Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 7.0 years
7 - 11 Lacs
bengaluru
Work from Office
We are seeking an experienced QRadar Incident Forensic Specialist to manage the deployment, configuration, and day-to-day operations of the QRadar SIEM platform while supporting incident response and forensic investigations. The ideal candidate will play a critical role in enhancing security monitoring, investigating incidents, and ensuring seamless SIEM operations. This role requires a blend of expertise in QRadar deployment, incident handling, and forensic analysis to improve the organization’s security posture, Plan, design, and deploy QRadar SIEM environments including Incident forensic, ensuring proper integration with network devices, servers, and applications Required education Bachel...
Posted 2 months ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
Role Overview: As a Security Analyst/Engineer, you will support the security operations of the organization by assisting in monitoring, detecting, and responding to security incidents. This role involves a mix of security analysis and engineering tasks, allowing you to progress from foundational knowledge to more advanced responsibilities and significantly contribute to the organization's cybersecurity efforts. Key Responsibilities: - Security monitoring and analysis: - Assist in monitoring security events and alerts from various sources like SIEM, IDS/IPS, antivirus systems, and endpoint detection platforms. - Conduct initial analysis of security events to determine their nature and potenti...
Posted 2 months ago
8.0 - 12.0 years
0 Lacs
noida, uttar pradesh
On-site
Role Overview: As a Security Architect at EY, you will lead the implementation of security solutions for clients, supporting their efforts to protect their business from cyber threats and ensure business resilience. You will work with a team of specialists to address complex information security needs and leverage advanced security tools to combat cybercrime effectively. Key Responsibilities: - Provide Enterprise and Cyber security architecture services for global clients, focusing on a multi-layered security approach. - Develop reusable solutions to common security issues, including design patterns and best practices, aligning with industry standards such as NIST, CIS, or vendor recommendat...
Posted 2 months ago
8.0 - 12.0 years
0 Lacs
maharashtra
On-site
As a SOC Delivery Manager at Aujas West, your primary responsibility will be to manage the West region clients and a team of security analysts and incident handlers. Your team will be providing 24x7x365 security monitoring and incident response functions. Key responsibilities include: - Developing and delivering long-term roadmap strategies. - Assisting in the development of processes and procedures to enhance security operations functions, incident response times, incident analysis, and overall SOC functions. - Researching industry trends, identifying ongoing security threats, analyzing new security testing tools, and providing recommendations on the need and usefulness of services and prod...
Posted 2 months ago
9.0 - 13.0 years
0 Lacs
karnataka
On-site
As a Technical Architect at EY's Cyber Security team, you will lead the end-to-end design, implementation, and optimization of multiple SIEM/EDR/NSM solutions for clients. Your role will involve collaborating with clients" cross-functional teams to gather requirements, develop use cases for SIEM implementations, and implement security best practices within the SIEM/EDR/NSM environments. Moreover, you will be responsible for managing security tools and technologies used by the SOC team, providing technical leadership, and advising junior team members on SOC activities. **Key Responsibilities:** - Design and architect scalable SIEM solutions to meet clients" business requirements. - Solution c...
Posted 2 months ago
5.0 - 9.0 years
0 Lacs
hyderabad, telangana
On-site
As an experienced Product Security Engineer, you will play a crucial role in integrating security practices into all stages of the product development lifecycle. Your responsibilities will include: - Threat Modeling & Risk Assessment: - Conduct thorough threat modeling sessions for new features and system architectures. - Identify potential attack vectors and security vulnerabilities early in the development process. - Collaborate with product and engineering teams to prioritize security requirements based on risk assessment. - Develop and maintain threat models for both existing and new products. - Security Testing & Validation: - Perform security testing of web applications, mobile applica...
Posted 2 months ago
5.0 - 9.0 years
0 Lacs
karnataka
On-site
You will be leading a team of security analysts through an 8-hour rotational shift schedule, conducting real-time security monitoring and responding to incidents across various networks using a variety of tools and methodologies. Your role will involve maintaining support for the group's infrastructure to ensure service levels meet expectations. Additionally, you will be responsible for developing and managing Security Information and Event Management (SIEM) use cases, identifying and documenting incidents through proactive threat hunting procedures, and executing vulnerability assessments within the company's network infrastructure. Collaboration with stakeholders to mitigate identified ris...
Posted 2 months ago
3.0 - 7.0 years
0 Lacs
tamil nadu
On-site
You will be responsible for executing assigned work orders, support tickets, and project tasks to meet Managed Security Services Provider (MSSP) obligations for new and existing customer facilities. This includes routine maintenance, support tasks, troubleshooting, and acting as an escalation point within the MSS team framework. You must have a strong understanding of IT/OT systems and possess strong security and network posture. Key Responsibilities: - User provisioning, upgrade/patch, monitoring, problem resolution, and configuration management - Execute provided Standard Operating Procedures (SOP) and policies - Modify permissions and access control lists - Manage backup and recovery serv...
Posted 2 months ago
5.0 - 10.0 years
5 - 7 Lacs
gummidipoondi
Work from Office
Role & responsibilities Security Operations, Leadership Management, Risk Management, Incident Response Investigation, Inventory , Employees Attendance , Contract Management, Patrolling , Asset Production, Documentation reporting, Preferred candidate profile Any Industry
Posted 2 months ago
5.0 - 9.0 years
0 Lacs
haryana
On-site
Role Overview: You will be responsible for monitoring, analyzing, and detecting security events and incidents in the 24X7 SOC Environment. Your role will include managing, tuning, and optimizing the SIEM tool (LogRhythm) to meet business requirements. Additionally, you will provide recommendations to the client's security team to enhance security controls, create operational guidelines, processes, and procedures with the SOC manager, and handle escalated security incidents with deep dive analysis, threat hunting, and malware analysis. Key Responsibilities: - Manage, tune, and optimize the SIEM tool (LogRhythm) - Provide recommendations to optimize security controls such as IDS/IPS, endpoint ...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of sec...
Posted 2 months ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of sec...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Job Description Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of sec...
Posted 2 months ago
4.0 - 7.0 years
8 - 18 Lacs
bengaluru
Work from Office
Cyber Operations Center - Con - BLR - J49650 Key Responsibilities: Apply a fundamental understanding of cyber security operations and monitoring to perform the day-to-day operational responsibility of security monitoring and incident response activities, associated with operations that provide up to 24x7 coverage. Implement efficiencies and improvements. Response activities may include incident response, incident management, driving remediation or threat mitigation, threat hunting, forensic analysis, etc. Other security operations activities may include identification of weakness (e.g. vulnerabilities / insecure configurations), reviewing/assessing security configuration change requests, dri...
Posted 2 months ago
9.0 - 14.0 years
11 - 15 Lacs
bengaluru
Work from Office
We re looking for Technical with expertise in SOC Operations with strong hands-on knowledge on SIEM, EDR, NSM and Threat Intelligence solutions. Your key responsibilities Expertise in SIEM (Splunk/Sentinel) architecture, deployment, and administration, along with a strong understanding of data analytics and security operations. Design and architect scalable SIEM solutions to meet client s business requirements. Solution creation for complex client requirements in RFP/Proposals Collaborate with client s cross-functional teams to gather requirements and develop use cases for SIEM implementations Implement security best practices and compliance standards within the SIEM/EDR/NSM environments Res...
Posted 2 months ago
5.0 - 9.0 years
7 - 8 Lacs
bengaluru
Work from Office
Technology | Microsoft Certified: Security, Compliance, and Identity Fundamentals / CISSP/CISM/CEH/GIAC CIH/CSA/CompTIA CySA+/Cisco Certified CyberOps Associate/Splunk Core Certified User/IBM Certified SOC Analyst - IBM QRadar SIEM V7.3.2 Delivery Skills required are: - Technical Skills: - *Identifying and analyzing potential threats and vulnerabilities using various tools and techniques. *Leading and managing the response to security incidents, including containment, eradication, and recovery. *Implementing and maintaining security monitoring systems, such as SIEM (Security Information and Event Management) tools. *Prioritizing and remediating vulnerabilities based on risk assessments. Oper...
Posted 2 months ago
0.0 - 4.0 years
1 - 2 Lacs
bareilly
Work from Office
Responsibilities Patrol and Surveillance: Regularly patrol designated areas, buildings, and perimeters to ensure the safety and security of the property and its occupants. Monitoring Systems: Operate and monitor surveillance equipment, including CCTV cameras and alarm systems, to detect any suspicious activity or security breaches. Access Control: Control access points by permitting or refusing entry to authorized personnel, visitors, and vehicles, and verifying credentials. Incident Response: Respond to alarms, emergency calls, and other security concerns, taking appropriate action to resolve incidents or alert the proper authorities. Reporting: Maintain detailed daily logs and incident rep...
Posted 2 months ago
4.0 - 8.0 years
0 Lacs
thiruvananthapuram, kerala
On-site
At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. As part of our EY-cyber security team, you shall work as a SOC Senior consultant who will assist clients in the Administration and management of CrowdStrike Next-Gen SIEM/EDR. Your Key Responsibilities: - Administration and management support of CrowdStrike Next-Gen SIEM/EDR - Perform as the subject matter expert on any of the above solutions...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 2 months ago
3.0 - 5.0 years
7 - 11 Lacs
mumbai
Work from Office
Role Purpose The purpose of the role is to create exceptional architectural solution design and thought leadership and enable delivery teams to provide exceptional client engagement and satisfaction. Do 1.Develop architectural solutions for the new deals/ major change requests in existing deals Creates an enterprise-wide architecture that ensures systems are scalable, reliable, and manageable. Provide solutioning of RFPs received from clients and ensure overall design assurance Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications in order to better match business outcome objectives Analyse technology environment, enter...
Posted 2 months ago
2.0 - 5.0 years
3 - 7 Lacs
mumbai
Work from Office
Advanced Incident Analysis: Utilize advanced tools and techniques to analyze and investigate security incidents detected within the organization's networks and systems. Incident Response: Lead incident response efforts, coordinating with internal and external stakeholders to mitigate and remediate security incidents promptly. Team Leadership: Provide mentorship and guidance to the L1 SOC team, assisting in the development of their skills in incident analysis, parser creation, rule views, and report management. Parser Creation: Develop and maintain parsers to enhance the capability of the SOC's security information and event management (SIEM) system in detecting and correlating security event...
Posted 2 months ago
6.0 - 10.0 years
10 - 20 Lacs
bengaluru
Work from Office
Required Skill: 6+ years of technical experience in Information Security. Experience with SIEM tools (Qradar, Splunk, Logrhythm, Solarwinds, etc.) Experience in Azure Sentinel Familiarity with common IDS/IPS and Firewalls (Snort, Cisco, Fortigate, Sourcefire) Familiarity with incident response process and activities Familiarity with TCP/IP protocol, OSI Seven Layer Model Knowledge of Windows, Unix-based systems, architectures, and network security devices Intermediate level of knowledge of LAN and WAN technologies Must have a solid understanding of information technology, information security domains Knowledge of security best practices and concepts Desired certifications: Security+, C|EH, N...
Posted 2 months ago
8.0 - 13.0 years
13 - 17 Lacs
chennai
Work from Office
About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NA Minimum 5 year of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collab...
Posted 2 months ago
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
174558 Jobs | Dublin
Wipro
55192 Jobs | Bengaluru
EY
44116 Jobs | London
Accenture in India
37169 Jobs | Dublin 2
Turing
30851 Jobs | San Francisco
Uplers
30086 Jobs | Ahmedabad
IBM
27225 Jobs | Armonk
Capgemini
23907 Jobs | Paris,France
Accenture services Pvt Ltd
23788 Jobs |
Infosys
23603 Jobs | Bangalore,Karnataka