Home
Jobs

382 Sentinel Jobs - Page 11

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4.0 - 7.0 years

12 - 16 Lacs

Pune, Chennai, Bengaluru

Work from Office

Naukri logo

Role & responsibilities Security Architecture & Engineering Design and deploy secure network, infrastructure, and Azure cloud architectures using Defender for Cloud, Sentinel, Entra ID, and Purview. Select, integrate, and optimize security tools (SIEM/SOAR, firewalls, EDR, DLP). Embed security into DevOps/CI-CD pipelines via automation (Logic Apps, PowerShell, KQL). Security Operations & Incident Response Configure and tune detection rules and workbooks in Sentinel; build automated playbooks for common incidents. Lead triage, investigation, and root-cause analysis of alerts from Defender and Sentinel. Conduct proactive threat hunting, log review, and vulnerability assessments. Identity & Access Management Implement and manage Conditional Access, MFA, Privileged Identity Management, and RBAC in Entra ID. Enforce least-privilege principles and lifecycle policies across users, groups, and service identities. Governance, Risk & Compliance Maintain alignment with ISO 27001, NIST, CIS, PCI-DSS, and GDPR using Secure Score and Compliance Manager. Develop and enforce security policies, standards, and audit controls. Team Leadership & Collaboration Mentor SOC analysts and engineers, driving continuous improvement and knowledge sharing. Collaborate closely with IT, DevOps, and business units to integrate security into all projects.

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Driven by transformative digital technologies and trends, we are RIB and we’ve made it our purpose to propel the industry forward and make engineering and construction more efficient and sustainable. Built on deep industry expertise and best practice, and with our people at the heart of everything we do, we deliver the world's leading end-to-end lifecycle solutions that empower our industry to build better. With a steadfast commitment to innovation and a keen eye on the future, RIB comprises over 2,500 talented individuals who extend our software’s reach to over 100 countries worldwide. We are experienced experts and professionals from different cultures and backgrounds and we collaborate closely to provide transformative software products, innovative thinking and professional services to our global market. Our strong teams across the globe enable sustainable product investment and enhancements, to keep our clients at the cutting-edge of engineering, infrastructure and construction technology. We know our people are our success – join us to be part of a global force that uses innovation to enhance the way the world builds. Find out more at RIB Careers. Job Summary As part of the RIB team, you will embody our values of impact, aspiration, curiosity, and trust in everything you do. As a Cloud SecOps Engineer, you will play a key role in protecting the platforms used to deliver RIB's products within the Managed Services. The Cloud SecOps Engineer will be responsible for continuous security monitoring, threat detection, incident response, and security automation within Managed Services Product Portfolio. This role involves SIEM operations, vulnerability scanning, identity and access management, and endpoint security. The engineer will work closely with DevOps, SRE, Cloud Governance, and Application Security teams to enhance the security posture across Managed Services cloud environments. Key Responsibilities Security Monitoring & Incident Response Operate and manage SIEM solutions for real-time threat detection. Investigate security incidents, analyze logs, and escalate as needed. Work with DevOps/SRE teams on security incident containment and response. Security Automation & Orchestration (SOAR) Develop and implement security automation playbooks to streamline response. Support automated threat intelligence ingestion and response workflows. Identity & Access Management (IAM) Enforce least privilege access policies for cloud and IT environments. Assist in identity lifecycle management, MFA, and role-based access controls. Vulnerability & Risk Management Conduct vulnerability scans and misconfiguration assessments. Assist DevOps and SRE teams with security patching and risk remediation. Security Observability & Compliance Ensure security logs, alerts, and telemetry are properly integrated. Support audits and compliance initiatives for security best practices. Governance, Compliance, and Incident Response Align security operations with control frameworks (ISO 27001, GDPR, SOC 1, SOC2, CCM etc.). Work closely with CPSO., Cloud Governance, AppSec and Security Governance teams. Skills And Qualifications Bachelor's degree in cybersecurity, information security, or equivalent experience. Azure Security Engineer (AZ-500, SC-200, SC-300) 2+ years of experience in SecOps, cybersecurity, or cloud security roles. Strong understanding of SIEM solutions (e.g., Microsoft Sentinel, Splunk, QRadar, etc.). Experience with security automation (SOAR), scripting (Python, PowerShell), and incident response. Familiarity with IAM frameworks, cloud security best practices (Azure, AWS, etc.), and vulnerability management tools (Qualys, Tenable, etc.). Knowledge of DevOps, CI/CD security practices, and security control frameworks (ISO 27001, SOC1, SOC2, CIS etc.) RIB may require all successful applicants to undergo and pass a comprehensive background check before they start employment. Background checks will be conducted in accordance with local laws and may, subject to those laws, include proof of educational attainment, employment history verification, proof of work authorization, criminal records, identity verification, credit check. Certain positions dealing with sensitive and/or third party personal data may involve additional background check criteria. RIB is an Equal Opportunity Employer. We are committed to being an exemplary employer with an inclusive culture, developing a workplace environment where all our employees are treated with dignity and respect. We value diversity and the expertise that people from different backgrounds bring to our business. Come and join RIB to create the transformative technology that enables our customers to build a better world. Show more Show less

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Fatepura, Gujarat, India

On-site

Linkedin logo

Driven by transformative digital technologies and trends, we are RIB and we’ve made it our purpose to propel the industry forward and make engineering and construction more efficient and sustainable. Built on deep industry expertise and best practice, and with our people at the heart of everything we do, we deliver the world's leading end-to-end lifecycle solutions that empower our industry to build better. With a steadfast commitment to innovation and a keen eye on the future, RIB comprises over 2,500 talented individuals who extend our software’s reach to over 100 countries worldwide. We are experienced experts and professionals from different cultures and backgrounds and we collaborate closely to provide transformative software products, innovative thinking and professional services to our global market. Our strong teams across the globe enable sustainable product investment and enhancements, to keep our clients at the cutting-edge of engineering, infrastructure and construction technology. We know our people are our success – join us to be part of a global force that uses innovation to enhance the way the world builds. Find out more at RIB Careers. Job Summary As part of the RIB team, you will embody our values of impact, aspiration, curiosity, and trust in everything you do. As a Cloud SecOps Engineer, you will play a key role in protecting the platforms used to deliver RIB's products within the Managed Services. The Cloud SecOps Engineer will be responsible for continuous security monitoring, threat detection, incident response, and security automation within Managed Services Product Portfolio. This role involves SIEM operations, vulnerability scanning, identity and access management, and endpoint security. The engineer will work closely with DevOps, SRE, Cloud Governance, and Application Security teams to enhance the security posture across Managed Services cloud environments. Key Responsibilities Security Monitoring & Incident Response Operate and manage SIEM solutions for real-time threat detection. Investigate security incidents, analyze logs, and escalate as needed. Work with DevOps/SRE teams on security incident containment and response. Security Automation & Orchestration (SOAR) Develop and implement security automation playbooks to streamline response. Support automated threat intelligence ingestion and response workflows. Identity & Access Management (IAM) Enforce least privilege access policies for cloud and IT environments. Assist in identity lifecycle management, MFA, and role-based access controls. Vulnerability & Risk Management Conduct vulnerability scans and misconfiguration assessments. Assist DevOps and SRE teams with security patching and risk remediation. Security Observability & Compliance Ensure security logs, alerts, and telemetry are properly integrated. Support audits and compliance initiatives for security best practices. Governance, Compliance, and Incident Response Align security operations with control frameworks (ISO 27001, GDPR, SOC 1, SOC2, CCM etc.). Work closely with CPSO., Cloud Governance, AppSec and Security Governance teams. Skills And Qualifications Bachelor's degree in cybersecurity, information security, or equivalent experience. Azure Security Engineer (AZ-500, SC-200, SC-300) 2+ years of experience in SecOps, cybersecurity, or cloud security roles. Strong understanding of SIEM solutions (e.g., Microsoft Sentinel, Splunk, QRadar, etc.). Experience with security automation (SOAR), scripting (Python, PowerShell), and incident response. Familiarity with IAM frameworks, cloud security best practices (Azure, AWS, etc.), and vulnerability management tools (Qualys, Tenable, etc.). Knowledge of DevOps, CI/CD security practices, and security control frameworks (ISO 27001, SOC1, SOC2, CIS etc.) RIB may require all successful applicants to undergo and pass a comprehensive background check before they start employment. Background checks will be conducted in accordance with local laws and may, subject to those laws, include proof of educational attainment, employment history verification, proof of work authorization, criminal records, identity verification, credit check. Certain positions dealing with sensitive and/or third party personal data may involve additional background check criteria. RIB is an Equal Opportunity Employer. We are committed to being an exemplary employer with an inclusive culture, developing a workplace environment where all our employees are treated with dignity and respect. We value diversity and the expertise that people from different backgrounds bring to our business. Come and join RIB to create the transformative technology that enables our customers to build a better world. Show more Show less

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

A career in our Advisory Acceleration Centre is the natural extension of PwC’s leading class global delivery capabilities. We provide premium, cost effective, high quality services that support process quality and delivery capability in support for client engagements. To really stand out and make us fit for the future in a constantly changing world, each and every one of us at PwC needs to be a purpose-led and values-driven leader at every level. To help us achieve this we have the PwC Professional; our global leadership development framework. It gives us a single set of expectations across our lines, geographies and career paths, and provides transparency on the skills we need as individuals to be successful and progress in our careers, now and in the future. Responsibilities As a Senior Associate, you'll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to: Use feedback and reflection to develop self awareness, personal strengths and address development areas. Delegate to others to provide stretch opportunities, coaching them to deliver results. Demonstrate critical thinking and the ability to bring order to unstructured problems. Use a broad range of tools and techniques to extract insights from current industry or sector trends. Review your work and that of others for quality, accuracy and relevance. Know how and when to use tools available for a given situation and can explain the reasons for this choice. Seek and embrace opportunities which give exposure to different situations, environments and perspectives. Use straightforward communication, in a structured way, when influencing and connecting with others. Able to read situations and modify behavior to build quality relationships. Uphold the firm's code of ethics and business conduct. ,Quality Assurance SOC Analyst - CaaS As a Quality Assurance SOC Analyst (Senior Associate) within the Cyber as a Service (CaaS) practice, you’ll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. You will play a pivotal role in ensuring the quality and effectiveness of our SOC operations. You will be responsible for reviewing and enhancing our security incident response processes and procedures, evaluating the performance of SOC analysts, and implementing best practices to maintain the highest standards of security. This role is critical in maintaining the integrity of our clients' systems and Required Qualifications data. Responsibilities include but are not limited to: 3+ years of experience in a technical role in the areas of Security Operations, Quality Assurance in a SOC setting, Threat Intelligence, Incident Response, or Penetration Testing/Red Team. At a minimum, a Bachelor's Degree in a relevant area of study with a preference for Computer Science, Computer Engineering, Cybersecurity, or Information Security. Knowledge and experience working with various SIEM, EDR, NDR and Ticketing tools. Knowledge of Security Operations Centre (SOC) processes and procedures. Effective communication skills, both written and verbal. Strong attention to detail and commitment to quality. Advanced knowledge and experience analyzing attacker techniques at all stages of a breach. Knowledge of MITRE ATT&CK and Cyber Kill-Chain is a must Be available to work on a 24/7 basis (Mon-Sun) on a shift based schedule to continuously assure quality within SOC. Roles & Responsibilities Conduct regular quality assessments of security incident handling processes within the SOC for both L1 and L2 functions. Review and evaluate the effectiveness of SOC analyst activities, including incident detection, analysis, investigation and response. Identify areas for improvement and provide recommendations to enhance SOC operations and incident response capabilities. Collaborate with SOC management and leads to develop and implement quality assurance strategies and initiatives. Create and maintain comprehensive quality assurance documentation, reports, and metrics. Mentor and provide guidance to junior SOC analysts to improve their performance and investigation skills. Stay up-to-date with the latest threat landscape, attack vectors, and cybersecurity technologies through ongoing research and professional development. Assist in incident response activities as needed, including during high-priority security incidents. Participate in the development and delivery of training programs for SOC staff. Collaborate with the L2 analyst team to develop robust quality assurance practices, documentation, reports and metrics. Collaborate with L1 and L2 SOC analysts to provide training and knowledge sharing on quality assurance best practices. Communicate findings and recommendations effectively to technical and non-technical stakeholders internally and externally. Maintain detailed records of quality assurance activity, including findings, actions taken, and outcomes. Participate in knowledge-sharing initiatives with the L1 and L2 team to enhance collective expertise and investigation skills. Ensure adherence to established quality assurance processes and procedures. Identify opportunities for process improvement and contribute to the enhancement of quality assurance methodologies. Maintain composure and efficiency in high-pressure situations. Willing to work in US day shift (9AM EST - 5PM EST) / India night Shift (7 PM IST to 3 AM IST) and weekend support / on call support Experience & Skills 3+ years of experience in a technical role in the areas of Security Operations, Quality Assurance in a SOC setting, Threat Intelligence, Cyber Incident Response, or Penetration Testing/Red Team. Experience in SOC L1, SOC L2 is a must. Experience in SOC Quality Assurance is a must Experience in SIEM technologies such as Azure Sentinel, Splunk, ArcSight, QRadar, Exabeam, LogRhythm Experience and knowledge of EDR and NDR technologies such as Cortex XDR, CrowdStrike, Carbon Black, Cylance, Defender, DarkTrace Experience with ticketing system such as ServiceNow, JIRA is considered a strong asset Experience and Knowledge working with Cyber Kill-Chain model and MITRE ATT&CK framework Ability to use data to 'tell a story'; ability to communicate findings and recommendations effectively to technical and non-technical stakeholders. Proficient in preparation of reports, dashboards and documentation Excellent communication and leadership skills Ability to handle high pressure situations with key stakeholders Good Analytical skills, Problem solving and Interpersonal skills A demonstrated commitment to valuing differences and working alongside diverse people and perspectives Show more Show less

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Linkedin logo

Job Title: Sales Executive – GIS & Remote Sensing Solutions Location: Perungudi, Chennai Experience Required: Minimum 2 Years Department: Sales & Business Development Industry: Geospatial / Environmental / Agricultural Technology / Urban Planning / Mapping Position Overview We are seeking a highly motivated and experienced Sales Executive to drive business growth in the field of Geographic Information Systems (GIS), Remote Sensing, and Earth Observation geospatial solutions. The ideal candidate will possess a strong understanding of geospatial technologies and demonstrated success in B2B/B2G sales, particularly across sectors such as agriculture, disaster risk management, environmental monitoring, urban planning and water resources. Key Responsibilities Identify and engage new business opportunities for GIS and remote sensing products, data solutions, and consulting services. Maintain strong relationships with key stakeholders, including government agencies, research institutions, and private enterprises. Conduct detailed product presentations, technical demonstrations, and consultative discussions tailored to client needs. Liaise with internal technical and delivery teams to develop customized proposals and ensure accurate communication of client requirements. Monitor industry trends, emerging technologies, and competitive landscape to effectively position company offerings. Maintain accurate and up-to-date records of sales activities, pipelines, and client interactions. Ability to travel as needed for client meetings and industry events. Required Qualifications & Experience Bachelor’s degree in Business, Marketing, Geoinformatics, Environmental Science, Agriculture, or a related field. Minimum of 2 years of experience in technical sales, preferably within GIS, remote sensing, or allied geospatial domains. Strong technical familiarity with GIS/RS platforms (e.g., ArcGIS, QGIS, ERDAS Imagine, ENVI) and satellite data products (e.g., Sentinel, Landsat, IRS etc). Demonstrated ability to achieve and exceed sales targets in a competitive environment. Excellent communication, negotiation, and stakeholder engagement skills. Prior experience with public sector clients, tender processes, or proposal writing is highly desirable. Show more Show less

Posted 2 weeks ago

Apply

3.0 - 6.0 years

6 - 8 Lacs

Hyderābād

On-site

GlassDoor logo

About the Role We are looking for a proactive Network & Cybersecurity Specialist with 3-6 years of experience to join our dynamic team. The ideal candidate will focus primarily on cybersecurity research, audits, assessments, and Proof-of-Concept (PoC) projects, specializing in Zero Trust Network Access (ZTNA) and related emerging technologies including Fortinet, ZScaler, Netskope, Crowdstrike, Sentinel One, Cisco Umbrella, etc. Operational involvement will be minimal, emphasizing research and innovation. Key Responsibilities: Conduct comprehensive research and evaluation of emerging cybersecurity technologies, primarily focusing on ZTNA and solutions such as Fortinet, ZScaler, Netskope, Crowdstrike, Sentinel One, Cisco Umbrella. Lead and perform network and cybersecurity audits, identifying vulnerabilities, compliance issues, and providing actionable recommendations. Execute Proof-of-Concept (PoC) projects to validate the effectiveness and applicability of security solutions in real-world scenarios. Collaborate with internal teams to implement cybersecurity best practices and enhance network security frameworks. Prepare detailed technical reports, documentation, and presentations on cybersecurity findings, PoC results, and recommendations for internal stakeholders and clients. Stay abreast of cybersecurity trends, standards, threats, and regulatory compliance requirements. 1 Required Skills: Strong expertise and practical experience with ZTNA technologies and familiarity with platforms such as Fortinet, ZScaler, Netskope, Crowdstrike, Sentinel One, and Cisco Umbrella. Familiarity with network security solutions including Firewalls, VPNs, Secure Web Gateways, and endpoint security tools. Experience in conducting cybersecurity audits and risk assessments. Capability to independently research and test emerging technologies. Excellent analytical, troubleshooting, and problem-solving skills. Proficiency in documenting and communicating technical information clearly and concisely. Understanding of cybersecurity frameworks such as NIST, CIS, ISO27001, and related compliance standards. Preferred Qualifications: • Relevant industry certifications (e.g., CCNA/CCNP Security, CISSP, CISA, CEH, or equivalent). • Experience with cloud security solutions and familiarity with platforms like Azure, AWS, or GCP. • Exposure to security automation and scripting languages (Python, PowerShell) Job Types: Full-time, Permanent Pay: ₹600,000.00 - ₹800,000.00 per year Benefits: Health insurance Provident Fund Schedule: Day shift Monday to Friday Work Location: In person

Posted 2 weeks ago

Apply

3.0 - 5.0 years

3 - 6 Lacs

Hyderābād

On-site

GlassDoor logo

Role : Cloud security Analyst Experience : 3 - 5 years Work mode : Hybrid Job Description: Roles and Responsibilities: Monitor and investigate high-risk alerts from Wiz across AWS, Azure, and GCP environments. Analyze attack paths, exposed services, and identity risks using Wiz Security Graph. Collaborate with DevSecOps and Cloud Platform teams to triage and contain incidents. Correlate Wiz alerts with signals from SIEM, endpoint, and identity tools to understand full attack context. Support incident response efforts by conducting root cause analysis and post-incident reviews. Assist in tuning Wiz policies, alert thresholds, and custom queries to reduce false positives and improve detection. Develop or improve playbooks for automated cloud incident response. Stay current on evolving threats in cloud environments, such as identity-based attacks, privilege escalation, and lateral movement. Document response workflows, findings, and lessons learned to support continuous improvement. Critical Skills to Possess: A degree in Cybersecurity, Information Security, Computer Science, or equivalent practical experience. 2–4 years of experience in security operations, incident response, or threat detection, ideally with cloud focus. Familiarity with Wiz, including security graph analysis, alert triage, and custom WQL queries. Understanding of common cloud threats and misconfigurations in AWS, Azure, and/or GCP. Experience with tools like Microsoft Sentinel, Defender for Cloud, or other SIEM/SOAR platforms. Knowledge of core security concepts such as IAM, network security, and the MITRE ATT&CK framework. Comfortable working in fast-paced environments with cross-functional teams. Strong analytical and communication skills for documenting and sharing threat insights. Bonus Points: Experience with scripting (Python, PowerShell, or bash) for automating investigation or remediation. Exposure to incident management platforms (e.g., ServiceNow). Certifications such as AZ-500, GCFA, GCIH, or equivalent. Understanding of container or serverless security in the cloud. Preferred Qualifications: BS degree in Computer Science or Engineering or equivalent experience Job Type: Full-time Pay: ₹300,000.00 - ₹600,000.00 per year Schedule: Day shift Work Location: In person

Posted 2 weeks ago

Apply

175.0 years

0 Lacs

Gurgaon

On-site

GlassDoor logo

At American Express, our culture is built on a 175-year history of innovation, shared values and Leadership Behaviors, and an unwavering commitment to back our customers, communities, and colleagues. As part of Team Amex, you'll experience this powerful backing with comprehensive support for your holistic well-being and many opportunities to learn new skills, develop as a leader, and grow your career. Here, your voice and ideas matter, your work makes an impact, and together, you will help us define the future of American Express. Function Description: The AIM (Analytics, Investment & Marketing Enablement) team – a part of GCS Marketing– is the analytical engine that enables Global Commercial business portfolio of American Express. Accelerating growth momentum, increasing profitability, and powering up our value proposition are key objectives for this organization. The team enables GCS Marketing business by providing actionable insights to drive business strategy and growth. This Analyst (Band 30) role would be based in Gurgaon (India) and would be focused on driving sentinel measurement Analytics spanning across channels and product offerings from Amex. Key Responsibilities include: Support and enable the business partners with campaign measurements, ROI analysis and actionable data driven insights for acquisition & engagement treatments in GCS Develop analytical solutions for GCS business teams by gathering requirements from stakeholders, performing data analysis, presenting results Accurate, timely and efficient delivery of monthly results reporting for marketing & sales leadership Keen on exploration and analysis of data from various data sources, translate the same to excellent visual case studies. Quick learner quick to understand the business and support pilot projects amidst ambiguity Collaborate with functional leaders, business partners and senior leaders to assess business needs, evaluate project feasibility, ensure data integrity, and provide actionable recommendations in times of constant change Build a solid relationship/partnership with Marketing Stakeholders, drive projects end to end with full accountability and growth mindset Minimum Qualifications: Degree in a quantitative field preferred – e.g. B. Tech; BSc/MSc Statistics, Bachelors/master’s in economics Knowledge of Hive, Python, PySpark, SQL encompassing data manipulation and statistical modeling/data-mining techniques Strong analytical aptitude and technical skills Project Management Excellent verbal, written, and interpersonal communications skills with an ability to formulate and communicate results & methodologies in a clear and compelling way A demonstrated ability to work in high-pressure situations with minimal errors An optimistic and growth mind-set with a tremendous will to win Should be able to function with minimum supervision with high sense of ownership Should be comfortable with flexible shift timings to support Global Partners Strong technical and problem-solving skills Strong communication and interpersonal skills Ability to analyze large amounts of data and create innovative solutions Ability to work effectively in a team environment Ability to learn quickly and work independently with complex, unstructured initiatives Ability to challenge the status quo and drive innovation Preferred Qualifications: 1-2 years of relevant experience with strong knowledge of skills like Python, SQL & Advanced Excel required; R also good to have. Good knowledge of statistical techniques like hypothesis testing, regression, KNN, t test, chi-square test Relevant experience in campaign measurement/marketing analytics is a plus Experience in marketing analytics and campaign measurement preferred; relevant industry experience preferred We back our colleagues and their loved ones with benefits and programs that support their holistic well-being. That means we prioritize their physical, financial, and mental health through each stage of life. Benefits include: Competitive base salaries Bonus incentives Support for financial-well-being and retirement Comprehensive medical, dental, vision, life insurance, and disability benefits (depending on location) Flexible working model with hybrid, onsite or virtual arrangements depending on role and business need Generous paid parental leave policies (depending on your location) Free access to global on-site wellness centers staffed with nurses and doctors (depending on location) Free and confidential counseling support through our Healthy Minds program Career development and training opportunities American Express is an equal opportunity employer and makes employment decisions without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran status, disability status, age, or any other status protected by law. Offer of employment with American Express is conditioned upon the successful completion of a background verification check, subject to applicable laws and regulations.

Posted 2 weeks ago

Apply

7.0 - 10.0 years

8 Lacs

India

On-site

GlassDoor logo

Responsibilities: Manage and secure Azure AD and Entra ID, including user provisioning and synchronization policies. Define and enforce O365 security policies such as Conditional Access, MFA, Safe Attachments, and Safe Links. Administer Microsoft Defender suite (Endpoint, Identity, Office, and Cloud Apps). Monitor audit logs and security alerts through Microsoft Security Center. • Collaborate with GRC teams for audit evidence, configuration baselines, and reports. Maintain secure configurations across Exchange Online, Teams, and SharePoint. Assist in tuning Microsoft Sentinel or similar tool; alerts and thresholds. Provide insights into evolving threats and help implement controls via Microsoft Defender REQUIRED SKILLS LIST OF SUBORDINATES 7–10 years in Microsoft infrastructure security 8–12 years including O365, Azure AD, Conditional Access, Defender In-depth knowledge of O365 and Microsoft Security ecosystem. Hands-on experience with Conditional Access, MFA, Microsoft Defender tools. Experience integrating Microsoft logs and alerts into SIEM. Familiarity with Entra ID governance and security configurations. Job Type: Full-time Pay: From ₹800,000.00 per year Benefits: Health insurance Provident Fund Work Location: In person Application Deadline: 01/06/2025

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Chennai

Remote

GlassDoor logo

Job Title: Sales Executive – GIS & Remote Sensing Solutions Location: Perungudi, Chennai Experience Required: Minimum 2 Years Department: Sales & Business Development Industry: Geospatial / Environmental / Agricultural Technology / Urban Planning / Mapping Position Overview We are seeking a highly motivated and experienced Sales Executive to drive business growth in the field of Geographic Information Systems (GIS), Remote Sensing, and Earth Observation geospatial solutions. The ideal candidate will possess a strong understanding of geospatial technologies and demonstrated success in B2B/B2G sales, particularly across sectors such as agriculture, disaster risk management, environmental monitoring, urban planning and water resources. Key Responsibilities Identify and engage new business opportunities for GIS and remote sensing products, data solutions, and consulting services. Maintain strong relationships with key stakeholders, including government agencies, research institutions, and private enterprises. Conduct detailed product presentations, technical demonstrations, and consultative discussions tailored to client needs. Liaise with internal technical and delivery teams to develop customized proposals and ensure accurate communication of client requirements. Monitor industry trends, emerging technologies, and competitive landscape to effectively position company offerings. Maintain accurate and up-to-date records of sales activities, pipelines, and client interactions. Ability to travel as needed for client meetings and industry events. Required Qualifications & Experience Bachelor’s degree in Business, Marketing, Geoinformatics, Environmental Science, Agriculture, or a related field. Minimum of 2 years of experience in technical sales, preferably within GIS, remote sensing, or allied geospatial domains. Strong technical familiarity with GIS/RS platforms (e.g., ArcGIS, QGIS, ERDAS Imagine, ENVI) and satellite data products (e.g., Sentinel, Landsat, IRS etc). Demonstrated ability to achieve and exceed sales targets in a competitive environment. Excellent communication, negotiation, and stakeholder engagement skills. Prior experience with public sector clients, tender processes, or proposal writing is highly desirable.

Posted 2 weeks ago

Apply

0 years

0 Lacs

India

Remote

Linkedin logo

Job Description We are seeking a talented and experienced Senior Product Engineer to lead the design and development of both new and existing products. As a pivotal member of our engineering team, you should possess strong analytical and design skills, a profound understanding of software design principles, and advanced problem-solving capabilities. A top-notch Senior Product Engineer will not only transform ideas into high-end products but also drive team success through exemplary leadership, fostering an environment of learning and adherence to best coding practices. Our goal is to consistently exceed the expectations of our customers with outstanding product solutions. Responsibilities: Own the design, strategy, and quality of software development for your team. Translate objectives into iterative MVPs, evaluate, and then refactor into a scalable and extensible design. Design and develop highly scalable, reliable, secure, and fault-tolerant systems with a clean code base, requiring minimal guidance for one of the world’s fastest-growing companies. Mentor team members, review code, and advocate for improvements to ensure high standards. Continuously research new technologies and tools to enhance product offerings. Exercise high ownership and initiative in all projects. Analyse different technical options for a problem statement, evaluate them with pros and cons and propose optimal solutions based on thorough research. Collaborate with other engineering teams to learn from and share best practices. Work cross-functionally with product, design, backend and other teams across regions and independently ship world-class products and features with minimal guidance. Build and manage automated build/test/deployment environments Write code that is clear, concise, performant, tested and easily understood by others. Actively participate within the team in discussions, agile development, monitoring and uptime of the systems. Improve engineering standards, tooling and processes Requirement : 1. 4+ Java 2. Kafka 3. Redis Cluster 4. Redis Sentinel 5. Async processing 6. Asynchronous 7. Message Bus Work mode : Hybrid 3days onsite,2days remote Interview process: 1.technical coding round(90mins) 2.HR Round 3.CEO Round Show more Show less

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

About AkzoNobel Since 1792, we’ve been supplying the innovative paints and coatings that help to color people’s lives and protect what matters most. Our world class portfolio of brands – including Dulux, International, Sikkens and Interpon – is trusted by customers around the globe. We’re active in more than 150 countries and use our expertise to sustain and enhance the fabric of everyday life. Because we believe every surface is an opportunity. It’s what you’d expect from a pioneering and long-established paints company that’s dedicated to providing sustainable solutions and preserving the best of what we have today – while creating an even better tomorrow. Let’s paint the future together. For more information please visit www.akzonobel.com © 2024 Akzo Nobel N.V. All rights reserved. Job Purpose Cyber security is a top priority for AkzoNobel as for any global organization operating in the cyberspace. Our objective is to protect our information and digital assets (IT and OT) by reducing our cyber risk exposure to pursue our business objectives. As part of the new cyber security strategy, supported by the ExCo, we have recently redefined our security governance in line with the evolution of the threat landscape and modern best practices. In this regard the new Information Security function, under responsibility of the CISO and part of the IT, is responsible for Information and cyber security for the entire organization covering Cyber Risk Management & Compliance, Security Architecture, Security Operations and Cyber Security Awareness and Training. We are looking for a seasoned and proactive Vulnerability Management Technical Lead to join our Cybersecurity Operations team. This role will be responsible for overseeing all technical aspects of security incident and alert management across the organization. You will serve as the central operational point of reference for incident detection, investigation, containment, and resolution activities and bring deep technical expertise and strong leadership capabilities to ensure the continuous identification, assessment, and remediation of vulnerabilities. You will work with modern tools and technologies, maintain visibility into the organization's risk exposure, and deliver meaningful metrics to support security decisions. Key Activities Provide technical and operational leadership for incident and alert management processes, ensuring day-to-day activities are executed effectively, without operational gaps. Deliver a real-time operational view and strategic (macro) oversight of the organization’s security posture, enabling data-driven decision-making through well-defined KPIs and KRIs. Act as the lead investigator for major or complex incidents, collaborating with internal and external stakeholders as needed. Ensure regular activities such as alert triage, incident response, threat hunting, and reporting are performed consistently and on schedule . Prepare and present clear, concise, and data-backed reports on incident response metrics, trends, and security event outcomes to management and leadership. Foster a supportive, collaborative, and high-performing environment , mentoring team members and ensuring clarity of roles, timely guidance, and knowledge sharing. Lead maturity assessments of the SOC IR capabilities using recognized industry frameworks (e.g., MITRE ATT&CK, CMMI), and define tangible improvement paths . Serve as a key contributor to the evolution of automation and orchestration in incident management using Microsoft Sentinel and Logic Apps . Continuously evaluate and improve detection and response workflows across multiple security technologies and domains. These key responsibilities are peered with key technologies (and linked skills) that are used in the company environment: Microsoft Defender Suite (Endpoint, Identity, Office, Cloud Apps) Zscaler Technologies, including ZIA and ZPA Microsoft Sentinel and Azure Logic Apps (automation and orchestration) Nozomi (OT/IoT network visibility and threat detection) Familiarity with API integrations, automation scripting (PowerShell, KQL), and incident enrichment techniques is highly desirable. Experience 5+ years of hands-on experience in incident response, SOC operations, or threat detection roles within large and complex environments. Demonstrated experience leading incident response efforts in real-world scenarios, including root cause analysis, containment, and lessons learned processes. Strong understanding of enterprise security architecture, endpoint and network detection tools, and alerting pipelines. Solid experience with Microsoft security technologies, especially Microsoft Defender XDR and Sentinel. Practical knowledge of SOC automation practices using tools such as Logic Apps, playbooks, or SOAR platforms. Excellent communication and reporting skills, capable of presenting technical content to both technical and executive audiences. Demonstrated ability to work collaboratively, make sound decisions under pressure, and coordinate across teams during high-impact security events. Strong knowledge of incident handling frameworks, playbook development, and SOC maturity models. Certifications in incident response, such as GCIH, GCFA, GCIA, or similar. General blue team certifications such as SC-200, AZ-500 Experience in operationalizing threat intelligence and aligning detection strategies to frameworks such as MITRE ATT&CK. Prior experience assessing and improving SOC performance against frameworks like NIST, MITRE D3FEND, or CMMI. At AkzoNobel we are highly committed to ensuring an inclusive and respectful workplace where all employees can be their best self. We strive to embrace diversity in a context of tolerance. Our talent acquisition process plays an integral part in this journey, as setting the foundations for a diverse environment. For this reason we train and educate on the implications of our Unconscious Bias in order for our TA and hiring managers to be mindful of them and take corrective actions when applicable. In our organization, all qualified applicants receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age or disability. Requisition ID: 46483 Show more Show less

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Thane, Maharashtra, India

On-site

Linkedin logo

Should have strong knowledge in Splunk SIEM engineering and administrative activities. Should have performed SIEM engineering role more than 2+ years. Problem solving & People management skills are required. Should have expertise in building custom analytical rules, tuning of analytical rules, building automation through Azure logic apps, management of entire product feature, end to end configuration. Should have expertise in forming KQL queries and functions for complex detection and monitoring requirements. Should have strong knowledge in MITRE attack framework and expertise in developing analytical rules and custom dashboards/workbooks across framework. Should have expertise in log management, retentions, maintenance of logs at low cost, performing access management, developing new custom dashboard based on different requirements. Should have proven record of implementing Sentinel advanced features, efficient log collection mechanisms, deployment and maintenance of log forwarders, maintenance of local agents. Leverage Threat Intelligence feeds in Splunk analytics and SOAR Good to have proficiency in Linux, Python, PowerShell Should have expertise in integrating data sources which are not supported by Splunk tool - Custom parser development and ability to solve technical issues in Splunk must have requirements. Should have expertise in consuming contents from content hub and management of log analytics workspace and ability to handle issues in MMA and AMA agents. Good to have strong knowledge in Microsoft defender products, Microsoft Cloud services and Azure Arc. Should have ability to work with vendor technical support group and driving issues towards effective and permanent closure. Must Have : Experience on Splunk (Implementation and Upgradation) Knowledge in MITRE attack framework Understanding of Parser Show more Show less

Posted 2 weeks ago

Apply

7.0 - 12.0 years

0 Lacs

Gurgaon, Haryana, India

On-site

Linkedin logo

Join our Team About this opportunity: We are looking for a Security Specialist profile within the Cyber Defense Center (CDC) in Group Security. The Cyber Defense Center defends Ericsson from cyberattacks originating from external threat actors. It ensures we are one step ahead of adversaries, identify their plans and means to execute them, block and disrupt their execution, and remove their presence from within Ericsson. Its focus is on sophisticated antagonistic threat actors who can do the most harm to Ericsson as a company. In order to achieve this the cyber defense center consists of four teams: threat intelligence, the red team, a process and governance team, and cyber operations. What you will do: 24x7 Security monitoring and incident handling across a complex network. End-to-End triage & investigation of all the threat detections originating from technology. Participate in incident response. Support use case development of detection analytics. Conduct research into new threats, identifying new IOC/TTPs. Work in shifts with efficient and accurate handover procedures. Identify improvements in automation and investigation procedures. Work with the Red team to identify gaps or weaknesses in security coverage. Create threat hunting use cases through security research and threat intelligence. Adhere to SLAs for security investigations. The skills you bring: A minimum of 7 to 12 years of experience working within a Security Operations Center /Managed Security Services environment. Organization and project management skills, Good documentation skills, Positive can-do attitude. Ability to work at odd hours and work constructively under pressure. Worked across different cultures in a global setting and with many stakeholders. Impeccable integrity and track record of working with sensitive information. Technical Competences The Incident Response Process Core networking skills Live Windows, Linux and Memory Forensics Active Directory Analysis Network Threat Hunting Basics of Vulnerability Management Demonstrable experience with Incidence Response in leading public Clouds – Azure, AWS, GCP Experience with Microsoft Azure Cloud - Azure Sentinel, Microsoft security stack, MS Graph API, Entra ID Amazon Web Services (AWS) security tools such as Security Hub, AWS Guard Duty, AWS Macie, AWS CloudTrail Google Cloud Platform (GCP) security tools such as Chronicle and Security Command Centre Able to triage & investigate email threats using platforms like Microsoft EOP, Trellix, Proofpoint Working knowledge of `Security products like Endpoint Detection Response (EDR), Identity Threat Detection (ITDR) & Response, Network Detection & Response (NDR) from leading vendors like Trellix, CrowdStrike, MS Defender for Endpoint, Vectra Experience in IT Security and risk management. Security related certification like SANS GCIH, GCIA, GMON, GREM, CEH, CISSP, CHFI and Incident Response certification is an added advantage. Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Gurgaon Req ID: 764930 Show more Show less

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Pune, Maharashtra, India

Remote

Linkedin logo

We thrive in an agile, collaborative environment that fosters creativity and action. , innovation drives everything we do. We pioneered the first MOBILESOC app for on-the-go threat detection and response, automated alert resolutions to maximize efficiency, and cut alert investigation time by 99.3% - transforming the way cybersecurity teams work. Our team and customers genuinely value the impact we make every day. What can we offer you? A chance to make an impact every day—whether protecting customers or contributing to a greater mission. Collaboration with talented, supportive teammates who value accountability and growth. A commitment to continuous improvement, striving for excellence, and breaking past mediocrity. A culture of learning, innovation, and inclusivity, where every idea matters. Recognition for being at the forefront of the industry—we’ve received accolades that prove we’re doing something right. A supportive environment where you belong and your contributions truly matter, as one team member put it: “Every day presents new challenges and opportunities for growth, and the culture is unlike any other. · We are searching for a dedicated and proficient Associate Cybersecurity Engineer to join the team, operating under our umbrella, for our India operations. The perfect candidate should have extensive knowledge of Security Information and Event Management (SIEM) tools, including Microsoft Sentinel, Splunk, and Sumo Logic. · · They should also be well-versed in Endpoint Detection and Response/Extended Detection and Response (EDR/XDR) integrations like SentinelOne, Defender for Endpoint/Server, CrowdStrike, and Palo Alto Cortex XDR. As an Associate Cybersecurity Engineer, you will have a vital role in providing managed security services to our clients, guaranteeing the smooth operation of their security infrastructure. Skills Maintenance: Keep your industry knowledge up-to-date by maintaining deep expertise in SIEM tools and EDR/XDR products. Client Interaction: Deliver our managed services to clients efficiently, working on project-based tasks related to SIEM and EDR/XDR technologies. Collaborate closely with clients to address technical issues, provide value reports, and configure their systems effectively. Technical Guidance: Offer technical guidance, expertise, and configuration support to clients, helping them maintain strong and efficient SIEM and Endpoint security programs. Best Practices: Assist clients in implementing best practices for deploying and configuring endpoint agents, endpoint security policies, log forwarders, data sources, content, and alerts. Security Enhancement: Assist clients in enhancing the security of their SIEM and Endpoint products, ensuring alignment with industry standards and our program offerings. Issue Resolution: Troubleshoot problems related to data source interactions with SIEM technologies and API connections between supported security integrations and our platform (CORR). Automation Opportunities: Identify chances to automate parts of SIEM and Endpoint engineering tasks to improve efficiency and accuracy. Documentation Management: Create and update extensive security documentation, encompassing playbooks, standard operating procedures, and training materials. Ongoing Education: Keep abreast of the latest security threats and trends, integrating this knowledge into our security solutions. Attain and maintain relevant security certifications. Collaborative Teamwork: Work closely with fellow cybersecurity engineers, product managers, and architects to devise and implement innovative security solutions that offer the highest level of protection for our clients. Required Qualifications: Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or an equivalent field, or equivalent experience and industry certifications. 2+ years of experience with SIEM tools (Splunk, Microsoft Sentinel, Sumo Logic, or Devo). Familiarity with various security data sources, log formats, and ingestion methods. Experience in creating SIEM content, including alerts, reports, and dashboards. Excellent communication and customer service skills. Ability to establish rapport and trust with customers, even in discussions about complex technical issues. Proficient in troubleshooting technical issues related to security products. Desired Qualifications: 1+ years of experience with any EDR/XDR solution. 3+ years of experience with Cloud Technologies (Azure, AWS, or GCP). Experience deploying security solutions in an MSSP environment is a plus. Experience with DevOps tools is a plus (Terraform, Ansible, Puppet, Salt Stack, etc.). Scripting abilities in Bash, PowerShell, Python, or other programming/scripting languages. Imagine a dynamic, enjoyable, and rewarding work environment. We are professionals, and the work we do holds immense significance, like saving our customers from potential disasters. However, we believe in not taking ourselves too seriously. Prefer a casual dress code every day? No problem, as we find comfort enhances our thinking. What does our Compensation and Benefits package entail? · Competitive salary · Statuary PTO (Paid Time Off) policy · Depending on the role, you may work in the office, remotely, or adopt a hybrid work model. We prioritize your privacy and security. Please note that Critical Start will never request financial information or sensitive personal data during the interview process. If you encounter any suspicious requests, do not respond and contact us directly at recruiting@criticalstart.com. Thank you for helping us maintain a safe and trustworthy hiring experience. Show more Show less

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Role Description We are seeking a detail-oriented and proactive SOC Analyst – Level 2 to strengthen our cybersecurity operations. The ideal candidate will have hands-on experience in reviewing and investigating escalated security events using a variety of security tools and methodologies. This role involves working closely with L1 analysts, Incident Response teams, and Threat Hunters to ensure accurate detection, classification, and escalation of security incidents. Key Responsibilities Review and investigate escalated security events from SOC L1 analysts using tools such as SIEM, EDR, NDR, and other monitoring platforms. Perform initial triage and validation of s, classify incidents, and escalate appropriately to Incident Response or Threat Hunting teams. Leverage threat intelligence to contextualize s and correlate evidence across multiple data sources. Analyze suspicious activity across endpoints, networks, email, and cloud environments. Accurately document investigation steps, findings, and recommendations. Maintain and enhance playbooks, runbooks, and standard operating procedures (SOPs). Participate in purple team exercises, tabletop simulations, and contribute to detection engineering feedback loops. Collaborate with L1 analysts, providing guidance and training on detection logic, triage, and escalation procedures. Required Qualifications Minimum 2 years of experience in a SOC, security monitoring, or cybersecurity operations role. Proficiency with SIEM (e.g., Splunk, QRadar, Sentinel), EDR (e.g., CrowdStrike, Microsoft Defender for Endpoint), and analysis of firewall and proxy logs. Solid understanding of attacker tactics, techniques, and procedures (TTPs), especially those outlined in MITRE ATT&CK and the Cyber Kill Chain. Demonstrated experience in triaging s, classifying threats, and escalating incidents. Strong ability to write concise, accurate incident documentation and reporting. Working knowledge of both Windows and Linux operating systems from a security operations perspective. Preferred Qualifications Familiarity with detection logic tuning, custom rule creation, and threat hunting methodologies. Experience in phishing investigations, malware sandboxing, and basic memory/network forensics. Exposure to scripting languages such as Python, Bash, or PowerShell for task automation and data parsing. Knowledge of cloud security monitoring tools and practices (Azure, AWS, Google Cloud). Relevant certifications such as: Security+, CySA+, GCFE, GCIH, SC-200, or equivalent. Technical Skills Active Directory Red Hat Enterprise Linux Group Policy Management Skills SIEM, EDR, NDR Show more Show less

Posted 2 weeks ago

Apply

4.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Greetings From TCS!! Position : SOC Analyst Experience : 4+years Walkin Interview on 7th Jun 2025 at below locations : Hyderabad TCS Synergy Park Phase1 ,Premises No 2-56/1/36, Gachibowli, Opposite IIIT Hyderabad Campus, Seri Lingampally, RR District, Hyderabad, Telangana 500019 Bangalore TCS L-Center, Vydehi RC-1 Block, EPIP Industrial Area, 82, 6th Rd, KIADB Export Promotion Industrial Area, Whitefield, Bengaluru, Karnataka 560066 Chennai TCS Siruseri ATL Building- 1/G1, SIPCOT IT Park Navalur, Siruseri, Tamil Nadu 603103 Mumbai TCS OLYMPUS, Hiranandani Estate, Thane West, Thane, Maharashtra 400615 Noida TCS Yamuna, First floor, Assotech Business Cressterra, VI Plot 22, Sector 135, Noida, Uttar pradesh- 201301 Kolkata Tata Consultancy Services Limited | IT/ITES SEZ, Plot-IIF / 3 Action Area-II, New Town, Rajarhat, Kolkata-700156, West Bengal, India Job Description : Monitor multiple security technologies such as SIEM, Antivirus, Vulnerability management, Web Proxy, Security Patch management. Tune/Create SIEM correlation rules. Perform in-depth incident and event analysis. Respond and handle the security incidents. Agree and align on reporting and monitoring requirements with business stakeholders. Conduct research on emerging security threats. Modify Standard Operating Procedures (SOPs) and training documentation. Coach junior team members. Good Knowledge on SIEM tools like QROC, Arcsight, SPLUNK or Sentinel. Knowledge and experience with PCs, LAN topologies, routers, hubs, and terminal servers Knowledge of security applications such as IDS, Security Event Management and anomaly detection tools. Knowledge of VPN technology. Knowledge of investigation tools like FTK imager, memory dump, threat analysis tools. Ability to read and interpret network diagrams. Oversight of facilitates for other offices in the UK and provide support and guidance where required. Ability to translate event analysis findings into new monitoring proposals. Remain flexible with 24/7 shift and task assignments. Interested Candidates can share their cv to divya.jillidimudi1@tcs.com if you are available for Walkin interview Regards, Divya Jillidimudi Show more Show less

Posted 2 weeks ago

Apply

4.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. Position Summary We are seeking a highly skilled Cloud Administrator with expertise in cloud services, particularly AWS and Azure, to join our growing team. This role involves managing and optimizing cloud infrastructure, ensuring secure cloud operations, and providing solutions to common vulnerabilities flagged by the security team. The ideal candidate will have extensive experience in cloud migration, IAM management, and a solid understanding of both AWS and Azure services. In addition, familiarity with cloud monitoring tools and SAP will be advantageous. Key Responsibilities Cloud Infrastructure Management: Administer and manage AWS cloud services, including IAM, EC2, EBS, EFS, Lambda, CloudWatch, NLB, Log Insights, and Amazon Kinesis. Implement cloud solutions to migrate workloads from on-premises to the cloud. Design, deploy, and maintain scalable and reliable cloud environments for various business applications. Security And Compliance Work closely with the security team to identify and address common vulnerabilities and threats within the cloud environment. Ensure compliance with industry standards and best practices for cloud security. Cloud Solutions Design and Implementation: Take a holistic approach to business problems, developing end-to-end solutions that include design, procurement, implementation, and ongoing operations. Provide technical leadership and guidance on cloud adoption and migration strategies. Azure Management Administer Azure subscriptions, Azure AD, and Azure Monitor for cloud operations and security management. Leverage Azure Sentinel for security information and event management (SIEM). Cloud Monitoring and Optimization: Utilize cloud monitoring tools such as Datadog or Dynatrace to optimize performance and ensure high availability. Troubleshoot cloud-based applications, services, and infrastructure to maintain optimal uptime and performance. Collaboration Work with cross-functional teams, including developers, system engineers, and architects, to ensure smooth cloud operations and successful cloud migrations. SAP Integration (Optional): Provide basic support or integration services for SAP in the cloud environment. Required Skills & Qualifications Bachelor’s degree in Computer Science, Information Technology, or related field (or equivalent work experience). Minimum of 4 years of experience in cloud administration and cloud migration, with hands-on experience in AWS services such as IAM, EC2, EBS, EFS, Lambda, and CloudWatch. Strong experience and a solid understanding of IT infrastructure fundamentals, with expertise in both Linux and Windows systems, as well as hands-on cloud experience. Solid experience with Azure cloud services, including Azure Sentinel, Azure AD, and Azure Monitor. Experience with cloud security practices, vulnerability management, and incident response. Strong understanding of cloud architecture and best practices for security and scalability. Familiarity with cloud monitoring tools like Datadog, Dynatrace, or similar. Basic knowledge of SAP is a plus. Problem-solving and troubleshooting skills, with the ability to look at business problems holistically and provide effective solutions. Excellent communication and collaboration skills. Certifications (Preferred but not required): AWS Certified Solutions Architect – Associate or Professional Microsoft Certified: Azure Solutions Architect Expert Certified Kubernetes Administrator (CKA) or similar. Preferred Qualifications Familiarity with CloudFormation, Terraform, or other Infrastructure as Code (IaC) tools. Strong experience in cloud cost optimization strategies. Experience with hybrid cloud and multi-cloud environments. Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted. Show more Show less

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Kharagpur-I, West Bengal, India

On-site

Linkedin logo

Analyst Level 3 - Security Operations Centre (SOC) Ways of working – Full-time with rotational shifts and mandatory Work from Office Location: Embassy Tesh Village, Bangalore Year of Experience: 5+ years in a SOC or security operations environment, with at least 2 years in a senior or advanced analyst role. About The Team & Role As a Level 3 Security Operations Centre (SOC) Analyst, you will be responsible for identifying, analyzing, and responding to security incidents and threats within an organization's IT infrastructure. This senior role demands a high level of expertise in security operations, threat analysis, and incident response. You will work closely with other teams, including Level 1 and Level 2 analysts, management, and engineering, to ensure the security of the organization's network and systems. Your work will contribute to detecting and mitigating advanced cyber threats, ensuring that the organization remains protected against emerging risks. What will you get to do here? Incident Response & Investigation Lead investigations of complex security incidents, including intrusion detection, malware analysis, and vulnerability exploitation. Perform in-depth analysis of security incidents to determine their scope, impact, and method of attack. Take immediate and appropriate action to contain, mitigate, and resolve security threats. Threat Hunting Proactively hunt for hidden threats and vulnerabilities within the organization's systems and networks. Analyze logs and data from multiple sources (e.g., firewalls, intrusion detection systems, antivirus solutions) to identify patterns indicative of malicious activity. Utilize advanced threat intelligence to stay ahead of potential attackers and new attack vectors. Security Monitoring & Analysis Oversee and manage security monitoring tools to detect potential security incidents and vulnerabilities. Analyze alerts and reports generated by various security tools, ensuring accuracy and appropriateness. Ensure the effective operation and tuning of SIEM (Security Information and Event Management) systems, IDS/IPS, and other security technologies. Identify and define new use cases as well as modify existing ones Collaboration & Knowledge Sharing Mentor and provide guidance to junior analysts (Level 1 and Level 2) in incident handling, investigation, and security best practices. Collaborate with IT, network, and engineering teams to resolve security issues and implement proactive security measures. Document incidents and maintain accurate records for reporting and auditing purposes. Reporting & Documentation Generate detailed post-incident reports that include findings, recommendations, and remediation steps. Assist in the development and maintenance of SOC procedures, playbooks, and security policies. Report trends and emerging threats to senior management and stakeholders. Create and maintain standard operating procedures (SOPs), playbooks, and runbooks. Lead root cause analysis and develop lessons learned documentation post-incident Continuous Improvement Stay up to date on the latest cybersecurity threats, trends, and technologies. Contribute to the development and improvement of incident response plans and security protocols. Participate in security training programs to continually enhance skills and capabilities. What qualities are we looking for? Education: Bachelor's degree in Computer Science, Information Security, or related field, or equivalent experience. Experience: 5+ years of experience in a SOC or security operations environment, with at least 2 years in a senior or advanced analyst role. Technical Skills: Strong experience with security tools and SaaS Application, including SIEM (Splunk, Sentinel One, QRadar, etc.), IDS/IPS, firewalls, Endpoint Protection, DLP, Active Directory/Azure and vulnerability scanners. Expertise in incident response, digital forensics, and malware analysis. Deep understanding of security frameworks, methodologies, and best practices (NIST, ISO 27001, MITRE ATT&CK, etc.). Knowledge and experience of common operating systems (Windows, Mac, Linux) and networking protocols (TCP/IP, HTTP, DNS, etc.). Advanced understanding of cyber threats and attack vectors, including APTs (Advanced Persistent Threats), ransomware, DDoS, and insider threats. Familiarity with cloud security environments and services (AWS, Azure, GCP). Skills & Abilities: Strong written and verbal communication skills, with the ability to report findings to both technical and non-technical stakeholders. Ability to work well under pressure and manage multiple tasks simultaneously. Relevant certifications such as CISSP, CISM, CEH, GIAC, or similar are a plus. Desired Skills: Experience with threat intelligence platforms and frameworks. Proficiency in scripting or automation (Python, PowerShell, etc.) for threat detection and incident response tasks. Experience with network traffic analysis tools (Wireshark, tcpdump, etc.). Knowledge of forensic tools and techniques. Familiarity with security incident management platforms (ServiceNow, Remedy, Jira, Fresdesk etc.). Preferred Certifications: CompTIA Security+ EC-Council Certified SOC Analyst (CSA) CompTIA Cybersecurity Analyst (CySA+) EC-Council SOC Essentials (S|CE) ISACA - CCOA GIAC Security Operations Certified (GSOC): GIAC Certified Incident Handler (GCIH): GIAC Certified Intrusion Analyst (GCIA): (ISC)² Systems Security Certified Practitioner (SSCP): GIAC Cyber Threat Intelligence (GCTI): GIAC Certified Forensic Analyst (GCFA) / GIAC Certified Forensic Responder (GCFR) AWS Certified Security - Specialty / Certified Cloud Security Professional (CCSP) Visit our tech blogs to learn more about some of the challenging Problem Statements the team works at:- https://bytes.swiggy.com/engineering-challenges-at-swiggy-430dea6c86a3 https://bytes.swiggy.com/the-swiggy-delivery-challenge-part-one-6a2abb4f82f6 https://bytes.swiggy.com/what-serviceability-means-at-swiggy-c94c1aad352a https://bytes.swiggy.com/architecture-and-design-principles-behind-the-swiggys-delivery-partner s-app-4db1d87a048a https://bytes.swiggy.com/swiggy-distance-service-9868dcf613f4 https://bytes.swiggy.com/the-tech-that-brings-you-your-food-1a7926229886 We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, colour, religion, sex, disability status, or any other characteristic protected by the law. Show more Show less

Posted 2 weeks ago

Apply

0 years

0 Lacs

Greater Hyderabad Area

On-site

Linkedin logo

There is a job opening for Azure Devops in Tech Mahindra Experience - 8+ Location - Hyd JD-- Azure Administration: Deploy, configure, and manage Azure resources including VMs, storage, networking, and identity services., SQL Server Monitor and optimize Azure workloads for performance and cost efficiency. Implement and manage Azure governance policies, resource tagging, and automation. Manage Azure Policy and Compliance centre. Implement Azure Automation using Runbooks and Logic Apps. Experience with monitoring and logging tools like Azure Monitor, Log Analytics, and Application Insights for performance and reliability management. Azure DevOps: Understanding customer requirements and project KPIs Ensure system and infrastructure availability, stability, scalability, and performance Implementing various development, testing, automation tools Fixing the code bugs, Investigate issues and respond to customer queries and issues Manage code deployments, fixes, updates, and related processes Encouraging and building automated processes wherever possible Experience in designing, implementing, and managing Continuous Integration/Continuous Deployment (CI/CD) pipelines using Azure DevOps Expertise in version control systems, particularly Git, for managing and tracking code changes. Knowledge of containerization technologies like Docker and orchestration platforms like Kubernetes on Azure Kubernetes Service (AKS). Azure Security & Microsoft S360: Manage security policies and access controls using Microsoft Entra ID and RBAC. Implement Just-In-Time (JIT) access and Privileged Identity Management (PIM) for elevated permissions. Configure security monitoring and compliance using Microsoft Defender for Cloud and Sentinel. Manage security baselines, risk assessments, and threat protection mechanisms. Conduct periodic security audits and vulnerability assessments. PowerShell Scripting & Automation: Strong PowerShell, Bash, or Python scripting skills for automating tasks and processes. Create custom scripts. Beneficial to have a background in OOPS-based development. Show more Show less

Posted 2 weeks ago

Apply

5.0 - 10.0 years

18 - 22 Lacs

Hyderabad, Bengaluru, Delhi / NCR

Hybrid

Naukri logo

Shift timings- 2 PM -11 PM Primary skills Azure Security Defender, Sentinel,(identity, Endpoint, etc.) Secondary skills Azure Infrastructure, Office 365 collab workloads Required Skills & Experience: Technical Expertise: Strong understanding of Azure security offerings, including but not limited to: Microsoft Defender for Cloud / Endpoint / Identity Microsoft Sentinel (SIEM/SOAR) Microsoft Entra (Identity Governance, Conditional Access) Hands-on experience with cloud security assessments, PoC deployments, and client workshops. Familiarity with Zero Trust architecture and related best practices. Professional Experience: 5+ years in IT security roles, with 2+ years focused on Azure or cloud security. Proven track record of leading technical engagements independently. Soft Skills: Excellent communication and presentation skills. Ability to articulate technical concepts to both technical and business audiences. Self-starter who thrives in a fast-paced, client-facing environment. Preferred Qualifications: Microsoft certifications (e.g., SC-100, AZ-500, SC-200) Experience working with Microsoft partners or within funded engagement programs. Exposure to regulatory compliance frameworks (e.g., ISO, NIST, GDPR) Key Responsibilities: Client Engagements: Conduct security assessments and discovery workshops to understand client environments, security gaps, and cloud readiness. Deliver technical Proof of Concepts (PoCs) and hands-on demonstrations of Microsoft Azure security solutions. Host and facilitate technical workshops on Zero Trust, Microsoft Defender, Sentinel, Entra, and related technologies. Provide technology walkthroughs, highlight use cases, and share practical experience to illustrate business value. Solution Design & Implementation: Design and recommend secure architectures and configurations using Azure-native tools and services. Collaborate on solution development, documentation, and client readiness for security modernization. Internal & Cross-Functional Collaboration: Work closely with Sales, PreSales, and regional delivery teams to align on customer needs, technical strategy, and success metrics. Contribute to proposal development and client presentations from a technical security standpoint. Thought Leadership & Enablement: Stay updated on Azure security advancements and share knowledge internally and with clients. Support internal enablement sessions and mentor junior team members, where applicable.

Posted 2 weeks ago

Apply

15.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Title: Associate Director or Assistant Director – Solution Architect (General) Enterprise Technology provides reliable, secure and resilient technology services and solutions to support our 400,000 EY people. As part of Enterprise Technology, you’ll be at the forefront of enabling innovative technologies including emerging collaboration tools and top-tier technology infrastructure. Our aim is to create a superior customer experience with clear investment in innovation, alongside operational excellence that delivers efficient, quality services and solutions. You will work with technologists and business experts to meet the increasing pace of our business. That means more growth for you, exciting learning opportunities, career choices and the chance to make a real impact. The opportunity We are seeking a Solution Architect that is a highly skilled senior role with industry leading architecture and design expertise to support one or more programs. He/she has a deep end to end understanding of architecture standards and platform solution development expertise. In this role you will be responsible for bringing strategy to fruition through the creation and delivery of architectural solution artifacts, and so candidates should be proficient on Microsoft Azure, M365 services, Network and On-prem Infrastructure technology solutions. Candidate must be a self-starter with Agile framework experience and provide RISK/Constraints to product leaders. Ideal candidate must be able to drive the delivery of solutions which align with the strategy. This role will report to the Associate Director of Solution Architecture and Cross Functional Governance. Your Key Responsibilities Core Drive the successful delivery of Cloud, Network and Platform technology investment efforts. Provides guidance on complex production designs, applications or system problems Solution design will include the creation of reusable, repeatable IP and artifacts. Work closely with security, networking, and operations teams to design integrated and compliant solutions. Manage stakeholders, sponsors, engineering, and operations teams across EY Technology to drive development of IT products, services, and solutions. Manages the technical dependencies across the different products and services Work with Enterprise Architects to ensure alignment with strategic objectives and targets, while providing input into strategic direction as needed. Translate business needs into technical requirements and formulation of solutions, while identifying gaps, strategic impacts, financial impacts and the risk profile in the technical solution or offering. Drive proof-of-concept, prototype design and implementation activities from an architectural perspective. Develop and maintain solution architecture documents and other artifacts to guide design creation and implementations. Stay abreast of industry trends and new technology offerings, perform in-depth research analysis and maintain collaborative partnership with internal IT teams and business customers along with external technology vendors and service providers to ensure robust outcomes. Present subject matter to program / project teams, governance forums and other audiences as needed. Skills And Attributes For Success We are interested in people with a deep and broad networking background, who bring in experience working in large enterprise environments, performing senior architecture or solution design role. A successful candidate will have technical and all-round experience in being part of a fast-paced team that is enabling the realization of strategic intent by solutioning and building modern network landscapes. These experiences include: History of working credibly with senior stakeholders Strong verbal and written skills including strong cross-cultural communication and the ability to draft effective communications Ability to work with people in a variety of cultures, countries and time zones Demonstrate excellent technical & architecture skills in the context of cloud-based platform/product design, service management and product lifecycle management Demonstrate ability to rapidly learn new and emerging technologies and developing a vision of their suitability and role as a new product within a platform & product landscape Design and develop scalable, secure, and resilient M365 solutions, including Exchange Online, SharePoint, Teams, OneDrive, and Security & Compliance features. Architect hybrid and cloud-native solutions leveraging Azure cloud services, including networking, compute, storage, and security. Design security frameworks leveraging Microsoft Defender, Sentinel, Intune, and Conditional Access policies. Experience with AI-powered IT operations (AIOps) for proactive issue detection, automated troubleshooting, and anomaly detection. Familiarity with Zero Trust architecture, policies and supporting network and security technologies. Strong ability to document processes, procedures and network designs clearly and accurately for distribution to internal teams and customers. To qualify for the role, you must have Creative and self-starter mindset with strong analytical and quantitative skills to operate without direct supervision on multiple complex projects and tasks, and their shifting priorities in parallel. Effective listening skills and display openness to other people's ideas and thoughts. Ability to deal efficiently with escalations, conflicts and difficult situations/people under pressure. Strong influencing skills to collaborate effectively and efficiently across the firm. English language skills - excellent written and verbal communication. Flexibility to work out of regular office hours to cater to the global organization needs. Ideally, you’ll also have Prior experience working for a large organization with a complex environment Education: Bachelor’s or master’s degree from an accredited college or university in Computer Science, Computer Engineering, MIS, or a closely related field Experience: 15+ years of experience in IT architecture, with a focus on Microsoft 365, data centers, and Azure cloud infrastructure. Possession of a current (non-expired) professional, industry recognized certification. Experience with enterprise IT governance, compliance, and risk management frameworks. Familiarity/experience with TOGAF methodology. What We Offer As part of this role, you'll work in a highly integrated, global team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next. Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way. Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 3 weeks ago

Apply

4.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-TDR Senior As part of our EY-cyber security team, who shall work as SOC Senior consultant who will assist clients in Administration and management of CrowdStrike Next-Gen SIEM/EDR. The opportunity We’re looking for Senior Security consultant with expertise CrowdStrike Next-Gen SIEM/EDR .This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Your Key Responsibilities Administration and management support of CrowdStrike Next-Gen SIEM/EDR Perform as the subject matter expert on any of the above solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. Content development (Use case development) which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Skills And Attributes For Success Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities. Experience in managing and administering security solution CrowdStrike Next-Gen SIEM/EDR Hands-on expertise in Security use case development and log source integration Good knowledge of SIEM technologies such as Splunk, Azure Sentinel from a Security Analyst’s point of view Exposure to IOT/OT monitoring (Claroty, Nozomi Networks etc.) is a plus Good knowledge and experience in Security Monitoring Good knowledge and experience in Cyber Incident Response Knowledge in ELK Stack Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in endpoint protection tools, techniques, and platforms such as Carbon Black, Tanium, CrowdStrike, Defender ATP or others To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Demonstrate both technical acumen and critical thinking abilities. Strong interpersonal and presentation skills. Minimum 4 years of Hands-on experience of operating/implementing the above security tools. Certification in any of the SIEM platforms is a plus Knowledge of RegEx, Perl scripting and SQL query language. Certification - CCSA, CEH, CISSP, GCIH, GIAC. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 3 weeks ago

Apply

4.0 years

0 Lacs

Coimbatore, Tamil Nadu, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-TDR Senior As part of our EY-cyber security team, who shall work as SOC Senior consultant who will assist clients in Administration and management of CrowdStrike Next-Gen SIEM/EDR. The opportunity We’re looking for Senior Security consultant with expertise CrowdStrike Next-Gen SIEM/EDR .This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Your Key Responsibilities Administration and management support of CrowdStrike Next-Gen SIEM/EDR Perform as the subject matter expert on any of the above solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. Content development (Use case development) which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Skills And Attributes For Success Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities. Experience in managing and administering security solution CrowdStrike Next-Gen SIEM/EDR Hands-on expertise in Security use case development and log source integration Good knowledge of SIEM technologies such as Splunk, Azure Sentinel from a Security Analyst’s point of view Exposure to IOT/OT monitoring (Claroty, Nozomi Networks etc.) is a plus Good knowledge and experience in Security Monitoring Good knowledge and experience in Cyber Incident Response Knowledge in ELK Stack Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in endpoint protection tools, techniques, and platforms such as Carbon Black, Tanium, CrowdStrike, Defender ATP or others To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Demonstrate both technical acumen and critical thinking abilities. Strong interpersonal and presentation skills. Minimum 4 years of Hands-on experience of operating/implementing the above security tools. Certification in any of the SIEM platforms is a plus Knowledge of RegEx, Perl scripting and SQL query language. Certification - CCSA, CEH, CISSP, GCIH, GIAC. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 3 weeks ago

Apply

4.0 years

0 Lacs

Kanayannur, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-TDR Senior As part of our EY-cyber security team, who shall work as SOC Senior consultant who will assist clients in Administration and management of CrowdStrike Next-Gen SIEM/EDR. The opportunity We’re looking for Senior Security consultant with expertise CrowdStrike Next-Gen SIEM/EDR .This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Your Key Responsibilities Administration and management support of CrowdStrike Next-Gen SIEM/EDR Perform as the subject matter expert on any of the above solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. Content development (Use case development) which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Skills And Attributes For Success Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities. Experience in managing and administering security solution CrowdStrike Next-Gen SIEM/EDR Hands-on expertise in Security use case development and log source integration Good knowledge of SIEM technologies such as Splunk, Azure Sentinel from a Security Analyst’s point of view Exposure to IOT/OT monitoring (Claroty, Nozomi Networks etc.) is a plus Good knowledge and experience in Security Monitoring Good knowledge and experience in Cyber Incident Response Knowledge in ELK Stack Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in endpoint protection tools, techniques, and platforms such as Carbon Black, Tanium, CrowdStrike, Defender ATP or others To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Demonstrate both technical acumen and critical thinking abilities. Strong interpersonal and presentation skills. Minimum 4 years of Hands-on experience of operating/implementing the above security tools. Certification in any of the SIEM platforms is a plus Knowledge of RegEx, Perl scripting and SQL query language. Certification - CCSA, CEH, CISSP, GCIH, GIAC. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 3 weeks ago

Apply

Exploring Sentinel Jobs in India

The job market for sentinel roles in India is currently on the rise, with a high demand for professionals who can effectively monitor and secure systems, networks, and data. Sentinel jobs are crucial in ensuring the safety and integrity of digital assets for organizations across various industries.

Top Hiring Locations in India

  1. Bangalore
  2. Hyderabad
  3. Mumbai
  4. Pune
  5. Chennai

Average Salary Range

The salary range for sentinel professionals in India varies based on experience and location. Entry-level positions may start around INR 3-5 lakhs per annum, while experienced professionals can earn upwards of INR 10-15 lakhs per annum.

Career Path

In the field of sentinel, a typical career path may progress from roles such as Security Analyst or Information Security Specialist to Senior Security Engineer, Security Architect, and eventually Chief Information Security Officer (CISO) or Security Consultant.

Related Skills

Alongside expertise in sentinel, professionals in this field are often expected to have knowledge of cybersecurity, network security, risk management, incident response, and penetration testing.

Interview Questions

  • What is the difference between vulnerability assessment and penetration testing? (medium)
  • Explain the concept of threat modeling and its importance in cybersecurity. (advanced)
  • How do you stay updated with the latest trends and threats in the cybersecurity landscape? (basic)
  • Can you describe the process of setting up a Security Information and Event Management (SIEM) system? (medium)
  • What are the common techniques used in social engineering attacks? (advanced)
  • How would you handle a security incident involving a data breach? (medium)
  • What is the role of encryption in data security? (basic)
  • Can you explain the difference between symmetric and asymmetric encryption algorithms? (medium)
  • How would you prioritize security vulnerabilities for remediation in a large organization? (advanced)
  • Describe a time when you successfully implemented a security control to mitigate a specific risk. (medium)
  • What steps would you take to secure a web application from common vulnerabilities? (basic)
  • How do you assess the security posture of a new IT infrastructure? (medium)
  • What is the importance of compliance frameworks such as GDPR or HIPAA in cybersecurity? (medium)
  • How do you handle security incidents involving insider threats? (advanced)
  • Explain the concept of zero-trust security and its benefits in modern cybersecurity. (medium)
  • How do you approach security awareness training for employees in an organization? (basic)
  • Can you describe the role of threat intelligence in cybersecurity operations? (medium)
  • What are the key components of a security incident response plan? (medium)
  • How would you conduct a security audit of an organization's network infrastructure? (advanced)
  • What are the main challenges in securing cloud environments? (medium)
  • How do you assess the security implications of introducing new technology or software in an organization? (medium)
  • What is the role of a Security Operations Center (SOC) in an organization's cybersecurity strategy? (basic)
  • Can you explain the concept of sandboxing in malware analysis? (advanced)
  • How do you approach incident triage and prioritization in a security operations environment? (medium)
  • Describe a recent security project you worked on and the challenges you faced during its implementation. (medium)

Closing Remark

As you prepare for your journey into the sentinel job market in India, remember to showcase your expertise, experience, and passion for cybersecurity. Stay updated with the latest trends and technologies, practice your skills, and approach interviews with confidence. Best of luck in your job search!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies