Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
7.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
At Bayer we’re visionaries, driven to solve the world’s toughest challenges and striving for a world where ,Health for all, Hunger for none’ is no longer a dream, but a real possibility. We’re doing it with energy, curiosity and sheer dedication, always learning from unique perspectives of those around us, expanding our thinking, growing our capabilities and redefining ‘impossible’. There are so many reasons to join us. If you’re hungry to build a varied and meaningful career in a community of brilliant and diverse minds to make a real difference, there’s only one choice. Sr. Cyber Security Analyst POSITION PURPOSE: We are seeking a highly skilled Sr. Cyber Threat Intelligence Analyst responsible for leading our efforts in cyber threat intelligence at Bayer. In this senior position, you will conduct sophisticated threat analyses and deliver actionable intelligence reporting to enable threat-informed cyber defense across our global organization. As part of our Cyber Defense Center (CDC) Platform, you'll play a critical role in identifying, analyzing, and mitigating cyber threats to protect Bayer's digital assets and operations. Join our team and help protect one of the world's leading life sciences companies against evolving cyber threats while developing your expertise in a dynamic and challenging environment. YOUR TASKS AND RESPONSIBILITIES: Monitor and analyze global cyber threat landscapes to identify trends relevant to Bayer's industry and operations Perform comprehensive threat analyses to identify and track threat actors, vulnerabilities, and emerging attack vectors Conduct in-depth analysis of security-relevant events and assess Bayer's threat situation in real-time Develop and implement threat intelligence use cases and detection rules for security monitoring systems Interface with internal and external partners globally (e.g. Security Operation Center, Incident Response Teams, Vulnerability Management, Senior Management, and other Stakeholders) Prepare detailed intelligence reports and deliver presentations of findings to technical and non-technical audiences Collaborate with security engineering teams to implement defensive measures based on intelligence findings Participate in incident response planning related to identified threats Contribute to the further development of existing and new cyber threat intelligence services Create and maintain process guidelines and documentation for threat intelligence operations WHO YOU ARE: BS or MA in computer science, information security, cybersecurity, or a related field (7+ years of relevant working experience may be considered an equivalent) First experience in cyber threat intelligence, security operations, or related fields Demonstrated experience with OSINT (Open Source Intelligence) tools and methodologies Strong knowledge of the MITRE ATT&CK framework and Cyber Kill Chain methodology Proficiency with Threat Intelligence Platforms like RecordedFuture, Crowdstrike, Google Threat Intelligence and MISP are an advantage Experience with SIEM platforms and log analysis tools (e.g., SENTINEL, Splunk, or similar) Background in penetration testing, red team/incident response, or as a security operations analyst are an advantage Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Threat Intelligence Analyst (CTIA), or similar certifications are an advantage Familiarity with standards like ISO 27001 or NIST CSF Connections and contacts in relevant IT security communities are an advantage Required Skills: Exceptional analytical thinking and problem-solving abilities Strong understanding of network protocols, security architectures, and common attack vectors Excellent written and verbal communication skills with ability to translate technical findings for non-technical audiences Languages: Fluent English required; additional languages beneficial Proficiency in report writing, investigational techniques, and presenting to large audiences Ability to work effectively under pressure and manage multiple priorities Self-motivated with strong attention to detail and ability to work independently Team-oriented mindset with excellent collaboration skills Ever feel burnt out by bureaucracy? Us too. That's why we're changing the way we work- for higher productivity, faster innovation, and better results. We call it Dynamic Shared Ownership (DSO). Learn more about what DSO will mean for you in your new role here https://www.bayer.com/enfstrategyfstrategy Bayer does not charge any fees whatsoever for recruitment process. Please do not entertain such demand for payment by any individuals / entities in connection with recruitment with any Bayer Group entity(ies) worldwide under any pretext. Please don’t rely upon any unsolicited email from email addresses not ending with domain name “bayer.com” or job advertisements referring you to an email address that does not end with “bayer.com”. For checking the authenticity of such emails or advertisement you may approach us at HROP_INDIA@BAYER.COM. YOUR APPLICATION Bayer is an equal opportunity employer that strongly values fairness and respect at work. We welcome applications from all individuals, regardless of race, religion, gender, age, physical characteristics, disability, sexual orientation etc. We are committed to treating all applicants fairly and avoiding discrimination. Location: India : Karnataka : Bangalore Division: Enabling Functions Reference Code: 847153 Contact Us 022-25311234 Show more Show less
Posted 11 hours ago
2.0 - 4.0 years
0 Lacs
Delhi, India
On-site
Are you passionate about cybersecurity and driven to protect organizations from evolving threats? Do you thrive in a collaborative environment where you work with sharp minds to detect, respond, and stay ahead of cyber adversaries? Join our DTS - Global Security Operations Team The Security Operations Team is responsible for safeguarding the security of Control Risks systems, infrastructure and providing internal advocacy for security practices. Opportunity to work closely with product and platform teams throughout the company to help ensure that Control Risks systems meet both safety and security compliance. As a Security Analyst, you will be responsible for continuous threat detection, monitoring, and incident response across the organization's environment. This role plays a critical part in safeguarding systems, networks, and data from cyber threats and requires a combination of technical expertise, situational awareness, and analytical thinking. Requirements What You'll Do: Key Responsibilities: Continuously detect, investigate, analyze, and respond to security incidents, providing root cause analysis and documenting findings for post-incident reviews. Collect, evaluate, and integrate threat intelligence—specifically related to Microsoft products and services—to strengthen detection and response capabilities. Identify and implement opportunities for automation and process improvement to reduce manual efforts and improve operational efficiency. Perform detailed analysis of security investigations and incidents to generate metrics and assess the effectiveness of operational workflows. Develop and enforce procedures for auditing and remediating non-compliance with established information security standards. Investigate, contain, and coordinate recovery from security incidents across both enterprise and cloud environments. Support the creation, enhancement, and continuous improvement of incident response playbooks and escalation procedures. To be successful in this role you will: Bring 2-4 years of relevant experience in Security Operations, IT Security, or a related domain. Have practical knowledge of security technologies including network firewalls, proxy solutions, endpoint detection and response (EDR), security information and event management (SIEM), and email security systems. Demonstrate hands-on experience with security tools and platforms, preferably but not mandatorily including Microsoft Defender for Endpoint, Microsoft Sentinel, Microsoft Defender for Identity, and Azure Security Center. Be familiar with key cybersecurity frameworks and standards such as ISO 27001, Cyber Essentials, and NIST. Have working knowledge of both Windows and Linux environments, along with exposure to open-source intelligence (OSINT) tools and techniques. Exhibit strong analytical thinking and problem-solving abilities, complemented by excellent technical documentation skills. Communicate effectively and confidently, with the ability to explain complex security issues to both technical and non-technical audiences. Show more Show less
Posted 12 hours ago
0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Dear Candidate Greetings from TATA Consultancy Services Job Openings at TCS Skill : GCP Devops Engineer Exp range : 6 yrs to 12 yrs Interview date : 19th June ‘25 Role : Permanent Role Job location : Hyderabad/ Chennai Current location : Anywhere In India Interview mode : MS Teams Pls find the Job Description below. Experience in design, develop and deploy GCP resources as Infra-as-code in Google Cloud Platform Strong Knowledge in Automation frameworks, CI/CD process and tools (Jenkins, GitHub, Sonar Cube etc.) is a must Strong Knowledge in Terraform and Sentinel is a plus Familiarity with Agile Practices and Frameworks Good knowledge on Kubernetes Good knowledge on Java microservices with GCP exposure Good to have: Python, GitHUb If you are Interested in the above opportunity kindly share your updated resume to r.shruthi13@tcs.com immediately with the details below (Mandatory) Name: Contact No. Email id: Total exp : Fulltime highest qualification (Year of completion with percentage scored) : Highest Qualifiacation university Name : Current organization details(Payroll company) : Current CTC : Expected CTC : Notice period : Show more Show less
Posted 12 hours ago
0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
TCS is conducting in-person interview drive for Hyderabad & Chennai location NOTE: Candidate interested in WALK-IN DRIVE in Hyderabad & Chennai must apply TCS is hosting an In-Person Interview Drive on Saturday, 21st June , we’d like to invite you to join us! This is a great opportunity to explore exciting career opportunities with us and meet our hiring team face-to-face. Role **: SOC Analyst / Consultant Desired Skill Set: Cyber security, SIEM, A ntivirus, Vulnerability management, Web Proxy, Security Patch management. Experience Range: 4-10yrs & 10+yrs Joining Location: PAN India Venue : Hyderabad : TCS Synergy Park Phase1 ,Premises No 2-56/1/36, Gachibowli, Opposite IIIT Hyderabad Campus, Seri Lingampally, RR District, Hyderabad, Telangana 500019 Chennai : TCS Siruseri ATL Building- 1/G1, SIPCOT IT Park Navalur, Siruseri, Tamil Nadu 603103 Job Description: Monitor multiple security technologies such as SIEM, Antivirus, Vulnerability management, Web Proxy, Security Patch management. Tune/Create SIEM correlation rules. Perform in-depth incident and event analysis. Respond and handle the security incidents. Agree and align on reporting and monitoring requirements with business stakeholders. Conduct research on emerging security threats. Modify Standard Operating Procedures (SOPs) and training documentation. Coach junior team members. Good Knowledge on SIEM tools like QROC, Arcsight, SPLUNK or Sentinel. Knowledge and experience with PCs, LAN topologies, routers, hubs, and terminal servers Knowledge of security applications such as IDS, Security Event Management and anomaly detection tools. Knowledge of VPN technology. Knowledge of investigation tools like FTK imager, memory dump, threat analysis tools. Ability to read and interpret network diagrams. Oversight of facilitates for other offices in the UK and provide support and guidance where required. Ability to translate event analysis findings into new monitoring proposals. Remain flexible with 24/7 shift and task assignments. Show more Show less
Posted 13 hours ago
0 years
0 Lacs
Maharashtra, India
On-site
System Administrator Brennan. Where true performance thrives. At Brennan, we believe that how technology is delivered is every bit as important as what the technology is. We focus on creating real and relevant value for customers with solutions that fit their specific needs and always reflect their true interests. It’s a claim backed by our True Performance System - a way of working engineered to get us closer, and deliver better, for our customers and their actual experience of technology. Why join Brennan True performance for our customers starts with a true belief in our people. It’s why we’ve structured our business to help our teams, and their talents, shine bright. It's why we’ve created a workplace where people of all backgrounds, beliefs and experiences are welcomed and empowered. And it’s why we’ve built an organisation where real innovation makes a genuine impact and generates true rewards for our team members. True rewards In addition to competitive remuneration, Brennan offers extensive benefits, including: Training and certification bonuses Culture Awards that recognise excellence Brennan Daredevils - our annual, all-expenses paid trip awarded to our top performers and outstanding contributors Vibrant, fun social activities Discounted hardware and software An environment that embraces learning and development The Role To provide 1st, 2nd or 3rd level technical support to Brennan IT clients, engineers and staff, 1st level monitoring and technical support to Brennan IT clients and staff. To coordinate, collaborate and escalate incidents within stipulated timelines, maintain existing cloud/infrastructure services and ensure that environment runs in an optimal way. and Continuously Improve the Efficiency and Excellence of Service Delivery as Measured by Client facing Surveys and Ratings in every department you are part of. 2-5 yrs minimum experience in Windows Server Administration / System Administration / Wintel Administration / Hyper V Administration / IT Technical Support role/ for international clients, preferably in Managed Services IT provider / IT Companies. Role Responsibilities Maintaining/contributing to KMS for client and internal team, for both technical & processes Server monitoring using SCOM, N-ABLE, Logic Monitor, Basic Intune / SCCM configurations Understanding of O365, Mimecast, Intune, Azure integration Vendor Management (hardware and Software vendors - HP, Dell, MS, VM, Citrix and others) Storage understanding NAS, SAN e.g., data domain, IBM, Netapp, Hitachi, Fujitsu, HP 3par Administration of Windows Server, groups, group policies, DNS, DHCP Understanding of backups, replications for Veeam, Symantec, Zetro, Commvault On premises backup alert management, monitoring and restoration SSL certificate renewal and installation on various roles (IIS, ADFS, ADC-Netscaler, Apache, SQL Reporting Services, WAS, Load Balancers) Smooth and timely customer engagement Disk, CPU, Snapshot management provisioning Monitor, manage experience with ESXI/Hyper-V hosts, Nutanix, Dell, HP SimpliVity Manage understand Failover Cluster, NLB Citrix/RDS/WVD knowledge with application publishing, upgrading, managing securely Manage windows update compliance. Antivirus Management, Sophos, Defender. Patching ESXi hosts and vCenter updates Knowledge of vulnerability management and critical remediation Change management, performing RCA and able to clearly articulate the actions/outcomes Key Competencies and Qualifications required Knowledge of as many more technologies like VMware, Windows Hypervisors, Azure Administrations, O365, Mimecast, SQL Administration, Windows Administration. Should have experience in VM Deployment, VM Migration, managing host clusters Extremely high-level attention to detail with methodical troubleshooting process Good verbal and written communication skills Must have knowledge of Storage technologies like HP, IBM, Dell, Cisco servers, O365, Azure Administration) Proactive vs Reactive approach ITIL Service Management Foundation accreditation Essential Skills Windows Server including 2016/2019, DNS, DHCP, Group Policy Active Directory 2012 and above VMware / Virtualization (Hyper - V, VMware) O365, Azure Administration Desired Skills Exposure to Backup tools like Veeam/Commvault/Backup exec Windows Administration certifications 2012 and above Exposure to SAN /NAS MS Azure and Office 365 Administration Symantec Endpoint or McAfee or Sophos or Sentinel One or CrowdStrike Exposure to Blade servers and configurations ITIL Foundation and ServiceNow ITSM tool Brennan is an equal opportunity employer Show more Show less
Posted 14 hours ago
0 years
0 Lacs
Pune, Maharashtra, India
Remote
TCS is hiring for Azure DevOps With Terraform Date of Interview: 20th June, 2025 Mode of Interview: Virtual(WebEx Or MS Teams) Preferred Notice Period: 0-60 Days Years Of Experience: 5 to 9 yrs Responsibilities: Proficient in writing, modularizing, and maintaining Terraform configurations for provisioning cloud infrastructure. Experience with Terraform state management (local and remote), workspaces, and backends (e.g., Azure Storage Account). Hands-on with Terraform modules, variables, outputs, and lifecycle rules . Familiarity with Terraform Cloud or Enterprise for collaboration and policy enforcement. Expertise in designing and implementing CI/CD pipelines using Azure DevOps Pipelines (YAML and Classic). Integration of Terraform into Azure DevOps pipelines for automated infrastructure deployment. Use of pipeline stages, jobs, templates, and environments for structured deployments. Experience with pipeline triggers, approvals, and gated releases. Strong understanding of core Azure services (e.g., Azure Resource Manager, Virtual Networks, Key Vault, App Services, AKS). Experience deploying and managing Azure resources using Terraform. Familiarity with Azure RBAC, service principals, and managed identities for secure automation. Proficient in Git-based workflows (feature branching, pull requests, code reviews). Experience integrating Git repositories (Azure Repos, GitHub) with Azure DevOps pipelines. Implementing secure practices in IaC (e.g., secrets management via Azure Key Vault). Familiarity with tools like Sentinel, Checkov, or TFLint for policy-as-code and static analysis Kindly share your Updated CVs matching the above Requirements Thanks & Regards Shilpa Silonee BFSI TAG Team. Show more Show less
Posted 15 hours ago
5.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Senior Detection Engineer / Threat Hunter Overview The next evolution of AI-powered cyber defense is here. With the rise of cloud and modern technologies, organizations struggle with the vast amount of data and thereby security alerts generated by their existing security tools. Cyberattacks continue to get more sophisticated and harder to detect in the sea of alerts and false positives. According to the Forrester 2023 Enterprise Breach Benchmark Report, a security breach costs organizations an average of $3M and takes organizations over 200 days to investigate and respond. AiStrike’s platform aims to reduce the time to investigate and respond to threats by over 90%. Our approach is to leverage the power of AI and machine learning to adopt an attacker mindset to prioritize and automate cyber threat investigation and response. The platform reduces alerts by 100:5 and provides detailed context and link analysis capabilities to investigate the alert. The platform also provides collaborative workflow and no code automation to cut down the time to respond to threats significantly. We’re seeking a senior-level Detection Engineer and Threat Hunter with deep expertise in modern SIEMs and a strong focus on AI-augmented threat detection and investigation. In this role, you’ll design scalable, modular detection content using Sigma, KQL, and platform-specific query languages — while working with AI to automate detection tuning, threat hunting hypotheses, and investigation workflows across enterprise and cloud environments. Key Responsibilities Develop high-fidelity, AI-ready detection templates to build detection rules in Sigma, KQL, SPL, Lucene, etc., for Microsoft Sentinel, Chronicle, Splunk, and Elastic. Leverage AI-powered engines to prioritize, cluster, and tune detection content dynamically based on environment behavior and telemetry changes. Identify visibility and data coverage gaps across cloud, identity, EDR, and SaaS log sources; work cross-functionally to close them. Lead proactive threat hunts driven by AI-assisted hypotheses, anomaly detection, and known threat actor TTPs. Contribute to AI-enhanced detection-as-code pipelines, integrating rules into CI/CD workflows and feedback loops. Collaborate with SOC, threat intel, and AI/data science teams to continuously evolve detection efficacy and reduce alert fatigue. Participate in adversary emulation, purple teaming, and post-incident reviews to drive continuous improvement. Required Skills 5+ years of hands-on experience in detection engineering, threat hunting, or security operations. Expert-level knowledge of at least two major SIEM platforms: Microsoft Sentinel, Google Chronicle, Splunk, Elastic, or similar. Strong proficiency in detection rule languages (Sigma, KQL, SPL, Lucene) and mapping to MITRE ATT&CK. Experience using or integrating AI/ML for detection enrichment, alert correlation, or anomaly-based hunting. Familiarity with telemetry sources (EDR, cloud, identity, DNS, proxy) and techniques to enrich or normalize them. Ability to document, test, and optimize detection rules and threat hunt queries in a modular, scalable fashion. Strong communication skills and the ability to translate complex threat scenarios into automated, AI-ready detection logic. Nice to Have Experience integrating AI/ML platforms for security analytics, behavior baselining, or entity risk scoring. Familiarity with detection-as-code and GitOps workflows for rule development, testing, and deployment. Scripting knowledge (Python, PowerShell) for enrichment, custom detection logic, or automation. Experience with purple teaming tools like Atomic Red Team, SCYTHE, or Caldera. AiStrike is committed to providing equal employment opportunities. All qualified applicants and employees will be considered for employment and advancement without regard to race, color, religion, creed, national origin, ancestry, sex, gender, gender identity, gender expression, physical or mental disability, age, genetic information, sexual or affectional orientation, marital status, status regarding public assistance, familial status, military or veteran status or any other status protected by applicable law. Show more Show less
Posted 17 hours ago
8.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Skills: Solution Engineer Cyber Security, SIEM SOAR Threat Hunting EDR Deception NTAA NBAD UEBA, IBM Splunk Qradar Email Security Gateway, Detection Engineer MITRE ATT&CK Framework OS Linux Networking, Implementing Cybersecurity Solutions, CISSP CEH GCIH OSCP OSCE, PreSales Solution Delivery, Greetings from Netsach - A Cyber Security Company. Currently we are looking for experienced, dynamic professionals for Solution Engineer role . This position plays a vital role in designing and implementing cybersecurity solutions to our esteemed clients. Job Title: Solution Engineer Location Hyderabad, Bangalore Desired Qualification B.Tech or BE Computers / MCA. Experience 8+ years ( Hands on Experience) Employment Type Full Time Certifications from CISSP, CEH, GCIH, OSCP, OSCE is a plus. Job Requirements Minimum 3 years experience working in a large-scale IT environment with focus on Cyber / Information Security. Areas of expertise should include Pre-Sales support, Service & Solution delivery, part of program management (Transition & Transformation). Key areas of expertise should include knowledge in SIEM, SOAR, Threat Hunting, EDR, Deception, NTA, NBAD, UEBA. 3+ years of hands-on experience on leading analytical platforms like Splunk, IBM QRadar, Hunters, Sumo Logic, Sentinel. Knowledge of other security technologies (such as Email Security Gateway, SOAR, IPS/IDS, Proxy, EDR, TI, DLP, CASB, PAM etc.) will be an added advantage. Deep understanding of Detection Engineering, MITRE ATT&CK Framework. Strong knowledge of OS (Linux, Windows) and Networking. Strong analytical and problem-solving skills. Staying up to date with IT/OT industry. Knowledge of Security Best Practices and Concepts. Seasoned in Digital Forensics, Malware Assessment, Incident Response and Threat Hunting. Good interpersonal skills clear communication, attentive & careful listening, empathetic behavior, being positive, supporting useful ideas & honest efforts of colleagues, being positive. Reliability and overall good communication skills both verbal and written. Capability to communicate and listen to needs from organizational or client stakeholders. Job Responsibilities Defining, Planning, and Implementing Cybersecurity Solutions. Conduct gap analysis in identifying and measuring the difference between the current state and the desired state of an organizations security posture. Possess detailed knowledge about requirement management and solution designing. Conduct technical, proof-of-concept (POC) demonstration to highlight solution ensuring alignment to organizational requirements. Translating technical solutions into business values in alignment with organizational objectives to enhance business efficiency. Respond to complex RFPs, delivering customized security solutions that meet client needs. Conduct thorough and meticulous design and implementation of security solutions across diverse industries. Conduct Competitive analysis, security workshops, technical briefing and executive presentations. Designing and presenting customized cybersecurity solutions that address specific client needs. Collaborate with cross-functional teams, to ensure end to end service delivery of Cybersecurity Solution as per client needs. Develop scenarios or use cases based on potential attacks on data relevant to the clients industry. Nice To Have Ethical hacking certifications or CISSP or GCIH or training is a major advantage. Thank You Emily Jha emily@netsach.co.in Netsach - A Cyber Security Company www.netsachglobal.com Show more Show less
Posted 23 hours ago
5.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Dear Candidate, TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. Role: Senior Analyst Experience Range: 5+ years Joining Location: Hyderabad Job Description: Must Have Skills: Thought leadership, critical thinking problem solver, strong organizational skills, report writing skills to senior level, ability to prioritize and multitask. Good understanding and hands-on experience Sentinel One EDR. Singularity XDR, Singularity iOS/iPad. Good to Have Skills: Good understanding and hands-on experience with common security systems, including IPS/IDS, EDR, DLP, authentication systems. Experience performing administration, implementation, configuration, upgrading, and policy creation. Singularity Data Lake and Purple AI, Explain how different levels of the hierarchy enable you to apply appropriate policies throughout your organization. Describe how policies work within Singularity. Experience in the detection and response to malicious activity using log data and alerts from cybersecurity solutions, systems, and network devices. Role Description: Thought leadership, critical thinking problem solver, strong organizational skills, report writing skills to senior level, ability to prioritize and multitask. Experience in the detection and response to malicious activity using log data and alerts from cybersecurity solutions, systems, and network devices. Regards, Priscilla Nancy HR TAG - Cyber Security Tata Consultancy Services Show more Show less
Posted 1 day ago
0 years
0 Lacs
Bengaluru, Karnataka, India
Remote
Do you want to be part of an inclusive team that works to develop innovative therapies for patients? Every day, we are driven to develop and deliver innovative and effective new medicines to patients and physicians. If you want to be part of this exciting work, you belong to Astellas! Astellas Pharma Inc. is a pharmaceutical company conducting business in more than 70 countries around the world. We are committed to turning innovative science into medical solutions that bring value and hope to patients and their families. Keeping our focus on addressing unmet medical needs and conducting our business with ethics and integrity enables us to improve the health of people throughout the world. For more information on Astellas, please visit our website at www.astellas.com . This position is based in Bangalore, India. At Astellas we recognize the importance of work/life balance, and we are proud to offer a hybrid working solution allowing time to connect with colleagues at the office with the flexibility to also work from home. We believe this will optimize the most productive work environment for all employees to succeed and deliver. Hybrid work from certain locations may be permitted in accordance with Astellas’ Responsible Flexibility Guidelines. Purpose And Scope As a Cyber Security Engineer, you will play a critical role in safeguarding our organization’s information systems and data. This position has arisen due to Astellas insourcing the responsibility for managing security operations, developing automation for threat detection, and working towards ‘best in industry’ incident response. The successful candidate will work collaboratively within the Security Operations Center (SOC) and other Value Teams across the organization to ensure a proactive security posture and to mitigate risks associated with cyber threats in several areas. Astellas has several roles that may fit candidates who do not have experience in all the areas outlined in the next section, therefore we encourage applicants who have experience in two or more areas listed below. Responsibilities And Accountabilities Security Operations Center (SOC) Management: Support daily SOC operations, ensuring effective monitoring support, development of use cases and response to security incidents. Manage application ingestion processes and email security protocols. Support SIEM management, including logging and alerting. Automation Development Develop and implement automation solutions for alerts from various security sources ensure firewalls, IDS and EDR tools are working effectively. Streamline processes to enhance the efficiency of security operations and help develop the communication with other team. Threat Modelling Conduct threat modelling for applications to identify vulnerabilities and recommend mitigation strategies. Analyze email tickets and develop tooling to improve response times and effectiveness. Provide route cause analysis for threat found and assist remediation. Anti-Malware And Endpoint Detection Assist in operational efforts to implement a global strategy for anti-virus (AV) solutions and optimize detection capabilities. Ensure consistent standards for endpoint detection and response across the organization. Incident Response Lead or support incident response efforts using an industry recognized model and report escalations to senior leadership when required. Collaborate with Red, Blue, and Purple teams to conduct penetration testing and improve security posture. Conduct forensic analysis to investigate security incidents and recommend improvements. Proactive Threat Hunting Engage in proactive threat hunting to identify potential security threats before they materialize. Collaborate with teams to enhance detection and response capabilities. Reporting And Data Analysis Engage in proactive collaboration across Value Teams working with an agile mindset and assist in the creation of dashboards and reporting for security governance. Assist in the governance of security within cloud infrastructure. Required Bachelor’s degree in Computer Science, Information Technology, Cyber Security, or a related field. Proven experience in a cyber security role, preferably within a SOC/SIEM/SOAR environment. Experience in using Microsoft Sentinel & Defender / Crowdstrike EDR / Wizz Cloud Security. Strong knowledge of security frameworks, threat modelling, and incident response methodologies. Awareness of infrastructure and network security features like; firewall rules, event ID’s, logging/detection and managing assets in manufacturing / OT environments. Experience of working with cloud security and insourced capabilities as well and MSP’s. Experience with SIEM/Cloud security tools and automation technologies.Familiarity with anti-malware solutions and endpoint detection strategies.Proficiency in scripting languages for automation (e.g., Python, PowerShell) is an advantage. Experience of digital forensics (log analysis and technical route cause assessment). Preferred Security certification an advantage. Demonstrate knowledge of change management principles Relevant certifications (e.g., Certified Information Systems Security Professional CISSP, Certified Ethical Hacker CEH or CompTIA Security+ etc.)Excellent analytical and problem-solving skills. Strong communication skills and the ability to work collaboratively in a small team environment where we share capacity and effort. International / global experience an advantage. Working Environment This is a Permanent position Remote/ Hybrid: candidates must be located within commutable distance from the office Astellas is a global company. Successful candidates will be expected to work across different time zones and according to regions or specific locations based upon demand Category Astellas is committed to equality of opportunity in all aspects of employment. EOE including Disability/Protected Veterans Show more Show less
Posted 1 day ago
2.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
Job Title SOC Analyst Level 1 (24/7 Rotational Shifts) Location Thane (In Office) Must be able to work night shifts and weekends on rotation. About Company We are a risk-driven cybersecurity firm that empowers businesses to grow securely. We deliver MSSP, threat-hunting, incident response, and advisory services across IT, OT, and cloud environments. Join our Security Operations Center (SOC) and help us protect organizations and sleep schedules around the globe. Role Purpose As a Level 1 SOC Analyst, you’ll be our first line of defense, monitoring real-time security alerts, performing initial triage, and kicking off incident response. Key Responsibilities Monitor security events from SIEM, EDR, NDR, and cloud platforms Perform initial triage and analysis of alerts to determine severity and impact Escalate validated incidents to L2/L3 teams as per defined SOPs and playbooks Assist in the containment of low-level threats (e.g., isolate endpoints, disable accounts) Enrich alerts with relevant threat intelligence and context Document incidents, investigations, and actions taken in ticketing systems Prepare daily shift reports and ensure accurate handovers Collaborate with team members during incident investigations Identify false positives and suggest rule tuning where necessary Participate in regular SOC drills and knowledge-sharing sessions Must-Have Qualifications 2-3 years of experience in a SOC, NOC, help desk, or IT security role Fundamental understanding of TCP/IP, Windows/Linux OS internals, and common attack vectors Familiarity with at least one SIEM platform (Splunk, QRadar, Elastic, etc.) Knowledge of MITRE ATT&CK and the incident response lifecycle Strong analytical mindset and a passion for “finding the needle before the haystack burns” Excellent written & verbal English communication skills Ability to work 247 rotating shifts (including nights, weekends, and public holidays) Nice-to-Have Extras CompTIA Security+, CEH, or equivalent entry-level cert Hands-on with SOAR playbooks, EDR (CrowdStrike, SentinelOne), or cloud security tools (AWS GuardDuty, Azure Sentinel) Scripting in Python/PowerShell for automation Experience in malware triage or phishing analysis What We Offer Competitive salary + night-shift allowances Access to our cyber-range and gamified red vs. blue exercises A collaborative culture where every alert you close saves someone’s day (and maybe their job) Reporting Line Reports to: SOC Manager – Operations Works closely with: L2 / L3 Analysts, Threat Intel, Incident Response, DevSecOps Teams Package: 4-5 Lacs P.A Location: Solus Offices, Hiranandani Estate, Thane, Mumbai. Contact on WhatsApp: 859 1211 600 Show more Show less
Posted 1 day ago
5.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. Role**: SOC/SIEM Admin Experience Range: 5+ years We are currently planning to do a Walk-In Interview at below locations : Date – 21st June 2025 (Saturday) Hyderabad - TCS Synergy Park Phase1, Premises No 2-56/1/36, Gachibowli, Opposite IIIT Hyderabad Campus, Seri Lingampally, RR District, Hyderabad, Telangana 500019 Chennai - TCS Siruseri ATL Building- 1/G1, SIPCOT IT Park Navalur, Siruseri, Tamil Nadu 603103 Job Description Role & Responsibilities: Monitor multiple security technologies such as SIEM, Antivirus, Vulnerability management, Web Proxy, Security Patch management. Tune/Create SIEM correlation rules. Perform in-depth incident and event analysis. Respond and handle the security incidents. Agree and align on reporting and monitoring requirements with business stakeholders. Conduct research on emerging security threats. Modify Standard Operating Procedures (SOPs) and training documentation. Coach junior team members. Good Knowledge on SIEM tools like QROC, Arcsight, SPLUNK or Sentinel. Knowledge and experience with PCs, LAN topologies, routers, hubs, and terminal servers Knowledge of security applications such as IDS, Security Event Management and anomaly detection tools. Knowledge of VPN technology. Knowledge of investigation tools like FTK imager, memory dump, threat analysis tools. Ability to read and interpret network diagrams. Show more Show less
Posted 1 day ago
5.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
Are you insatiably curious and do you lean into uncertainty, take risks, and learn quickly from Are you passionate about cybersecurity? Do you enjoy working on a high-performing, fast-paced sales team? Are you insatiably curious and do you lean into uncertainty, take risks, and learn quickly from your mistakes? If so, we are looking for you! The Microsoft Security organization’s mission of making the world a safer place has never been more important. As threats become more frequent and sophisticated, we should work to keep our customers safe through our Security Solutions. The Solution Specialist Unit team within the Microsoft Security organization is at the forefront of this effort, engaging directly with customers to contribute to their success. With thousands of global security experts worldwide, $1 billion+ invested annually in security research and development, and the cutting edge AI- based Security innovations, Microsoft is ideally placed to think outside of the box and protecting customers, and partners around the world. We are looking for passionate, experienced, and credible Security Solution Engineer with a drive to help solve complex security challenges for our customers, enabling them to help modernize their security architecture and posture. We are keen to hear your thoughts on how we can further achieve our purpose. Join our team and discover unique opportunities to grow, develop and learn. As a Security Solution Engineer , you will be a senior technical sales leader and trusted customer advisor, working with cutting-edge security technologies such as Microsoft M365 Defender, Defender for Cloud and Sentinel. You will lead a virtual team of other internal, partner and consulting resources to help map Microsoft solutions to customer security challenges and priorities, demonstrate and prove our solutions, and win the technical decision enabling the team to achieve and even exceed quarterly and annual revenue targets. You will spend 75% of your work hours a week on qualified customer work – planning and orchestration, preparation, meetings (technical presentations, demos, POCs, compete positioning, workshops, etc.), while the other 25% of your time will be focused on further growing your technical, industry and competition acumen. Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. Responsibilities You will be the primary technical point of contact for potential customers during the sales process, owning and driving technical win for security opportunities. Deep technical understanding of cloud security architectures, solutions/technologies including Microsoft M365 Defender, Defender for cloud and Sentinel. Coordinate weekly with sellers and manager to understand opportunities, compete scenarios and engagements to focus on, engaging and driving to own and win the technical decisions Remediate blockers; leads and ensures technical wins for Microsoft Security and adjacent technologies. Engages with and reaches out to customers proactively and independently; builds credibility with customers as a trusted advisor for Microsoft Security; and searches for and uses Microsoft Security customer references; and drives customer intent to buy and facilitates handoff to customer success for post sales deployment. Develop strategies and recommendations to improve the client's security posture, shapes technical win plan and tailors Microsoft messaging to audience for security opportunities. Enhances team capabilities for extended detection and response (XDR), zero trust and cloud security and develops differentiated compete strategies for Microsoft Security for assigned customers. Lead technical presentations, demonstrations, workshops, architecture design sessions, explain, demonstrate, and architect the solution to help solve customer security challenges and priorities. Demonstrates and oversees proof of concepts, presents and applies architecture patterns, proves capabilities and integration into customer environment, and drives cross-workload support for Microsoft solutions for security. Leverages insights and coaches' teams to align new or changing technology to customer security needs. This would mean hands on knowledge on product stack, ability to conduct PoC and pilot by themselves when needed. A technical specialist is responsible for engaging with other teams within and outside the organization throughout the sales cycle. Engaging partners in sell-with scenarios and supporting their technical capabilities is key to scaling solution delivery. You will stay sharp, share your knowledge and best practices enabling further scale and growth for the security business. You would spend 20% of your work hours maintaining deep theoretical and experiential technical knowledge of MS security solutions, competitive landscape and industry trends. As a technical specialist you would document and share best practices and learning with others enabling and contributing to the success of others on your team Share knowledge and learnings with partners to drive the sale, deployment, and adoption of Microsoft solutions. Completes required training and obtains relevant product and role certifications aligned to the role and workload/industry. Other Embody our culture and values Qualifications 5+ years of Security Technology pre-sales or Security Technology consulting experience. OR Bachelor's Degree in Computer Science, Information Technology, or related field AND 4+ years of technical pre-sales or technical consulting experience. OR Master's Degree in Computer Science, Information Technology, or related field AND 3+ years of technical pre-sales or technical consulting experience OR equivalent experience. Experience with Microsoft security solutions (M365 Defender, Defender for Cloud, Sentinel) or, one or more related technologies such as Prisma Cloud, Crowdstrike, Proofpoint, Splunk, etc. Experience presenting the value of technology solutions and architectures through customer presentations, design sessions, POCs accelerating technical wins. Preferred Qualifications 8+ years technical pre-sales, technical consulting, or technology delivery, or related experience OR equivalent experience. 6+ years experience with cloud and hybrid, or on premises infrastructures, architecture designs, migrations, industry standards, and/or technology management. Certification in relevant technologies or disciplines (e.g., Office 365, Power BI, Azure Architect and Development exams, Cloud Platform Technologies, Information Security, Architecture). Certification in Microsoft 365 Security Administration or Azure Security One or more of Industry certifications such as CISSP, CCSP, iAPP, etc. Hands on technical knowledge of relevant products and solutions, but not limited to: Security Information and Event Management (SIEM) systems Next Gen Web Application Firewalls and Secure Web Gateways. Threat detection technologies Log analysis and Incident Response Cloud security technologies, architectures and concepts such as Zero Trust, cloud security posture management, cloud workload protection, Cloud code security and Cloud infrastructure entitlement management. Cloud Computing: Infrastructure as a service (IaaS), Platform as a Services (PaaS), and Software as a service. Demonstrated knowledge and understanding of one or more cloud security standards and frameworks such as CIS, NIST, CSA, etc. Technical Sales Acumen: Experience presenting the value of technology solutions and architectures through customer presentations, design sessions, POCs accelerating technical wins. Expertise in extended detection and response (XDR), zero trust and cloud security solutions & architectures Professional interpersonal skills, with the ability to present technical information clearly and concisely. Develop and maintain technical expertise: A technical specialist should stay up to date with the latest developments and advancements in security space including new tech, competitors, and internal product and services offerings. Growth Mindset. Experience and passion for learning (technical and professional skills); implementing practices from others; trying, failing, and learning from both successes and failures; sharing practices and knowledge for others’ benefit. Problem Solving: Excellent analytical and problem-solving skills, with the ability to think creatively and develop innovative solutions to technical challenges. Multi-Tasking: Ability to work independently and manage multiple priorities simultaneously. Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations. Show more Show less
Posted 1 day ago
11.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world. The team will be responsible for building and maintaining the core infrastructure and services that form the Control Plane of Microsoft Sentinel Graph (MSG). This crucial mission supports Microsoft's Security business, meeting the immense scale demands that few companies in the industry face. By leveraging cutting-edge technologies, we aim to deliver comprehensive protection to a global user base. The MSG Foundations Engineering team leads the development and end-to-end implementation of infrastructure solutions, focusing on customer scenarios to enable high-volume big-data ingestion and interactive analytics for advanced security threat hunting, detection, and prevention. You will take charge of determining and developing architectural strategies and infrastructure solutions, conducting business reviews, and operating our production services. Collaboration will be essential as you work closely with other engineering teams to ensure that our services and systems are highly stable, performant, and meet the expectations of both internal and external customers and users. Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. Responsibilities We are looking for fast-learning, highly motivated, creative and analytical Software Engineer Manager. In this position, you will collaborate with other security engineering disciplines to plan, architect, design, implement, and validate security products and features. In addition to strong technical skills, you should have a passion for innovation and software quality. You must be comfortable with the fast-paced security industry by courageously exploring uncharted territories and thinking ahead of highly sophisticated attackers. You will be responsible for conducting investigations and investing in complex areas, designing and delivering features end to end - including system architecture, coding, deployment, scaling, performance, and quality from conception to delivery. Responsibilities include: Working closely with peers, partners, and building diverse and high-performing teams. Designing and implementing scalable, reliable, and maintainable services. Demonstrating strategic understanding of the timing and rationale for design choices within the scope of work. Consistently contributing key ideas to the product or service design and vision that meets customer needs. Applying metrics to drive the quality and stability of code. Having a sense of pride, commitment, and personal accountability for service quality, completeness, and resultant user experience throughout the product or service lifecycle. Working closely with a geographically distributed team, including Product Managers and developers, to drive key improvements in backend Engineering Systems. We are looking for someone who shares our passion for building great software for enterprises. You will work on a forward-looking product as part of an agile, collaborative, and cross-discipline team. Qualifications Required/Minimum Qualifications : - Bachelor's, Master's, or Ph.D. in Computer Science Engineering, or an equivalent field. 11-15 years of software development experience. 3+ years of experience in managing and building teams. Strong problem-solving skills, along with excellent coding and debugging abilities. Good communication and cross-group collaboration skills. Prior expertise in platform components & services, cloud infrastructure-as-code (e.g. Azure, AWS etc.), aspects is a plus Prior domain expertise in security or antimalware software is a plus. Other Requirements- Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter. Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud Background Check upon hire/transfer and every two years thereafter. - You’ve led – you have experience leading a team of engineers by setting clear expectations, keeping team members energized, and delivering great results. - You collaborate – you can explain your work, you can ask great questions, you can listen to your peers and your customers, you can influence without authority, and you like to give and receive feedback. - You stay focused – you want to ship software that solves real problems for real people, now. - You’re a professional – you understand that it’s not enough to write working code. It must also be well-designed, easy to test, and easy to add to over time. - You’re learning – no matter how much you know, you are always seeking to learn more and to become a better engineer and leader. #MSFTSecurity MSFTSecurity Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations. Show more Show less
Posted 2 days ago
3.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
Saint-Gobain group through its group company Grindwell Norton Limited has established INDEC - an International Delivery Center in Mumbai to provide IT solutions and services to the groups’ businesses Globally. INDEC is currently organized into INDEC Application Development, INDEC Infrastructure Management and Cyber Security Management. While INDEC Apps specializes in Software application development and maintenance services (ADM), INDEC Infra specializes in monitoring and managing the key IT infrastructure assets of the group deployed globally across 70 countries worldwide. INDEC provides IT Services and Solutions to the Saint-Gobain group through its state-of-the-art delivery centers based at Andheri – East in Mumbai. There are approximately 1200+ associates working in INDEC currently. INDEC Apps provides software application development and maintenance services across a wide spectrum covering SAP, Java, PHP, .Net, CRM, Mobility, Digital, Artificial Intelligence (AI), and Robotic Automation. INDEC Infra on the other hand operates the following service lines: Network Coordination Center (NCC/NOC), Data Center Infrastructure Support, IT Standards, Tools Engineering and Reporting Automation. INDEC Cybersecurity provides 24/7 Security monitoring to detect & react on any suspicious activity in Saint- Gobain. It provides services on vulnerability scanning, web application firewall, endpoint protection, strong authentication, digital certificate, Win 10 MBAM and SFTS support . Key Responsibiitie s:• Evaluate and enhance the performance of SIEM/SOAR systems to ensure optimal threat detection and incident respons e.• Develop and maintain automation scripts and playbooks to streamline incident detection, analysis, and response processes. Leverage SOAR capabilities to reduce manual intervention and improve response time s.• Oversee the day-to-day administration of SIEM/SOAR platforms, ensuring their availability, reliability, and security. Perform regular updates, patches, and configuration change s.• Collaborate with the Incident Response team to ensure seamless integration of detection and response functions. Provide support during security incidents to ensure timely and effective remediatio n.• Work closely with other IT and security teams to develop specific use cases and to enhance the overall security posture of the organization. Share insights and recommendations to improve overall cybersecurity postur e.• Maintain detailed documentation of automation, scripts, and improvemen t.• Manage execution of standard procedures for the administration, content management, change management, version/patch management, and lifecycle management of the SIEM/SOAR platform s.• Manage technical documentation around the content deployed to the SIEM/SOA R.• Manage reports, dashboards, metrics for CyberSOC KPIs and presentation to senior management & other stakeholde rs Qualificat on:• Bachelor's degree in Computer Science, Information Security, EXTC or related fie ld.• Relevant certifications (e.g., CISSP, CCSP, CompTIA Security+) are highly desirab le.• Proven experience (3+ years) working within the Cybersecurity field, with a focus on security platform implementation & administrati on.• Experience with deploying and managing a large SIEM/SOAR environme nt.• Experience with Palo Alto XDR and/or other SIEM platforms like Sentinel, Qradar, Splunk, ArcSight, e tc.• Experience with Palo Alto XSOAR and/or equivalent SOAR Platforms like Resilient, Phantom, e tc.• Proficiency in scripting languages (e.g., Python, Bash) for automation and customization of security processes is highly desirab le. Functional Skills/Competenc ies:• Has a systematic, disciplined, and analytical approach to problem solv ing.• Excellent ability to think critically under press ure.• Strong communication skills to convey technical concepts clearly to both technical and non- technical stakehold ers.• Willingness to stay updated with evolving cyber threats, technologies, and industry tre nds.• Capacity to work collaboratively with cross-functional teams, developers, and management to implement robust security measu res. SELECTION PRO CESS:Interested Candidates are mandatorily required to apply through this listing on Jigya. Only applications received through Jigya will be evaluated fur ther.Shortlisted candidates may be required to appear in an Online Assessment administered by Jigya on behalf of Saint-Gobain INDECCandidates selected after the screening test will be interviewed by Saint-Gobain INDEC Show more Show less
Posted 2 days ago
5.0 - 7.0 years
7 - 8 Lacs
Cochin
On-site
Experience: 5- 7 year(s) Experience in cybersecurity, DevSecOps, or security operations. Knowledge of firewalls, intrusion detection/prevention systems, endpoint protection, and log management. Experience performing security incident response and forensic analysis. Solid experience with CI/CD tools and pipeline security integration. Strong understanding of cloud platforms (AWS, Azure, or GCP) and cloud security best practices. Hands-on experience with security tools: static/dynamic analysis, container scanners, secrets scanners. Experience with scripting languages (Python, Bash, PowerShell) for automation. Familiarity with regulatory standards (SOC2, NIST, PCI-DSS, HIPAA). Integrate security tools and practices into CI/CD pipelines (e.g., GitLab CI, Jenkins, GitHub Actions). Automate security scanning (SAST, DAST, SCA, IaC scanning) and enforce policies in build/deployment stages. Work with development and operations teams to implement security controls in cloud and on-prem environments. Harden infrastructure and container images using tools like Ansible, Packer, Terraform, and Docker. Implement and manage Infrastructure-as-Code (IaC) securely using Terraform, CloudFormation, etc. Monitor, detect, and respond to security events using SIEM (e.g., Splunk, Sentinel, or ELK). Perform vulnerability assessments and coordinate remediation efforts with IT and engineering teams. Support incident response processes and investigations. Bachelor’s degree in engineering discipline such as Computer Science, Cybersecurity, or related field. If you are interested in any of the positions mentioned above, Please attach your updated resume to resume@calpinetech.com with an email explaining the position you are looking for, your career goals and your expected salary. Please indicate the job code in the subject line of your email.
Posted 2 days ago
5.0 years
0 Lacs
Hyderābād
On-site
We are seeking a highly capable Azure Engineer with a strong software development background and deep expertise in Cloud Back-End (BE) baseline architecture . This role is ideal for someone who can design, build, and manage scalable, secure, and high-performing back-end services in Microsoft Azure. The ideal candidate will have hands-on experience with cloud-native application development, microservices architecture, and infrastructure automation. Key Responsibilities: Design and develop back-end cloud services using Azure-native technologies (App Services, Functions, API Management, Service Bus, Event Grid, etc.). Implement scalable and secure cloud architectures aligned with Azure well-architected framework. Build APIs and microservices leveraging .NET or Node.js or Python, or similar technologies. Ensure cloud back-end performance, reliability, and monitoring using Azure Monitor, App Insights, and Log Analytics. Collaborate with DevOps, security, and front-end teams to ensure seamless integration and CI/CD automation. Define and enforce coding standards, version control, and deployment strategies. Implement and maintain cloud governance, cost optimization, and security best practices. Provide support and troubleshooting for production issues in Azure environments. Required Skills& Experience: 5+ years of professional experience in software development and cloud engineering. Strong development skills in .NET Core or C# or Python or Node.js or Java. Deep expertise in Azure services relevant to back-end architecture (Functions, Key Vault, API Management, Cosmos DB, Azure SQL, etc.) Strong understanding of microservices architecture, containerization (Docker), and Kubernetes(AKS). Hands-on experience with Azure DevOps, GitHub Actions, or similar CI/CD tools. Solid grasp of Azure identity and access management, including RBAC and Managed Identities. Experience with unit testing, integration testing, and automated deployments. About Loginsoft: For over 20 years, leading companies in Telecom, Cybersecurity, Healthcare, Banking, New Media, and more have come to rely on Loginsoft as a trusted resource for technology talent. From startups, to product and enterprises rely on our services. Whether Onsite, Offsite, or Offshore, we deliver. With a track record of successful partnerships with leading technology companies globally, and specifically in the past 6 years with Cybersecurity product companies, Loginsoft offers a comprehensive range of security offerings, including Software Supply Chain, Vulnerability Management, Threat Intelligence, Cloud Security, Cybersecurity Platform Integrations, creating content packs for Cloud SIEM, Logs onboarding and more. Our commitment to innovation and expertise has positioned us as a trusted player in the cybersecurity space. Loginsoft continues to provide traditional IT services which include Software development & Support, QA automation, Data Science& AI, etc. Expertise in Integrations with Threat Intelligence and Security Products: Built more than 200+ integrations with leading TIP, SIEM, SOAR, and Ticketing Platforms such as Cortex XSOAR, Anomali, ThreatQ, Splunk, IBM QRadar& Resilient, Microsoft Azure Sentinel, ServiceNow, Swimlane, Siemplify, MISP, Maltego, Cryptocurrency Digital Exchange Platforms, CISCO, Datadog, Symantec, Carbonblack, F5, Fortinet, and so on. Loginsoft is a partner with industry leading technology vendors Palo Alto, Splunk, Elastic, IBM Security, etc. In addition, Loginsoft offers Research as a service: We're more than just experts in cybersecurity; we're your accredited in-house research team focused on unraveling the complexities of cybersecurity and future technologies. From Application Security to Threat Research, our seasoned professionals have cultivated expertise in every facet of the field. We've earned the trust of over 20 security platform companies, who count on our research and analysis to strengthen their cybersecurity solutions. Job Overview Hyderabad, India 5+ Years Exp Full-Time Position
Posted 2 days ago
5.0 years
0 Lacs
Hyderābād
On-site
We are looking for a highly skilled DevOps Engineer with hands-on experience managing and deploying Azure Policies in multi-tenant environments. The ideal candidate will have a deep understanding of Azure governance, compliance, and infrastructure automation to help enforce organizational standards and ensure secure, compliant Azure deployments. Key Responsibilities: Design, deploy, and manage Azure Policies, Initiatives, and Blueprints across multiple Azure tenants . Collaborate with Cloud Security, Networking, and Application teams to enforce security, cost, and operational policies. Automate policy compliance monitoring and remediation using Azure Policy, Azure Monitor, and Log Analytics. Integrate policy deployment with CI/CD pipelines using tools like Azure DevOps, GitHub Actions, or Jenkins. Provide governance recommendations and ensure alignment with Azure Well-Architected Framework. Troubleshoot policy conflicts, evaluate policy impact, and support ongoing improvements to the cloud governance model. Maintain documentation and change management for policy lifecycle. Required Skills& Experience: 5+ years of experience in a DevOps Engineering Strong hands-on experience with Azure Tenant environments Hands on Azure Policy, Management Groups, Subscriptions. Solid understanding of Azure governance, security best practices, and policy compliance. Familiarity with CI/CD pipelines and tools (Azure DevOps, GitHub Actions, etc.). Experience working in enterprise Azure environments with multiple tenants/subscriptions. About Loginsoft: For over 20 years, leading companies in Telecom, Cybersecurity, Healthcare, Banking, New Media, and more have come to rely on Loginsoft as a trusted resource for technology talent. From startups, to product and enterprises rely on our services. Whether Onsite, Offsite, or Offshore, we deliver. With a track record of successful partnerships with leading technology companies globally, and specifically in the past 6 years with Cybersecurity product companies, Loginsoft offers a comprehensive range of security offerings, including Software Supply Chain, Vulnerability Management, Threat Intelligence, Cloud Security, Cybersecurity Platform Integrations, creating content packs for Cloud SIEM, Logs onboarding and more. Our commitment to innovation and expertise has positioned us as a trusted player in the cybersecurity space. Loginsoft continues to provide traditional IT services which include Software development & Support, QA automation, Data Science& AI, etc. Expertise in Integrations with Threat Intelligence and Security Products: Built more than 200+ integrations with leading TIP, SIEM, SOAR, and Ticketing Platforms such as Cortex XSOAR, Anomali, ThreatQ, Splunk, IBM QRadar& Resilient, Microsoft Azure Sentinel, ServiceNow, Swimlane, Siemplify, MISP, Maltego, Cryptocurrency Digital Exchange Platforms, CISCO, Datadog, Symantec, Carbonblack, F5, Fortinet, and so on. Loginsoft is a partner with industry leading technology vendors Palo Alto, Splunk, Elastic, IBM Security, etc. In addition, Loginsoft offers Research as a service: We're more than just experts in cybersecurity; we're your accredited in-house research team focused on unraveling the complexities of cybersecurity and future technologies. From Application Security to Threat Research, our seasoned professionals have cultivated expertise in every facet of the field. We've earned the trust of over 20 security platform companies, who count on our research and analysis to strengthen their cybersecurity solutions. Job Overview Hyderabad, India 5+ Years Exp Full-Time Position
Posted 2 days ago
20.0 years
0 Lacs
Hyderābād
On-site
We are seeking a highly skilled and motivated Cloud Security Engineer with a strong background in security research, operations, and assurance, along with cloud architecture expertise. The role involves implementing security controls, conducting in-depth assessments of cloud services, and identifying secure configurations and misconfigurations across enterprise cloud environments. You will work closely with development, DevOps, and security teams to ensure that cloud infrastructure meets industry and organizational security standards. Key Responsibilities: Implement cloud-native and third-party security controls across AWS, Azure, and/or GCP environments. Conduct detailed security assessments of cloud services (IaaS, PaaS, SaaS) to ensure compliance with internal policies and industry frameworks. Identify and remediate secure misconfigurations and vulnerabilities using automated scanning and manual inspection techniques. Collaborate with cloud architects and security engineers to design and recommend secure infrastructure patterns. Stay updated with evolving cloud threats and vulnerabilities, and contribute to threat modeling and risk assessments. Develop scripts and tools to automate security monitoring and compliance validation. Document findings, remediation guidance, and contribute to security standards development. Required Skill Set: Technical Expertise: Strong knowledge of cloud platforms: AWS, Azure, or GCP Hands-on experience with CSPM (Cloud Security Posture Management) tools and cloud-native security services Deep understanding of IAM, encryption, network security, and data protection within cloud environments Experience with CI/CD security integration and DevSecOps practices Familiarity with security standards such as CIS Benchmarks, NIST, ISO 27001 Security Domains: Security Research: Ability to evaluate and analyze security trends, tools, and techniques Security Operations: Incident detection, log analysis, SIEM tools, and response processes Security Assurance: Risk assessments, compliance audits, and policy enforcement Cloud Architecture: Knowledge of secure cloud design patterns and service integrations Tools & Languages: Tools: Prisma Cloud, Wiz, AWS Security Hub, Azure Defender, GCP Security Command Center Scripting: Python Soft Skills: Strong analytical and problem-solving abilities Excellent verbal and written communication skills Team player with cross-functional collaboration experience Ability to manage priorities in a fast-paced environment About Loginsoft: For over 20 years, leading companies in Telecom, Cybersecurity, Healthcare, Banking, New Media, and more have come to rely on Loginsoft as a trusted resource for technology talent. From startups, to product and enterprises rely on our services. Whether Onsite, Offsite, or Offshore, we deliver. With a track record of successful partnerships with leading technology companies globally, and specifically in the past 6 years with Cybersecurity product companies, Loginsoft offers a comprehensive range of security offerings, including Software Supply Chain, Vulnerability Management, Threat Intelligence, Cloud Security, Cybersecurity Platform Integrations, creating content packs for Cloud SIEM, Logs onboarding and more. Our commitment to innovation and expertise has positioned us as a trusted player in the cybersecurity space. Loginsoft continues to provide traditional IT services which include Software development & Support, QA automation, Data Science& AI, etc. Expertise in Integrations with Threat Intelligence and Security Products: Built more than 200+ integrations with leading TIP, SIEM, SOAR, and Ticketing Platforms such as Cortex XSOAR, Anomali, ThreatQ, Splunk, IBM QRadar& Resilient, Microsoft Azure Sentinel, ServiceNow, Swimlane, Siemplify, MISP, Maltego, Cryptocurrency Digital Exchange Platforms, CISCO, Datadog, Symantec, Carbonblack, F5, Fortinet, and so on. Loginsoft is a partner with industry leading technology vendors Palo Alto, Splunk, Elastic, IBM Security, etc. In addition, Loginsoft offers Research as a service: We're more than just experts in cybersecurity; we're your accredited in-house research team focused on unraveling the complexities of cybersecurity and future technologies. From Application Security to Threat Research, our seasoned professionals have cultivated expertise in every facet of the field. We've earned the trust of over 20 security platform companies, who count on our research and analysis to strengthen their cybersecurity solutions. Job Overview Hyderabad, India 10+ Years Exp Full-Time Position
Posted 2 days ago
2.0 - 3.0 years
0 Lacs
Bengaluru
On-site
Description The opportunity: Join our dynamic Threat Intelligence and Detection Engineering (TIDE) team within Cyber Operations, dedicated to safeguarding critical infrastructure. Work alongside motivated professionals in a collaborative environment, leveraging cutting-edge technologies, automation, and innovative GenAI solutions. You'll have opportunities to expand your professional network across various cybersecurity disciplines, including Cyber Defense Center (CDC), Vulnerability Management (VMAD), and Architecture & Engineering (A&E). We prioritize enthusiasm, creativity, and passion for continuous learning over extensive experience. You should be curious, innovative, and excited to explore emerging cybersecurity approaches. How you’ll make an impact: Develop and implement detection engineering content, automation, and integrations across IT/OT environments. Enhance our Security Orchestration, Automation, and Response (SOAR) platform by developing additional integrations and response automations. Incorporate cutting-edge GenAI technologies into operational processes. Build and maintain detection baselines tailored to evolving threats and business-specific use cases. Collaborate closely with Incident Response and Threat Intelligence teams to continuously refine detection capabilities. Conduct proactive technical analyses post-incident to improve operational effectiveness and response efficiency. Monitor cybersecurity trends, emerging threats, and innovative technologies, applying insights to enhance detection and response strategies. Support evaluations and integration of new cybersecurity tools and platforms. Foster continuous improvement initiatives in tooling, automation, and operational processes. Responsible to ensure compliance with applicable external and internal regulations, procedures, and guidelines. Living Hitachi Energy’s core values of safety and integrity, which means taking responsibility for your own actions while caring for your colleagues and the business. Your background: Bachelor's or master’s degree in relevant field. A minimum of 2-3 years in cybersecurity (OT/IT), emphasizing operational procedures in threat monitoring and incident management. A grasp of the IT/OT Threat Landscape. Proficiency in threat detection engineering automation, including the entire Use Case lifecycle. Hands-on experience or strong interest in Microsoft Azure security solutions, particularly Azure Sentinel, including developing detection rules and automations using Kusto Query Language (KQL). Familiarity with Azure cloud infrastructure and enthusiasm for leveraging cloud-native technologies in detection engineering and security monitoring. Hands-on experience with security tech, like firewalls, anomaly detection tools, EDR, and IDS. A foundational understanding of security standards and frameworks such as NIST, CIS, MITRE ATT&CK, and the Cyber Kill Chain. Experience in roles such as SOC, CSIRT, or CSOC would be advantageous. Effective communication skills, allowing you to articulate security issues to peers, stakeholders, and clients. Proficiency in both spoken & written English language is required and German language skills would be a significant asset. Qualified individuals with a disability may request a reasonable accommodation if you are unable or limited in your ability to use or access the Hitachi Energy career site as a result of your disability. You may request reasonable accommodations by completing a general inquiry form on our website. Please include your contact information and specific details about your required accommodation to support you during the job application process. This is solely for job seekers with disabilities requiring accessibility assistance or an accommodation in the job application process. Messages left for other purposes will not receive a response.
Posted 2 days ago
11.0 years
1 - 10 Lacs
Noida
On-site
Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world. The team will be responsible for building and maintaining the core infrastructure and services that form the Control Plane of Microsoft Sentinel Graph (MSG). This crucial mission supports Microsoft's Security business, meeting the immense scale demands that few companies in the industry face. By leveraging cutting-edge technologies, we aim to deliver comprehensive protection to a global user base. The MSG Foundations Engineering team leads the development and end-to-end implementation of infrastructure solutions, focusing on customer scenarios to enable high-volume big-data ingestion and interactive analytics for advanced security threat hunting, detection, and prevention. You will take charge of determining and developing architectural strategies and infrastructure solutions, conducting business reviews, and operating our production services. Collaboration will be essential as you work closely with other engineering teams to ensure that our services and systems are highly stable, performant, and meet the expectations of both internal and external customers and users. Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. Responsibilities We are looking for fast-learning, highly motivated, creative and analytical Software Engineer Manager. In this position, you will collaborate with other security engineering disciplines to plan, architect, design, implement, and validate security products and features. In addition to strong technical skills, you should have a passion for innovation and software quality. You must be comfortable with the fast-paced security industry by courageously exploring uncharted territories and thinking ahead of highly sophisticated attackers. You will be responsible for conducting investigations and investing in complex areas, designing and delivering features end to end - including system architecture, coding, deployment, scaling, performance, and quality from conception to delivery. Responsibilities include: Working closely with peers, partners, and building diverse and high-performing teams. Designing and implementing scalable, reliable, and maintainable services. Demonstrating strategic understanding of the timing and rationale for design choices within the scope of work. Consistently contributing key ideas to the product or service design and vision that meets customer needs. Applying metrics to drive the quality and stability of code. Having a sense of pride, commitment, and personal accountability for service quality, completeness, and resultant user experience throughout the product or service lifecycle. Working closely with a geographically distributed team, including Product Managers and developers, to drive key improvements in backend Engineering Systems. We are looking for someone who shares our passion for building great software for enterprises. You will work on a forward-looking product as part of an agile, collaborative, and cross-discipline team. Qualifications Required/Minimum Qualifications : - Bachelor's, Master's, or Ph.D. in Computer Science Engineering, or an equivalent field. 11-15 years of software development experience. 3+ years of experience in managing and building teams. Strong problem-solving skills, along with excellent coding and debugging abilities. Good communication and cross-group collaboration skills. Prior expertise in platform components & services, cloud infrastructure-as-code (e.g. Azure, AWS etc.), aspects is a plus Prior domain expertise in security or antimalware software is a plus. Other Requirements- Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter. Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud Background Check upon hire/transfer and every two years thereafter. - You’ve led – you have experience leading a team of engineers by setting clear expectations, keeping team members energized, and delivering great results. - You collaborate – you can explain your work, you can ask great questions, you can listen to your peers and your customers, you can influence without authority, and you like to give and receive feedback. - You stay focused – you want to ship software that solves real problems for real people, now. - You’re a professional – you understand that it’s not enough to write working code. It must also be well-designed, easy to test, and easy to add to over time. - You’re learning – no matter how much you know, you are always seeking to learn more and to become a better engineer and leader. #MSFTSecurity MSFTSecurity Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations.
Posted 2 days ago
0 years
0 Lacs
Mumbai Metropolitan Region
On-site
Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Senior Associate Collaboration Technical Services (TS) Systems Integration Specialist is a developing subject matter expert, responsible for ensuring that client solution requirements are resolved in line with Service Level Agreements (SLAs). This role performs configurations, actions installations and attends to break/fix events. This role works towards associate to professional level certification, whilst at the same time developing business knowledge. What You'll Be Doing Key Responsibilities: Owns larger portions of an installation, break/fix incidents at a low to medium level of complexity during project lifecycle Takes responsibility for problem resolution and troubleshooting during project lifecycle Escalates complex problems to the relevant third parties. Assists with the documentation of standard operating procedures relating to installations and fixes during ops handover Compiles and maintains project administration (Time Capture and feedback to stakeholders) Conducts elementary presentations within the customer's organization. Expected to take leadership from senior resources on relevant technologies according to specialization and best practice. Performs any other related task as required. Knowledge and Attributes: Developing fundamental project and administration ability Developing understanding and appreciation of technical design principles and compute layers. Ability to develop an understanding of fundamental project and administration processes. Display a strong learning orientation. Good verbal communication skills. Demonstrate a client service orientation. Hands-on proactive in approach. Knowledge on security concepts and application of those concepts. Ability in configuring/managing security controls, such as SIEM, Firewall, IDS/IPS, EDR, NDR, UTM, Proxy, SOAR, Honeypots, decoys, and other security tools. Developing knowledge on log collection mechanism such as Syslog, Log file, DB API. Developing knowledge in security architecture. Developing knowledge on log collection mechanism such as Syslog, Log file, DB API. Developing knowledge in security architecture. Developing knowledge in ETL concepts, data processing at scale and data stream pipelines through Terraform. Ability in cloud services on at least one of the following providers: AWS, Azure, GCP. Developing knowledge web service protocols and frameworks for high-availability, low-latency, resiliency, and auto-scaling. Developing understanding any of the following - Java, Python, TypeScript, JavaScript, R, .NET, PowerShell. Developing knowledge in serverless development. Analytical skills and ability to communicate effectively. Ability to solve problems in innovative ways while adhering to industry standards and practices. Developing understanding practices on securing data and systems by applying appropriate authentication and authorization controls. Developing understanding of Event Driven Development and asynchronous operations. Developing understanding project fundamentals which are demonstrated in the execution of installations and other assignments. Developing knowledge of security technologies and understanding of managed services concepts Academic Qualifications and Certifications: Bachelor's degree or equivalent in Information Technology or Computing or a related field. Vendor certification is mandatory. Azure Certified Security Engineer / PCNSA / FCA / CCNA Security. Cloud Security certifications and certifications like AZ-500, SC-200, Security+, CEH, CISSP, CISM or similar Certification in different networking technologies such as CCDP /CCNP Security, JNCIA, ACCA, PCNSE, PCNSA, FCP, CCSA, ITIL, Azure Security Engineer, Azure Certified DevOps Engineer, Azure Certified Network Engineer, Azure Administrator Associate, will be an advantage. Certifications relevant to the services provided (certifications carry additional weightage on a candidate’s qualification for the role) Terraform, Azure, Sentinel, EDR Defender for Cloud, Microsoft Security, Devops Ci/CD Pipelins, Azure Governance (Defender for Cloud, Azure Policies, Secure Score and Compliance), Version Control (Git), Microservices (Kubernetes, Azure Containers), Azure / AWS/ GCP Infrastructure (IaaS, PaaS, SaaS), Azure Infrastructure as Code, Azure Administration, Hybrid Cloud, Networking (Firewalls, LAN, VPN), Automation, MS Office365, Power BI Administration, Scripting (PowerShell), ZTNA. Required Experience: Moderate level experience in SOC Analysis Operations. Moderate level experience in SIEM usage for Moderate level experience in Azure or AWS or GCP. Moderate level experience in Security technologies like Firewall, IPS, IDS, Proxy etc. Moderate level experience in technical support to clients. Moderate level experience in handling security incidents end to end. Moderate level experience in Security Analysis or Engineering Moderate level experience in configuring/managing security controls, such as SIEM, Firewall, IDS/IPS, EDR, NDR, UTM, Proxy, SOAR, Honeypots, and other security tools. Workplace type: On-site Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today. Show more Show less
Posted 2 days ago
0 years
0 Lacs
Jaipur, Rajasthan, India
On-site
Must have hands-on working on SIEM Implementation Projects(any two of the below in order of preference) • LogRhythm • FortiSIEM • ArcSight • Splunk/Securonix/Azure Sentinel 3. Experience in Installation, Configuration and Troubleshooting of various SIEM Components. 4. Experience in Supported and Non-Supported Devices Integration with SIEM. 5. Experience in Custom parser Development(Regex based and SQL based) 6. Experience in SIEM Architecture design and distributed Architecture Implementation. 7. Experience in design, Implement, Finetune SIEM Usecases(Cross Corelated Usecases, Threat Based Usecases and Mitre based Usecases) 8. Experience in UEBA – Integrations and Usecases 9. Experience working in a large team and customer facing role. 10. Experience deploying standard SOAR playbooks deployment. 11. Knowledge on Python or PowerShell scripting and APIs. 12. Knowledge on various Cloud Components and relevant functionality and logging(Ex: S3 Bucket, Event Hub, Cloudtrail, Cloudwatch etc.) 13. Should have OEM Certifications in SIEM 14. Security Certifications – CEH, Comptia Security+ or Similar. Roles and Responsibilities: 1. Engage with Customers during the project lifecycle as Technical SPOC and ensure the Implementation is done smoothly. 2. Coordinate internally and customer teams for technical requirements and issues resolutions. 3. Work on device onboarding, Usecases creation, Parser development which are part of project scope and success criteria 4. Technical SPOC for customer meetings, BRM sessions and other workshops held during the project lifecycle. 5. Work on Internal SOC team for successful handover of the projects for SOC monitoring Go-live 6. Engage with Cross Functional teams for Cloud Logsources integration with SIEM. 7. Build project technical documentations including HLD, LLD and other technical documents. 8. Adhere to project delivery processes and Tata Communications internal processes for successful project delivery. 9. Publish weekly and daily status updates to Customer and work support TPM to send the weekly status reports. 10. Contribute to Threat Management practice development - SOPs, Developments, Automations etc. 11. Effectively collaborate with internal and external teams. 12. Support pre-sales for technical pointers and inputs. Show more Show less
Posted 2 days ago
5.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Greetings From TCS !! Position : SOC Analyst Experience : 5+ years Location : Walkin Interview on 21st June (saturday) at below locations : Hyderabad TCS Synergy Park Phase1 ,Premises No 2-56/1/36, Gachibowli, Opposite IIIT Hyderabad Campus, Seri Lingampally, RR District, Hyderabad, Telangana 500019 Chennai TCS Siruseri ATL Building- 1/G1, SIPCOT IT Park Navalur, Siruseri, Tamil Nadu 603103 Job Description : Monitor multiple security technologies such as SIEM, Antivirus, Vulnerability management, Web Proxy, Security Patch management. Tune/Create SIEM correlation rules. Perform in-depth incident and event analysis. Respond and handle the security incidents. Agree and align on reporting and monitoring requirements with business stakeholders. Conduct research on emerging security threats. Modify Standard Operating Procedures (SOPs) and training documentation. Coach junior team members. Good Knowledge on SIEM tools like QROC, Arcsight, SPLUNK or Sentinel. Knowledge and experience with PCs, LAN topologies, routers, hubs, and terminal servers Knowledge of security applications such as IDS, Security Event Management and anomaly detection tools. Knowledge of VPN technology. Knowledge of investigation tools like FTK imager, memory dump, threat analysis tools. Ability to read and interpret network diagrams. Oversight of facilitates for other offices in the UK and provide support and guidance where required. Ability to translate event analysis findings into new monitoring proposals. Remain flexible with 24/7 shift and task assignments Interested Candidates can share their CV to divya.jillidimudi1@tcs.com Regards, Divya Jillidimudi Show more Show less
Posted 2 days ago
7.0 - 12.0 years
11 - 16 Lacs
Mumbai
Work from Office
SUMMARY Our client is IT MNC part of one of the major insurance groups based out of Germany and Europe. The Group is represented in around 30 countries worldwide, with Over 40,000 people worldwide, focusing mainly on Europe and Asia. Our client offers a comprehensive range of insurances, pensions, investments and services by focusing on all cutting edge technologies majorly on Could, Digital, Robotics Automation, IoT, Voice Recognition, Big Data science, advanced mobile solutions and much more to accommodate the customers future needs around the globe thru supporting millions of internal and external customers with state of-the-art IT solutions to everyday problems & dedicated to bringing digital innovations to every aspect of the landscape of insurance. Job Location: Hiranandani Gardens, Powai, Mumbai Mode: Work from Office Requirements Key Responsibilities: : Business-Cybersecurity Alignment: o Work closely with business stakeholders, IT security teams, and cross-functional teams to ensure cybersecurity initiatives align with the organization’s broader business goals. o Translate business needs into technical security requirements that can be effectively executed by the security and IT teams. Risk Analysis & Security Assessments: o Conduct risk assessments in the context of hybrid IT environments (cloud, on-premises, and edge) to identify security gaps and vulnerabilities. o Collaborate with security teams to evaluate existing security controls and recommend solutions to mitigate identified risks, balancing business needs with security requirements. Cybersecurity Frameworks & Compliance: o Ensure that all business and technical security requirements comply with relevant regulatory compliance frameworks (e.g., NIST CSF, ISO 27001, GDPR, HIPAA). o Support audits and compliance assessments, identifying any gaps between current practices and regulatory standards. (must have) Security Process Improvement: o Identify opportunities for process improvements within the cybersecurity function, including streamlining security incident response, access management processes, and threat detection workflows. o Develop business cases for proposed security improvements, including cost-benefit analyses and risk assessments. The Business Analyst will have comprehensive responsibilities spanning multiple cybersecurity domains, and should have expertise in at least 5 of the following areas o SIEM Sentinel & Security Operations: Manage and optimize SIEM solutions, particularly Sentinel, for effective monitoring, incident detection, and security event correlation across hybrid environments. Collaborate with security operations teams to ensure proper configuration, tuning, and reporting within SIEM platforms to support proactive threat management. o Security Tools & Technology Integration: Work with security teams to implement and optimize security tools such as SIEM (e.g., Splunk, Microsoft Sentinel), EDR (e.g., CrowdStrike, MS Purview/Defender), SOAR platforms, CASB (Cloud Access Security Broker), and Threat Intelligence systems. Help define and document requirements for the integration of cybersecurity tools into the broader security ecosystem. o User Access Management (UAM) & RBAC: Work closely with identity and access management teams to ensure the implementation of UAM and RBACsystems that align with the organization's security policy and business requirements. Support the development of processes for managing user roles, privileges, and access rights across enterprise systems. o Cloud & Encryption Security: Ensure that security policies and controls are applied across both on-premises and cloud environments(AWS, Azure, Google Cloud), addressing challenges related to cloud security, data encryption, and access management. Collaborate with technical teams to implement strong encryption methods for data - in - transit, data-at-rest, and data-in-use in line with organizational security policies. o AI & ML in Cybersecurity: (Good to have) Contribute to the use of AI/ML technologies to enhance threat detection, anomaly identification, and predictive analytics within the organization’s security operations. Collaborate with data scientists and security teams to define requirements for AI/ML-based security models and incident response automation. o SOAR Integration & Incident Response: Assist with the integration of Security Orchestration, Automation, and Response (SOAR) solutions into the incident response lifecycle to streamline response times and automate repetitive tasks. Support the continuous improvement of incident response procedures and playbooks, ensuring a consistent, rapid, and efficient approach to security incidents. Benefits
Posted 3 days ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2