Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 10.0 years
3 - 4 Lacs
Pune
Work from Office
Handling All Operations Related work for Our Pune Locations Sites.
Posted 3 weeks ago
12.0 - 20.0 years
18 - 30 Lacs
Lucknow
Work from Office
"Candidates who are interested may send their resumes to anurag.awasthi@medanta.org or WhatsApp them to 9717644942." Role & responsibilities eadership Development and training programs for the subordinate. Have positive attitude and leading spirit. Ability to handle stress. Honest and loyal to the organization. Security MIS management. Security Management To ensure enforcement of policies introduced for safety of staff /vendors / VIP / patients / visitors etc. Negotiations with vendors management for security. To carry out investigations Organize the training of security staff / employees Investigation, enquiring and audits. Access control. Prepare SOP for security department. Prepare & implement emergency response mechanism. Functioning of Surveillance and vigilance system. Obtain various intelligence inputs and share with management. Identify and eradication safety risk to the organization. Liaison and Coordination Liaison with police department and other government officials. Coordination with other HODs Preferred candidate profile Preference - Candidates having Helathcare expereince will have an added advantage Experience Range 12 20 yrs. Location – Medanta Hospital – Lucknow Working Days – 6 days a week
Posted 3 weeks ago
0.0 - 2.0 years
2 - 6 Lacs
Mumbai
Work from Office
":" Job Title: L1 SOC Analyst LogRhythm SIEM Location: Mumbai, India Employment Type: Full-Time | Onsite About the Role: We are seeking a proactive and dedicated L1 SOC Analyst to join our Security Operations Center in Mumbai. The analyst will be the first line of defense, responsible for monitoring, triaging, and escalating security alerts using LogRhythm SIEM. This is an excellent opportunity for candidates looking to build a strong career in cybersecurity operations. Key Responsibilities: - Monitor security events and alerts through LogRhythm SIEM console - Perform initial analysis, classification, and triage of security incidents - Escalate genuine security incidents to L2 SOC team following defined procedures - Maintain incident logs, documentation, and shift handover reports - Support incident investigations by collecting relevant logs and evidence - Monitor health of SIEM log sources and report issues proactively - Follow SOC playbooks and response procedures with high attention to detail - Participate in shift-based operations (24x7 rotational shifts) Key Skills & Competencies: - 0.6 to 2 years of experience in SOC or cybersecurity monitoring role - Hands-on exposure to LogRhythm SIEM - Knowledge of security event types, log analysis, and basic networking concepts - Understanding of common security threats, malware, phishing, brute force, etc. - Good communication skills both written and verbal - Ability to work effectively under pressure and as part of a team Preferred Qualifications: - BachelorDegree in Information Security, Computer Science, or related field - LogRhythm Certificationsoptional but desirable - Security certifications like CompTIA Security+, CEH an added advantage ","
Posted 3 weeks ago
2.0 - 5.0 years
3 - 7 Lacs
Mumbai
Work from Office
":" Job Title: L2 SOC Analyst LogRhythm SIEM Location: Mumbai, India Employment Type: Full-Time | Onsite About the Role: We are looking for an experienced L2 SOC Analyst to strengthen our Security Operations Center in Mumbai. The ideal candidate will have 2 to 5 years of hands-on experience in security monitoring and incident analysis, particularly on LogRhythm SIEM. You will be responsible for in-depth analysis, incident investigation, escalation, and coordination with response teams. Key Responsibilities: - Monitor, analyze, and triage security alerts from LogRhythm SIEM and other security platforms - Investigate and validate security incidents with detailed analysis and impact assessment - Conduct threat hunting and advanced log correlation as per SOC playbooks - Respond to incidents as per defined escalation matrix and coordinate with internal/external teams - Perform root cause analysis, recommend containment and mitigation actions - Provide guidance and mentorship to L1 SOC Analysts for escalated incidents - Prepare incident reports, analysis summaries, and dashboards for management - Monitor and report SIEM health, log source integration issues, and tuning requirements - Participate in continuous improvement of detection rules and SOC processes - Work in 24x7 rotational shifts with readiness for critical incident handling Required Skills & Competencies: - 2 to 5 years of SOC operations experience, with a focus on SIEM monitoring and incident handling - Strong hands-on experience with LogRhythm SIEM (Mandatory) - Good understanding of security threats, attack vectors, malware behavior, and common vulnerabilities - Practical experience in analyzing logs from firewalls, IDS/IPS, endpoint security, and cloud platforms - Familiarity with MITRE ATT&CK framework and threat intelligence usage - Strong analytical thinking, incident response capabilities, and problem-solving skills - Good communication skills for incident reporting and escalation Preferred Certifications: - LogRhythm Certified Deployment Engineer (LCDE) or LogRhythm Certified SOC Analyst (LCSA) - Optional - CompTIA Security+, CEH, CySA+, or equivalent security certifications - Any threat hunting or incident response certification is a plus Work Mode: Onsite Mumbai SOC Facility Shift: 24x7 Rotational Shifts (Including Nights and Weekends) ","
Posted 3 weeks ago
15.0 - 20.0 years
13 - 17 Lacs
Gurugram
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Infrastructure Security Vulnerability Management Operations Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :Create asset list and prioritize assets, conduct regular vulnerability assessments based on the Tenable tool, identify security weaknesses in systems and applications, work with peer teams till closure of the Vulns, track patching as per proposed timelines. Roles & Responsibilities:- Create correct asset list-Perform Vuln assessment-Relevant request to be raised thorough SNow.-Highlighting issues with the Scanned report to Product team and resolve it immediately. If issue not getting resolved, then escalate it to right stakeholder.-Analyse scan results and generate comprehensive reports detailing vulnerabilities, potential impacts, and remediation recommendations/Action plan with dates.-Collaborate with IT, Partner, Business and Security teams to prioritize and address identified vulnerabilities based on risk assessments and business impact.-Monitor and track remediation efforts on weekly / monthly basis to ensure vulnerabilities are resolved within defined timelines.-Maintain and update documentation related to vulnerability management processes, policies, and procedures.-Stay current with industry trends, threats, and vulnerabilities to provide informed recommendations and enhancements to the policies, and procedures Professional & Technical Skills: -Familiarity with vulnerability scanning tools, particularly Tenable and Snow.-Understanding of security frameworks and standards (e.g., NIST, ISO 27001).-Strong analytical and problem-solving skills with attention to detail.-Relevant certifications (e.g., Vulnerability Management, Certified Ethical Hacker (CEH), or similar) are a plus.-To succeed in this role, you should have the following skills and experience-Experience in vulnerability management or security operations. Additional Information:- The candidate should have minimum 5 years of experience in Infrastructure Security Vulnerability Management Operations.- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
1.0 - 3.0 years
1 - 4 Lacs
Bengaluru
Work from Office
About Us Eagle Eye Networks is the global leader in cloud video surveillance, delivering cyber-secure, cloud-based video with artificial intelligence (AI) and analytics to make businesses more efficient and the world a safer place. The Eagle Eye Cloud VMS (video management system) is the only platform robust and flexible enough to power the future of video surveillance and intelligence. Eagle Eye is based in Austin, Texas, with offices in Amsterdam, Bangalore, and Tokyo. Eagle Eye Networks is a dynamic, fast-moving company. We value the benefits of face-to-face collaboration, and we believe it is more enjoyable and productive. The synergy of in-office interaction is critical to our culture and your presence is essential for Eagle Eye Networks success. Summary As an Inside Sales Professional at Eagle Eye Networks, you will play a pivotal role in driving revenue growth and expanding our customer base through acquisition of resellers and technology partners. Together with our Regional Sales Managers, you will be responsible for identifying and pursuing new business opportunities, as well as nurturing and expanding relationships with existing customers. Operating from our Bangalore office, your primary focus will be on selling our cloud-based video surveillance solutions to businesses across various industries. Responsibilities Achieve Sales Targets and Ensure Profitable Sustainable Revenue Growth: Build and maintain strong relationships with end-users and resellers to ensure customer satisfaction and maximize retention Present and demonstrate the features and benefits of Eagle Eye Networks video surveillance solutions to prospective end-users and resellers Collaborate with Regional Sales Managers to develop and execute sales strategies and achieve revenue targets through pipeline review analysis. Identify, qualify and convert leads into deals to generate hardware and recurring revenue using sales model of control Answer inbound/outbound calls, chats, and emails from end users and resellers with inquiries about Eagle Eye Networks Products and Services Stay updated on industry trends and competitors offerings to effectively position Eagle Eye Networks products and services Hand off and track internal and external generated leads to the sales team. Support resellers with design requests for projects utilizing Eagle Eye Cloud VMS. Maintain a clean dashboard within Zoho CRM including data such as tasks, leads, accounts, and deals As necessary, assist in the delivery of Sales Training and other reseller onboarding tasks Experience Minimum 1-3 years quota carrying sales experience, preferably in SaaS or information technology Ability to understand customer needs and effectively present and demonstrate solutions Consultative/solutions sales with 90+ day B2B sales cycles Excellent communication skills, both verbal and written Demonstrate self-confidence, energy, and enthusiasm in a professional manner Present ideas, expectations, and information in a concise, well-organized way Self-driven with a competitive results-oriented mindset. Ability to work independently or as part of a team Proven experience in inside sales or a similar role, preferably in the technology or security industry More About Eagle Eye Networks Eagle Eye Networks is leveraging artificial intelligence on its true cloud platform to dramatically reshape the video surveillance and security industry. The Eagle Eye Cloud Video Management System (VMS) is a smart cloud video surveillance solution, purpose-built to help businesses improve safety, security, operations, and customer service. Tens of thousands of companies in more than 90 countries around the globe have moved their video surveillance to the cloud with Eagle Eye VMS. Customers, including multi-family residences, smart cities, schools, hospitals, hotels, logistics, restaurants, and retail shops trust Eagle Eye for actionable business intelligence and proactive security across multiple locations. The Eagle Eye VMS has strong APIs for the secure integration of third-party systems and works with thousands of industry cameras, so customers don t have to rip and replace their existing infrastructure. Eagle Eye Cloud VMS is the only platform robust enough to power the future of video surveillance. Eagle Eye Networks is an equal employment opportunity employer and values diversity. Qualified candidates are considered for employment without regard to race, religion, gender, gender identity, sexual orientation, national origin, age, military or veteran status, disability, or any other characteristic protected by applicable law.
Posted 3 weeks ago
6.0 - 12.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Position: Cloud Security Architect Experience: 6-12 Years 1 Lead and manage Hybrid Cloud security operations, providing guidance and direction to ensure operational excellence. 2 Oversee security incident response and mitigation efforts, ensuring quick and efficient handling of security breaches or threats. 3 Develop and implement comprehensive security strategies to safeguard all hybrid Cloud systems. 4 Facilitate incident management processes for security-related issues, ensuring timely resolution and minimization of impact. 5 Conduct regular security assessments and audits to identify vulnerabilities and implement corrective measures. 6 Collaborate with stakeholders to develop security roadmaps and participate in daily standups to align security initiatives with organizational goals. 7 Lead change management processes and ITSM, ensuring security protocols are integrated and adhered to. 8 Foster a culture of continuous improvement in network security operations, including process creation and implementation. 9 Demonstrate a deep understanding of security principles, particularly in isolating issues with machine/user validation. 10 Experience in managing Business Continuity and Crisis Management. 11 Ensuring the security of cloud-based data and applications against unauthorized access, theft, and other threats. 12 Staying up-to-date on the latest cloud security technologies, trends, and best practices. Key Skills and Knowledge Areas: - Strong understanding of cloud computing technologies, including: - Infrastructure as a Service (IaaS) - Platform as a Service (PaaS) - Software as a Service (SaaS) - Knowledge of security frameworks such as: - ISO 27001 - NIST Cybersecurity Framework - CIS Controls - Familiarity with cloud platforms: - Microsoft Azure - Amazon Web Services (AWS) - Google Cloud Platform (GCP) - Preferred certifications: - Certified Cloud Security Professional (CCSP) - Certified Information Systems Security Professional (CISSP) - Certified Cloud Architect (CCA) - Experience in developing Cloud Security Frameworks using industry best practices such as: - Cloud Security Alliance (CSA) - NIST CSF - Regulatory requirements like HIPAA, HITRUST, PCI - Understanding of industry regulatory and compliance requirements: - FedRAMP - PCI-DSS - NIST - HIPAA - Skilled at interpreting compliance and security requirements into implementable and repeatable controls.
Posted 3 weeks ago
15.0 - 20.0 years
13 - 17 Lacs
Pune
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Endpoint Extended Detection and Response Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for a motivated and skilled Endpoint Security Engineer with 3 plus years of experience in managing and securing endpoints using Microsoft Defender for Endpoint, Symantec Endpoint Protection, and DLP solutions. The ideal candidate will play a critical role in enhancing the security posture of our endpoints across the enterprise. Roles & Responsibilities:- Configure, manage, and monitor Microsoft Defender for Endpoint and Symantec Endpoint Protection.- Implement, manage, and tune Data Loss Prevention (DLP) policies and rules across endpoints and email gateways.- Investigate, analyze, and respond to security alerts and endpoint incidents.- Coordinate with SOC and IT teams for triage and remediation of malware, ransomware, and other endpoint-based threats.- Conduct endpoint vulnerability assessments and patch validation in coordination with vulnerability management teams.- Maintain endpoint protection baselines and enforce policy compliance across user devices.- Generate reports on endpoint protection status, incident trends, and DLP violations.- Ensure continuous improvement of endpoint threat detection and response processes.- Participate in root cause analysis (RCA) of endpoint-related security events. Professional & Technical Skills: -Strong knowledge and hands-on experience with:-Microsoft Defender for Endpoint / Microsoft 365 Defender-Symantec Endpoint Protection (SEP)-DLP solutions (Microsoft Purview DLP, Symantec DLP, or equivalent)-Understanding of endpoint threat vectors, malware, and mitigation techniques.-Familiarity with SIEM tools and EDR workflows.-Basic scripting knowledge (PowerShell, Python, or batch scripting) for automation and investigation tasks.-Strong troubleshooting skills related to endpoint protection agents and policies. Additional Information:- The candidate should have minimum 2 years of experience in Endpoint Extended Detection and Response.- This position is based at our Pune office.- A 15 years full time education is required. Bachelors degree in Cybersecurity, Computer Science, Information Technology, or a related field Preferred certifications:Microsoft SC-200 (Microsoft Security Operations Analyst) ,Symantec Endpoint Protection certification (if available) and CompTIA Security plus. Qualification 15 years full time education
Posted 3 weeks ago
8.0 - 13.0 years
4 - 8 Lacs
Bengaluru
Work from Office
Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Operational Technology (OT) Security Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary Skilled and detail-oriented IT/OT Security Engineer with hands-on experience in Armis for asset visibility and risk management across IT and Operational Technology environments. The ideal candidate will also have expertise in ServiceNow ITSM for incidents, problems, and change management processes.This role is critical for ensuring security and operational resilience across both enterprise and industrial networks, supporting continuous monitoring, risk analysis, and workflow automation. You will work closely with IT, OT, and security teams to ensure accurate asset inventory, threat detection, and efficient incident resolution.Key Responsibilities:IT/OT Security (Armis):Deploy, configure, and manage the Armis platform for complete visibility of IT/OT/IoT devices.Monitor device behavior, identify threats, and respond to anomalies in real time.Integrate Armis with SIEM and other security tools to enhance detection and response capabilities.Collaborate with OT/ICS teams to ensure non-intrusive visibility into critical infrastructure.Conduct asset risk assessments and report on vulnerable or non-compliant devices.ServiceNow ITSM:Utilize ServiceNow ITSM for ticket management (Incidents, Problems, Changes).Automate workflows and ensure timely resolution and proper escalation of security incidents.Integrate asset and threat data from Armis into ServiceNow for centralized incident management.Support audits and compliance efforts related to IT/OT security (e.g., NIST, ISO, NERC CIP). Professional & Technical Skills: Platform Health & Incident Management:Real-time monitoring of OT platform infrastructure, incident triage and investigation, patching, upgrades, and configuration/backup lifecycle management.Vulnerability & Asset Reporting:Monthly vulnerability assessments and reporting using Armis; asset enrichment, validation, and reporting in alignment with enterprise standards.Policy & Alert Management:Policy and rule maintenance, alert fine-tuning based on SOC feedback, and continuous baseline updates to reflect known good changes across ELC sites.Security Event Triage:Support for security incident enrichment, alert prioritization, and collaboration with SOC and ELC teams to suppress noise and escalate meaningful events.Vendor & Lifecycle Coordination:Vendor engagement for RMA, feature requests, and escalated troubleshooting; coordination of platform lifecycle activities and tool enhancements.Tools & Platforms:Armis (OT visibility and asset intelligence).Good-to-Have Skills: Experience with security policy governance and compliance frameworks.Roles and ResponsibilitiesPlatform Support:Monitor the health of OT platform infrastructure and ensure high availability.Lead incident management and root cause investigations.Oversee patch management and platform upgrades.Manage configuration backups and restoration processes.Coordinate with vendors for RMA, feature enhancements, and troubleshooting.Vulnerability Reporting:Generate and deliver monthly vulnerability assessment reports using Armis in the agreed format.Track and report remediation progress and risk posture improvements.Asset Management:Enrich asset metadata and validate asset inventory with client stakeholders.Provide accurate and timely asset reports for compliance and operational use.Policy Management:Maintain and update platform security policies and rules.Fine-tune security alerts based on SOC feedback and operational insights.Continuously update baselines to reflect known good changes at client stake holders sites.Security Incident Management:Support alert enrichment by providing contextual data from Armis.Partner with client stake holders and SOC teams to triage, tune, and respond to alerts.Deprioritize noisy alarms and escalate meaningful security events.Primary SkillOT Platform Security Operations with ArmisExperience8+ years of experience in cybersecurity or infrastructure operations, with at least 3 years in a Specialist role focused on OT platform support and security.Demonstrated expertise in Armis for asset visibility, vulnerability reporting, and alert enrichment in OT environments.Strong background in incident management, patching, configuration backup, and vendor coordination.Ability to stay current with emerging OT threats, security technologies, and industry best practices Educational QualificationBachelors degree in computer science, Information Security, or related field. Vendor Training, certifications or badges like Armis Cyber Defense Core Qualification 15 years full time education
Posted 3 weeks ago
8.0 - 13.0 years
4 - 8 Lacs
Bengaluru
Work from Office
Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Managed Cloud Security Services Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary We are seeking a highly experienced and technically proficient Cloud Security Specialist to lead and advise on the implementation, optimization, and governance of cloud security solutions across Microsoft CASB and CSPM platforms. The ideal candidate will bring deep expertise in cloud security architecture, policy management, and incident response across AWS, Azure, and GCP environments. This role is critical in ensuring the organizations cloud infrastructure remains secure, compliant, and resilient.Roles and ResponsibilitiesCloud Access Security Broker Microsoft CASB:Provide subject matter expertise in the deployment and optimization of Microsoft CASB.Lead continuous and real-time monitoring to detect and mitigate malicious activity across cloud services.Oversee the development and refinement of built-in policies and templates.Manage configuration and policy lifecycle:additions, updates, and deletions.Support and guide security incident investigations using CASB insights and telemetry.Cloud Security Posture Management (CSPM):Continuously assess and monitor cloud assets in AWS, Azure, and GCP for misconfigurations and non-standard deployments using Divy Cloud.Define and enforce mandatory security policies for newly released cloud services.Maintain and evolve cloud compliance policies in alignment with enterprise security requirements.Analyze and prioritize alerts and incidents related to cloud workloads; guide resolution strategies.Manage the full lifecycle of cloud security incidents, including escalation and root cause analysis.Generate and present executive-level and technical reports on vulnerabilities and compliance posture.Govern RBAC policies and oversee cloud role entitlements across platforms.Maintain cloud network security policies and ensure alignment with architectural standards.Provide expert remediation guidance to DevOps and development teams, promoting secure-by-design practices.Deliver regular reporting and insights on cloud security posture and trends.Primary SkillCloud Security Architecture and Operations CASBExperience8+ years of experience in cybersecurity, including substantial hands-on expertise in cloud security as a Specialist or in an advisory capacity.Demonstrated ability to lead cross-functional initiatives and influence cloud security posture across large-scale environments.Strong analytical and communication skills with the ability to translate technical risks into business impact. Educational QualificationBachelors degree in computer science, Information Security, or related field (masters preferred).Industry certifications are strongly preferred:CCSP / CISM or other relevant cloud and security certifications.Security certifications such as AWS/Azure Security Specialty or Microsoft Defender for Cloud Apps. Professional & Technical SkillsCASB (Cloud Access Security Broker):Real-time threat monitoring, policy lifecycle management, incident triage and investigation using Microsoft CASB.Cloud Security Posture Management (CSPM):Continuous assessment of multi-cloud environments (Azure, AWS, Ali Cloud) for misconfigurations and compliance gaps using DivvyCloud; enforcement of cloud security policies and RBAC governance.Cloud Security Operations:Alert triage, incident lifecycle management, and remediation support for DevOps teams; generation of executive-level vulnerability and compliance reports.Cloud Network & Identity Security:Role-based access control (RBAC) policy management, cloud network segmentation, and enforcement of security baselines across cloud platforms.Tools & Platforms:Microsoft CASB, Divy Cloud, Tripwire, Azure, AWS, Ali Cloud.Must-Have Skills: Real-time monitoring of user activity in CASB and data movement in cloud apps.Policy enforcement for data loss prevention (DLP), access control, and threat protection.Integration with Microsoft Defender and other security tools for incident response.Continuous assessment of cloud resources for misconfigurations using Divvy Cloud.Automated remediation workflows and policy enforcement.Role-based access control (RBAC) and cloud network security management.Generating compliance and vulnerability reports for audits and executive review.Networking, encryption, and logging best practices.Good-to-Have Skills: Experience with containers and Kubernetes securityFamiliarity with Infrastructure as Code (IaC) securityCloud-native security tools (e.g., AWS Config, Azure Policy, GCP Security Command Center). Qualification 15 years full time education
Posted 3 weeks ago
7.0 - 12.0 years
12 - 16 Lacs
Bengaluru
Work from Office
Role: Security Engineering Lead Standard Title: Manager I, Security Engineering Location: Bangalore, India About Us Founded in 2014, Circles is a global technology company reimagining the telco industry with its innovative SaaS platform, empowering telco operators worldwide to effortlessly launch innovative digital brands or refresh existing ones, accelerating their transformation into techcos. Today, Circles partners with leading telco operators across multiple countries and continents, including KDDI Corporation, Etisalat Group (e&), AT&T, and Telkomsel, creating blueprints for future telco and digital experiences enjoyed by millions of consumers globally. Besides its SaaS business, Circles operates three other distinct businesses: Circles.Life : A wholly-owned digital lifestyle telco brand based in Singapore, Circles.Life is powered by Circles SaaS platform and pioneering go-to-market strategies. It is the digital market leader in Singapore and has won numerous awards for marketing, customer service, and innovative product offerings beyond connectivity. Circles Aspire : A global provider of Communications Platform-as-a-Service (CPaaS) solutions. Its cloud-based Experience Cloud platform enables enterprises, service providers and developers to deliver and scale mobile, messaging, IoT, and connectivity services worldwide. Jetpac : Specializing in travel tech solutions, Jetpac provides seamless eSIM roaming for over 200 destinations and innovative travel lifestyle products, redefining connectivity for digital travelers. Jetpac was awarded Travel eSIM of the Year. Circles is backed by renowned global investors, including Peak XV Partners (formerly Sequoia), Warburg Pincus, Founders Fund, and EDBI (the investment arm of the Singapore Economic Development Board), with a track record of backing industry challengers. About This Role As a Manager I of security operations and vulnerability management , you will be given a unique opportunity to drive security maturity across Circles live markets environments. You will be responsible for working on: Drive standardization of security best practices to improve the security program maturity across Circles live markets. Prepare and deliver regular reports on overall security program maturity, incident status, and vulnerability management activities to senior management. Ensure adherence to internal security policies, industry standards, and regulatory requirements. Lead the vulnerability management team to ensure adherence to continuous vulnerability assessment processes. Drive strategies to automate and improve efficiencies of the team. Conduct regular risk assessments and vulnerability assessments. Identify potential threats and weaknesses, and work with the operations teams to develop strategies to mitigate risks to the organization. Track the latest threats and vulnerabilities (CVE) in the industry. Quickly analyze if it affects the Circles infrastructure and work with the operations teams to remediate the vulnerability. Maintain detailed and accurate documentation of security incidents and vulnerability management processes. Ensure documentation is updated and accessible for review and audits. Manage the vulnerability assessment process, including scanning, identification, and prioritization of security vulnerabilities. Collaborate closely with Engineering, SRE, IT and other relevant departments to remediate vulnerabilities and track resolution progress. What are we looking for Minimum of 7+ years of experience in security operations, vulnerability management, or a related field, with at least 2 years in a supervisory role. Solid understanding of security operations and vulnerability management principles. Proficiency in security technologies, tools, and methodologies (e.g., SIEM, vulnerability scanners, CSPM, CVE analysis, Kubernetes security) Strong stakeholder management skills Excellent communication and interpersonal skills. Ability to work effectively under pressure and manage multiple priorities. Detail-oriented with strong organizational skills. Proven leadership and team management capabilities. High level of integrity and commitment to security best practices. Security certifications CISSP, CISM, CCSP etc will be good but not a requirement To all recruitment agencies: Circles will only acknowledge resumes shared by recruitment agencies if selected in our preferred supplier partnership program. Please do not forward resumes to our jobs alias, Circles employees or any other company location. Circles will not be held accountable for any fees related to unsolicited resumes not uploaded via our ATS. Circles is committed to a diverse and inclusive workplace. We are an equal opportunity employer and do not discriminate on the basis of race, national origin, gender, disability or age.
Posted 3 weeks ago
7.0 - 12.0 years
12 - 16 Lacs
Bengaluru
Work from Office
Role: Security Engineering Lead Standard Title: Manager I, Security Engineering Location: Bangalore, India About Us Founded in 2014, Circles is a global technology company reimagining the telco industry with its innovative SaaS platform, empowering telco operators worldwide to effortlessly launch innovative digital brands or refresh existing ones, accelerating their transformation into techcos. Today, Circles partners with leading telco operators across multiple countries and continents, including KDDI Corporation, Etisalat Group (e&), AT&T, and Telkomsel, creating blueprints for future telco and digital experiences enjoyed by millions of consumers globally. Besides its SaaS business, Circles operates three other distinct businesses: Circles.Life : A wholly-owned digital lifestyle telco brand based in Singapore, Circles.Life is powered by Circles SaaS platform and pioneering go-to-market strategies. It is the digital market leader in Singapore and has won numerous awards for marketing, customer service, and innovative product offerings beyond connectivity. Circles Aspire : A global provider of Communications Platform-as-a-Service (CPaaS) solutions. Its cloud-based Experience Cloud platform enables enterprises, service providers and developers to deliver and scale mobile, messaging, IoT, and connectivity services worldwide. Jetpac : Specializing in travel tech solutions, Jetpac provides seamless eSIM roaming for over 200 destinations and innovative travel lifestyle products, redefining connectivity for digital travelers. Jetpac was awarded Travel eSIM of the Year. Circles is backed by renowned global investors, including Peak XV Partners (formerly Sequoia), Warburg Pincus, Founders Fund, and EDBI (the investment arm of the Singapore Economic Development Board), with a track record of backing industry challengers. About This Role As a Manager I of security operations and vulnerability management , you will be given a unique opportunity to drive security maturity across Circles live markets environments. You will be responsible for working on: Drive standardization of security best practices to improve the security program maturity across Circles live markets. Prepare and deliver regular reports on overall security program maturity, incident status, and vulnerability management activities to senior management. Ensure adherence to internal security policies, industry standards, and regulatory requirements. Lead the vulnerability management team to ensure adherence to continuous vulnerability assessment processes. Drive strategies to automate and improve efficiencies of the team. Conduct regular risk assessments and vulnerability assessments. Identify potential threats and weaknesses, and work with the operations teams to develop strategies to mitigate risks to the organization. Track the latest threats and vulnerabilities (CVE) in the industry. Quickly analyze if it affects the Circles infrastructure and work with the operations teams to remediate the vulnerability. Maintain detailed and accurate documentation of security incidents and vulnerability management processes. Ensure documentation is updated and accessible for review and audits. Manage the vulnerability assessment process, including scanning, identification, and prioritization of security vulnerabilities. Collaborate closely with Engineering, SRE, IT and other relevant departments to remediate vulnerabilities and track resolution progress. What are we looking for Minimum of 7+ years of experience in security operations, vulnerability management, or a related field, with at least 2 years in a supervisory role. Solid understanding of security operations and vulnerability management principles. Proficiency in security technologies, tools, and methodologies (e.g., SIEM, vulnerability scanners, CSPM, CVE analysis, Kubernetes security) Strong stakeholder management skills Excellent communication and interpersonal skills. Ability to work effectively under pressure and manage multiple priorities. Detail-oriented with strong organizational skills. Proven leadership and team management capabilities. High level of integrity and commitment to security best practices. Security certifications CISSP, CISM, CCSP etc will be good but not a requirement To all recruitment agencies: Circles will only acknowledge resumes shared by recruitment agencies if selected in our preferred supplier partnership program. Please do not forward resumes to our jobs alias, Circles employees or any other company location. Circles will not be held accountable for any fees related to unsolicited resumes not uploaded via our ATS. Circles is committed to a diverse and inclusive workplace. We are an equal opportunity employer and do not discriminate on the basis of race, national origin, gender, disability or age.
Posted 3 weeks ago
3.0 - 8.0 years
3 - 7 Lacs
Bengaluru
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Security Information and Event Management (SIEM), Splunk Security Information and Event Management (SIEM) Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for a proactive and detail-oriented SOC Analyst (Incident Response) to join our Security Operations Center (SOC) team. In this role, you will be responsible for detecting, analyzing, and responding to cybersecurity incidents using a combination of technology solutions and processes. Roles & Responsibilities:- Monitor security alerts and events from various sources (SIEM, EDR, firewall logs, IDS/IPS, etc.) to detect potential security incidents.- Triage, investigate, and respond to incidents following standard operating procedures (SOPs) and incident response playbooks.- Perform in-depth analysis of security incidents to identify root causes, scope, and impact.- Escalate complex incidents to appropriate stakeholders and support containment, eradication, and recovery efforts.- Work with internal teams and external partners to contain and remediate threats.- Contribute to continuous improvement of detection capabilities and IR processes.- Maintain incident documentation and provide detailed reports post-incident.- Stay current with emerging threats, vulnerabilities, and incident response best practices. Professional & Technical Skills: - 25 years of experience in a Security Operations Center (SOC) or similar cybersecurity role.- Strong understandin of security technologies such as SIEM, EDR, IDS/IPS, firewalls, and antivirus.- Experience with incident detection, triage, analysis, and response.- Familiarity with MITRE ATT&CK framework and other threat models.- Knowledge of operating systems (Windows/Linux), networking protocols, and cloud environments.- Strong analytical and problem-solving skills.- Excellent verbal and written communication skills.- Industry certifications such as CEH, GCIH, GCIA, or CompTIA Security+ are a plus. Additional Information:- The candidate should have minimum 3 years of experience in Splunk, QRadar or any SIEM tool.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
1.0 - 4.0 years
1 - 4 Lacs
Jind, Bathinda, Jodhpur
Work from Office
Primary Responsibilities: Business Financials Ensure timely call back to the customer for any hold or rejected transaction and resolving the same immediately as per SOP The goals here are 1 Protection of the customers interest 2 not to antagonize the customer through calls 3 Prevention of fraud and 4 Identification of fraudulent patterns Responsible to initiate investigation on any suspicious cases and followup for the reports findings with the guidance of LeadEFRMS Customer Both Internal ExternalEnsuring use of polite language while speaking to customers ensuring not to tip off Ensure that communication with stakeholders are made in an efficient and conclusive manner Internal Process Ensure complete updation of case details on Clari5 system till closureEnsure adherence to TAT for resolution of all alerts Responsible to manage the entire life cycle of alerts Identify changes required in EFRMS scenarios and suggest them regularly to the supervisorFollow up with Vigilance officers on field for timely closure of investigation Preparation of various MIS on a daily weekly monthly quarterly and annual basisAwareness of emerging market trends Conduct UAT on a need basis for the purpose of implementationShoulder additional responsibility as assigned by seniors from time to timeExtremely proactive and detail orientedInnovation Learning Ensure adherence to training mandays mandatory training programs for selfEnsure goalsetting midyear review and annual appraisal process within specified timelines for self Complete required certification and courses keeping the current scope of work in view Location - Bathinda,Jind,Jodhpur,Panchkula,Raipura,Varanasi
Posted 3 weeks ago
4.0 - 8.0 years
10 - 20 Lacs
Chennai, Bengaluru
Work from Office
What you will do Implement cloud-based defence-in-depth controls for Cloud environments. Improve the cloud security posture by conguring guardrails like AWS Cong, Guard Duty, Inspector, Security Hub, Security Control Policies, etc., Develop cloud-based programs to detect possible vulnerabilities and risks Design and Manage identity and access management and RBAC policies. Hardening cloud platforms and services congurations such as encryption at rest and transit. Build automation scripts using API calls and CLI to identify and remediate non-compliant cloud congurations. Leverage Infrastructure as Code (IaC) to automate cloud security congurations and deployments. Automate security controls, data and processes to provide better metrics and enhance operational support. Responsible for integration of security development practices into DevOps life cycle Create and maintain detailed technical documentation and runbooks for implemented security controls and processes. Perform security assessments, including incident analysis, vulnerability scans, patch status tracking, and secure baseline evaluations. Implement container scanning for any vulnerabilities and Congure WAF rules. Assist in investigating and resolving routine security questions and inquiries. Coordinate and track all security-related audits. You are a successful candidate if 4-6 years of practical experience with AWS security as a Cloud or Security operations Networking expertise including Subnetting, Routing, ACL, and Security Groups. In-depth experience around CLI, Cloud principles, VPC, Cloud native services and Cloud APIs in AWS environment Expertise in Cloud automation tools Terraform, Cloud formation, version Control systems like GitLab/GitHub Solid scripting skills in languages such as Python and Shell scripting. In depth knowledge of common monitoring tools like Cloud watch & Datadog. Strong expertise with CI/CD solutions. Experience working with container technology including AKS or ECS/EKS Excellent problem solving, interpersonal, communication and presentation skills. Experience working in a fast-paced, Agile environment Experience in cyber security capabilities (SIEM, SOC, Vulnerability Management, Threat intelligence, etc.) Exposure to regulatory frameworks such as GDPR, HIPAA, and PCI-DSS. Nice-To-Have: Good understanding of security principles (focusing predominantly on cloud-based) and protocols (at all layers) Experience with cloud security posture management tools like Cloud guard, Prisma Cloud, Orca Security, etc. Web security and compliance experience in tools like Cloudare and AWS WAF. Exposure to container scanning tools Expertise with vulnerability scanning tools. Knowledge of Single Sign-On (SSO) technologies, including SAML, Entra ID (formerly Azure AD), or other identity federation methods. Relevant certifications such as AWS Certified Security Specialty, CCSP, or equivalent
Posted 3 weeks ago
7.0 - 10.0 years
11 - 15 Lacs
Bengaluru
Work from Office
About the Opportunity Operating within the Technology and Cybersecurity sector, our organization is a high-growth, on-site leader in cloud and security innovations in India. Focused on providing cutting-edge cloud security solutions, we drive secure digital transformation in dynamic environments, offering customized strategies to address complex security needs. This position seeks motivated professionals deeply engaged in advancing security postures for intricate cloud infrastructures and spearheading dedicated teams proactively. Role & Responsibilities Lead and manage multidisciplinary cloud security engineering teams to design, implement, and maintain robust and adaptable cloud infrastructures. Define and execute multiphase security strategies and technology roadmaps aligned with overarching business goals and dynamic regulatory standards. Collaborate across departments to embed security protocols seamlessly into cloud deployments and development lifecycles. Conduct thorough evaluations of emerging threats to select and deploy appropriate security tools, while innovating on processes to enhance protection and compliance. Develop, document, and validate comprehensive incident planning and response frameworks ensuring preparedness and minimized downtime. Advocate for governance rigor, promoting a culture of vigilance and adherence to industry standards and benchmarks. Skills & Qualifications Must-Have Proven leadership in directing cloud security engineering functions within dynamic and high-stakes environments. In-depth mastery of deploying and managing cloud security frameworks across leading platforms (AWS, Azure, GCP). Expertise in risk analysis, remediation planning, and navigating regulatory oversight, involving frameworks like NIST and ISO 27001. Demonstrated ability to synthesize complex projects with strategic leadership, delivering secure infrastructure solutions under tight deadlines. High interpersonal and communication skills for effective collaboration among technical and business leaders. Preferred Advanced certifications such as CISSP, CISM, or other recognized credentials demonstrating deep technical acumen. Hands-on experience with leveraging modern cloud-oriented security tooling for automating and optimizing security operations. Exposure to innovative approaches in adapting cloud security for evolving business and technical landscapes. Benefits & Culture Highlights Highly competitive compensation structure, including rewarding performance bonuses. Dynamic and inclusive work atmosphere prioritizing breakthrough innovation and knowledge growth. Leadership roles in impactful projects fostering significant advancements in the realm of cloud security operations. Ready to redefine boundaries in cloud securityJoin our ambitious team to protect and empower businesses through pioneering solutions tailored for the rapidly transforming digital era.
Posted 3 weeks ago
7.0 - 10.0 years
6 - 10 Lacs
Bengaluru
Work from Office
About the Opportunity In the dynamic cloud security and cybersecurity sector, a leading tech innovator in India is seeking a skilled Cloud Security Engineer to bolster its on-site security operations. This role involves working with advanced cloud solutions to protect critical digital infrastructure, ensuring compliance with industry standards and regulations. You will be part of a proactive, technology-driven team dedicated to safeguarding enterprise assets and driving secure business outcomes. Role & Responsibilities Design, implement, and manage robust cloud security solutions across major cloud platforms (AWS, Azure, GCP). Conduct risk assessments, vulnerability scans, and security audits to identify and mitigate potential threats. Collaborate with engineering and IT teams to integrate secure practices during cloud infrastructure deployments and migrations. Develop and enforce security policies, protocols, and incident response plans aligned with industry standards. Monitor cloud environments continuously, analyze security alerts, and respond promptly to security incidents. Stay updated on emerging threats and evolving cloud security trends, suggesting innovative improvements. Skills & Qualifications Must-Have Proven hands-on experience as a Cloud Security Engineer with a strong background in cloud platforms and security best practices. Deep understanding of security frameworks and regulatory standards (ISO 27001, NIST, GDPR, etc.). Expertise in vulnerability assessment, penetration testing, encryption technologies, and firewall configurations. Experience in developing and executing incident response plans and risk management strategies. Preferred Cloud certifications (e.g., AWS Certified Security Specialty, Azure Security Engineer) to validate your expertise. Knowledge of automation and scripting languages such as Python or PowerShell to streamline security operations. Benefits & Culture Highlights Competitive salary package with performance-based bonuses. A collaborative, inclusive, and innovation-driven work environment. Opportunities for continuous learning and professional growth in a rapidly evolving tech landscape.
Posted 3 weeks ago
8.0 - 13.0 years
8 - 14 Lacs
Chennai
Work from Office
The Manager will lead and manage 24x7 cybersecurity and SOC operations, ensuring round-the-clock protection of the organization's critical infrastructure. This role demands deep expertise in network security, threat detection, and incident response , while also managing a team working in rotational shifts. Shift: 24x7 Rotational Previous exp in Team management important Requirements: 8+ years in cybersecurity, with 3+ years in a leadership role. Experience running or managing a 24x7 SOC . Strong expertise in SIEM tools , threat detection, and mitigation strategies. Relevant certifications: CISSP, CISM, CEH , or equivalent. Excellent leadership and communication skills.
Posted 3 weeks ago
5.0 - 9.0 years
0 Lacs
chennai, tamil nadu
On-site
You will be part of a significant program at ManpowerGroup aimed at transforming the company's technology infrastructure on a global scale. The program involves centralizing and consolidating diverse legacy solutions across 60+ countries to establish an enterprise infrastructure organization. The goal is to create a resilient, elastic, and stable technology landscape that offers best-in-class service in a cost-effective manner, with strong operational controls and information security. As a key member of the Global Technology Infrastructure function, you will be responsible for designing and developing sustainable solutions for IT Operations, Security Operations, and Asset Management. Your main responsibilities will include being a subject matter expert in technical design, development, and delivery of Service Management solutions. You will create high-level solution models and architectures aligning with organizational requirements, manage solution engineering roadmaps, and drive the implementation of Service Management tools globally. Your role will involve delivering ServiceNow solutions to automate IT Service, Operations, Customer Service, and Risk management processes while ensuring compliance with technology control standards and processes. Additionally, you will lead meetings with technology teams to discuss remediation status, roadblocks, and development plans. You will act as a senior technical expert for the planning, design, and delivery of ServiceNow solutions, provide end-to-end architecture for stakeholder requirements, and produce professional solution descriptions. Managing a multi-country, multi-entity, strategic engineering roadmap will be part of your responsibilities, along with engaging with architecture, technical lead, and engineering partners from various organizations. Your role will also involve ensuring compliance with remediation workflows, policies, procedures, and controls. To excel in this role, you should have a deep understanding of Technology Infrastructure domains, industry knowledge, and experience in driving Service Management standards and processes. You should be able to work collaboratively in an agile environment, possess strategic business solution development experience, and have led end-to-end engineering teams. Strong communication skills, particularly in collecting requirements and describing product features and technical designs, are essential. Moreover, you should have implementation experience with various ITSM tools such as ServiceNow, JIRA, and Remedy.,
Posted 3 weeks ago
1.0 - 6.0 years
10 - 12 Lacs
Hyderabad
Work from Office
The SOC Tier 2 Analyst serves as the primary escalation point for the Tier 1 SOC team, responsible for advanced threat detection, investigation, and incident response coordination. This role acts as a technical lead, ensuring that security incidents are properly triaged, investigated, and remediated while continuously improving security operations processes. The SOC Tier 2 Analyst plays a critical role in cybersecurity defense, supporting real-time monitoring, forensic analysis, and threat hunting. They will assist incident responders across all lifecycle phases, from detection to post-incident reviews, and contribute to SOC process optimizations. Roles & Responsibilities: Act as the primary escalation point for SOC Tier 1 analysts, providing technical expertise and guidance in incident handling. Perform deep-dive analysis of security events, leveraging SIEM, EDR, IDS/IPS, and other security tools. Identify common attack techniques (MITRE ATT&CK framework) and investigate anomalies to detect advanced persistent threats (APTs). Assist in security incident response, leading containment, eradication, and recovery efforts. Conduct artifact analysis to determine the root cause and scope of security incidents. Collaborate with Threat Intelligence and Threat Hunting teams to improve detection rules and incident response playbooks. Develop and refine SOC standard operating procedures (SOPs) to enhance security event triage and response. Work with engineering teams to fine-tune security controls and improve overall SOC efficiency. Mentor and train Tier 1 analysts to improve SOC maturity and ensure effective knowledge transfer. Support security audits, compliance initiatives, and reporting efforts as required. Basic Qualifications and Experience: Master s degree in Information Technology or Cybersecurity OR Bachelor s degree with 1 year of experience in Security Operations or related field OR Diploma with 2 years of experience in Security Operations or a related field Functional Skills: Must-Have Skills: Strong understanding of SOC operations, including event triage, escalation, and investigation. Experience analyzing cybersecurity threats and understanding attacker TTPs (Tactics, Techniques, and Procedures). Proficiency in security tools such as SIEM (Splunk, QRadar, Sentinel), EDR (CrowdStrike, Defender ATP), IDS/IPS, and firewall logs. Experience in incident response across all phases (detection, containment, eradication, recovery). Knowledge of Windows and Linux security, including log analysis, PowerShell, and Bash scripting. Good-to-Have Skills: Experience in 24/7 SOC operations and shift leadership. Knowledge of forensic tools (Volatility, Autopsy, FTK) and malware analysis techniques. Understanding of cloud security monitoring (AWS, Azure, GCP). Familiarity with MITRE ATT&CK, NIST Cybersecurity Framework, and CIS controls. Threat hunting experience to proactively detect unknown threats. Professional Certifications: CompTIA Security+ (preferred) CEH (preferred) GSEC (preferred) GCFA (preferred) MTA Security Fundamentals (preferred) CISSP (preferred) Soft Skills: Strong communication and collaboration skills, particularly when working with global teams. Ability to manage and prioritize tasks effectively in a high-pressure environment. Critical thinking and problem-solving abilities, especially in incident response situations. A commitment to continuous learning and knowledge sharing.
Posted 4 weeks ago
1.0 - 3.0 years
4 - 7 Lacs
Hyderabad
Work from Office
Let s do this. Let s change the world. In this vital role is focused on identifying, assessing, prioritizing, and tracking the remediation of vulnerabilities across the organization s technology stack. The Vulnerability Management Analyst plays a key role in the security operations team by ensuring known vulnerabilities are managed through their lifecycle using structured processes and tools. The individual will analyze vulnerability scan data, correlate threat intelligence (e.g., KEV, EPSS), and work closely with infrastructure, application, and business teams to drive risk-based remediation. Roles & Responsibilities: Analyze vulnerability scan results from tools like Tenable, Qualys, or Rapid7 to identify security weaknesses across infrastructure and applications. Prioritize vulnerabilities using multiple criteria, including CVSS, KEV (Known Exploited Vulnerabilities), EPSS (Exploit Prediction Scoring System), asset criticality, and business context. Partner with IT and DevOps teams to track remediation progress and provide technical guidance on mitigation strategies. Monitor threat intelligence feeds to correlate vulnerabilities with current exploit activity. Create and maintain vulnerability metrics, dashboards, and reports for leadership and compliance teams. Support vulnerability assessment activities in cloud environments (AWS, Azure, etc.). Maintain documentation related to the vulnerability management lifecycle. Assist in policy and process development related to vulnerability and patch management. Participate in audits and compliance efforts (e.g., SOX, ISO, NIST, PCI). What we expect of you We are all different, yet we all use our unique contributions to serve patients. Master s degree and 1 to 3 years of experience in Cybersecurity, vulnerability management or information security operations OR Bachelor s degree and 3 to 5 years of experience in Cybersecurity, vulnerability management or information security operations OR Diploma and 7 to 9 years of experience in Cybersecurity, vulnerability management or information security operations Must-Have Skills: Familiarity with vulnerability management tools (e.g., Tenable, Qualys, Rapid7). Understanding of CVSS scoring, vulnerability lifecycle, and remediation workflows. Basic knowledge of threat intelligence and how it applies to vulnerability prioritization. Working knowledge of network, operating system, and application-level security. Ability to analyze scan data and correlate it with business context and threat intelligence. Preferred Qualifications: Good-to-Have Skills: Experience with KEV, EPSS, and other threat-based scoring systems. Familiarity with patch management processes and tools. Exposure to cloud security and related scanning tools (e.g., Prisma Cloud, AWS Inspector). CompTIA Security+ GIAC GSEC / GCIH Qualys Vulnerability Management Specialist (QVMS) Tenable Certified Nessus Auditor (TCNA) Soft Skills: Analytical Thinking - Ability to interpret complex data sets and assess risk effectively Attention to Detail - Precision in identifying and tracking vulnerabilities and remediation status Communication Skills - Ability to communicate technical findings to both technical and non-technical audiences Collaboration & Teamwork - Able to work across IT, DevOps, and security teams to drive resolution Curiosity & Continuous Learning - Willingness to know the latest with evolving threats and technologies Problem-Solving Approach - Capability to identify solutions to security weaknesses in diverse environments What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards.
Posted 4 weeks ago
0.0 - 3.0 years
3 - 5 Lacs
Hyderabad
Work from Office
Let s do this. Let s change the world. In this vital role you will be responsible for the initial response to security events and incidents within a 24/7 Cybersecurity Operations Center (CSOC). This role involves following established procedures to investigate security events, providing feedback to improve processes, and assisting in the incident response lifecycle. Additionally, the associate will participate in knowledge-sharing sessions and correlate security alerts across platforms. Roles & Responsibilities: Follow established procedures to triage, investigate and respond to security events and incidents. Provide feedback to senior analysts to improve, review, and optimize existing procedures and documentation. Correlate security alerts from various platforms based on common elements. Participate in and lead CSOC Tier 1 knowledge-sharing and learning sessions. Assist incident responders in coordinating the response, containment, eradication, recovery, and lessons learned phases of the incident response lifecycle. What we expect of you We are all different, yet we all use our unique contributions to serve patients. Basic Qualifications: Bachelor s degree and 0 to 3 years of Security Operations or related field experience OR Diploma and 4 to 7 years of Security Operations or related field experience Professional Certifications: CompTIA Security+ (preferred) CEH (preferred) GSEC (preferred) MTA Security Fundamentals (preferred) Must-Have Skills: Solid understanding of security technologies and their core functionality Experience in analyzing cybersecurity threats with up-to-date knowledge of attack vectors and the cyber threat landscape. Ability to prioritize tasks effectively and solve problems efficiently in a diverse, global team environment. Good knowledge of Windows and/or Linux systems. Familiarity with CSOC operations and incident response procedures. Experience with security alert correlation across different platforms. Preferred Qualifications: Strong communication and collaboration skills, especially when working with global teams. Ability to prioritize and manage tasks in high-pressure situations. Critical thinking and problem-solving abilities in cybersecurity contexts. A commitment to continuous learning and knowledge sharing.
Posted 4 weeks ago
5.0 - 8.0 years
20 - 25 Lacs
Hyderabad
Work from Office
Summary #LI-Hybrid Location: Hyderabad, India Relocation Support: Yes The GSOC Security Systems Lead is responsible for overseeing the management and maintenance of all security systems within the Global Security Operations Center. This role requires a highly skilled individual with expertise in security technology, system integration, and team leadership. The GSOC Security Systems Lead ensures that all security systems are operating effectively and efficiently to support the organizations security operations. About the Role Key Responsibilities Oversee daily operations and maintenance of all GSOC security systems for optimal performance Integrate and optimize new security technologies in collaboration with IT and other departments Act as the primary contact for all security system-related issues and vendor coordination Ensure accurate reporting and analysis of GSOC metrics to identify improvement areas Supervise and support Senior Analysts and Analysts in fulfilling their responsibilities Maintain and update Working Process Documents to reflect current procedures Monitor and manage data integrity across all GSOC records and databases Lead equipment maintenance efforts and resolve technical issues promptly Coordinate with multiple stakeholders to ensure seamless security operations Develop and deliver training programs and readiness drills for GSOC staff Essential Requirements Bachelor s degree in a relevant field; certifications in Honeywell or similar alarm/CCTV systems preferred Minimum 5 years of experience in security systems management or operations center leadership Proven expertise in system integration, optimization, and maintenance of security technologies Strong communication and coordination skills with internal teams and external vendors Demonstrated ability to lead teams and ensure adherence to operational protocols Experience in developing and implementing security policies, procedures, and training programs Desirable Requirements Experience with global security operations or multinational environments Honeywell or similar certifications in alarms and CCTV monitoring. Why Novartis: Helping people with disease and their families takes more than innovative science. It takes a community of smart, passionate people like you. Collaborating, supporting and inspiring each other. Combining to achieve breakthroughs that change patients lives. Ready to create a brighter future together? https://www. novartis. com / about / strategy / people-and-culture Join our Novartis Network: Not the right Novartis role for you? Sign up to our talent community to stay connected and learn about suitable career opportunities as soon as they come up: https://talentnetwork. novartis. com/network Benefits and Rewards: Read our handbook to learn about all the ways we ll help you thrive personally and professionally:
Posted 4 weeks ago
10.0 - 14.0 years
8 - 10 Lacs
Gurugram
Work from Office
SOC Analyst L3 (Sentinel is must) Our purpose is to enable our customers to defend against the evolving threat landscape across on-premises, private cloud, public cloud and multi-cloud workloads. Our goal is to go beyond traditional security controls to deliver cloud-native, DevOps-centric and fully integrated 24x7x365 cyber defence capabilities that deliver a proactive , threat-informed , risk-based , intelligence-driven approach to detecting and responding to threats. Our mission is to help our customers: Proactively detect and respond to cyber-attacks 24x7x365. Defend against new and emerging risks that impact their business. Reduce their attack surface across private cloud, hybrid cloud, public cloud, and multi-cloud environments. Reduce their exposure to risks that impact their identity and brand. Develop operational resilience. Maintain compliance with legal, regulatory and compliance obligations. What were looking for To support our continued success and deliver a Fanatical Experience to our customers, Rackspace Cyber Defence is looking for an Indian based Security Operations Analyst (L3) to support Rackspaces strategic customers. This role is particularly well-suited to a self-starting, experienced and motivated Sr. Sec Ops Analyst, who has a proven record of accomplishment in the cloud security monitoring and incident detection domain. As a Security Operations Analyst(L3), you will be responsible for detecting, analysing, and responding to threats posed across customer on-premises, private cloud, public cloud, and multi-cloud environments. The primary focus will be on triaging alerts and events (incident detection), which may indicate malicious activity, and determining if threats are real or not. You will also be required to liaise closely with the customers key stakeholders, which may include incident response and disaster recovery teams as well as information security. Key Accountabilities Should have experience of 10 years in SOC and 5 years in Azure Sentinel. Ensure the Customers operational and production environment remains secure at all the times and any threats are raised and addressed in a timely manner. Critical incident handling & closure. Escalation management and handling escalations from L2 Analysts. Proactive discovery of threats based on MITRE ATT&CK framework. Deep investigation and analysis of critical security incidents. Post breach forensic incident analysis reporting. Review the weekly and monthly reports. Review new use cases created by L2 and implement in cloud-native SIEM (Security Information and Event Management). Assist with customer onboarding (such as use case development, identifying data sources, configuring data connectors etc) Advanced threat hunting. Develop custom dashboards and reporting templates. Develop complex to customer specific use cases. Advanced platform administration. Solution recommendation for issues. Co-ordinate with vendor for issue resolution. Basic and intermediate playbook and workflow enhancement. Maintain close working relationships with relevant teams and individual key stakeholders, such as incident response and disaster recovery teams as well as information security etc. Develop the custom parsers for the incident and alert enrichment. Problem specific playbook and workflow creation and enhancements Required to work flexible timings. Skills & Experience Existing experience as a Security Operations Analyst, or equivalent. Experience of working in large scale, public cloud environments and with using cloud native security monitoring tools such as: Microsoft Sentinel Microsoft 365 Defender Microsoft Defender for Cloud Endpoint Detection & Response (EDR) tools such as Crowdstrike, Microsoft Defender for Endpoint. Firewalls and network security tools such as Palo Alto, Fortinet, Juniper, and Cisco. Web Application Firewall (WAF) tools such as Cloudflare, Akamai and Azure WAF. Email Security tools such as Proofpoint, Mimecast and Microsoft Defender for Office Data Loss Prevention (DLP) tools such as Microsoft Purview, McAfee and Symantec Nice to have skills/experience includes: Google Cloud Platform (GCP) security tools such as Chronicle and Security Command Centre Amazon Web Services (AWS) security tools such as Security Hub, AWS Guard Duty, AWS Macie, AWS Config and AWS CloudTrail Experience of analysing malware and email headers, and has skills in network security, intrusion detection and prevention systems; operating systems; risk identification and analysis; threat identification and analysis and log analysis. Experience of security controls, such as network access controls; identity, authentication, and access management controls (IAAM); and intrusion detection and prevention controls. Knowledge of security standards (good practice) such as NIST, ISO27001, CIS (Center for Internet Security), OWASP and Cloud Controls Matrix (CCM) etc. Experience with scripting and coding with languages such as Terraform, python, javascript, golang, bash and/or powershell. Experience with DevOps practices and tools such as Backlogs, Repos, Pipelines, Artifacts, CI/CD, JIRA, Azure DevOps, CircleCI, GitHub Actions, Ansible and/or Jenkins. Computer science, engineering, or information technology related degree (although not a strict requirement) Holds one, or more, of the following certificates (or equivalent): - Certified Information Security Systems Professional (CISSP) Microsoft Certified: Azure Security Engineer Associate (AZ500) Microsoft Certified: Security Operations Analyst Associate (SC-200) CREST Practitioner Intrusion Analyst (CPIA) CREST Registered Intrusion Analyst (CRIA) CREST Certified Network Intrusion Analyst (CCNIA) Systems Security Certified Practitioner (SSCP) Certified Cloud Security Professional (CCSP) GIAC Certified Incident Handler (GCIH) GIAC Security Operations Certified (GSOC) A highly self-motivated and proactive individual who wants to learn and grow and has an attention to detail. A great analyser, trouble-shooter and problem solver who understands security operations, programming languages and security architecture. Highly organised and detail oriented. Ability to prioritise, multitask and work under pressure. An individual who shows a willingness to go above and beyond in delighting the customer.
Posted 4 weeks ago
5.0 - 10.0 years
5 - 6 Lacs
Faridabad, Gurugram, Jaipur
Work from Office
Area of Responsibility (1) Plan, organize, conduct and control operations as per the monthly/weekly supervision plans and route charts (2) Carry out Operations audits of Sites / Assignments. (3) Should be able to supervise and conduct on-site training as per training programm (4) Should be well versed with basic Sales requirements and Commercials. (5) Effective supervision and Management mechanism. (6) Plans to prevent and combat fire at site and ensure that all the fire extinguishers are serviceable (7) Check all alarm systems at sites for serviceability (8) Check and train security personnel in handling of metal detectors, vehicles search mirrors radio sets, Personnel and Materials gate etc. (9) Train security personnel in techniques of searching trucks, cars, scooters and cargo/consignment and other bomb situations. (10) Carry out a fresh security survey if any changes in location or any addition has taken place in high value items, viz. Computer Centre, network, cash room, bullion vaults or expensive calibration equipment. (11) Formulation and rehearsal of emergency procedures (12) Check log books and documents at sites and compile evaluation and action report. Make out daily visit report and hand it over to Branch Manager for evaluation and action.
Posted 4 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
40353 Jobs | Dublin
Wipro
19668 Jobs | Bengaluru
Accenture in India
18077 Jobs | Dublin 2
EY
16566 Jobs | London
Uplers
12079 Jobs | Ahmedabad
Amazon
10867 Jobs | Seattle,WA
Accenture services Pvt Ltd
10456 Jobs |
Bajaj Finserv
10205 Jobs |
Oracle
9728 Jobs | Redwood City
IBM
9609 Jobs | Armonk