Home
Jobs

702 Security Operations Jobs - Page 12

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 5.0 years

5 - 7 Lacs

Hyderabad

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Vulnerability Management.

Posted 2 weeks ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Active Directory.

Posted 2 weeks ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: SAP GRC - Governance-Risk-Compliance.

Posted 2 weeks ago

Apply

8.0 - 13.0 years

8 - 12 Lacs

Gurugram

Work from Office

Naukri logo

Purpose: As the G4S contract security program matures in India, there is significant opportunity to add a direct manager that oversees the operation and assist the customer. This document is a brief job description of roles and responsibilities, and can be adjusted as mutually agreed upon. General Responsibilities The National Account Manager NAM” directly supports the Corporate Security team. NAM’s oversee the organization's security operations, collaborate with governance, and provide insight on best practices. Act as single point of contact for G4S, for all the sites. Ensure KPI’s/MSA are within compliance; develop corrective action for areas in need of improvement. Identify efficiencies and cost saving opportunities. Responsible to ensure proper invoicing accuracy, and limit invoice errors. • Responsible to ensure that all the compliance related to law of the land are adhered hundred percent across all the sites in India. Responsible to ensure correct and timely salaries are paid to resources deployed at UHG sites. Ensure services are provided as per scope of services provided in master service agreement. Provide operational support for contracted locations. Proactively engage in local operations, identify risks, and collaborate with local teams. Support special projects, disaster / emergency responses, and additional service requests. Report as a client/employee liaison during normal operations to include special/emergency services. Maintain compliance with company policies and procedures (G4S & UHG Policy). • Report foreseeable security service issues and identify areas of improvement. • Oversee daily workload for account managers assigned to various branches. • Identify, escalate and implement best practices across the region. • Audit support and execution. Carrying out other projects as directed by the Global Account Director and customer. Specific Duties and Essential Functions Roles and responsibilities are as follows, but not limited to: Daily Activities: Directly support constant change and growth of Corporate Security programs. • Constant collaboration, level setting expectations, and realignment with critical partners. Special projects and assignments from Corporate Security Daily Service Operations Address Staffing Issues/Levels Short Term Requests (Coordination/Office Communication) Financial Analysis (Requests/Input Financial Requests for Governance) • Local Office Communications (Issues/STSR/Updates/KPI’s) Monitoring Emails (UHG, & G4S) Security Access Issues Updating Spreadsheets/Trackers Identifying Gaps in Security Services Weekly Activities: Tour Completion Progress Removal of Services (Coordination/Communication) Permanent Add Requests (Acquisitions) Site Supervisors/Leaders Communications & Meetings Staffing Report to identify staffing levels and open posts with solution • Access/Patrol Badge Updates Updating Rates/HPW/Active Sites Routing Equipment Requests

Posted 2 weeks ago

Apply

3.0 - 8.0 years

3 - 8 Lacs

Hyderabad / Secunderabad, Telangana, Telangana, India

On-site

Foundit logo

In this vital role, the Vulnerability Management Analyst focuses on identifying, assessing, prioritizing, and tracking the remediation of vulnerabilities across our organization's technology stack. You'll play a key role in the security operations team by ensuring known vulnerabilities are managed through their lifecycle using structured processes and tools. You'll analyze vulnerability scan data, correlate threat intelligence (e.g., KEV, EPSS), and work closely with infrastructure, application, and business teams to drive risk-based remediation. Roles & Responsibilities Analyze vulnerability scan results from tools like Tenable, Qualys, or Rapid7 to identify security weaknesses across infrastructure and applications. Prioritize vulnerabilities using multiple criteria, including CVSS, KEV (Known Exploited Vulnerabilities), EPSS (Exploit Prediction Scoring System), asset criticality, and business context. Partner with IT and DevOps teams to track remediation progress and provide technical guidance on mitigation strategies. Monitor threat intelligence feeds to correlate vulnerabilities with current exploit activity. Create and maintain vulnerability metrics, dashboards, and reports for leadership and compliance teams. Support vulnerability assessment activities in cloud environments (AWS, Azure, etc.). Maintain documentation related to the vulnerability management lifecycle. Assist in policy and process development related to vulnerability and patch management. Participate in audits and compliance efforts (e.g., SOX, ISO, NIST, PCI). Basic Qualifications Master's degree and 1 to 3 years of experience in Cybersecurity, vulnerability management, or information security operations; OR Bachelor's degree and 3 to 5 years of experience in Cybersecurity, vulnerability management, or information security operations; OR Diploma and 7 to 9 years of experience in Cybersecurity, vulnerability management, or information security operations. Must-Have Skills Familiarity with vulnerability management tools (e.g., Tenable, Qualys, Rapid7). Understanding of CVSS scoring, vulnerability lifecycle, and remediation workflows. Basic knowledge of threat intelligence and how it applies to vulnerability prioritization. Working knowledge of network, operating system, and application-level security. Ability to analyze scan data and correlate it with business context and threat intelligence. Good-to-Have Skills Experience with KEV, EPSS, and other threat-based scoring systems. Familiarity with patch management processes and tools. Exposure to cloud security and related scanning tools (e.g., Prisma Cloud, AWS Inspector). CompTIA Security+ GIAC GSEC / GCIH Qualys Vulnerability Management Specialist (QVMS) Tenable Certified Nessus Auditor (TCNA) Soft Skills Analytical Thinking: Ability to interpret complex data sets and assess risk effectively. Attention to Detail: Precision in identifying and tracking vulnerabilities and remediation status. Communication Skills: Ability to communicate technical findings to both technical and non-technical audiences. Collaboration & Teamwork: Able to work across IT, DevOps, and security teams to drive resolution. Curiosity & Continuous Learning: Willingness to stay updated with evolving threats and technologies. Problem-Solving Approach: Capability to identify solutions to security weaknesses in diverse environments.

Posted 2 weeks ago

Apply

8.0 - 13.0 years

9 - 14 Lacs

New Delhi, Gurugram, Delhi / NCR

Work from Office

Naukri logo

Job Title: Security Specialist- Male/Female Summary: The Security Specialist will act as SPOC and will be responsible for G4S Operations @client location. He/She is accountable for day-to-day operations of all the sites, including hiring, training, and disciplining staff. Build, improve and maintain relationships with client. He will develop and retain staff; coordinate requisite support services and solve problems to effectively run the contract. Meet or exceed financial & operational goals; provide quality customer service. Provides after-hour emergency response as required. Ensure client SLA and KPI are regularly met & exceeded. Key Responsibilities: Managing local police , law enforcement agencies and aggrieved customers Ensuring a secure work environment for clients Senior officials at the assigned location. Supervise the day to day security operations of client sites. Manage a team of Leads, SSOs. security officers, supervisors and guards including hiring/selection, scheduling, payroll, training, coaching, development and support. Ensure the client sites are provided with high quality security services to protect people and property. Build, improve and maintain effective relationships with both client and employees. Coordinate necessary support services to effectively manage client sites to meet or exceed financial and operational goals and provide quality customer service. Ensure all required reporting and contract compliance requirements are met. Assure regular communication of issues or programs with client Specialists. Handle any escalated security issues or emergency situations appropriately. Other management responsibilities as determined by client & G4S leadership. Communicate staffing needs; assists in identifying, interviewing and hiring quality candidates. Develop staff in both technical and professional skills through performance management (coaching, counseling, disciplining, training, annual formal performance evaluations, recognition, etc.). Ensure compliance to labor laws and central/state regulations. Meet all contractual scheduled hours with a minimum overtime. Coordinate and/or conduct site-specific OJT, client- specific training, and annual refresher training for security personnel, and meet corporate training standards. Develop / maintain operational procedures so that valid, site-specific post orders are always available for emergency reference by the security staff. Manage uniforms, equipment, supplies and vehicles utilized at the account(s), maintaining appropriate inventories and maintenance checklists. Take a proactive role in communicating with client and meeting their needs; interact regularly, listen to issues, provide security and technical expertise and solutions. Ensure complete customer satisfaction and organize Monthly and Quarterly reviews with the client Security Specialists. Serves as a key point of contact to ensure the delivery of high quality customer service for client. Evaluates service quality and initiates any necessary communication and/or corrective action in a timely manner. Maintains a positive, professional environment in full compliance with applicable laws, regulations, policies and procedures; ensures that staff members understand and obey applicable laws, regulations, policies and procedures. Within the scope of contract and assigned duties, reviews appropriate expenditures including equipment, supplies, and vehicles; ensure invoices are correct, delivered and paid in a timely manner. Ensures appropriate staffing levels, in collaboration with area management as necessary; ensures scheduling is handled effectively to meet client requirements while controlling labor costs. Provides input to company initiatives; promptly assists in the resolution of legal, financial, human resources, and administrative issues. Builds and facilitates teamwork and partnerships and the implementation of progressive change. Performs additional functions, duties and specific tasks of a similar nature and scope as necessary to achieve assigned business objectives. Educational Qualification & Experience: Bachelor degree Experience of 7 years or more in a field related to the security industry and/or business management, and progressively responsible experience in security management, or an equivalent combination of education and experience sufficient to perform the essential functions of the job, as determined by client. Competencies (as demonstrated through experience,training, and/or testing): Understanding of security operations, loss prevention, investigations and systems integration. Knowledge of business operations management and human resources administration. Use of personal computers and spreadsheet software. Ability to synthesize business/financial data and develop solutions. Planning, organizing and leadership skills. Oral and written communications skills. Strong customer service and service delivery orientation. Ability to manage security operations at multiple sites dispersed over a wide geographic area. Ability to interact effectively at various social levels and across diverse cultures. - Ability to be an effective leader and member of project teams. Ability to facilitate progressive change. Ability to take initiative and achieve results. Ability to carry out multiple assignments concurrently. Ability to adapt to changes in the external environment and organization. Working Conditions and Physical/Mental Demands: With or without reasonable accommodation, a candidate must have the physical and mental capacity to effectively perform all essential functions described. In addition to other demands, the demands of the job include: Maintaining composure in dealing with authorities, executives, clients staff, and the public, occasionally under conditions of urgency and in pressure situations. Successful passage of background, reference, behavioral selection survey, and controlled substance tests. Ability to travel as necessary to support an account Ability to handle multiple tasks concurrently. Handling and being exposed to sensitive and confidential information. Conducting oral presentations and group meetings. Directing, motivating, training, coaching, and disciplining staff in a positive manner. Reading and analyzing reports and financial data, including related computer usage. Responding on an on-call basis to emergencies and incidents at all hours. On-site , Rotational shift & 6 days a week work culture

Posted 2 weeks ago

Apply

3.0 - 5.0 years

4 - 6 Lacs

Hyderabad

Work from Office

Naukri logo

Position and Key Responsibilities At RSM, analysts work with large and small companies in variety of industries. They develop strong working relationships with their peers within the security operations center (SOC) while learning their clients businesses and challenges facing their organizations. Analysts work as part of a broader team under the direction of more senior analysts, threat hunters, shift leads, intelligence analysts and SOC managers in support of multiple clients. Working in a mutually respectful team environment helps our analysts perform at their best and integrate their career with their personal life. You will have the opportunity to: Role Responsibilities: Investigate security incidents using SIEM tools, automation, and other cybersecurity technologies (i.e. ServiceNow, Stellar Cyber, Hyas Insight and DNS Protect, sentinel One, ELK Stack, Virus total, Shodan, NetFlow, Passive DNS, Silobreaker, Tenable.io, Hatching Triage Sandbox) Analyze, escalate, and assist in remediation of critical security incidents. Improve and challenge existing processes and procedures in a very agile and fast-paced information security environment serving multiple clients Process IDS alerts and identifying incidents and events in customer data. Setup and execution and analysis of vulnerability scans Perform advanced analysis and investigation into alerts as they are identified Performing initial basic malware analysis utilizing automated means (static and dynamic sandbox analysis or other available tools) Incident intake, ticket updates and reporting of cyber events and threat intelligence Understanding, identifying, and researching indicators of compromise (IOCs) from a variety of sources such as threat intelligence reports and feeds Writing incident reports, process documentation, and interact with clients as required Transcribe and implement atomic indicators into a monitoring environment. Consume policy documentation and determine applicability in a network. Work with protocols at layers 2 and higher in the OSI model, to include ARP TCP, UDP, ICMP, DNS, Telnet, SSH, HTTP, SSL, SNMP, SMTP, and other common protocols that use well-known ports. Develops the playbooks to respond and recovery from various attacks/incidents. Drives the automation efforts focused on the closing cases, responding to Cyber events and analyzing data required to enable efficient response activities. Processing of Cyber Threat Intel that is used across RSM detection platforms to understand and prepare for potential threats. Threat intel is heavily used across RSM platforms drive issue prioritization. Open to working shifts in a 24x7 operations environment. Qualifications and Experience: Minimum B.A. or B.S. degree or equivalent from an accredited university by the time employment commences or prior relevant military / law enforcement experience. Computer science, information technology, information systems management, or other similar degrees preferably with a focus on information security 3-5 years experience working in a security operations center, networking operations center or threat intelligence capacity. Possess at least one security industry certification such as CYSA+, Security+, CISSP, SANS GIAC (GSOC, GCIA, GMON, CGCDA) Knowledge of security standards and information security and compliance frameworks, controls, and best practices, including SSAE 16, SOC 2 and SOC3, OWASP Top 10, SANS, NIST Must have a naturally curious mindset and approach to solving problems. Basic understanding of cloud technologies and their operations Experience supporting various operating systems such as Windows/Linux Understanding of IP network protocols

Posted 2 weeks ago

Apply

4.0 - 9.0 years

5 - 9 Lacs

Gurugram

Work from Office

Naukri logo

Conduct research and evaluate technical and all-source cyber intelligence to develop in-depth analysis of the organization s networks, systems, users, and data. Create technical security assessments and cyber threat profiles of current infrastructure. Develop and maintain procedures to meet changing requirements and enable more strategic decisions. Stay abreast of innovative business and technology trends in information security, risk, and controls. Advise on technology initiatives that support the latest trends in information security, risk, and controls. Identify applicable regulatory risks from changes or additions to regulatory guidance and requirements. Provide expertise for resolution and risk mitigation. Perform process-level walkthroughs, control testing, etc, for the identification and assessment of information security risks and controls. Effectively communicate key risks, findings, and recommendations for improvement with key stakeholders. Perform any other duties that may be assigned from time to time. Required skills qualifications: Bachelors degree in Computer Science, Cyber Security, Information Technology, or a similar technical field. Minimum 4 years of IT professional experience, with at least 2 years in Information Security Management. Practical expertise with EDR, SIEM, and SOAR. Experience with Linux, Windows, and Network Operating Systems. Familiarity with microservice architecture, event sourcing, distributed systems, and asynchronous communication. Basic knowledge of Kafka, Docker, Kibana, New Relic, Mongo, Elasticsearch, Oauth2, Kubernetes, Terraform. Proficiency in programming and scripting (Python, Bash, PowerShell). Fluent in English with strong oral and written communication skills. Ability to drive conversations with diverse teams and effectively communicate results to leadership. Highly organized with the ability to prioritize and multitask in a fast-paced environment. Excellent problem-solving skills and the ability to work both independently and as part of a team. Nice-to-have: Certifications such as Microsoft Cybersecurity Architect (SC-100), Microsoft Security Operations Analyst (SC-200), Microsoft Identity and Access Administrator (SC-300), Microsoft Information Protection Administrator (SC-400), Microsoft Security, Compliance, and Identity Fundamentals (SC-900), Microsoft Azure Security Engineer Associate (AZ-500). We offer: At Multitude, we believe in empowering our employees to thrive personally and professionally. Heres what you can look forward to: A Truly Global Workplace - work with professionals from 40+ nationalities, bringing diverse expertise, perspectives, and a collaborative international culture.. Flexible Work - we support work-life balance with remote work options. A Culture of Growth - we invest in your future, offering LinkedIn Learning and mentorship. Group Medical Insurance - access essential healthcare coverage for you and your dependents. Personal Accident Insurance - receive financial protection in case of accidental injury or disability

Posted 2 weeks ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

Avalara is seeking a Security Automation Engineer to join our Security Automation & Platform Enhancement Team (SAPET). You will be at the intersection of cybersecurity, automation, and AI, focusing on designing and implementing scalable security solutions that enhance Avalaras security posture. You will have expertise in programming, cloud technologies, security automation, and modern software engineering practices, with experience with using Generative AI to improve security processes. What Makes This Role Unique at Avalara? Cutting-Edge Security Automation: You will work on advanced cybersecurity automation projects, including fraud detection, AI-based security document analysis, and IT security process automation. AI-Powe'red Innovation: We integrate Generative AI to identify risks, analyze security documents, and automate compliance tasks. Impact Across Multiple Security Domains: Your work will support AML, fraud detection, IT security, and vendor risk management. What Your Responsibilities Will Be As a Security Automation Engineer, your primary focus will be to develop automation solutions that improve efficiency across several security teams. Develop and maintain security automation solutions to streamline security operations and reduce manual efforts. Work on automation projects that augment security teams, enabling them to work more efficiently. Design and implement scalable security frameworks for Security Teams. What you'll Need to be Successful 5+ years experience Programming & Scripting: Python, GoLang, Bash Infrastructure as Code & Orchestration: Terraform, Kubernetes, Docker Security & CI/CD Pipelines: Jenkins, GitHub Actions, CI/CD tools Database & Data Analysis: SQL, security data analytics tools Experience with RDBMS and SQL, including database design, normalization, query optimization Experience. Hands-on experience with security automation tools, SIEM, SOAR, or threat intelligence platforms.

Posted 2 weeks ago

Apply

2.0 - 6.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Who we are Were a leading, global security authority thats disrupting our own category. Our encryption is trusted by the major ecommerce brands, the worlds largest companies, the major cloud providers, entire country financial systems, entire internets of things and even down to the little things like surgically embedded pacemakers. We help companies put trust - an abstract idea - to work. Thats digital trust for the real world. Job summary The primary focus for this position is to assist with the onboarding of new customers, new services, and creation of effective service templates primarily in our UltraWAF service. The engineer also checks system conditions, designs, and updates procedural manuals to reflect changes in the environment, maintains a record of changes made to the networks and is responsible for ensuring network security. The engineer can be called any time in case of system failure. What you will do Deploy, adjust, and troubleshoot customer services on the UltraWAF and Proxy services during their shift. Upload and deploy x509 certificates. Build and maintain WAF policies. Tune WAF policies to eliminate false-positives. Build custom rules to support customer objectives. Build and deploy responder policies to to manage customer traffic. Provide support during application-layer DDoS attacks. Monitor and manage activity from bots and other automated web clients. Assist in the creation and updating of SOC and SCM processes related to the UltraWAF and Proxy services. Manage customer provisioning on the above services. What you will have Knowledge of application-layer proxies. Knowledge of network-layer proxies. Understanding of x509 certificates and TLS. Knowledge of HTTP requests and responses. Understanding of virtual patching and web application CVEs. Experience working in a Security Operations Center. Fluent in writing and speaking English. Excellent written and verbal communication skills, as well as interpersonal skills. Demonstrated ability to engage in continuous learning and applying strong analytical skills to respond to customer needs and problem-solving. Nice to have Experience with Arbor equipment and Sightline Threat Management system. Benefits Generous time off policies Top shelf benefits Education, wellness and lifestyle support #LI-SD1

Posted 2 weeks ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

JD: Posting Title: Product Analyst Start Date: 23-Jun-2025 Contract Tenure: 6 months Location: Bangalore, India (No other location) Rate: Max 12,000/- INR per day Job Description: Must have : 5+ years of experience as a Business Analyst or Product Manager Configuration experience on any HCM solution (Workday, Oracle, SuccessFactor, ServiceNow, SAP, Any other Cloud solutions etc) either for implementation or enhancement projects Domain experience in any of the HCM modules (Recruiting, Onboarding, Core HR, Performance, Talent, Benefits, Payroll, Time, Absence etc), preferred Onboarding Business Analyst experience to elicit the requirements from business, converting the business requirement into functional specification, collaborating with technology team for designing and building the solution, assisting business user in testing Project execution experience : Agile, Kanban, Waterfall. Participate in sprint planning, backlog grooming, and sprint reviews Collaborate with global team members, stakeholders, cross-functional teams (Engineering, Development, Security, Operations) in a virtual and in-person setting Deal with ambiguity in requirements, demonstrated ability to complete multiple tasks in a fast-paced environment. Facilitation and coordination skills Ability to use data and analysis to drive decision-making Flexible to work in European and US timezones Good to have : Subject matter expert to provide technical and functional support for Rival Workflow SaaS Solution (Formerly SilkRoad Technology: RedCarpet Onboarding solution) Have contributed on Rival Workflow (SilkRoad RedCarpet/Onboarding) implementation or Support projects Hands-on experience managing system security and integrating Rival Workflow Solution with Workday, ServiceNow and other Recruiting, HCM, Procurement, and other solutions Well verse in orchestrating onboarding activities and converting them into workflows and tasks Good understanding on creating and maintaining eForms, categories, events, tasks and task workflows Proficient in uploading / downloading / managing Employees, Users, Categories and other data sets Identifying and resolving configuration, workflows, events, and integration issues while implementing improvements.

Posted 2 weeks ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

What Youll Do Avalara, Inc. is the leading provider of cloud-based software that delivers a broad array of compliance solutions related to sales tax and other transactional taxes. What is it like to work at Avalara? Come find out! We are committed to the following success traits that embody our culture and how we work together to accomplish great things: Fun. Passion. Adaptability. Urgency. Simplicity. Curiosity. Humility. Ownership. Optimism. Avalara is looking for Detection Engineer to join the Detection and Response Team. The ideal candidate will have a track record in incident response, demonstrating advanced technical expertise and leadership capabilities. Your role will be of an Incident Response Analyst, you will help protect Avalara. This includes detecting, investigating, and mitigating security incidents. You will also be a key contributor in improving our incident response capabilities. You will report to Security leadership at Avalara. This is a remote position. #LI-Remote What Your Responsibilities Will Be You will perform incident response activities and workstreams as the Incident Response Senior Analyst. You will monitor security systems, including Intrusion Detection Systems (IDS), Endpoint Detection and Response (EDR) platforms, software firewalls, and Security Information and Event Management (SIEM) platforms. Gather and analyze evidence from affected systems, logs, and network traffic. You will conduct detailed investigations of security incidents to determine the root cause, scope, and impact. Document all aspects of security incidents, including timelines, actions taken, and lessons learned. Perform forensic analysis of compromised systems to identify the techniques and tactics used by attackers, or as directed by Legal. Collaborate with cross-functional teams including Engineering, IT, Security Operations, Legal, HR, and Compliance to manage and mitigate incidents. Strengthen KPIs and metrics for measuring response effectiveness and provide clear and consistent reporting to internal stakeholders. Participate in rotating On Call shifts that utilize a paging system in case a security event requires attention. What Youll Need to be Successful 5+ years experience in Security Incident Response. Experience across the information security domain, including familiarity with endpoint, email, network, cloud security, vulnerability management, incident response, and threat intelligence. Experience with log analysis, network security, digital forensics, and incident response investigations. Ability to script / code using Python or an equivalent language. Bachelors degree in computer science, information security, or relevant experience. Certifications related to digital forensics and incident response 5+ years experience in Security Incident Response. Experience across the information security domain, including familiarity with endpoint, email, network, cloud security, vulnerability management, incident response, and threat intelligence. Experience with log analysis, network security, digital forensics, and incident response investigations. Ability to script / code using Python or an equivalent language. Bachelors degree in computer science, information security, or relevant experience. Certifications related to digital forensics and incident response You will perform incident response activities and workstreams as the Incident Response Senior Analyst. You will monitor security systems, including Intrusion Detection Systems (IDS), Endpoint Detection and Response (EDR) platforms, software firewalls, and Security Information and Event Management (SIEM) platforms. Gather and analyze evidence from affected systems, logs, and network traffic. You will conduct detailed investigations of security incidents to determine the root cause, scope, and impact. Document all aspects of security incidents, including timelines, actions taken, and lessons learned. Perform forensic analysis of compromised systems to identify the techniques and tactics used by attackers, or as directed by Legal. Collaborate with cross-functional teams including Engineering, IT, Security Operations, Legal, HR, and Compliance to manage and mitigate incidents. Strengthen KPIs and metrics for measuring response effectiveness and provide clear and consistent reporting to internal stakeholders. Participate in rotating On Call shifts that utilize a paging system in case a security event requires attention.

Posted 2 weeks ago

Apply

10.0 - 13.0 years

10 - 12 Lacs

Hyderabad

Work from Office

Naukri logo

Qualification MTech or BTech (Engineering Background) Experience : Min 10 years Location Hyderabad - Uppal Job Responsibilities: 1)Write or review security-related documents, such as incident reports, proposals, and tactical or strategic initiatives. 2) Train subordinate security professionals or other organization members in security rules and procedures. 3) Plan security for special and high-risk events. 4) Review financial reports to ensure efficiency and quality of security operations. 5) Develop budgets for security operations. 6) Order security-related supplies and equipment as needed. 7) Coordinate security operations or activities with public law enforcement, fire, and other agencies. 8) Attend meetings, professional seminars, or conferences to keep abreast of changes in executive legislative directives or new technologies impacting security operations. 9) Assist in emergency management and contingency planning. 10) Arrange for or perform executive protection activities. 11) Respond to medical emergencies, bomb threats, fire alarms, or intrusion alarms, following emergency response procedures. 12) Recommend security procedures for security call centers, operations centers, domains, asset classification systems, system acquisition, system development, system maintenance, access control, program models, or reporting tools. 13) Prepare reports or make presentations on internal investigations, losses, or violations of regulations, policies, and procedures. 14) Identify, investigate, or resolve security breaches. 15) Monitor security policies, programs, or procedures to ensure compliance with internal security policies, licensing requirements, or applicable government security requirements, policies, and directives. 16) Analyze and evaluate security operations to identify risks or opportunities for improvement. 17) Create or implement security standards, policies, and procedures. 18) Conduct, support, or assist in governmental reviews, internal corporate evaluations, or assessments of the overall effectiveness of the facilities' security processes. 19) Conduct physical examinations of property to ensure compliance with security policies and regulations. 20) Communicate security status, updates, and actual or potential problems, using established protocols. 21) Collect and analyze security data to determine security needs, security program goals, or program accomplishments. 22) Supervise subordinate security professionals, performing activities such as hiring, training, assigning work, evaluating performance, or disciplining. 23) Plan, direct, or coordinate security activities to safeguard company assets, employees, guests, or others on company property. Qualification MTech or Equivalent PG Degree

Posted 2 weeks ago

Apply

2.0 - 4.0 years

6 - 9 Lacs

Pune

Work from Office

Naukri logo

About Arctera Arctera keeps the world s IT systems working. We can trust that our credit cards will work at the store, that power will be routed to our homes and that factories will produce our medications because those companies themselves trust Arctera. Arctera is behind the scenes making sure that many of the biggest organizations in the world - and many of the smallest too - can face down ransomware attacks, natural disasters, and compliance challenges without missing a beat. We do this through the power of data and our flagship products, Insight, InfoScale and Backup Exec. Illuminating data also helps our customers maintain personal privacy, reduce the environmental impact of data storage, and defend against illegal or immoral use of information. It s a task that continues to get more complex as data volumes surge. Every day, the world produces more data than it ever has before. And global digital transformation - and the arrival of the age of AI - has set the course for a new explosion in data creation. Joining the Arctera team, you ll be part of a group innovating to harness the opportunity of the latest technologies to protect the world s critical infrastructure and to keep all our data safe. Job Title: Info Sec Analyst - Cloud Security Posture Management (CSPM) Location: Pune, India Job Type: Full-time Job Summary: The Cloud Security Operations Analyst will be responsible for monitoring, detecting, and responding to security threats in cloud environments (AWS, Azure, GCP) while managing Cloud Security Posture Management (CSPM) solutions. The role also involves incident response, threat analysis, and remediation of cloud security risks to ensure the organization s cloud security posture aligns with industry best practices and compliance standards. Key Responsibilities: Monitor and manage security alerts from CSPM tools (Crowdstrike CSPM, Zscaler CNAPP, Wiz, Prisma Cloud, etc.). Perform basic cloud security incident investigations and document findings. Support security monitoring and event triage within SOC/SIEM tools (Crowdstrike NextGen SIEM, Splunk, etc.). Assist in reviewing misconfigurations in cloud services and recommend remediation steps. Maintain documentation for cloud security policies and playbooks. Lead investigations of cloud security incidents and misconfigurations, including forensic analysis and threat intelligence correlation. Manage and fine-tune CSPM tools to reduce false positives and improve cloud security hygiene. Work closely with SOC teams to analyze and mitigate cloud-based threats, including IAM misconfigurations, API security, and data exposure risks. Provide security recommendations and remediation guidance to DevOps and Engineering teams. Assist in compliance initiatives (CIS, NIST, PCI-DSS) and cloud security audits. Lead incident post-mortems, identifying gaps and improving cloud security processes. Stay ahead of emerging cloud threats, vulnerabilities, and attack vectors to proactively strengthen the cloud security posture. Required Skills & Qualifications: 2-4 years of experience in cloud security, SOC operations, or cybersecurity. Basic understanding of cloud platforms (AWS, Azure, GCP) and their security controls. Knowledge of SIEM tools and log analysis for security events. Good experience with CSPM tools (such as CrowdStrike CSPM, or Zscaler CNAPP, or Wiz, or cloud-native security solutions). Basic understanding of SIEM integrations with cloud environments and log analysis techniques. Proficiency in threat intelligence, attack techniques (MITRE ATT&CK), and incident response methodologies. Experience in scripting and automation for security tasks. Certifications like AWS Security Specialty, AZ-500, or Security+ are a plus.

Posted 2 weeks ago

Apply

10.0 - 20.0 years

10 - 20 Lacs

Chennai

Work from Office

Naukri logo

Lead end to end planning and execution of infrastructure works in Real Estate projects, including roads, utilities, drainage and compliance. Budgeting, coordinate with consultants, vendors and authorities to ensure timely cost-effective delivery

Posted 2 weeks ago

Apply

3.0 - 8.0 years

3 - 6 Lacs

Mumbai

Work from Office

Naukri logo

Summary Reporting to the Director of Info Sec and Cyber Operations, the Security Operations Centre (SOC) Analyst will be an integral part of the teams success. As a security operations center (SOC) engineer, you will help build and manage services that detect and automate the mitigation of cybersecurity threats across Waystone infrastructure. You will work with software engineers, DevOps engineers, IT Engineering, internal audit and compliance teams, and other security engineers across multiple teams to protect Waystone. ESSENTIAL DUTIES AND RESPONSIBILITIES Monitor and analyse security alerts from various sources, including AWS, Azure, O365, Okta, Zscaler and SIEM tools, to identify potential security threats. Perform incident detection, analysis, and response for cloud-native environments, utilizing Security Hub (AWS) and Defender for Cloud (Azure). Collaborate with internal teams to address security incidents and ensure timely resolution, including coordination with IT, Security Engineering, and other stakeholders. Develop and refine security monitoring policies, rules, and alerting configurations for enhanced detection capabilities. Conduct investigations into security incidents, identifying root causes and recommending remediation steps. Maintain and optimise DLP solutions for the organisation to prevent unauthorised data exposure. Generate regular reports on security incidents, key metrics, and recommendations for security improvements. Proactively identify security risks and work with various teams to mitigate potential threats. Participate in threat hunting activities to identify advanced threats and vulnerabilities within the cloud and on-premises environments. Provide input into the SOCs continuous improvement processes, including playbook development and toolset enhancement. REQUIREMENTS To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Experience3+ years of experience in a Security Operations Centrr (SOC) or similar environment. Hands-on experience with AWS, Azure, Zscaler and O365 security tools and technologies. Strong familiarity with cloud native tools, cloud security posture management, and application security (Security Hub, Defender for Cloud). Experience with SIEM platforms (CrowdStrike NG-SIEM or similar) including alert tuning, query development, and integration with cloud environments. Proficient in data loss prevention (DLP) strategies and tools, with the ability to customise and maintain DLP policies. Strong understanding of incident response processes and best practices. Demonstrated ability to conduct thorough investigations and report on complex security incidents. Familiarity with cloud security principles, tools, and techniques, including identity and access management (IAM) and network security. Strong problem-solving skills, attention to detail, and ability to work under pressure in a fast-paced environment. EducationBachelors degree in information security, Computer Science, or related field (or equivalent work experience). CCSP AWS certification Azure Certification

Posted 2 weeks ago

Apply

3.0 - 5.0 years

2 - 5 Lacs

Mumbai

Work from Office

Naukri logo

Summary Reporting to the Information Security & Cyber Operations Director, the Zscaler and Security Operations Engineer will be an integral part of the teams success. The role will be responsible for the design, implementation and management of Zscaler ZIA, APA, and Data Protection solutions to meet the Waystone organisations security requirements. The role will require the management of policies, access controls, threat protection, reporting, log management with Waystones SIEM solution. The role also requires assisting and assessing the network security posture (firewalls, Web Application Firewalls etc.) and managing the security toolset, SIEM, Okta, PAM integration. The role requires working as part of the wider technology team to collaborate with cloud, network, infrastructure, service delivery, application and development teams as appropriate, but must be able proactively work alone and make decisions based on company security policies. The role will require clear communication to business stakeholders where applicable. ESSENTIAL DUTIES AND RESPONSIBILITIES To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Configure and manage Zscaler policies, including access controls, traffic forwarding, and threat protection. Monitor and analyse network traffic and user behaviour to identify and mitigate security risks. Collaborate with IT, security, and networking teams to integrate Zscaler solutions with existing infrastructure. Conduct troubleshooting and performance tuning of Zscaler services to ensure optimal operation. Develop and maintain documentation for ZIA/ZPA configurations, processes, and best practices. Stay up-to-date with Zscaler updates, features, and industry trends to continuously enhance security strategies. Provide training and support to internal teams on Zscaler functionalities and best practices. Monitoring SIEM and other security tools similar to Okta, Delinea where Zscaler integrates. Report on metrics into senior management. REQUIREMENTS Degree in Computer Science, Information Technology, related field. 3-5 years experience with Zscaler ZIA and ZPA solutions. Strong understanding of cloud security principles and best practices Strong understanding of networking concepts (TCP/IP, DNS, VPN) Experience with Identity and Access Management Excellent Problem Solving Skills Strong Communications skills, with the ability to convey complex technical concepts to non-technical stakeholders. Relevant certifications. Experience with SIEM and other security tools. Knowledge of SSO, MFA, and IAM solutions

Posted 2 weeks ago

Apply

3.0 - 8.0 years

5 - 10 Lacs

Hyderabad

Work from Office

Naukri logo

Information Security Engineer Vulnerability Management Analyst What you will do In this vital role is focused on identifying, assessing, prioritizing, and tracking the remediation of vulnerabilities across the organizations technology stack. The Vulnerability Management Analyst plays a key role in the security operations team by ensuring known vulnerabilities are managed through their lifecycle using structured processes and tools. The individual will analyze vulnerability scan data, correlate threat intelligence (e.g., KEV, EPSS), and work closely with infrastructure, application, and business teams to drive risk-based remediation. Roles & Responsibilities: Analyze vulnerability scan results from tools like Tenable, Qualys, or Rapid7 to identify security weaknesses across infrastructure and applications. Prioritize vulnerabilities using multiple criteria, including CVSS, KEV (Known Exploited Vulnerabilities), EPSS (Exploit Prediction Scoring System), asset criticality, and business context. Partner with IT and DevOps teams to track remediation progress and provide technical guidance on mitigation strategies. Monitor threat intelligence feeds to correlate vulnerabilities with current exploit activity. Create and maintain vulnerability metrics, dashboards, and reports for leadership and compliance teams. Support vulnerability assessment activities in cloud environments (AWS, Azure, etc.). Maintain documentation related to the vulnerability management lifecycle. Assist in policy and process development related to vulnerability and patch management. Participate in audits and compliance efforts (e.g., SOX, ISO, NIST, PCI). What we expect of you We are all different, yet we all use our unique contributions to serve patients. Masters degree and 1 to 3 years of experience in Cybersecurity, vulnerability management or information security operations OR Bachelors degree and 3 to 5 years of experience in Cybersecurity, vulnerability management or information security operations OR Diploma and 7 to 9 years of experience in Cybersecurity, vulnerability management or information security operations Must-Have Skills: Familiarity with vulnerability management tools (e.g., Tenable, Qualys, Rapid7). Understanding of CVSS scoring, vulnerability lifecycle, and remediation workflows. Basic knowledge of threat intelligence and how it applies to vulnerability prioritization. Working knowledge of network, operating system, and application-level security. Ability to analyze scan data and correlate it with business context and threat intelligence. Preferred Qualifications: Good-to-Have Skills: Experience with KEV, EPSS, and other threat-based scoring systems. Familiarity with patch management processes and tools. Exposure to cloud security and related scanning tools (e.g., Prisma Cloud, AWS Inspector). CompTIA Security+ GIAC GSEC / GCIH Qualys Vulnerability Management Specialist (QVMS) Tenable Certified Nessus Auditor (TCNA) Soft Skills: Analytical Thinking Ability to interpret complex data sets and assess risk effectively Attention to Detail Precision in identifying and tracking vulnerabilities and remediation status Communication Skills Ability to communicate technical findings to both technical and non-technical audiences Collaboration & Teamwork Able to work across IT, DevOps, and security teams to drive resolution Curiosity & Continuous Learning Willingness to know the latest with evolving threats and technologies Problem-Solving Approach Capability to identify solutions to security weaknesses in diverse environments

Posted 2 weeks ago

Apply

15.0 - 20.0 years

15 - 20 Lacs

Barauni

Work from Office

Naukri logo

Job purpose: Is responsible for the implementation of the Project Site Security and Incident Management systems. He/she manages the Site Security Team and ensures the coordination with Subcontractors / Partners/ Client Security Correspondents and/or Managers. Job scope (= role dimension: budget, management, specific criteria): Responsible for the implementation of relevant Security and Incident management systems at project site level depending on site security risk assessment. Selects and manages the Site Security team and providers in accordance with Technip Energies Security Guidelines and ethics approach in full compliance with local rules / JV guidelines if any. Identifies the requirements for the security budget at project level Collect and analyze Security information to identify new or changing threats & risks that can affect company Personnel, Operations, Assets and / or Reputation. Main accountabilities: Be accountable for Security and Incident Management programs on a project site. Provide advice to the Site Management and all staff to promote a secure working environment. Establish and maintain an effective working relationship with all site security stakeholders (Client, Partner(s), Subcontractors, Providers). Identify and anticipate threats and trends that can affect site personnel and operations by devising and updating the Site Security Risk Assessment register as per Global Security GPS. Based upon SRA results, Clients requirements and Security split of responsibilities develop and implement relevant physical, technical and procedural security measures for the project site. Identify and manage key external security providers as per company procurement, compliance and security policies. Serve as the focal point for Site management and staff to report security incidents to and document and report such incidents to OC and Global Security as required. Lead Site Incident Management Preparedness and training initiatives. Conduct investigations (in full transparency with the security organization) into Security Incidents that produce meaningful results in a cost-efficient manner. Educate personnel on Threat and Risks and subsequent consummate prevention and mitigation measures notably through Security induction and cultural awareness sessions. Devise and send project sites POS and vessels POB as per Global Security requirements. Coordinate Subcontractors Site Security Correspondents. Deliverables include, but are not limited to: Site Security Risk Assessment Implement and update: Site Emergency and Incident Management Plans Site Standard Operating Procedures Emergency contacts list (Emergency Notification System) POS Trainings and Awareness Raising Monthly/Weekly/Daily Site Security reports Other, as required by the project. Profile: Must have Demonstrate several years of relevant HSE and/or Security experience on energy construction/installation projects. Capacity to work in a multi-cultural context. Experience in the Management and coordination of external contractors. Follow dedicated security training, as required by Global Security. Fluency in English Basic IT Tools Being able to handle Confidential Information Nice to have University Degree or equivalent Good understanding of local and international relations Qualification in negotiating skills / specialist Security skill

Posted 2 weeks ago

Apply

5.0 - 11.0 years

4 - 5 Lacs

Bengaluru

Work from Office

Naukri logo

Job Title: SOC Malware Analysis Reverse Engineering SME Location: UniOps Bangalore RESPONSIBILITIES The person in this role is expected to generate leads for the Incident Response team for timely threat assessment, containment and response actions. It is expected that the person leads malware analysis and reverse engineering function and coordinates with internal/external cyber investigation teams for enabling effective response. Dissects malware samples to reverse engineer and conduct static and dynamic/behavioral analysis to extract IoCs and determine TTPs to help assess the relevant threat better and potential impact. Utilizes latest and advanced knowledge of relevant malware analysis tools and technologies (such as debuggers, compilers and sandboxes) for analyzing the threats and for supporting investigations. It is expected that the person in this role can leverage specialized knowledge, skill and experience to de-obfuscate and reverse engineer heavily obfuscated and virtualization/sandbox aware samples. Leads malware analysis lab capability building and investigations. The person in this role is expected to effectively integrate and automate relevant capabilities (such as Threat Intel IoCs, EDR, NDR, SIEM, etc) for context enrichment and to enable effective threat assessment at scale and with speed. Ensures that all analysis and investigations are appropriately conducted and documented as per cardinal forensic and operational security principles and organisation s SOPs. KEY REQUIREMENTS MANDATORY Strong ethics, communication and team skills Hands-on experience with Enterprise SIEM (like Splunk, QRadar, Sentinel, etc) and EDR tools (like Microsoft Defender, CrowdStrike Falcon, etc) Hands-on experience with relevant debuggers, compilers and malware analysis tools (like windbg / ollydbg, IDA Pro, ghidra, procmon, wireshark / tshark, fiddler, etc) Hands-on experience in working with yara and sigma rules for threat assessment at scale. Minimum 10 years of enterprise experience in global SOC (Security Operations Centre) operations and minimum 5 years of hands-on malware analysis experience. Working knowledge of at least one of the scripting tools: Python/ Perl/ PowerShell. GIAC Certification GCFA or GREM

Posted 2 weeks ago

Apply

9.0 - 14.0 years

4 - 6 Lacs

Bhubaneswar, Kolkata, Jajpur

Work from Office

Naukri logo

Role & responsibilities Plan, organize, conduct and control operations as per the monthly/weekly supervision plans and route charts Carry out Operations audits of Sites / Assignments. Should be able to supervise and conduct on-site training as per training programme Should be well versed with basic Sales requirements and Commercials. Effective supervision and Management mechanism. Plans to prevent and combat fire at site and ensure that all the fire extinguishers are serviceable Check all alarm systems at sites for serviceability Check and train security personnel in handling of metal detectors, vehicles search mirrors radio sets, Personnel and Materials gate etc. Train security personnel in techniques of searching trucks, cars, scooters and cargo/consignment and other bomb situations. Carry out a fresh security survey if any changes in location or any addition has taken place in high value items, viz. Computer Centre, network, cash room, bullion vaults or expensive calibration equipment. Formulation and rehearsal of emergency procedures Check log books and documents at sites and compile evaluation and action report. Make out daily visit report and hand it over to Branch Manager for evaluation and action.

Posted 2 weeks ago

Apply

3.0 - 8.0 years

4 - 4 Lacs

Hyderabad

Work from Office

Naukri logo

Hi, You are invited for the walk-in interview for the Operations Officer - Hyderabad position . Please find the details below: Date: 25 April 2025 Time: 10 am onwards Address for Interview : #Unit No-1501A,15th Floor, Manjeera Triniti Corporate, JNTU Kukatpally to Hitech City Road, KPHB Colony, Kukatpally, Telangana. Kindly carry the following documents with you, as they are mandatory for joining us: Last 3 months salary slips Offer letter from the current organization Latest increment letter Aadhaar Card PAN Card Graduation certificate Looking forward to meeting you. Role & responsibilities (1) Plan, organize, conduct and control operations as per the monthly/weekly supervision plans and route charts (2) Carry out Operations audits of Sites / Assignments. (3) Should be able to supervise and conduct on-site training as per training programme (4) Should be well versed with basic Sales requirements and Commercials. (5) Effective supervision and Management mechanism. (6) Plans to prevent and combat fire at site and ensure that all the fire extinguishers are serviceable (7) Check all alarm systems at sites for serviceability (8) Check and train security personnel in handling of metal detectors, vehicles search mirrors radio sets, Personnel and Materials gate etc. (9) Train security personnel in techniques of searching trucks, cars, scooters and cargo/consignment and other bomb situations. (10) Carry out a fresh security survey if any changes in location or any addition has taken place in high value items, viz. Computer Centre, network, cash room, bullion vaults or expensive calibration equipment. (11) Formulation and rehearsal of emergency procedures (12) Check log books and documents at sites and compile evaluation and action report. Make out daily visit report and hand it over to Branch Manager for evaluation and action.

Posted 2 weeks ago

Apply

7.0 - 12.0 years

15 - 30 Lacs

Noida

Work from Office

Naukri logo

Job Title: Security Operation Manager Location: Noida Job Tyoe : Full-Time Experience: 7+ Years Department: Operation/ Security Reports To: Operation Director Job Summary: The Security Operational Manager is responsible for overseeing the day-to-day operations of the organization's security infrastructure. This role involves managing the security operations center (SOC), leading incident response efforts, and ensuring the effectiveness of security policies, procedures, and protocols. The Security Operational Manager will collaborate with various departments to safeguard the company's information assets and maintain a robust security posture. Key Responsibilities: Manage Security Operations: Oversee the daily activities and operations of the security operations center (SOC), ensuring continuous monitoring, detection, and response to security incidents. Incident Response: Lead the incident response team in identifying, managing, and resolving security breaches and vulnerabilities. Conduct post-incident analysis and reporting to prevent future occurrences. Security Monitoring: Implement and maintain security monitoring tools and technologies to detect and respond to threats in real-time. Penetration Testing and Vulnerability Scanning: Conduct regular penetration testing and vulnerability scanning to identify and mitigate security weaknesses within the organization's systems and applications. Policy and Compliance: Develop, enforce, and update security policies, procedures, and protocols in alignment with industry standards and regulatory requirements. Ensure compliance with relevant laws and regulations. Team Leadership: Tain, and mentor the security operations team, fostering a culture of continuous improvement and professional development. Risk Management: Conduct regular security risk assessments and implement mitigation strategies to reduce identified risks. Collaboration: Work closely with IT, legal, and other departments to ensure comprehensive security measures are integrated into all business processes. Reporting: Prepare and present regular reports on security operations, incidents, and compliance status to the Customers. Emergency Response: Develop and maintain emergency response plans for security incidents, ensuring the organization is prepared for potential crises. Qualifications: Education: Bachelors degree in Computer Science, Information Security, or a related field.. Experience: Minimum of 7 years of experience in information security, with at least 3 years in a managerial role overseeing security operations. Certifications: Relevant certifications such as CISSP, CISM, CEH, or similar are highly desirable. Technical Skills: Proficient in security technologies such as SIEM, IDS/IPS, firewalls, antivirus software, and endpoint protection. Expertise in conducting penetration testing and vulnerability scanning. AWS Expertise: In-depth knowledge and experience with Amazon Web Services (AWS) security practices and tools. Knowledge: In-depth understanding of security frameworks (e.g., NIST, ISO 27001), compliance requirements (e.g., GDPR, HIPAA), and incident response best practices. Leadership: Strong leadership and team management skills with the ability to motivate and guide a diverse team. Communication: Strong verbal and written communication skills, with the ability to convey complex security issues to non-technical stakeholders. Working Conditions: The role may require occasional on-call work to address security incidents. Must be able to work in a high-pressure environment and handle multiple tasks simultaneously.

Posted 2 weeks ago

Apply

4.0 - 8.0 years

3 - 4 Lacs

Hyderabad

Work from Office

Naukri logo

(1) Plan, organize, conduct and control operations as per the monthly/weekly supervision plans and route charts (2) Carry out Operations audits of Sites / Assignments. (3) Should be able to supervise and conduct on-site training as per training programme (4) Should be well versed with basic Sales requirements and Commercials. (5) Effective supervision and Management mechanism. (6) Plans to prevent and combat fire at site and ensure that all the fire extinguishers are serviceable (7) Check all alarm systems at sites for serviceability (8) Check and train security personnel in handling of metal detectors, vehicles search mirrors radio sets, Personnel and Materials gate etc. (9) Train security personnel in techniques of searching trucks, cars, scooters and cargo/consignment and other bomb situations. (10) Carry out a fresh security survey if any changes in location or any addition has taken place in high value items, viz. Computer Centre, network, cash room, bullion vaults or expensive calibration equipment. (11) Formulation and rehearsal of emergency procedures (12) Check log books and documents at sites and compile evaluation and action report. Make out daily visit report and hand it over to Operation Manager for evaluation and action.

Posted 2 weeks ago

Apply

4.0 - 8.0 years

3 - 4 Lacs

Kolkata, Barbil, Jajpur

Work from Office

Naukri logo

(1) Plan, organize, conduct and control operations as per the monthly/weekly supervision plans and route charts (2) Carry out Operations audits of Sites / Assignments. (3) Should be able to supervise and conduct on-site training as per training programme (4) Should be well versed with basic Sales requirements and Commercials. (5) Effective supervision and Management mechanism. (6) Plans to prevent and combat fire at site and ensure that all the fire extinguishers are serviceable (7) Check all alarm systems at sites for serviceability (8) Check and train security personnel in handling of metal detectors, vehicles search mirrors radio sets, Personnel and Materials gate etc. (9) Train security personnel in techniques of searching trucks, cars, scooters and cargo/consignment and other bomb situations. (10) Carry out a fresh security survey if any changes in location or any addition has taken place in high value items, viz. Computer Centre, network, cash room, bullion vaults or expensive calibration equipment. (11) Formulation and rehearsal of emergency procedures (12) Check log books and documents at sites and compile evaluation and action report. Make out daily visit report and hand it over to Operation Manager for evaluation and action.

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies