Home
Jobs

437 Sentinel Jobs - Page 14

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 years

0 Lacs

Vadodara, Gujarat, India

On-site

Linkedin logo

Position: Senior Microsoft 365 Engineer About the Role We are seeking a highly skilled and motivated Senior Microsoft 365 Engineer with extensive expertise in SharePoint, Microsoft 365 migrations, Power Automate, Zero Trust architecture, and Microsoft Security solutions. In this role, you will design, implement, and maintain scalable, secure, and high-performing Microsoft 365 environments tailored to meet the diverse needs of our enterprise clients. You will act as a subject matter expert and thought leader in driving innovation, collaboration, and security using the Microsoft ecosystem. Key Responsibilities 1. Microsoft 365 Solutions Design and Implementation • Design and implement Microsoft 365 solutions, including SharePoint Online, Teams, and OneDrive, to enhance collaboration and productivity. • Architect and deploy Zero Trust security models to align with modern cybersecurity best practices. • Develop custom workflows and business process automation solutions using Power Automate and the Microsoft Power Platform. 2. Migrations and Upgrades • Plan, execute, and oversee migrations from on-premises or third-party platforms to Microsoft 365, ensuring minimal disruption and downtime. • Conduct pre-migration assessments and readiness workshops to identify challenges and opportunities. • Optimize post-migration environments for performance, scalability, and user adoption. 3. Security and Compliance • Implement and manage Microsoft 365 security solutions, including Microsoft Defender for Office 365, Azure AD Conditional Access, Information Protection, and Compliance Center. • Ensure compliance with industry standards and regulatory requirements such as GDPR, CCPA, and HIPAA through effective policy design. • Monitor and respond to security incidents leveraging tools like Microsoft Sentinel. 4. Collaboration and Support • Act as the technical lead for cross-functional teams during large-scale deployments and escalations. • Provide technical mentorship and training to junior team members and client stakeholders. • Assist in developing best practices and governance policies for Microsoft 365 services. 5. Innovation and Continuous Improvement • Stay ahead of Microsoft 365 updates, emerging technologies, and industry trends to identify opportunities for enhancement. • Conduct proof-of-concept projects to validate innovative use cases for Microsoft tools and services. • Document technical designs, configurations, and processes to improve knowledge sharing and operational efficiency. Qualifications Required Experience • 8+ years of experience in IT, with a focus on Microsoft 365 solutions and cloud services. • Expertise in SharePoint Online architecture, including site collections, hubs, and permissions management. • Proven experience planning and executing Microsoft 365 migrations, particularly with hybrid and large-scale environments. • Proficiency in designing and deploying Power Automate workflows for business process automation. • Strong knowledge of Microsoft 365 Zero Trust principles, including Conditional Access, MFA, and Identity Protection. • Hands-on experience with Microsoft Security tools, such as Defender, Sentinel, and Endpoint Manager. Preferred Skills • Certifications such as Microsoft Certified: Enterprise Administrator Expert, Microsoft Certified: Security, Compliance, and Identity Fundamentals, or similar. • Advanced scripting abilities using PowerShell for Microsoft 365 management and automation. • Familiarity with adjacent platforms such as Azure AD, Microsoft Dynamics, or other enterprise tools. • Exceptional communication skills to effectively convey technical concepts to non-technical stakeholders. Key Competencies • Analytical and problem-solving mindset with a focus on delivering secure, reliable, and efficient solutions. • Strong organizational and project management skills, capable of handling multiple priorities in fast-paced environments. • Collaborative and customer-focused attitude, with a commitment to delivering exceptional client outcomes. Show more Show less

Posted 3 weeks ago

Apply

1.0 - 2.0 years

3 - 4 Lacs

Pune

Work from Office

Naukri logo

About AkzoNobel Since 1792, weve been supplying the innovative paints and coatings that help to color peoples lives and protect what matters most Our world class portfolio of brands including Dulux, International, Sikkens and Interpon is trusted by customers around the globe Were active in more than 150 countries and use our expertise to sustain and enhance the fabric of everyday life Because we believe every surface is an opportunity Its what youd expect from a pioneering and long-established paints company thats dedicated to providing sustainable solutions and preserving the best of what we have today while creating an even better tomorrow Lets paint the future together, For more information please visit akzonobel 2024 Akzo Nobel N V All rights reserved, Job Purpose Cyber security is a top priority for AkzoNobel as for any global organization operating in the cyberspace Our objective is to protect our information and digital assets (IT and OT) by reducing our cyber risk exposure to pursue our business objectives, As part of the new cyber security strategy, supported by the ExCo, we have recently redefined our security governance in line with the evolution of the threat landscape and modern best practices In this regard the new Information Security function, under responsibility of the CISO and part of the IT, is responsible for Information and cyber security for the entire organization covering Cyber Risk Management & Compliance, Security Architecture, Security Operations and Cyber Security Awareness and Training, We are looking for a seasoned and proactive Vulnerability Management Technical Lead to join our Cybersecurity Operations team This role will be responsible for overseeing all technical aspects of security incident and alert management across the organization You will serve as the central operational point of reference for incident detection, investigation, containment, and resolution activities and bring deep technical expertise and strong leadership capabilities to ensure the continuous identification, assessment, and remediation of vulnerabilities You will work with modern tools and technologies, maintain visibility into the organization's risk exposure, and deliver meaningful metrics to support security decisions, Key Activities Provide technical and operational leadership for incident and alert management processes, ensuring day-to-day activities are executed effectively, without operational gaps, Deliver a real-time operational view and strategic (macro) oversight of the organizations security posture, enabling data-driven decision-making through well-defined KPIs and KRIs, Act as the lead investigator for major or complex incidents, collaborating with internal and external stakeholders as needed, Ensure regular activities such as alert triage, incident response, threat hunting, and reporting are performed consistently and on schedule, Prepare and present clear, concise, and data-backed reports on incident response metrics, trends, and security event outcomes to management and leadership, Foster a supportive, collaborative, and high-performing environment, mentoring team members and ensuring clarity of roles, timely guidance, and knowledge sharing, Lead maturity assessments of the SOC IR capabilities using recognized industry frameworks (e-g , MITRE ATT&CK, CMMI), and define tangible improvement paths, Serve as a key contributor to the evolution of automation and orchestration in incident management using Microsoft Sentinel and Logic Apps, Continuously evaluate and improve detection and response workflows across multiple security technologies and domains, These key responsibilities are peered with key technologies (and linked skills) that are used in the company environment: Microsoft Defender Suite (Endpoint, Identity, Office, Cloud Apps) Zscaler Technologies, including ZIA and ZPA Microsoft Sentinel and Azure Logic Apps (automation and orchestration) Nozomi (OT/IoT network visibility and threat detection) Familiarity with API integrations, automation scripting (PowerShell, KQL), and incident enrichment techniques is highly desirable, Experience 5+ years of hands-on experience in incident response, SOC operations, or threat detection roles within large and complex environments, Demonstrated experience leading incident response efforts in real-world scenarios, including root cause analysis, containment, and lessons learned processes, Strong understanding of enterprise security architecture, endpoint and network detection tools, and alerting pipelines, Solid experience with Microsoft security technologies, especially Microsoft Defender XDR and Sentinel, Practical knowledge of SOC automation practices using tools such as Logic Apps, playbooks, or SOAR platforms, Excellent communication and reporting skills, capable of presenting technical content to both technical and executive audiences, Demonstrated ability to work collaboratively, make sound decisions under pressure, and coordinate across teams during high-impact security events, Strong knowledge of incident handling frameworks, playbook development, and SOC maturity models, Certifications in incident response, such as GCIH, GCFA, GCIA, or similar, General blue team certifications such as SC-200, AZ-500 Experience in operationalizing threat intelligence and aligning detection strategies to frameworks such as MITRE ATT&CK, Prior experience assessing and improving SOC performance against frameworks like NIST, MITRE D3FEND, or CMMI, At AkzoNobel we are highly committed to ensuring an inclusive and respectful workplace where all employees can be their best self We strive to embrace diversity in a context of tolerance Our talent acquisition process plays an integral part in this journey, as setting the foundations for a diverse environment For this reason we train and educate on the implications of our Unconscious Bias in order for our TA and hiring managers to be mindful of them and take corrective actions when applicable In our organization, all qualified applicants receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age or disability, Requisition ID: 46483

Posted 3 weeks ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

Remote

Linkedin logo

Job Responsibilities: Design, implement, and maintain secure cloud infrastructures across public and private cloud environments (AWS, OpenStack, Azure, GCP), ensuring the integration of best security practices and alignment with business goals. Develop and execute a comprehensive cloud security strategy that integrates security requirements into cloud architecture and development processes, focusing on continuous improvement and threat mitigation. Architect and implement robust network security solutions, including firewalls, intrusion detection systems (IDS/IPS), VPNs, and secure remote access, ensuring the confidentiality, integrity, and availability of cloud-based assets. Design, configure, and manage Web Application Firewalls (WAF) to protect web applications from external threats such as DDoS, SQL injection, cross-site scripting (XSS), and other OWASP Top 10 vulnerabilities. Conduct regular security assessments, penetration testing, and vulnerability assessments to identify and mitigate security risks in cloud environments and network infrastructure. Lead the automation of security processes, implementing infrastructure-as-code (IaC) for secure and compliant cloud deployments using tools such as Terraform and CloudFormation. Ensure compliance with industry standards and regulations (e.g., SOC 2, ISO 27001, GDPR, NIST). Establish incident response protocols for cloud environments, leading investigations and remediating security incidents across cloud and network infrastructures. Manage and integrate cloud security tools, including identity and access management (IAM), encryption solutions, cloud-native security services (e.g., AWS Guard Duty, Azure Security Centre), and third-party solutions like WAF and EDR. Provide guidance and mentorship to junior security engineers and other stakeholders on cloud security best practices, threat intelligence, and network security design. Maintain thorough documentation of cloud security architectures, configurations, incident response actions, and risk assessments. Regularly report to senior management on security posture and improvements. Stay up to date with the latest security threats, vulnerabilities, and mitigation techniques, especially for cloud security and network infrastructure. Proactively design solutions to combat emerging threats. Qualifications: 8+ years of experience leading security initiatives for enterprises in an information security (InfoSec) consultant or architect role. Prior experience as a team lead or role mentoring junior team members. AWS, CEH, OSCP, AWS Certified Security Specialty or CISSP Certifications preferred. Required Skills: Extensive experience in designing and implementing secure cloud infrastructures and services, with proficiency in one or more cloud platforms (AWS, OpenStack, Azure, Google Cloud). Deep understanding of network security concepts and practices including firewalls, VPNs, proxy servers, IDS/IPS, and network access control in cloud environments. Hands-on experience in implementing, configuring, and managing WAF solutions (e.g., AWS WAF, Azure WAF) to protect applications from external attacks, including DDoS, XSS, and SQL injections. Expertise in configuring and managing IAM policies, roles, and permissions in cloud environments to enforce least-privilege access and mitigate insider threats. Strong knowledge of security standards and frameworks such as ISO 27001, SOC 2, NIST, GDPR, and PCI-DSS, and experience ensuring compliance in cloud and network security projects. Experience with cloud-based security monitoring tools (e.g., AWS Guard Duty, Azure Sentinel) and leading incident response efforts for cloud security incidents. Experience conducting vulnerability assessments, penetration tests, and security audits to identify weaknesses and implement remediation strategies in cloud and network environments. Deep understanding of security architecture principles and designing systems with a “Security by Design” mindset to safeguard cloud and network infrastructure. Knowledge of data encryption techniques for data-at-rest and data-in-transit and securing data storage and communication in cloud environments. Ability to lead and mentor teams of security engineers, fostering collaboration across security, DevOps, and network engineering teams. Should be comfortable working with different teams and have good communication skills. About RTDS: Founded in 2010, Real Time Data Services (RTDS) is a group of companies excelling in global information technology, specializing in Cloud Computing and Cloud Telephony. We empower businesses worldwide with technologically advanced solutions that streamline operations and enhance efficiency. Being a market leader, we've catered to 10,000+ clients across the globe, consistently guaranteeing exceptional services. Our Mission: To become the forefront of Tech Global Leaders in Cloud Computing by striving towards excellence in our robust products & services, providing a competitive edge to our customers. Our Vision: Our vision is to achieve excellence through continuous improvement, innovation, and integrity, driven by a results-oriented and collaborative approach. Our Brands: AceCloud: AceCloud is a leading provider of high-performance, affordable cloud solutions for SMBs and enterprises. Its comprehensive suite of services includes: Public Cloud Private Cloud Cloud GPUs Kubernetes Infrastructure as a Service (IaaS) AWS Services Ace Cloud is working closely with AWS for the SMB and Startup verticals PAN India. We specialize in Cloud Assessment, AWS Migration, Application & Database Modernization as well as Data Analytic, Machine Learning and AI. With a strong emphasis on innovation and customer satisfaction, Ace Cloud offers single-click deployment and 24/7 human support to ensure seamless operations for its clients. Learn more: https://acecloud.ai/ Ace Cloud Hosting: Headquartered in Florida, USA, Ace Cloud Hosting is a leader in managed hosting with over 15 years of expertise in cloud-based technologies. Its services include: Accounting/Tax Application Hosting, Managed Security Services Managed IT Services and Hosted Virtual Desktop Solutions Learn More: https://www.acecloudhosting.com/ Key Highlights: Industry Experience: 15+ years in the industry serving over 8,000 clients globally with a team of 600+ employees Data Center Partners: 10+ data center partners located across the USA, UK, and India Strategic Partnerships: Microsoft Direct Partner under the CSP Program. Intuit Authorized Commercial Hosting Provider. AWS Advanced Consulting Partner with Storage & SMB Competencies VMware Enterprise Partner for Infrastructure & Desktop Virtualization solutions Accreditations and Memberships: ISO/IEC 27001:2022 Certified Registered with NASSCOM Member of the Internet Telephony Services Providers’ Association in the UK. Awards and Recognitions: Customer Service Department of the Year Stevie Award (2024) CPA Practice Advisor Readers' Choice Awards (2023) VMware Accelerating Cloud Provider Partner Award (2020) K2 Quality Award for Customer Satisfaction (2019) Great User Experience Award by FinancesOnline (2018) User Favourite Award by Accountex USA (2016) Contact Information Website: https://www.myrealdata.in Show more Show less

Posted 4 weeks ago

Apply

2 - 3 years

0 Lacs

Mumbai Metropolitan Region

On-site

Linkedin logo

Job Location : Mumbai (Powai) 5 Days work from Office Qualifications Bachelors degree in Cybersecurity, Information Technology, Business Administration, or related field. At least 7-10 years of experience as a Expert in IT Security, with at least 2-3 years of direct experience in cybersecurity-related projects. Domain knowledge in at least 5 key areas such as: UAM (User Access Management) SOAR (Security Orchestration, Automation, and Response) SIEM (Splunk, Sentinel) Threat Intelligence EDR (CrowdStrike, MS Defender/) RBAC (Role-Based Access Control) Cloud Security (AWS, Azure, Google Cloud) Encryption Methods and Data Protection techniques AI & ML in Cybersecurity Regulatory Compliance (e.g., NIST, ISO, GDPR, HIPAA) Strong understanding of hybrid IT environments (cloud and on-premises infrastructure). (Must have) Proven experience in conducting risk assessments, gap analysis, and working with business units to define cybersecurity requirements. (must have) Strong documentation and requirements-gathering skills with the ability to translate technical security concepts into business terms. Excellent communication and interpersonal skills, with the ability to engage stakeholders at all levels and facilitate cross-functional collaboration. Preferred Skills : (Good to have) : CISSP, CISM, CISA, CCSP, or other relevant cybersecurity certifications. Familiarity with cloud-native security tools (e.g., AWS CloudTrail, Azure Security Center) and DevSecOps practices. Strong experience with SIEM Sentinel & Security Operations, and ALaM (Application Logging & Monitoring) Experience with agile project management and project management tools. Hands-on experience with machine learning algorithms for cybersecurity threat detection. (ref:hirist.tech) Show more Show less

Posted 4 weeks ago

Apply

0 years

0 Lacs

Mumbai, Maharashtra, India

Remote

Linkedin logo

Mercer is seeking candidates for the following position based in the Mumbai/ Pune : Senior Manager - Investments ( Operational Due Diligence) Mercer Wealth is a leading global provider of investment consulting services. We offer customised advice at every stage of the investment decision, risk management and investment monitoring process. In addition to core consulting, we have developed a number of specialist teams; the Financial Strategy Group, Mercer Sentinel, Manager Research, Responsible Investment and Fiduciary Management, thereby ensuring we offer a full range of services to our clients. We have been dedicated to meeting the needs of clients for more than 30 years. Due to increasing client demand we are continuing to build a specialist team focused on ODD exercises and consulting projects. We are looking to employ talented colleagues who understand the financial services industry and the operational functions of investment managers. The job holder will work as part of a team of ODD specialist and client consultants. Through the Mercer structured development program and on-the-job training, the applicant will be supported, coached and developed in their role. We will count on you to: Work as an extension of the US team to conduct operational due diligence risk assessments of investment managers using Mercer Sentinel’s framework incorporating house views as appropriate Understanding of investment manager middle and back office operations, fund administration, portfolio accounting, custody, regulatory compliance and other relevant industry experience Maintaining knowledge of operational risk frameworks across the Mercer universe of asset classes, including equity and fixed income, hedge funds, private equity, private debt, real estate and infrastructure Liaise with investment managers to collate information, coordinate on-site visits and schedules Review responses and documentation provided by investment managers for the risk assessment and author research notes in advance of the meeting of the onsite team to support the onshore team Support virtual investment manager “on-site” visits through the preparation of pre-meeting notes, note taking in the meeting and producing high quality draft written reports after the meeting Challenging and improving operational processes for Mercer’s ODD framework Contribute to Mercer Sentinel’s intellectual capital through market research and process innovation Contribute towards Mercer Sentinel’s other products including but not limited to Surveys and Operational Reviews; support onshore team’s efforts towards key projects or activities including business development among others. Update and maintain pertinent tools/database with relevant information including research publications and coordinate with asset managers for requisite data and for scheduling research calls; prepare and distribute Ratings Committee (RC) minutes from the weekly RC call. What you need to have: A bachelor's degree in economics, finance or other business-related areas with a high level of written content Professional qualification (Actuarial, ACA, ACCA, CFA or equivalent) – preferential requisite Two years plus of experience in a similar operational due diligence role preferred Experience with investment management, operations, fund management or investment consulting Previous experience in operational risk analysis, fund administration, and or financial / portfolio accounting would be beneficial Thorough knowledge of Microsoft Office applications (Word, Excel, PowerPoint) Takes ownership for work, always ensuring standards and deadlines are met and keeping others informed and up-to-date Works well under pressure, with the ability to prioritise and manage multiple tasks, stakeholders and deliverables simultaneously; candidate may be expected to attend calls with US based asset managers couple days in a week; responsibilities may stretch to taking calls with asset managers in other geographies including Pacific, UK, Europe, Middle East and Asia depending on the business requirements. Excellent organisational and time management skills Openly shares information and own expertise with colleagues Possess excellent team working skills in a global/remote working environment What makes you stand out? Demonstrates excellent oral and written communication skills Self-motivated with an eagerness to learn and a positive work ethic Challenges existing practices and conventional thinking Highly proficient in Microsoft Excel and other core Microsoft Office products (Word, PowerPoint, etc.) Mercer believes in building brighter futures by redefining the world of work, reshaping retirement and investment outcomes, and unlocking real health and well-being. Mercer’s approximately 25,000 employees are based in 43 countries and the firm operates in over 130 countries. Mercer is a business of Marsh McLennan (NYSE: MMC), the world’s leading professional services firm in the areas of risk, strategy and people, with 85,000 colleagues and annual revenue of over $20 billion. Through its market-leading businesses including Marsh, Guy Carpenter and Oliver Wyman, Marsh McLennan helps clients navigate an increasingly dynamic and complex environment. For more information, visit mercer.com. Follow Mercer on LinkedIn and Twitter. Marsh McLennan is committed to embracing a diverse, inclusive and flexible work environment. We aim to attract and retain the best people regardless of their sex/gender, marital or parental status, ethnic origin, nationality, age, background, disability, sexual orientation, caste, gender identity or any other characteristic protected by applicable law. Marsh McLennan is committed to hybrid work, which includes the flexibility of working remotely and the collaboration, connections and professional development benefits of working together in the office. All Marsh McLennan colleagues are expected to be in their local office or working onsite with clients at least three days per week. Office-based teams will identify at least one “anchor day” per week on which their full team will be together in person. Show more Show less

Posted 4 weeks ago

Apply

3 - 8 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

Skill: IAM Automation & Governance Specialist Location: [Remote / Hyderabad] Experience: 3-8 Years We’re looking for an IAM expert with hands-on experience in Microsoft Entra ID (Azure AD) and HRIS integrations (preferably UKG) . You'll lead identity automation, lifecycle governance, and compliance in a security-focused environment. Must-have skills: IAM governance & automation Azure AD / Entra ID (PIM, access packages, Conditional Access) HRIS integration (UKG ideal) Compliance knowledge (SOC 2, HIPAA, HITRUST) Bonus: Scripting (PowerShell), Microsoft Sentinel, Defender, Purview Join us to build a secure, scalable, and automated identity ecosystem. Show more Show less

Posted 4 weeks ago

Apply

0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world. We are seeking for a passionate cybersecurity professionals to join our growing team of defenders. In this role, you will proactively detect, investigate, and respond to advanced threats across enterprise environments using cutting-edge security tools and threat intelligence. The ideal candidate combines strong security expertise with a proactive mindset and coding skills to drive deep threat analysis and automation. Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. Responsibilities Responsibilities: Monitor, triage, and respond to security incidents using tools like Microsoft Defender for Endpoint (MDE), Defender for Identity (MDI), Defender for Office (MDO) and Microsoft Defender for Cloud Apps (MCAS) Perform proactive threat hunting and detection engineering using telemetry from endpoints, identities, cloud, and network. Develop hunting queries using Kusto Query Language (KQL) or similar to identify suspicious patterns and behaviors. Investigate security incidents across hybrid environments and contribute to root cause analysis and containment strategies. Collaborate with internal teams (defender, threat intelligence, engineering) to enhance detection logic, develop automations, and improve incident response workflows. Contribute to incident documentation, detection playbooks, and operational runbooks. Stay current with evolving threat landscapes, cloud attack vectors, and advanced persistent threats (APT). Qualifications Basic Qualifications: 4–7 years of experience in cybersecurity (SOC, IR, threat hunting, red team, or malware analysis). Hands-on experience with SIEM, EDR, and cloud-native security tools (M365 Defender, Sentinel, CrowdStrike, etc.). Experience with at least one cloud platform (Azure, AWS, GCP) and its associated security services and configurations. Proficiency in KQL, Python, or similar scripting languages for data analysis and automation. Strong knowledge of MITRE ATT&CK, Cyber Kill Chain, and adversary TTPs. Familiarity with operating system internals (Windows, Linux) and endpoint/network forensics Preferred Qualifications Hands-on experience with Microsoft Defender XDR tools (MDE, MDI, MDO), Microsoft Sentinel, or other EDR/XDR platforms. Knowledge of cloud workload protection, SIEM, or threat intelligence platforms. Certifications like CISSP, OSCP, CEH, GCIH, AZ-500, SC-200 or similar/equivalent are a plus. Other Requirements Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter. Work Environment: Role may involve 24x7 coverage, shift-based support, or on-call rotations based on business needs. Hybrid work model requiring 3 days per week in office; flexibility may vary based on team or location-specific guidelines. Open to candidates from diverse professional backgrounds with demonstrable cybersecurity knowledge and technical aptitude. #MSFTSecurity #MSFTSecurity #DEXMicrosoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations. Show more Show less

Posted 4 weeks ago

Apply

6 years

0 Lacs

Greater Hyderabad Area

On-site

Linkedin logo

Job Description Cloud Engineer: Implement Multi cloud solutions that leverage both AWS and Azure public cloud services. Maintain cloud network that optimize performance, security and cost saving AWS Services - Working knowledge but not limited to - EC2, RDS, Redshift, VPC, Route53, Serverless, AD DS, EMR, ECS, S3, FSx, Transit Gateway, Direct Connect, Route tables and AWS monitoring tools Mandatory Working knowledge on IAM Identity Center, AWS Control Tower and all security logs of AWS Azure Services - Working knowledge but not limited to - Virtual machine, Storage Accounts, Recovery services, Load balancers, Route table, AD DS, Azure functions, CLIs, backup and all Azure monitoring services Automate cloud deployments and operations to streamline workflows and reduce manual overhead (Proficiency in automation and scripting languages). Engage with stakeholders to gather requirements and translate them into technical specifications. Provide expertise in cloud services, advising on best practices and emerging technologies. Strong understanding of cloud networking principles and hands-on experience with cloud network configuration and troubleshooting As a Cloud Engineer, key focus will be Implementation, Configuration and Development of the CICD solutions by using various cloud automation tools (Terraform, Azure DevOps, Ansible, etc.) Experience of building a range of Services in a Cloud Service provider (ideally AWS and Azure) Customer/stakeholder focus. Ability to build strong relationships with Application teams, cross functional IT and global/local IT teams Operational effectiveness - delivers solutions that align to approved design patterns and security standards Windows and Linux Operating system knowledge Perform all activities in a safe and responsible manner and support all Environmental, Health, Safety & Security requirements and programs. Clear understanding of security processes and technologies including Threat Analysis, Threat Intelligence, Threat Hunting, Vulnerability Assessment, Security Monitoring and Compliance Being well-versed in malware analysis, operating systems, active directory, encryption schemas & algorithms, IAM, authorization and authentication mechanisms, PKI and TCP/IP networking Experience in Tenable and Sentinel One EDR Strong Project Management skills are desirable Experience with Graylog, Grafana, Prometheus, OpsGenie, or SolarWinds Required Qualifications 3+ Years of Experience AWS & Azure Cloud Experience and overall 6+ years in IT Infrastructure Proven experience with AWS and Azure platforms Relevant certifications (e.g., AWS, Microsoft Azure) are highly desirable. Excellent communication skills and the ability to work collaboratively in a cross-functional team. At Nextracker, we are leading in the energy transition, providing the most comprehensive portfolio of intelligent solar tracker and software solutions for solar power plants, as well as strategic services to capture the full value of solar power plants for our customers. Our talented worldwide teams are transforming PV plant performance every day with smart technology, data monitoring and analysis services. For us at Nextracker, sustainability is not just a word. It's a core part of our business, values and our operations. Our sustainability efforts are based on five cornerstones: People, Community, Environment, Innovation, and Integrity. We are creative, collaborative and passionate problem-solvers from diverse backgrounds, driven by our shared mission to provide smart solar and software solutions for our customers and to mitigate climate change for future generations. Culture is our Passion Show more Show less

Posted 4 weeks ago

Apply

0 years

0 Lacs

Bengaluru, Karnataka, India

Remote

Linkedin logo

Sapiens is on the lookout for a Sr. Network Engineer to become a key player in our Bangalore team. If you're a seasoned Network Engineer and ready to take your career to new heights with an established, globally successful company, this role could be the perfect fit. Location: Bangalore Working Model: Our flexible work arrangement combines both remote and in-office work, optimizing flexibility and productivity. What You’ll Do We are seeking a highly skilled Senior Network Cyber Security Specialist to join our team. This role is critical for securing and maintaining robust, scalable, and secure network infrastructures in complex, multi-cloud environments (primarily Azure and AWS), cloud-native security controls, and be able to handle end-to-end network security across distributed systems, hybrid environments, and multiple security domains. You will be a key player in securing the enterprise at every layer of the OSI model. Comprehensive Network Security Management: Secure and optimize complex hybrid networks, integrating Software-Defined Networking (SDN) across on-premises, Azure, and AWS, while implementing micro-segmentation strategies using tools like NSX, Azure Virtual Network (VNet) Peering, and AWS Security Groups. Implement next-gen firewalls and intrusion detection/prevention systems (IDS/IPS), such as Palo Alto Networks or Fortinet, and integrate with cloud-native tools like AWS Firewall Manager and Azure Sentinel. Design end-to-end encrypted network connections with advanced key management techniques and certificate-based authentication to secure data in transit across public and private interfaces. Threat Detection and Incident Response: Implement real-time threat detection and response systems using machine learning and advanced analytics . Establish incident response frameworks to handle high-priority security events. Multi-Environment Security Integration: Architect and secure highly available, multi-region, and multi-environment networks, utilizing Azure Global VNet Peering, AWS Global Accelerator, and cross-region replication to ensure data security and high-performance across geographies. Ensure security compliance and policy enforcement across cloud, on-premises, and edge environments through centralized security management tools such as Azure Policy, AWS Config, and Terraform Sentinel. Cloud Network Security: (Optional) Architect secure and scalable multi-cloud networks leveraging Azure Virtual WAN, AWS Transit Gateway, VPC Peering, and Azure Network Security Groups (NSGs) to create robust, segmented, and isolated environments. Implement Zero Trust Network Architecture (ZTNA) across cloud and hybrid networks, integrating advanced security controls such as Azure Private Link, AWS PrivateLink, and Application Gateway WAF. Design and enforce cloud-native security strategies in Azure and AWS using services like AWS Shield, Azure DDoS Protection, and Azure Firewall. Build secure network topologies with integrated VPN, Direct Connect, and ExpressRoute to ensure encrypted connectivity across on-premises and cloud resources. What To Have For This Position Must have Skills:- 5+ years of experience in advanced network security engineering, with specific focus on securing cloud environments (Azure, AWS) and complex hybrid/multi-cloud infrastructures. Expert-level proficiency in Terraform with hands-on experience deploying secure infrastructure in production environments. Deep understanding of cloud-native security tools and best practices, including AWS VPC, Security Groups, Azure Virtual Networks, Azure Firewalls, Route Tables, and IAM policies. Strong knowledge of network protocols (IPSec, BGP, GRE, HTTP/S, TLS/SSL, DNS) and secure communications across distributed environments. Experience with firewalls such as Palo Alto or Fortigate or any other proven firewall vendor. Experience with Network equipment’s such as Cisco ,Meraki , or any other proven networking vendor. Experience with Zero Trust Architecture, micro-segmentation, and secure access service implementations. Good to have Skills:- Proven experience with container network security . Expertise in network forensics, penetration testing, and vulnerability management in cloud-based environments. Expertise in Firewalls, Security Policies and VPN. About Sapiens:- Sapiens International Corporation (NASDAQ and TASE: SPNS) is a global leader in intelligent insurance software solutions. With Sapiens’ robust platform, customer-driven partnerships, and rich ecosystem, insurers are empowered to future-proof their organizations with operational excellence in a rapidly changing marketplace. We help insurers harness the power of AI and advanced automation to support core solutions for property and casualty, workers’ compensation, and life insurance, including reinsurance, financial & compliance, data & analytics, digital, and decision management. Sapiens boasts a longtime global presence, serving over 600 customers in more than 30 countries with its innovative SaaS offerings. Recognized by industry experts and selected for the Microsoft Top 100 Partner program, Sapiens is committed to partnering with our customers for their entire transformation journey and is continuously innovating to ensure their success. For More information visit us on www.sapiens.com . Sapiens is an equal opportunity employer. We value diversity and strive to create an inclusive work environment that embraces individuals from diverse backgrounds. Disclaimer: - Sapiens India does not authorise any third parties to release employment offers or conduct recruitment drives via a third party. Hence, beware of inauthentic and fraudulent job offers or recruitment drives from any individuals or websites purporting to represent Sapiens . Further, Sapiens does not charge any fee or other emoluments for any reason (including without limitation, visa fees) or seek compensation from educational institutions to participate in recruitment events. Accordingly, please check the authenticity of any such offers before acting on them and where acted upon, you do so at your own risk. Sapiens shall neither be responsible for honouring or making good the promises made by fraudulent third parties, nor for any monetary or any other loss incurred by the aggrieved individual or educational institution. In the event that you come across any fraudulent activities in the name of Sapiens , please feel free report the incident at sapiens to sharedservices@sapiens.com Show more Show less

Posted 4 weeks ago

Apply

0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Reporting Data Engineer Join EY as a MARS Data Engineer and be at the forefront of providing and implementing innovative data insights, data products, and data services. MARS is a data platform providing custom data insights, DaaS and DaaP for a variety of EY departments and staff. We leverage software development practices to develop intricate data insights and develop data products. Your Key Responsibilities As a member of the MARS team, you will play a critical role in our mission of providing innovative data insights, the operations and support of the MARS data platform. This includes supporting customers, internal team members, and management. Operations and support include estimating, designing, developing and delivery of data products and services. You will contribute your creative solutions and knowledge to our data platform which features 2TB of mobile device data daily (300K+ devices). Our platform empowers our product managers and help enable our teams to build a better working world. As reporting engineer with the MARS team, the following activities are expected: Collaborate closely with the product manager to align activities to timelines and deadlines Proactively suggest new ideas and solutions, driving them to implementation with minimal guidance on technical delivery Provide input to the MARS roadmap and actively participate to bring it to life Collaborate with the Intune engineering team to get a clear understanding of the mobile device lifecycle and the relationship to Intune data and reporting Serve as the last level of support for all MARS data reporting questions and issues. Participate and contribute in the below activities: Customer discussions and requirement gathering sessions Application reports (daily, weekly, monthly, quarterly, annually) Custom reporting for manual reports, dashboards, exports, APIs, and semantic models Customer Service engagements Daily team meetings Work estimates and daily status Data & Dashboard monitoring & troubleshooting Automation Data management and classification Maintaining design documentation for Data schema, data models, data catalogue, and related products/services. Monitoring and integrating a variety of data sources Maintain and develop custom data quality tools Skills And Attributes For Success General Skills Analytical Ability: Strong analytical skills in supporting core technologies, particularly in managing large user bases, to effectively troubleshoot and optimize data solutions. Communication Skills: Excellent written and verbal communication skills, with the ability to articulate complex technical concepts clearly to both technical and non-technical stakeholders. Proficiency in English is required, with additional languages being a plus. Interpersonal Skills: Strong interpersonal skills, sound judgment, and tact to foster collaboration with colleagues and customers across diverse cultural backgrounds. Creative Problem-Solving: Ability to conceptualize innovative solutions that add value to end users, particularly in the context of mobile applications and services. Self-Starter Mentality: A proactive and self-motivated approach to work, with the ability to take initiative and drive projects forward independently. Documentation Skills: Clear and concise documentation skills, ensuring that all processes, solutions, and communications are well-documented for future reference. Organizational skills: The ability to define project plans, execute them, and manage ongoing risks and communications throughout the project lifecycle. Cross-Cultural Awareness: Awareness of and sensitivity to cross-cultural dynamics, enabling effective collaboration with global teams and clients. User Experience Focus: Passionate about improving user experience, with an understanding of how to measure, monitor, and enhance user satisfaction through feedback and analytics. To qualify for the role, you must have the following qualifications: At least three-years of experience in the following technologies and methodologies Hands-on experience in Microsoft Intune data, Mobile Device and Application Management data (MSFT APIs, Graph and IDW) Proven experience in mobile platform engineering or a related field. Strong understanding of mobile technologies and security protocols, particularly within an Intune-based environment. Experience with Microsoft Intune, including mobile device and application management. Proficient in supporting Modern Workplace tools and resources. Skilled in supporting Modern Workplace tools and resources Experience with iOS and Android operating systems. Proficient in PowerShell scripting for automation and management tasks. Ability to operate proactively and independently in a fast-paced environment. Solution oriented mindset with the capability to design and implement creative Mobile solutions and the ability to suggest and implement solutions that meet EY’s requirements Ability to work in UK working hours Specific technology skills include the following: Technical Skills Power BI - semantic models, Advanced Dashboards Power Bi Templates Intune Reporting and Intune Data Intune Compliance Intune Device Intune Policy management Intune Metrics Intune Monitoring SPLUNK data and reporting Sentinel data and reporting HR data and reporting Mobile Defender data and reporting AAD-Active Directory Data quality & data assurance Data Bricks Web Analytics Mobile Analytics Azure Data Factory Azure pipelines/synapses Azure SQL DB/Server ADF Automation Azure Kubernetes Service (KaaS) Key Vault management Azure Monitoring App Proxy & Azure Front Door data exports API Development Python, SQL, KQL, Power Apps MSFT Intune APIs, (Export, App Install) Virtual Machines SharePoint - General operations Data modeling ETL and related technologies Ideally, you’ll also have the following: Strong communication skills to effectively liaise with various stakeholders. A proactive approach to suggesting and implementing new ideas. Familiarity with the latest trends in mobile technology. Ability to explain very technical topics to non-technical stakeholders Experience in managing and supporting large mobile environments. Testing and Quality Assurance – ensure our mobile platform meets quality, performance and security standards. Implementation of new products and/or service offerings. Experience with working in a large global environment XML data formats Agile delivery Object-oriented design and programming Software development Mobile What we look for: A person that demonstrates a commitment to integrity, initiative, collaboration, efficiency and three or more years in the field of data analytics, and Intune data reporting. What We Offer EY Global Delivery Services (GDS) is a dynamic and truly global delivery network. We work across six locations – Argentina, China, India, the Philippines, Poland and the UK – and with teams from all EY service lines, geographies and sectors, playing a vital role in the delivery of the EY growth strategy. From accountants to coders to advisory consultants, we offer a wide variety of fulfilling career opportunities that span all business disciplines. In GDS, you will collaborate with EY teams on exciting projects and work with well-known brands from across the globe. We’ll introduce you to an ever-expanding ecosystem of people, learning, skills and insights that will stay with you throughout your career. Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next. Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way. Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 4 weeks ago

Apply

0 years

0 Lacs

Jaipur, Rajasthan, India

On-site

Linkedin logo

Functional Overview: The Security Operations Analyst is responsible for monitoring, reporting, and analyzing the organization’s global security posture. They must be able to analyze all available information, including logs, network traffic, and other data generated by the security systems in place, to identify actual anomalies, security breaches, and other incidents, distinguishing between false positives and genuine threats. Duties and responsibilities: Continuously monitors the alert queue and analyzes available logs and context necessary to initiate incident response work. Coordinate triage with local stakeholders on security alerts Analyzes and determines actionable items based on all available logs, packet captures, and other relevant data, accurately distinguishing between actionable and non-actionable information and weeding out false positives and irrelevant data. Handle security offense tickets and ensure compliance with the Service Level Agreement (SLA) by communicating, escalating, and following up with the internal team and stakeholders, providing timely updates until resolution. Conduct vulnerability assessments and resolve security issues identified through evaluations and other sources. Support numerous security project implementations from a technical perspective. Evangelize security within the company and serve as an advocate for maintaining trust with partners and customers. Staying up to date with emerging security threats, including applicable regulatory security requirements. Other responsibilities and additional duties as assigned by the security management team Minimum competencies: Minimum 5 years of experience working within information security. Working experience in creating SOC playbooks and threat hunting. Strong understanding of phishing detection and response. Knowledgeable in Windows/Unix or any Pen-testing tools. Strong written communication skills and presentation skills. Strong understanding of security incident management, malware management, and vulnerability management processes. Knowledge of network protocols, firewalls, and IDS/IPS systems. Cloud Security & Firewalls: Microsoft Azure (Azure Firewall, Defender for Cloud), Palo Alto SIEM & SOAR Tools: Microsoft Azure Sentinel, M365 Defender Network and Security Certification is a huge plus (CCNA, CCNP, CompTIA (Network+ce, Security+ ce, CySa+ce) Show more Show less

Posted 4 weeks ago

Apply

0 years

0 Lacs

India

On-site

Linkedin logo

Job description Telco ICT Group is a IT Managed Service Provider(MSP) in Melbourne, Australia which offers a full range of telecommunications services and IT solutions to businesses including Office 365, Managed IT services, Cloud Migration, MPLS and SD WAN solutions and small business products. We are looking for a senior IT engineer with a focus on Microsoft Cloud solutions to join our expanding team of awesome professionals. This full-time position will be suited to a strong and reliable IT professional who is keen to utilise their current skill set and have a willingness to improve and learn new proficiencies and provide excellence in customer service. Please only apply if you have 14-30 days of notice period. The Role: The key purpose of this role will be to plan, design, develop, and implement technical solutions with a focus in Microsoft cloud solutions to our growing client base. The role will also see you managing our clients IT environments in accordance with technical and security guidelines, best practices, and assisting our service desk team with any issues as required. With your close working relationship with business owners and management teams you will be continually educating on new cloud-based initiatives and applications being released and provide associated training as required. Internally you will be mentoring staff and assisting with project planning. Skills: This position calls for a strong technical background with at least 5 years experience working with Microsoft on premise and cloud solutions. The ideal applicant will preferably already have experience working in the MSP environment. Areas of expertise should include, but not limited to, the following: Microsoft Servers & Desktop Operating Systems, Great knowledge of microsoft defender or SENTINEL Microsoft Azure and Office 365 Microsoft security and compliance Windows Virtual Desktops (WVD) MS Security services such as Intune, CAS, ATP MS Power platform including Teams VMware / HyperV IT Networking & Network Security Network Monitoring Systems such as Auvik Backup solutions, such as Datto and Cove VoIP Telephony systems with 3cx integration Business Continuity Planning Strong communication skills and high-level attention to details are a must. In addition to having a positive attitude, sense of humor and an outgoing personality. Show more Show less

Posted 4 weeks ago

Apply

2 - 3 years

0 Lacs

Kochi, Kerala, India

On-site

Linkedin logo

Role Description Job Title: L1 SOC Analyst Experience : 2 to 3 years Location: Trivandrum, Kochi, Chennai, Bangalore, Hyderabad Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. Job Responsibilities Eyes on the glass monitoring of the SOAR/SIEM platform for the detection of SOC Level 1 Analysis 24*7*365 Shifts on a rotational basis - Performing the Monitoring, Detection and Response Adherence to Shift Schedules, shift hand-over and completion of activities designated for the shift within the designated SLAs and KPIs Familiarity with SIEM Platforms such as Splunk, Sentinel, QRadar etc Perform Triage, Investigation, context enrichment and opening of Incident, as per the documented playbooks. Ability to learn additional security tools and platforms depending on the situational needs and ability to operate on those tools in optimum levels – such as DDOS Detection Tools, End-point security tools, EDR and MDR tools, DLP Tools, Phishing investigation tools etc Familiarity with OpenSource Intelligence tools. Professionalism in documenting Security Incidents, Investigation findings and reasoning Must Have Skills Monitoring and investigation experience on 1 or more SIEM tools and/or SOAR Platforms Experience in any of the SIEM Platforms such as Splunk, Sentinel, QRadar etc Minimum of 2 years of experience in Information Security In depth operational experience with SIEM technologies. Demonstrated process orientation and ability to manage out of the ordinary cyber threat detection and investigation steps Strong communicator and fluent in English and ability to work smoothly with multinational clients Aptitude and interest towards Cyber security concepts and evolution of new offence and defense methodologies Good To Have Skills Certifications such as CEH, CCNA, CISSP, CISSP or on common SOC Tools/Platforms Show more Show less

Posted 4 weeks ago

Apply

5 - 7 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

Role Description Job Title: L3 SOC Analyst Experience : 5 to 7 years Location: Trivandrum, Kochi, Chennai, Bangalore, Hyderabad Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. Must-Have Skills Experience with SIEM vendors such as QRadar, Sentinel, Splunk Incident response and threat hunting expertise Strong knowledge of attack patterns, Tools, Techniques, and Procedures (TTPs) Experience in writing procedures, runbooks, and playbooks Strong analytical and problem-solving skills Hands-on experience with system logs, network traffic analysis, and security tools Proficiency in identifying Indicators of Compromise (IOCs) and Advanced Persistent Threats (APTs) Good-to-Have Skills Experience setting up SIEM solutions and troubleshooting connectivity issues Familiarity with security frameworks and best practices Ability to collaborate with IT and security teams effectively Responsibilities Act as an escalation point for high and critical severity security incidents Conduct in-depth investigations to assess impact and understand the extent of compromise Analyze attack patterns and provide recommendations for security improvements Perform proactive threat hunting and log analysis to detect potential threats Provide guidance on mitigating risks and improving security hygiene Identify gaps in security processes and propose enhancements Ensure end-to-end management of security incidents Document and update incident response processes and define future outcomes Participate in war room discussions, team meetings, and executive briefings Train team members on security tools and incident resolution procedures Show more Show less

Posted 4 weeks ago

Apply

2 - 3 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

Role Description Job Title: L1 SOC Analyst Experience : 2 to 3 years Location: Trivandrum, Kochi, Chennai, Bangalore, Hyderabad Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. The primary role of a SOC Level 1 Analyst is to serve as the frontline defense, managing first triage and ranking of security cases, and initiating the threat detection and response processes for client-related security events. The Analyst is integral to the MDR, working collaboratively with other teams to ensure high quality of service, and will be given opportunities for professional growth in cybersecurity. The position entails conducting inquiry procedures as dictated by CyberProof methodology and contributing insights on the case investigation and detection quality. Principal Duties Quickly respond to and classify all incoming security cases, ensuring that incidents are appropriately escalated to the right analyst within the predefined SLA period during the Analyst's shift. Conduct the first triage investigations into the assigned cases using a blended approach based on tools integrated into the SOAR platform and document all collected evidence and conclusions. At the shift's commencement, diligently review all new information in the SOAR, through the Teams channel, shared mailbox, and any other designated communication mediums to ensure readiness to continue or start case the investigation and address client queries. Facilitate a smooth handoff to the next team at the end of the shift, ensuring continuous and seamless security monitoring. Remain to any procedural inconsistencies or issues and proactively report these to the team leader or upper analytical layer (L2) for resolution or consultation. Should uncertainty or complex issues arise, elevate the matter promptly to a senior L1 Analyst or Shift and Technical Leads before resorting to the L2 team. Support the Lead Analysts and the L2 team in the extraction and compilation of data needed for the preparation of Weekly, Monthly, and Quarterly Business Review (QBR) documentation. Skills And Qualifications At least 1 year of experience as a security analyst Proficient in investigating s related to phishing, malware, and similar threats. Solid understanding of computer security and networking concepts Experience with SIEM or similar security tools (Splunk or Qradar or Sentinel). Knowledgeable about endpoint protection tools Skilled in analyzing network traffic, interpreting logs, and examining packet capture. Strong critical thinking and analytical abilities Excellent written and verbal communication skills Experience managing and analyzing s from security tools is a plus. Familiarity with cloud solutions is advantageous. Relevant certifications are a plus. Show more Show less

Posted 4 weeks ago

Apply

2 - 3 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

Role Description Job Title: L1 SOC Analyst Experience : 2 to 3 years Location: Trivandrum, Kochi, Chennai, Bangalore, Hyderabad Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. The primary role of a SOC Level 1 Analyst is to serve as the frontline defense, managing first triage and ranking of security cases, and initiating the threat detection and response processes for client-related security events. The Analyst is integral to the MDR, working collaboratively with other teams to ensure high quality of service, and will be given opportunities for professional growth in cybersecurity. The position entails conducting inquiry procedures as dictated by CyberProof methodology and contributing insights on the case investigation and detection quality. Principal Duties Quickly respond to and classify all incoming security cases, ensuring that incidents are appropriately escalated to the right analyst within the predefined SLA period during the Analyst's shift. Conduct the first triage investigations into the assigned cases using a blended approach based on tools integrated into the SOAR platform and document all collected evidence and conclusions. At the shift's commencement, diligently review all new information in the SOAR, through the Teams channel, shared mailbox, and any other designated communication mediums to ensure readiness to continue or start case the investigation and address client queries. Facilitate a smooth handoff to the next team at the end of the shift, ensuring continuous and seamless security monitoring. Remain to any procedural inconsistencies or issues and proactively report these to the team leader or upper analytical layer (L2) for resolution or consultation. Should uncertainty or complex issues arise, elevate the matter promptly to a senior L1 Analyst or Shift and Technical Leads before resorting to the L2 team. Support the Lead Analysts and the L2 team in the extraction and compilation of data needed for the preparation of Weekly, Monthly, and Quarterly Business Review (QBR) documentation. Skills And Qualifications At least 1 year of experience as a security analyst Proficient in investigating s related to phishing, malware, and similar threats. Solid understanding of computer security and networking concepts Experience with SIEM or similar security tools (Splunk or Qradar or Sentinel). Knowledgeable about endpoint protection tools Skilled in analyzing network traffic, interpreting logs, and examining packet capture. Strong critical thinking and analytical abilities Excellent written and verbal communication skills Experience managing and analyzing s from security tools is a plus. Familiarity with cloud solutions is advantageous. Relevant certifications are a plus. Skills SOC Analysis,MItre Analysis,Invetigation,Sentinel Show more Show less

Posted 4 weeks ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world. We are seeking for a passionate cybersecurity professionals to join our growing team of defenders. In this role, you will proactively detect, investigate, and respond to advanced threats across enterprise environments using cutting-edge security tools and threat intelligence. The ideal candidate combines strong security expertise with a proactive mindset and coding skills to drive deep threat analysis and automation. Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. Responsibilities Responsibilities: Monitor, triage, and respond to security incidents using tools like Microsoft Defender for Endpoint (MDE), Defender for Identity (MDI), Defender for Office (MDO) and Microsoft Defender for Cloud Apps (MCAS) Perform proactive threat hunting and detection engineering using telemetry from endpoints, identities, cloud, and network. Develop hunting queries using Kusto Query Language (KQL) or similar to identify suspicious patterns and behaviors. Investigate security incidents across hybrid environments and contribute to root cause analysis and containment strategies. Collaborate with internal teams (defender, threat intelligence, engineering) to enhance detection logic, develop automations, and improve incident response workflows. Contribute to incident documentation, detection playbooks, and operational runbooks. Stay current with evolving threat landscapes, cloud attack vectors, and advanced persistent threats (APT). Qualifications Basic Qualifications: 4–7 years of experience in cybersecurity (SOC, IR, threat hunting, red team, or malware analysis). Hands-on experience with SIEM, EDR, and cloud-native security tools (M365 Defender, Sentinel, CrowdStrike, etc.). Experience with at least one cloud platform (Azure, AWS, GCP) and its associated security services and configurations. Proficiency in KQL, Python, or similar scripting languages for data analysis and automation. Strong knowledge of MITRE ATT&CK, Cyber Kill Chain, and adversary TTPs. Familiarity with operating system internals (Windows, Linux) and endpoint/network forensics Preferred Qualifications Hands-on experience with Microsoft Defender XDR tools (MDE, MDI, MDO), Microsoft Sentinel, or other EDR/XDR platforms. Knowledge of cloud workload protection, SIEM, or threat intelligence platforms. Certifications like CISSP, OSCP, CEH, GCIH, AZ-500, SC-200 or similar/equivalent are a plus. Other Requirements Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter. Work Environment: Role may involve 24x7 coverage, shift-based support, or on-call rotations based on business needs. Hybrid work model requiring 3 days per week in office; flexibility may vary based on team or location-specific guidelines. Open to candidates from diverse professional backgrounds with demonstrable cybersecurity knowledge and technical aptitude. #MSFTSecurity #MSFTSecurity #DEXMicrosoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations. Show more Show less

Posted 4 weeks ago

Apply

3 - 5 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Our technology services client is seeking multiple Azure Security Support Engineer to join their team on a Full Time basis. Below are further details about the role: Role: Azure Security Support Engineer Mandatory Skills: Azure Security Services, Azure Cloud infrastructure, Active directory, security centre, M365 Defender, Azure Sentinel Experience: 3-5 Years Location: Hyderabad/ Pune Notice Period: Immediate- 30 Days Job Description: As a security support engineer, you will be an elite member of a customer facing security support team working on resolving complex issues with Azure Cloud and On-Prem Microsoft security products. You have extensive experience providing mission critical customer support to external enterprise customers with a focus on helping, advising, and empowering customers to achieve more. You have a passion for learning new technologies, collaborating with other experts to find solutions, having complete customer obsession, continuously optimizing, and improving the customer support experience, and having fun. You enjoy working on challenging issues that require in depth investigation, excellent communication, and complete ownership to drive issues to resolution. You obsess over small details to make sure that each customer interaction not only drives issues to resolution, but also ensures that customers are effectively using Microsoft technologies to further the success of their business. In all interactions with our customers, you communicate effectively, have complete accountability and ownership over providing amazing results, show resourcefulness in providing timely and effective solutions, and approach every situation with empathy, care, and a focus on providing an amazing experience. When you don’t know the answer, you “swarm” with other engineers at Microsoft to produce a solution quickly, and you aren’t afraid to ask questions and learn new things daily. You don’t let anything block you in the pursuit of a world class customer service experience for our customers. This position requires extensive cross-group coordination and excellent oral and written communication skills. Attention to detail; and a highly organized, process-focused aptitude are required to manage the variety of responsibilities and deliverables. You must be able to work well under pressure and deadlines, while also exhibiting flexibility and adaptability across a broad organizational matrix. Beyond extensive technical focus, this role requires the ability to communicate issues and recommendations clearly and concisely and build broad relationships with influencers to impact key business results. You are passionate about improving the customer support experience and the product by collaborating with software developers to recommend feature improvements. Key Responsibilities: Scope and resolve complex issues with onboarding, deployment, and configuration of products Advise and educate customers on the features and capabilities of our products Interpret and analyze log data to troubleshoot issues Communicate solutions and recommendations to the customer and ensure that customers have the information and tools to address similar issues in the future Collaborate and coordinate with other teams and experts throughout Microsoft to tailor the best solution for customer issues Develop, document, and implement runbooks for training, process standardization, and guidance on how to troubleshoot effectively Troubleshoot issues in customer environments involving cloud, server, endpoint, and network infrastructure Perform activities necessary to quickly mitigate outages and service interruptions in the customer’s environment by recommending and implementing workarounds Maintain current knowledge and understanding of product roadmaps and emerging technologies Technical Qualifications At least L100 level in any of the 2 Security Technologies listed below: Microsoft Defender for Endpoint: Onboarding and configuration knowledge EDR capabilities Windows 10 Security Stack, including NextGen AV and ASR Basic Mac/Linux knowledge Microsoft Defender for Identity: On-Prem AD configuration knowledge General operating system performance knowledge Awareness of general authentication related alert types Knowledge of Active Directory related protocols Microsoft Defender for Cloud Apps: Configuration of the Shadow IT/Discovery methods Configuration or knowledge of Conditional Access App Control Configuration or knowledge with Connected Apps (API) Microsoft 365 Defender Understanding of how all Microsoft Security technologies are correlated together and the “bigger picture” of the security products. Knowledge of how Alerts are correlated with Incidents Understanding of Secure Score and how to leverage it in an Enterprise environment. Required Experience 2+ years of experience in Network Security Engineering or consulting, and/or Systems Administration. 2+ years Customer facing support experience. 1+ year Experience on Windows Server, Windows Client, Active Directory and/or Azure Active Directory administration. 1+ year enterprise cloud experience with any of the major cloud providers, including cloud security, networking, and migration of multi-cloud or hybrid deployments Experience supporting large and complex geographically distributed enterprise environments If you are interested, share the updated resume to shivani.g@s3staff.com Show more Show less

Posted 4 weeks ago

Apply

0 years

0 Lacs

Vadodara, Gujarat, India

On-site

Linkedin logo

Company Description ProMed Sentinel Healthcare LLP specializes in Occupational Health & Safety services for industries and corporates, offering tailored medical solutions. We provide comprehensive services, including OHC Development & Operations, Pre Employment & Periodical Medical Checkups, Occupational Health Expertise, and more. We also offer training programs in areas such as First Aid, BLS, and health awareness on various topics. Our clients include a wide array of industries, including power plants, chemical, automotive, and more. Role Description This is a part-time, OHC Visiting role for a Factory Medical Officer located in Panchmahals & Vadodara. The Factory Medical Officer will be responsible for providing medical care to employees, conducting medical check-ups, and managing occupational health services. The officer will also offer training and development in health and safety, as well as collaborate with physicians to ensure comprehensive medical services. Qualifications Proficiency in Medicine and Surgery Experience in Patient Care and Working with Physicians Skills in Training and Development in health and safety areas Excellent verbal and written communication skills Ability to handle medical emergencies and provide immediate care Knowledge of occupational health regulations and compliance MBBS degree with medical registration Experience in the industrial healthcare sector is an advantage Show more Show less

Posted 4 weeks ago

Apply

2 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Bring more to life. Are you ready to accelerate your potential and make a real difference within life sciences, diagnostics and biotechnology? At Cytiva, one of Danaher’s 15+ operating companies, our work saves lives—and we’re all united by a shared commitment to innovate for tangible impact. You’ll thrive in a culture of belonging where you and your unique viewpoint matter. And by harnessing Danaher’s system of continuous improvement, you help turn ideas into impact – innovating at the speed of life. Working at Cytiva means being at the forefront of providing new solutions to transform human health. Our incredible customers undertake life-saving activities ranging from fundamental biological research to developing innovative vaccines, new medicines, and cell and gene therapies. At Cytiva you will be able to continuously improve yourself and us – working on challenges that truly matter with people that care for each other, our customers, and their patients. Take your next step to an altogether life-changing career. Learn about the Danaher Business System which makes everything possible. The Security Operations Analyst is responsible for monitoring, analyzing, and responding to security incidents to protect the organization’s digital assets and infrastructure. By proactively identifying threats and vulnerabilities, they play a critical role in minimizing risk and ensuring business continuity. This position reports to the Senior Manager, Security Operations and is part of the Information Security Team which operates globally. This will be an on-site role, based at our office in Bangalore working as part of a global team. At Cytiva, our vision is, to advance future therapeutics from discovery to delivery. What you will do: Perform advanced security incident analysis and digital forensics to identify threats and mitigate risks. Lead complex security investigations, including malware analysis, network traffic analysis, and endpoint detection. Provide guidance to L1 and L2 SOC analysts, improving the quality of information coming into the Security Operations team. Investigate and respond to escalated security incidents in a timely manner. Collaborate with our engineering teams to optimize and fine-tune SIEM (e.g., Splunk, Microsoft Sentinel, Elastic Security) and other security tools. Conduct proactive threat hunting to uncover hidden threats and vulnerabilities within the organization. Partner with other IT and security teams to improve the organization's security posture. Produce detailed reports and recommendations for remediation and security improvements, including hosting post incident reviews with wider technical teams. Who you are: Minimum 5+ years of experience in a corporate IT environment, with at least 2 years in an L3 or senior analyst role. Deep knowledge of security frameworks such as MITRE ATT&CK, NIST, CIS Controls, and ISO 27001. Experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar, ArcSight) and EDR/XDR solutions. Vendor certifications are a plus. Hands-on experience with incident response, threat hunting, and forensic investigations. Familiarity with cloud security (AWS, Azure, Google Cloud) and modern attack techniques. Certifications such as OSCP, CEH are a plus. It would be a plus if you also possess previous experience in: Scripting and automation (Python, PowerShell, Bash) to improve SOC processes SME in EDR, SIEM, UBA, DLP or Data Security Operation Technology (OT) environments Cytiva, a Danaher operating company, offers a broad array of comprehensive, competitive benefit programs that add value to our lives. Whether it’s a health care program or paid time off, our programs contribute to life beyond the job. Check out our benefits at Danaher Benefits Info. Join our winning team today. Together, we’ll accelerate the real-life impact of tomorrow’s science and technology. We partner with customers across the globe to help them solve their most complex challenges, architecting solutions that bring the power of science to life. For more information, visit www.danaher.com. At Danaher, we value diversity and the existence of similarities and differences, both visible and not, found in our workforce, workplace and throughout the markets we serve. Our associates, customers and shareholders contribute unique and different perspectives as a result of these diverse attributes. Show more Show less

Posted 4 weeks ago

Apply

0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

About Temenos Temenos powers a world of banking that creates opportunities for billions of people and businesses everywhere. We do this through the pioneering spirit of 7500+ Temenosians who are passionate about making banking better, together. We serve 3000 banks from the largest to challengers and community banks in 150+ countries. We collaborate with clients to build new banking services and state-of-the-art customer experiences on our open banking platform, helping them operate more sustainably. At Temenos, we have an open-minded and inclusive culture, where everyone has the power to create their own destiny and make a positive contribution to the world of banking and society. THE ROLE As our SOC Senior Security Analyst you will be part of a fast-paced Global SOC team and cover broad aspects of Temenos Cyber security monitoring and incident response operations. Working closely with SOC Manager and Cyber Security Engineers, the role is to help coordinate and report on cyber incidents affecting Temenos on-premises and Cloud infrastructure and Temenos application suite. This role requires strong technical analytical skills while providing accurate analysis of security-related problems and a well-rounded networking background. It also involves critical duties and responsibilities to be performed during crisis and contingency operations, which may necessitate extended hours of work. OPPORTUNITES Responsible for working in a 24x7 Security Operation Center (SOC) environment. Provide security monitoring, analysis and trending of security log data from a large number of systems, managed through a SIEM platform. This involves handling events such as security breaches, threats, or user security related issues. Participate in security incident response efforts, having knowledge of common security exploits, vulnerabilities and countermeasures. Coordinate with Security System engineers and Threat Intel engineers to continuously improve the accuracy and efficiency of the Security monitoring and response process. Investigate, document, and report on information security issues and emerging trends that affect Temenos on-premises and Cloud based platforms. Propagates a risk based, business focused cyber security approach in all activities. Deliver regular and consistent KPI/KRIs on the security monitoring activities. Remain current on security industry events, threats and impacts on new technology. Skills 2 years of working experience in Security Incident Response. Security Operation Center Experience. Good knowledge of networking topologies and technologies, including firewalling, routing and switching, Good knowledge of operating systems (Windows, Linux, UNIX) Solid understanding of current cyber-attack tactics/techniques and mitigation solutions. Knowledge on one or more SIEM tools, such as Splunk, Wazuh, Sentinel. Exposure to handling Security Centre alerts in cloud (Azure or AWS). Ability to communicate security issues to peers and management. Customer-oriented with a strong interest in client satisfaction. Good analytical skills. Ability to prioritize tasks Industry certifications & qualifications from recognized training providers – ISC2, ISACA, SANS, EC-Council can be a plus. VALUES Care about transforming the Banking landscape. Commit to being part of an exciting culture and product evolving within the financial industry. Collaborate effectively and proactively with teams within or outside Temenos. Challenge yourself to be ambitious and achieve your individual as well as the company targets. Please make sure to read our Recruitment Privacy Policy Show more Show less

Posted 4 weeks ago

Apply

0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Bachelor’s degree in Computer Science, Information Technology, or a related field (or equivalent experience). The candidate should be willing to relocate to Noida. Good knowledge of Windows /Linux system and networking fundamentals. Experience with cloud security and technologies like AWS, Azure, or Google Cloud Knowledge in operating and configuring SIEM tools (e.g., Sentinel , Splunk, MS defender). Knowledge of firewalls, IDS/IPS, DLP, and endpoint protection systems. Familiar with scripting and automation tools (e.g., Python, PowerShell). Experience with monitoring and logging platforms like ELK Stack, Splunk, Prometheus, Grafana, New Relic , Solarwinds Knowledge in CI/CD tools and processes (e.g., Jenkins, GitLab CI/CD). Knowledge containerization and orchestration tools (e.g., Docker, Kubernetes). Key Responsibilities Hands-on experience in Security incident response and threat intelligence analysis Knowledge of networking concepts, firewalls, and security protocols. Experience with SIEM tools, IDS/IPS systems, and endpoint security tools. Investigate security incidents and recommend remediation measures. Analyze security alerts from various monitoring tools and respond appropriately. Manage SIEM (Security Information and Event Management) tools and ensure logs are analyzed. Respond to incidents, perform initial troubleshooting, and escalate complex issues to L2/L3 engineers. Perform routine maintenance of servers, virtual machines, and cloud resources. Assist in provisioning, configuring, and decommissioning infrastructure as required. Support and maintain CI/CD pipelines for various projects. Execute existing automation scripts for routine tasks. Contribute to the improvement of automation scripts and processes. Maintain accurate and up-to-date documentation for configurations, incidents, and procedures. Coordinate with L2/L3 engineers, development, and QA teams for issue resolution. Show more Show less

Posted 4 weeks ago

Apply

0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world. We are seeking for a passionate cybersecurity professionals to join our growing team of defenders. In this role, you will proactively detect, investigate, and respond to advanced threats across enterprise environments using cutting-edge security tools and threat intelligence. The ideal candidate combines strong security expertise with a proactive mindset and coding skills to drive deep threat analysis and automation. Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. Responsibilities Responsibilities: Monitor, triage, and respond to security incidents using tools like Microsoft Defender for Endpoint (MDE), Defender for Identity (MDI), Defender for Office (MDO) and Microsoft Defender for Cloud Apps (MCAS) Perform proactive threat hunting and detection engineering using telemetry from endpoints, identities, cloud, and network. Develop hunting queries using Kusto Query Language (KQL) or similar to identify suspicious patterns and behaviors. Investigate security incidents across hybrid environments and contribute to root cause analysis and containment strategies. Collaborate with internal teams (defender, threat intelligence, engineering) to enhance detection logic, develop automations, and improve incident response workflows. Contribute to incident documentation, detection playbooks, and operational runbooks. Stay current with evolving threat landscapes, cloud attack vectors, and advanced persistent threats (APT). Qualifications Basic Qualifications: 4–7 years of experience in cybersecurity (SOC, IR, threat hunting, red team, or malware analysis). Hands-on experience with SIEM, EDR, and cloud-native security tools (M365 Defender, Sentinel, CrowdStrike, etc.). Experience with at least one cloud platform (Azure, AWS, GCP) and its associated security services and configurations. Proficiency in KQL, Python, or similar scripting languages for data analysis and automation. Strong knowledge of MITRE ATT&CK, Cyber Kill Chain, and adversary TTPs. Familiarity with operating system internals (Windows, Linux) and endpoint/network forensics Preferred Qualifications Hands-on experience with Microsoft Defender XDR tools (MDE, MDI, MDO), Microsoft Sentinel, or other EDR/XDR platforms. Knowledge of cloud workload protection, SIEM, or threat intelligence platforms. Certifications like CISSP, OSCP, CEH, GCIH, AZ-500, SC-200 or similar/equivalent are a plus. Other Requirements Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings: Microsoft Cloud Background Check: This position will be required to pass the Microsoft background and Microsoft Cloud background check upon hire/transfer and every two years thereafter. Work Environment: Role may involve 24x7 coverage, shift-based support, or on-call rotations based on business needs. Hybrid work model requiring 3 days per week in office; flexibility may vary based on team or location-specific guidelines. Open to candidates from diverse professional backgrounds with demonstrable cybersecurity knowledge and technical aptitude. #MSFTSecurity #MSFTSecurity #DEXMicrosoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations. Show more Show less

Posted 1 month ago

Apply

0.0 - 3.0 years

0 Lacs

Delhi, Delhi

Remote

Indeed logo

At CEEW, we are deliberate about what we stand for (and what we don’t stand for!) as an employer. So, if the below description strikes a chord, we would love to hear from you! At CEEW, we build careers in public policy We offer strong visionary leadership – with emphasis on research and impact at scale We actively promote leadership by initiative We celebrate talent and ambition You will be surrounded by smart people who will challenge you and help you grow You will learn faster than your peers in other organisations Curiosity and irreverence, as well as responsibility, come together at CEEW You will get above-market remuneration We provide a safe space for all At CEEW, your life is your example for others Designation offered: Consultant Team/ Focus area: Technology & AI Location: New Delhi, India Reporting to: Lead, Technology & AI Duration: 12 Months (Opportunity for Full-time conversion) Purpose: To support the organization/project by performing geospatial data analysis, processing, visualization, and developing automated workflows using Python, Google Earth Engine (GEE), and QGIS. The Geospatial Analyst will contribute to various projects by transforming raw spatial data into actionable insights and creating informative map products. Key Responsibilities: Geospatial Data Analysis: Perform spatial analysis using QGIS, Python libraries (e.g., Geopandas, Rasterio, Shapely), and Google Earth Engine to address project-specific questions. Google Earth Engine Development: Develop, test, and implement scripts in Google Earth Engine for large-scale satellite imagery processing, time-series analysis, and environmental monitoring tasks. Python Scripting & Automation: Develop and maintain Python scripts to automate geospatial 2 data processing workflows, data cleaning, format conversions, and integration tasks. Desktop GIS Operations: Utilize QGIS for data creation, editing, geoprocessing, management, and production of high-quality cartographic outputs. Data Management: Acquire, process, manage, and ensure the quality control of various vector and raster geospatial datasets from diverse sources. Visualization & Reporting: Create compelling maps, visualizations, and reports to communicate spatial patterns and analytical findings to technical and non-technical audiences. Collaboration: Work collaboratively with project teams, data scientists, researchers, and other stakeholders Qualifications and Experience: Education: Bachelor’s or Master’s degree in Computer Science (with relevant specialization), Geoinformatics, Remote Sensing, Environmental Science, or a closely related field. Experience: Minimum of 1-3 years of relevant professional experience in a geospatial data analysis role. Technical Skills: Core GIS Concepts: Solid understanding of fundamental GIS principles, including map projections, coordinate systems, spatial data formats (vector, raster), geodatabases, and remote sensing basics. Python programming, specifically for geospatial analysis using libraries like Geopandas, Rasterio,Shapely, NumPy. GEE platform (JavaScript and/or Python API) for accessing, processing, and analyzing large geospatial datasets (e.g., Landsat, Sentinel, MODIS). QGIS: Strong proficiency in using QGIS for a wide range of GIS tasks, including advanced analysis, data editing, and cartographic design. Familiarity with cloud computing platforms (AWS, GCP, Azure), Experience with version control systems (e.g., Git), Experience with web mapping libraries (e.g., Leaflet, Mapbox GL JS). Understanding of Geo-AI and ML concepts like decision trees, random forest, PCA etc. Analytical Skills: Strong problem-solving and analytical skills with the ability to interpret spatial data effectively. Communication: Good written and verbal communication skills in English Compensation: Competitive compensation – commensurate to the experience and matching the best of standards adopted by the industry or other similar organisations for similar roles. Application process CEEW is an equal-opportunity employer, and the selection process does not discriminate on the basis of age, gender, caste, ethnicity, religion, or sexuality. Female candidates are encouraged to apply. Applications will be reviewed on a rolling basis. Interested applicants are advised to apply at the earliest possible. Only shortlisted candidates will be notified by us. We appreciate your interest.

Posted 1 month ago

Apply

0.0 - 12.0 years

0 Lacs

Gurugram, Haryana

On-site

Indeed logo

Gurgaon,Haryana,India +1 more Job ID 764930 Join our Team About this opportunity: We are looking for a Security Specialist profile within the Cyber Defense Center (CDC) in Group Security. The Cyber Defense Center defends Ericsson from cyberattacks originating from external threat actors. It ensures we are one step ahead of adversaries, identify their plans and means to execute them, block and disrupt their execution, and remove their presence from within Ericsson. Its focus is on sophisticated antagonistic threat actors who can do the most harm to Ericsson as a company. In order to achieve this the cyber defense center consists of four teams: threat intelligence, the red team, a process and governance team, and cyber operations. What you will do: 24x7 Security monitoring and incident handling across a complex network. End-to-End triage & investigation of all the threat detections originating from technology. Participate in incident response. Support use case development of detection analytics. Conduct research into new threats, identifying new IOC/TTPs. Work in shifts with efficient and accurate handover procedures. Identify improvements in automation and investigation procedures. Work with the Red team to identify gaps or weaknesses in security coverage. Create threat hunting use cases through security research and threat intelligence. Adhere to SLAs for security investigations. The skills you bring: A minimum of 7 to 12 years of experience working within a Security Operations Center /Managed Security Services environment. Organization and project management skills, Good documentation skills, Positive can-do attitude. Ability to work at odd hours and work constructively under pressure. Worked across different cultures in a global setting and with many stakeholders. Impeccable integrity and track record of working with sensitive information. Technical Competences The Incident Response Process Core networking skills Live Windows, Linux and Memory Forensics Active Directory Analysis Network Threat Hunting Basics of Vulnerability Management Demonstrable experience with Incidence Response in leading public Clouds – Azure, AWS, GCP Experience with Microsoft Azure Cloud - Azure Sentinel, Microsoft security stack, MS Graph API, Entra ID Amazon Web Services (AWS) security tools such as Security Hub, AWS Guard Duty, AWS Macie, AWS CloudTrail Google Cloud Platform (GCP) security tools such as Chronicle and Security Command Centre Able to triage & investigate email threats using platforms like Microsoft EOP, Trellix, Proofpoint Working knowledge of `Security products like Endpoint Detection Response (EDR), Identity Threat Detection (ITDR) & Response, Network Detection & Response (NDR) from leading vendors like Trellix, CrowdStrike, MS Defender for Endpoint, Vectra Experience in IT Security and risk management. Security related certification like SANS GCIH, GCIA, GMON, GREM, CEH, CISSP, CHFI and Incident Response certification is an added advantage. Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Gurgaon Req ID: 764930

Posted 1 month ago

Apply

Exploring Sentinel Jobs in India

The job market for sentinel roles in India is currently on the rise, with a high demand for professionals who can effectively monitor and secure systems, networks, and data. Sentinel jobs are crucial in ensuring the safety and integrity of digital assets for organizations across various industries.

Top Hiring Locations in India

  1. Bangalore
  2. Hyderabad
  3. Mumbai
  4. Pune
  5. Chennai

Average Salary Range

The salary range for sentinel professionals in India varies based on experience and location. Entry-level positions may start around INR 3-5 lakhs per annum, while experienced professionals can earn upwards of INR 10-15 lakhs per annum.

Career Path

In the field of sentinel, a typical career path may progress from roles such as Security Analyst or Information Security Specialist to Senior Security Engineer, Security Architect, and eventually Chief Information Security Officer (CISO) or Security Consultant.

Related Skills

Alongside expertise in sentinel, professionals in this field are often expected to have knowledge of cybersecurity, network security, risk management, incident response, and penetration testing.

Interview Questions

  • What is the difference between vulnerability assessment and penetration testing? (medium)
  • Explain the concept of threat modeling and its importance in cybersecurity. (advanced)
  • How do you stay updated with the latest trends and threats in the cybersecurity landscape? (basic)
  • Can you describe the process of setting up a Security Information and Event Management (SIEM) system? (medium)
  • What are the common techniques used in social engineering attacks? (advanced)
  • How would you handle a security incident involving a data breach? (medium)
  • What is the role of encryption in data security? (basic)
  • Can you explain the difference between symmetric and asymmetric encryption algorithms? (medium)
  • How would you prioritize security vulnerabilities for remediation in a large organization? (advanced)
  • Describe a time when you successfully implemented a security control to mitigate a specific risk. (medium)
  • What steps would you take to secure a web application from common vulnerabilities? (basic)
  • How do you assess the security posture of a new IT infrastructure? (medium)
  • What is the importance of compliance frameworks such as GDPR or HIPAA in cybersecurity? (medium)
  • How do you handle security incidents involving insider threats? (advanced)
  • Explain the concept of zero-trust security and its benefits in modern cybersecurity. (medium)
  • How do you approach security awareness training for employees in an organization? (basic)
  • Can you describe the role of threat intelligence in cybersecurity operations? (medium)
  • What are the key components of a security incident response plan? (medium)
  • How would you conduct a security audit of an organization's network infrastructure? (advanced)
  • What are the main challenges in securing cloud environments? (medium)
  • How do you assess the security implications of introducing new technology or software in an organization? (medium)
  • What is the role of a Security Operations Center (SOC) in an organization's cybersecurity strategy? (basic)
  • Can you explain the concept of sandboxing in malware analysis? (advanced)
  • How do you approach incident triage and prioritization in a security operations environment? (medium)
  • Describe a recent security project you worked on and the challenges you faced during its implementation. (medium)

Closing Remark

As you prepare for your journey into the sentinel job market in India, remember to showcase your expertise, experience, and passion for cybersecurity. Stay updated with the latest trends and technologies, practice your skills, and approach interviews with confidence. Best of luck in your job search!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies