Jobs
Interviews

4 Securonix Siem Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 12.0 years

0 Lacs

hyderabad, telangana

On-site

You will be working as a Managed SOC Manager with a focus on monitoring SIEM solutions and various security devices in a SOC environment. Your role will involve leading and managing day-to-day SOC operations, providing threat and vulnerability analysis, and delivering security advisory services. You will also be responsible for developing and following Standard Operating Procedures (SOPs) and Playbooks for handling alerts, integrating log sources, and creating custom use cases in the SIEM solution. In addition, you will need to report urgent matters to the Incident Response Team promptly, ensure ticket queues are managed within SLAs, integrate and share information with internal departments and client operations teams, and maintain documentation for security event processing. You will also prepare reports, dashboards, and documentation for client management, coordinate with stakeholders and client teams, and communicate effectively with various teams and vendors. To excel in this role, you must possess excellent verbal and written communication skills, strong leadership abilities, and analytical problem-solving skills. You should have a keen interest in knowledge acquisition, innovation, and automation, along with hands-on experience in Security Incident Management and Response tactics. Proficiency in various SIEM solutions, security appliances, and knowledge of cyber-attacks, attack patterns, vectors, and risk management are essential for this position. This role requires flexibility in working hours, including rotating shifts, weekends, off-hours, and holidays. If you meet these requirements and are interested in this opportunity, please apply by submitting your CV/Resume along with a cover letter. Thank you.,

Posted 1 week ago

Apply

3.0 - 7.0 years

0 Lacs

chennai, tamil nadu

On-site

You will be responsible for performing deep-dive investigations on security incidents using Securonix SIEM. Your role will involve correlating alerts and utilizing UEBA to detect anomalies and insider threats. Additionally, you will be expected to fine-tune detection rules to reduce false positives in Securonix and conduct threat hunting to identify unknown threats using behavioral analytics. Moreover, you will investigate security events such as ransomware, APTs, data exfiltration, and privilege escalations. Collaborating with L3 analysts, you will help develop playbooks and automation through SOAR integration. You will also provide guidance to L1 analysts and support security awareness training initiatives. Furthermore, your responsibilities will include generating reports on security trends and SOC performance to ensure effective monitoring and response to potential threats.,

Posted 1 month ago

Apply

2.0 - 4.0 years

7 - 8 Lacs

Bengaluru

Work from Office

Exp: 3 to 4 yrs Location: Bangalore (Base Location) willing to travel Dubai (Client Location) Availability: Immediately No. Of Positions: 2 JD :- - Candidate should have good understanding of cloud - Any SIEM tool experience is preferred (They have Securonix SIEM PS support available so candidate is not expected to work on Securonix side configuration but should understand how the integration works with any SIEM solution) - candidate should have good understanding of cloud integration methods available (Cloud-native connectors, API-based ingestion, agent-based) - Should have an understanding of the cloud models ( IaaS, PaaS, SaaS security responsibilities in each) - Should have an understanding of the Logging Services : AWS CloudWatch and Azure Monitor - Scripting & Automation knowledge is preferred: Python, PowerShell, Bash for automation and log parsing, Lambda functions, Azure Logic Apps, Amazon EventBridge.

Posted 3 months ago

Apply

1.0 - 4.0 years

4 - 8 Lacs

Chennai

Work from Office

Responsibilities: Monitor and analyze security alerts generated by Securonix SIEM . Perform initial triage of security incidents based on risk scores and behavioral analytics. Escalate security incidents to L2 for deeper investigation. Assist in fine-tuning Securonix correlation rules to reduce false positives. Document incidents, investigation steps, and outcomes in the incident management system. Support phishing investigations and basic threat analysis. Follow standard operating procedures (SOPs) for incident response. Requirements: Bachelors degree in Cybersecurity, IT, or related field. Basic knowledge of SIEM and User Entity Behavior Analytics (UEBA) . Understanding of security frameworks (NIST, SOC 2, MITRE ATT&CK). Strong analytical skills and attention to detail. Certificationslike Securonix Security Analyst, Security+, or Microsoft SC-900 (preferred).

Posted 3 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies