Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
1.0 - 4.0 years
4 - 8 Lacs
Pune
Work from Office
0px> In one sentence Manages and coordinates the diverse operation of the department/domain, ensuring that the daily operations are coordinated with vital resource and tools; Ensures that operational directives are carried out in full and to completion, and assures that the schedules, meetings and goals work in harmony towards customer happiness; Tracks and maintains the performance of vendors / external parties to uphold company interests. All you need is... Education: Graduate Experience: Minimum 5 years Skills: 1. Communication: Strong command of written and spoken communication.(Hindi ,Marathi, English) 2. Knowledge: Proficient in computer skills, including Excel and PowerPoint. Responsibilities: 1. Email Response: Handle and respond to security-related emails in a timely manner. 2. Work Plan Tracking: Track and update work plans to ensure all security tasks are completed as scheduled. 3. Budgeting and Invoicing Handling: Manage budgeting and invoicing processes for security operations. 4. Vendor Payment Follow-up: Follow up on payments with vendors to ensure timely transactions. 5. AMC Coordination: Coordinate Annual Maintenance Contracts (AMC) for security systems and equipment. 6. Report Maintenance: Maintain various types of security reports. 7. Fire Evacuation Drill Coordination: Organize and coordinate fire evacuation drills to ensure preparedness. 8. Security Incident Response: Manage and respond to security incidents promptly and effectively. 9. Security Training: Conduct security training sessions for staff. 10. Physical Security Audits: Perform physical security audits to ensure compliance and safety. 11. Compliance: Ensure adherence to security policies and regulations. 12. Technology Management: Oversee the management of security technologies. 13. Monitoring: Continuously monitor security systems and processes. What will your job look like? You will handle the work activities of a department / domain and suggests and/or implements changes that will make the output more effective. Collaborate closely with internal partners and external vendors, and supervises execution of activities Supervise and monitor vendor / supplier performance to improve results and uptime, minimize costs, and maintain high levels of customer happiness. You will support managers / employees in their day-to-day coordination and management of business operational activities and/or issue resolution Coordinate communication between internal units and external vendors / suppliers. You will process, approve and follow up on invoices, rate charges, payments, and other financial operations-related issues You will supervise and updates the relevant systems and business operations policies. You will ensure compliance with companys standards and procedures. You will maintain a high level of service to internal / external customers and ensure superb communication between partners. Who are we? Why you will love this job: You will have responsibility to Manages and coordinates the diverse operation of the departments. You will supervise the work activities of a department/ Supervises and monitors vendor as per Amdocs guidelines. You will work with relevant partners supervise and update the relevant systems and business operations policies. We are giving the opportunity to work with the industry s most sophisticated testing technologies and help customers shift into the new testing realities of the digital world! We offer a wide range of stellar benefits including health, dental, vision, and life insurance as well as paid time off, sick time, and parental leave!
Posted 2 weeks ago
3.0 - 6.0 years
12 - 16 Lacs
Hyderabad
Work from Office
TJ Maxx At TJX Companies, every day brings new opportunities for growth, exploration, and achievement. You ll be part of our vibrant team that embraces diversity, fosters collaboration, and prioritizes your development. Whether you re working in our four global Home Offices, Distribution Centers or Retail Stores TJ Maxx, Marshalls, Homegoods, Homesense, Sierra, Winners, and TK Maxx, you ll find abundant opportunities to learn, thrive, and make an impact. Come join our TJX family a Fortune 100 company and the world s leading off-price retailer. Job Description: About TJX At TJX, is a Fortune 100 company that operates off-price retailers of apparel and home fashions. TJX India - Hyderabad is the IT home office in the global technology organization of off-price apparel and home fashion retailer TJX, established to deliver innovative solutions that help transform operations globally. At TJX, we strive to build a workplace where our Associates contributions are welcomed and are embedded in our purpose to provide excellent value to our customers every day. At TJX India, we take a long-term view of your career. We have a high-performance culture that rewards Associates with career growth opportunities, preferred assignments, and upward career advancement. We take well-being very seriously and are committed to offering a great work-life balance for all our Associates. What you will discover? Inclusive culture and career growth opportunities A truly Global IT Organization that collaborates across North America, Europe, Asia, and Australia Challenging, collaborative, and team-based environment What you will do ? Digital IT Security Operations team will need to knowledge and experience to design, implement, and troubleshoot security technologies in their assigned Platform(s) / Product(s) they support. Lead the technical direction in their product team, and can communicate future plans and direction to technical and non-technical individuals. Engineers at this level can lead and deliver on assigned Epics in their supported area. The organization delivers capabilities that enrich the customer experience and provide business value. We seek a motivated, talented Senior Engineer with good understanding of Security, DevSecOps & Automation to help improve our overall security posture. What you will need ? The Digital IT Security Team thrives on strong relationships with our operations, delivery & development partners and works diligently to address their needs which supports TJX growth, operational stability and security posture. On this tightly knit and fast-paced operational security team you will be constantly challenged to stretch and think outside the box. You will be working with our global digital security team, product teams , 3rd party vendors and operational stakeholders to improve security posture, improve availability & code stability. You will be responsible for enforcing our security requirements and recommendations for all banners. In addition, you will be actively coaching and mentoring other engineers and developers in the product teams on proper App Sec security and push for shift left in security. Minimum Qualifications: Bachelor s Degree or equivalent Engineering skillset / training / work experience in relevant technical domain 6+ years experience in troubleshooting applications, cyber security, monitoring system performance, managing configurations & infrastructure. Passionate about Cyber Security and Problem Solving Security experience in optimization of e-commerce platforms from edge platforms (Akamai) all the way through backend systems. Strong DevSecOps & Engineering Mindset Strong Communication skills with the ability to collaborate. Ability to handle security challenges in an operations setting with poise and calmness Success leading agile technical implementations at an enterprise scale Experience using Akamai or other CDN Technologies. Ability to understand the work environment and competing priorities in conjunction with developing/meeting project goals. Shows a positive, open-minded, and can-do attitude. Proficient knowledge of at least two out of: Splunk, AppDynamics, Akamai or another CDN Experience with Jira, Confluence, ServiceNow and Visio. Customer First mindset. Preferred Qualifications: Proficiency in scripting languages can be beneficial Endeca experience would be beneficial. Experience working in Agile teams Akamai experience & Programming Aptitude would be beneficial. Knowledge of IT Security Best Practices Skills: Application Security Splunk Akamai In addition to our open door policy and supportive work environment, we also strive to provide a competitive salary and benefits package. TJX considers all applicants for employment without regard to race, color, religion, gender, sexual orientation, national origin, age, disability, gender identity and expression, marital or military status, or based on any individuals status in any group or class protected by applicable federal, state, or local law. TJX also provides reasonable accommodations to qualified individuals with disabilities in accordance with the Americans with Disabilities Act and applicable state and local law. Address: Salarpuria Sattva Knowledge City, Inorbit Road Location: APAC Home Office Hyderabad IN
Posted 2 weeks ago
2.0 - 3.0 years
4 - 7 Lacs
Hyderabad
Work from Office
Company Overview Interactive Brokers Group, Inc. (Nasdaq: IBKR) is a global financial services company headquartered in Greenwich, CT, USA, with offices in over 15 countries. We have been at the forefront of financial innovation for over four decades, known for our cutting-edge technology and client commitment. IBKR affiliates provide global electronic brokerage services around the clock on stocks, options, futures, currencies, bonds, and funds to clients in over 200 countries and territories. We serve individual investors and institutions, including financial advisors, hedge funds and introducing brokers. Our advanced technology, competitive pricing, and global market help our clients to make the most of their investments. Barrons has recognized Interactive Brokers as the #1 online broker for six consecutive years. Join our dynamic, multi-national team and be a part of a company that simplifies and enhances financial opportunities using state-of-the-art technology. Position Overview: Seeking a Security Analyst to join our Security Operations Center (SOC), focusing on incident response and threat detection. This role involves working with enterprise SIEM platforms, EDR solutions, and incident management tools to protect IBKRs global trading infrastructure. Key Responsibilities: Triage and investigate security alerts using SIEM/EDR tools Execute incident response playbooks Perform malware analysis and IOC identification Create incident tickets and maintain documentation Conduct initial forensic data collection Support security event correlation and analysis Monitor suspicious endpoint activities Participate in 24x7 incident response coverage Required Technical Skills: Experience with SIEM (Splunk/QRadar) EDR platforms (CrowdStrike/Carbon Black) Incident ticketing systems (ServiceNow/JIRA) Windows/Linux log analysis Network traffic analysis Malware detection tools IOC collection and analysis Basic forensic tools Required Experience: 2-3 years SOC/IR experience L1/L2 alert analysis background Experience with incident playbooks Exposure to MITRE ATT&CK framework Understanding of kill chain methodology Basic threat intelligence usage Technical Environment: SIEM platforms EDR solutions TIP platforms Forensic tools Network monitoring tools Vulnerability scanners Incident management systems Work Requirements: Rotating shifts (24x7 SOC) Incident response handling Alert triage and escalation Documentation and reporting Team collaboration Growth Path: Advanced IR certification support Threat hunting training Digital forensics exposure Technical skill development Senior analyst progression Company Benefits & Perks: Competitive salary package. Performance-based annual bonus ( cash and stocks ). Hybrid working model ( 3 days office/week ). Group Medical & Life Insurance. Modern offices with free amenities & fully stocked cafeterias. Monthly food card & company-paid snacks. Hardship/shift allowance with company-provided pickup & drop facility* Attractive employee referral bonus. Frequent company-sponsored team-building events and outings. * Depending upon the shifts. ** The benefits package is subject to change at the managements discretion.
Posted 2 weeks ago
4.0 - 7.0 years
8 - 12 Lacs
Bengaluru
Work from Office
Who we are Were a leading, global security authority thats disrupting our own category. Our encryption is trusted by the major ecommerce brands, the worlds largest companies, the major cloud providers, entire country financial systems, entire internets of things and even down to the little things like surgically embedded pacemakers. We help companies put trust - an abstract idea - to work. Thats digital trust for the real world. Job summary The Security Operations Center (SOC) provides DDoS detection and mitigation services for DigiCert and customers networks. The SOC also provides all Customer Support capabilities for the UltraSecurity service. We are seeking a Senior Information Security Engineer to support our ever-growing customer base. The hours for this role are from 8:30am - 6:30pm, 4 days/week. (Bangalore Time) What you will do Exhibit a proactive security mindset to defend customer networks from DDoS attacks. Follow runbooks to conduct DDoS attack mitigation and response. Conduct deep analysis of customer traffic and mitigations to improve customer response. Handle escalations from associate SOC engineers. Assist with complex attacks to refine mitigation strategies. Monitor customer networks and mitigate DDoS attacks. Monitor the SOC ticket queue and proactively take action to protect DigiCert and customer networks. Manage engagements with white glove and strategic customers. Assist in the creation and updating of SOC policies and processes. Answer the phone queue for Tier 1 support for UltraDDoS and UltraWAF customers. Assist customers with resolving technical issues within the UltraSecurity services. What you will have Exhibit a proactive security mindset to defend customer networks from DDoS attacks. Follow runbooks to conduct DDoS attack mitigation and response. Conduct deep analysis of customer traffic and mitigations to improve customer response. Handle escalations from associate SOC engineers. Assist with complex attacks to refine mitigation strategies. Monitor customer networks and mitigate DDoS attacks. Monitor the SOC ticket queue and proactively take action to protect DigiCert and customer networks. Manage engagements with white glove and strategic customers. Assist in the creation and updating of SOC policies and processes. Answer the phone queue for Tier 1 support for UltraDDoS and UltraWAF customers. Assist customers with resolving technical issues within the UltraSecurity services. Nice to have PSAA (Practical SOC Analyst Associate) certification. CompTIA CySA, CASP, or SecurityX certifications. Experience with Arbor equipment and Sightline Threat Management system. Benefits Generous time off policies Top shelf benefits Education, wellness and lifestyle support #LI-SD1
Posted 2 weeks ago
4.0 - 8.0 years
4 - 9 Lacs
Hyderabad
Work from Office
Responsibility Designing, implementing, and managing security infrastructure, including hardware and software components. Configuring and maintaining security devices such as firewalls, intrusion detection/prevention systems, and security information and event management (SIEM) systems. Participating in incident response activities and investigations. Developing and maintaining incident response playbooks and procedures. Developing and implementing automation scripts and tools to streamline security operations processes. Integrating security solutions and technologies to enhance efficiency. Evaluating, deploying, and managing security tools and technologies. Ensuring the effectiveness and optimization of security solutions. Collaborating with security architects to design and implement secure network and system architectures. Providing input into the development of security policies and standards. Demonstrate the ability to independently deliver without significant senior support/escalation. Build rapport with senior stakeholders to continually broaden and strengthen relationships. Present with presence and confidence to leadership and senior stakeholders. Drive and contribute to a positive and constructive culture. Share knowledge and implement opportunities for improvement from lessons learned activities. Continuously monitor network traffic for potential threats. Respond promptly to security incidents and conduct investigations. Identify and remediate system vulnerabilities. Implement and manage security measures for computers and servers. Design and maintain network security controls. Manage user access and implement multi-factor authentication. Develop and deliver cybersecurity training programs. Enforce security policies and ensure regulatory compliance. Stay informed about cybersecurity threats and trends. Assess and enhance the organization's cybersecurity posture. Work with IT teams and stakeholders for a holistic approach to security. Qualifications Required: BE/B. Tech/MCA 4+ years with a cyber SIEM engineering role (Ideally Splunk) Expertise in use case/content and dashboard development Experience in custom data source onboarding and understanding of end-2-end SIEM integration/architecture. Be part of on call roster Splunk CISSP, CISM, SANS certification (good to have) Effective technical stakeholder's management Experience in mentoring and training junior analyst Presentation and Process development (must have) Excellent written and verbal communication skills (must have) Report creation and project skills Work Location : Hyderabad Shift Timings: 06.30 AM to 03.30 PM
Posted 2 weeks ago
3.0 - 7.0 years
7 - 11 Lacs
Bengaluru
Work from Office
As Specialist -Data Protection, you will help to Identify, design, and implement internal process improvements: automating manual processes, optimizing data protection solution. Work with architects and other leads on service strategies across people, process, and technology. Define roadmaps on future service and product capabilities. Review and validate mature operating model for the service along with other stakeholders in the team Key Responsibilities Identify, design, and implement internal process improvements: automating manual processes, optimizing data protection solution etc Work with architects and other leads on service strategies across people, process and technology Define roadmaps on future service and product capabilities Review and validate mature operating model for the service along with other stakeholders in the team Identify opportunities for continuous and automated deployment. Document and publish service catalogues to provide transparency on the capabilities provided by the service with improved end user journey to access the services. Work on the demand management to deliver demand driven by corresponding stakeholders like business, regulators etc Partner with technical teams and solution architects to analyse technical and non-technical requirements to build robust Data protection solution Work with internal and external auditors support auditing requirements Skills and Experience Minimum 5+ years of experience in relevant security products with Data Security Protection, Azure Dev Ops, Dev Sec Ops, Agile Scrum Methodology, Cloud Security Products and Information Rights Management Hands on experience data protection technologies like Information Rights Management, Data Discovery Classification, DLP, CASB etc is a must Deep understanding on cloud data security solutions, experience on Saas products is a plus. Demonstrable experience in Azure Dev Ops/ Dev Sec Ops and Agile/Scrum ways of working. Delivered engagements across cloud security lifecycle of strategy definition, architecture, design and implementation in line with regulatory and standards. Experience in working with geographically dispersed teams, preferably in the Financial Services industry. Experience with enterprise applications (architecture, development, support, and troubleshooting). Experience and exposure to security products to assess security implications and requirements for introduction of new technologies. Strong interpersonal and communication skills; ability to work in a team environment Industry certifications like CISSP, Azure AWS related certifications would be an added advantage. Collaborate with business teams, infra teams, security operations, project teams and offer technical guidance Qualifications EDUCATION MINIMUM 15 YEARS OF EDUCATION TRAINING AZURE DEV OPS CERTIFICATIONS CISSP (PREFERRED) LANGUAGES ENGLISH About Standard Chartered Were an international bank, nimble enough to act, big enough for impact. For more than 170 years, weve worked to make a positive difference for our clients, communities, and each other. We question the status quo, love a challenge and enjoy finding new opportunities to grow and do better than before. If youre looking for a career with purpose and you want to work for a bank making a difference, we want to hear from you. You can count on us to celebrate your unique talents and we cant wait to see the talents you can bring us. Our purpose, to drive commerce and prosperity through our unique diversity, together with our brand promise, to be here for good are achieved by how we each live our valued behaviours. When you work with us, youll see how we value difference and advocate inclusion. Together we: Do the right thing and are assertive, challenge one another, and live with integrity, while putting the client at the heart of what we do Never settle, continuously striving to improve and innovate, keeping things simple and learning from doing well, and not so well Are better together, we can be ourselves, be inclusive, see more good in others, and work collectively to build for the long term What we offer In line with our Fair Pay Charter, we offer a competitive salary and benefits to support your mental, physical, financial and social wellbeing. Core bank funding for retirement savings, medical and life insurance, with flexible and voluntary benefits available in some locations. Time-off including annual leave, parental/maternity (20 weeks), sabbatical (12 months maximum) and volunteering leave (3 days), along with minimum global standards for annual and public holiday, which is combined to 30 days minimum. Flexible working options based around home and office locations, with flexible working patterns. Proactive wellbeing support through Unmind, a market-leading digital wellbeing platform, development courses for resilience and other human skills, global Employee Assistance Programme, sick leave, mental health first-aiders and all sorts of self-help toolkits A continuous learning culture to support your growth, with opportunities to reskill and upskill and access to physical, virtual and digital learning. Being part of an inclusive and values driven organisation, one that embraces and celebrates our unique diversity, across our teams, business functions and geographies - everyone feels respected and can realise their full potential. www. sc. com/careers 30490
Posted 2 weeks ago
8.0 - 13.0 years
20 - 35 Lacs
Bengaluru
Work from Office
Job Title: Senior Security Analyst Threat Hunting & Incident Response Location: Bangalore (Rotational Shifts) Mode of work- 5 days WFO Experience: 8+ Years Job Type: Full-time Job Description: We are looking for a highly skilled and experienced Senior Security Analyst to join our client's Cybersecurity team. This role involves leading incident response activities, performing proactive threat hunting, and enhancing our overall security posture through innovative detection strategies and forensic investigations. Key Responsibilities: Lead end-to-end security incident response, including analysis, containment, mitigation, and reporting. Design and implement detective controls for emerging threats and vulnerabilities. Perform proactive threat hunting across multiple platforms and environments. Continuously enhance SIEM/SOAR/XDR alert use cases and threat detection capabilities. Research emerging threats, vulnerabilities, and attack techniques to improve defenses. Participate in a 24/7 on-call rotation to support incident response and critical investigations. Document incident response activities and produce detailed reports for stakeholders. Conduct post-incident reviews to drive improvements in tools, processes, and readiness. Collaborate across teams to improve the organization’s threat detection and response maturity. Required Qualifications: Bachelor’s degree in Computer Science, Cybersecurity, or related field. Minimum 8 years of experience in Security Operations, Incident Response, or Threat Detection. Strong experience with threat hunting methodologies and frameworks. Hands-on expertise with tools such as SIEM, SOAR, XDR (e.g., Cortex XSIAM, Torq). Working knowledge of MITRE ATT&CK , NIST frameworks, and cyber kill chain concepts. Preferred Skills & Experience: Strong understanding of network and endpoint security, defense-in-depth, and current threat trends. Experience with cloud security (AWS, Azure, GCP) and public cloud defense techniques . Exposure to Endpoint Detection & Response (EDR) tools, forensic analysis, and log correlation. Proficiency in scripting languages (e.g., Python, PowerShell ) for automation and analysis. Relevant certifications such as CISSP, GIAC (GCIA, GCIH, GCFA), CEH are a plus. Strong analytical mindset with the ability to assess risk and prioritize response. Excellent written and verbal communication skills.
Posted 2 weeks ago
10.0 - 15.0 years
30 - 36 Lacs
Pune
Work from Office
* Design, implement & maintain automated security solutions. * Ensure compliance with industry standards & best practices. * Monitor SIEM data & SOC alerts.
Posted 2 weeks ago
4.0 - 8.0 years
4 - 8 Lacs
Hyderabad / Secunderabad, Telangana, Telangana, India
On-site
As part of the cybersecurity organization, the Sr. Associate, Information Security Operations manages a CSOC Tier 1 (T1) shift as part of a 24/7 Cybersecurity Operations Center (CSOC). This role acts as a technical lead, ensuring alignment with standard operating procedures, analyzing security events, and contributing to the improvement of cybersecurity processes. Additionally, the Sr. Associate assists in incident response across the lifecycle phases, from response to lessons learned. Roles & Responsibilities Act as a technical lead for the CSOC T1 shift, ensuring alignment with standard operating procedures. Analyze security events, identifying common tactics, techniques, and procedures used by threat actors. Improve cybersecurity operations processes, critical metrics, and documentation. Participate in and optimize CSOC T1 knowledge-sharing and learning sessions. Assist incident responders with coordinating the response, containment, eradication, recovery, and lessons learned phases of the incident response lifecycle. What We Expect of You We are all different, yet we all use our unique contributions to serve patients. Basic Qualifications: Master's degree and 1 to 3 years of Information Technology or Cybersecurity experience OR Bachelor's degree and 3 to 5 years of experience in Security Operations or related field OR Diploma and 7 to 9 years of experience in Security Operations or a related field Preferred Qualifications Must-Have Skills: Solid understanding of security technologies and their core functionality. Experience in analyzing cybersecurity threats, with up-to-date knowledge of attack vectors and the threat landscape. Experience documenting and optimizing information security processes and procedures. Ability to prioritize tasks and solve problems efficiently in a diverse, global team environment. Good knowledge of Windows and/or Linux systems, including scripting languages. Good-to-Have Skills: Familiarity with 24/7 CSOC operations and incident response lifecycle. Experience in leading CSOC shifts and implementing cybersecurity improvements. Professional Certifications: CompTIA Security+ (preferred) CEH (preferred) GSEC (preferred) MTA Security Fundamentals (preferred) CISSP (preferred) Soft Skills Strong communication and collaboration skills, particularly when working with global teams. Ability to manage and prioritize tasks effectively in a high-pressure environment. Critical thinking and problem-solving abilities, especially in incident response situations. A commitment to continuous learning and knowledge sharing.
Posted 3 weeks ago
5.0 - 10.0 years
6 - 12 Lacs
Noida, Hyderabad, Bengaluru
Hybrid
4-5 years of subject matter expert experience, with minimum of 3 years experience in managing security operations/ service delivery, in comparable organizations, with sound knowledge & experience, in premise safety & security services domain. Bachelors degree in Business, or equivalent professional level experience
Posted 3 weeks ago
0.0 - 1.0 years
7 - 17 Lacs
Bengaluru
Work from Office
Wells Fargo is seeking a Associate Securities Operations Representative In this role, you will: Support a variety of operational tasks for simple or routine securities Identify ways to improve the overall process Perform routine duties such as processing, reconciling transaction and research inquires Regularly receive direction from supervisor and escalate issues to more experienced roles Review less complex documents Collaborate and consult with peers, colleagues and managers to resolve issues and achieve goals Interact with internal customers Receive direction from leaders and exercise independent judgment while developing the knowledge to understand function, policies, procedures, and compliance requirements Required Qualifications: 6+ months of Security Operations experience, or equivalent experience demonstrated through one or a combination of the following: work experience, training, military experience, education
Posted 3 weeks ago
4.0 - 9.0 years
6 - 8 Lacs
Pune
Work from Office
Senior Security Operations Analyst We are seeking an experienced professional to join our Pune, India office as a Senior Security Operations Analyst with a strong background in Security Information and Event Management (SIEM) platforms, specifically in Microsoft Sentinel and Wiz. The ideal candidate will be responsible for leading advanced threat detection, response, and monitoring activities. This role will be critical in enhancing our cybersecurity posture and ensuring the ZS environment remains secure against emerging threats. What youll do: Manage the day-to-day operations of Microsoft Sentinel, including rule creation, log ingestion, data analytics, and alert triaging Develop and tune detection rules, use cases, and analytics within Sentinel to improve threat visibility and detection capabilities Leverage Wiz Defend to detect and respond to runtime threats across cloud workloads and Kubernetes environments in real-time Continuously monitor and investigate alerts generated by Wiz Defend to enhance threat detection, triage, and incident response capabilities Perform proactive threat hunting to identify and mitigate advanced threats Conduct in-depth incident investigations and coordinate response efforts to ensure swift remediation Collaborate with internal stakeholders and the Threat Intelligence team to identify and mitigate potential security threats Generate reports and dashboards to communicate SOC performance metrics and security posture to leadership Continuously improve SOC processes and playbooks to streamline operations and response efforts Mentor junior SOC analysts and provide guidance on security best practices This role requires participation in a rotational shift Flexibility and availability to respond to urgent incidents outside of assigned shifts, as needed What youll bring: Strong analytical and problem-solving abilities Excellent communication and interpersonal skills to effectively collaborate with cross-functional teams Proven ability to remain calm and efficient under a high-pressure environment Proficient in using SIEM tools, such as Microsoft Sentinel Experience with data migration strategies across SIEM platforms Experience on Cloud Security Operations and Incident Response platforms such as Wiz In-depth understanding of cyber threats, vulnerabilities, and attack vectors Proficient in creating KQL queries and custom alerts within Microsoft Sentinel Expertise in developing SIEM use cases and detection rules Skilled in incident response and management procedures Experienced in conducting deep-dive investigations and root cause analysis for incidents Adept at collaborating with stakeholders to resolve complex cybersecurity challenges Ability to automate routine SOC processes to enhance operational efficiency Experienced in mentoring and guiding junior analysts in security operations Knowledge of major cloud platforms (AWS, Azure, GCP), including their security models, IAM roles, virtual private cloud (VPC) configurations, and cloud-native security tools Good to have skills and abilities: Excellent interpersonal (self-motivational, organizational, personal project management) skills Knowledge of vulnerability management and scanning best practices such as CVE database and the CVS System Ability to analyze cyber threats to develop actionable intelligence Skill in using data visualization tools to convey complex security information Academic Qualifications: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent experience) 4+ years of experience in a Security Operations Center (SOC) environment, with a focus on SIEM management Strong hands-on experience with Microsoft Sentinel, including data connectors, KQL queries, analytics rules, and workbooks Experience with SIEM migration Expertise in incident response, threat detection, and security monitoring Solid understanding of Windows, Linux, and cloud security concepts Relevant certifications (e.g., CompTIA Security+, Microsoft Certified: Security Operations Analyst, GCIA, GCIH, OSDA, GCFA) are preferred Preferred Security Cloud Certifications: AWS Security Specialty
Posted 3 weeks ago
3.0 - 5.0 years
11 - 14 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
The Security Supervisor is responsible for overseeing the day-to-day deployment, discipline, and performance of security guards at a designated site. This includes implementing site-specific security instructions, managing shift rosters, supervising guards on duty, and ensuring compliance with client and company policies to provide a secure and safe environment. Key Responsibilities: 1. Supervision and Team Management: Lead and supervise a team of security guards at the assigned site. Allocate duties, prepare shift schedules, and ensure punctuality and presence of guards. Conduct roll call/parade, uniform inspection, and briefing before each shift. 2. Operational Duties: Ensure implementation of post orders and standard operating procedures (SOPs). Monitor guards during shifts to ensure alertness, presence at duty posts, and proper conduct. Coordinate closely with the Site In-charge or client representatives. 3. Access Control Surveillance Oversight: Oversee access control of personnel, vehicles, and materials at the premises. Ensure proper maintenance of registers visitor log, gate passes, vehicle entry/exit, etc. Supervise monitoring of CCTV and other electronic surveillance systems. 4. Incident Emergency Response: Respond to and manage incidents like theft, trespassing, fire, or medical emergencies. Report and escalate critical issues to site management and operations team. Guide guards in emergency protocols, evacuation drills, and crisis handling. 5. Documentation and Reporting: Maintain daily shift reports, attendance records, and incident/occurrence registers. Submit timely reports to the Site In-charge and G4S regional office. Assist in audits, inspections, and statutory compliance documentation. 6. Client Coordination: Act as the first point of contact between the client and the security team. Address client complaints or concerns and take corrective action promptly. Maintain professionalism and courteous conduct in all client interactions. 7. Training and Development: Conduct regular briefings and on-the-job training for new guards. Enforce company policies on discipline, grooming, and code of conduct. Identify underperforming guards and recommend refresher training or disciplinary action. Eligibility Criteria: Education: Minimum 12th Pass; Graduate preferred. Age: 25 to 50 years (Relaxable for Ex-Servicemen). Height: Minimum 5 7 (170 cm) may vary by site/client requirement. Experience: Minimum 2 5 years of experience in the security industry. Experience in supervision/leadership roles preferred. Ex-Servicemen, Ex-Police, or Ex-Paramilitary candidates strongly preferred. Skills and Attributes: Strong leadership and people management skills. Good oral and written communication in English and regional languages. Sound knowledge of security operations, emergency handling, and surveillance practices. Computer literacy (email/reporting systems) is a plus. High integrity, discipline, and problem-solving abilities. Working Conditions: Rotational shifts (Day/Night) depending on client site. Deployment could be at commercial, industrial, residential, or institutional premises. Uniform, duty gear, and mobile phone (if applicable) provided. ESI, PF, Bonus, Gratuity, and Leave benefits as per statutory norms. Salary Benefits: As per market standards and applicable state Minimum Wages for Supervisor Grade. Site-specific allowances, night shift allowance, and incentive bonuses as applicable. Promotion potential to roles like Site In-charge / Assignment Manager based on performance and training.
Posted 3 weeks ago
3.0 - 6.0 years
7 - 11 Lacs
Gurugram
Work from Office
Job Summary: The Security consultant will be responsible for end-to-end Incident Response which includes detecting, analyzing, and responding to security incidents to protect an organizations IT infrastructure and products. The role involves working with product teams, leveraging tools, and following structured incident response policies and process. Key Responsibilities: 1. Incident Detection Analysis - Monitor security alerts from SIEM, IDS/IPS, and endpoint detection tools. - Investigate security events to determine impact, scope, and root cause. - Analyze network traffic, logs, and forensic artifacts to detect malicious activity. - Utilize frameworks like MITRE ATTCK, NIST 800-61, and Cyber Kill Chain for attack analysis. 2. Incident Response Mitigation - Respond to security incidents and perform containment, eradication, and recovery. - Document incident response actions and maintain playbooks for future reference. - Collaborate with IT, Security, and DevOps teams to implement security fixes. - Conduct malware analysis and reverse engineering when required. 3. Threat Intelligence Hunting - Stay updated on emerging threats and vulnerabilities. - Perform proactive threat hunting to detect potential attacks before they escalate. - Work with Threat Intelligence teams to assess indicators of compromise (IoCs). 4. Security Automation SOAR - Automate security incident response tasks using SOAR platforms. - Develop and optimize playbooks for automated threat containment. 5. Compliance Reporting - Ensure compliance with regulatory standards such as ISO 27001, NIST, PCI-DSS, SOC 2. - Prepare detailed incident reports and post-incident reviews (PIRs). - Assist in security audits and tabletop exercises for incident preparedness. Required Qualifications Skills Technical Skills: - SIEM Platforms - Endpoint Security - Forensics Malware Analysis - Threat Intelligence Tools - Programming/Scripting: Python, PowerShell - Cloud Security: AWS, Azure security best practices Soft Skills: - Strong problem-solving and analytical thinking. - Effective communication skills for technical and non-technical audiences. - Ability to work in high-pressure situations and make quick decisions. - Strong collaboration skills to work with cross-functional teams. Preferred Certifications: - Certified Incident Handler (GCIH) GIAC - Certified Cyber Incident Responder (ECIH) EC-Council - Certified Information Systems Security Professional (CISSP) (Nice to have) - Microsoft Certified: Security Operations Analyst Associate (Nice to have) - AI/ML Knowledge (Nice to have)
Posted 3 weeks ago
6.0 - 11.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identity and access management, and professional services designed to manage the cybersecurity risks of enterprise clients. We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the most advanced cyber threats. We leverage our global scale and decades of experience to accelerate our clients cyber outcomes through a full lifecycle of cybersecurity services. We are a global company with operating centers in the United States, Canada, the United Kingdom, and India. About the Job: Cyderes Threat Fusion Team is looking for a highly skilled threat researcher to conduct malware research in support of global security operations. This team will support multiple groups within the company, to include Threat Intelligence, Threat Hunting, DFIR, and MDR, with expert malware research services. The malware research team will also be responsible for tracking malware families, creating and updating kill chains, reverse engineering, and tracking nation-state threat actor activity. In addition, they will create hunting queries and conduct hunting operations in client environments. Other duties for this team include: Responsibilities: Function as a centralized malware reversing team for the companys needs. (support DFIR, Hunters, MDR, etc.) Track threat actors and campaigns via malware research, code reuse, infrastructure usage, general threat profiling. Create, test, verify efficacy for intel-based threat hunting queries for emerging threats. Create a library of actionable threat briefing that include quick analysis, context, and investigative steps for emerging threats (malware families, zero days, major campaigns) (2-5 page quick hit publications). Create white papers with in-depth threat analysis when threat discoveries warrant deeper dive reporting. Create profiles, kill chains, preferred targets, regions, etc for major threat actors / ransomware families This team will actively conduct global threat hunting for emerging threats. Requirements: 6+ years of hands-on experience in Malware Reverse Engineering Proficiency in researching threat actors and producing intelligence reports Malware reverse engineering expertise across Windows, Linux, and OSX samples. Tools should include IDAPRO, OLLYDBG, and similar. OSINT knowledge, using popular sources to expand understanding of threat groups. Advanced VirusTotal research skills, to include retro hunting and API connections. Knowledge of current ransomware groups and other malware families, to include TTP s, code structure, and typical kill chains. Knowledge of DarkWeb research and investigation using popular tool sets. Advanced investigative skills using popular EDR Tools, such as CrowdStrike, SentinelOne, and Microsoft Defender. Able to craft complex queries in their respective query languages. Skilled in querying and reviewing data in popular SIEMS, such as Splunk and Google Chronicle. Skilled in writing concise, compelling, and actionable intelligence reports in English. Able to lead intelligence briefings with customers in English. Note: This job posting is intended for direct applicants only. We request that outside recruiters do not contact us regarding this position.
Posted 3 weeks ago
5.0 - 10.0 years
13 - 17 Lacs
Bengaluru
Work from Office
The incumbent would be responsible to support the SOX, IT Risk, IT Project and associated Compliance process They will be involved in standardizing and improving process, evaluate their impacts and implement the relevant measure The role will involve managing the IT SOX program Liaise with various IT verticals leads to remediate new and outstanding issues, track IT and project risk-related issues in GRC system This is a global role engaging stakeholders across geographies like India, Philippines and US Incumbent should be a good effective communicator and have the required skillset to understand risk management concepts JOB FUNCTION AND RESPONSIBILITIES: Perform extensive IT SOX control testing . Identify issues and remediate with appropriate controls Identifying and assessing risks in the across organization IT verticals Identifying and assessing risks in the organization s Security Operations tools and processes Conduct assessment/review of IT processes and recommend action for improving IT governance maturity using reference framework like COBIT, ITIL and ISO 20000 Work closely with the Enterprise Risk Management team and ensure risks are reduced or maintained at minimum levels Collaborate with Enterprise Project Management team and have oversight on IT Self led process and ensure compliance Assist in development and monitor of IT Risk policies, standards and procedures QUALIFICATION: Bachelors / masters in computer science or equivalent 5-10 years of experience in IT Risk Management WORK SCHEDULE OR TRAVEL REQUIREMENTS: Mid Shift: 12.00PM - 9.00PM No Travel Requirements
Posted 3 weeks ago
1.0 - 6.0 years
3 - 8 Lacs
Pune
Work from Office
As part of Northern Trust s security operations center, a Senior Analyst will conduct security monitoring, security incident identification, incident prioritization, incident escalation and directed response support functions. Tier one analyst will play a crucial role in executing Northern Trust s 24x7 security monitoring model, creating a resilient and unified team that improves NT s ability to protect and defend it s networks and information. Monitors for alerts from security tools. Provides first response support by analyzing alerts and gathering information about potential incidents or vulnerabilities. Conducts incident analysis and response based on predefined procedures. Creates remediation tickets and tracks tickets to closure. Leverages Northern Trust s security runbooks and playbooks to triage alerts. Escalate incidents to tier two and three analysts as needed. Bachelor s degree in Computer Science or other IT related field. Minimum of 1+ years of experience working in an information security monitoring & response role in a large, complex environment. Solid understanding of the Cyber Incident Response Process & Life Cycle. Intermediate knowledge of security monitoring tools such as SIEM, IDS/IPS, EDR/XDR, & Email Security Solutions, Basic Networking concepts. Experience in working with ITSM tools like ServiceNow. Strong analytical and technical skills. Self motivated, proactive and able to work independently. Strong communication skills.
Posted 3 weeks ago
6.0 - 11.0 years
8 - 13 Lacs
Bengaluru
Work from Office
Greenlight is the leading family fintech company on a mission to help parents raise financially smart kids. We proudly serve more than 6 million parents and kids with our award-winning banking app for families. With Greenlight, parents can automate allowance, manage chores, set flexible spend controls, and invest for their family s future. Kids and teens learn to earn, save, spend wisely, and invest. At Greenlight, we believe every child should have the opportunity to become financially healthy and happy. It s no small task, and that s why we leap out of bed every morning to come to work. Because creating a better, brighter future for the next generation depends on it. Greenlight s Security Operations team is responsible for continuously monitoring and analyzing security threats, alerts, detecting and responding to security incidents across our infrastructure and implementing security controls to prevent future attacks. You will maintain and enhance a consistent and reliable operational security environment and take a proactive security monitoring approach. You must be a highly skilled and technical individual who is able to collaborate cross-functionally to remediate security challenges and has the ability to adapt in a dynamic security landscape. What you will be doing: Deploy and maintain security tools to proactively monitor and respond to emerging threats Monitor and analyze security alerts from various security tools (SIEM, firewalls, IPS, EDR etc.) to identify potential threats and incidents Investigate security incidents, determine their root cause and impact, and recommend appropriate mitigation strategies Participate in incident response activities, following established procedures to contain and remediate threats Analyze security data and identify trends to improve the organizations overall security posture Manage the critical vulnerability remediation process and drive rapid corrective actions AI inclusion and automation of routine security tasks to improve efficiency Stay up-to-date on the latest security threats and vulnerabilities Collaborate with other security teams and IT teams to ensure a comprehensive security posture Support ongoing security compliance, audit, and certification programs (e.g., PCI, HIPAA, SOC2) What you need to bring: 6+ years of security operations experience, preferably in cloud centric environments Demonstrate skill in identifying exploits and vulnerabilities and providing remediation efforts in network and server environments Knowledge of emerging threats and ability to stay abreast of developing threats and cyber vulnerabilities Knowledge of TCP/IP Protocols, network analysis, and network/security applications. Understanding of security within a public cloud environment (e.g., AWS, Azure OR GCP) and SaaS platforms Ability to be part of an on-call rotation and first responder to security event escalations Team player, collaboration with India and US team (mostly in PST timezone) Nice to Have: Experience with scripting languages (Python, PowerShell, etc.) Experience with public cloud security (AWS, Azure, GCP) Red/Blue team experience Security certifications (e.g., CISSP, Security+, CEH, GIAC) Who we are: It takes a special team to aim for a never-been-done-before mission like ours. We re looking for people who love working together because they know it makes us stronger, people who look to others and ask, How can I help? and then How can we make this even better? If you re ready to roll up your sleeves and help parents raise a financially smart generation, apply to join our team. Greenlight is an equal opportunity employer and will not discriminate against any employee or applicant based on age, race, color, national origin, gender, gender identity or expression, sexual orientation, religion, physical or mental disability, medical condition (including pregnancy, childbirth, or a medical condition related to pregnancy or childbirth), genetic information, marital status, veteran status, or any other characteristic protected by federal, state or local law. Greenlight is committed to an inclusive work environment and interview experience. If you require reasonable accommodations to participate in our hiring process, please reach out to your recruiter directly or email recruiting@greenlight.me .
Posted 3 weeks ago
7.0 - 10.0 years
9 - 12 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
As Assistant Fire & Security Manager, you will join a team that ispassionate about delivering exceptional service where we believe that anythingis possible, whilst having fun in all that we do! Key Responsibilities of the Assistant Fire & Security Manager : Security Management & Operations Supervisethe security department including recruitment, scheduling, and team management. Monitorentrances, exits, back-of-house, and guest floors using CCTV and patrols. Handleall access control points (guest rooms, staff lockers, service areas,deliveries, etc.) Surveillance & IncidentResponse Respondpromptly to emergencies (theft, intrusion, guest disturbances, fire alerts). Coordinatewith local police or emergency services when required. Investigateall reported incidents; maintain confidential and detailed incident reports. Guest & Staff Safety Ensurediscreet protection of VIP guests and high-profile events. Conductbag checks, staff frisking, and manage movement of materials (Gate Passsystem). Overseecrowd control, especially during functions, events, and high occupancy periods. Training & Compliance Conductregular training on hotel security protocol for all security personnel. Ensurecompliance with safety audits, fire drills, and mock emergency exercises. Liaisewith HR to ensure smooth onboarding and background verification of staff. Technology & SystemsOversight Monitorand maintain electronic surveillance, alarm systems, metal detectors, andvisitor logs. Ensurefire alarm control panels are functioning and integrated with security systems. Requirements of the Assistant Fire & Security Manager: Bachelorsdegree or equivalent, preferably with a background in law enforcement,military, or hospitality security. 7-10years of experience in security operations in hotels or the service industry. Knowledgeof security systems, CCTV operation, and local legal protocols. Excellentcrisis management, communication, and leadership skills. Certificationsin first aid, firefighting, or disaster management are advantageous.
Posted 3 weeks ago
6.0 - 8.0 years
8 - 10 Lacs
Bengaluru
Work from Office
> Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT
Posted 3 weeks ago
6.0 - 8.0 years
8 - 10 Lacs
Chennai
Work from Office
> Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT
Posted 3 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Noida
Work from Office
> Role Purpose The purpose of this role is to analyse, identify, rectify recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience: 5-8 Years.
Posted 3 weeks ago
1.0 - 3.0 years
5 - 10 Lacs
Gurugram
Work from Office
Title: Security Analyst (SOC & EDR) Location: Gurgaon, India Type: Hybrid (work from office) Job Description Who We Are: Fareportal is a travel technology company powering a next-generation travel concierge service. Utilizing its innovative technology and company owned and operated global contact centers, Fareportal has built strong industry partnerships providing customers access to over 600 airlines, a million lodgings, and hundreds of car rental companies around the globe. With a portfolio of consumer travel brands including CheapOair and OneTravel, Fareportal enables consumers to book-online, on mobile apps for iOS and Android, by phone, or live chat. Fareportal provides its airline partners with access to a broad customer base that books high-yielding international travel and add-on ancillaries. Fareportal is one of the leading sellers of airline tickets in the United States. We are a progressive company that leverages technology and expertise to deliver optimal solutions for our suppliers, customers, and partners. FAREPORTAL HIGHLIGHTS: Fareportal is the number 1 privately held online travel company in flight volume. Fareportal partners with over 600 airlines, 1 million lodgings, and hundreds of car rental companies worldwide. 2019 annual sales exceeded $5 billion. Fareportal sees over 150 million unique visitors annually to our desktop and mobile sites. Fareportal, with its global workforce of over 2,600 employees, is strategically positioned with 9 offices in 6 countries and headquartered in New York City. Job Overview We are seeking a proactive and knowledgeable Security Analyst to join our Information Security Operations (SecOps) team . This role will focus on SOC monitoring and Endpoint Detection and Response (EDR) using SentinelOne . The ideal candidate should have solid experience in threat monitoring, incident response, and SentinelOne tool handling. Key Responsibilities: Monitor and respond to SOC alerts and security incidents in real time. Analyze logs and alerts from SIEM and SentinelOne EDR platforms. Perform incident triage , escalation, and coordination with internal teams. Troubleshoot SentinelOne-related issues , including error resolution, agent communication, and performance problems. Understand and manage SentinelOne policies , ensure proper deployment, and make necessary adjustments for better coverage. Quickly identify the root cause of issues related to endpoint protection and take corrective actions. Coordinate with the IT team for issue resolution and endpoint remediation. Collaborate with teams to reduce false positives and improve alert accuracy. Maintain incident documentation , reports, and operational dashboards. Support in threat hunting , vulnerability detection, and other BAU (Business As Usual) security tasks. Required Skills & Qualification: Bachelors/Masters Degree in Computer Science, Information Systems, Engineering. 24 years of experience in SOC operations and endpoint security monitoring. Hands-on experience with SentinelOne EDR , including troubleshooting and policy management. Good knowledge of cybersecurity threats, incident response processes, and log analysis. Ability to investigate and resolve SentinelOne alerts and agent-related errors effectively. Experience working with SIEM tools (like Splunk, Qradar, etc.). Strong understanding of false positive tuning and threat detection improvement. Basic scripting knowledge (PowerShell, Python) is a plus. Good communication and analytical skills. Preferred Skills & Qualifications: CEH , CompTIA Security+ , or any other relevant security certification. Disclaimer This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Fareportal reserves the right to change the job duties, responsibilities, expectations or requirements posted here at any time at the Companys sole discretion, with or without notice.
Posted 3 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
Chennai
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT Mandatory Skills: Archer. Experience: 5-8 Years.
Posted 3 weeks ago
3.0 - 5.0 years
5 - 7 Lacs
Pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Azure B2X Security. Experience: 3-5 Years.
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
19947 Jobs | Dublin
Wipro
9475 Jobs | Bengaluru
EY
7894 Jobs | London
Accenture in India
6317 Jobs | Dublin 2
Amazon
6141 Jobs | Seattle,WA
Uplers
6077 Jobs | Ahmedabad
Oracle
5820 Jobs | Redwood City
IBM
5736 Jobs | Armonk
Tata Consultancy Services
3644 Jobs | Thane
Capgemini
3598 Jobs | Paris,France