Senior Security Officer

5 - 10 years

20 - 35 Lacs

Posted:5 hours ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

We are seeking a seasoned Senior Security Officer to lead our security operations across OSS, BSS, and OCS platforms in the telecom domain. The ideal candidate will be responsible for managing Security Operations Center (SOC) teams, overseeing incident response protocols, and implementing robust operational security workflows across infrastructure and client-facing systems. This position requires strong expertise in AWS, Linux security, cipher security, and the use of AI and modern tools to enhance security frameworks. A deep understanding of networks and a solid educational foundation in security are essential.

Key Responsibilities:

Security Operations Leadership

  • Create, lead, and manage SOC infrastructure and teams responsible for 24/7 monitoring, threat detection, and response.
  • Define and enforce security operations policies, playbooks, and escalation protocols.
  • Oversee the implementation and management of SIEM tools, log management systems, and threat intelligence integrations.
  • Integrate AI-driven tools and solutions to enhance threat detection and mitigation capabilities.

Incident Response & Recovery

  • Develop and maintain incident response plans and runbooks.
  • Coordinate cross-functional responses to security breaches, outages, and vulnerabilities.
  • Conduct post-incident reviews and implement corrective actions to prevent future occurrences.

Operational Security Workflows

  • Ensure secure deployment and maintenance of BSS/OCS platforms across environments.
  • Collaborate with DevOps and Infrastructure teams to enhance overall security.
  • Monitor and improve access controls, data protection, and system hardening processes.

Compliance & Audit

  • Ensure alignment with telecom security standards (e.g., ISO 27001, GDPR, TRAI guidelines).
  • Lead internal and external audits, including client security assessments.
  • Maintain comprehensive documentation for compliance reporting and risk management.

Team Management & Stakeholder Engagement

  • Mentor and guide security analysts and engineers, fostering professional growth.
  • Liaise with client security teams during onboarding, escalations, and reviews.
  • Present risk posture, security metrics, and strategic recommendations to executive leadership.

Cloud Security

  • Design and implement security measures for cloud platforms, including AWS, Azure, or GCP, ensuring secure configuration, access, and data protection.
  • Monitor and mitigate risks associated with cloud-native services such as containers, Kubernetes, and serverless architecture.

Zero Trust Architecture

  • Develop and enforce a Zero Trust Security framework to ensure that users, devices, and applications are verified before gaining access to critical resources.

Proactive Threat Hunting

  • Lead proactive threat-hunting initiatives to identify and mitigate risks before they become incidents.
  • Leverage advanced analytics, AI, and behavioral analysis tools to detect anomalous activities across networks and endpoints.

Penetration Testing & Red Teaming

  • Oversee routine penetration testing and red team exercises to identify vulnerabilities and test the organization's incident response capabilities.
  • Work with third-party security firms to perform external security assessments.

IoT and Edge Security

  • Develop and enforce security policies for IoT devices and edge computing environments, particularly for telecom and network infrastructure.
  • Mitigate risks related to device spoofing, unauthorized access, and data leakage.

Required Qualifications:

  • 5+ years of experience

    in information security, with at least

    3 years in a senior leadership role.

  • Proven experience managing SOC operations and incident response teams.
  • Hands-on experience

    with SIEM, endpoint protection, vulnerability management, and AI-based security tools.
  • Strong knowledge of

    AWS security, Linux security, and cipher security protocols.

  • Solid understanding of

    networking concepts

    , architecture, and protocols.
  • Certifications such as

    CISSP, CISM, CEH

    , or equivalent are preferred.
  • Excellent communication, stakeholder management, and crisis-handling skills.

Preferred Attributes:

  • Familiarity with regulatory frameworks and data privacy standards.
  • Experience leveraging AI and machine learning tools in security operations.
  • Ability to balance strategic oversight with hands-on technical guidance.
  • Strong analytical and problem-solving skills with a focus on proactive threat mitigation.

Contact Detail:-

Jagriti Hans-7838422964, Navneet Pokhriyal -8700570163 & Kailash Chandra - 9891504989 (Monday to Saturday 11 AM to 7 PM).

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You