Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
8.0 - 12.0 years
0 Lacs
hyderabad, telangana
On-site
You will be working as a Managed SOC Manager with a focus on monitoring SIEM solutions and various security devices in a SOC environment. Your role will involve leading and managing day-to-day SOC operations, providing threat and vulnerability analysis, and delivering security advisory services. You will also be responsible for developing and following Standard Operating Procedures (SOPs) and Playbooks for handling alerts, integrating log sources, and creating custom use cases in the SIEM solution. In addition, you will need to report urgent matters to the Incident Response Team promptly, ensure ticket queues are managed within SLAs, integrate and share information with internal departments and client operations teams, and maintain documentation for security event processing. You will also prepare reports, dashboards, and documentation for client management, coordinate with stakeholders and client teams, and communicate effectively with various teams and vendors. To excel in this role, you must possess excellent verbal and written communication skills, strong leadership abilities, and analytical problem-solving skills. You should have a keen interest in knowledge acquisition, innovation, and automation, along with hands-on experience in Security Incident Management and Response tactics. Proficiency in various SIEM solutions, security appliances, and knowledge of cyber-attacks, attack patterns, vectors, and risk management are essential for this position. This role requires flexibility in working hours, including rotating shifts, weekends, off-hours, and holidays. If you meet these requirements and are interested in this opportunity, please apply by submitting your CV/Resume along with a cover letter. Thank you.,
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
chennai, tamil nadu
On-site
You will be responsible for performing deep-dive investigations on security incidents using Securonix SIEM. Your role will involve correlating alerts and utilizing UEBA to detect anomalies and insider threats. Additionally, you will be expected to fine-tune detection rules to reduce false positives in Securonix and conduct threat hunting to identify unknown threats using behavioral analytics. Moreover, you will investigate security events such as ransomware, APTs, data exfiltration, and privilege escalations. Collaborating with L3 analysts, you will help develop playbooks and automation through SOAR integration. You will also provide guidance to L1 analysts and support security awareness training initiatives. Furthermore, your responsibilities will include generating reports on security trends and SOC performance to ensure effective monitoring and response to potential threats.,
Posted 1 month ago
2.0 - 4.0 years
7 - 8 Lacs
Bengaluru
Work from Office
Exp: 3 to 4 yrs Location: Bangalore (Base Location) willing to travel Dubai (Client Location) Availability: Immediately No. Of Positions: 2 JD :- - Candidate should have good understanding of cloud - Any SIEM tool experience is preferred (They have Securonix SIEM PS support available so candidate is not expected to work on Securonix side configuration but should understand how the integration works with any SIEM solution) - candidate should have good understanding of cloud integration methods available (Cloud-native connectors, API-based ingestion, agent-based) - Should have an understanding of the cloud models ( IaaS, PaaS, SaaS security responsibilities in each) - Should have an understanding of the Logging Services : AWS CloudWatch and Azure Monitor - Scripting & Automation knowledge is preferred: Python, PowerShell, Bash for automation and log parsing, Lambda functions, Azure Logic Apps, Amazon EventBridge.
Posted 3 months ago
1.0 - 4.0 years
4 - 8 Lacs
Chennai
Work from Office
Responsibilities: Monitor and analyze security alerts generated by Securonix SIEM . Perform initial triage of security incidents based on risk scores and behavioral analytics. Escalate security incidents to L2 for deeper investigation. Assist in fine-tuning Securonix correlation rules to reduce false positives. Document incidents, investigation steps, and outcomes in the incident management system. Support phishing investigations and basic threat analysis. Follow standard operating procedures (SOPs) for incident response. Requirements: Bachelors degree in Cybersecurity, IT, or related field. Basic knowledge of SIEM and User Entity Behavior Analytics (UEBA) . Understanding of security frameworks (NIST, SOC 2, MITRE ATT&CK). Strong analytical skills and attention to detail. Certificationslike Securonix Security Analyst, Security+, or Microsoft SC-900 (preferred).
Posted 3 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |