Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
4.0 - 7.0 years
4 - 7 Lacs
Pune
Work from Office
About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. About the Role We are seeking a skilled Senior Security Analyst to join our SOC team. The ideal candidate will have a strong background in SOC operation and ensure that the SOC team is performing its functions as required and to trouble shoot incidents and events. As a Senior Security Analyst shall also act as the technical SME, and handle critical SOC task, Incident, guiding Level 1 and Level 2, customer communications. Key Roles & Responsibilities: Incident Response and Management Lead the investigation of high-severity security incidents and breaches. Provide expert analysis for complex incidents that L1 and L2 analysts cannot resolve. Develop and execute incident response procedures, including containment, eradication, and recovery. Ensure proper escalation processes are followed for incidents requiring higher expertise. Communicate with stakeholders, such as management and IT teams, to ensure appropriate handling of incidents. Threat Hunting and Analysis Perform proactive threat hunting activities to identify potential vulnerabilities, threats, and attacks before they happen using Splunk / QRadar SIEM. Use threat intelligence feeds to enrich SOC operations and identify emerging threats. Analyze large volumes of security data to detect patterns and anomalies. Security Tool Management Oversee and optimize the usage of security monitoring tools such as Splunk/ QRadar SIEM (Security Information and Event Management), IDS/IPS (Intrusion Detection/Prevention Systems), and endpoint protection systems. Configure, update, and fine-tune security tools to improve detection capabilities and reduce false positives. Recommend new security tools and technologies to improve SOC operations. Log and Event Analysis Review logs from various sources (network, endpoints, servers, etc. ) to identify security incidents. Ensure accurate log data collection and retention practices are followed. Provide in-depth analysis of security alerts and generate reports. Vulnerability Management Conduct vulnerability assessments and prioritize remediation activities for critical vulnerabilities. Collaborate with the IT and development teams to address security flaws and implement patches. Collaboration and Escalation Serve as the point of escalation for L1 and L2 SOC analysts when complex issues arise. Collaborate with other security teams, such as network security, application security, and IT operations, to ensure a comprehensive defense strategy. Work with external partners, including Managed Security Service Providers (MSSPs), to coordinate incident management and threat intelligence sharing. Security Policies and Best Practices Review and recommend improvements to security policies, procedures, and best practices. Ensure that the organizations security policies are being followed and advise on improvements. Conduct regular security awareness training for SOC staff and the broader organization. Reporting and Documentation Generate detailed reports on incidents, security posture, and threats for senior management and relevant stakeholders. Maintain incident logs and documentation to comply with regulatory and internal policies. Ensure all incidents are well-documented with root cause analysis, remediation efforts, and lessons learned. Continuous Improvement Analyze the effectiveness of the SOCs operations and suggest improvements to processes, workflows, and technologies. Stay updated on the latest cyber threats, tools, and techniques. Assist with the development and execution of simulations, exercises, and training to improve SOC capabilities. Compliance and Regulatory Requirements Ensure compliance with SLAs for all projects. Ensure SOC operations meet industry compliance requirements (e. g. , GDPR, HIPAA, PCI DSS). Help in audits and compliance assessments related to security operations. Mentoring and Training Provide mentorship and training to junior SOC analysts (L1 and L2). Share knowledge on advanced attack techniques, response strategies, and threat detection methods. Report deviations and concerns to the SOC Manager Basic Qualifications: B. E/B. Tech in Computer Science, Information Technology, Cybersecurity, or a related field. 5+ year of experience and strong foundational knowledge in security operations, SIEM, or IT security. Basic understanding of cybersecurity concepts, networking fundamentals, and security monitoring. Knowledge of IT infrastructure, networking, and cybersecurity principles. Communicate effectively with customers, teammates, and management Excellent problem-solving skills and attention to detail. Strong communication and interpersonal skills. Preferred Qualifications: Certifications in ECIH/GCIH/CISM/CISSP etc. Splunk Certified candidate Exposure to SIEM solutions, specifically Splunk, Qradar , DNIF or similar platforms. Familiarity with security tools such as EDR, XDR, WAF, DLP, email security gateways, and proxy solutions. Enthusiasm for learning and a strong interest in cybersecurity as a career. Ability to work in a team and adjust to rotational shifts in a high-stakes environment. Knowledge of cloud security and platforms (e. g. , AWS, Azure, GCP) Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you re passionate about technology and eager to make an impact, we d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted.
Posted 4 weeks ago
10.0 - 20.0 years
4 - 6 Lacs
Jabalpur, Pune
Work from Office
Job highlights Graduate/Post Graduate with 5-10 years in security industry at managerial level or ex-defense Maintain branch operations, ensure compliance, manage finance, promote business, and meet monthly targets Best salary in the industry for deserving candidates DESIGNATION: BRANCH MANAGER JOB LOCATION: Jabalpur /Pune QUALIFICATION: Any Graduate / Post Graduate DESIRED EXPERIENCE: 5 to10 Years IN SECURITY INDUSTRY AT MANAGERIAL LEVEL AND/OR 5 YEARS AS as Branch Manager in Security Industry or Ex Defense. SALARY:- Best In the Industry SKILLS & Knowledge : Strong Leadership & good Industrial Relationship skills Computer Savvy, can generate the report & can access mails. JOB PROFILE: Self Driven, Ex Defense /Security Industry background person with excellent Communication Skill, Strong Leadership, with a track record of successfully heading security business and setting of a benchmark in growth of business for minimum 5 years of branch with a turnover of 1 crore and willing to work anywhere in India. 5-10 years of work experience with Private Security Industry. To maintain the branch Office with good hold over of operation, Admin, Statutory Compliance, Finance Management, clients retention, business promotion. Can ensure that no corruption under his Branch and on site. Bring in discipline in the branch. Ensure that bills should be prepared on time and salary to be paid properly to guards. He also be able to bring new business and ability to retain the existing business. SHOULD BE ABLE TO MEET MONTHLY TARGETS . Can negotiate with new clients to convert them for business. Be capable of supervising operations and training by infusing modern trends in security Management. He should have good command over recovery without any loss to existing business. Remuneration is not a bar for deserving candidates. Candidates may forward their detailed CV's through e-mail clearly specifying the post applied for as subject at hrd@bombayintegrated.com Regards Manoj Singh 9001345247
Posted 4 weeks ago
1.0 - 6.0 years
1 - 4 Lacs
Mumbai, Thane, Navi Mumbai
Work from Office
This Opportunity is with a leading Fintech Company for their office in Thane location Role: SOC Executive Experience: 1 - 5 Years Job Description: Job Purpose: We are seeking a proactive and detail-oriented SOC Analyst with hands-on experience in SIEM tools such as ManageEngine Event Log Analyzer and SISA MDR. The ideal candidate will be responsible for monitoring, analysing, and responding to security incidents and events, managing alert configurations, and maintaining SOC operations including dashboards, asset inventories, and firewall analysis. This role is critical in the early detection and response to cybersecurity threats and in ensuring the overall security posture of the organization. Roles & Responsibilities: Operate and manage SIEM tools including ManageEngine EventLog Analyzer and SISA MDR to monitor and analyze security events in real-time. Deploy, configure, and manage log sources, and generate actionable reports using EventLog Analyzer. Perform in-depth log analysis and search for specific security events or anomalies within the SIEM environment. Onboard new devices and applications into the SIEM system, ensuring comprehensive log collection and visibility. Configure and fine-tune alert rules to identify potential threats and reduce false positives. Develop, maintain, and regularly update SOC dashboards to reflect current threat status and incident trends. Coordinate with support teams to raise Service Request Forms (SRFs), track ticket resolutions, and manage incident lifecycle activities. Define security policies and conduct vulnerability assessments using Nessus, analysing scan results for remediation planning. Continuously monitor SOC for suspicious activities such as DDoS attacks, port scanning, and unauthorized access attempts. Maintain an accurate asset inventory for SOC systems (desktops, laptops, servers) and verify that all Windows systems are properly licensed. Act as a first-level responder during security incidents, escalating issues such as bandwidth spikes, firewall violations, network outages, and unauthorized activities. Monitor and analyse firewall logs using FortiAnalyzer, identifying top sources/destinations, bandwidth-heavy applications, critical threats, and policy violations. Qualification/ Knowledge/ Skills/ Experience: Bachelors degree in information security, Computer Science, or related field. 1-2 years of relevant work experience. Proven experience with SIEM platforms (ManageEngine, SISA MDR) and vulnerability scanning tools (Nessus). Strong understanding of network protocols, firewall technologies, and incident response procedures. Experience in log analysis, alerting configuration, and SOC monitoring. Knowledge of Fortinet firewalls and experience with FortiAnalyzer preferred. Familiarity with security standards and compliance requirements. Good communication and documentation skills. Preferred Certifications: CompTIA Security+ / CySA+ EC-Council CEH GIAC (GCIH, GCIA) ManageEngine or Fortinet product certifications (preferred). Interested Candidates can share their CV's at priyal@topgearconsultants.com
Posted 4 weeks ago
8.0 - 10.0 years
15 - 22 Lacs
Indore, Pune
Work from Office
Kindly share your resume on sv12@svmanagement.com Key Responsibilities Ensure security manpower deployment is in alignment with approved organizational norms across designated locations. Oversee the operational health and efficiency of all security systems and equipment. Enforce adherence to site-specific Standard Operating Procedures (SOPs) for security and safety. Maintain plant discipline through consistent monitoring, engagement, and leadership. Ensure that all security personnel are trained and compliant with EMS (Environmental Management System), ISMS (Information Security Management System), and OH&SMS (Occupational Health & Safety Management System) guidelines. Develop, revise, and implement plant security SOPs with necessary management approvals, ensuring continuous alignment with operational needs. Monitor industrial relations (IR) and external threats by gathering intelligence; proactively escalate matters to senior management for timely mitigation. Lead investigations into incidents or breaches within the plant premises; ensure submission of comprehensive reports including root cause analysis and corrective/preventive actions. Experience & Functional Competencies Relevant professional experience in industrial/manufacturing security operations Ex-Serviceman background with exposure to industrial security management is highly desirable In-depth understanding of EMS, OH&SMS, and ISMS frameworks including documentation such as Environmental Aspect Impact Assessments and Hazard Identification & Risk Assessments (HIRA). Proven experience in designing, implementing, and auditing security systems, controls, and policies.
Posted 4 weeks ago
8.0 - 10.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Req ID: 326518 NTT DATA strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thinking organization, apply now. We are currently seeking a Cloud Solution Delivery Advisor to join our team in Pune, Mah?r?shtra (IN-MH), India (IN). Pre-sales 5G Solutions Architect Job Profile Summary: NTT Ltd. strives to hire exceptional, innovative, and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thinking organization, apply now. We are currently seeking a Pre-sales 5G Solutions Architect for our Global Deals Desk - Solutions team and grow business in NA, EU and APAC Regions. As a 5G/LTE Private Wireless Solutions Architect, you will set the standard for all things in Private Wireless involving 5G/LTE solutions with focus on customer satisfaction with NTT's CBRS and private wireless offerings. You will work cross-functionally within NTT Limited, as well as with the various vendors and customers to cultivate business and technical relationships. Through these relationships you will expand the adoption of CBRS and private wireless solutions, acting as a 5G Solutions Architect. The ideal candidate NTT Ltd is seeking has 8+ years of Wireless Network, Edge Computing experience with deep technical knowledge of 5G private and public network architecture, RF Network Engineering Experience, OEM vendor solutions and relationships in telecom vendor ecosystem include device OEMs. Additionally, a deep understanding of Wireless Networks, Information Technology and Digital Solutions sales and technology and/or professional services sales. Technical capacity to understand customer challenges and deliver tangible business results by combining deep industry expertise with applied innovations in digital, cloud and automation across a comprehensive portfolio of consulting, applications, infrastructure, and business process services. Job Description: In this role, you will act as a 5G/LTE Private Wireless Solutions Architect who can work with the NTT NV&I, client facing teams, project partners, and customers to: Engage with customer for understanding and capturing requirements. Design and document a comprehensive 5G/LTE private connectivity solution architecture for 5G/LTE core, RAN, transport, devices, security, operations, and deployment at a scale for a manufacturing, logistics, healthcare, smart warehouse broadband connectivity and various others. Define and document 5G/LTE private connectivity solution product requirements. Define and document performance metrics and KPIs for the 5G testbed. Applies an extremely deep understanding of business, financials, service offerings, the market, and the needs / challenges of customer requirements. Understands and applies long-term vision of business and technology product direction for NTT Ltd. Requires strategic agility to interface and successfully influence multiple C-level executives within the customer organization. Deliver sales presentations to key clients in coordination with partner representatives. Excellent written and verbal communication skills and demonstrates boardroom executive presence. Basic Qualifications: Bachelor's degree in Electrical engineering, Telecommunication Engineering or Network Engineering. Master's degree preferred. Minimum of 8 years experience in Wireless Network, Edge Compute and Network Engineering with bachelor's degree. Minimum of 6 years experience with Master's degree. About NTT DATA NTT DATA is a $30 billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long term success. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure and connectivity. We are one of the leading providers of digital and AI infrastructure in the world. NTT DATA is a part of NTT Group, which invests over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. Visit us at NTT DATA endeavors to make accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact us at . This contact information is for accommodation requests only and cannot be used to inquire about the status of applications. NTT DATA is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status. For our EEO Policy Statement, please click . If you'd like more information on your EEO rights under the law, please click . For Pay Transparency information, please click.
Posted 4 weeks ago
4.0 - 5.0 years
6 - 7 Lacs
Gurugram
Work from Office
Duty Manager , Facilities will be responsible for managing all aspects of day to day service delivery in Accenture during the shift. He/ She also will be accountable for proper usage and functionality of the technologies implement at site Responsibilities Helpdesk/Mailroom Operations To provide management advice on Helpdesk/Mailroom for escalated issues during the shift To ensure immediate response to all priority calls from employees and Siebel team during the shift and follow escalation process Clearing of C-mail / Government agencies mail to the proper recipient. To ensure accident or crises management is addressed immediately Front Office Operations To provide management advice for Front Office for escalated issues during the shift. To ensure immediate response to all priority calls during the shift and follow escalation process To take rounds of front office, lobby area, rest rooms to ensure a high standard of housekeeping upkeep Security Operations Attending the shift briefing To ensure Security muster, deployment and make sure to acknowledge on the register for any penalties/comments for the improvement in security services To ensure that the security assignment manager or security in-charge of the facility is being updated on the client s/VIP visits To ensure that the security related issues are discussed with security assignment manager and also on priority for the shift and ensure there is an action and tracking for the issue closure. To ensure that security staff adheres to GAP norms. To discuss and assist facility manager and security Manager (pan India) on monthly basis on the vendor performance matrix. To ensure the Grooming of the staff To manage the overall key room, clock room and time office operations. To ensure weekly training is imparted and staff grooming standard is maintained. To ensure VMT tool (vendor management tool) is up and run all the time To ensure all registers/tools update for material movements (In Out) on day to day basis Follow the escalation matrix if anything wrong Ensure to implement EHS practices (PPEs etc) in and around the security premises Ensure to update the new assets in the asset tracker update the relevant stake holders (WM CEs) Housekeeping Operations Attending the shift briefing To ensure Housekeeping muster, deployment and ensure acknowledgment on the register for and penalties/comments for the improvement in housekeeping services. To ensure that the housekeeping duty manager or housekeeping in-charge of the facility is being updated on the client s/VIP visits. To ensure that the housekeeping related issues are discussed with housekeeping duty manager and also on priority for the shift and ensure there is an action and tracking for the issue closure. To ensure a facility walk through to check on all rest rooms, breakout area, workstations, meeting rooms, cabins, common areas, development areas for the quality of the housekeeping services. Identification, on time closure and reporting of snags. To discuss and assist facility manager on monthly basis on the vendor performance matrix. Ensure all the Siebel housekeeping calls are closed on priority and within TAT without escalations. Cafeteria Operations To ensure caterers maintain a high standard of hygiene cleanliness in the services areas During food run out situation, ensure the matter is escalated to catering lead and coordinate with the catering vendor or any other alternative arrangements To ensure random food samples test is done by Accenture authorized vendor and results are taken up accordingly. To manage and supervise the quality, quantity and the cost of meal and refreshments being served in the cafeteria. To ensure that the operating hours, menus will be prominently displayed in all prominent places in the cafeteria. To conduct quarterly traffic analysis and ensure that waiting time on the cash counter and food counters and Sodexho counters shall be within tolerable limits. To ensure that the table chairs are cleaned at all times and the frequency shall be modulated according to the traffic. To ensure that tracking is done on the vendor crockery like spoons, plates etc to ensure no shortages. Should conduct monthly random Kitchen audit of the vendors. Escalate Facility Manager and then Accenture Lead on escalations. Ensure the hygiene of the cafeteria vendors operating in stalls. Ensure PPE are used by vendor staff while serving, cooking and washing. Estate Management Ensure necessary approvals are taken by the builder team on cases to cases basis during specific events Coordination with builder on guarding services and common area upkeep daily / weekly / monthly Co-ordinate with builder security for logistics requirement Co-ordinate with builder for pest control activity closure Take proper rounds in all common areas maintained by builder Co-ordination with builder HK team ensure daily HK activity in place in common areas Make snag reports pertaining to common area s and follow up for closure Coordination for bee hive removals and pest control Coordination with builder security team for any logistics requirement General Operations To ensure upkeep of breakout area reprographic equipment s at all times and take necessary actions as required. To ensure all such communication is entered in the duty manager log book to inform the next shift person. Proper handing over and taking over to be done. To go for facility, walk around and ensure Walk around map Guide is followed and maintained. To adhere to Accenture Policies, Processes procedures and also the statutory documents To adhere to Accenture SLA KPI as agreed with JLL To assist Facility Manager in all such ISO, Internal, External, audits that happen at Accenture and ensure necessary documentation are done To coordinate with engineering team for any issues that need help. Organizing induction program for all TPV Jll staff Plan train TPV staff on Accenture policies and requirements. Daily and monthly updating of OLA in the SMDRS tool. Important and VIP client visits to be coordinated with Events team and should be managed without escalations. Should have complete knowledge functionality e.Fit tools ( VMT, IMT, Site Ops. Site Inspection tool), BGC and work permit tool. Should govern overall pest control, carpet maintenance, Wellness room, Ambulance, Indoor plants, Recreation room and Gym activities. Should conduct all the scheduled meeting and focus meets with projects as per calendar. Should participate and manage half yearly fire drill. All daily, weekly and monthly reports to be shared on time. All the relevant checklist to be governed and maintained as per requirement. Adopt to all the new implemented initiatives. Handling of security, EHS incidents on priority and communicating the same as per escalation matrix. Answering the employee query on phone and replying mails Follow the escalation process matrix for any incident / issues (100%)
Posted 4 weeks ago
8.0 - 13.0 years
10 - 15 Lacs
Bengaluru
Work from Office
A total of 8 years of professional experience, including 5 years in Security Operations Center (SOC) operations and 3 years in Cyber Threat Intelligence (Surface, Deep Dark Web). Mandatory hands-on experience with at least one Digital Risk Protection(Brand Intelligence Platforms) (eg, RecordedFuture, GroupIB, Mandiant, CrowdStrike Falcon Intelligence (Recon+, Elite), Zerofox, Intsights, Cyble, Cloudsek, Cyfirma, SocRadar, Digital Shadows). Mandatory hands-on experience with at least one Threat Intelligence Platform (TIP) (eg, ThreatConnect, Anomaly, ThreatQuotient, Cyware, Palo Alto TIM). Knowledge on Attack Surface Management tools like Bitsight, Security scorecard, etc Excellent written and verbal communication skills for report writing and stakeholder presentations. Ability to identify, track, and analyze emerging cyber threats, threat actors, and attack vectors relevant to the organizations industry and environment. Proficient in analyzing suspicious files/sandboxing using tools such as VirusTotal, Hybrid Analysis, Cuckoo, Any.run, Intezer, and Joe Sandbox. Expertise in monitoring and analyzing threat intelligence across various sources, including Open Source Intelligence (OSINT), Deep Dark Web forums, commercial and open-source threat feeds, and security vendor reports. Strong understanding of cyber threat actors, tactics, techniques, and procedures (TTPs), leveraging frameworks such as MITRE TelecommunicationCK, Cyber Kill Chain, Diamond Intrusion Model, and CREST Cyber Threat Intelligence Framework. Skilled in analyzing vulnerabilities and exploits that are actively used and providing insights for patching and mitigation efforts. Capable of monitoring cyber threat landscapes, including geopolitical developments and threat actor activities. Experience in preparing and presenting intelligence reports related to threat trends, zero-day vulnerabilities, and supply chain attacks to stakeholders, highlighting significant threats and recommended actions. Ability to produce actionable intelligence reports, threat briefs, and strategic assessments to inform leadership and technical teams. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or GIAC Cyber Threat Intelligence (GCTI) are preferable. Secondary Skills Knowledge of various malware mitigation strategies, including prevention, detection, removal, recovery, and response. Familiarity with query structures such as Regular Expressions, YARA and SIGMA rules, AQL, and KQL. Basic understanding of programming languages, specifically Java and Python. Preferred knowledge of Malware Analysis Techniques: Static Dynamic analysis, code analysis, behavioral analysis, and forensic analysis. Understanding and knowledge of different security technologies like SOAR, Attack Surface Management, Web Application Firewalls (WAF), DNS, DMARC, and Vulnerability Management. Knowledge of Threat Hunting and Digital Forensics and Incident Response (DFIR) is preferable. Tertiary skills Automation Any other skills required Strong analytical and problem-solving skills, Proactive approach, self-motivated Domain Cyber Sec
Posted 4 weeks ago
15.0 - 20.0 years
20 - 25 Lacs
Hyderabad, Bengaluru
Work from Office
Scope: We are looking for a dynamic and strategic Vice President of Cyber Defense to lead our global cyber defense and incident response capabilities. This executive leader will own the detection, response, and mitigation of cyber threats, ensuring our organization is resilient in the face of a rapidly evolving threat landscape. The ideal candidate brings deep expertise in threat detection, SOC operations, incident response, and threat intelligence. This leader will partner across the business to build and maintain a world-class cyber defense program that proactively protects the company s assets, data, and reputation. Key Responsibilities: Cyber Defense Strategy & Operations: Develop and execute the company s cyber defense strategy, aligning with enterprise risk, compliance, and business objectives. Work with key stakeholders and business lines to ensure detection and response meet NIST CSF minimum baselines for global security operations and response. Lead 24/7/365 operations based on business need; partner with Global Command and Site Reliability Teams to ensure baseline for all customer facing incidents, and internal company wide incidents are coordinated in a centralized operation center follow the sun model. Lead the global Security Operations Center (SOC), including 24/7 monitoring, detection, analysis, and response to cyber threats. Build out capabilities for detection and response for Tier 1, Tier 2, and Tier 3 security incidents and events. Implement and mature threat hunting, security analytics, and detection engineering programs. Ensure and validate Customer Incident Response and capabilities for onboarding mergers & acquisitions, new customers, and new environments as we grow and scale. Security Assessment and Continuous Threat Exposure Management: Identifying and fixing weaknesses in systems and networks; including establish MTTD, MTTR, and MTTA for exposures, vulnerabilities, and potential threats. Incident Response: Investigating and responding to security breaches, including analyzing incidents and escalating them when necessary. Threat Detection and Prevention: Monitoring network traffic, system logs, and other data sources to identify potential threats and malicious activity. Security System Administration and Maintenance: Installing, configuring, and maintaining security tools like firewalls, antivirus software, and intrusion detection systems. Security Policy and Procedure Development: Creating and enforcing security policies and procedures to protect sensitive information. Security Training and Awareness: Educating employees about cybersecurity risks and best practices. Staying Up-to-Date: Keeping abreast of the latest security threats, vulnerabilities, and technologies. Threat Intelligence & Response: Build and manage a comprehensive threat intelligence function to anticipate and defend against advanced persistent threats (APTs) and zero-day vulnerabilities. Lead cyber incident response efforts, including containment, eradication, and post-incident reviews. Serve as a key escalation point during major security events and coordinate cross-functional response. Security Engineering & Automation: Oversee the development and deployment of tools and technologies that support threat detection, log aggregation, SIEM, SOAR, EDR, and XDR platforms. Drive automation and orchestration to increase efficiency and reduce time to detection/response. Hold QBRs with key security operations vendors to ensure compliance and SLAs are met with all contracts. Team Leadership & Development: Build, lead, and inspire a high-performing cyber defense team, including SOC analysts, incident responders, threat hunters, and detection engineers. Foster a culture of accountability, continuous learning, and proactive defense. Establish Career Development Plans and Growth for analysts, engineers, managers, and directors as the business grows and scales. Collaboration & Executive Engagement: Partner with IT, Infrastructure, Risk, Compliance, and Legal teams to align cyber defense practices with business needs. Provide executive-level reporting on threat landscape, risk posture, and incident metrics. Act as a thought leader and spokesperson on cyber defense strategy internally and externally. Qualifications: Bachelor s or Master s degree in Cybersecurity, Computer Science, Information Technology, or a related field. 15+ years of experience in cybersecurity, with at least 5 to 8 years in a senior leadership role overseeing SOC, incident response, or threat intelligence. Deep knowledge of security operations, threat detection techniques, MITRE ATT&CK, and NIST/ISO frameworks. Proven track record managing large-scale incident response, threat intelligence operations, and blue team functions. Experience with cloud security (AWS, Azure, GCP) and hybrid infrastructure defense. Strong executive presence and ability to communicate effectively with C-level stakeholders. Relevant certifications such as CISSP, GIAC, GCIA, GCIH, or equivalent are highly desirable.
Posted 4 weeks ago
0.0 years
20 - 25 Lacs
Mumbai, Nagpur, Thane
Work from Office
Key Responsibilities Identity and Access Management (IAM) Design, implement, and manage IAM frameworks, ensuring secure access control across on-premises and cloud environments. Administer user accounts, roles, and permissions following the principle of least privilege. Perform periodic access reviews and audits to ensure compliance with organizational policies. Manage single sign-on (SSO), multi-factor authentication (MFA), and identity federation solutions. Collaborate with application teams to implement secure authentication and authorization protocols. Vulnerability Management Conduct regular vulnerability scans across infrastructure, applications, and endpoints using tools such as Qualys, Nessus, or equivalent. Analyze vulnerability reports, prioritize risks, and coordinate remediation efforts with relevant teams. Maintain and improve patch management processes to address identified vulnerabilities. Monitor and track emerging threats, ensuring timely implementation of mitigation measures. Create and present vulnerability management dashboards and reports for stakeholders. Security Operations Monitor and respond to security incidents, ensuring quick containment and resolution. Configure and manage security tools such as firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions. Conduct root cause analysis for incidents and implement preventive measures. Ensure compliance with security standards such as ISO 27001, NIST, or CIS benchmarks. Develop and update runbooks and incident response procedures. and Governance Work closely with DevOps, infrastructure, and application teams to integrate security best practices. Participate in security assessments, audits, and risk analysis exercises. Support the development and enforcement of security policies and standards. Provide security awareness training to teams and stakeholders. Documentation and Reporting Maintain comprehensive documentation of IAM workflows, security processes, and vulnerability management activities. Provide periodic compliance and risk reports to management and relevant stakeholders. Qualifications and Skills Proven experience in IAM, vulnerability management, and security operations. Strong knowledge of identity management tools and vulnerability scanning tools (e.g., Qualys). Proficiency in configuring and managing security tools such as firewalls, IDS/IPS, and endpoint security solutions. Familiarity with cloud security practices across platforms like AWS, Azure, or Google Cloud. Strong analytical and problem-solving skills with attention to detail. Relevant certifications such as CISSP, CISM, CompTIA Security+, or GIAC are highly desirable. Key Responsibilities Identity and Access Management (IAM) Design, implement, and manage IAM frameworks, ensuring secure access control across on-premises and cloud environments. Administer user accounts, roles, and permissions following the principle of least privilege. Perform periodic access reviews and audits to ensure compliance with organizational policies. Manage single sign-on (SSO), multi-factor authentication (MFA), and identity federation solutions. Collaborate with application teams to implement secure authentication and authorization protocols. Vulnerability Management Conduct regular vulnerability scans across infrastructure, applications, and endpoints using tools such as Qualys, Nessus, or equivalent. Analyze vulnerability reports, prioritize risks, and coordinate remediation efforts with relevant teams. Maintain and improve patch management processes to address identified vulnerabilities. Monitor and track emerging threats, ensuring timely implementation of mitigation measures. Create and present vulnerability management dashboards and reports for stakeholders. Security Operations Monitor and respond to security incidents, ensuring quick containment and resolution. Configure and manage security tools such as firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions. Conduct root cause analysis for incidents and implement preventive measures. Ensure compliance with security standards such as ISO 27001, NIST, or CIS benchmarks. Develop and update runbooks and incident response procedures. and Governance Work closely with DevOps, infrastructure, and application teams to integrate security best practices. Participate in security assessments, audits, and risk analysis exercises. Support the development and enforcement of security policies and standards. Provide security awareness training to teams and stakeholders. Documentation and Reporting Maintain comprehensive documentation of IAM workflows, security processes, and vulnerability management activities. Provide periodic compliance and risk reports to management and relevant stakeholders. Qualifications and Skills Proven experience in IAM, vulnerability management, and security operations. Strong knowledge of identity management tools and vulnerability scanning tools (e.g., Qualys). Proficiency in configuring and managing security tools such as firewalls, IDS/IPS, and endpoint security solutions. Familiarity with cloud security practices across platforms like AWS, Azure, or Google Cloud. Strong analytical and problem-solving skills with attention to detail. Relevant certifications such as CISSP, CISM, CompTIA Security+, or GIAC are highly desirable.
Posted 4 weeks ago
5.0 - 10.0 years
45 - 55 Lacs
Bengaluru
Work from Office
At SolarWinds, we re a people-first company. Our purpose is to enrich the lives of the people we serve including our employees, customers, shareholders, Partners, and communities. Join us in our mission to help customers accelerate business transformation with simple, powerful, and secure solutions. The ideal candidate thrives in an innovative, fast-paced environment and is collaborative, accountable, ready, and empathetic. We re looking for individuals who believe they can accomplish more as a team and create lasting growth for themselves and others. We hire based on attitude, competency, and commitment. Solarians are ready to advance our world-class solutions in a fast-paced environment and accept the challenge to lead with purpose. If you re looking to build your career with an exceptional team, you ve come to the right place. Join SolarWinds and grow with us! Your Role: We are seeking a Senior Site Reliability Engineer (Infrastructure & Site Reliability Engineering) with experience in AWS, GCP, Kubernetes, and GitOps to work with our Site Reliability Engineering (SRE) team. The successful candidate will understand SRE practices and have a track record of implementing high-quality site reliability engineering practices (SLAs, SLOs, Proactive Alert Management, Incident Response/Review, Postmortems, etc.). In this role, you will work with our SRE and cross-functional engineering teams to develop and operate our development and production infrastructure and operations Responsibilities: Work collaboratively with software engineering teams to define infrastructure and deployment requirements. Contribute actively and assist in our automation and observability initiatives Learn, develop, and maintain operational tools for deployment, monitoring, and analysis of cloud (AWS & GCP) infrastructure and systems Work closely with team members to lead the response to production incidents, conduct postmortems, and drive continuous improvement efforts as part of 24/7 on-call rotations for exposure to critical issue resolution Contribute to on-call documentation and incident response playbooks Establish and drive operations performance through SLOs Embrace and adhere to development best practices, including continuous integration/deployment and code review Demonstrate a strong commitment to continuous learning and professional development by seeking opportunities for mentorship and learning within the team. Our team uses practices to maximize our development velocity, including but not limited to: continuous integration/deployment, code review via GitHub pull requests Ideal Attributes Strong customer orientation Excellent interpersonal and organizational skills Attention to detail and focus on quality Strong communication skills to effectively liaise with both technical and non-technical staff Ability to act decisively and work well under pressure Must be a collaborative problem solver Strong bias for ownership and action Qualifications: At least 5+ years of experience designing, building ,and maintaining SAAS environments 4+ years of experience designing, building,g and maintaining AWS/GCP infrastructure with Terraform Experience building and running Kubernetes clusters Experience with observability (monitoring, logging, tracing, metrics) Experience with GitOps CI/CD processes Experience with scripting with Python, Go (Golang), bash, or PowerShell, and AWS CLI tools Experience with security operations - security policies, infrastructure, key management, setup of encryption at rest and transport
Posted 4 weeks ago
4.0 - 9.0 years
9 - 13 Lacs
Bengaluru
Work from Office
Diverse Lynx is looking for SOC Lead to join our dynamic team and embark on a rewarding career journey. Lead the SOC team and manage the organization's security operations Ensure that the SOC is staffed with skilled analysts and that the SOC team is executing their tasks efficiently and effectively Monitor and respond to security events and alerts to detect potential security incidents Manage security incidents and provide guidance on remediation Develop and maintain incident response plans and playbooks Collaborate with cross-functional teams to ensure security technologies, policies, and procedures align with business needs Develop and maintain security policies, standards, and procedures Conduct security awareness training for employees and contractors Experience with security information and event management (SIEM) tools such as Splunk or QRadar Excellent problem-solving and analytical skills Strong communication and interpersonal skills
Posted 4 weeks ago
8.0 - 10.0 years
35 - 40 Lacs
Bengaluru
Work from Office
About the job At Arctic Wolf, were not just navigating the cybersecurity landscape - were redefining it. Our global team of dedicated Pack members is driving innovation and setting new industry standards every day. Our impact speaks for itself: weve earned recognition on the Forbes Cloud 100, CNBC Disruptor 50, Fortune Future 50, and Fortune Cyber 60 lists, and we recently took home the 2024 CRN Products of the Year award . We re proud to be named a Leader in the IDC MarketScape for Worldwide Managed Detection and Response Services and earning a Customers Choice distinction from Gartner Peer Insights . Our Aurora Platform also received CRN s Products of the Year award in the inaugural Security Operations Platform category. Join a company that s not only leading, but also shaping, the future of security operations. Our mission is simple: End Cyber Risk. We re looking for a Senior Principal Developer to be part of making that happen. About the role You ll be working as a senior principal software developer on our MR Team, responsible for delivering the cloud-based software that helps solve the real-world security problems that IT professionals face. The Arctic Wolf security operations platform ingests and processes upwards of 250 billion events a day from a wide variety of on-premise devices and cloud platforms. The security pipeline is a distributed system of loosely-coupled microservices that constitute our real-time analysis and threat detection systems. These services distill the incoming events into actionable intelligence that our Concierge Security Teams use to protect customers. We are growing rapidly, with our data volume increasing ten-fold roughly every two years. The senior principal developer is responsible for providing the entire department, multiple teams technical direction to deliver high value, performant software solutions. The senior principal developer will provide technical guidance and direction to multiple teams of developers through the design, implementation and automated/integration testing of our software. They will also provide guidance on following our Arctic Wolf work stream blueprints and best practices for running, monitoring, and maintaining our system. Some of your day-to-day responsibilities include: Serve as an expert in the department s field and represent group as an advisor to other teams. Provide, guide and use professional concepts in developing resolution to critical issues by applying your extensive knowledge of theories, practices and design matters. Lead the application of existing principles and guides development of new ideas. Deep understanding of the overall product with focus on department area and broadly aware of all aspects of how Security Services delivers the service. Work on issues that impact program success or addresses future concepts and products, devising solutions devised based on limited information and requiring judgment. Implementation of solutions requires a longer-term view, which impacts strategic goals and objectives. Considering pragmatic trade-offs and appropriate technical debt to balance delivery and quality with the longer-term view. Results achieved impact multiple functions, meaning this role has an impact with product and security services as well. Provide input to Architecture work-streams as appropriate. Sharing department wide technical goals and direction, and support the department teams understand cross department needs and standards. Once a year we hold a department-wide Hackathon, teaming up across all RD teams over four days to collaborate and build cool ideas outside the normal project scope. While innovation is the focus, some of these ideas do make it into our products. About You You re an expert software developer and leader who influences the work of an entire department of several teams, with interlock across all departments in the VP area. You indirectly influence all of RD and a subset of Product Teams. You are a strong mentor to RD technical leaders across multiple domains. You will exercise a wide latitude in determining objectives and approaches to critical assignments. You will create formal networks with key decision makers and are widely recognized as an expert and thought leader by both the internal and external community who serves as an external spokesperson for the organization. Here are some of the core technologies we use and teach across our Applications teams. You should have experience in one or more of these, or similar technologies: Python/Go/Java React/Typescript/Javascript AWS + COGS Gin/Django/Spring Git Docker Kubernetes Integrations with 3rd Party Vendors(Like Patch Management, SOAR, SIEM ..) In addition, you have proven leadership experience from previous projects, regardless of title held. You have the ability to perform programming tasks and large engineering projects with independence and expertise. Strategically placed to handle migrations, deprecations and dealing with old systems. You will be responsible for guiding and mentoring other staff members and will regularly oversee the technical projects of several domains. You have a high level of mastery over software development best practices and building reusable design patterns. You have a history of delivering successful projects, as well as some lessons learned from failures. At Arctic Wolf, we foster a collaborative and inclusive work environment that thrives on diversity of thought, background, and culture. This is reflected in our multiple awards, including Top Workplace USA (2021-2024), Best Places to Work - USA (2021-2024), Great Place to Work - Canada (2021-2024), Great Place to Work - UK (2024), and Kununu Top Company - Germany (2024). Our commitment to bold growth and shaping the future of security operations is matched by our dedication to customer satisfaction, with over 7,000 customers worldwide and more than 2,000 channel partners globally. As we continue to expand globally and enhance our technology, Arctic Wolf remains the most trusted name in the industry. Our Values Arctic Wolf recognizes that success comes from delighting our customers, so we work together to ensure that happens every day. We believe in diversity and inclusion, and truly value the unique qualities and unique perspectives all employees bring to the organization. And we appreciate that by protecting people s and organizations sensitive data and seeking to end cyber risk we get to work in an industry that is fundamental to the greater good. We celebrate unique perspectives by creating a platform for all voices to be heard through our Pack Unity program. We encourage all employees to join or create a new alliance. See more about our Pack Unity here . We also believe and practice corporate responsibility, and have recently joined the Pledge 1% Movement, ensuring that we continue to give back to our community. We know that through our mission to End Cyber Risk we will continue to engage and give back to our communities. All wolves receive compelling compensation and benefits packages, including: Equity for all employees Flexible annual leave, paid holidays and volunteer days Training and career development programs Comprehensive private benefits plan including medical insurance for you and your family, life insurance (3x compensation), and personal accident insurance. Fertility support and paid parental leave Arctic Wolf is an Equal Opportunity Employer and considers applicants for employment without regard to race, color, religion, sex, orientation, national origin, age, disability, genetics, or any other basis forbidden under federal, provincial, or local law. Arctic Wolf is committed to fostering a welcoming, accessible, respectful, and inclusive environment ensuring equal access and participation for people with disabilities. As such, we strive to make our entire employee experience as accessible as possible and provide accommodations as required for candidates and employees with disabilities and/or other specific needs where possible. Please let us know if you require any accommodations by emailing recruiting@arcticwolf.com. Security Requirements Conducts duties and responsibilities in accordance with AWN s Information Security policies, standards, processes and controls to protect the confidentiality, integrity and availability of AWN business information (in accordance with our employee handbook and corporate policies). Background checks are required for this position.
Posted 4 weeks ago
9.0 - 15.0 years
15 - 19 Lacs
Nagpur
Work from Office
JOB PURPOSE Provide operational leadership to security functions at Rajiv Gandhi International Airport in order to ensure incident free and foolproof security operations thereby providing a safe and secure environment for the passengers, all the stake holders/concessionaries and airport staff. To Lead the Security function at GNIAL and ensure effective implementation of Security processes and procedures in compliance to all statutory and regulatory requirements; Assess mitigate any security risks and establish safe environment at the airport premises. ORGANISATION CHART Head : Operations Head - SV KEY ACCOUNTABILITIES - Additional Details EXTERNAL INTERACTIONS External Interactions Bureau of Civil Aviation Security (BCAS) Other regulatory enforcement agencies like Police, RTO, Intelligence Airlines, Ground Handlers, Concessionaires, Service Providers Customs, Immigration Authorities, (CISF), Airport Health Organization (APHO) INTERNAL INTERACTIONS Internal Interactions Leadership Team of GNIAL all associated departments Operations Team Group Corporate / Sector Leadership Team CEO / Business Chairman/ Group Holding Board FINANCIAL DIMENSIONS Effective Management of Department Budget Monitor and arrest Revenue Leakage in various departments like Non-Aero Business, Cargo, Taxi Parking etc.. OTHER DIMENSIONS Interaction with Multi-dimensional stakeholders with appropriate grace, humility and teamwork Demonstrated leadership in driving innovation in Airport Security Operations, handling a team with diverse skill sets handing emergencies EDUCATION QUALIFICATIONS Masters/ Bachelor s Degree from a leading University or any similar professional Diploma /Degree with specialization in Security/ Investigation/ Intelligence. RELEVANT EXPERIENCE Min. of 20 years of experience which includes managing the security operations of a large government establishment (Police/ Defense) OR business organization OR an intnl airport handling not less than 7 mppa. Should have well established contacts with State Central level govt. agencies/ senior personnel. Knowledge of ICAO Regulations, ICAO Security Manual, International conventions on security and parallel Indian Laws, BCAS rules regulations and current developments in aviation security. COMPETENCIES Problem Solving Analytical Thinking Planning Decision Making Capability Building Strategic Orientation Stakeholder Focus Networking Execution Results Teamwork Interpersonal influence Personal Effectiveness Social Awareness Entrepreneurship
Posted 4 weeks ago
3.0 - 7.0 years
3 - 7 Lacs
Pune
Work from Office
About the Role We are seeking a skilled Senior Security Analyst to join our SOC team. The ideal candidate will have a strong background in SOC operation and ensure that the SOC team is performing its functions as required and to trouble shoot incidents and events. As a Senior Security Analyst shall also act as the technical SME, and handle critical SOC task, Incident, guiding Level 1 and Level 2, customer communications. Key Roles & Responsibilities: Incident Response and Management Lead the investigation of high-severity security incidents and breaches. Provide expert analysis for complex incidents that L1 and L2 analysts cannot resolve. Develop and execute incident response procedures, including containment, eradication, and recovery. Ensure proper escalation processes are followed for incidents requiring higher expertise. Communicate with stakeholders, such as management and IT teams, to ensure appropriate handling of incidents. Threat Hunting and Analysis Perform proactive threat hunting activities to identify potential vulnerabilities, threats, and attacks before they happen using Splunk / QRadar SIEM. Use threat intelligence feeds to enrich SOC operations and identify emerging threats. Analyze large volumes of security data to detect patterns and anomalies. Security Tool Management Oversee and optimize the usage of security monitoring tools such as Splunk/ QRadar SIEM (Security Information and Event Management), IDS/IPS (Intrusion Detection/Prevention Systems), and endpoint protection systems. Configure, update, and fine-tune security tools to improve detection capabilities and reduce false positives. Recommend new security tools and technologies to improve SOC operations. Log and Event Analysis Review logs from various sources (network, endpoints, servers, etc.) to identify security incidents. Ensure accurate log data collection and retention practices are followed. Provide in-depth analysis of security alerts and generate reports. Vulnerability Management Conduct vulnerability assessments and prioritize remediation activities for critical vulnerabilities. Collaborate with the IT and development teams to address security flaws and implement patches. Collaboration and Escalation Serve as the point of escalation for L1 and L2 SOC analysts when complex issues arise. Collaborate with other security teams, such as network security, application security, and IT operations, to ensure a comprehensive defense strategy. Work with external partners, including Managed Security Service Providers (MSSPs), to coordinate incident management and threat intelligence sharing. Security Policies and Best Practices Review and recommend improvements to security policies, procedures, and best practices. Ensure that the organization's security policies are being followed and advise on improvements. Conduct regular security awareness training for SOC staff and the broader organization. Reporting and Documentation Generate detailed reports on incidents, security posture, and threats for senior management and relevant stakeholders. Maintain incident logs and documentation to comply with regulatory and internal policies. Ensure all incidents are well-documented with root cause analysis, remediation efforts, and lessons learned. Continuous Improvement Analyze the effectiveness of the SOC's operations and suggest improvements to processes, workflows, and technologies. Stay updated on the latest cyber threats, tools, and techniques. Assist with the development and execution of simulations, exercises, and training to improve SOC capabilities. Compliance and Regulatory Requirements Ensure compliance with SLAs for all projects. Ensure SOC operations meet industry compliance requirements (e.g., GDPR, HIPAA, PCI DSS). Help in audits and compliance assessments related to security operations. Mentoring and Training Provide mentorship and training to junior SOC analysts (L1 and L2). Share knowledge on advanced attack techniques, response strategies, and threat detection methods. Report deviations and concerns to the SOC Manager Basic Qualifications: B.E/B.Tech in Computer Science, Information Technology, Cybersecurity, or a related field. 5+ year of experience and strong foundational knowledge in security operations, SIEM, or IT security. Basic understanding of cybersecurity concepts, networking fundamentals, and security monitoring. Knowledge of IT infrastructure, networking, and cybersecurity principles. Communicate effectively with customers, teammates, and management Excellent problem-solving skills and attention to detail. Strong communication and interpersonal skills. Preferred Qualifications: Certifications in ECIH/GCIH/CISM/CISSP etc. Splunk Certified candidate Exposure to SIEM solutions, specifically Splunk, Qradar ,DNIF or similar platforms. Familiarity with security tools such as EDR, XDR, WAF, DLP, email security gateways, and proxy solutions. Enthusiasm for learning and a strong interest in cybersecurity as a career. Ability to work in a team and adjust to rotational shifts in a high-stakes environment. Knowledge of cloud security and platforms (e.g., AWS, Azure, GCP)
Posted 4 weeks ago
5.0 - 10.0 years
15 - 18 Lacs
Hyderabad
Work from Office
Urgent Opening for Administrative Officer Position is with One of our Prestigious Client Position: Admistrative Officer Exp: 5-10 Years Location: Hyderabad Package: Best As Per Industry Standards 1. Serves as primary point of contact to data center Management and security personnel when the Site Security Manager is unavailable. 2. Trains and certifies all new security personnel and maintains required training documentation. Coordinates with the Training Manager and with the local supporting Securitas Branches as needed. 3. Ensures all Responders and Control Room Supervisors adhere to policies and Standard Operating Procedures. 4. Acts as Responder or Control Room Supervisor in periods of increased activity or in the case of absent staff. 5. Maintains and troubleshoots on-site security technology. 6. May support other critical infrastructure sites. 7. Recommends corrective actions for security staff to the Site Security Manager. 8. Assists with the delivery of counseling and corrective action as directed by the Site Security Manager. 9. Assists with scheduling, site equipment inspections, and audit compliance. 10. Conducts recurring audits and prepares and submits critical and confidential information directly to client management team. 11. Maintains required security documentation, ensuring accuracy in accordance with established policies and procedures. > The functions listed describe the business purpose of this job. Specific duties or tasks may vary and be documented separately. The employee might not be required to perform all functions listed. Additional duties may be assigned, and functions may be modified, according to business necessity. > All assigned duties or tasks are deemed to be part of the essential functions, unless such duties or tasks are unrelated to the functions listed, in which case they are deemed to be other (non-essential) functions. > Employees are held accountable for successful job performance. Job performance standards may be documented separately, and may include functions, objectives, duties or tasks not specifically listed herein. In performing functions, duties or tasks, employees are required to know and follow safe work practices, and to be aware of company policies and procedures related to job safety, including safety rules and regulations. Employees are required to notify superiors upon becoming aware of unsafe working conditions. > All functions, duties or tasks are to be carried out in an honest, ethical and professional manner, and to be performed in conformance with applicable company policies and procedures. In the event of uncertainty or lack of knowledge of company policies and procedures, employees are required to request clarification or explanations from superiors or authorized company representatives. Interested candidates please share your resume at anshul.bhatia@securitas.in If you are an immediate joiner then please mention "Immediate Joiner" in the subject email while sending your resume
Posted 4 weeks ago
1.0 - 4.0 years
1 - 2 Lacs
Porbandar
Work from Office
Ensure the safety security, responsible for preventing unauthorized access, deterring criminal activity, & maintain a secure environment. Maintain detailed logs of incidents, observations, and surveillance activities, and prepare reports as required.
Posted 4 weeks ago
4.0 - 7.0 years
7 - 11 Lacs
Gurugram
Work from Office
You will contribute as a Managed Security Services (MSS) expert responsible for one of the key functions like Security Governance, Risk & Compliance Management, OMS security infrastructure management, or Security Monitoring & Response Management. You will be part of a team that works independently within a global environment & solve complex problems, and contribute to process improvements. You have: 4-6 years of relevant experience and/or a graduate / postgraduate equivalent degree. Management Experience / Achieved well-advanced skills in a specific professional discipline combining deep knowledge of theory and organizational practice or expertise. Recognized expert in their field (depth & breadth). It would be nice if you also had: Familiarity in security system design, implementation, and performance management. Knowledge to make strategic decisions and mentor senior engineers. Familiarity with complex improvement projects with moderate risk and resources. You will address and resolve highly complex Managed Security Services (MSS) operations performance issues or challenges including through technical leadership of highly skilled teams. You will interpret internal and external Managed Security Services (MSS) and technology challenges and recommend solutions. You will lead the development of innovative practices to improve MSS operations. You will contribute to the design, building, testing, and implementation of security systems within an organizations IT and telecom network. You will be the owner of Performance & Quality Management of Security Operations & Administration and also approve new and/or changes to guidelines and procedures for the function. You will contribute to strategic decisions for not only Managed Services operations, but also MSS business & act as a professional leader for Managed Services operations, mentoring senior Service Operations Engineers. You will contribute to developing the concepts to determine the professional direction of Managed Services delivery operations personnel.
Posted 4 weeks ago
8.0 - 12.0 years
20 - 30 Lacs
Gurugram
Remote
Role and Responsibilities: Provide 1st line support for all Ticketmaster alerts and queries. Perform on-call duty as part of a global team monitoring the availability and performance of the ticketing systems and APIs used by third-party services, as well as the various internal services and systems on which these interfaces depend. Resolve advanced issues and provide advanced troubleshooting for escalations. Provide Subject Matter Expertise to cross-functional teams on threat issues, including strategy, issue troubleshooting, and product & tool requirements. Drive continuous improvements to our products, tools, configurations, APIs and processes by sharing learnings, constructive feedback, and design input with internal technical teams and integrators. Independently learn new technologies and master Ticketmaster ticketing platforms products and services to provide 'full stack' diagnostics to help determine the root cause of issues, and where appropriate help our integrators through their issues. Ensure runbooks, resolution responses, internal processes and integration documentation are up to date and of a high standard suitable for internal stakeholder usage. Work on automation to reduce toil. Required Skills: Experience with bot protection and blocking systems. Experience with any CDN. Experience with WAF. Troubleshooting skills ranging from diagnosing low-level request issues to large scale issues with correlating data between various third-party partners and in-house systems Understanding in Python for operations scripts and text processing. Working knowledge of HTTP protocol and basic web systems, and logging mechanism experience such as Splunk and Kibana/ELK stack. Experience working with a (flexible) 24/7 shift-based team. Strong English language communication skills and the ability to collaborate closely with remote team members. Ability to work with autonomy while ensuring that new knowledge is shared with technology teams.
Posted 4 weeks ago
7.0 - 12.0 years
10 - 20 Lacs
Hyderabad, Chennai
Hybrid
Roles & Responsibilities: We are seeking an experienced Vulnerability Management Engineer to join our Security Operations team. The ideal candidate will be responsible for identifying, tracking, and remediating vulnerabilities across cloud and on-premises environments, while also supporting broader security operations initiatives. Vulnerability Remediation & Patch Management: Work with InfoSec and IT teams to coordinate and track the remediation of vulnerabilities across the organization. Provide hands-on support in implementing and verifying patches for critical vulnerabilities on Windows, Linux, and cloud systems. Coordinate with infrastructure and application teams to validate patch readiness, test deployments, and confirm successful remediation. Ensure timely resolution of high and critical vulnerabilities in line with internal SLAs. Reporting & Compliance: Create and maintain weekly remediation reports outlining prioritization, risk classification, remediation status, and compliance metrics. Develop dashboards, trackers, and compliance summaries using internal tools (e.g., Excel, Power BI, or ServiceNow). Track patch management lifecycle from detection to closure with detailed documentation and metrics. Security Operations Support: Continuously monitor security alerts and events via tools like QRadar SIEM, Palo Alto Cortex XDR, and others to identify indicators of compromise. Investigate and respond to security incidents, including endpoint and email threats, escalating as needed. Tune SIEM rules and threat detection logic to reduce false positives and improve response efficiency. Stay updated on emerging threats, vulnerability disclosures, and zero-day advisories to support proactive mitigation. Policy & Documentation: Maintain detailed documentation of vulnerability management procedures, remediation efforts, patch testing results, and lessons learned. Support compliance initiatives (e.g., ISO 27001, HIPAA, GDPR) by ensuring vulnerability data and remediation timelines meet audit requirements. Qualifications: Experience : 6+ years in a Security Operations or Vulnerability Management role. Education : Bachelor's degree in Computer Science, Information Security, or a related field. Certifications (preferred): CISSP, CEH, CISM, CompTIA Security+, or equivalent. Technical Skills : Experience with tools like IBM QRadar, Palo Alto Cortex XDR, Qualys/Tenable/Nessus. Familiarity with cloud security in Azure and Microsoft 365. Strong understanding of patch management, CVSS scoring, and vulnerability lifecycle. Soft Skills : Strong analytical and communication skills. Ability to work cross-functionally with IT and infrastructure teams. Adaptability to changing threat environments and security priorities. Nice to Have: Experience building Power BI dashboards or using reporting tools to visualize patch status. Familiarity with ServiceNow or other ITSM platforms for tracking remediation tasks.
Posted 4 weeks ago
3.0 - 5.0 years
5 - 8 Lacs
Mumbai
Work from Office
Core Responsibilities Managing multiple shifts of Security Operations Centre Managers performing security event monitoring and incident identification for 247 Security Operations Centre Provide tactical and strategic direction for the Security Operations Centre staff, program development & maturity roadmap To validate the Incidents reported by SOC operators. To escalate timely when the SLA for alerting is not met. To identify the incidents if there are any missed by SOC operators To interact with external parties to resolve the queries relating to the raised incidents. To manage the SIEM, incidents knowledge base. To generate the daily reports, weekly reports and monthly reports on time. To maintain the timely delivery of reports. To maintain the updated and latest log baselines. The security analyst monitors security events from the various SOC entry channels (SIEM, Tickets, Email and Phone), based on the security event severity, escalate to managed service support teams, tier2information security specialist, and/or customer as appropriate to perform further investigation and resolution. Recommend enhancements to SOC security process, procedures and policies. Participate in security incident management and vulnerability management processes. Participate in evaluating, recommending, implementing, and troubleshooting security solutions and evaluating IT security of the new IT Infrastructure systems. Works as part of a team to ensure that corporate data and technology platform components are safeguarded from known threats Communicate effectively with customers, teammates, and management Provide input on tuning and optimization of security systems Follow ITIL practices regarding incident, problem and change management Document and maintain customer build documents, security procedures and processes. Staying up-to-date with emerging security threats including applicable regulatory security requirements. Other responsibilities and additional duties as assigned by the security management team Qualifications Ideal candidates will have as much of the following High-level understanding of TCP/IP protocol and OSI Seven Layer Model. Knowledge of security best practices and concepts. Knowledge of Windows and/or Unix-based systems/architectures and related security. Intermediate level of knowledge of LAN/WAN technologies. Must have a solid understanding of information technology and information security. Certification in at least one industry-leading SIEM product. Preferred Information Security professional designations such as CISSP, CISM, CISA 3-5 years previous Security Operations Centre Experience in conducting security investigations Detail oriented with strong organizational and analytical skills Strong written communication skills and presentation skills Self-starter, critical and strategic thinker, negotiator and consensus builder Good knowledge of IT including multiple operating systems and system administration skills (Windows, Linux) Basic knowledge of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise Anti-Virus products Strong understanding of security incident management, malware management and vulnerability management processes Security monitoring experience with any SIEM technologies and intrusion detection technologies Experience with web content filtering technology -policy engineering and troubleshooting Strong understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP A Bachelors Degree / Diploma in a relevant area of study with a preference for Information Security, Computer Science or Computer Engineering Excellent English written and verbal skills. Shift work required After-hours availability required
Posted 4 weeks ago
5.0 - 10.0 years
15 - 27 Lacs
Bengaluru
Hybrid
Client: Simeio Job Location: Bangalore, Experience Required: 5+ years Mode of Work: Hybrid Job Title: Service Now Developer Primarily, we are looking for one resource with the following skill set: 5 plus years of ServiceNow platform development experience 2 plus years of Experience in the SecOps, Knowledge on other modules is a plus ( ITSM, CSM, ITBM, Custom Applications, Employee Service Center Portal and UI Builder) 2 plus years of experience with at least 1 scripting language such as JavaScript or AngularJS 1 plus years of experience working within an Agile development framework. Hands-on experience developing applications in the ServiceNow Service portal framework. Hands-on experience with AngularJS, Service Portal widgets, and pages Advanced level experience with ServiceNow primary toolset: Service portal Business rules Client scripts Script includes Script actions/events Import sets Export sets Asynchronous transformation Scripted REST Please fill in all the essential details below & attach your updated resume & send it to Ralish.sharma@compunnel.com 1. Total Experience: 2. Relevant Experience in Service Now Development : 3. Experience in Security OPS : 4. Experience in JavaScript/Angular( Anyone) : 5. Experience in Agile Development : 6. Experience in the Service Now portal Framework : 7. Experience in any Service portal, Business rules/Client scripts/Script includes/Script actions/events/Import sets/Export sets/Asynchronous transformation/Scripted REST: (Anytwo) 8. Current company : 9. Current Designation : 10. Highest Education : 11. Notice Period: 12. Current CTC: 13. Expected CTC: 14. Current Location: 15. Preferred Location: 16. Hometown: 17. Contact No: 18. If you have any offer from some other company, please mention the Offer amount and Offer Location: 19. Reason for looking for change: If the job description is suitable for you, please get in touch with me at the number below: 9910044363 .
Posted 4 weeks ago
1.0 - 6.0 years
0 - 3 Lacs
Ahmedabad
Work from Office
Responsibilities: Conduct security training & monitoring Ensure compliance with policies & procedures Hire & Manage physical security at sites Protect assets through industrial measures Maintain attendance records and responsible for end to end decision making after having word of mouth with top management.
Posted 1 month ago
7.0 - 12.0 years
22 - 25 Lacs
Chandigarh, Bangalore Rural, Bengaluru
Work from Office
Security Service Operations,IT Security Technologies,CISSP, CISM, CRISC, CISA,SIEM, EDR, Email Security Gateways, Vulnerability Management Software, Firewalls,security systems, user authentication and management
Posted 1 month ago
4.0 - 9.0 years
6 - 11 Lacs
Mumbai
Work from Office
We are seeking a Security and Loss Prevention Specialist to strengthen our delivery network operations in Mumbai. This role will execute security initiatives through proactive and reactive measures to protect assets and mitigate risks. The specialist will conduct regular audits, monitor processes, and implement preventive controls through systematic risk assessment. Key responsibilities include conducting detailed investigations into financial irregularities, coordinating with legal teams for enforcement actions, and implementing corrective measures. The role involves regular reporting of findings and driving process improvements. This position requires significant field presence with regular travel within the assigned region and ability to work flexible hours Basic Qualifications: - Bachelors degree or equivalent through experience - 4+ years of experience in Security, Loss Prevention, Shrinkage, Asset Protection, or Investigations - 3-5 years of experience in law enforcement or security and loss prevention profession - Demonstrated experience in security auditing and investigations - Up-to-date knowledge of security equipment and technology - Experience in coordinating security investigations of complex nature - Strong understanding of information security processes and systems - Previous experience in MNC environment - Proven track record of stakeholder management - Strong documentation and reporting skills Preferred Qualifications: - Professional certification in Security Management or related field - Experience in e-commerce or logistics security operations - Advanced knowledge of investigation techniques and protocols - Strong background in cash handling process controls - Experience in conducting training programs - Proficiency in data analysis and reporting tools - Regional language proficiency based on location - Experience in process improvement initiatives - Knowledge of digital payment systems and associated risks - Understanding of retail/logistics operational dynamics - Experience in implementing preventive control measures - Track record of successful investigation closures - Understanding of legal frameworks related to financial fraud - Bachelors degree or equivalent through experience - Minimum 4 years of experience in Security, Loss Prevention, Shrinkage, Asset Protection, or Investigations - 3-5 years of experience in law enforcement or security and loss prevention profession - Demonstrated experience in security auditing and investigations - Up-to-date knowledge of security equipment and technology - Experience in coordinating security investigations of complex nature - Strong understanding of information security processes and systems - Previous experience in MNC environment - Proven track record of stakeholder management - Professional certification in Security Management or related field - Experience in e-commerce or logistics security operations - Advanced knowledge of investigation techniques and protocols - Strong background in cash handling process controls - Experience in conducting training programs - Proficiency in data analysis and reporting tools - Regional language proficiency based on location - Experience in process improvement initiatives - Knowledge of digital payment systems and associated risks - Understanding of retail/logistics operational dynamics - Experience in implementing preventive control measures - Track record of successful investigation closures - Understanding of legal frameworks related to financial fraud
Posted 1 month ago
2.0 - 5.0 years
2 - 6 Lacs
Hyderabad
Work from Office
170+ Years Strong. Industry Leader. Global Impact. At Pinkerton, the mission is to protect our clients. To do this, we provide enterprise risk management services and programs specifically designed for each client. Pinkerton employees are one of our most important assets and critical to the delivery of world-class solutions. Bonded together, we share a commitment to integrity, vigilance, and excellence. Pinkerton is an inclusive employer who seeks candidates with diverse backgrounds, experiences, and perspectives to join our family of industry subject matter experts. The Assistant Site Security Manager, assigned to one of Pinkertons largest global clients, will provide operational support in the application of physical security operations at the clients campus to ensure a safe working environment and support the organizations core business objectives. Responsibilities Represent Pinkerton s core values of integrity, vigilance, and excellence. Provide operational support in the application of physical security operations to ensure a safe working environment. Assist in the evaluation, development, and implementation of regional security strategies. Implement site security plans, security assessments, site specific risk/threat analysis and training awareness programs with the assistance of law enforcement agencies. Support the regional internal communication program. Liaise with government, consular and private sector agencies to enhance security operations. Provide support to Security Manager regarding contingency planning, risk/threat assessments, and the maintenance of effective networks across all business groups. Assist with the intelligence gathering process regarding the protection against high security threats, emergencies, and contingencies. Assist with the Building Emergency Reaction Readiness Program through the collaboration with key stakeholders. Support the creation and review of regional level strategic relocation planning. Preserve the business infrastructure at local and region level through the implementation of strategic business objectives. Provide multi-level communication between the business units in cooperation with individuals, teams, and vendors. Conduct periodic review sessions with vendors to achieve quality service delivery provision by suppliers and vendors. Manage and direct all security staff and daily on-site security operations and ensure correct and continuous business operations. Assist in the development of internal and external service optimization. Respond immediately to all security incidents and emergencies, as dictated by policy. Provide operational support to the Regional Security Manager during incidents and emergencies. Act as the global security representative during initial stages, as dictated by policy. Support established systems including but not limited to; access control, system trouble shooting, and access card management. Coordinate security support for both internal/external events. All other duties, as assigned. Qualifications Bachelors degree preferred with at least Three years of corporate security operations experience. Able to carry out responsibilities with little or no supervision. Effective written, verbal, and presentation skills. Able to multi-task and organize workload for effective implementation. Client orientated and results driven. Able to interact effectively at all levels and across diverse cultures. Able to prioritize duties and responsibilities in accordance with level of importance. Able to adapt as the external environment and organization evolves. Computer skills; Microsoft Office. Working Conditions: With or without reasonable accommodation, requires the physical and mental capacity to effectively perform all essential functions; Regular computer usage. Occasional reaching and lifting of small objects and operating office equipment. Frequent sitting, standing, and/or walking. Travel, as required. Pinkerton is an equal opportunity employer to all applicants and positions without regard to race/ethnicity, color, national origin, ancestry, sex/gender, gender identity/expression, sexual orientation, marital/prenatal status, pregnancy/childbirth or related conditions, religion, creed, age, disability, genetic information, veteran status, or any protected status by local, state, federal or country-specific law.
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
19947 Jobs | Dublin
Wipro
9475 Jobs | Bengaluru
EY
7894 Jobs | London
Accenture in India
6317 Jobs | Dublin 2
Amazon
6141 Jobs | Seattle,WA
Uplers
6077 Jobs | Ahmedabad
Oracle
5820 Jobs | Redwood City
IBM
5736 Jobs | Armonk
Tata Consultancy Services
3644 Jobs | Thane
Capgemini
3598 Jobs | Paris,France