Home
Jobs

437 Sentinel Jobs - Page 16

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. Role**: SentinelDesired Skill Set Any: SIEM, Azure Sentinel, Microsoft SentinelExperience Range: 4+ yearsJoining Location: Chennai We are currently planning to do a Walk-In Interview on 17th May 2025 at TCS Chennai. Date - 17th May 2025 (Saturday)Venue - TCS Siruseri ATL Building- 1/G1, SIPCOT IT Park Navalur, Siruseri, Tamil Nadu 603103 Job DescriptionRole & Responsibilities: Should have overall 4+ years of experience in SOC domain.Experience in implementing at least one end-to-end SIEM implementation, including but not limited to use cases documentation, design, defining architecture, development, testing, deployment, and post deployment support.Basic understanding of Azure platformExperience on Azure Sentinel basicsFlexibility in working in shiftsHave supported at least 1 Operations project which operates in 24X7 mode.

Posted 1 month ago

Apply

6 - 8 years

10 - 13 Lacs

Bengaluru

Work from Office

Naukri logo

5+ yrs Exp in Azure cloud infrastructure AZ -104/305 certified Infrastructure as Code - Terraform, Bicep/ARM Azure Compute Networking Kubernetes Azure PaaS services Azure Active Directory RBAC Security tools Powershell/Python CI/CD Sentinel Defender

Posted 1 month ago

Apply

2 - 5 years

0 Lacs

Mumbai Metropolitan Region

On-site

Linkedin logo

System Administrator Brennan. Where true performance thrives. At Brennan, we believe that how technology is delivered is every bit as important as what the technology is. We focus on creating real and relevant value for customers with solutions that fit their specific needs and always reflect their true interests. It’s a claim backed by our True Performance System - a way of working engineered to get us closer, and deliver better, for our customers and their actual experience of technology. Why join Brennan True performance for our customers starts with a true belief in our people. It’s why we’ve structured our business to help our teams, and their talents, shine bright. It's why we’ve created a workplace where people of all backgrounds, beliefs and experiences are welcomed and empowered. And it’s why we’ve built an organisation where real innovation makes a genuine impact and generates true rewards for our team members. True rewards In addition to competitive remuneration, Brennan offers extensive benefits, including: Training and certification bonuses Culture Awards that recognise excellence Brennan Daredevils - our annual, all-expenses paid trip awarded to our top performers and outstanding contributors Vibrant, fun social activities Discounted hardware and software An environment that embraces learning and development The Role To provide 1st, 2nd or 3rd level technical support to Brennan IT clients, engineers and staff, 1st level monitoring and technical support to Brennan IT clients and staff. To coordinate, collaborate and escalate incidents within stipulated timelines, maintain existing cloud/infrastructure services and ensure that environment runs in an optimal way. and Continuously Improve the Efficiency and Excellence of Service Delivery as Measured by Client facing Surveys and Ratings in every department you are part of. 2-5 yrs minimum experience in Windows Server Administration / System Administration / Wintel Administration / Hyper V Administration / IT Technical Support role/ for international clients, preferably in Managed Services IT provider / IT Companies. Role Responsibilities Maintaining/contributing to KMS for client and internal team, for both technical & processesServer monitoring using SCOM, N-ABLE, Logic Monitor, Basic Intune / SCCM configurationsUnderstanding of O365, Mimecast, Intune, Azure integrationVendor Management (hardware and Software vendors - HP, Dell, MS, VM, Citrix and others)Storage understanding NAS, SAN e.g., data domain, IBM, Netapp, Hitachi, Fujitsu, HP 3parAdministration of Windows Server, groups, group policies, DNS, DHCPUnderstanding of backups, replications for Veeam, Symantec, Zetro, CommvaultOn premises backup alert management, monitoring and restorationSSL certificate renewal and installation on various roles (IIS, ADFS, ADC-Netscaler, Apache, SQL Reporting Services, WAS, Load Balancers)Smooth and timely customer engagementDisk, CPU, Snapshot management provisioningMonitor, manage experience with ESXI/Hyper-V hosts, Nutanix, Dell, HP SimpliVityManage understand Failover Cluster, NLBCitrix/RDS/WVD knowledge with application publishing, upgrading, managing securelyManage windows update compliance.Antivirus Management, Sophos, Defender.Patching ESXi hosts and vCenter updatesKnowledge of vulnerability management and critical remediationChange management, performing RCA and able to clearly articulate the actions/outcomes Key Competencies and Qualifications required Knowledge of as many more technologies like VMware, Windows Hypervisors, Azure Administrations, O365, Mimecast, SQL Administration, Windows Administration.Should have experience in VM Deployment, VM Migration, managing host clustersExtremely high-level attention to detail with methodical troubleshooting processGood verbal and written communication skillsMust have knowledge of Storage technologies like HP, IBM, Dell, Cisco servers, O365, Azure Administration)Proactive vs Reactive approachITIL Service Management Foundation accreditation Essential Skills Windows Server including 2016/2019, DNS, DHCP, Group PolicyActive Directory 2012 and aboveVMware / Virtualization (Hyper - V, VMware)O365, Azure Administration Desired Skills Exposure to Backup tools like Veeam/Commvault/Backup execWindows Administration certifications 2012 and aboveExposure to SAN /NASMS Azure and Office 365 AdministrationSymantec Endpoint or McAfee or Sophos or Sentinel One or CrowdStrikeExposure to Blade servers and configurationsITIL Foundation and ServiceNow ITSM tool Brennan is an equal opportunity employer

Posted 1 month ago

Apply

0 - 10 years

0 Lacs

Bengaluru, Karnataka

Remote

Indeed logo

Company Description Bosch Global Software Technologies Private Limited is a 100% owned subsidiary of Robert Bosch GmbH, one of the world's leading global supplier of technology and services, offering end-to-end Engineering, IT and Business Solutions. With over 28,200+ associates, it’s the largest software development center of Bosch, outside Germany, indicating that it is the Technology Powerhouse of Bosch in India with a global footprint and presence in the US, Europe and the Asia Pacific region. Job Description Work Experience Requirements: Lead or support the rollout of Microsoft 365 services across the organization. Act as the SME for all digital workspace components including Microsoft 365, virtual desktops (Citrix/VMware/Azure Virtual Desktop), endpoint management (Intune/Config Manager), and collaboration tools. Define and implement the digital workspace architecture and roadmap aligned with business and IT strategies. Provide expert-level guidance for the integration, configuration, and support of digital workspace platforms. Lead or support projects related to Microsoft 365 rollouts, device management, VDI deployments, and remote work enablement. Work closely with infrastructure, security, and service desk teams to ensure successful solution delivery. Evaluate and recommend digital tools and enhancements based on business needs. Oversee performance monitoring, incident resolution, and change management for digital workspace systems. Define policies for access, device security, data protection, and usage in coordination with cybersecurity teams. Perform regular assessments and health checks of workspace technologies to improve reliability and user experience. Advocate for the end-user by ensuring solutions are intuitive, reliable, and supported by proper training and documentation. Collaborate with internal teams to improve user adoption and digital literacy. Analyze user feedback and usage analytics to optimize the digital environment. Plan and execute M365 migration projects (e.g., Exchange to Exchange Online, file shares to OneDrive/SharePoint). Coordinate with vendors and stakeholders for successful deployment. Configure and manage M365 components, including Exchange Online, Teams, SharePoint Online, Intune, Azure AD, and Defender for M365. Maintain and monitor day-to-day operations of the Microsoft 365 environment. Manage users, licenses, roles, and groups in Microsoft 365 Admin Center and Azure AD. Configure policies and compliance settings using Microsoft Purview and Security & Compliance Center. Handle escalated support issues, troubleshooting and resolving service-related incidents. Monitor service health, performance, and ensure system availability. Implement and manage data loss prevention (DLP), multi-factor authentication (MFA), conditional access policies, and other security features. Work with IT Security teams to ensure compliance with organizational and industry standards. Develop documentation, guides, and training material for end-users. Conduct training sessions to drive adoption of M365 collaboration tools. Provide guidance on best practices and efficient use of Microsoft 365 apps. Required Qualifications Bachelor’s degree in computer science, Information Technology, or related field. 8-10 years of experience with Microsoft 365 implementation and administration. Deep expertise in Microsoft 365 (Teams, SharePoint, OneDrive, Exchange Online), Intune, Azure AD, and endpoint lifecycle management. Experience with VDI technologies (Citrix, VMware Horizon, or AVD). Proficient in PowerShell scripting and automation. In-depth knowledge of Microsoft 365 platform, including Exchange Online, SharePoint Online, Teams, OneDrive, Intune, and Azure AD. Experience with PowerShell scripting for automation and administration. Familiarity with M365 licensing, service management, and support models. Preferred Qualifications Microsoft certifications (MS-102, MS-700, MS-500, AZ-104, MD-102). Experience with hybrid environments and on-premises AD synchronization (AAD Connect). Knowledge of Microsoft Defender for Endpoint, Purview, or Microsoft Sentinel. Knowledge of Zero Trust, Conditional Access, and endpoint security policies. Experience with mobile device management (MDM) and bring-your-own-device (BYOD) strategies. Understanding of ITIL or service management processes. Qualifications Educational qualification: BE, BTech, BCA, BSc (IT) MCA, MBA (IT) and MSc(IT)

Posted 1 month ago

Apply

0 years

0 Lacs

Bengaluru, Karnataka

Work from Office

Indeed logo

Required Skills Technology | Sentinel SIEM Tool Expert | Level 3 Support Technology | Securonix SIEM Tools Expert | Level 3 Support Technology | ArcSight SIEM Tools Administrator | Level 2 Support Technology | Cybersecurity General Administrator | Level 2 Support Technology | Network Traffic Analysis Administrator | Level 2 Support Education Qualification : Engineer - B.E / B.Tech / MCA Certification Mandatory / Desirable : Technology | CompTIA Security+/Certified SOC Analyst (CSA)/GIAC Security Essentials (GSEC)/Certified Ethical Hacker (CEH)/Cisco Certified CyberOps Associate/GIAC Certified Incident Handler (GCIH)/GIAC Security Operations Certified (GSOC) Delivery Skills required are: - Technical Expertise: - Expert knowledge of threat detection techniques and tools. Leading incident response efforts, including advanced techniques for containment, eradication, and recovery. Conducting in-depth digital forensics investigations. Expertise in configuring and optimizing SIEM (Security Information and Event Management) systems. Analytical Skills: - Deep understanding of log analysis techniques and tools. Identifying patterns and anomalies in large datasets. Integrating threat intelligence into monitoring and response processes. Staying updated on the latest threat intelligence and applying it to enhance security. Collaboration and Coordination: - Working closely with other IT and security teams to ensure comprehensive security coverage. Leading the coordination of response efforts during major incidents. Ensuring effective communication and collaboration among all stakeholders. Coordinating with external partners and vendors for specialized support. Continuous Improvement: - Continuously evaluating and improving security processes and procedures. Implementing lessons learned from incidents to enhance the overall security posture. Contributing to the development and updating of security policies and procedures.

Posted 1 month ago

Apply

6 - 11 years

10 - 15 Lacs

Pune, Mysore, Bengaluru

Hybrid

Naukri logo

Role & responsibilities SOC Automation Managing and operating Microsoft Sentinel Log Source Onboarding : Onboard and troubleshoot log sources (on-premises and cloud) to the Sentinel platform using syslog, APIs, and other mechanisms. Ensure data integrity, reliability, and proper formatting. Log Management : Hands-on experience with log collection, parsing, and analysis from various sources (e.g., firewalls, endpoints, cloud environments). Strong defensive mindset with understanding of security events of interest for building detection rules Good in query languages like KQL. Advanced threat intelligence with the help of kusto query language (KQL). Should have advanced knowledge on use case creation, parser development DevOps Knowledge : Understanding of DevOps practices such as CICD pipelines, GIT, ARM templates, and Azure Automation for streamlining processes. Creation of automation rules.Use of threat intelligence in Azure sentinel. Implement and optimize security controls in cloud environments ( AWS, Azure, GCP), enforcing security-as-code principles and compliance automation . Experience in working with SOAR tools Sentinel SOAR Experience with programming (preferably Javascript, Python, REST API), automation or machine learning SIEM Migration : Proven experience in SIEM migration projects and transitioning between platforms will be advantage. Good command of the English language, both written and verbally Apply here: https://career.infosys.com/jobdesc?jobReferenceCode=INFSYS-EXTERNAL-210438

Posted 2 months ago

Apply

7 - 9 years

15 - 20 Lacs

Mohali

Work from Office

Naukri logo

Role & responsibilities SOC Operations: Monitor and analyze security events across networks, systems, and endpoints. Investigate, escalate, and respond to security incidents in a timely manner. Collaborate with the SOC team to enhance incident response procedures. Microsoft Security Solutions: Manage and maintain Microsoft Defender suite of tools, Azure Sentinel, and Microsoft Services. Implement Microsoft security configurations and policies to protect digital environments. Conduct threat hunting and data analysis using Microsoft Sentinel, KQL, and other Microsoft tools. Ensure compliance with security standards and best practices within Microsoft environments. Threat Detection and Incident Response: Conduct root cause analysis for security incidents and create actionable remediation plans. Support threat intelligence and vulnerability management programs to proactively reduce risk. Automate response and remediation workflows using Microsofts security automation tools. Security Engineering and Improvements: Develop and fine-tune security alerts and rules to improve threat detection. Collaborate with cross-functional teams to assess and improve security architecture. Assist in the design and implementation of secure cloud and hybrid environments with a focus on Microsoft platforms. Documentation and Reporting: Maintain up-to-date documentation of security procedures and incident reports. Generate reports on security incidents, SOC performance, and security posture improvements. Provide recommendations to improve security operations and incident response Preferred candidate profile 7+ years of professional experience in Security Operations Centre (SOC) or 5+ years of experience cybersecurity engineering role Strong hands-on experience with Microsoft security products, including: Microsoft Defender for Endpoint, Azure Sentinel, and Microsoft 365 Defender. Knowledge of Kusto Query Language (KQL) for threat hunting and data analysis. Familiarity with Microsoft security compliance frameworks and configurations. Act as an escalation point for high and critical severity security incidents and conduct thorough investigations to determine potential impact and understand extend of compromise. Practical knowledge of SIEM platforms, preferably Azure Sentinel, and incident response processes. Hunt for Indicators of Compromise (IOCs) and signs of Advanced Persistent Threats (APTs) within the Clients environment. Analyse attack patterns, Tools, Techniques and Procedures (TTPs) to identify methods of attacks and attack life cycle. Experience with a variety of security technologies, including firewalls, intrusion detection systems, EDR, XDR, SASE, SSE, Email Security Gateways, IDAM, and vulnerability scanners Experience with security best practices, including incident response, risk assessments, and security controls. Strong analytical and problem-solving skills with the ability to work in a fast-paced environment. Perks and benefits Perks and benefits Oreta takes pride in providing a service of excellence to our customers and looking after our employees who enable our business to succeed. The successful applicant will enjoy working in a collaborative environment in Chandigarh, India with a friendly and highly driven people (the Oreos), where ideas are always welcome and ongoing training and development is strongly encouraged. The renumeration will be negotiated and based on the relevant skills and experience of the successful applicant. If you are interested in a long-term career with potential to develop and grow with the business and are available to start immediately, then we look forward to hearing from you.

Posted 2 months ago

Apply

10 - 15 years

30 - 37 Lacs

Mohali

Work from Office

Naukri logo

We are seeking a highly experienced and motivated Senior SOC Manager to lead our Security Operations Center (SOC) team. The Senior SOC Manager will be responsible for managing the day-to-day operations of the SOC, overseeing security monitoring, incident response, threat intelligence activities, and ensuring the organisation's information assets are protected. The ideal candidate will have a strong background in cybersecurity operations, team leadership, and incident management, with a strategic mindset and the ability to drive continuous improvement. Role & responsibilities 1. Leadership and Management: Team Leadership : Lead, mentor, Build and manage a team of SOC analysts, incident responders, and threat hunters. Foster a culture of continuous improvement, accountability, and professional development within the SOC team. Conduct regular performance reviews and provide constructive feedback to team members. Operational Management : Develop and maintain SOC processes, procedures, and documentation to ensure efficient and effective operations. Ensure the SOC team operates 24/7, providing continuous coverage for security monitoring and incident response. Coordinate shift schedules, resource allocation, and ensure adequate staffing levels. Monitoring and Detection : Oversee the monitoring of security events and alerts generated by various security tools and technologies. Ensure the timely identification, analysis, and escalation of potential security incidents. Develop and fine-tune detection rules, signatures, and use cases to enhance threat detection capabilities. Incident Response : Coordinate and manage the end-to-end incident response process, including detection, analysis, containment, eradication, and recovery. Develop, implement, and maintain incident response playbooks, runbooks, and standard operating procedures (SOPs). Lead post-incident reviews, including root cause analysis and lessons learned, to improve incident response processes. Threat Intelligence Integration : Ensure the SOC team stays up-to-date with the latest threat intelligence and cyber threat landscape. Integrate threat intelligence into SOC operations to enhance detection and response capabilities. Collaborate with threat intelligence analysts to gather, analyse, and disseminate actionable intelligence. Threat Hunting : Develop and lead proactive threat hunting activities to identify and mitigate potential threats before they impact the organisation. Utilise advanced analytical and forensic tools to uncover hidden threats and malicious activities. Internal Collaboration : Work closely with other IT and security teams to ensure seamless integration of security operations. Collaborate with the IT infrastructure team to ensure security controls are properly implemented and maintained. Engage with application development teams to ensure secure coding practices and application security measures. Stakeholder Communication : Communicate effectively with senior management, providing regular updates on SOC activities, incidents, and overall security posture. Develop and deliver regular SOC performance and incident reports to leadership. Serve as the primary point of contact for escalated security incidents and external communications. Process Enhancement : Identify areas for improvement within the SOC and implement enhancements to processes, tools, and technologies. Conduct regular SOC assessments and readiness exercises to ensure operational effectiveness. Stay informed about the latest security trends, technologies, and best practices. Metrics and Reporting : Develop and track key performance indicators (KPIs) and metrics to measure the effectiveness and efficiency of SOC operations. Provide detailed reporting on SOC activities, incidents, and trends to senior management and other stakeholders. Monthly CISO reports Regulatory Compliance : Ensure SOC operations comply with relevant regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI-DSS). Support audit activities and provide necessary documentation and evidence for compliance audits. Collaborate with the compliance team to address regulatory changes and ensure ongoing compliance. Employee Training : Develop and deliver regular cybersecurity training programs for SOC staff to enhance their skills and knowledge. Promote security awareness and best practices across the organisation through training and awareness programs. Conduct phishing simulations and other awareness activities to test and improve employee readiness. Professional Development : Encourage SOC team members to pursue relevant certifications and professional development opportunities. Provide guidance and support for career development and advancement within the SOC team. Education and Experience: Education : Bachelor's degree in Computer Science, Information Security, or a related field. Advanced degree preferred. Relevant certifications such as CISSP, CISM, GIAC, or equivalent are highly desirable. Experience : A minimum of 10-12 years of experience in cybersecurity, with at least 7-8 years in a SOC management or leadership role. Proven track record of managing and leading high-performing security teams in a dynamic and fast-paced environment. Security Operations : Strong understanding of security monitoring and incident response processes and technologies. Experience with SIEM platforms (e.g., Splunk, ArcSight, QRadar) and other security tools. Knowledge of threat intelligence and analysis methodologies. Technical Expertise : Familiarity with regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI-DSS). Proficiency in using advanced analytical and forensic tools for threat detection and incident analysis. Understanding of network security, endpoint security, application security, and cloud security principles. Leadership and Management : Excellent leadership, team management, and mentoring skills. Strong analytical and problem-solving abilities. Effective communication and interpersonal skills, with the ability to interact with technical and non-technical stakeholders. Strategic Thinking : Ability to think strategically and develop long-term plans for improving SOC operations and overall security posture. Demonstrated ability to drive continuous improvement and foster a culture of innovation. This position may require occasional on-call support and the ability to respond to security incidents outside of regular business hours. Hybrid work environment with a combination of on-site and remote work. Perks and Benefits Perks and benefits Oreta takes pride in providing a service of excellence to our customers and looking after our employees who enable our business to succeed. The successful applicant will enjoy working in a collaborative environment in Chandigarh, India with a friendly and highly driven people (the Oreos), where ideas are always welcome and ongoing training and development is strongly encouraged. The renumeration will be negotiated and based on the relevant skills and experience of the successful applicant. If you are interested in a long-term career with potential to develop and grow with the business and are available to start immediately, then we look forward to hearing from you.

Posted 2 months ago

Apply

10 - 12 years

30 - 35 Lacs

Mohali

Work from Office

Naukri logo

Job description We are seeking a highly experienced and motivated Senior SOC Manager to lead our Security Operations Center (SOC) team. The Senior SOC Manager will be responsible for managing the day-to-day operations of the SOC, overseeing security monitoring, incident response, threat intelligence activities, and ensuring the organisation's information assets are protected. The ideal candidate will have a strong background in cybersecurity operations, team leadership, and incident management, with a strategic mindset and the ability to drive continuous improvement. Role & responsibilities Lead the analysis and investigation of information security events (IDS/DLP/SIEM/etc.) in a 24x7 SOC environment to immediately detect, verify, and respond swiftly to cyber threats, and remove false positive. Serve as a technical point of escalation. Responsible for investigating incidents, analysing attack methods, researching new defence techniques and tools, developing security policy, and documenting procedures for SOC. Maintain baselines for secure configuration and operations. Malware analysis and other attack analysis to extract indicators of compromise. Perform data security event correlation between various systems. Prepare reports, summaries, and other forms of communication that may be both internal and client facing. Ensure compliance to SLA, process adherence and process improvisation to achieve operational objectives. Develop and deploy processes to ensure efficient and effective security operations. Provide guidance and mentorship to other security analysts and junior members of the security team. Keep up-to-date with the latest trends and best practice developments in the field of cybersecurity and SIEM tools Values And Behaiviours Have Fun We take time and effort to make the workplace more enjoyable, we reward and celebrate success, our customers and partners see us as human. Move with Velocity We evolve and grow to stay ahead of the curve, we make decisions quickly and often, we are decisive and show initiative, we are outcome oriented and we question everything to determine what speeds or impedes the desired outcome. Go Further We go beyond delivering what works, we discover delights and help customers transform their business, we have a passion for learning, we have a desire to question the norms, and we are curious to step out of our comfort zones. Thrive Together We are high functioning, supportive and inclusive, collaboration is in our DNA, we step up to assist our team members, and we work as a team to achieve the right outcome. Skills and Capabilities At least 7 years of experience working in a SOC environment, with a focus on using multiple SIEM tools. Strong understanding of security operations and incident response processes Hands-on experience with at least two major SIEM tools (e.g., MS Sentinel Rapid7, Exabeam Splunk, ArcSight, QRadar,) Strong analytical and problem-solving skills Excellent communication and interpersonal skills Ability to work in a fast-paced, dynamic environment Qualifications B-Tech

Posted 2 months ago

Apply

4 - 9 years

12 - 16 Lacs

Mohali

Hybrid

Naukri logo

About Role: Are you passionate about technology and keen on being part of a dynamic team at the forefront of cloud and platform engineering? Oreta, a leading Australian organization, is looking for a talented Cloud/Platform Engineer/System Engineer (L2) to join our innovative team based in Chandigarh/Mohali- India . In this role, youll work with cutting-edge tools and technologies, solving complex problems, and delivering exceptional IT solutions for our clients. You'll be empowered to learn, thrive, and grow in a collaborative environment that values innovation and teamwork. The successful candidate will need to be able to handle a broad range of technical and customer service challenges, while working collaboratively with other teams to ensure the highest level of service quality and customer satisfaction. Responsibilities Assist in the design, implementation, and maintenance of our platform and cloud infrastructure. Collaborate with cross-functional teams to troubleshoot and resolve technical issues. Conduct triage on incidents, ensuring prompt identification and resolution of problems. Monitor and optimize system performance, ensuring high availability and scalability. Participate in the development and implementation of new features and enhancements. Provide second-level technical support to customers via phone, email, and chat, ensuring timely resolution of customer issues. Attain a high percentage of First Call Resolution tickets. Manage service levels (SLAs), monitor response times, and escalate issues as needed to meet service level objectives. Create and maintain Knowledge Base Articles (KBAs) to improve the resolution time of common issues. Document all customer interactions accurately and thoroughly in our service desk ticketing system. Follow established procedures and protocols for troubleshooting and resolving customer issues. Actively participate in team meetings and training sessions to stay up to date on new products and services. Identify opportunities to improve processes and procedures, and work with management to implement changes. Maintain a positive, customer-focused attitude at all times, even in challenging situations. Work collaboratively with other team members and support teams to ensure the highest level of customer service and technical support. Monitor and respond to alerts generated by monitoring systems, ensuring timely resolution of any issues. Provide proactive updates to customers on the status of their tickets and follow up with them as needed to ensure their issues are fully resolved. Identify trends and patterns in customer issues, and work with support teams to address underlying issues and improve overall service quality. May be required to participate in on-call rotations to provide after-hours support to customers as needed on occasion. Contribute to process improvement initiatives, and work with management to implement changes to improve service quality and efficiency. Provide training and mentoring to junior team members to help them develop their technical skills and provide high-quality customer service. Maintain a high level of professionalism and positive attitude and always represent the organization in a positive and professional manner. Participate in incident response and problem management activities, working closely with other teams to investigate and resolve complex technical issues. Configure and troubleshoot hardware devices and provide technical support to users. Essential Criteria Bachelors degree in computer science or related field Minimum 2 years in Server Administration environment Proven experience in triage, with the ability to quickly identify and resolve technical issues. Solid understanding of cloud platforms such as AWS, Azure, or Google Cloud. Experience with troubleshooting and technical support the following technologies Technical expertise and experience supporting Server infrastructure; Private Cloud / Public Cloud IaaS, PaaS, Hypervisors, Microsoft Server Operating System, Linux, End User / Modern Workplace Management and support; Microsoft Intune (EndPoint Manager), Windows / MAC Operating Systems, Office 365, Common off the Shelf Software (COTS) Server Platforms / Applications; Microsoft Exchange Server, Microsoft SQL Server, Azure Virtual Desktop, Citrix Server Strong customer service skills, with the ability to communicate technical information to non-technical customers Understanding of Service Desk processes and ideally ticketing systems (e.g. ConnectWise) Strong problem-solving and troubleshooting skills Ability to work independently and as part of a team Excellent communication and interpersonal skills Flexible schedule, with the ability to work evenings, weekends, and holidays as needed - rotating roster Ability to multitask and prioritize in a fast-paced environment Strong team player, with the ability to work collaboratively with other team members and support teams Benefits and Perks Oreta takes pride in providing a service of excellence to our customers and looking after our employees who enable our business to succeed. The successful applicant will enjoy working in the Chandigarh highly driven team members (the Oreos), where ideas are always welcome and ongoing training and development is strongly encouraged. Employees are rewarded with monthly team events, Employee of the Month, just to name a few of the perks.

Posted 2 months ago

Apply

6 - 8 years

17 - 20 Lacs

Mohali

Work from Office

Naukri logo

About Role: Are you passionate about technology and keen on being part of a dynamic team at the forefront of cloud and platform engineering? Oreta, a leading Australian organization, is looking for a talented Cloud/Platform Engineer/System Engineer (L2) to join our innovative team based in Chandigarh/Mohali- India . In this role, youll work with cutting-edge tools and technologies, solving complex problems, and delivering exceptional IT solutions for our clients. You'll be empowered to learn, thrive, and grow in a collaborative environment that values innovation and teamwork. The successful candidate will need to be able to handle a broad range of technical and customer service challenges, while working collaboratively with other teams to ensure the highest level of service quality and customer satisfaction. Responsibilities Assist in the design, implementation, and maintenance of our platform and cloud infrastructure. Collaborate with cross-functional teams to troubleshoot and resolve technical issues. Conduct triage on incidents, ensuring prompt identification and resolution of problems. Monitor and optimize system performance, ensuring high availability and scalability. Participate in the development and implementation of new features and enhancements. Provide second-level technical support to customers via phone, email, and chat, ensuring timely resolution of customer issues. Attain a high percentage of First Call Resolution tickets. Manage service levels (SLAs), monitor response times, and escalate issues as needed to meet service level objectives. Create and maintain Knowledge Base Articles (KBAs) to improve the resolution time of common issues. Document all customer interactions accurately and thoroughly in our service desk ticketing system. Follow established procedures and protocols for troubleshooting and resolving customer issues. Actively participate in team meetings and training sessions to stay up to date on new products and services. Identify opportunities to improve processes and procedures, and work with management to implement changes. Maintain a positive, customer-focused attitude at all times, even in challenging situations. Work collaboratively with other team members and support teams to ensure the highest level of customer service and technical support. Monitor and respond to alerts generated by monitoring systems, ensuring timely resolution of any issues. Provide proactive updates to customers on the status of their tickets and follow up with them as needed to ensure their issues are fully resolved. Identify trends and patterns in customer issues, and work with support teams to address underlying issues and improve overall service quality. May be required to participate in on-call rotations to provide after-hours support to customers as needed on occasion. Contribute to process improvement initiatives, and work with management to implement changes to improve service quality and efficiency. Provide training and mentoring to junior team members to help them develop their technical skills and provide high-quality customer service. Maintain a high level of professionalism and positive attitude and always represent the organization in a positive and professional manner. Participate in incident response and problem management activities, working closely with other teams to investigate and resolve complex technical issues. Configure and troubleshoot hardware devices and provide technical support to users. Essential Criteria Bachelors degree in computer science or related field Minimum 2 years in Server Administration environment Proven experience in triage, with the ability to quickly identify and resolve technical issues. Solid understanding of cloud platforms such as AWS, Azure, or Google Cloud. Experience with troubleshooting and technical support the following technologies Technical expertise and experience supporting Server infrastructure; Private Cloud / Public Cloud IaaS, PaaS, Hypervisors, Microsoft Server Operating System, Linux, End User / Modern Workplace Management and support; Microsoft Intune (EndPoint Manager), Windows / MAC Operating Systems, Office 365, Common off the Shelf Software (COTS) Server Platforms / Applications; Microsoft Exchange Server, Microsoft SQL Server, Azure Virtual Desktop, Citrix Server Strong customer service skills, with the ability to communicate technical information to non-technical customers Understanding of Service Desk processes and ideally ticketing systems (e.g. ConnectWise) Strong problem-solving and troubleshooting skills Ability to work independently and as part of a team Excellent communication and interpersonal skills Flexible schedule, with the ability to work evenings, weekends, and holidays as needed - rotating roster Ability to multitask and prioritize in a fast-paced environment Strong team player, with the ability to work collaboratively with other team members and support teams Benefits and Perks Oreta takes pride in providing a service of excellence to our customers and looking after our employees who enable our business to succeed. The successful applicant will enjoy working in the Chandigarh highly driven team members (the Oreos), where ideas are always welcome and ongoing training and development is strongly encouraged. Employees are rewarded with monthly team events, Employee of the Month, just to name a few of the perks.

Posted 2 months ago

Apply

15 - 22 years

35 - 55 Lacs

Chandigarh

Work from Office

Naukri logo

Preference : Experience working with BIG4 or CMMi level 5 organisations. As the Head of Security Operations and Architecture you will be responsible for leading and managing all aspects of our organisations security infrastructure, systems, and processes. This role requires a strong background in security architecture, excellent leadership and communication skills, and a deep understanding of security best practices. Role & responsibilities Develop and implement a comprehensive security architecture strategy that aligns with the organisations goals and objectives. Lead the design, implementation, and maintenance of security systems and solutions to protect the organizations information assets and infrastructure. Collaborate with cross-functional teams to identify security requirements and ensure that security measures are integrated into the design and development of new systems and applications. Conduct regular security assessments and audits to identify vulnerabilities and recommend appropriate remediation actions. Stay up-to-date with the latest security threats, vulnerabilities, and industry trends, and provide guidance and recommendations to mitigate risks. Develop and implement security policies, procedures, and standards to ensure compliance with relevant regulations and industry best practices. Manage and oversee security incident response activities, including investigations, documentation, and resolution. Provide leadership and guidance to the security team, including training, mentoring, and performance evaluations. Collaborate with internal stakeholders and external partners to ensure effective security governance and risk management. Foster a culture of security awareness and continuous improvement within the organization. Preferred candidate profile Bachelors degree in a related field or equivalent work experience. Proven experience in security architecture, preferably in a leadership or managerial role. Strong knowledge of security principles, practices, and technologies. Excellent leadership and communication skills, with the ability to effectively collaborate with cross-functional teams and senior executives. Strong analytical and problem-solving skills, with the ability to make sound decisions in complex and high-pressure situations. In-depth understanding of security frameworks, standards, and regulations (e.g., ISO 27001, NIST, GDPR). Professional certifications such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM) are highly desirable. Experience with cloud security architecture and best practices is a plus. Strong project and time management skills, with the ability to prioritize and manage multiple initiatives simultaneously. Knowledge and understanding of cyber security standards, processes, policies and metrics (encompassing network security, application security and data security). Understanding of industry best practices for security architecture frameworks, tools, standards and guidelines. Understanding of cyber security principles and security layers. Familiarity with SABSA, TOGAF, NIST 800-53, Open FAIR, MITRE ATT&CK/D3FEND, threat modelling and related methodologies or frameworks CISSP, CISM, CCSK or other related certifications Experience in a number of security technologies and vendors covering: Palo Alto Networks, Proofpoint, Netskope, Zscaler, Tenable, Rapid7, Qualys, SentinelOne, CrowdStrike, Microsoft Experience working in an Agile environment Identity and Access Management Identity Governance: Cloud security across AWS/Azure and google cloud Strong ambition and ability to develop and expand cyber security services and product support. Outstanding interpersonal skills and the capacity to develop and maintain excellent working relationships with customers, stakeholders and vendors. Excellent presentation skills focusing on technical presales and solutions Strong troubleshooting skills and analytical abilities in reviewing, diagnosing and resolving complex networking problems. Strong documentation skills to develop customer facing technical and advisory documents Prior experience working across the integration of Digital and Cloud based Technology. Extensive experience in understanding and mapping out end-to-end Architecture. Experienced in Designing solutions, system and software architecture according to business strategies and architecture standards/processes. Proven track record in analysing business requirements and determining appropriate solutions to these requirements based on business needs. Ability to resolve moderate and highly complex problems and issues in solution architectures and assess potential risks with the ability to determine solutions to these risks Understanding of technologies: CASB, Web Filtering, Attack Surface Reduction, EDR, Network segmentation Strong understanding of Zero Trust architecture and concepts Ability to analyse complex technology problems and able to find secure solutions without loosing sight of business requirements Experience with security engineering, infrastructure-as-code, CI/CD, automation, and application development desirable Experience with cloud security technologies desirable Perks and benefits Oreta takes pride in providing a service of excellence to our customers and looking after our employees who enable our business to succeed. Enjoy working with a friendly and highly driven team (the Oreos), where ideas are always welcome and ongoing learning and development is strongly encouraged. Our people are rewarded with monthly team events and, learning sponsorship and many rewards & awards. The remuneration will be negotiated based on relevant skills and experience If you are interested in a long-term career with potential to develop and grow with the business and are available to start immediately, then we look forward to hearing from you . For more information visit our webpage: www.oreta.com.au

Posted 2 months ago

Apply

10 - 15 years

25 - 40 Lacs

Chandigarh

Work from Office

Naukri logo

We are seeking a highly experienced and motivated Senior SOC Manager to lead our Security Operations Center (SOC) team. The Senior SOC Manager will be responsible for managing the day-to-day operations of the SOC, overseeing security monitoring, incident response, threat intelligence activities, and ensuring the organisation's information assets are protected. The ideal candidate will have a strong background in cybersecurity operations, team leadership, and incident management, with a strategic mindset and the ability to drive continuous improvement. Role & responsibilities 1. Leadership and Management: Team Leadership : Lead, mentor, Build and manage a team of SOC analysts, incident responders, and threat hunters. Foster a culture of continuous improvement, accountability, and professional development within the SOC team. Conduct regular performance reviews and provide constructive feedback to team members. Operational Management : Develop and maintain SOC processes, procedures, and documentation to ensure efficient and effective operations. Ensure the SOC team operates 24/7, providing continuous coverage for security monitoring and incident response. Coordinate shift schedules, resource allocation, and ensure adequate staffing levels. 2. Security Monitoring and Incident Response: Monitoring and Detection : Oversee the monitoring of security events and alerts generated by various security tools and technologies. Ensure the timely identification, analysis, and escalation of potential security incidents. Develop and fine-tune detection rules, signatures, and use cases to enhance threat detection capabilities. Incident Response : Coordinate and manage the end-to-end incident response process, including detection, analysis, containment, eradication, and recovery. Develop, implement, and maintain incident response playbooks, runbooks, and standard operating procedures (SOPs). Lead post-incident reviews, including root cause analysis and lessons learned, to improve incident response processes. 3. Threat Intelligence and Analysis: Threat Intelligence Integration : Ensure the SOC team stays up-to-date with the latest threat intelligence and cyber threat landscape. Integrate threat intelligence into SOC operations to enhance detection and response capabilities. Collaborate with threat intelligence analysts to gather, analyse, and disseminate actionable intelligence. Threat Hunting : Develop and lead proactive threat hunting activities to identify and mitigate potential threats before they impact the organisation. Utilise advanced analytical and forensic tools to uncover hidden threats and malicious activities. 4. Collaboration and Communication: Internal Collaboration : Work closely with other IT and security teams to ensure seamless integration of security operations. Collaborate with the IT infrastructure team to ensure security controls are properly implemented and maintained. Engage with application development teams to ensure secure coding practices and application security measures. Stakeholder Communication : Communicate effectively with senior management, providing regular updates on SOC activities, incidents, and overall security posture. Develop and deliver regular SOC performance and incident reports to leadership. Serve as the primary point of contact for escalated security incidents and external communications. 5. Continuous Improvement: Process Enhancement : Identify areas for improvement within the SOC and implement enhancements to processes, tools, and technologies. Conduct regular SOC assessments and readiness exercises to ensure operational effectiveness. Stay informed about the latest security trends, technologies, and best practices. Metrics and Reporting : Develop and track key performance indicators (KPIs) and metrics to measure the effectiveness and efficiency of SOC operations. Provide detailed reporting on SOC activities, incidents, and trends to senior management and other stakeholders. Monthly CISO reports 6. Compliance and Audit: Regulatory Compliance : Ensure SOC operations comply with relevant regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI-DSS). Support audit activities and provide necessary documentation and evidence for compliance audits. Collaborate with the compliance team to address regulatory changes and ensure ongoing compliance. 7. Training and Awareness: Employee Training : Develop and deliver regular cybersecurity training programs for SOC staff to enhance their skills and knowledge. Promote security awareness and best practices across the organisation through training and awareness programs. Conduct phishing simulations and other awareness activities to test and improve employee readiness. Professional Development : Encourage SOC team members to pursue relevant certifications and professional development opportunities. Provide guidance and support for career development and advancement within the SOC team. Preferred candidate profile Education and Experience: Education : Bachelor's degree in Computer Science, Information Security, or a related field. Advanced degree preferred. Relevant certifications such as CISSP, CISM, GIAC, or equivalent are highly desirable. Experience : A minimum of 10-12 years of experience in cybersecurity, with at least 7-8 years in a SOC management or leadership role. Proven track record of managing and leading high-performing security teams in a dynamic and fast-paced environment. Technical Skills: Security Operations : Strong understanding of security monitoring and incident response processes and technologies. Experience with SIEM platforms (e.g., Splunk, ArcSight, QRadar) and other security tools. Knowledge of threat intelligence and analysis methodologies. Technical Expertise : Familiarity with regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI-DSS). Proficiency in using advanced analytical and forensic tools for threat detection and incident analysis. Understanding of network security, endpoint security, application security, and cloud security principles. Soft Skills: Leadership and Management : Excellent leadership, team management, and mentoring skills. Strong analytical and problem-solving abilities. Effective communication and interpersonal skills, with the ability to interact with technical and non-technical stakeholders. Strategic Thinking : Ability to think strategically and develop long-term plans for improving SOC operations and overall security posture. Demonstrated ability to drive continuous improvement and foster a culture of innovation. Work Environment: This position may require occasional on-call support and the ability to respond to security incidents outside of regular business hours. Hybrid work environment with a combination of on-site and remote work. Perks and benefits Oreta takes pride in providing a service of excellence to our customers and looking after our employees who enable our business to succeed. The successful applicant will enjoy working in a collaborative environment in Chandigarh, India with a friendly and highly driven people (the Oreos), where ideas are always welcome and ongoing training and development is strongly encouraged. The renumeration will be negotiated and based on the relevant skills and experience of the successful applicant. If you are interested in a long-term career with potential to develop and grow with the business and are available to start immediately, then we look forward to hearing from you.

Posted 2 months ago

Apply

7 - 9 years

15 - 20 Lacs

Chandigarh

Work from Office

Naukri logo

Role & responsibilities SOC Operations: Monitor and analyze security events across networks, systems, and endpoints. Investigate, escalate, and respond to security incidents in a timely manner. Collaborate with the SOC team to enhance incident response procedures. Microsoft Security Solutions: Manage and maintain Microsoft Defender suite of tools, Azure Sentinel, and Microsoft Services. Implement Microsoft security configurations and policies to protect digital environments. Conduct threat hunting and data analysis using Microsoft Sentinel, KQL, and other Microsoft tools. Ensure compliance with security standards and best practices within Microsoft environments. Threat Detection and Incident Response: Conduct root cause analysis for security incidents and create actionable remediation plans. Support threat intelligence and vulnerability management programs to proactively reduce risk. Automate response and remediation workflows using Microsofts security automation tools. Security Engineering and Improvements: Develop and fine-tune security alerts and rules to improve threat detection. Collaborate with cross-functional teams to assess and improve security architecture. Assist in the design and implementation of secure cloud and hybrid environments with a focus on Microsoft platforms. Documentation and Reporting: Maintain up-to-date documentation of security procedures and incident reports. Generate reports on security incidents, SOC performance, and security posture improvements. Provide recommendations to improve security operations and incident response Preferred candidate profile 7+ years of professional experience in Security Operations Centre (SOC) or 5+ years of experience cybersecurity engineering role Strong hands-on experience with Microsoft security products, including: Microsoft Defender for Endpoint, Azure Sentinel, and Microsoft 365 Defender. Knowledge of Kusto Query Language (KQL) for threat hunting and data analysis. Familiarity with Microsoft security compliance frameworks and configurations. Act as an escalation point for high and critical severity security incidents and conduct thorough investigations to determine potential impact and understand extend of compromise. Practical knowledge of SIEM platforms, preferably Azure Sentinel, and incident response processes. Hunt for Indicators of Compromise (IOCs) and signs of Advanced Persistent Threats (APTs) within the Clients environment. Analyse attack patterns, Tools, Techniques and Procedures (TTPs) to identify methods of attacks and attack life cycle. Experience with a variety of security technologies, including firewalls, intrusion detection systems, EDR, XDR, SASE, SSE, Email Security Gateways, IDAM, and vulnerability scanners Experience with security best practices, including incident response, risk assessments, and security controls. Strong analytical and problem-solving skills with the ability to work in a fast-paced environment. Perks and benefits Perks and benefits Oreta takes pride in providing a service of excellence to our customers and looking after our employees who enable our business to succeed. The successful applicant will enjoy working in a collaborative environment in Chandigarh, India with a friendly and highly driven people (the Oreos), where ideas are always welcome and ongoing training and development is strongly encouraged. The renumeration will be negotiated and based on the relevant skills and experience of the successful applicant. If you are interested in a long-term career with potential to develop and grow with the business and are available to start immediately, then we look forward to hearing from you.

Posted 2 months ago

Apply

10 - 15 years

30 - 37 Lacs

Chandigarh

Work from Office

Naukri logo

We are seeking a highly experienced and motivated Senior SOC Manager to lead our Security Operations Center (SOC) team. The Senior SOC Manager will be responsible for managing the day-to-day operations of the SOC, overseeing security monitoring, incident response, threat intelligence activities, and ensuring the organisation's information assets are protected. The ideal candidate will have a strong background in cybersecurity operations, team leadership, and incident management, with a strategic mindset and the ability to drive continuous improvement. Role & responsibilities 1. Leadership and Management: Team Leadership : Lead, mentor, Build and manage a team of SOC analysts, incident responders, and threat hunters. Foster a culture of continuous improvement, accountability, and professional development within the SOC team. Conduct regular performance reviews and provide constructive feedback to team members. Operational Management : Develop and maintain SOC processes, procedures, and documentation to ensure efficient and effective operations. Ensure the SOC team operates 24/7, providing continuous coverage for security monitoring and incident response. Coordinate shift schedules, resource allocation, and ensure adequate staffing levels. Monitoring and Detection : Oversee the monitoring of security events and alerts generated by various security tools and technologies. Ensure the timely identification, analysis, and escalation of potential security incidents. Develop and fine-tune detection rules, signatures, and use cases to enhance threat detection capabilities. Incident Response : Coordinate and manage the end-to-end incident response process, including detection, analysis, containment, eradication, and recovery. Develop, implement, and maintain incident response playbooks, runbooks, and standard operating procedures (SOPs). Lead post-incident reviews, including root cause analysis and lessons learned, to improve incident response processes. Threat Intelligence Integration : Ensure the SOC team stays up-to-date with the latest threat intelligence and cyber threat landscape. Integrate threat intelligence into SOC operations to enhance detection and response capabilities. Collaborate with threat intelligence analysts to gather, analyse, and disseminate actionable intelligence. Threat Hunting : Develop and lead proactive threat hunting activities to identify and mitigate potential threats before they impact the organisation. Utilise advanced analytical and forensic tools to uncover hidden threats and malicious activities. Internal Collaboration : Work closely with other IT and security teams to ensure seamless integration of security operations. Collaborate with the IT infrastructure team to ensure security controls are properly implemented and maintained. Engage with application development teams to ensure secure coding practices and application security measures. Stakeholder Communication : Communicate effectively with senior management, providing regular updates on SOC activities, incidents, and overall security posture. Develop and deliver regular SOC performance and incident reports to leadership. Serve as the primary point of contact for escalated security incidents and external communications. Process Enhancement : Identify areas for improvement within the SOC and implement enhancements to processes, tools, and technologies. Conduct regular SOC assessments and readiness exercises to ensure operational effectiveness. Stay informed about the latest security trends, technologies, and best practices. Metrics and Reporting : Develop and track key performance indicators (KPIs) and metrics to measure the effectiveness and efficiency of SOC operations. Provide detailed reporting on SOC activities, incidents, and trends to senior management and other stakeholders. Monthly CISO reports Regulatory Compliance : Ensure SOC operations comply with relevant regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI-DSS). Support audit activities and provide necessary documentation and evidence for compliance audits. Collaborate with the compliance team to address regulatory changes and ensure ongoing compliance. Employee Training : Develop and deliver regular cybersecurity training programs for SOC staff to enhance their skills and knowledge. Promote security awareness and best practices across the organisation through training and awareness programs. Conduct phishing simulations and other awareness activities to test and improve employee readiness. Professional Development : Encourage SOC team members to pursue relevant certifications and professional development opportunities. Provide guidance and support for career development and advancement within the SOC team. Education and Experience: Education : Bachelor's degree in Computer Science, Information Security, or a related field. Advanced degree preferred. Relevant certifications such as CISSP, CISM, GIAC, or equivalent are highly desirable. Experience : A minimum of 10-12 years of experience in cybersecurity, with at least 7-8 years in a SOC management or leadership role. Proven track record of managing and leading high-performing security teams in a dynamic and fast-paced environment. Security Operations : Strong understanding of security monitoring and incident response processes and technologies. Experience with SIEM platforms (e.g., Splunk, ArcSight, QRadar) and other security tools. Knowledge of threat intelligence and analysis methodologies. Technical Expertise : Familiarity with regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI-DSS). Proficiency in using advanced analytical and forensic tools for threat detection and incident analysis. Understanding of network security, endpoint security, application security, and cloud security principles. Leadership and Management : Excellent leadership, team management, and mentoring skills. Strong analytical and problem-solving abilities. Effective communication and interpersonal skills, with the ability to interact with technical and non-technical stakeholders. Strategic Thinking : Ability to think strategically and develop long-term plans for improving SOC operations and overall security posture. Demonstrated ability to drive continuous improvement and foster a culture of innovation. This position may require occasional on-call support and the ability to respond to security incidents outside of regular business hours. Hybrid work environment with a combination of on-site and remote work. Perks and Benefits Perks and benefits Oreta takes pride in providing a service of excellence to our customers and looking after our employees who enable our business to succeed. The successful applicant will enjoy working in a collaborative environment in Chandigarh, India with a friendly and highly driven people (the Oreos), where ideas are always welcome and ongoing training and development is strongly encouraged. The renumeration will be negotiated and based on the relevant skills and experience of the successful applicant. If you are interested in a long-term career with potential to develop and grow with the business and are available to start immediately, then we look forward to hearing from you.

Posted 2 months ago

Apply

10 - 12 years

30 - 35 Lacs

Chandigarh

Work from Office

Naukri logo

Job description We are seeking a highly experienced and motivated Senior SOC Manager to lead our Security Operations Center (SOC) team. The Senior SOC Manager will be responsible for managing the day-to-day operations of the SOC, overseeing security monitoring, incident response, threat intelligence activities, and ensuring the organisation's information assets are protected. The ideal candidate will have a strong background in cybersecurity operations, team leadership, and incident management, with a strategic mindset and the ability to drive continuous improvement. Role & responsibilities Lead the analysis and investigation of information security events (IDS/DLP/SIEM/etc.) in a 24x7 SOC environment to immediately detect, verify, and respond swiftly to cyber threats, and remove false positive. Serve as a technical point of escalation. Responsible for investigating incidents, analysing attack methods, researching new defence techniques and tools, developing security policy, and documenting procedures for SOC. Maintain baselines for secure configuration and operations. Malware analysis and other attack analysis to extract indicators of compromise. Perform data security event correlation between various systems. Prepare reports, summaries, and other forms of communication that may be both internal and client facing. Ensure compliance to SLA, process adherence and process improvisation to achieve operational objectives. Develop and deploy processes to ensure efficient and effective security operations. Provide guidance and mentorship to other security analysts and junior members of the security team. Keep up-to-date with the latest trends and best practice developments in the field of cybersecurity and SIEM tools Values And Behaiviours Have Fun We take time and effort to make the workplace more enjoyable, we reward and celebrate success, our customers and partners see us as human. Move with Velocity We evolve and grow to stay ahead of the curve, we make decisions quickly and often, we are decisive and show initiative, we are outcome oriented and we question everything to determine what speeds or impedes the desired outcome. Go Further We go beyond delivering what works, we discover delights and help customers transform their business, we have a passion for learning, we have a desire to question the norms, and we are curious to step out of our comfort zones. Thrive Together We are high functioning, supportive and inclusive, collaboration is in our DNA, we step up to assist our team members, and we work as a team to achieve the right outcome. Skills and Capabilities At least 7 years of experience working in a SOC environment, with a focus on using multiple SIEM tools. Strong understanding of security operations and incident response processes Hands-on experience with at least two major SIEM tools (e.g., MS Sentinel Rapid7, Exabeam Splunk, ArcSight, QRadar,) Strong analytical and problem-solving skills Excellent communication and interpersonal skills Ability to work in a fast-paced, dynamic environment Qualifications B-Tech

Posted 2 months ago

Apply

4 - 9 years

12 - 16 Lacs

Chandigarh

Hybrid

Naukri logo

About Role: Are you passionate about technology and keen on being part of a dynamic team at the forefront of cloud and platform engineering? Oreta, a leading Australian organization, is looking for a talented Cloud/Platform Engineer/System Engineer (L2) to join our innovative team based in Chandigarh/Mohali- India . In this role, youll work with cutting-edge tools and technologies, solving complex problems, and delivering exceptional IT solutions for our clients. You'll be empowered to learn, thrive, and grow in a collaborative environment that values innovation and teamwork. The successful candidate will need to be able to handle a broad range of technical and customer service challenges, while working collaboratively with other teams to ensure the highest level of service quality and customer satisfaction. Responsibilities Assist in the design, implementation, and maintenance of our platform and cloud infrastructure. Collaborate with cross-functional teams to troubleshoot and resolve technical issues. Conduct triage on incidents, ensuring prompt identification and resolution of problems. Monitor and optimize system performance, ensuring high availability and scalability. Participate in the development and implementation of new features and enhancements. Provide second-level technical support to customers via phone, email, and chat, ensuring timely resolution of customer issues. Attain a high percentage of First Call Resolution tickets. Manage service levels (SLAs), monitor response times, and escalate issues as needed to meet service level objectives. Create and maintain Knowledge Base Articles (KBAs) to improve the resolution time of common issues. Document all customer interactions accurately and thoroughly in our service desk ticketing system. Follow established procedures and protocols for troubleshooting and resolving customer issues. Actively participate in team meetings and training sessions to stay up to date on new products and services. Identify opportunities to improve processes and procedures, and work with management to implement changes. Maintain a positive, customer-focused attitude at all times, even in challenging situations. Work collaboratively with other team members and support teams to ensure the highest level of customer service and technical support. Monitor and respond to alerts generated by monitoring systems, ensuring timely resolution of any issues. Provide proactive updates to customers on the status of their tickets and follow up with them as needed to ensure their issues are fully resolved. Identify trends and patterns in customer issues, and work with support teams to address underlying issues and improve overall service quality. May be required to participate in on-call rotations to provide after-hours support to customers as needed on occasion. Contribute to process improvement initiatives, and work with management to implement changes to improve service quality and efficiency. Provide training and mentoring to junior team members to help them develop their technical skills and provide high-quality customer service. Maintain a high level of professionalism and positive attitude and always represent the organization in a positive and professional manner. Participate in incident response and problem management activities, working closely with other teams to investigate and resolve complex technical issues. Configure and troubleshoot hardware devices and provide technical support to users. Essential Criteria Bachelors degree in computer science or related field Minimum 2 years in Server Administration environment Proven experience in triage, with the ability to quickly identify and resolve technical issues. Solid understanding of cloud platforms such as AWS, Azure, or Google Cloud. Experience with troubleshooting and technical support the following technologies Technical expertise and experience supporting Server infrastructure; Private Cloud / Public Cloud IaaS, PaaS, Hypervisors, Microsoft Server Operating System, Linux, End User / Modern Workplace Management and support; Microsoft Intune (EndPoint Manager), Windows / MAC Operating Systems, Office 365, Common off the Shelf Software (COTS) Server Platforms / Applications; Microsoft Exchange Server, Microsoft SQL Server, Azure Virtual Desktop, Citrix Server Strong customer service skills, with the ability to communicate technical information to non-technical customers Understanding of Service Desk processes and ideally ticketing systems (e.g. ConnectWise) Strong problem-solving and troubleshooting skills Ability to work independently and as part of a team Excellent communication and interpersonal skills Flexible schedule, with the ability to work evenings, weekends, and holidays as needed - rotating roster Ability to multitask and prioritize in a fast-paced environment Strong team player, with the ability to work collaboratively with other team members and support teams Benefits and Perks Oreta takes pride in providing a service of excellence to our customers and looking after our employees who enable our business to succeed. The successful applicant will enjoy working in the Chandigarh highly driven team members (the Oreos), where ideas are always welcome and ongoing training and development is strongly encouraged. Employees are rewarded with monthly team events, Employee of the Month, just to name a few of the perks.

Posted 2 months ago

Apply

6 - 8 years

17 - 20 Lacs

Chandigarh

Work from Office

Naukri logo

About Role: Are you passionate about technology and keen on being part of a dynamic team at the forefront of cloud and platform engineering? Oreta, a leading Australian organization, is looking for a talented Cloud/Platform Engineer/System Engineer (L2) to join our innovative team based in Chandigarh/Mohali- India . In this role, youll work with cutting-edge tools and technologies, solving complex problems, and delivering exceptional IT solutions for our clients. You'll be empowered to learn, thrive, and grow in a collaborative environment that values innovation and teamwork. The successful candidate will need to be able to handle a broad range of technical and customer service challenges, while working collaboratively with other teams to ensure the highest level of service quality and customer satisfaction. Responsibilities Assist in the design, implementation, and maintenance of our platform and cloud infrastructure. Collaborate with cross-functional teams to troubleshoot and resolve technical issues. Conduct triage on incidents, ensuring prompt identification and resolution of problems. Monitor and optimize system performance, ensuring high availability and scalability. Participate in the development and implementation of new features and enhancements. Provide second-level technical support to customers via phone, email, and chat, ensuring timely resolution of customer issues. Attain a high percentage of First Call Resolution tickets. Manage service levels (SLAs), monitor response times, and escalate issues as needed to meet service level objectives. Create and maintain Knowledge Base Articles (KBAs) to improve the resolution time of common issues. Document all customer interactions accurately and thoroughly in our service desk ticketing system. Follow established procedures and protocols for troubleshooting and resolving customer issues. Actively participate in team meetings and training sessions to stay up to date on new products and services. Identify opportunities to improve processes and procedures, and work with management to implement changes. Maintain a positive, customer-focused attitude at all times, even in challenging situations. Work collaboratively with other team members and support teams to ensure the highest level of customer service and technical support. Monitor and respond to alerts generated by monitoring systems, ensuring timely resolution of any issues. Provide proactive updates to customers on the status of their tickets and follow up with them as needed to ensure their issues are fully resolved. Identify trends and patterns in customer issues, and work with support teams to address underlying issues and improve overall service quality. May be required to participate in on-call rotations to provide after-hours support to customers as needed on occasion. Contribute to process improvement initiatives, and work with management to implement changes to improve service quality and efficiency. Provide training and mentoring to junior team members to help them develop their technical skills and provide high-quality customer service. Maintain a high level of professionalism and positive attitude and always represent the organization in a positive and professional manner. Participate in incident response and problem management activities, working closely with other teams to investigate and resolve complex technical issues. Configure and troubleshoot hardware devices and provide technical support to users. Essential Criteria Bachelors degree in computer science or related field Minimum 2 years in Server Administration environment Proven experience in triage, with the ability to quickly identify and resolve technical issues. Solid understanding of cloud platforms such as AWS, Azure, or Google Cloud. Experience with troubleshooting and technical support the following technologies Technical expertise and experience supporting Server infrastructure; Private Cloud / Public Cloud IaaS, PaaS, Hypervisors, Microsoft Server Operating System, Linux, End User / Modern Workplace Management and support; Microsoft Intune (EndPoint Manager), Windows / MAC Operating Systems, Office 365, Common off the Shelf Software (COTS) Server Platforms / Applications; Microsoft Exchange Server, Microsoft SQL Server, Azure Virtual Desktop, Citrix Server Strong customer service skills, with the ability to communicate technical information to non-technical customers Understanding of Service Desk processes and ideally ticketing systems (e.g. ConnectWise) Strong problem-solving and troubleshooting skills Ability to work independently and as part of a team Excellent communication and interpersonal skills Flexible schedule, with the ability to work evenings, weekends, and holidays as needed - rotating roster Ability to multitask and prioritize in a fast-paced environment Strong team player, with the ability to work collaboratively with other team members and support teams Benefits and Perks Oreta takes pride in providing a service of excellence to our customers and looking after our employees who enable our business to succeed. The successful applicant will enjoy working in the Chandigarh highly driven team members (the Oreos), where ideas are always welcome and ongoing training and development is strongly encouraged. Employees are rewarded with monthly team events, Employee of the Month, just to name a few of the perks.

Posted 2 months ago

Apply

6 - 10 years

8 - 12 Lacs

Pune, Bengaluru, Hyderabad

Work from Office

Naukri logo

Skills : Microsoft Sentinel (Azure Sentinel), Implementation, Design, Migration, Custom Parser, Data Connectors, CI/CD pipelines (Azure DevOps), Automation Rule, Logic Apps (Playbooks), SOAR, Analytics Rules, Workbooks, Content Hub Required Candidate profile Notice Period: immediate joiner EducationBE, B.Tech, ME, M.TechLocationBangalore, Pune, Hyderabad

Posted 2 months ago

Apply

4 - 8 years

17 - 22 Lacs

Pune

Work from Office

Naukri logo

About The Role : Job Title- Mobile Devices Site Reliability Engineer Location- Pune, India Role Description Our team provides platform-level operational support of mobile & remote access End User Computing platforms. We are primarily responsible for day-to-day operations of the platforms engaging with our vendors, engineers, and product management teams; support of major projects and migrations; providing training and knowledge to assist our local and first-line support teams in incident resolution; and owning and driving service or platform wide incidents, including major incidents with high priority and visibility. Our platforms provide service to 90k+ endpoints, and we work daily with many other teams in the bank to ensure smooth operations across the complex and varied bank environment. You will be a member of a global team providing daily support across our product set, with a focus on completing the migration of our users from our legacy product set to our invest cloud-based solutions. As a part of your day, you will join your global team in planning, brainstorming, and problem-solving issues across our estate, provide status updates on your projects and work delivery streams, and will operate with counterparts in your region to accomplish work within our target delivery dates. Our team plans our work in an agile sprint-based method, but things change rapidly in production operations our team stays in close contact daily to continue delivering planned work and deal with anything new requiring attention. A key focus of our team is on the reduction of incidents in our product space, and the optimization of response to issues. We are heavily focused on improving our product experience through clear and understandable end-user knowledge, scripting to support our ability to quickly detect, mitigate, or resolve issues, and improving our observability to our environment to enhance our ability to detect and respond to issues. What we'll offer you As part of our flexible scheme, here are just some of the benefits that youll enjoy Best in class leave policy Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Provide L2/L3 platform level incident support and engagement of our global remote and mobile platforms we are generally engaged on new issues without prior training/knowledge, platform-level faults, major incidents, and vendor incidents for our mobile device management, Android OS, Apple OS, and remote-access products Provide planning and delivery of production changes following ITIL framework Be a source of knowledge we provide written and verbal knowledge to our local teams in support of our product space Improve what you are doing identify if there is a better way to deliver what you are doing that would be more efficient or improve user experience and help visualize or deliver the improvement if you can Provide support for routine operational responsibilities including change verifications and testing, Disaster Recovery exercise support, closure of routine requests and processes Your skills and experience Demonstratable experience supporting end-user devices in the Apple iOS/iPadOS space Demonstratable experience implementing, documenting, and/or supporting mobile device management platforms such as Intune, MobileIron, or AirWatch Demonstratable experience delivering an end-user or product migration, or large-scale project involving technical support or end-user interaction Demonstratable knowledge of Apple mobile device management or declarative device management concepts Demonstratable understanding of the basics of Azure and Entra ID Experience working in an incident management system such as ServiceNow Understanding and capability to provide succinct overviews and reports relating to your projects and delivery communication is key for our team! Demonstratable understanding of basic VPN and networking concepts allowing devices to connect securely to corporate networks Bonus skills understanding or capability to deliver strategic reporting (e.g. PowerBI), observability from a SIEM (e.g. Splunk, Sentinel), scripting (Python or Powershell), automations from the Microsoft Power Platforms (Power Automate, Azure Runbooks) How we'll support you Training and development to help you excel in your career Coaching and support from experts in your team A culture of continuous learning to aid progression A range of flexible benefits that you can tailor to suit your needs

Posted 2 months ago

Apply

1 - 6 years

3 - 7 Lacs

Hyderabad

Work from Office

Naukri logo

ABOUT AMGEN Amgen harnesses the best of biology and technology to fight the world’s toughest diseases, and make people’s lives easier, fuller and longer. We discover, develop, manufacture and deliver innovative medicines to help millions of patients. Amgen helped establish the biotechnology industry more than 40 years ago and remains on the cutting-edge of innovation, using technology and human genetic data to push beyond what’s known today. Role Description The SOC Tier 2 Analyst serves as the primary escalation point for the Tier 1 SOC team, responsible for advanced threat detection, investigation, and incident response coordination. This role acts as a technical lead, ensuring that security incidents are properly triaged, investigated, and remediated while continuously improving security operations processes. The SOC Tier 2 Analyst plays a critical role in cybersecurity defense, supporting real-time monitoring, forensic analysis, and threat hunting. They will assist incident responders across all lifecycle phases, from detection to post-incident reviews, and contribute to SOC process optimizations. Roles & Responsibilities: Act as the primary escalation point for SOC Tier 1 analysts, providing technical expertise and guidance in incident handling. Perform deep-dive analysis of security events, leveraging SIEM, EDR, IDS/IPS, and other security tools. Identify common attack techniques (MITRE ATT&CK framework) and investigate anomalies to detect advanced persistent threats (APTs). Assist in security incident response, leading containment, eradication, and recovery efforts. Conduct artifact analysis to determine the root cause and scope of security incidents. Collaborate with Threat Intelligence and Threat Hunting teams to improve detection rules and incident response playbooks. Develop and refine SOC standard operating procedures (SOPs) to enhance security event triage and response. Work with engineering teams to fine-tune security controls and improve overall SOC efficiency. Mentor and train Tier 1 analysts to improve SOC maturity and ensure effective knowledge transfer. Support security audits, compliance initiatives, and reporting efforts as required. Basic Qualifications and Experience: Master’s degree in Information Technology or Cybersecurity OR Bachelor’s degree with 1 year of experience in Security Operations or related field OR Diploma with 2 years of experience in Security Operations or a related field Functional Skills: Must-Have Skills: Strong understanding of SOC operations, including event triage, escalation, and investigation. Experience analyzing cybersecurity threats and understanding attacker TTPs (Tactics, Techniques, and Procedures). Proficiency in security tools such as SIEM (Splunk, QRadar, Sentinel), EDR (CrowdStrike, Defender ATP), IDS/IPS, and firewall logs. Experience in incident response across all phases (detection, containment, eradication, recovery). Knowledge of Windows and Linux security, including log analysis, PowerShell, and Bash scripting. Good-to-Have Skills: Experience in 24/7 SOC operations and shift leadership. Knowledge of forensic tools (Volatility, Autopsy, FTK) and malware analysis techniques. Understanding of cloud security monitoring (AWS, Azure, GCP). Familiarity with MITRE ATT&CK, NIST Cybersecurity Framework, and CIS controls. Threat hunting experience to proactively detect unknown threats. Professional Certifications: CompTIA Security+ (preferred) CEH (preferred) GSEC (preferred) GCFA (preferred) MTA Security Fundamentals (preferred) CISSP (preferred) Soft Skills: Strong communication and collaboration skills, particularly when working with global teams. Ability to manage and prioritize tasks effectively in a high-pressure environment. Critical thinking and problem-solving abilities, especially in incident response situations. A commitment to continuous learning and knowledge sharing. EQUAL OPPORTUNITY STATEMENT Amgen is an Equal Opportunity employer and will consider you without regard to your race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, or disability status. We will ensure that individuals with disabilities are provided with reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. Apply now for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.

Posted 2 months ago

Apply

3 - 5 years

8 - 12 Lacs

Lucknow

Remote

Naukri logo

Roles and Responsibilities Conduct security assessments and develop remediation plans to improve overall security posture. Design, implement, and maintain SIEM solutions using Splunk Enterprise Security (SES) platform. Collaborate with cross-functional teams to identify security gaps and provide recommendations for improvement. Develop expertise in cloud security architecture, including AWS IAM, KMS, CloudWatch, GuardDuty, Inspector, etc. Provide technical guidance on security best practices to clients. Desired Candidate Profile 3-5 years of experience in IT Security consulting with a focus on SIEM implementation and management. Strong understanding of Linux operating system administration principles. Experience with automation tools such as Ansible or Terraform is desirable.

Posted 2 months ago

Apply

10 - 15 years

25 - 40 Lacs

Chandigarh

Work from Office

Naukri logo

We are looking for a highly skilled and experienced Senior Security Operations Centre (SOC) Manager with a focus on SIEM tools to join our security team. As a SIEM Tools Specialist, you will be responsible for monitoring and analysing security events for multiple clients utilising our SIEM tool. You will undertake timely and accurate detection, investigation, and response to security incidents. In this role, you will collaborate closely with other security professionals, including threat hunters, incident responders, and forensic analysts, to ensure that the security operations centre (SOC) is always operational and that all security incidents are handled in a timely and effective manner to meet SLAs. You will also be responsible for ensuring that the SIEM tool is properly configured, managed, and optimised to meet the clients security requirements. Key Responsibilities: Security Event Analysis: Lead the analysis and investigation of information security events (IDS/DLP/SIEM/etc.) in a 24x7 SOC environment to swiftly detect, verify, and respond to cyber threats, while eliminating false positives. Technical Escalation: Serve as a technical point of escalation for complex security issues. Incident Investigation: Investigate incidents, analyze attack methods, research new defense techniques and tools, develop security policies, and document SOC procedures. Configuration Management: Maintain baselines for secure configuration and operations. Malware & Attack Analysis: Conduct malware analysis and other attack analyses to extract indicators of compromise and perform data security event correlation across various systems. Reporting: Prepare reports, summaries, and other forms of communication for both internal and client-facing purposes. SLA Compliance: Ensure compliance with SLAs, process adherence, and process improvement to achieve operational objectives. Process Development: Develop and deploy processes to ensure efficient and effective security operations. Mentorship: Provide guidance and mentorship to other security analysts and junior members of the security team. Continuous Learning: Stay up-to-date with the latest trends and best practices in cybersecurity and SIEM tools. Qualifications: Proven experience in a similar role within a SOC environment. Strong analytical and problem-solving skills. Proficiency with IDS, DLP, SIEM, and other security tools. Excellent communication skills, both written and verbal. Ability to work in a fast-paced, 24x7 environment. Strong understanding of security policies and procedures.

Posted 2 months ago

Apply

4 - 9 years

10 - 20 Lacs

Bengaluru

Work from Office

Naukri logo

Preferred Knowledge The role requires efficient incident response and digital forensics skills to minimise the impact of cyber risks. The individual will oversee Security monitoring, Security tools Operations, Security incidents, ensure incidents are managed effectively and reported to stakeholders. This role primarily consists of first responder activities and to conducting thorough response activities on behalf of a wide variety of clients across every sector. Candidate required to work in complex security environments and alongside SOC team to design, communicate and execute incident response, containment, and remediation plans. Support incident response team analysts and incident management teams. Analyse tools, processes, and procedures for responding to cyber intrusions and come up with new methods for detecting cyber adversaries. Demonstrates proven expertise and success in incident handling, triage of events, network analysis and threat detection, trend analysis. Should have the following skills: Deep understanding of computer intrusion activities, incident response techniques, tools, and procedures Knowledge of Windows, Active Directory, DNS & Linux operating systems, Good Experience in SIEM monitoring (QRadar, Sentinel, Splunk, chronicle) Knowledge of SOAR technologies, working with playbooks (Cortex, chronicle, Splunk SOAR) Experience handling malware incidents and detections from EDR (MS Defender, Crowdstrike, SenitnelOne etc..) Working experience and knowledge of ITSM tools for incident management. Must be action oriented and have a proactive approach to solving issues. Knowledge of security logs, log quality review. Knowledge on IT (Operating systems, networking, databases) and IT security knowledge (system and network security) including IT security tools. Good knowledge of office collaboration tools Detect, Analyze, Investigate, and report qualified security incidents to the Client as per the defined SLA Provide recommendations to the security incidents reported as per SLA Investigates incidents using various security event sources (FW, IDS, PROXY, AD, EDR, DLP etc.). Investigations into non-standard incidents and execution of standard scenarios. Provide dashboard and data related to Incidents/Offenses for governance reports. Escalates to L3 if investigations uncover unusual or atypical situations. Monitoring unhealthy log source/data source and escalate to engineering team to fix them. Participate in incident response (IR) efforts; detect, identify, respond, contain and remediate all information security incidents. Rapidly and accurately determine the source of a security incident and moving quickly to identify and apply containment, mitigation, and remediation steps. Contribute to the execution of Cyber Security operations, incident response, and investigations spanning across all functions of the Corporate Security organization. Track, monitor incident actions while applying intelligence, situational awareness to prioritise incident actions based on risk Responsible for Incident and Breach communications, assessments, and reports and customer facing, to include leadership and executive management for the purpose of enabling Senior Management to make decisions in a crisis Develop and document processes to ensure consistent and scalable response operations.

Posted 2 months ago

Apply

4 - 5 years

2 - 7 Lacs

Pune, Bengaluru, Mumbai (All Areas)

Hybrid

Naukri logo

Role & responsibilities Job Description: SOC Analyst • Actively monitor multiple security devices (SIEM, Splunk, Azure Security Centre and other technologies) for any potential threats • Actively monitor agreed SOC feeds (vulnerability reports, IOCs and other feeds) for any potential threats • Analyze potential security events to determine if it qualifies as a legitimate security incident • Work with skill groups, other SOC team members and create new rules, reports and dashboards • Perform problem/incident identification and attempt to resolve the problem or the incident • Conduct in-depth investigation of the security incident, contribute in generating a threat flow diagram and/or a root cause analysis report • Performs incident notification and escalation to ensure problems, request, or issues are communicated and escalated effectively • Engage with Senior Analysts and other skill groups, maintain SOC knowledge management site, update all SOC documents such as KB articles, processes, procedures, contact details • Participate in knowledge sharing with other analysts and discuss solutions efficiently • Understanding of security fundamentals, types of threats and attack vectors, user authentication, permissions, cryptography, vulnerability assessment and penetration testing tactics, and Network and packet analysis tactics • Willing to work in a rotational shifts 24*7 operation Preferred candidate profile Bachelors degree in IT or equivalent. Security Industry Certification such as CEH, GCIH or CISSP would be highly beneficial. Perks and benefits

Posted 2 months ago

Apply

Exploring Sentinel Jobs in India

The job market for sentinel roles in India is currently on the rise, with a high demand for professionals who can effectively monitor and secure systems, networks, and data. Sentinel jobs are crucial in ensuring the safety and integrity of digital assets for organizations across various industries.

Top Hiring Locations in India

  1. Bangalore
  2. Hyderabad
  3. Mumbai
  4. Pune
  5. Chennai

Average Salary Range

The salary range for sentinel professionals in India varies based on experience and location. Entry-level positions may start around INR 3-5 lakhs per annum, while experienced professionals can earn upwards of INR 10-15 lakhs per annum.

Career Path

In the field of sentinel, a typical career path may progress from roles such as Security Analyst or Information Security Specialist to Senior Security Engineer, Security Architect, and eventually Chief Information Security Officer (CISO) or Security Consultant.

Related Skills

Alongside expertise in sentinel, professionals in this field are often expected to have knowledge of cybersecurity, network security, risk management, incident response, and penetration testing.

Interview Questions

  • What is the difference between vulnerability assessment and penetration testing? (medium)
  • Explain the concept of threat modeling and its importance in cybersecurity. (advanced)
  • How do you stay updated with the latest trends and threats in the cybersecurity landscape? (basic)
  • Can you describe the process of setting up a Security Information and Event Management (SIEM) system? (medium)
  • What are the common techniques used in social engineering attacks? (advanced)
  • How would you handle a security incident involving a data breach? (medium)
  • What is the role of encryption in data security? (basic)
  • Can you explain the difference between symmetric and asymmetric encryption algorithms? (medium)
  • How would you prioritize security vulnerabilities for remediation in a large organization? (advanced)
  • Describe a time when you successfully implemented a security control to mitigate a specific risk. (medium)
  • What steps would you take to secure a web application from common vulnerabilities? (basic)
  • How do you assess the security posture of a new IT infrastructure? (medium)
  • What is the importance of compliance frameworks such as GDPR or HIPAA in cybersecurity? (medium)
  • How do you handle security incidents involving insider threats? (advanced)
  • Explain the concept of zero-trust security and its benefits in modern cybersecurity. (medium)
  • How do you approach security awareness training for employees in an organization? (basic)
  • Can you describe the role of threat intelligence in cybersecurity operations? (medium)
  • What are the key components of a security incident response plan? (medium)
  • How would you conduct a security audit of an organization's network infrastructure? (advanced)
  • What are the main challenges in securing cloud environments? (medium)
  • How do you assess the security implications of introducing new technology or software in an organization? (medium)
  • What is the role of a Security Operations Center (SOC) in an organization's cybersecurity strategy? (basic)
  • Can you explain the concept of sandboxing in malware analysis? (advanced)
  • How do you approach incident triage and prioritization in a security operations environment? (medium)
  • Describe a recent security project you worked on and the challenges you faced during its implementation. (medium)

Closing Remark

As you prepare for your journey into the sentinel job market in India, remember to showcase your expertise, experience, and passion for cybersecurity. Stay updated with the latest trends and technologies, practice your skills, and approach interviews with confidence. Best of luck in your job search!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies