Jobs
Interviews

5 Seim Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 6.0 years

6 - 16 Lacs

bengaluru

Hybrid

Role Summary Position: OT Cyber SOC Analyst L2 Experience: 3–6 years Location: Bengaluru Shift: 24/7 rotational (including weekends) Reports To: OT SOC Lead / OT Security Manager Focus: Incident analysis, detection, and response within ICS/OT environments (SCADA, PLCs, DCS, etc.). Key Responsibilities Analyze OT-specific security events/incidents using SIEM and OT monitoring tools. Perform root cause analysis & create incident timelines for forensic use. Apply incident response frameworks (NIST, MITRE ATT&CK ICS, Cyber Kill Chain). Investigate malware and suspicious artifacts in OT networks using threat intel & sandbox tools. Analyze logs, network traffic, and industrial protocols (Modbus, DNP3, OPC). Investigate anomalous device communications and unauthorized access . Collaborate with OT engineers, vendors, IT SOC & CIR teams . Fine-tune SIEM rules/detection logic to cut false positives. Update SOC playbooks & knowledgebase . Conduct OT threat hunting (behavioural & attack-path based). Technical Skills OT/ICS Protocols: Modbus, DNP3, OPC, industrial network segmentation. OT Security Tools: Nozomi, Claroty, Dragos (must-have exposure). Compliance & Frameworks: ISA/IEC 62443, NIST SP 800-82, NIST CSF, ISO 27001. SIEM Platforms: Sentinel, Splunk, QRadar. Security Tech Knowledge: Firewalls, proxies, WAFs, segmentation in OT networks. Threat Intel/Malware Tools: THOR Scanner, VMRay, Recorded Future (good-to-have). Vulnerability/Patch Management: Especially in environments with limited patch windows .

Posted 2 weeks ago

Apply

10.0 - 20.0 years

45 - 85 Lacs

Bengaluru

Work from Office

1 Role title: Cyber Security Architect Grade Required Qualifications Advanced degree in Computer Science 5+ years of cyber security engineering experience Any of the following: CISSP, CISM, CEH along with Azure, GCP or AWS certifications Experience with security tools and technologies (e.g., firewalls, IPS, Email Security, SOAR, Threat Intel, SIEM, DLP, EDR, encryption, etc.). Experience in global manufacturing, pharma, and/or a life sciences company Summary of Role Duration Key responsibilities Required skills The Security Architect role is a pivotal position within the Cyber Security Office, reporting directly to the Security Architecture Lead. This role offers an exciting opportunity to collaborate with cross-functional teams from IT, Cyber Security, and Business Units to architect and design robust security solutions that effectively protect organisation's enterprise networks from evolving cyber threats. As an individual contributor, you will focus on strategic design and innovation, ensuring that our security strategies align with industry standards and best practices such as TOGAF, SABSA, Purdue, and NIST frameworks. This role is designed for individuals who are passionate about cybersecurity, possess strong expertise in security, and are eager to make a significant impact on organisation's security posture Drive the strategic design and implementation of innovative security solutions and controls Stay at the forefront of industry standards, regulations, and best practices related to IT and OT security, ensuring continuous improvement Generate comprehensive documentation, certification, and testing protocols for the deployment of new security solutions Continuously monitor and analyze current cybersecurity threats, trends, and emerging technologies to inform strategic security initiatives Work closely with engineering and architecture teams to ensure security requirements are integrated into all phases of the system development lifecycle Define and implement advanced security configurations, policies, and procedures for IT and OT assets and systems Effectively communicate with stakeholders at all levels, translating complex technical concepts into actionable security strategies Support the development and implementation of security architectures across various domains, including data security, AI, cloud, network security, monitoring detection and response, threat, risk, vulnerability asset and configuration management, and platform security Conduct security assessments and gap analyses to identify and mitigate security risks Provide technical guidance and mentorship to security engineers and other team members Perform assessments of capabilities and tools to ensure alignment with GSK business and security needs Assist with product Proof of Concept (POC) evaluations to validate security solutions Create and execute test plans to rigorously evaluate security controls and document results to provide unbiased outcomes that demonstrate alignment with GSK business and security needs in a seamless manner Proven experience in developing security strategies and reference architectures Familiarity with TOGAF, SABSA, or Purdue Enterprise Reference Architecture Experience in designing and deploying network security controls and solutions Extensive knowledge of security technologies, including encryption, authentication, authorization, security protocols, data and privacy, AI/ML, and application development Strong communication and interpersonal skills, ability to effectively manage stakeholders Proficiency in writing, developing, and maintaining technical documentation, including security standards, strategies, and implementation plans Ability to prioritize and filter actions to focus on those with significant impact on the program Capability to work with multiple stakeholders to promote practical solutions to complex security problems Excellent problem-solving and analytical skills, with the ability to work under pressure Hands-on experience in at least three of the following security domains: data security, AI, cloud, network security, monitoring detection and response, threat, risk, vulnerability asset and configuration management, or platform security Experience with threat modeling and risk assessment methodologies Experience in security automation and orchestration Knowledge of AI and machine learning security considerations Understanding of regulatory requirements/industry standards (e.g., GDPR, HIPAA, PCI)

Posted 1 month ago

Apply

4.0 - 7.0 years

5 - 10 Lacs

Navi Mumbai

Work from Office

Job title: Associate Consultant (SOC) Location: Navi Mumbai Number of Vacancies: 1 Educational Qualifications: BE-IT / B Tech /BSc. Comps/ BCA or equivalent Key Skills: Cyber Security Incident Analysis and Response Experience: 2-4 yrs. Essential Duties and Responsibilities: Perform real time monitoring, incident handling, investigation, analysis, reporting, and escalations of security events. Integrate log sources with SIEM s create use cases. Identify suspicious/malicious activities through logs. Preparation of Incident tracker and follow-up with client IT team for mitigation. Communicate with the clients to resolve the queries related to incidents. Prepare s Review Daily, Weekly and Monthly Reports/Dashboard. Create s Review advisories and ensure organization is protected from latest threats s vulnerabilities. Work Experience Requirements: Understanding of Cyber Security Concepts and Incident Response framework and processes. Hands on experience in monitoring events and investigating incidents daily. Experience in identifying, analyzing, and responding to security incidents within defined SLA. Hands-on experience working on SIEM / EDR Tools like Crowdstrike, QRadar etc. Configuring use cases s creating playbooks for security monitoring will be an added advantage. Experience of working in a 24x7 Security Operations Center (rotational shifts). Good communication and collaboration skills. Team Management Skills.

Posted 2 months ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Bengaluru

Work from Office

The Technical Account Manager Opportunity: A Technical Account Manager (TAM) specializing in enterprise identity, including Okta s Workforce Identity Cloud (WIC), Customer Identity Solution (Okta CIAM) and adjacent technologies. The TAM will provide Okta s customers with strategic technical guidance over the comprehensive suite of products and features available at Okta. They are held in high regard as a technical expert for how Okta s solutions translate to business value. This role is for the Workforce Identity Cloud product, whereby you will support WIC and CIS customers. The TAM specialization requires an understanding of hybrid scenarios that capitalize on Okta s ability to manage authentication, authorization, and lifecycle management capabilities for SaaS, on-premise, and custom enterprise applications. You Will: Advise customers on best practices and product adoption in a post-sales capacity Partner with Customer Success Managers as their technical counterpart in a broad portfolio of accounts, primarily in mid-market and enterprise segments Earn customer trust by understanding their goals and use cases, and recommend best practices relating to process changes, product adoption, configuration and additional features to meet requirements Maintain focus on increasing subscription adoption, customer satisfaction and retention Review customer architectures and Okta configurations to ensure they are enhancing security posture and capturing ROI as Okta releases new features and functionality Take and respond to reactive questions from Customer Success Managers Establish strong personal relationships on key accounts with decision-makers and stakeholders Participate in content creation for both internal and external enablement of staff and customers Requirements: 5+ years of total experience in information technology, with at least 3 years of hands-on experience as a Technical Account Manager (TAM) or comparable practitioner role in the IAM space Ability to work US Time Zone (preference) Working proficiency in the following core IAM areas: Technologies and protocols to support identity federation and robust access control models (e.g., SAML 2.0, WS-Federation, OAuth, OpenID Connect) Legacy applications in a hybrid IT environment with non-standard applications (i.e. those that do not support modern identity federation protocols) Enterprise applications in the ecosystem to provide identity and attributes to applications or to harness an external application to help drive business process (ITSM, HR, etc) SaaS deployment such as Salesforce, Box, Office 365, Workday and HR as master for identities Lifecycle management scenarios to 3rd party systems and applications (Workflows, HR-driven provisioning, MSFT integrations, SCIM, etc) Security and performance monitoring, and 3rd party signals integrations (SEIM, MDM, WAF, etc) Familiarity with IAM solution providers is strongly desired. Strong background in any of the following: Technical Account Management, Technical Consulting, Solution Architect, Solutions Engineering, Product Management or similar role. Understanding of common software development practice. Understanding of identity and surrounding technologies. Strong business acumen, history of success owning enterprise segment customer relationships and escalations Excellent communication skills. Ability to set expectations and communicate goals and objectives with customers at various levels, from a developer to a CIO Ability to track and influence customer behavior and health metrics across a portfolio of accounts This position can be located remotely but may require some travel (under 20% of the time) Education: BA/BS/MS in Computer Science, Information Technology or related discipline OR equivalent work experience required

Posted 3 months ago

Apply

4.0 - 9.0 years

7 - 17 Lacs

bengaluru

Work from Office

About this role: Wells Fargo is seeking a Senior Information Security Engineer. We believe in the power of working together because great ideas can come from anyone. Through collaboration, any employee can have an impact and make a difference for the entire company. Explore opportunities with us for a career in a supportive environment where you can learn and grow. In this role, you will: Lead or participate in computer security incident response activities for moderately complex events Conduct technical investigation of security related incidents and post incident digital forensics to identify causes and recommend future mitigation strategies Provide security consulting on medium projects for internal clients to ensure conformity with corporate information, security policy, and standards Design, document, test, maintain, and provide issue resolution recommendations for moderately complex security solutions related to networking, cryptography, cloud, authentication and directory services, email, internet, applications, and endpoint security Review and correlate security logs Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity Identify security vulnerabilities and issues, perform risk assessments, and evaluate remediation alternatives Collaborate and consult with peers, colleagues and managers to resolve issues and achieve goals Required Qualifications: 4+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education Desired Qualifications: Minimum 4+ years implementation and administration experience in working on large, complex CyberArk environments. Bachelors or masters degree in technologyEngineering. Strong knowledge of PAM CyberArk tool CyberArk PAS Vault, DR, CPM, PVWA, AAM, PTA and Alero. 4+ years of credential management expertise and advanced management of credential management systems. 3+ years Credential/secrets management experience in a cloud or DevOps environment Advanced Information Security technical skills and understanding of information security practices and policies. 3+ years of Windows and Linux based OS administration experience 2+ years of experience with automating workflows (Java, PowerShell, VBScript, Shell, etc.) Ability to manage complex issues and develop solutions. Excellent Written and oral communication. Experience with databases (Oracle, Sybase, MSSQL, MySQL etc.,) Experience with Directories (LDAP, AD) Experience with Jira and Confluence Documentations of technical configuration Experience with Security Event and Incident Management (SEIM) Tools like Splunk Experience with load balancers, high availability solutions and firewalls Experience with certificate management tools like Venafi CyberArk certification will be an added advantage. Job Expectations: Design, document, test, maintain, and partner with peer teams to deploy solutions for highly complex security solutions related to credential management. Troubleshoot and resolve service requests and automation issues (Bug/fixes/connectors) Have a Strong knowledge of the CyberArk privileged account security Suite. Integrating various platforms with CyberArk, such as Windows servers, UNIX Servers, Databases, SAP Applications, Websites, and networking devices etc., Conduct proactive monitoring to prevent solution outages. Onboard privileged access account Onboard applications to CyberArk Enhancements and developments for plugins/connectors Identity new areas of risk and evaluate existing data security policies. Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity. Perform integration testing for new features and integration of new asset types. Safe creation/modification/removal, including sage membership. Schedule and run regular technical changes (i.e., service enhancements, security patches, major software releases) Run discovery scan process and batch upload of privileged accounts. Assist in disaster recovery testing. Provide Level 2 technical solution support. Hands on experience in enhancements/issues/troubleshooting with CyberArk Hands on experience in JIRA and ensure the completion of task is updated accordingly in Jira. Utilize tools and analytical skills to investigate the root cause of issues across the technologies. Excellent knowledge in documentation and provide solution recommendations. Provide a level of leadership to teammates for the purpose of achieving target priorities. Capable of working in a fast paced and high demand environment Serves as a high-level technical security resource on large-scale network and/or systems/applications issues

Posted Date not available

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies