Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
15.0 years
0 Lacs
West Bengal
On-site
Job Information Date Opened 26/05/2025 Job Type Full time Industry IT Services City kolkata Province West Bengal Country India Postal Code 700091 About Us We are a fast growing technology company specializing in current and emerging internet, cloud and mobile technologies. Job Description CX is a product engineering services company and has launched many successful products for its clients since its inception. Many of these products have been running since 2013. We're looking for Head of IT Infrastructure owns the stability, security, scalability, and cost-effectiveness of all core technology services for Codelogicx. You will lead a small team of engineers and vendors to design, implement, and operate our on-prem and cloud-connected networks, servers, storage, identity platforms, and perimeter security (firewalls, VPN, IPS). Your mission is to deliver “five-nines” availability, strong cyber-resilience, and a friction-free user experience that enables every business function to perform at its best. Requirements Key Responsibilities Area What You’ll Own Identity & Access • Architecture, health, and lifecycle management of Active Directory, Azure AD, group policy, conditional access, SSO, MFA.• Joiner-Mover-Leaver processes, audit readiness, role-based access reviews. Network & Perimeter • Enterprise-class firewalls, routers, switches, load balancers, site-to-site VPNs, SD-WAN, and Internet Leased Lines (ILL).• Network segmentation, QoS, and continuous monitoring (NetFlow, SNMP, syslog, NMS). Cloud & Compute • Windows/Linux server estate (on-prem and IaaS), virtualization (VMware/Hyper-V), storage, backup, DR/BCP.• Collaboration with DevOps/SaaS teams to enforce landing-zone standards and secure connectivity. Endpoint & Mobility EDR/XDR platform (e.g., CrowdStrike, Microsoft Defender, SentinelOne)—policy tuning, threat-hunting, incident response. Mobile Device Management (Intune, Workspace ONE, Jamf) for laptops, phones, and BYOD; device compliance & encryption enforcement. Security & Compliance • Patch, vulnerability, and endpoint protection strategy.• Firewall ruleset hygiene, IPS/IDS tuning, zero-trust and least-privilege principles.• Support for ISO 27001, SOC 2, GDPR, HIPAA, or similar frameworks. Own ISO 27001 controls (A.5–A.18), evidence collection, internal audits, and external surveillance & recertification audits. Map controls to SOC 2 / GDPR / HIPAA where relevant. Drive vulnerability management, patch cadence, zero-trust micro-segmentation. Maintain SIEM/SOAR integrations. Strategy & Governance • 3-year infrastructure roadmap, budget planning, vendor selection & contract negotiation.• KPIs/SLAs, capacity planning, license compliance, documentation, and policy enforcement. Leadership & Support • Mentor a team of network/system admins (3-6 FTE) plus MSP partners.• Escalation point for P1 incidents; manage major incident bridge, RCA, post-mortems.• User-centric mindset—drive automation and self-service to reduce MTTR and service tickets. Required Qualifications Education: Bachelor’s degree in Computer Science, Information Systems, or related field (or equivalent experience). Experience: 10+ years in enterprise infrastructure roles, including 3+ years managing teams and multi-site networks for ~300 users. Technical depth in: o Active Directory, Azure AD/Entra ID, GPO, LDAP, DNS, DHCP. o Next-gen firewalls (Palo Alto, Fortinet, Cisco ASA/Firepower, etc.). o Endpoint security platforms (CrowdStrike, Defender, SentinelOne, Falcon Insight, etc.). o MDM/UEM suites (Intune, Workspace ONE, Jamf, or similar). o Routing & switching (OSPF/BGP, VLANs, spanning-tree, PoE, wireless controllers). o WAN technologies—ILL, MPLS, SD-WAN—and ISP/vendor management. o Virtualization (VMware ESXi/VCF or Hyper-V) and Windows/Linux server administration. o Backup/restore and DR replication (Veeam, Zerto, or similar). o Scripting/automation (PowerShell, Python, Ansible) and infrastructure-as-code concepts. o Audit leadership for ISO 27001; familiarity with SOC 2 Type II reporting. Certifications (any of): CCNP/CCIE, PCNSE/NSE 7+, Microsoft Entra ID or Azure Architect, VMware VCP-DCV, ISO 27001 Lead Auditor/Lead Implementer, CISSP/CISM, ITIL v4. Preferred/Bonus Skills Experience integrating on-prem AD with Microsoft 365, Intune, and conditional access. Familiarity with zero-trust network architecture and micro-segmentation projects. Exposure to SIEM/SOAR platforms (Splunk, Sentinel) and incident response playbooks. Track record of cost optimization (cloud egress, telco contracts, license audits). ITIL v4 certification and service-management process ownership. Personal Attributes Incident Commander: Calm, decisive, data-driven under pressure. Problem-solver: Data-driven, automation-first mindset, relentless focus on root cause. Leadership: Empowers and develops technical staff; calmly leads during outages. Strategic thinker: Balances immediate fixes with long-term modernization. Communicator: Translates tech risks and requirements into business language for executives. Strategic Builder: Balances quick wins with long-term modernisation and cost-optimisation. Benefits Health insurance. Hybrid working mode. Provident Fund. Parental leave. Yearly Bonus. Gratuity. Years of experience: Minimum 15 years Location: Kolkata Full time.
Posted 3 weeks ago
3.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : Microsoft Azure Sentinel Good to have skills : NA Minimum 3 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Summary: As an Application Developer, you will be responsible for designing, building, and configuring applications to meet business process and application requirements. You will play a crucial role in developing solutions to enhance business operations and efficiency. Roles & Responsibilities: - Expected to perform independently and become an SME. - Required active participation/contribution in team discussions. - Contribute in providing solutions to work related problems. - Collaborate with cross-functional teams to analyze business requirements and translate them into technical solutions. - Develop and implement software solutions to meet business needs. - Conduct code reviews and ensure code quality and best practices are followed. - Troubleshoot and debug applications to resolve issues in a timely manner. - Stay updated on emerging technologies and trends to suggest improvements and innovative solutions. Professional & Technical Skills: - Must To Have Skills: Proficiency in Microsoft Azure Sentinel. - Strong understanding of cloud computing principles and experience with Azure services. - Experience in designing and implementing scalable and secure applications on Azure cloud. - Knowledge of DevOps practices and tools for continuous integration and deployment. - Hands-on experience with monitoring, logging, and alerting tools for cloud-based applications. Additional Information: - The candidate should have a minimum of 3 years of experience in Microsoft Azure Sentinel. - This position is based at our Pune office. - A 15 years full-time education is required. 15 years full time education Show more Show less
Posted 3 weeks ago
5.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
About The Role We are seeking a highly skilled and experienced Senior DevOps Engineer to join our growing technology team. This role requires deep technical expertise in managing and automating on-premises, cloud, and hybrid infrastructure deployments. The ideal candidate will also bring a strong understanding of infrastructure security, compliance, and DevSecOps practices, ensuring scalable, resilient, and secure environments. Key Responsibilities Design, build, and maintain scalable and resilient CI/CD pipelines for on-prem, cloud (AWS/Azure/GCP), and hybrid environments. Implement and manage infrastructure-as-code (IaC) using tools such as Terraform, Ansible, or Pulumi. Oversee container orchestration and deployment using Docker, Kubernetes, and other relevant platforms. Lead configuration and monitoring of infrastructure with Prometheus, Grafana, ELK Stack, or similar tools. Implement security best practices in infrastructure and deployment pipelines (DevSecOps). Conduct risk assessments and vulnerability remediation across all environments. Collaborate with security, development, and operations teams to enforce governance and compliance requirements. Automate system provisioning, monitoring, and scaling using modern DevOps tools. Assist in disaster recovery planning and business continuity architecture for hybrid infrastructure. Perform routine system audits and patch management. Qualifications Bachelor's or Masters degree in Computer Science, Engineering, or a related field. Minimum 5 years of experience in DevOps, SRE, or infrastructure engineering. Proven experience with on-premise infrastructure management as well as public cloud platforms (AWS, GCP, Azure). Proficient in scripting languages like Bash, Python, or Go. Hands-on experience with CI/CD tools like Jenkins, GitLab CI/CD, ArgoCD, or CircleCI. Solid understanding of networking, firewalls, VPNs, and load balancing in both cloud and on-prem contexts. Deep understanding of security practices such as zero trust, IAM, encryption, auditing, and compliance frameworks (e.g., ISO 27001, SOC 2, HIPAA). Certifications like AWS Certified DevOps Engineer, Certified Kubernetes Administrator (CKA), or Certified Information Systems Security Professional (CISSP) are a plus. Nice to Have Experience with hybrid workload orchestrators (e.g., Anthos, Azure Arc). Knowledge of observability best practices and tools like Open Telemetry. Familiarity with policy-as-code tools like OPA/Gatekeeper or HashiCorp Sentinel. Locations Bangalore Show more Show less
Posted 3 weeks ago
0 years
0 Lacs
Bangalore Urban, Karnataka, India
On-site
What Success Looks Like In This Role Key Responsibilities Analyzing network traffic to identify compromised systems, negate denial of service attacks, and pinpoint resource abuse. Incorporate threat intelligence feeds into Microsoft Sentinel to enhance threat detection and response capabilities. Develop and implement security automation scripts and playbooks in Microsoft Sentinel to streamline security operations. Create reports and documentation related to security incidents, investigations, and overall security posture. Supporting priority incident investigations and threat intelligence discoveries with hunting expertise to identify the extent of any potential compromise. Respond to security incidents by containing, eradicating, and recovering from them using Microsoft Defender's tools and features. Educate users and colleagues about cybersecurity best practices and the use of Microsoft Defender. Perform onboarding and offboarding defender agents. Troubleshoot Defender agents not reporting to the portal Conduct investigations using EDR and live response Conduct Vulnerability Assessment using Defender. Investigate, identify, and prevent or mitigate abusive activities such as intrusion attempts, DDoS, malware distribution, phishing attacks, etc. Monitoring threat/vulnerability landscape and security advisories Appropriately manage time and customer issues based on issue severity and business needs Continuously monitors the security alerts queue, triages security alerts Monitors health of customer security sensors and SIEM infrastructure Ensures documented processes and procedures are relevant and up to date Investigate, document, and report on any security threat issues as well as emerging trends Enabling a world-class cyber defense program by working closely with other technical, vulnerability management, incident management, intelligence analyst and forensic personnel to develop a fuller understanding of the intent, objectives, and activity of cyber threat actors, and ultimately drive improvement to the organizations’ overall security posture Notify appropriate business stakeholders about serious security events, implement security improvements by assessing current situation, evaluating market trends, and anticipating requirements Perform threat hunting and threat analysis Monitor, detect, and analyze network threats Employ automation to aid in research and hunting tasks Write blogs and papers related to threat hunting and analysis Investigate, document, and report all security issues to contribute to incident response You will be successful in this role if you have: Qualifications Key Qualifications A Bachelor’s or Master's degree from a university (preferably in Computer Science, Engineering, or a related discipline), or equivalent security industry work experience Unisys is proud to be an equal opportunity employer that considers all qualified applicants without regard to age, blood type, caste, citizenship, color, disability, family medical history, family status, ethnicity, gender, gender expression, gender identity, genetic information, marital status, national origin, parental status, pregnancy, race, religion, sex, sexual orientation, transgender status, veteran status or any other category protected by law. This commitment includes our efforts to provide for all those who seek to express interest in employment the opportunity to participate without barriers. If you are a US job seeker unable to review the job opportunities herein, or cannot otherwise complete your expression of interest, without additional assistance and would like to discuss a request for reasonable accommodation, please contact our Global Recruiting organization at GlobalRecruiting@unisys.com or alternatively Toll Free: 888-560-1782 (Prompt 4). US job seekers can find more information about Unisys’ EEO commitment here. Show more Show less
Posted 3 weeks ago
0 years
0 Lacs
Gurgaon, Haryana, India
Remote
Ankura is a team of excellence founded on innovation and growth. Location: Conditional Remote / Gurgaon Hours: 40 hours a week Reporting: Director - Threat Detection Operations (TDO) Duties include continuous monitoring of Security Information Event Management (SIEM), EDR, XDR, DLP and related platforms for correlated events and alerts and working with the client to take action. Analysts leverage events to determine the impact, document possible causes, and provide useful information to clients. A deep understanding of various commercial and open-source network sensors, intrusion detection systems, and event log correlation engines is required as analysts are expected to deliver enhanced threat awareness and knowledge through research and continuous improvement of use cases, signatures, and metrics. Knowledgeable in various IR response commands related to Windows, Linux and advanced attack techniques related to Endpoints and servers Analysts are also expected to maintain open communication and visibility with their team members, Senior Analysts, Directors, and Clients. Usually, employees will be permitted to work remotely in the current operational setup however that setup may change based on company and/or business needs, with or without notice. It may also be considered a conditional privilege as the employees are personally responsible to maintain uninterrupted availability and communication via all official channels throughout their designated shifts. If the employee's performance cannot be satisfactorily ascertained by their manager or the employee is unable to adapt to work without disturbance, they may be called upon to work out of the company’s office. Capabilities Preferred to have some formal training or experience in delivering Managed Security or Managed Detection and Response Services. Preferred to have a sound understanding and up-to-date knowledge of common security threats, attack vectors, vulnerabilities, exploits, and Network Architecture / Protocols (such as OSI, TCP/IP, P2P, etc.) and Packet Analysis. Must have hands-on experience to correlate and analyze information, raw logs, and complex data sets from a wide variety of enterprise technologies including but not limited to SIEM, UEBA, EDR, IDS, IPS, Proxy, Firewall, DLP, and other Threat intelligence tools and Telemetries for anomalous activity and items of interest. Preferred to have the necessary experience to conduct initial triage of security events and incidents; determine the priority, criticality, and impact; facilitate communication within the SOC, escalate to the client for containment and remediation, and document/journal progress throughout the Incident Response Lifecycle within the respective service level objectives. Experience in conducting research analysis and data gathering requirements to present in a report format is preferred. Should be able to develop/follow standard processes and complete documentation as needed. Should be detail-oriented and able to work independently and communicate effectively both verbally and in writing. Must be flexible enough to work in a 24x7 rotational shift setup, including overnight, weekend, and national holidays. TECHNICAL Traditional SIEM ArcSight ESM. Emerging SIEM such as MS Azure Sentinel, Exabeam, Obsidian. Experience in handling investigations related to XDR and Good knowledge of latest endpoint/Server based attacks Endpoint awareness for Carbon Black, CrowdStrike, SentinelOne, MS Defender. Knowledge of IR process, Ticketing tools Understanding of KQL, Lucene, Python, and/or other similar programming/query/scripting languages Education, Training & Certifications Minimum Experince in SOC/IR 1 yrs plus Preferred to have a degree in CS/IT or a Masters's Diploma in the field of IT Security from specialized schools Preferred to have relevant entry-level or mid-level security certifications such as CEH, Security+. COMMUNICATION Comfortable working in a remote work environment including web-based team management and collaboration applications, and time-keeping systems e.g. Slack, Microsoft Teams, Intapp, and Workday. Ability to communicate complex ideas effectively, both verbally and in writing in English and the local office language(s) Able to provide reports showing progress or achievement of assigned goals and responsibilities as required. Must be an active listener and ask questions of others when clarity is needed Ability to gain an understanding of client needs and apply analytic reasoning Demonstrates proactive engagement in meetings and process discussions KEY PERFORMANCE INDICATORS Analyze client networks for threats using analytical platforms for event monitoring such as NSM, SIEM, UEBA, ETDR. Deliver client reports based on analyses that are timely, high quality, and accurate. Understand and support incident response and triage Improve reporting to avoid ‘analysis paralysis’. Develop new skills within analytical platforms INDIVIDUAL & TEAMWORK Must be able to effortlessly switch between independent and team-based work Understands that the work product is dependent on team efforts and remains responsive to internal and external deadlines Able to share expertise and experience with team members to encourage growth and shared success Able to maintain focus and attention to detail for sustained periods of time Engaged in supporting the development and growth of all team members GROWTH MINDSET Can receive and provide feedback in a constructive manner that leads to the growth of self and others. Displays perseverance of effort and passion for a long-term goal and end state. Works well under timelines and puts in extra effort as required to meet timelines. Self-motivated to identify areas for team & process improvement and collaborate with others to develop creative solutions LEADERSHIP TRAITS Willing to adapt leadership skills to support larger and more complex projects. Work product for self and team is consistently of excellent quality and efficiency. Respectful and professional in all interactions with team members, clients, and colleagues. Maintains composure and calm disposition under high-pressure or stressful circumstances. Ankura is an Affirmative Action and Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against based on disability. Equal Employment Opportunity Posters, if you have a disability and believe you need a reasonable accommodation to search for a job opening, submit an online application, or participate in an interview/assessment, please email accommodations@ankura.com or call toll-free +1.312-583-2122. This email and phone number are created exclusively to assist disabled job seekers whose disability prevents them from being able to apply online. Only messages left for this purpose will be returned. Messages left for other purposes, such as following up on an application or technical issues unrelated to a disability, will not receive a response. Show more Show less
Posted 3 weeks ago
4.0 - 6.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
We use cookies to offer you the best possible website experience. Your cookie preferences will be stored in your browser’s local storage. This includes cookies necessary for the website's operation. Additionally, you can freely decide and change any time whether you accept cookies or choose to opt out of cookies to improve website's performance, as well as cookies used to display content tailored to your interests. Your experience of the site and the services we are able to offer may be impacted if you do not accept all cookies. Press Tab to Move to Skip to Content Link Skip to main content Home Page Home Page Life At YASH Core Values Careers Business Consulting Jobs Digital Jobs ERP IT Infrastructure Jobs Sales & Marketing Jobs Software Development Jobs Solution Architects Jobs Join Our Talent Community Social Media LinkedIn Twitter Instagram Facebook Search by Keyword Search by Location Home Page Home Page Life At YASH Core Values Careers Business Consulting Jobs Digital Jobs ERP IT Infrastructure Jobs Sales & Marketing Jobs Software Development Jobs Solution Architects Jobs Join Our Talent Community Social Media LinkedIn Twitter Instagram Facebook View Profile Employee Login Search by Keyword Search by Location Show More Options Loading... Requisition ID All Skills All Select How Often (in Days) To Receive An Alert: Create Alert Select How Often (in Days) To Receive An Alert: Apply now » Apply Now Start apply with LinkedIn Please wait... Consultant - SOC L2 (3) Job Date: May 24, 2025 Job Requisition Id: 60692 Location: Hyderabad, TG, IN Indore, MP, IN, 452001 Pune, IN YASH Technologies is a leading technology integrator specializing in helping clients reimagine operating models, enhance competitiveness, optimize costs, foster exceptional stakeholder experiences, and drive business transformation. At YASH, we’re a cluster of the brightest stars working with cutting-edge technologies. Our purpose is anchored in a single truth – bringing real positive changes in an increasingly virtual world and it drives us beyond generational gaps and disruptions of the future. We are looking forward to hire SOC Management Professionals in the following areas : SOC L2 Experience : 4-6 Years. Location : Hyderabad / Pune / Indore Shift : Rotational JD for SOC L2. Desired Candidate Must Have Below Experience : Resolve escalations from L1 and assit them if required in triaging. SIEM - Azure Sentinel troubleshooting skills Must have knowledge of creation / modification of Rules / Use cases / Playbooks (KQL Queries) SOP Creations / Fine-tuning use cases. Incident Triaging Log Source Integration Understand security incident management and ticket resolution process Experience in participating in critical Incident Management Process and Contribute at L2/L3 level trouble shooting Collaborate with peer groups and promote problem solving Flexible to work in shift hours Experience in handling technical client inquiries Perform both internal and external stakeholder management. Must be able to articulate the report and provide more technical deep dive where appropriate and architecture where necessary Good communication skills and analytical skills. Good knowledge on the concepts like Host base firewall, DDoS, Vulnerability Assessment, Threat Management. Threat Analysis: Monitor for emerging threats and vulnerabilities. Analyze threat intelligence to identify potential risks to the organization. Develop and maintain threat indicators and detection rules. Experience in participating in critical Incident Management Process and Contribute at L2/L3 level trouble shooting Reporting: Prepare incident reports and security metrics. (Daily / Weekly/ Monthly Reports) Provide regular updates to management on the security posture of the organization. Understand security incident management and ticket resolution process Documentation : Maintain up-to-date documentation of security procedures and processes. Assist in the development and maintenance of security policies and standards. Incident Response: Investigate and analyze security alerts and events. Coordinate with other teams to ensure a timely and effective response to major incidents. Triage incidents and escalate to L3 analysts as necessary. Conduct in-depth analysis of security incidents to identify root causes and recommend remediation steps. Coordinate with other teams (e.g., IT, network, application) to resolve incidents. Qualifications: Bachelor's degree in computer science, information security, or a related field. 4-6 years of experience in cybersecurity, with at least 4 years in a SOC environment. Strong understanding of security concepts, including threat vectors, attack methods, and mitigation techniques. Proficiency in using security tools and technologies (e.g., SIEM, IDS/IPS, firewall, vulnerability scanners). Knowledge of scripting languages (e.g., KQL) is a must. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills. Ability to work effectively in a fast-paced, high-pressure environment. Certifications (preferred): Certified Ethical Hacker (CEH) Certified Security Analyst (CSA) At YASH, you are empowered to create a career that will take you to where you want to go while working in an inclusive team environment. We leverage career-oriented skilling models and optimize our collective intelligence aided with technology for continuous learning, unlearning, and relearning at a rapid pace and scale. Our Hyperlearning workplace is grounded upon four principles Flexible work arrangements, Free spirit, and emotional positivity Agile self-determination, trust, transparency, and open collaboration All Support needed for the realization of business goals, Stable employment with a great atmosphere and ethical corporate culture Apply now » Apply Now Start apply with LinkedIn Please wait... Find Similar Jobs: Careers Home View All Jobs Top Jobs Quick Links Blogs Events Webinars Media Contact Contact Us Copyright © 2020. YASH Technologies. All Rights Reserved. Show more Show less
Posted 3 weeks ago
5.0 - 7.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
Role Description Job Title: L3 SOC Analyst Experience : 5 to 7 years Location: Trivandrum, Kochi, Chennai, Bangalore, Hyderabad Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. Must-Have Skills Experience with SIEM vendors such as QRadar, Sentinel, Splunk Incident response and threat hunting expertise Strong knowledge of attack patterns, Tools, Techniques, and Procedures (TTPs) Experience in writing procedures, runbooks, and playbooks Strong analytical and problem-solving skills Hands-on experience with system logs, network traffic analysis, and security tools Proficiency in identifying Indicators of Compromise (IOCs) and Advanced Persistent Threats (APTs) Good-to-Have Skills Experience setting up SIEM solutions and troubleshooting connectivity issues Familiarity with security frameworks and best practices Ability to collaborate with IT and security teams effectively Responsibilities Act as an escalation point for high and critical severity security incidents Conduct in-depth investigations to assess impact and understand the extent of compromise Analyze attack patterns and provide recommendations for security improvements Perform proactive threat hunting and log analysis to detect potential threats Provide guidance on mitigating risks and improving security hygiene Identify gaps in security processes and propose enhancements Ensure end-to-end management of security incidents Document and update incident response processes and define future outcomes Participate in war room discussions, team meetings, and executive briefings Train team members on security tools and incident resolution procedures Show more Show less
Posted 3 weeks ago
9.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Job Title: Senior SOC Analyst (SIEM, Threat Hunting & Incident Response) Department: Cybersecurity & IT Risk Management Reports To: CISO / Director – Cybersecurity & GRC Location: Manesar, Haryana (On-site at Client Location) Employer: VVNT SEQUOR, Noida Summary: VVNT SEQUOR is hiring a Senior SOC Analyst to strengthen the cybersecurity posture of a leading client in Manesar, Haryana. This is a full-time on-site role requiring deep hands-on expertise in threat detection, incident response, SIEM management, and vulnerability assessments. As a senior member of the Security Operations Center (SOC), you will lead advanced threat-hunting efforts, optimize detection logic, and ensure rapid response to cybersecurity events. Your key responsibilities will include: Leading 24x7 SOC operations , threat monitoring, triage, and escalations using tools like ArcSight, Splunk, and ELK . Creating and fine-tuning correlation rules , dashboards, and playbooks to enhance detection capabilities. Executing proactive threat hunting using MITRE ATT&CK , EDR telemetry, threat intel feeds, and custom threat models. Coordinating and leading incident response , performing forensic investigations using CHFI methodologies , memory analysis, and endpoint data. Performing and overseeing Vulnerability Assessment & Penetration Testing (VAPT) using Nessus, Qualys, OpenVAS, Metasploit , and Burp Suite . Managing EDR and SOAR platforms , integrating automated responses and threat intelligence feeds. Administering and securing firewalls (FortiGate, Palo Alto), WAFs, IDS/IPS, and Anti-DDoS infrastructure. Maintaining compliance with ISO 27001, NIST CSF, and internal security baselines , conducting regular audits and patch validations. Documenting Root Cause Analyses (RCA) , incident timelines, and post-incident review reports. Leading security awareness programs (e.g., KnowBe4) and mentoring junior analysts. We are looking for someone with: Bachelor's degree in Cybersecurity, Information Security, or related field. 7–9 years of SOC and cybersecurity operations experience. Strong knowledge of SIEMs (e.g., ArcSight, Splunk), EDRs (CrowdStrike, SentinelOne) , and log correlation techniques . Proven skills in threat analysis, IOC handling, malware analysis , and incident lifecycle management . Working experience with security automation (SOAR) and scripting (e.g., Python, PowerShell) for response actions. Solid understanding of MITRE ATT&CK, NIST 800-61, OWASP Top 10 , and compliance mandates . Proven experience in writing technical incident reports, security playbooks, and conducting RCA. Bonus points for: Certifications like CEH, CHFI, Security+, GCIA, GCFA, Splunk Certified Analyst, PCNSE . Experience with Tripwire SCM, KnowBe4 , or cloud-native security tools (AWS GuardDuty, Azure Sentinel). Exposure to OT/ICS security , manufacturing, or automotive environments. Familiarity with Purple Teaming, Red Team/Blue Team drills , and Threat Intelligence Platforms (TIPs) . Why join VVNT SEQUOR? Lead and influence real-time SOC strategies for a mission-critical enterprise. Gain hands-on experience with top-tier cybersecurity technologies and threat landscapes. Subsidized Cab and Lunch facilities at client site. Work in a client-focused, innovation-driven cybersecurity environment. To Apply: Please submit your resume along with the cover letter to chaitali@vvntsequor.in or parveen.arora@vvntsequor.in Also, you can connect over WhatsApp +91-9891810196 or +91-8802801739 IMPORTANT: Do mention clearly to Job Role that you are applying for along with your Last Salary Drawn information as well as your Earliest Joining Date in your covering letter or email. Show more Show less
Posted 3 weeks ago
2.0 years
0 Lacs
Delhi, India
On-site
We are looking to expand our security operations capabilities within a rapidly expanding team that provides security services to protect our business and clients. This role will report into our Security Operations Manager and will work closely across all IT Teams and business units. In this role, you will be responsible for monitoring, detecting, and responding to security incidents, as well as managing the overall security posture of the organisation's Microsoft ecosystem. The ideal candidate will have a deep understanding of Microsoft security tools, systems, and best practices. Your success will contribute to helping improve security across the business, making recommendations and assisting with the delivery of a continuous improvement security strategy. Training time and support will be provided for you to achieve accreditations from Microsoft Security Operations Analyst through to Microsoft Certified Security Administrator Associate. Requirements What You'll Do: General Duties And Responsibilities Actively monitor security logs, alerts, and events from Microsoft security solutions (e.g., Microsoft Sentinel, Microsoft Defender for Identity, Microsoft Defender for Endpoint, Azure Security Center) to detect potential security threats and vulnerabilities. Analyse security and risk issues, to provide risk-weighted recommendations to internal users and customers. Investigate, analyse, and respond to security incidents involving Microsoft environments. Provide root cause analysis and document findings for post-incident reviews. Monitor, react to, investigate, and respond to all real or perceived information security and cyber related events, issues, incidents, threats and attacks. Gather, analyse, and integrate threat intelligence related to Microsoft products and services to enhance detection and response capabilities. Work with existing teams (Service desk, Software Engineering, DevOps, Data) to quickly assess security issues and process the most appropriate action. Follow, create and improve standard security operation procedures and practices to protect the business and clients. Support internal and external audits related to Microsoft environments, ensuring compliance with security policies, regulatory requirements (e.g., GDPR), and best practices. Provide guidance and training to internal teams on best practices for securing Microsoft environments, including safe use of Microsoft 365, Azure Active Directory, and other key Microsoft services. Ability to install security software and applications. Incident Management Track and manage security incidents, ensuring incidents are triaged, prioritized, and responded to within the organisation's SLAs. Provide clear and concise communication with stakeholders regarding incident status and resolution. Assist and support the manager in event/incident handling and investigations. Support the Critical Incident Management process for cyber related events. Inclusion with our 24/7 on call rota. Collaboration and Effective Communication Work closely with IT, system administrators, and other security teams to coordinate incident response efforts, identify vulnerabilities, and implement mitigation strategies across the Microsoft technology stack. Communicate regularly with the Service Delivery managers and Service Delivery team members. Ensure that the IT Security documentation is maintained and updated regularly as required. Who You Are: 2+ years of experience in Security Operations, IT security, or a similar field, with a focus on Microsoft technologies. Experience with security incident detection, analysis, and response in a Microsoft-centric environment. Familiarity with Microsoft Defender for Endpoint, Microsoft Sentinel, Microsoft Defender for Identity, and Azure Security Center. Experience of working in a diverse Global Company. Excellent knowledge of Computer Networking and IT Security and strong endpoint and networks troubleshooting skills. Experience with Security frameworks, ISO 27001, Cyber Essentials, NIST, PCI. Experience of investigating security issues/incidents. Desirable knowledge of security solutions and technologies including Network Firewalls, proxy technologies, EDR, SIEM. Desirable qualifications Microsoft Certified: Azure Security Engineer Associate, Microsoft Certified: Security, Compliance, and Identity Fundamentals, CompTIA Security+, Certified Information Systems Security Professional (CISSP), or other relevant security certifications. Good communication (English Writing, Reading and Speaking) skills and ability to articulate subjects clearly. Proven analytical and problem-solving skills. Strong documentation skills. Organised, methodical and self-motivated. Keeping abreast of industry trends and security technologies. Takes the initiative to proactively resolve issues within own remit and recognises when escalation is required. Uses own knowledge and experience to make sounds judgements or assist others with sound judgements. Considers the regional and global implications of what we do in our own areas of responsibility. Identifies and builds relationships across team and region. Understands need to work within project scope, including price. Shows understanding of others in order to influence as appropriate. Show more Show less
Posted 3 weeks ago
15.0 years
0 Lacs
India
Remote
Join the Future of Supply Chain Intelligence — Powered by Agentic AI At Resilinc, we’re not just solving supply chain problems — we’re pioneering the intelligent, autonomous systems that will define its future. Our cutting-edge Agentic AI enables global enterprises to predict disruptions, assess impact instantly, and take real-time action — before operations are even touched. Recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Supply Chain Risk Management, we are trusted by marquee clients across life sciences, aerospace, high tech, and automotive to protect what matters most — from factory floors to patient care. Our advantage isn’t just technology — it’s the largest supplier-validated data lake in the industry, built over 15 years and constantly enriched by our global intelligence network. It’s how we deliver multi-tier visibility, real-time risk assessment, and adaptive compliance at scale. But the real power behind Resilinc? Our people. We’re a fully remote, mission-driven global team, united by one goal: ensuring vital products reach the people who need them — when and where they need them. Whether it’s helping ensure cancer treatments arrive on time or flagging geopolitical risks before they disrupt critical supply lines, you’ll see your impact every day. If you're passionate about building technology that matters, driven by purpose, and being an agent of change who is ready to shape the next era of self-healing supply chains, we’d love to meet you. Resilinc | Innovation with Purpose. Intelligence with Impact. About The Role Are you a seasoned cloud security expert with a passion for protecting complex, fast-moving environments? We're looking for a Senior Security Analyst to take the lead in securing our Azure infrastructure and DevOps pipelines across cutting-edge, cloud-native SaaS applications. This is your opportunity to step into a high-impact role where your technical expertise, strategic mindset, and hands-on skills will directly influence the security posture of a rapidly growing tech organization. You'll work at the intersection of Azure cloud, CI/CD pipelines, and enterprise-grade security tools — from Azure Security Center and Sentinel to Terraform and CrowdStrike — while navigating critical compliance landscapes like SOC 2, ISO 27001, FedRAMP, and GDPR. If you're driven by challenge, thrive in complex environments, and want to make a real difference in cloud security, we want to hear from you. What You Will Do Monitor, investigate, and respond to security events and incidents in the Azure cloud environment, including networking, applications, and data storage Collaborate with DevOps to integrate security best practices into Azure-based CI/CD pipelines and infrastructure-as-code processes (e.g., ARM templates, Terraform) Develop, document, and enforce Azure security policies and best practices (e.g., role-based access control (RBAC), AzureAD, Azure Security Center) Automate security detection, response, and vulnerability management tasks within Azure environments Conduct threat hunting activities to identify potential security risks within cloud-based infrastructure Guide teams on how to implement secure cloud-native services, including secure API access, encryption, and identity management within Azure Perform thread modelling, vulnerability assessments, and risk analysis for Azure resources and provide remediation recommendations Support compliance initiatives such as SOC2, ISO 27001, FedRAMP, and GDPR, ensuring that Azure deployments meet necessary security standards and regulations Improve security automation in Azure environments, leveraging tools like Azure Sentinel, Microsoft Defender, and Azure Security Center What You Will Bring 5-8 years of experience in cybersecurity, with a strong focus on Azure cloud security and DevOps environments Extensive hands-on experience securing Azure cloud infrastructure, including knowledge of Azure AD, Azure Security Center, Azure Sentinel, and Microsoft Defender Familiarity with Azure-native security features such as encryption at rest, key vault management, and secure access controls (RBAC) Strong experience with infrastructure-as-code (e.g., Terraform, Azure Resource Manager templates) and CI/CD pipeline security Proficient with security tools like SIEM (Splunk, ELK), EDR solutions (CrowdStrike, SentinelOne), and cloud security posture management (CSPM) platforms Experience in Thread Modelling for cloud native SAAS applications Understanding of compliance frameworks (SOC2, ISO 27001, FedRAMP, GDPR) and how they apply to Azure environments Certifications such as Microsoft Certified: Azure Security Engineer Associate, OSCP, or similar are highly desirable What Will Make You Stand Out Experience with container security (Kubernetes, Docker) in Azure Familiarity with Azure-specific security services like Azure Firewall, Azure Bastion, and Azure Key Vault Knowledge of threat intelligence integration with Azure Sentinel and other SIEM tools Experience in building and maintaining automated vulnerability scanning and remediation solutions in Azure If you are a person with a disability needing assistance with the application process please contact HR@resilinc.com. Benefits We offer comprehensive benefits that are specific to each country. Your talent acquisition contact can provide you with a FAQ list for your country. Everyone at Resilinc is eligible for healthcare coverage, retirement benefits, paid time off and learning and development opportunities. To learn more about Resilinc, visit our website: Resilinc End-to-End Supply Chain Risk Management Solutions - Resilinc Show more Show less
Posted 3 weeks ago
15.0 years
0 Lacs
Pune, Maharashtra, India
Remote
Join the Future of Supply Chain Intelligence — Powered by Agentic AI At Resilinc, we’re not just solving supply chain problems — we’re pioneering the intelligent, autonomous systems that will define its future. Our cutting-edge Agentic AI enables global enterprises to predict disruptions, assess impact instantly, and take real-time action — before operations are even touched. Recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Supply Chain Risk Management, we are trusted by marquee clients across life sciences, aerospace, high tech, and automotive to protect what matters most — from factory floors to patient care. Our advantage isn’t just technology — it’s the largest supplier-validated data lake in the industry, built over 15 years and constantly enriched by our global intelligence network. It’s how we deliver multi-tier visibility, real-time risk assessment, and adaptive compliance at scale. But the real power behind Resilinc? Our people. We’re a fully remote, mission-driven global team, united by one goal: ensuring vital products reach the people who need them — when and where they need them. Whether it’s helping ensure cancer treatments arrive on time or flagging geopolitical risks before they disrupt critical supply lines, you’ll see your impact every day. If you're passionate about building technology that matters, driven by purpose, and being an agent of change who is ready to shape the next era of self-healing supply chains, we’d love to meet you. Resilinc | Innovation with Purpose. Intelligence with Impact. About The Role Are you a seasoned cloud security expert with a passion for protecting complex, fast-moving environments? We're looking for a Senior Security Analyst to take the lead in securing our Azure infrastructure and DevOps pipelines across cutting-edge, cloud-native SaaS applications. This is your opportunity to step into a high-impact role where your technical expertise, strategic mindset, and hands-on skills will directly influence the security posture of a rapidly growing tech organization. You'll work at the intersection of Azure cloud, CI/CD pipelines, and enterprise-grade security tools — from Azure Security Center and Sentinel to Terraform and CrowdStrike — while navigating critical compliance landscapes like SOC 2, ISO 27001, FedRAMP, and GDPR. If you're driven by challenge, thrive in complex environments, and want to make a real difference in cloud security, we want to hear from you. What You Will Do Monitor, investigate, and respond to security events and incidents in the Azure cloud environment, including networking, applications, and data storage Collaborate with DevOps to integrate security best practices into Azure-based CI/CD pipelines and infrastructure-as-code processes (e.g., ARM templates, Terraform) Develop, document, and enforce Azure security policies and best practices (e.g., role-based access control (RBAC), AzureAD, Azure Security Center) Automate security detection, response, and vulnerability management tasks within Azure environments Conduct threat hunting activities to identify potential security risks within cloud-based infrastructure Guide teams on how to implement secure cloud-native services, including secure API access, encryption, and identity management within Azure Perform thread modelling, vulnerability assessments, and risk analysis for Azure resources and provide remediation recommendations Support compliance initiatives such as SOC2, ISO 27001, FedRAMP, and GDPR, ensuring that Azure deployments meet necessary security standards and regulations Improve security automation in Azure environments, leveraging tools like Azure Sentinel, Microsoft Defender, and Azure Security Center What You Will Bring 5-8 years of experience in cybersecurity, with a strong focus on Azure cloud security and DevOps environments Extensive hands-on experience securing Azure cloud infrastructure, including knowledge of Azure AD, Azure Security Center, Azure Sentinel, and Microsoft Defender Familiarity with Azure-native security features such as encryption at rest, key vault management, and secure access controls (RBAC) Strong experience with infrastructure-as-code (e.g., Terraform, Azure Resource Manager templates) and CI/CD pipeline security Proficient with security tools like SIEM (Splunk, ELK), EDR solutions (CrowdStrike, SentinelOne), and cloud security posture management (CSPM) platforms Experience in Thread Modelling for cloud native SAAS applications Understanding of compliance frameworks (SOC2, ISO 27001, FedRAMP, GDPR) and how they apply to Azure environments Certifications such as Microsoft Certified: Azure Security Engineer Associate, OSCP, or similar are highly desirable What Will Make You Stand Out Experience with container security (Kubernetes, Docker) in Azure Familiarity with Azure-specific security services like Azure Firewall, Azure Bastion, and Azure Key Vault Knowledge of threat intelligence integration with Azure Sentinel and other SIEM tools Experience in building and maintaining automated vulnerability scanning and remediation solutions in Azure If you are a person with a disability needing assistance with the application process please contact HR@resilinc.com. Benefits We offer comprehensive benefits that are specific to each country. Your talent acquisition contact can provide you with a FAQ list for your country. Everyone at Resilinc is eligible for healthcare coverage, retirement benefits, paid time off and learning and development opportunities. To learn more about Resilinc, visit our website: Resilinc End-to-End Supply Chain Risk Management Solutions - Resilinc Show more Show less
Posted 3 weeks ago
0 years
0 Lacs
India
Remote
SDWAN Network Engineer Location – Remote – 12 months contract – 12000/Day SDWAN( Juniper) Network Engineer Role: Must have atleast 10 yrs of experience as Network Engineer. Proven track record as an SDWAN Network Engineer. Must have experience in Global networks. You will be responsible for the planning, conception, configuration, network migrations, implementation of commissioning, and operation of complex network systems Must have done SDWAN (Juniper) rollout. Experience in Data Center Consolidation. Experience in Intune roll outs. Experience in Azure Landing Zones. Experience in Aruba and Cato products SDWAN( Juniper): SASE New servers rollout experience. Wi-Fi for the sites Azure Landing zones Software-defined Networking (SD-WAN) and secure access service edge (SASE). Networks: Palo Alto Firewalls & Prisma, F5 VPN/Load Balancers, Cisco Switching, Meraki Switching/Access Points, Aruba AP/WLAN Controllers. Security: Microsoft Sentinel / Defender, Intune, FireEye, Gigamon, Guardicore, IDS / ProtectWise, Secret Server, Symantec VIP, Authenticator. Collaborative, analytical, proactive, curious, pragmatic, process, customer and results-oriented. Strong commercial acumen. Good communication skills with very good knowledge of German (level C1 or higher) and English (level B2 or higher) Show more Show less
Posted 3 weeks ago
0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Role: DevSecOps Engineer - Azure Key Vault PKI, HSM , Crypto Exp: 7 to12 yrs Location: Gurgaon / Chennai / Hyderabad / Bangalore / Pune Notice Period: Only Immediate Joiner Requirements: DevSecOps(Networks) - VPC, Access Policies, Firewall, VNet, load balancer, Azure Private Link, NSG(Network Security Group) DevSecOps (Azure Key Vault PKI, HSM , Crypto) - DevSecOps, Terraform, Python, Azure Sentinel, Azure Key Vault, Cloud KMS, HSM, PKI, Crypto, Secrets Management, Certificate Management, Key Management DevSecOps (Cloud Logging / Analytis) - DevSecOps, Terraform, Python, Cloud Logging, Cloud vpn or Axis Atmos, Azure Log collector, Azure Log Analytics, Google Log storage, Big Query, Azure Sentinel, Jenkins or Harness Key word: (Matching minimum 3 words) Python, Terraform, Azure Sentinel, Azure Key Vault Cloud Logging. Cloud VPN, Azure Log collector, Azure Log Analytics Google Log storage, Big Query Firewall, VNet , VPC, Access Policies, Load Balancer, Azure Private Link, NSG (Network Security Group) Show more Show less
Posted 3 weeks ago
0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
About the Team : As a Global Managed Security Service Provider, Getronics is increasingly required to demonstrate security capability and compliance to gain the trust and confidence of our clients. The Getronics Security team is part of our effort to respond to this need, to give our clients the assurance that their services are secure and to be a trusted advisor on all matters relating to security. About the Role : The Internal Security Engineer is responsible for evaluating, testing, and implementing security recommendations to strengthen the organisation’s security posture. This role ensures that security updates, best practices, and threat mitigation strategies are effectively integrated into the IT environment, reducing risks and enhancing compliance with industry standards. By proactively addressing vulnerabilities and optimising security solutions, the role helps protect critical business assets, prevent cyber threats, and maintain operational resilience. This position also collaborates with internal teams to improve incident response, automate security processes, and ensure the seamless deployment of security controls across systems. Responsibilities : Evaluate, test, and implement security recommendations and updates from Microsoft. Assess security advisories, vulnerabilities, and emerging threats, developing appropriate mitigation strategies. Work closely with IT and security teams to ensure seamless integration of Microsoft security controls. Conduct regular security assessments and hardening of Microsoft-based infrastructure. Monitor, analyse, and respond to security alerts related to Microsoft products and services. Ensure compliance with security frameworks, regulations, and internal policies. Automate security processes and develop scripts where necessary to enhance efficiency. Provide technical expertise and guidance on Microsoft security tools, such as Defender, Sentinel, and Entra ID. Collaborate with internal teams to improve incident response and threat intelligence capabilities. Maintain thorough documentation of security implementations, risk assessments, and remediation activities. Qualifications : Bachelor's degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Required Skills : Proven experience in security engineering with a focus on Microsoft technologies. Strong knowledge of Microsoft security solutions (Defender, Sentinel, Entra ID, etc.). Experience with security hardening, vulnerability management, and compliance frameworks. Scripting experience (PowerShell, Python) for automation and security tasks. Familiarity with security frameworks such as NIST, ISO 27001, and CIS benchmarks. Excellent problem-solving and communication skills, with the ability to work independently. Excellent English level (at least C1 Cambridge) is a hard requirement! Preferred Skills : Microsoft security certifications (SC-200, AZ-500, etc.) are highly desirable. What We offer you : We are committed to workplace diversity and provide an inclusive environment with equal opportunities for all employees. We partner with world class experts to bring you the latest in learning and development with training in leadership, technical and personal development. We believe you should be able to enjoy a healthy work-life balance, which is why we actively encourage flexible working arrangements. You’ll have the unique opportunity of being part of the team which establishes and develops Getronics’ operations. Equal Opportunity Statement : We are committed to workplace diversity and provide an inclusive environment with equal opportunities for all employees. ``` Show more Show less
Posted 3 weeks ago
6.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Connor, Clark & Lunn Financial Group Gurugram, Haryana The Information Technology (IT) resides within the Information Systems group and is responsible for the management, operations, maintenance, cloud technology and security for the IT infrastructure that supports the organization. The team is made up of several sub-teams that are collaborative and effectively apply technology to solve complex problems which has been a key factor to the firm’s success. CC&L, as an investment management firm, manages a wide range of global assets and the financial group relies heavily on the IS team for a variety of distinct functions. This is a fantastic opportunity to be part of a strategic team, whose scope and importance continues to grow. We place high value on maintaining an entrepreneurial spirit and creating a culture where each of us has opportunities to succeed. We are a solution orientated and collaborative team seeking like-minded individuals who thrive in a challenging and dynamic environment. What You Will Do Responsible for performing wo core functions for the enterprise- The first is the day-to-day operations of the in-place security solutions while the second is the identification, investigation, and resolution of security breaches detected by those systems. Secondary tasks may include involvement in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines, and procedures as well as conducting vulnerability audits and assessments. Maintaining, managing and troubleshooting issues related to Network devices (Switches, Firewall, SDWan, Access Point, ISP’s etc) Is expected to be fully aware of the enterprise’s security goals as established by its stated policies, procedures, and guidelines and to actively work towards upholding those goals. Participate in the planning and design of enterprise security architecture, under the direction of the IT Security Manager, where appropriate. Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the IT Security Manager, where appropriate. Participate in the planning and design of an enterprise business continuity plan and disaster recovery plan, under the direction of the IT Security Manager, where appropriate. Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors. Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security. Perform the deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically. Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e., security tools) or not (e.g., workstations, servers, network devices). Maintain operational configurations of all in-place security solutions as per the established baselines. Monitor all in-place security solutions for efficient and appropriate operations. Review logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (e.g., workstations, servers, network devices). Interpret the implications of that activity and devise plans for appropriate resolution. Participate in investigations into problematic activity. Participate in the design and execution of vulnerability assessments, penetration tests, and security audits. Provide on-call support for end users for all in-place security solutions. Smooth Functioning of NOC and SOC, which includes monitoring, documentation and remediation of identified issues and threats. What You Bring 6+ years of previous experience in IT Security CompTIA Security+ GIAC Information Security Fundamentals Microsoft Certified in any of the following: AZ-500, SC-200, SC-300, SC-400, and SC-100 Experience with Azure security tools and best practices. Experience with scripts and reporting (PowerShell, Sentinel, Power BI, SSRS) Experience with design, implementation, and support of Microsoft products (Endpoint Manager [SCCM + Intune], Microsoft 365 Copilot, Entra suite, Purview and Defender XDR and Azure) Experience with design, implementation, and support of SASE products (Secure Access Service Edge products like Palo-Alto Networks, Aruba, Netskope) Experience with virtualization (VMware and Hyper-V) Preferred certification with Microsoft & Palo Alto Networks Education – Degree or diploma in computer science field, or Information Management, or Information Technology field. Proven analytical and problem-solving abilities. Ability to effectively prioritize and execute tasks in a high-pressure environment. Good written, oral, and interpersonal communication skills. Ability to conduct research into IT security issues and products as required. Ability to present ideas in business-friendly and user-friendly language. Highly self-motivated and directed. Keen attention to detail. Team-oriented and skilled in working within a collaborative environment. About Connor Clark & Lunn Financial Group At CC&L Financial Group, we understand the value of opportunity – for our clients and our team. Independent and employee-owned, we partner with investment professionals to grow successful asset management businesses, giving them the space to innovate and truly make an impact. With more than 40 years of history and offices across Canada and in the US, the UK and India, CC&L Financial Group and our multi-boutique family of affiliate firms collectively manage over $139 billion in client assets, providing a diverse range of traditional and alternative investment products and solutions to institutional, high-net-worth and retail clients. For a closer look at how you can build your career with us, we invite you to explore cclgroup.com. CC&L Financial Group is committed to creating a diverse and inclusive environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to gender, ethnicity, religion, sexual orientation or expression, disability, or age. To apply for this position, please submit your resume and cover letter as one PDF. We thank all applicants in advance for their interest, but only those candidates shortlisted for interviews will be contacted. No telephone calls or recruitment agencies will be accepted. Apply for this Position Show more Show less
Posted 3 weeks ago
6.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Sr.System Engineer -IT SecOps About Barco Barco designs technology to enable bright outcomes around the world. Seeing beyond the image, we develop visualization and collaboration solutions to help you work together, share insights, and wow audiences. Our focus is on three core markets: Enterprise (from meeting and control rooms to corporate spaces), Healthcare (from the radiology department to the operating room), and Entertainment (from movie theaters to live events and attractions). We have a team of 3,600 employees, located in 90 countries, whose passion for technology is captured in 400 granted patents. Shares of Barco are listed on Euronext Brussels. It has a market cap of around €1.649 billion (Feb 2022). About Barco IT Group The IT group is a key driver of Digital transformation for Barco Business functions – Sales, Service, Marketing, Manuf. & Logistics, Corporate functions. IT use all cutting-edge technologies & provides the digital workplace for all employees with right tools to collaborate, communicate & connect across all global locations. This guarantees simplicity of doing business, empowering our various business segments. In addition, IT is crucial for protecting networks, data, edge devices, and IT infrastructure. IT is also in charge of avoiding data breaches and for monitoring and responding to assaults. IT provides a variety of platforms, from team collaboration to content enablement and much more, to enable employees to operate better and more effectively. About The Role A s a System Engineer - ITSecOps, you will be crucial part of Barco security operation center who is responsible for enterprise cybersecurity. This includes everything from threat prevention to security infrastructure design to incident detection and response. This is a global role where you are one of the primary security expert protecting the security layer for all Key Infrastructure resources. You will have access to the most up-to-date training, resources, and technology, as well as an unrestricted career path with the global leader in technology. Make an impact on the world by coming to Barco! Key Responsibilities You will be part of the 24/7 ITSecOps team that is responsible for ensuring the security of our IT systems, that works in collaboration with other domain experts & to the escalation point for the IT SecOps Operations team. Pro-active patching and securing of IT systems, based on: Linux /Microsoft recommendations and working experience on patch management tools Understanding of Reports from Vulnerability scanning tool Zero-day vulnerabilities remediation's responses. Alerts from 24/7 Security Operations Center (SOC) and hands-on experience working on security tools (MS Defender EDR/XDR, SIEM esc MS Sentinel, Firewalls, Anti-Virus, Intrusion detection) Inputs from the IT Infrastructure & Operations teams and IT Security Office Re-Active remediation of security incidents on systems potentially infected with Malware, responding to ongoing incidents in close collaboration with local service delivery IT Staff You will be part of the team that responds 24/7 to security incidents coming from alerts and/or Security Operations Center (SOC) Follow runbooks, create suppression rules and having threat hunting experience. Perform root cause analysis on high impact incidents and keep key stakeholder updated through proper communication channel Keep a track of compliance issues of PCs along with SecOps operations teams Disk encryption, Security Software & SW deployment tools installed Monitor, guide and report on worldwide security improvements Linux/MS Server (OS like Windows, Red Hat, Fedora, Centos, Ubuntu and Debian) patching performed by other teams. End Of Life software upgrades (OS, PC software, etc) Strong understanding on IT Infrastructure, AD, Azure AD, O365 & MFA Ensure that, at any time, adequate, correct and up-to-date documentation created & procedures are followed We expect you to be open-minded, innovative, creative, visual, user centric. About The Successful Candidate- Preferred Skills and Experience: B.Tech./B.E/M.Tech in computer science or equivalent stream. Desired Exp. Range 6+ years Skills Must Have We are currently looking for an IT SecOps Engineer, a dedicated achiever, self-directed imitator, hardworking winner who: Understand the IT security basics: Malware, Threats, Vulnerability Hands-on experience on Microsoft Defender XDR, Defender for Identity & Defender for cloud Microsoft AD, Azure AD, Multi-Factor Authentication, O365 Vulnerability scanning tools, PC Firewalls, AV solutions Operating System: Mainly Red Hat, Fedora, Centos, Ubuntu and Debian Excellent communication skills in English, both written and spoken language Flexible and willing to adapt as per priorities within the team and follow standby mechanism Skills Nice To Have Holder of security certifications like Security+, SSCP, GSEC, …” Scripting knowledge (Powershell), Python Basic Networking skills & corporate Firewall technology Barco is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable laws, regulations and ordinances. D&I Statement At Barco, innovation drives everything we do. We believe that diversity fuels creativity, bringing us closer to our colleagues and customers. Inclusion and equity aren't just values—they're core capabilities that propel us toward our shared goals and mission. Read here how we do this Show more Show less
Posted 3 weeks ago
6.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Sr.System Engineer -IT SecOps About Barco Barco designs technology to enable bright outcomes around the world. Seeing beyond the image, we develop visualization and collaboration solutions to help you work together, share insights, and wow audiences. Our focus is on three core markets: Enterprise (from meeting and control rooms to corporate spaces), Healthcare (from the radiology department to the operating room), and Entertainment (from movie theaters to live events and attractions). We have a team of 3,600 employees, located in 90 countries, whose passion for technology is captured in 400 granted patents. Shares of Barco are listed on Euronext Brussels. It has a market cap of around €1.649 billion (Feb 2022). About Barco IT Group The IT group is a key driver of Digital transformation for Barco Business functions – Sales, Service, Marketing, Manuf. & Logistics, Corporate functions. IT use all cutting-edge technologies & provides the digital workplace for all employees with right tools to collaborate, communicate & connect across all global locations. This guarantees simplicity of doing business, empowering our various business segments. In addition, IT is crucial for protecting networks, data, edge devices, and IT infrastructure. IT is also in charge of avoiding data breaches and for monitoring and responding to assaults. IT provides a variety of platforms, from team collaboration to content enablement and much more, to enable employees to operate better and more effectively. About The Role A s a System Engineer - ITSecOps, you will be crucial part of Barco security operation center who is responsible for enterprise cybersecurity. This includes everything from threat prevention to security infrastructure design to incident detection and response. This is a global role where you are one of the primary security expert protecting the security layer for all Key Infrastructure resources. You will have access to the most up-to-date training, resources, and technology, as well as an unrestricted career path with the global leader in technology. Make an impact on the world by coming to Barco! Key Responsibilities You will be part of the 24/7 ITSecOps team that is responsible for ensuring the security of our IT systems, that works in collaboration with other domain experts & to the escalation point for the IT SecOps Operations team. Pro-active patching and securing of IT systems, based on: Linux /Microsoft recommendations and working experience on patch management tools Understanding of Reports from Vulnerability scanning tool Zero-day vulnerabilities remediation's responses. Alerts from 24/7 Security Operations Center (SOC) and hands-on experience working on security tools (MS Defender EDR/XDR, SIEM esc MS Sentinel, Firewalls, Anti-Virus, Intrusion detection) Inputs from the IT Infrastructure & Operations teams and IT Security Office Re-Active remediation of security incidents on systems potentially infected with Malware, responding to ongoing incidents in close collaboration with local service delivery IT Staff You will be part of the team that responds 24/7 to security incidents coming from alerts and/or Security Operations Center (SOC) Follow runbooks, create suppression rules and having threat hunting experience. Perform root cause analysis on high impact incidents and keep key stakeholder updated through proper communication channel Keep a track of compliance issues of PCs along with SecOps operations teams Disk encryption, Security Software & SW deployment tools installed Monitor, guide and report on worldwide security improvements Linux/MS Server (OS like Windows, Red Hat, Fedora, Centos, Ubuntu and Debian) patching performed by other teams. End Of Life software upgrades (OS, PC software, etc) Strong understanding on IT Infrastructure, AD, Azure AD, O365 & MFA Ensure that, at any time, adequate, correct and up-to-date documentation created & procedures are followed We expect you to be open-minded, innovative, creative, visual, user centric. About The Successful Candidate- Preferred Skills and Experience: B.Tech./B.E/M.Tech in computer science or equivalent stream. Desired Exp. Range 6+ years Skills Must Have We are currently looking for an IT SecOps Engineer, a dedicated achiever, self-directed imitator, hardworking winner who: Understand the IT security basics: Malware, Threats, Vulnerability Hands-on experience on Microsoft Defender XDR, Defender for Identity & Defender for cloud Microsoft AD, Azure AD, Multi-Factor Authentication, O365 Vulnerability scanning tools, PC Firewalls, AV solutions Operating System: Mainly Red Hat, Fedora, Centos, Ubuntu and Debian Excellent communication skills in English, both written and spoken language Flexible and willing to adapt as per priorities within the team and follow standby mechanism Skills Nice To Have Holder of security certifications like Security+, SSCP, GSEC, …” Scripting knowledge (Powershell), Python Basic Networking skills & corporate Firewall technology Barco is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable laws, regulations and ordinances. D&I Statement At Barco, innovation drives everything we do. We believe that diversity fuels creativity, bringing us closer to our colleagues and customers. Inclusion and equity aren't just values—they're core capabilities that propel us toward our shared goals and mission. Read here how we do this Show more Show less
Posted 3 weeks ago
9.0 - 10.0 years
14 - 18 Lacs
Bengaluru
Work from Office
- Administer Cisco Meraki, 9200L, SD-WAN - Monitor via SolarWinds, Splunk, Sentinel - Ensure network uptime, redundancy, failover - Manage Fortinet, Zscaler, NAT rules, VPN to AWS - Handle logs, incident response, escalations
Posted 3 weeks ago
15.0 years
0 Lacs
Kolkata, West Bengal, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Senior Manager_TDR (threat detection and response) Job Summary As a Senior Manager with EY’s Global Delivery Services (GDS) Cybersecurity Team, you will contribute technically to client engagement and services development activities. You will be focused on helping client’s grow and turn their Cyber security strategy into reality. You’ll work in high-performing teams that drive growth and deliver exceptional client service, making certain you play your part in building a better working world. You will be responsible for overall client service quality delivery in accordance with EY’s quality guidelines & methodologies. You will need to manage accounts and relationships on a day-to-day basis and explore new business opportunities for EY. Establishing, strengthening and nurturing relationships with clients (functional heads & key influencers) and internally across service lines. You will assist in developing new methodologies and internal initiatives and help in creating a positive learning culture by coaching, counselling and developing junior team members. Client responsibilities: Technical leadership and knowledge of cybersecurity concepts and methods including, but not limited to, SOC transformation, CTI, cloud, privacy, incident response, governance, risk and compliance, enterprise security strategies, and architecture. Excellent teamwork skills, passion and drive to succeed and combat Cyber threats Maintain a strong client focus by effectively serving client needs and developing productive working relationships with client personnel. Stay abreast of current business and economic developments and new pronouncements/standards relevant to the client's business. Generate new business opportunities by participating in market facing activities, executive briefings and developing thought leadership materials Willing to learn new technologies and take up new challenges. Assist in developing high-quality technical content such as automation scripts/tools, reference architectures, and white papers. Should have worked in a security operations center and gained understanding of SIEM and other log management platforms. Having experience in best in breed SIEM (Splunk, Sentinel and Qradar etc) content development / architecting will be an added advantage. Should have good hands-on experience and skills on advanced and integrated key Threat Detection Technology like SIEM, SOAR, EPP, EDR solutions, Firewalls, IDPS, Web Proxy, Enterprise Forensics tools. Experience with cloud infrastructures for the enterprise, such as Amazon Web Services, G Suite, Office 365, and Azure. Good knowledge in threat modelling. Knowledge in endpoint protection tools, techniques and platforms such as Carbon Black, Tanium, Microsoft Defender ATP, Symantec, McAfee or others Work with the team and the client to create plans for accomplishing engagement objectives and a strategy that complies with professional standards and addresses the risks inherent in the engagement. Brief the engagement team on the client's environment and industry trends. Maintain relationships with client to manage expectations of service including work products, timing, fees and deliverables. Demonstrate a thorough understanding of complex information systems and apply it to client situations Create and demonstrate innovative insights for clients, adapts methods and practices to fit operational team needs & contributes to thought leadership documents Apply extensive knowledge of the client's business/industry to identify technological developments and evaluate impacts on the client's business. Demonstrate excellent project management skills, inspire teamwork and responsibility with engagement team members, and use current technology/tools to enhance the effectiveness of deliverables and services Drive discussions / knowledge sharing with key client personnel and contribute to EY’s thought leadership Demonstrate excellent project management skills, inspire teamwork and responsibility with engagement team members, and use current technology/tools to enhance the effectiveness of deliverables and services. Strong collaboration with EY senior executives, other key stakeholders and importantly other EY SOC leaders to co-establish, promote and drive a Cyber SOC ecosystem Key responsibilities: Provide industry insights (deep understanding of the industry, emerging trends, issues/challenges, key players & leading practices) that energize growth Demonstrate deep understanding of the client’s industry and marketplace Lead consulting engagements that solve complex Cyber security issues Help mentor, coach and counsel their team members and help us build an inclusive culture and high-performing teams Maximize operational efficiency through standardization and process automation on client engagements and internal initiatives Monitor delivery progress, manage risk and ensure key stakeholders are kept informed about progress and expected outcomes Successfully manage engagement time and budgets Convey complex technical security concepts to technical and non-technical audiences including executives. Provide strategic and relevant insight, connectedness and responsiveness to all clients to anticipate their needs Support and drive the overall growth strategy for the Cybersecurity practice as part of the leadership team. Identify and drive development of market differentiators including new products, solutions, automation etc. Define, develop and implement strategic go-to-market plans in collaboration with local EY member firms in Americas, EMEIA and APAC. Drive new business opportunities by developing ideas, proposals and solutions Strongly represent EY and its service lines and actively assess what the firm can deliver to serve clients. Assist Consulting Partners in driving the business development process on existing client engagements by gathering appropriate esources, gaining access to key contacts & supervising proposal preparation Develop long-term relationships with networks both internally and externally Enhance the EY brand through strong external relationships across a network of existing and future clients and alliance partners Driving the quality culture agenda within the team Manage and contribute in performance management for the direct reportees and team members, as per the organization policies Able to examine and act on people related issues both strategically and analytically. Participating in the EY-wide people initiatives including recruiting, retaining and training Cybersecurity professionals Use technology to continually learn, share knowledge and enhance client service delivery Support the EY inclusiveness culture To qualify, candidates must have: At least 15 years of industry experience and serving as Manager for minimum of 10 years or 5 years as Senior Manager, of recent relevant work experience in information security or information technology discipline, preferably in a business onsulting role with a leading technology consultancy organization Strong technical experience in not limited to, attack and penetration testing, vulnerability management, cloud, privacy, incident response, governance, risk and compliance, enterprise security strategies, and architecture. Any one of the following technical certifications: CISSP, CISM, GSOC Graduates / BE / BTech / MSc / MTech / MBA in the fields of Computer Science, Information Systems, Engineering, Business or related major Any one of the following project management experience - Prince2 / PMI / MSP / CSM Experience with data analysis and visualization technologies Fluency in English, other language skills are considered an asset EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 3 weeks ago
15.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Senior Manager_TDR (threat detection and response) Job Summary As a Senior Manager with EY’s Global Delivery Services (GDS) Cybersecurity Team, you will contribute technically to client engagement and services development activities. You will be focused on helping client’s grow and turn their Cyber security strategy into reality. You’ll work in high-performing teams that drive growth and deliver exceptional client service, making certain you play your part in building a better working world. You will be responsible for overall client service quality delivery in accordance with EY’s quality guidelines & methodologies. You will need to manage accounts and relationships on a day-to-day basis and explore new business opportunities for EY. Establishing, strengthening and nurturing relationships with clients (functional heads & key influencers) and internally across service lines. You will assist in developing new methodologies and internal initiatives and help in creating a positive learning culture by coaching, counselling and developing junior team members. Client responsibilities: Technical leadership and knowledge of cybersecurity concepts and methods including, but not limited to, SOC transformation, CTI, cloud, privacy, incident response, governance, risk and compliance, enterprise security strategies, and architecture. Excellent teamwork skills, passion and drive to succeed and combat Cyber threats Maintain a strong client focus by effectively serving client needs and developing productive working relationships with client personnel. Stay abreast of current business and economic developments and new pronouncements/standards relevant to the client's business. Generate new business opportunities by participating in market facing activities, executive briefings and developing thought leadership materials Willing to learn new technologies and take up new challenges. Assist in developing high-quality technical content such as automation scripts/tools, reference architectures, and white papers. Should have worked in a security operations center and gained understanding of SIEM and other log management platforms. Having experience in best in breed SIEM (Splunk, Sentinel and Qradar etc) content development / architecting will be an added advantage. Should have good hands-on experience and skills on advanced and integrated key Threat Detection Technology like SIEM, SOAR, EPP, EDR solutions, Firewalls, IDPS, Web Proxy, Enterprise Forensics tools. Experience with cloud infrastructures for the enterprise, such as Amazon Web Services, G Suite, Office 365, and Azure. Good knowledge in threat modelling. Knowledge in endpoint protection tools, techniques and platforms such as Carbon Black, Tanium, Microsoft Defender ATP, Symantec, McAfee or others Work with the team and the client to create plans for accomplishing engagement objectives and a strategy that complies with professional standards and addresses the risks inherent in the engagement. Brief the engagement team on the client's environment and industry trends. Maintain relationships with client to manage expectations of service including work products, timing, fees and deliverables. Demonstrate a thorough understanding of complex information systems and apply it to client situations Create and demonstrate innovative insights for clients, adapts methods and practices to fit operational team needs & contributes to thought leadership documents Apply extensive knowledge of the client's business/industry to identify technological developments and evaluate impacts on the client's business. Demonstrate excellent project management skills, inspire teamwork and responsibility with engagement team members, and use current technology/tools to enhance the effectiveness of deliverables and services Drive discussions / knowledge sharing with key client personnel and contribute to EY’s thought leadership Demonstrate excellent project management skills, inspire teamwork and responsibility with engagement team members, and use current technology/tools to enhance the effectiveness of deliverables and services. Strong collaboration with EY senior executives, other key stakeholders and importantly other EY SOC leaders to co-establish, promote and drive a Cyber SOC ecosystem Key responsibilities: Provide industry insights (deep understanding of the industry, emerging trends, issues/challenges, key players & leading practices) that energize growth Demonstrate deep understanding of the client’s industry and marketplace Lead consulting engagements that solve complex Cyber security issues Help mentor, coach and counsel their team members and help us build an inclusive culture and high-performing teams Maximize operational efficiency through standardization and process automation on client engagements and internal initiatives Monitor delivery progress, manage risk and ensure key stakeholders are kept informed about progress and expected outcomes Successfully manage engagement time and budgets Convey complex technical security concepts to technical and non-technical audiences including executives. Provide strategic and relevant insight, connectedness and responsiveness to all clients to anticipate their needs Support and drive the overall growth strategy for the Cybersecurity practice as part of the leadership team. Identify and drive development of market differentiators including new products, solutions, automation etc. Define, develop and implement strategic go-to-market plans in collaboration with local EY member firms in Americas, EMEIA and APAC. Drive new business opportunities by developing ideas, proposals and solutions Strongly represent EY and its service lines and actively assess what the firm can deliver to serve clients. Assist Consulting Partners in driving the business development process on existing client engagements by gathering appropriate esources, gaining access to key contacts & supervising proposal preparation Develop long-term relationships with networks both internally and externally Enhance the EY brand through strong external relationships across a network of existing and future clients and alliance partners Driving the quality culture agenda within the team Manage and contribute in performance management for the direct reportees and team members, as per the organization policies Able to examine and act on people related issues both strategically and analytically. Participating in the EY-wide people initiatives including recruiting, retaining and training Cybersecurity professionals Use technology to continually learn, share knowledge and enhance client service delivery Support the EY inclusiveness culture To qualify, candidates must have: At least 15 years of industry experience and serving as Manager for minimum of 10 years or 5 years as Senior Manager, of recent relevant work experience in information security or information technology discipline, preferably in a business onsulting role with a leading technology consultancy organization Strong technical experience in not limited to, attack and penetration testing, vulnerability management, cloud, privacy, incident response, governance, risk and compliance, enterprise security strategies, and architecture. Any one of the following technical certifications: CISSP, CISM, GSOC Graduates / BE / BTech / MSc / MTech / MBA in the fields of Computer Science, Information Systems, Engineering, Business or related major Any one of the following project management experience - Prince2 / PMI / MSP / CSM Experience with data analysis and visualization technologies Fluency in English, other language skills are considered an asset EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 3 weeks ago
15.0 years
0 Lacs
Kanayannur, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Senior Manager_TDR (threat detection and response) Job Summary As a Senior Manager with EY’s Global Delivery Services (GDS) Cybersecurity Team, you will contribute technically to client engagement and services development activities. You will be focused on helping client’s grow and turn their Cyber security strategy into reality. You’ll work in high-performing teams that drive growth and deliver exceptional client service, making certain you play your part in building a better working world. You will be responsible for overall client service quality delivery in accordance with EY’s quality guidelines & methodologies. You will need to manage accounts and relationships on a day-to-day basis and explore new business opportunities for EY. Establishing, strengthening and nurturing relationships with clients (functional heads & key influencers) and internally across service lines. You will assist in developing new methodologies and internal initiatives and help in creating a positive learning culture by coaching, counselling and developing junior team members. Client responsibilities: Technical leadership and knowledge of cybersecurity concepts and methods including, but not limited to, SOC transformation, CTI, cloud, privacy, incident response, governance, risk and compliance, enterprise security strategies, and architecture. Excellent teamwork skills, passion and drive to succeed and combat Cyber threats Maintain a strong client focus by effectively serving client needs and developing productive working relationships with client personnel. Stay abreast of current business and economic developments and new pronouncements/standards relevant to the client's business. Generate new business opportunities by participating in market facing activities, executive briefings and developing thought leadership materials Willing to learn new technologies and take up new challenges. Assist in developing high-quality technical content such as automation scripts/tools, reference architectures, and white papers. Should have worked in a security operations center and gained understanding of SIEM and other log management platforms. Having experience in best in breed SIEM (Splunk, Sentinel and Qradar etc) content development / architecting will be an added advantage. Should have good hands-on experience and skills on advanced and integrated key Threat Detection Technology like SIEM, SOAR, EPP, EDR solutions, Firewalls, IDPS, Web Proxy, Enterprise Forensics tools. Experience with cloud infrastructures for the enterprise, such as Amazon Web Services, G Suite, Office 365, and Azure. Good knowledge in threat modelling. Knowledge in endpoint protection tools, techniques and platforms such as Carbon Black, Tanium, Microsoft Defender ATP, Symantec, McAfee or others Work with the team and the client to create plans for accomplishing engagement objectives and a strategy that complies with professional standards and addresses the risks inherent in the engagement. Brief the engagement team on the client's environment and industry trends. Maintain relationships with client to manage expectations of service including work products, timing, fees and deliverables. Demonstrate a thorough understanding of complex information systems and apply it to client situations Create and demonstrate innovative insights for clients, adapts methods and practices to fit operational team needs & contributes to thought leadership documents Apply extensive knowledge of the client's business/industry to identify technological developments and evaluate impacts on the client's business. Demonstrate excellent project management skills, inspire teamwork and responsibility with engagement team members, and use current technology/tools to enhance the effectiveness of deliverables and services Drive discussions / knowledge sharing with key client personnel and contribute to EY’s thought leadership Demonstrate excellent project management skills, inspire teamwork and responsibility with engagement team members, and use current technology/tools to enhance the effectiveness of deliverables and services. Strong collaboration with EY senior executives, other key stakeholders and importantly other EY SOC leaders to co-establish, promote and drive a Cyber SOC ecosystem Key responsibilities: Provide industry insights (deep understanding of the industry, emerging trends, issues/challenges, key players & leading practices) that energize growth Demonstrate deep understanding of the client’s industry and marketplace Lead consulting engagements that solve complex Cyber security issues Help mentor, coach and counsel their team members and help us build an inclusive culture and high-performing teams Maximize operational efficiency through standardization and process automation on client engagements and internal initiatives Monitor delivery progress, manage risk and ensure key stakeholders are kept informed about progress and expected outcomes Successfully manage engagement time and budgets Convey complex technical security concepts to technical and non-technical audiences including executives. Provide strategic and relevant insight, connectedness and responsiveness to all clients to anticipate their needs Support and drive the overall growth strategy for the Cybersecurity practice as part of the leadership team. Identify and drive development of market differentiators including new products, solutions, automation etc. Define, develop and implement strategic go-to-market plans in collaboration with local EY member firms in Americas, EMEIA and APAC. Drive new business opportunities by developing ideas, proposals and solutions Strongly represent EY and its service lines and actively assess what the firm can deliver to serve clients. Assist Consulting Partners in driving the business development process on existing client engagements by gathering appropriate esources, gaining access to key contacts & supervising proposal preparation Develop long-term relationships with networks both internally and externally Enhance the EY brand through strong external relationships across a network of existing and future clients and alliance partners Driving the quality culture agenda within the team Manage and contribute in performance management for the direct reportees and team members, as per the organization policies Able to examine and act on people related issues both strategically and analytically. Participating in the EY-wide people initiatives including recruiting, retaining and training Cybersecurity professionals Use technology to continually learn, share knowledge and enhance client service delivery Support the EY inclusiveness culture To qualify, candidates must have: At least 15 years of industry experience and serving as Manager for minimum of 10 years or 5 years as Senior Manager, of recent relevant work experience in information security or information technology discipline, preferably in a business onsulting role with a leading technology consultancy organization Strong technical experience in not limited to, attack and penetration testing, vulnerability management, cloud, privacy, incident response, governance, risk and compliance, enterprise security strategies, and architecture. Any one of the following technical certifications: CISSP, CISM, GSOC Graduates / BE / BTech / MSc / MTech / MBA in the fields of Computer Science, Information Systems, Engineering, Business or related major Any one of the following project management experience - Prince2 / PMI / MSP / CSM Experience with data analysis and visualization technologies Fluency in English, other language skills are considered an asset EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 3 weeks ago
12.0 years
0 Lacs
Kochi, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cybersecurity Solution Architect Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of over 900 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team help protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entre security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting, and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity The Security Technology Services (STS) group is a division of Information Security that ensures secure access to systems and information for more than 390,000 people in over 150 countries. A Cybersecurity Architect on the STS team is responsible for turning strategic plans into reality by producing architectural designs, leading the development of solutions, and offering security advice to project teams. This person will also oversee experimental projects to determine the best technology choices for integration into EY's infrastructure. Your Key Responsibilities Connect with key stakeholders, cybersecurity experts, and operational teams within the information security department to help create security solutions that work well on a large scale. Collaborate with Enterprise Architects to make sure solutions are in line with the company's long-term goals, follow design guidelines, and contribute to the direction of projects when necessary. Turn business requirements into technical specifications for solutions, considering risks, dependencies, costs, and the overall risk of the technical solution. Lead the technical side of evaluating and choosing technologies through Requests for Information (RFI) and Requests for Proposal (RFP), which includes: Defining the criteria that will influence technology choices and solution development. Gather and summarize technology research and recommendations for leaders to make decisions. Oversee experimental projects, designs, and the actual building of solutions from an architectural standpoint. Create and update artifacts that describe solution architecture to guide the planning, design, and implementation of the chosen solution. Keep up with the latest in the industry, research thoroughly, and continuously learn about new security technologies. Share expertise with project teams, governance groups, and other audiences as required. Build and keep a network of contacts from different IT and security organizations. Create standards for security technology. Travel requirements Skills And Attributes For Success Proficient in leading the development and direction of solution architecture. Knowledgeable in security protection technologies, particularly those from Checkpoint, Zscaler, Entra Intra Internet Access and Azure Firewall Extensive experience in Network Protection, including Cloud Secure Web Gateways (CSWG), Zero Trust Network Access (ZTNA), Intrusion Prevention Systems (IPS), Network Detection and Response (NDR), and Network Access Control (NAC). Successfully directed enterprise projects involving complex network technologies such as Next-Generation Firewalls, Expressroute, Secure Access Service Edge (SASE), ZPA and ZIA. Skilled in Network solutions and infrastructure platforms, including Azure Networking/Network Security Groups (NSG), Azure Firewall, SASE, Software-Defined Wide Area Network (SD-WAN), Wide Area Network (WAN), Local Area Network (LAN), management/monitoring tools, Domain Name System (DNS), and wireless technologies. Exposure to Cybersecurity capabilities Vulnerability management, Qualys, Sentinel, Defender XDR, Vulnerability Management and SOAR Experience in building and maintaining client-service relationships, with an understanding of the importance of internal customers. Excellent communication and presentation skills, capable of effectively conveying information to executive leadership. Sensitivity to the perspective of various audiences, both technical and non-technical. Experience in creating security architecture documentation, such as vision statements and Solution Architecture (SA) Design documents. Well versed in common Information Security practices and the CISSP domains Able to identify opportunities for Cybersecurity transformation or enhancements To qualify for the role, you must have Degree in Computer Science, Engineering or equivalent work experience 12+ years of experience in the Information Technology field 2+ years of senior architecture experience, exposure to enterprise architecture teams. 3+ years working with network protection technologies Ideally, you’ll also have Security certification such as CISSP, CCIE or CISM TOGAF and/or SABSA architecture framework SANS Certifications including: GSEC, ECSA, ECSP What We Look For Deep critical thinking skills demonstrating analytical and systematic approach to problem solving Experience working in a global virtual environment Excellent written & verbal communication skills, including preparation & delivery of presentations Good judgment, tact, and decision-making ability Ability to understand and integrate cultural differences and motives and to work with cross cultural teams. Ability to deal with ambiguity and change, and exercise appropriate time management to meet objectives Ability to work autonomously but also within a team environment where necessary What We Offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial, and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 3 weeks ago
15.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Senior Manager_TDR (threat detection and response) Job Summary As a Senior Manager with EY’s Global Delivery Services (GDS) Cybersecurity Team, you will contribute technically to client engagement and services development activities. You will be focused on helping client’s grow and turn their Cyber security strategy into reality. You’ll work in high-performing teams that drive growth and deliver exceptional client service, making certain you play your part in building a better working world. You will be responsible for overall client service quality delivery in accordance with EY’s quality guidelines & methodologies. You will need to manage accounts and relationships on a day-to-day basis and explore new business opportunities for EY. Establishing, strengthening and nurturing relationships with clients (functional heads & key influencers) and internally across service lines. You will assist in developing new methodologies and internal initiatives and help in creating a positive learning culture by coaching, counselling and developing junior team members. Client responsibilities: Technical leadership and knowledge of cybersecurity concepts and methods including, but not limited to, SOC transformation, CTI, cloud, privacy, incident response, governance, risk and compliance, enterprise security strategies, and architecture. Excellent teamwork skills, passion and drive to succeed and combat Cyber threats Maintain a strong client focus by effectively serving client needs and developing productive working relationships with client personnel. Stay abreast of current business and economic developments and new pronouncements/standards relevant to the client's business. Generate new business opportunities by participating in market facing activities, executive briefings and developing thought leadership materials Willing to learn new technologies and take up new challenges. Assist in developing high-quality technical content such as automation scripts/tools, reference architectures, and white papers. Should have worked in a security operations center and gained understanding of SIEM and other log management platforms. Having experience in best in breed SIEM (Splunk, Sentinel and Qradar etc) content development / architecting will be an added advantage. Should have good hands-on experience and skills on advanced and integrated key Threat Detection Technology like SIEM, SOAR, EPP, EDR solutions, Firewalls, IDPS, Web Proxy, Enterprise Forensics tools. Experience with cloud infrastructures for the enterprise, such as Amazon Web Services, G Suite, Office 365, and Azure. Good knowledge in threat modelling. Knowledge in endpoint protection tools, techniques and platforms such as Carbon Black, Tanium, Microsoft Defender ATP, Symantec, McAfee or others Work with the team and the client to create plans for accomplishing engagement objectives and a strategy that complies with professional standards and addresses the risks inherent in the engagement. Brief the engagement team on the client's environment and industry trends. Maintain relationships with client to manage expectations of service including work products, timing, fees and deliverables. Demonstrate a thorough understanding of complex information systems and apply it to client situations Create and demonstrate innovative insights for clients, adapts methods and practices to fit operational team needs & contributes to thought leadership documents Apply extensive knowledge of the client's business/industry to identify technological developments and evaluate impacts on the client's business. Demonstrate excellent project management skills, inspire teamwork and responsibility with engagement team members, and use current technology/tools to enhance the effectiveness of deliverables and services Drive discussions / knowledge sharing with key client personnel and contribute to EY’s thought leadership Demonstrate excellent project management skills, inspire teamwork and responsibility with engagement team members, and use current technology/tools to enhance the effectiveness of deliverables and services. Strong collaboration with EY senior executives, other key stakeholders and importantly other EY SOC leaders to co-establish, promote and drive a Cyber SOC ecosystem Key responsibilities: Provide industry insights (deep understanding of the industry, emerging trends, issues/challenges, key players & leading practices) that energize growth Demonstrate deep understanding of the client’s industry and marketplace Lead consulting engagements that solve complex Cyber security issues Help mentor, coach and counsel their team members and help us build an inclusive culture and high-performing teams Maximize operational efficiency through standardization and process automation on client engagements and internal initiatives Monitor delivery progress, manage risk and ensure key stakeholders are kept informed about progress and expected outcomes Successfully manage engagement time and budgets Convey complex technical security concepts to technical and non-technical audiences including executives. Provide strategic and relevant insight, connectedness and responsiveness to all clients to anticipate their needs Support and drive the overall growth strategy for the Cybersecurity practice as part of the leadership team. Identify and drive development of market differentiators including new products, solutions, automation etc. Define, develop and implement strategic go-to-market plans in collaboration with local EY member firms in Americas, EMEIA and APAC. Drive new business opportunities by developing ideas, proposals and solutions Strongly represent EY and its service lines and actively assess what the firm can deliver to serve clients. Assist Consulting Partners in driving the business development process on existing client engagements by gathering appropriate esources, gaining access to key contacts & supervising proposal preparation Develop long-term relationships with networks both internally and externally Enhance the EY brand through strong external relationships across a network of existing and future clients and alliance partners Driving the quality culture agenda within the team Manage and contribute in performance management for the direct reportees and team members, as per the organization policies Able to examine and act on people related issues both strategically and analytically. Participating in the EY-wide people initiatives including recruiting, retaining and training Cybersecurity professionals Use technology to continually learn, share knowledge and enhance client service delivery Support the EY inclusiveness culture To qualify, candidates must have: At least 15 years of industry experience and serving as Manager for minimum of 10 years or 5 years as Senior Manager, of recent relevant work experience in information security or information technology discipline, preferably in a business onsulting role with a leading technology consultancy organization Strong technical experience in not limited to, attack and penetration testing, vulnerability management, cloud, privacy, incident response, governance, risk and compliance, enterprise security strategies, and architecture. Any one of the following technical certifications: CISSP, CISM, GSOC Graduates / BE / BTech / MSc / MTech / MBA in the fields of Computer Science, Information Systems, Engineering, Business or related major Any one of the following project management experience - Prince2 / PMI / MSP / CSM Experience with data analysis and visualization technologies Fluency in English, other language skills are considered an asset EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 3 weeks ago
0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. CMS-TDR Staff As part of our EY-cyber security team, who shall work as SOC analyst who will assist clients in detecting and responding to security incidents with support of their SIEM, EDR and NSM solutions. The opportunity We’re looking for Security Analyst with experience in SIEM, EDR and NSM solutions. Your Key Responsibilities Operational support using SIEM solutions (Splunk, Sentinel, CrowdStrike Falcon LogScale), EDR Solution (Defender, CrowdStrike, Carbon Black), NSM (Fidelis, ExtraHop) for multiple customers. First level of monitoring and triaging of security alerts Initial data gathering and investigation using SIEM, EDR, NSM solutions. Provide near real-time analysis, investigation and, reporting security incidents for customer Skills And Attributes For Success Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities. Good hands-on knowledge of SIEM technologies such as Splunk, Azure Sentinel, CrowdStrike Falcon LogScale from a Security analyst’s point of view Exposure to IOT/OT monitoring (Claroty, Nozomi Networks etc) is a plus Good knowledge and experience in Security Monitoring Good knowledge and experience in Cyber Incident Response Knowledge in Network monitoring technology platforms such as Fidelis XPS, ExtraHop Knowledge in endpoint protection tools, techniques, and platforms such as Carbon Black, Tanium, CrowdStrike, Defender ATP etc To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Ability to work in 24x7 shifts Strong command on verbal and written English language. Demonstrate both technical acumen and critical thinking abilities. Strong interpersonal and presentation skills. Hands-on experience in SIEM, EDR and NSM solution Certification in any of the SIEM platforms Knowledge of RegEx, Perl scripting and SQL query language. Certification - CEH, ECSA, ECIH, Splunk Power User What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 3 weeks ago
5.0 - 13.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Job Description Experience : 5 to 13 Years Location : Chennai Technical & Behavioral Competencies · Cloud solutions (Iaas, Paas using Kubernetes, Docker) · The knowledge of CFT/XFB gateway on windows and / or Linux · You are a technician and have a strong interest in support activities. · Experience in managing incidents and problems is an added advantage. · Knowledge of Axway Sentinel (Monitoring tool for File Transfer). · Knowledge of Ansible Tower · PGP(Pretty Good Privacy). · Knowledge of Python, secure transport, shell, perl (Will be added advantage) · Operational knowledge of the mainframe, including ISPF, JCL and REXX · Good knowledge of Linux, Windows · Problem determination, workaround resolution, root cause analysis, major incident managements Specific Qualifications · Agile environment · Follows the Customer processes for projects, incident and change management. · Being standalone and team worker, analytical minded, meet commitment, ability to work in a dynamic and multi-cultural environment, flexible, customer-oriented, understand risk awareness. · Motivated self-starter, process-oriented with high attention to detail · Quick self-starter, pro-active attitude. · Good communication skills, Good analytical and synthesis skills. · Autonomy, commitment and perseverance. · Ability to work in a dynamic and multicultural environment. · Flexibility (in peak periods extra efforts may be required). · Open minded and show flexibility in self-learning new technologies/tools. · You are customer minded and can translate technical issues into non-technical explanations. · You are always conscious about continuity of services. · You have a very good team spirit and share your knowledge and experience with other members of the team. Working in collaboration with team. · Client-oriented, analytical, initiative oriented and able to work independently. · Be flexible and ready to provide support outside of Business hours (on-call). · Able to take additional responsibility. · Able to work from base location Chennai/Mumbai (Whichever is your base location) during hybrid model. · You are flexible and ready to provide support outside of Business hours (on-call). Show more Show less
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The job market for sentinel roles in India is currently on the rise, with a high demand for professionals who can effectively monitor and secure systems, networks, and data. Sentinel jobs are crucial in ensuring the safety and integrity of digital assets for organizations across various industries.
The salary range for sentinel professionals in India varies based on experience and location. Entry-level positions may start around INR 3-5 lakhs per annum, while experienced professionals can earn upwards of INR 10-15 lakhs per annum.
In the field of sentinel, a typical career path may progress from roles such as Security Analyst or Information Security Specialist to Senior Security Engineer, Security Architect, and eventually Chief Information Security Officer (CISO) or Security Consultant.
Alongside expertise in sentinel, professionals in this field are often expected to have knowledge of cybersecurity, network security, risk management, incident response, and penetration testing.
As you prepare for your journey into the sentinel job market in India, remember to showcase your expertise, experience, and passion for cybersecurity. Stay updated with the latest trends and technologies, practice your skills, and approach interviews with confidence. Best of luck in your job search!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2