 Years.
Posted 2 months ago
3.0 - 5.0 years
5 - 7 Lacs
Bengaluru
Work from Office
Responsibilities: Perform real time security monitoring and incident response activities across the networks, leveraging a variety of tools and techniques Create and improve Incident Response Playbook Perform post incident reviews to improve and tune Halma s incident response capability Provide support to the team members while investigating alerts escalated by MSSP & work closely with Leads. Provide support in the area of Azure Active directory, Intune (conditional access/MDM), single sign on and Multifactor Authentication, Microsoft Defender for Endpoint, Microsoft Defender for Server, Office 365 email security. Monitor and respond to security incidents for Halma PLC and Subsidiary companies. Interact with end-users and IT Managers of Halma and Subsidiary companies during investigations, to raise awareness and training opportunities. Create and Maintain KB articles & SOPs for all the applications related to SOC to ensure security best practices in the team. Should be able to work on Incident and Security Reports Independently. Experience (exposure): Total experience 3-5 years Exposure to security technologies including Incident Response, Microsoft Defender, Azure Sentinel. Knowledge of network fundamentals TCP/IP, SSL/TLS, DNS, DHCP. Hands on experience to Microsoft technologies like 365 ATP Defender, Endpoint Manager (Intune- conditional access/MDM/MAM) and KQL knowledge.
Posted 2 months ago
3.0 - 5.0 years
2 - 5 Lacs
Bengaluru
Work from Office
Its fun to work in a company where people truly BELIEVE in what they are doing! Were committed to bringing passion and customer focus to the business. Responsibilities: Perform real time security monitoring and incident response activities across the networks, leveraging a variety of tools and techniques Create and improve Incident Response Playbook Perform post incident reviews to improve and tune Halma s incident response capability Provide support to the team members while investigating alerts escalated by MSSP & work closely with Leads. Provide support in the area of Azure Active directory, Intune (conditional access/MDM), single sign on and Multifactor Authentication, Microsoft Defender for Endpoint, Microsoft Defender for Server, Office 365 email security. Monitor and respond to security incidents for Halma PLC and Subsidiary companies. Interact with end-users and IT Managers of Halma and Subsidiary companies during investigations, to raise awareness and training opportunities. Create and Maintain KB articles & SOPs for all the applications related to SOC to ensure security best practices in the team. Should be able to work on Incident and Security Reports Independently. Experience (exposure): Total experience 3-5 years Exposure to security technologies including Incident Response, Microsoft Defender, Azure Sentinel. Knowledge of network fundamentals TCP/IP, SSL/TLS, DNS, DHCP. Hands on experience to Microsoft technologies like 365 ATP Defender, Endpoint Manager (Intune- conditional access/MDM/MAM) and KQL knowledge. If you like wild growth and working with happy, enthusiastic over-achievers, youll enjoy your career with us! Not the right fit? Let us know youre interested in a future opportunity by clicking Introduce Yourself in the top-right corner of the page or create an account to set up email alerts as new job postings become available that meet your interest!
Posted 2 months ago
2.0 - 5.0 years
1 - 5 Lacs
Pune
Work from Office
About The Role Job Title - Security Operations Center (SOC) Operator Management Level : CL11 Analyst / CL 10 Senior Analyst Location: Pune, PDC3C, Hinjewadi Must have skills: Excellent verbal and written communication skills Access control alarm monitoring CCTV monitoring Risk monitoring Handling safety / security related calls from employees Good to have skills: Experience in Global Security Operations Center / Regional Security Operations Center Sending mass notification / people advisory to employees / travel advisories Job Summary : The SOC Operator will be responsible for assessing, analyzing, and responding to incidents related to safety and security for the APAC region. The role requires daily use of tools/systems (e.g., access control, video management, risk feeds) to detect the impact to Accentures people, products, property, or brand image and alert the appropriate response stakeholders. Specifically, incidents may range from extreme weather conditions, political instability, crime, terror, civil unrest, and other personnel issues. In addition, the Operator will be responsible for customer service tasks to provide critical information and assistance to travelers, static employees, and potentially third parties. This role will be based in Hinjewadi, Pune, Maharashtra and reports to the SOC Shift Supervisor. Roles & Responsibilities: Monitor and operate security systems including access control and CCTV, along with environmental monitoring and mass notification systems. Respond quickly and initiate action related to alarms, phone calls, and environmental monitoring and alerting systems Notify, assist, and direct external emergency personnel and internal resources as necessary Dispatch security officers or law enforcement personnel for alarm response, calls for service, and emergency situations Execute protocols and communicate at all levels across the APAC region to employees, site security leads, safety & security staff, or contracted officers as needed Manage information flows to and from an incident Maintain operational logs, conduct daily shift checklists, handover reports, and incident reports Ensure all forms of communication, such as e-mails, phone conversations, and client interactions, are conducted in a courteous and professional manner, confidentially, and documented appropriately Coordinate with Accentures Corporate Security regional leads on incident detection and management Coordinate with Accentures Corporate executive protection leads on incident detection and management Ensure that complete and accurate information is entered into the incident management system Utilize and execute protocols and standard operating procedures to effectively manage global incidents. Monitor travel safety and security of the company's staff Maintain situational awareness of current global current events. Monitor and respond to global alerts and events affecting company facilities and employees providing immediate information and assistance as needed Initiate mass communication notifications as required Notify leadership of events affecting business operations and employees Ensure proper handling of highly confidential information. Perform other duties assigned by supervisors related to security and safety Additional Information: Experience with CCTV/video management and access control systems such as Genetec video solutions or CCure 9000 Experience with protective intelligence monitoring tools such as Everbridge and ISOS Tracker Great active listening skills Rapport building skills Patient and empathetic attitude Adaptability and flexibility Ability to analyze threats and envision potential or real time impact to operations Ability to respond quickly and calmly to emergencies and stressful situations by exercising proper judgment and decision-making skills Strong Customer Service skills Strong consensus, team building and negotiating skills Ability to work overtime on short notice Strong cultural sensitivities Be able to type a minimum of 35 words per min Excellent written and verbal communication skills Ability to multitask in a fast-paced, at times stressed work environment Strong team player Comfortable with high-tech work environment, and constant learning of new tools and innovations Proficient in Microsoft Windows and Office Suite About Our Company | Accenture Qualification Experience: Minimum 2 year(s) of experience is required Educational Qualification: Degree in any stream
Posted 2 months ago
1.0 - 3.0 years
6 - 9 Lacs
Ahmedabad
Work from Office
Narnarayan Shastri Institute of Technology IFSCS is looking for Cyber Security Professional to join our dynamic team and embark on a rewarding career journey Threat Detection and Analysis: Monitor network traffic, system logs, and security alerts to detect and analyze potential security threats, such as malware, intrusions, and unauthorized access Incident Response: Develop and execute incident response plans to address and mitigate security incidents and breaches Vulnerability Assessment: Identify vulnerabilities in software, hardware, and network configurations, and recommend patches and security updates Security Monitoring: Continuously monitor and analyze security events, assess system vulnerabilities, and recommend security enhancements Security Policies and Procedures: Develop and enforce security policies, standards, and procedures to ensure a consistent and secure computing environment Access Control: Implement and manage access control systems, including user authentication, authorization, and password policies Security Tools: Utilize a range of security tools, such as intrusion detection systems (IDS), intrusion prevention systems (IPS), firewalls, antivirus software, and data encryption
Posted 2 months ago
6.0 - 10.0 years
13 - 14 Lacs
Chennai
Work from Office
About IDP IDP is the global leader in international education services, delivering global success to students, test takers and our partners, through trusted human relationships, digital technology and customer research. An Australian-listed company, we operate in more than 50 countries around the world. Our team is comprised of over 7,000 people of various nationalities, ages and cultural backgrounds. Proudly customer-first, our expert people are powered by global technology. Together, we offer unmatched services, helping local dreams become realities, all over the world. Learn more at www.careers.idp.com Role purpose A s Cloud Ops Engineer is the go-to person for all things cloud-based. They design, plan, create, and implement cloud-based software into other operations of an organization. They play an important role in streamlining operations to make them easy to manage. Key accountabilities Deliver and continually build on the standards of the squad. Keep infrastructure documentation current, including application to infrastructure mapping and asset relationships and dependencies. Suggest and recommend infrastructure enhancements to improve application performance, security and resiliency. Ensure that every development adheres to the team s standards and policies including peer reviews, security, monitoring, testing. Required experience AWS Certified SysOps Engineer. Drive and solve problems impacting critical security systems and implement automation to prevent reoccurrence. Design and implement Disaster Recovery processes. Act as subject matter expert on AWS Providing analytics and forecasts for cloud capacity and cost optimization You have a great understanding of how to utilize CI/CD pipelines to maximize quality in a development team.
Posted 2 months ago
3.0 - 5.0 years
2 - 5 Lacs
Bengaluru
Work from Office
Its fun to work in a company where people truly BELIEVE in what they are doing! Were committed to bringing passion and customer focus to the business. Responsibilities: Perform real time security monitoring and incident response activities across the networks, leveraging a variety of tools and techniques Create and improve Incident Response Playbook Perform post incident reviews to improve and tune Halma s incident response capability Provide support to the team members while investigating alerts escalated by MSSP & work closely with Leads. Provide support in the area of Azure Active directory, Intune (conditional access/MDM), single sign on and Multifactor Authentication, Microsoft Defender for Endpoint, Microsoft Defender for Server, Office 365 email security. Monitor and respond to security incidents for Halma PLC and Subsidiary companies. Interact with end-users and IT Managers of Halma and Subsidiary companies during investigations, to raise awareness and training opportunities. Create and Maintain KB articles & SOPs for all the applications related to SOC to ensure security best practices in the team. Should be able to work on Incident and Security Reports Independently. Experience (exposure): Total experience 3-5 years Exposure to security technologies including Incident Response, Microsoft Defender, Azure Sentinel. Knowledge of network fundamentals TCP/IP, SSL/TLS, DNS, DHCP. Hands on experience to Microsoft technologies like 365 ATP Defender, Endpoint Manager (Intune- conditional access/MDM/MAM) and KQL knowledge. If you like wild growth and working with happy, enthusiastic over-achievers, youll enjoy your career with us! Not the right fit Let us know youre interested in a future opportunity by clicking Introduce Yourself in the top-right corner of the page or create an account to set up email alerts as new job postings become available that meet your interest!
Posted 2 months ago
1.0 - 3.0 years
3 - 7 Lacs
Guwahati
Work from Office
Security Agent Guardian and Protector. You ensure the safety and wellbeing of your fellow employees, guests and visitors. You are attentive, efficient and committed, and will ensure your property remains a safe, enjoyable workplace and travel destination. What is in it for you: In 3-4 bullet points, showcase the benefits and perks of working at the property Employee benefit card offering discounted rates in Accor worldwide Learning programs through our Academies Opportunity to develop your talent and grow within your property and across the world! Ability to make a difference through our Corporate Social Responsibility activities, like Planet 21 What you will be doing: Ensure the overall safety and security of the guests, employees and property premises Investigate and report any violations to law/property policy, occurrences of accidents, complaints, criminal activity and crisis situations Conduct regular floor patrols, cash counts and crowd control Assist guests regarding hotel facilities in an informative and helpful way Your experience and skills include: Relevant security experience is an asset Strong interpersonal and problem solving abilities Highly responsible & reliable
Posted 2 months ago
5.0 - 10.0 years
12 - 20 Lacs
Pune
Work from Office
About the Role We are seeking a highly skilled Security Analyst (Level 2) to join our MSSP SOC team. The ideal candidate will have expertise in SIEM (Splunk, QRadar), XDR/EDR solutions, and security analysis with hands-on experience in investigating and responding to security alerts. This role requires proficiency in reviewing and analyzing Level 1 alerts, providing detailed recommendations, and engaging with customers for incident handling. The candidate should also have basic SIEM administration knowledge and Python scripting skills for troubleshooting and playbook development. Key Responsibilities Threat Detection & Response: Analyze and investigate security alerts, events, and incidents generated by SIEM, XDR, and EDR solutions. Incident Investigation & Handling: Conduct in-depth security incident investigations, assess impact, and take appropriate actions. Incident Escalation & Communication: Escalate critical incidents to Level 3 analysts or senior security teams while maintaining detailed documentation. Content Management: Develop and fine-tune correlation rules, use cases, and alerts in SIEM/XDR platforms to improve detection accuracy. Malware Analysis: Perform basic malware analysis and forensic investigation to assess threats. Customer Request Handling: Collaborate with customers to address security concerns, provide recommendations, and respond to inquiries. SIEM Administration: Assist in the administration and maintenance of SIEM tools like Splunk or QRadar, ensuring smooth operations. Automation & Playbooks: Utilize Python scripting for automation, troubleshooting, and playbook development to enhance SOC efficiency. Reporting & Documentation: Prepare detailed reports on security incidents, trends, and mitigation strategies. Basic Qualifications B.E/B. Tech degree in computer science, Information Technology, Masters in Cybersecurity 3+ years of experience in a SOC or cybersecurity operations role. Strong knowledge of SIEM tools (Splunk, QRadar) and XDR/EDR solutions. Hands-on experience in threat detection, security monitoring, and incident response. Knowledge of network security, intrusion detection, malware analysis, and forensics. Basic experience in SIEM administration (log ingestion, rule creation, dashboard management). Proficiency in Python scripting for automation and playbook development. Good understanding of MITRE ATT&CK framework, security frameworks (NIST, ISO 27001), and threat intelligence. Strong analytical, problem-solving, and communication skills. Ability to work in a 24x7 SOC environment (if applicable) Preferred Qualifications Certified SOC Analyst (CSA) Certified Incident Handler (GCIH, ECIH) Splunk Certified Admin / QRadar Certified Analyst CompTIA Security+ / CEH / CISSP (preferred but not mandatory
Posted 2 months ago
10.0 - 14.0 years
20 - 35 Lacs
Noida
Work from Office
Lead Security Analyst (P4) Must Have skills: SOC, End to end investigation, L4 ticket investigation, IDR ( Incident Response) , Digital Forensics, Public Cloud Experience: 10 to 14 years Shift: Rotational Job Responsibilities: As a Level 4 (L4) Lead Security and Threat Monitoring Analyst, you will be part of UKGs Global Security Operations Center (GSOC) team investigating events of interest and incidents as they are validated, prioritized, and categorized by UKGs 24x7 L1, L2 and L3 analyst teams. You will facilitate and follow UKG’s standard processes to investigate, contain, eradicate, and respond in a continued and unified effort to protect the confidentiality, integrity, and availability of UKG, our partners’ and customers’ data and services. You will be an escalation point for all incidents, either regionally or during shift assignment; analyzing, confirming, re-prioritizing if necessary and/or escalating/remediating those identified threats within the UKG computing environment. Having handson experience into Digital Forensics and Public cloud. You will work closely with UKG’s GSOC teams in the US, Europe, and India to promote an integrated, uniform, and holistic threat detection and response capability to facilitate and enable a robust and proactive security posture. You will leverage your skills, experience, and creativity to perform initial, forensically sound collection and analysis, methodologies to contain, eradicate, and recover from realized threats such as zero-day, ransomware, malware and other APT’s. Additionally, you will be responsible for participating in incident response activities as part of the Cyber Incident Response Team (CIRT) or as the Cyber Incident Response Lead (CIRL), post incident reporting and continuous improvement recommendations to enhance UKG’s security posture through process development, tool rationalization, detection technique and automation enhancement opportunities and enablement/training possibilities. Due to the nature of the work, you are required to have occasional on-call duties on weekends and/or holidays. Additional work hours may also be required during an incident investigation. Primary/Essential Duties and Key Responsibilities: • Review tickets escalated from L1 or L2 analysts to confirm the priority, category and accuracy of the details and conditions. • Pivot to additional security tools to obtain and ascertain context or information and any other pertinent information to inform on the most effective and efficient mitigation/remediation actions. • Escalate tickets as required to GSOC Director for additional scrutiny and incident declaration. • Collaborate with UKG internal and external groups to develop and execute containment, eradication, and recovery strategies for lower priority incidents. • Identify, approve, and implement blocking, listing and other mechanisms to promote a robust security posture. • Participate in the Cyber Incident Response Plan (CIRP) process as part of the Cyber Incident Response Team (CIRT) or as the Cyber Incident Response Lead (CIRL) to lead and/or support mitigating and/or remediating critical incidents. • Participate in post-incident activities including coordinating and providing input within the requisite reports and identifying areas for continuous improvements within the GSOC enablement, processes or technology. • Provide mentoring and enablement of junior analysts globally to expand and extend UKG’s GSOC capabilities and experiential capacities. Qualification (Experience, Education, Certification, License and Training): • Bachelor's degree in computer science or a related discipline • CISSP, CCSP, GIAC or other relevant cyber security certifications • Working professional with 9+ years of relevant Security/SOC experience Required Qualifications: • Knowledge of the common attack vectors on the network layer, different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). • Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored) and cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). • Knowledge of cybersecurity, incident response methodologies, privacy principles, cyber threats, vulnerabilities, and detection methodologies and techniques for detecting intrusions. • Experience with Splunk, Google Chronicle, Elastic Search, EDR solutions, email security tools, and cloud environments (GCP, Azure). • Knowledge and experience in reverse engineering to understand how an information asset works and analyzing system components to identify potential vulnerabilities. • Knowledge and experience in developing automations using scripting languages like Python and PowerShell to automate various tasks and improve accuracy, enhance task consistency, and increase scalability. • Knowledge and experience in Security Information and Event Management (SIEM) use case and content development techniques and objectives. • Knowledge and experience in conducting and participating in security audits and assessments. • Understanding and experience in developing, and delivering relevant and value-add operational metrics to support and provide visibility into the GSOC program. • Communicate in English: write clearly and speak authoritatively to different audiences (business leaders and engineers). Preferred Qualifications: • Knowledge of new and emerging cybersecurity technologies, threats, and threat vectors. • Knowledge and experience in designing, executing, and reporting threat hunting activities. • Knowledge and experience around offensive security (ethical hacking) techniques to identify and mitigate/remediate vulnerabilities in the UKG environment. • Knowledge and experience in cyber forensic procedures and how to extract information and generate reports in support of incident response and other advanced requirements.
Posted 2 months ago
1.0 - 5.0 years
0 Lacs
karnataka
On-site
Monitoring of Call Queue of CA Spectrum 24*7. Closure of new incidents Liaising with vendors for escalation Configuration & testing of new network devices Management of IP address Implementation of hardening mechanism Process knowledge specific to site Monitoring Status of security components and alerts, ports on firewalls Monitoring Service Status (Up & Running) of network products Logging security incidents Assigning severity to the Incidents logged based on the definition. First level analysis (investigating problems) and closure of known and low priority security incidents. Logging Problem Ticket for unresolved Incidents Installation of security patches & bug fixes System health checks for all security devices Adhering to quality processes in ensuring team objectives are met. Executing Project / Implementation / Delivery & Sustenance activities Customer satisfaction Job Types: Full-time, Permanent Schedule: Day shift Monday to Friday Rotational shift Experience: total work: 1 year (Preferred) Work Location: In person,
Posted 2 months ago
6.0 - 9.0 years
5 - 9 Lacs
Gurugram
Work from Office
> Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT
Posted 2 months ago
5.0 - 8.0 years
30 - 35 Lacs
Pune
Work from Office
: Job Title Information Security Specialist Corporate Title Assistant Vice President LocationPune, India Role Description Everyday DB observes thousands of cyber security intrusion attempts. Deutsche Banks COO Chief Security Office (CSO) integrates both Corporate Security (CS) and Information Security (CISO) as both teams are responsible for mitigating these risks. The CSO team enables the business of Deutsche Bank by providing agile security operational capabilities. With their expertise in Threat Intelligence, Cyber Threat Analytics, Malware Response & Research, Security Monitoring, Incident Response, Forensics and Vulnerability Management, they provide global services from key locations in Frankfurt, Jacksonville and Singapore while leveraging offshore capabilities in Pune and Bucharest. Deutsche Bank AG is looking for Cyber Security professional to support the banks global security monitoring and threat detection capabilities. This role requires a heavy focus on all areas of security monitoring, risk management on privileged access management and familiarity with regulations impacting technology (e.g. MAS TRM Guidelines), requiring at least 5 to 8 years of experience. Candidate will be responsible to provide an oversight of the various security monitoring process to manage security risks and to drive the organizations compliance to regulatory and audit requirements including facilitation of audit activities, address process related queries and drive automation and audit remediation projects. The candidate will need to drive process improvements, procedure document updates, KPI monitoring and operations team management. Candidate will engage across all functional areas of business, operations, and global technologies working in a dynamic, multi-OS environment. This role will play a vital role in present organizations compliance to regulators and managing interactions with auditors. The chosen candidate will be required to provide a degree of strategic, tactical, and day-to-day operational experience to enhance the overall security monitoring, detection, and mitigation process. Candidate must also possess excellent soft skills and verbal communications dealing with senior executive management, customers, clients, auditors, and third-party vendors. What well offer you , 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities Oversee the performance, efficiency, and accuracy of security monitoring operations team ensuring SLAs are met. Proactively review, propose, and implement process changes and monitoring improvements to remediate most significant risks including audit findings, self-identified issues, compliance issues, control gaps and regulatory requirements. Identify opportunities for streamlining of control processes, develop and socialize potential risk mitigation strategies particularly in privileged access management (e.g., bypass monitoring, session log review), and work with various divisions to execute. Improve the delivery of effective control process through technical review and process quality checks. Provide support in the delivery of effective governance including tracking and reporting. Ensure proper training of monitoring teams on new coverage and use cases. Offer subject-matter expertise and act as escalation point when required. Prepare and present monthly functional and operational report. Manage stakeholder queries, facilitate audit activities, and address data requests in a timely manner. Collaborate across CSO and technology teams to respond to internal and external audits, and regulatory inquiries and assessments. Drive automation projects and manage audit remediation deliverables to closure. Practice and promote good risk culture and risk management to manage the risks within banks appetite. Act as primary point-of-contact for regulatory inquiries and engagements. Collaborate with internal and external auditors and stakeholders, providing necessary evidence and artefacts, to facilitate audit processes. Your skills and experience Minimum 5 to 7 years of working Experience with security monitoring platforms and workflows. Proven Experience in area of privileged access management specifically in session log review and bypass monitoring. Proven experience and In-depth knowledge of technology regulations and understanding of regulatory risk management specially of MAS requirements and guidelines. Proven experience and strong understanding of audit process and compliance monitoring and reporting. Analytical mindset and ability to identify, assess and address compliance gaps and security risks. Strong operational background in risk analysis and risk identification. Degree from a university or major course work in computer science, networking, engineering, or other computer-related field of study. One of the following certifications will be an advantageCISSP, CISM, CISA, CRISC Expectations It is the Banks expectation that employees hired into this role will work in the office at least 2-3 days a week in accordance with the Banks hybrid working model. How well support you . . . .
Posted 2 months ago
2.0 - 6.0 years
7 - 10 Lacs
Pune
Work from Office
Safety Officers Job Responsibility Record Keeping: Maintain accurate records of safety inspections, incidents, training, and other safety-related activities. Risk Assessment: Conduct regular risk assessments to identify potential hazards in the workplace and recommend preventative measures. Training and Awareness: Provide employees with safety training and education on relevant regulations, policies, and procedures. Incident Investigation: Investigate incidents and accidents to determine root causes, implement corrective actions, and prevent recurrence. Compliance: Ensure compliance with safety regulations and standards, both local and federal, and keep abreast of any changes. Enforcement: Enforce safety policies, procedures, and regulations to ensure all employees follow safety protocols. Audits and Inspections: Conduct regular safety audits and inspections to identify potential hazards and assess the effectiveness of safety programs. Emergency Preparedness: Develop and implement emergency response plans and provide training on emergency procedures. Record Keeping: Maintain accurate records of safety inspections, incidents, training, and other safety-related activities. Ensure a safe and healthy workplace by implementing safety programs, conducting risk assessments and providing employee training. They also investigate incidents, enforce safety regulations, and contribute to a positive safety culture. Develop safety policies Conducting inspection ( Electrical , MHE , Fire equipment) . 100% KPI monitoring of Safety & security . Security officer :- Security monitoring Investigate a recent security breach. Conducts regular security inspections Inspect and patrol premises regularly Report any suspicious behaviors . Emergency response. Submit reports of daily surveillance activity. Authorize entrance of people and vehicles Secure all exits, doors and windows
Posted 2 months ago
3.0 - 7.0 years
3 - 7 Lacs
Bengaluru
Work from Office
Roles & Responsibilities: 1.Handling alerts and incident on XDR platform 2.Alert & incident triage and analysis 3.Proactively investigating suspicious activities 4.Log all findings, actions taken, and escalations clearly in the XDR and ITSM platform 5.Execute predefined actions such as isolating blocking IPs or disabling user accounts, based on set protocols. 6.Adhere to established policies, procedures, and security practices. 7.Follow-up with tech team for incident closure 8.Participating in daily standup and review meeting 9.L2 Analyst has responsibility to closely track the incidents and support for closure. 10.Working with logsource and usecase management in integrating log sources and developing & testing usecase 11.Work & support on multiple cybersecurity tool (DLP, GRC, Cloudsec tool, DAM) 12.Developing SOP / instruction manual for L1 team 13.Guiding L1 team for triage/analysis and assist in clousure of cybersecurity alert and incidents 14.Handle XDR alerts and followup with customer team for agent updates 15.Escalate more complex incidents to L3 SME for deeper analysis. Key Responsibilities: Security Monitoring & Incident Response Governance Define and maintain security monitoring, threat detection, and incident response policies and procedures.Establish and mature a threat intelligence program, incorporating tactical and strategic threat feeds.Align SOC operations with evolving business risk priorities and regulatory frameworks.Platform & Toolset Management Evaluate, implement, and enhance SIEM platforms, ensuring optimal log ingestion, correlation, and rule effectiveness.Assess and manage deployment of EDR, XDR, SOAR, and Threat Intelligence solutions.Maintain and update incident response playbooks and automation workflows.Ensure consistent platform hygiene and technology stack effectiveness across SOC tooling.SOC Operations & Threat Detection Oversee 24x7 monitoring of security events and alerts across enterprise assets.Lead and coordinate proactive threat hunting across networks, endpoints, and cloud.Manage and support forensic investigations to identify root cause and recovery paths.Govern use case development, log source onboarding, and alert/event triage processes.Regulatory Compliance & Incident Management Ensure timely and accurate incident reporting in compliance with RBI, CERT-In, and other authorities.Retain logs in accordance with regulatory data retention mandates.Enforce and monitor security baselines for endpoints, in line with internal and regulatory standards.Advanced Threat Management & Reporting Plan, conduct, and report on Red Teaming and Purple Teaming exercises to test detection and response capabilities.Participate in and contribute to the Risk Operations Committee (ROC) meetings and initiatives.Review and track SOC effectiveness through KPIs, metrics, and regular reporting dashboards. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Required Qualifications: Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field.3-7 years of experience in SOC management, incident response, or cyber threat detection roles.Hands-on expertise with SIEM (e.g., Splunk, QRadar, Sentinel), EDR/XDR tools, and SOAR platforms.Proven experience in playbook development, forensics, and threat hunting methodologies.Strong understanding of RBI/CERT-In incident reporting guidelines and log retention requirements.Familiarity with MITRE ATT&CK, threat modeling, and adversary emulation techniques. Preferred technical and professional experience Preferred Certifications: GCIA, GCIH, GCFA, CISSP, OSCP, CEH, CHFI, or similar certifications
Posted 2 months ago
2.0 - 7.0 years
6 - 11 Lacs
Bengaluru
Work from Office
Roles & Responsibilities: 1.Handling alerts and incident on XDR platform 2.Alert & incident triage and analysis 3.Proactively investigating suspicious activities 4.Log all findings, actions taken, and escalations clearly in the XDR and ITSM platform 5.Execute predefined actions such as isolating blocking IPs or disabling user accounts, based on set protocols. 6.Adhere to established policies, procedures, and security practices. 7.Follow-up with tech team for incident closure 8.Participating in daily standup and review meeting 9.L1 Analyst has responsibility to closely track the incidents and support for closure. 10.Escalate more complex incidents to L2 analysts for deeper analysis. 11.Work & support on multiple cybersecurity tool (DLP, GRC, Cloudsec tool, DAM) 12.Handle XDR alerts and followup with customer team for agent updates Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Key Responsibilities: Security Monitoring & Incident Response Governance Define and maintain security monitoring, threat detection, and incident response policies and procedures.Establish and mature a threat intelligence program, incorporating tactical and strategic threat feeds.Align SOC operations with evolving business risk priorities and regulatory frameworks.Platform & Toolset Management Evaluate, implement, and enhance SIEM platforms, ensuring optimal log ingestion, correlation, and rule effectiveness.Assess and manage deployment of EDR, XDR, SOAR, and Threat Intelligence solutions.Maintain and update incident response playbooks and automation workflows.Ensure consistent platform hygiene and technology stack effectiveness across SOC tooling.SOC Operations & Threat Detection Oversee 24x7 monitoring of security events and alerts across enterprise assets.Lead and coordinate proactive threat hunting across networks, endpoints, and cloud.Manage and support forensic investigations to identify root cause and recovery paths.Govern use case development, log source onboarding, and alert/event triage processes.Regulatory Compliance & Incident Management Ensure timely and accurate incident reporting in compliance with RBI, CERT-In, and other authorities.Retain logs in accordance with regulatory data retention mandates.Enforce and monitor security baselines for endpoints, in line with internal and regulatory standards.Advanced Threat Management & Reporting Plan, conduct, and report on Red Teaming and Purple Teaming exercises to test detection and response capabilities.Participate in and contribute to the Risk Operations Committee (ROC) meetings and initiatives.Review and track SOC effectiveness through KPIs, metrics, and regular reporting dashboards. Preferred technical and professional experience Required Qualifications: Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field.2 years of experience in SOC management, incident response, or cyber threat detection roles.Hands-on expertise with SIEM (e.g., Splunk, QRadar, Sentinel), EDR/XDR tools, and SOAR platforms.Proven experience in playbook development, forensics, and threat hunting methodologies.Strong understanding of RBI/CERT-In incident reporting guidelines and log retention requirements.Familiarity with MITRE ATT&CK, threat modeling, and adversary emulation techniques.Preferred Certifications: GCIA, GCIH, GCFA, CISSP, OSCP, CEH, CHFI, or similar certifications"
Posted 2 months ago
4.0 - 6.0 years
0 Lacs
Guwahati, Assam, India
On-site
Role Description The Service Desk Engineer will serve as the primary point of contact for users facing IT issues, providing 24/7 support. This role involves diagnosing and resolving technical problems, delivering prompt customer assistance, and ensuring adherence to service quality standards. The engineer will utilize various tools to manage tickets, document resolutions, and consistently strive to maintain high user satisfaction. Key Skills & Competencies Open to work in 24*7 shift environment. Receive, log, categorize and manage technical requests from the users via telephone, email, or a helpdesk system. Monitoring alerts - Performance, health, and security of computing systems, networks, and services to ensure they operate efficiently and securely (Performance Monitoring, Health and Availability Monitoring, Security Monitoring, Network Monitoring, Application Monitoring, Log Analysis, Alerting and Notification). Provide first-level resolutions to customer issue and promptly escalate unresolved queries to the next level of support. Take ownership of severity incidents and service requests ensuring response time, resolution, coordination, and resolution with the appropriate business teams. Manage and log all service requests (SR) from users via various channels (phone, email, portal). Categorize and prioritize service requests based on predefined criteria as per defined SLAs. Provide first-line investigation and diagnosis. Resolve those issues upon first contact when possible or escalate to higher-level support when necessary. Ensuring all faults are progressed & cleared within SLA as per defined targets and CSAT. Monitor the performance of IT services and contribute to reports on service desk performance and user satisfaction. Identify recurring problems and contribute to their resolution. Suggest improvements to the service desk process. Key Skills and Competencies Familiar with working on Windows, Linux, Networking & Cloud technologies. Good command in Microsoft Excel and PowerPoint for reporting and presentations. Excellent English communication and customer handling skills. Proficiency in IT Service Management tools. Knowledge of ITIL practices and methodologies. Experience 4 Yrs. 6 Yrs. Qualifications B. Tech (Electronics, IT, or CS) Preferred, BCA or MCA
Posted 2 months ago
2.0 - 6.0 years
5 - 9 Lacs
Kochi
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
Kochi
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Fortinet Firewall. Experience5-8 Years.
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
Kochi
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Security Log Monitoring. Experience5-8 Years.
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |