Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
15.0 years
1 - 5 Lacs
Hyderābād
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Senior Manager_TDR (threat detection and response) Job Summary As a Senior Manager with EY’s Global Delivery Services (GDS) Cybersecurity Team, you will contribute technically to client engagement and services development activities. You will be focused on helping client’s grow and turn their Cyber security strategy into reality. You’ll work in high-performing teams that drive growth and deliver exceptional client service, making certain you play your part in building a better working world. You will be responsible for overall client service quality delivery in accordance with EY’s quality guidelines & methodologies. You will need to manage accounts and relationships on a day-to-day basis and explore new business opportunities for EY. Establishing, strengthening and nurturing relationships with clients (functional heads & key influencers) and internally across service lines. You will assist in developing new methodologies and internal initiatives and help in creating a positive learning culture by coaching, counselling and developing junior team members. Client responsibilities: Technical leadership and knowledge of cybersecurity concepts and methods including, but not limited to, SOC transformation, CTI, cloud, privacy, incident response, governance, risk and compliance, enterprise security strategies, and architecture. Excellent teamwork skills, passion and drive to succeed and combat Cyber threats Maintain a strong client focus by effectively serving client needs and developing productive working relationships with client personnel. Stay abreast of current business and economic developments and new pronouncements/standards relevant to the client's business. Generate new business opportunities by participating in market facing activities, executive briefings and developing thought leadership materials Willing to learn new technologies and take up new challenges. Assist in developing high-quality technical content such as automation scripts/tools, reference architectures, and white papers. Should have worked in a security operations center and gained understanding of SIEM and other log management platforms. Having experience in best in breed SIEM (Splunk, Sentinel and Qradar etc) content development / architecting will be an added advantage. Should have good hands-on experience and skills on advanced and integrated key Threat Detection Technology like SIEM, SOAR, EPP, EDR solutions, Firewalls, IDPS, Web Proxy, Enterprise Forensics tools. Experience with cloud infrastructures for the enterprise, such as Amazon Web Services, G Suite, Office 365, and Azure. Good knowledge in threat modelling. Knowledge in endpoint protection tools, techniques and platforms such as Carbon Black, Tanium, Microsoft Defender ATP, Symantec, McAfee or others Work with the team and the client to create plans for accomplishing engagement objectives and a strategy that complies with professional standards and addresses the risks inherent in the engagement. Brief the engagement team on the client's environment and industry trends. Maintain relationships with client to manage expectations of service including work products, timing, fees and deliverables. Demonstrate a thorough understanding of complex information systems and apply it to client situations Create and demonstrate innovative insights for clients, adapts methods and practices to fit operational team needs & contributes to thought leadership documents Apply extensive knowledge of the client's business/industry to identify technological developments and evaluate impacts on the client's business. Demonstrate excellent project management skills, inspire teamwork and responsibility with engagement team members, and use current technology/tools to enhance the effectiveness of deliverables and services Drive discussions / knowledge sharing with key client personnel and contribute to EY’s thought leadership Demonstrate excellent project management skills, inspire teamwork and responsibility with engagement team members, and use current technology/tools to enhance the effectiveness of deliverables and services. Strong collaboration with EY senior executives, other key stakeholders and importantly other EY SOC leaders to co-establish, promote and drive a Cyber SOC ecosystem Key responsibilities: Provide industry insights (deep understanding of the industry, emerging trends, issues/challenges, key players & leading practices) that energize growth Demonstrate deep understanding of the client’s industry and marketplace Lead consulting engagements that solve complex Cyber security issues Help mentor, coach and counsel their team members and help us build an inclusive culture and high-performing teams Maximize operational efficiency through standardization and process automation on client engagements and internal initiatives Monitor delivery progress, manage risk and ensure key stakeholders are kept informed about progress and expected outcomes Successfully manage engagement time and budgets Convey complex technical security concepts to technical and non-technical audiences including executives. Provide strategic and relevant insight, connectedness and responsiveness to all clients to anticipate their needs Support and drive the overall growth strategy for the Cybersecurity practice as part of the leadership team. Identify and drive development of market differentiators including new products, solutions, automation etc. Define, develop and implement strategic go-to-market plans in collaboration with local EY member firms in Americas, EMEIA and APAC. Drive new business opportunities by developing ideas, proposals and solutions Strongly represent EY and its service lines and actively assess what the firm can deliver to serve clients. Assist Consulting Partners in driving the business development process on existing client engagements by gathering appropriate resources, gaining access to key contacts & supervising proposal preparation Develop long-term relationships with networks both internally and externally Enhance the EY brand through strong external relationships across a network of existing and future clients and alliance partners Driving the quality culture agenda within the team Manage and contribute in performance management for the direct reportees and team members, as per the organization policies Able to examine and act on people related issues both strategically and analytically. Participating in the EY-wide people initiatives including recruiting, retaining and training Cybersecurity professionals Use technology to continually learn, share knowledge and enhance client service delivery Support the EY inclusiveness culture To qualify, candidates must have: At least 15 years of industry experience and serving as Manager for minimum of 10 years or 5 years as Senior Manager, of recent relevant work experience in information security or information technology discipline, preferably in a business consulting role with a leading technology consultancy organization Strong technical experience in not limited to, attack and penetration testing, vulnerability management, cloud, privacy, incident response, governance, risk and compliance, enterprise security strategies, and architecture. Any one of the following technical certifications: CISSP, CISM, GSOC Graduates / BE / BTech / MSc / MTech / MBA in the fields of Computer Science, Information Systems, Engineering, Business or related major Any one of the following project management experience - Prince2 / PMI / MSP / CSM Experience with data analysis and visualization technologies Fluency in English, other language skills are considered an asset EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 1 week ago
2.0 - 3.0 years
0 Lacs
Hyderābād
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Description: Tier 2 Analyst Position Overview: The Tier 2 Analyst plays a vital role in the cybersecurity team, responsible for monitoring, detecting, and responding to security incidents. The position involves analyzing alerts, escalating incidents as necessary, and working closely with Tier 3 analysts and other cybersecurity professionals to ensure effective incident response and remediation. The Tier 2 Analyst is also responsible for maintaining and improving the organization's security posture through continuous monitoring and analysis. Key Responsibilities: Security Monitoring and Alert Analysis: Monitor security alerts and events from various sources, including SIEM systems, IDS/IPS, and other security technologies. Analyze alerts to determine their severity and potential impact on the organization. Incident Triage and Escalation: Perform initial incident triage, including assessing the scope and potential impact of security incidents. Escalate incidents to Tier 3 analysts or appropriate resource teams for further investigation and response, as necessary. Incident Response and Containment: Assist in the containment of security incidents by implementing pre-approved actions or recommended measures. Work with the SOC team to execute response actions on managed hosts within the scope of permissions and access rights. Communication and Coordination: Communicate incident details and recommended actions to the cyber defense team and other stakeholders. Participate in cyber defense calls to provide updates on incident status and ongoing response efforts. Documentation and Reporting: Maintain accurate and detailed documentation of all incidents, including actions taken and lessons learned. Prepare reports for stakeholders, summarizing incident findings and response actions. Peer Review and Continuous Improvement: Conduct peer reviews of incident handling and analysis performed by other Tier 2 analysts. Identify trends and areas for improvement in incident response processes and capabilities. Threat Intelligence and Analysis: Utilize threat intelligence feeds and other resources to stay informed about emerging threats and vulnerabilities. Incorporate threat intelligence into the analysis and response process to improve detection and mitigation strategies. Security Tool Management and Optimization: Assist in the configuration, tuning, and optimization of security tools and technologies. Provide feedback on the effectiveness of security controls and suggest improvements. Qualifications: 2-3 years related experience in cybersecurity operations, particularly in a SOC or similar environment. Strong knowledge of cybersecurity principles, including incident response, threat detection, and risk management. Proficiency in using security monitoring tools, such as Sentinel SIEM systems, IDS/IPS, EDR – Microsoft Defender, XSOAR – SOAR solutions. Excellent analytical and problem-solving skills. Strong communication and teamwork skills, with the ability to collaborate effectively with cross-functional teams. Basic understanding of network and infrastructure security. Familiarity with regulatory and compliance requirements related to cybersecurity. Additional Information: The Tier 2 Analyst is a crucial component of the organization's cybersecurity defense. This role requires a proactive approach to identifying and mitigating security threats, as well as a commitment to continuous learning and improvement. The Analyst must be able to work effectively under pressure and be prepared to respond swiftly to a variety of security incidents, ensuring the organization's digital assets and information remain secure. Special Factors: Willing to work from ODC as and when required in rotational shift. Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 1 week ago
12.0 years
4 - 6 Lacs
Gurgaon
Remote
We are seeking a talented individual to join our Investments team at Mercer. This role will be based in Gurgaon/Mumbai/Noida. This is a hybrid role that has a requirement of working at least three days a week in the office. Director – Operations Due Diligence - Investments Mercer Wealth is a leading global provider of investment consulting services. We offer customised advice at every stage of the investment decision, risk management and investment monitoring process. In addition to core consulting, we have developed a number of specialist teams; the Financial Strategy Group, Mercer Sentinel, Manager Research, Responsible Investment and Fiduciary Management, thereby ensuring we offer a full range of services to our clients. We are looking for talented colleagues who understand the financial services industry and the operational functions of investment managers. Will work as part of a team of ODD specialist and client consultants. We will count on you to: Work as an extension of the UK/US team to conduct operational due diligence risk assessments of investment managers using Mercer Sentinel’s framework incorporating house views as appropriate Understanding of investment manager middle and back office operations, fund administration, portfolio accounting, custody, regulatory compliance and other relevant industry experience Maintaining knowledge of operational risk frameworks across the Mercer universe of asset classes, including equity and fixed income, hedge funds, private equity, private debt, real estate and infrastructure Liaise with investment managers to collate information, coordinate on-site visits and schedules Review responses and documentation provided by investment managers for the risk assessment and author research notes in advance of the meeting of the onsite team to support the onshore team Support virtual investment manager “on-site” visits through the preparation of pre-meeting notes, note taking in the meeting and producing high quality draft written reports after the meeting Challenging and improving operational processes for Mercer’s ODD framework Contribute to Mercer Sentinel’s intellectual capital through market research and process innovation Contribute towards Mercer Sentinel’s other products including but not limited to Surveys and Operational Reviews; support onshore team’s efforts towards key projects or activities including business development among others. Update and maintain pertinent tools/database with relevant information including research publications and coordinate with asset managers for requisite data and for scheduling research calls; prepare and distribute Ratings Committee (RC) minutes from the weekly RC call. Project management, work allocation, real-time capacity management, peer review, process training and development of team members Lead and manage end-to-end operations and ensure the seamless delivery of reports/projects. Liaison with stakeholders to build relationship for service delivery management. Play anchor role for all strategic projects and provide directions to the team. Prepare and manage KPIs and handle escalations. Lead efforts for people engagement, knowledge development initiatives for the team, and ensure adherence to compliance policy and organizational imperatives. Driving Process Improvement Initiatives and delivering results in line with Business Priorities Demonstrate subject matter expertise in leading the ODD vertical Maintain updated investment due diligence notes, meeting notes and recommendations in proprietary database Ensuring storage and organizing data on a central database What you need to have: A Master's degree in economics, finance or other business-related areas with a high level of written content Professional qualification (Actuarial, ACA, ACCA, CFA or equivalent) – preferential requisite 12+ Years of experience with operational due diligence investment management, operations, fund management or investment consulting Previous experience in operational risk analysis, fund administration, and or financial / portfolio accounting would be beneficial Thorough knowledge of Microsoft Office applications (Word, Excel, PowerPoint) Takes ownership for work, always ensuring standards and deadlines are met and keeping others informed and up-to-date Works well under pressure, with the ability to prioritise and manage multiple tasks, stakeholders and deliverables simultaneously; candidate may be expected to attend calls with US based asset managers couple days in a week; responsibilities may stretch to taking calls with asset managers in other geographies including Pacific, UK, Europe, Middle East and Asia depending on the business requirements. Excellent organisational and time management skills Openly shares information and own expertise with colleagues Possess excellent team working skills in a global/remote working environment What makes you stand out: Demonstrates excellent oral and written communication skills Self-motivated with an eagerness to learn and a positive work ethic Challenges existing practices and conventional thinking Highly proficient in Microsoft Excel and other core Microsoft Office products (Word, PowerPoint, etc.) Why join our team: We help you be your best through professional development opportunities, interesting work and supportive leaders. We foster a vibrant and inclusive culture where you can work with talented colleagues to create new solutions and have impact for colleagues, clients and communities. Our scale enables us to provide a range of career opportunities, as well as benefits and rewards to enhance your well-being. Mercer, a business of Marsh McLennan (NYSE: MMC), is a global leader in helping clients realize their investment objectives, shape the future of work and enhance health and retirement outcomes for their people. Marsh McLennan is a global leader in risk, strategy and people, advising clients in 130 countries across four businesses: Marsh, Guy Carpenter, Mercer and Oliver Wyman. With annual revenue of $24 billion and more than 90,000 colleagues, Marsh McLennan helps build the confidence to thrive through the power of perspective. For more information, visit mercer.com, or follow on LinkedIn and X. Marsh McLennan is committed to embracing a diverse, inclusive and flexible work environment. We aim to attract and retain the best people and embrace diversity of age, background, caste, disability, ethnic origin, family duties, gender orientation or expression, gender reassignment, marital status, nationality, parental status, personal or social status, political affiliation, race, religion and beliefs, sex/gender, sexual orientation or expression, skin color, or any other characteristic protected by applicable law. Marsh McLennan is committed to hybrid work, which includes the flexibility of working remotely and the collaboration, connections and professional development benefits of working together in the office. All Marsh McLennan colleagues are expected to be in their local office or working onsite with clients at least three days per week. Office-based teams will identify at least one “anchor day” per week on which their full team will be together in person.
Posted 1 week ago
0 years
3 - 8 Lacs
Bengaluru
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Manager Compliance Analyst Process Overview Portfolio Compliance: Coding AM Guidelines team supports portfolio managers by updating Investment management mandates on Compliance platforms and monitoring alerts for Institutional client guidelines. Coding involves setting up client & compliance regulations in systems to enable effective monitoring of guidelines. Monitoring requires managing the alerts, breaches generated pre/ post trade as a result of trades/ non-trading actions and communicating effectively with various stakeholders. Description of Functions & Role Annotation/Interpretation of Investment management Agreement/Prospectus/ SAI / Delegate Sleeve Agreements Scheduling the Annotation meeting with Desk/IS/PDs to get their buy ins on Interpretation Coding client and regulatory rules on compliance platforms along with rule Testing & Standardization Counterparty and broker setups for trading & Counterparty maintenance. Leveraging Machine learning tools for standard rule setups Performing analytical review of Investment Guidelines provided by investors and institutions. Partner with various operations team to improve data availability and overall quality of underlying data. Review new data analytics and update compliance platforms Understand and setup rules as per ratings agencies Identification of coding issues. Maintenance of Legal & Compliance approved & restricted lists. Perform periodic reviews of account coding to ensure accuracy & consistency. Research ad-hoc queries from compliance reporting team to determine if client portfolio is in line with the investment guidelines Identifies and analyzes operations risks related to current and potential business and recommends procedural changes as needed Key Competencies & Skills Expert level skills trade compliance applications such as LZ Sentinel, Charles River, Aladdin (Compliance), SimCorp Dimension, ThinkFolio. Expertise of 1940 Act, UCITS Regulations or ERISA will be added advantage Analytical & Interpretation skills: Client agreement language needs interpretation and post trade compliance tests performed need data analysis skills. One needs to understand financial instruments which are being traded by Portfolio Managers to code guidelines or to perform secondary research. Detail Orientation: Function is critical from an impact perspective. Need eye for detail and there is zero tolerance to oversight mistakes. Understanding of Portfolio Management, Role of Portfolio Manager, Key aspects of Investment Management Certifications: Candidates pursuing FRM (Financial Risk Manager by GARP) / CFA (Chartered Financial Analyst) / CISI (Chartered Institute for Securities & Investment) are preferred, but certification is not a must for the role EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 1 week ago
6.0 years
4 - 6 Lacs
Bengaluru
On-site
Rockwell Automation is a global technology leader focused on helping the world’s manufacturers be more productive, sustainable, and agile. With more than 28,000 employees who make the world better every day, we know we have something special. Behind our customers - amazing companies that help feed the world, provide life-saving medicine on a global scale, and focus on clean water and green mobility - our people are energized problem solvers that take pride in how the work we do changes the world for the better. We welcome all makers, forward thinkers, and problem solvers who are looking for a place to do their best work. And if that’s you we would love to have you join us! Job Description Job Summary: In this role, you will be an integral part of the IT organization. The candidate need to have a demonstrated understanding of Information Security, Computer Networking, the Software Development Life Cycle (SDLC) and an extensive experience in interacting with customers. Candidate must have Security Information and Event Management (SIEM) expertise and be willing to get trained on the company platform and products. You will report to the Cyber Security Manager. Your Responsibilities: This is a technical, hands-on role to focus on maintaining the SIEM platform, working with team members and stakeholders as well as training and enabling teams for successful adoption of the SIEM platform. Manage platform, agent, and app\add-on log source integration upgrades. Develop alerts, reports, data models, dashboards, and connectors to support custom user requirements. Recognise patterns and inconsistencies that could indicate complex cyber-attacks. Develop SIEM correlation rules to detect new threats beyond current capabilities. Assist with designing and documenting work processes. Perform log file analysis as and when required. Develop recommendations in collaboration with other team members to maximise Enterprise capabilities in prevention, detection, analysis, containment, eradication, and recovery from cyber-attacks. Contribute to CTI (Cyber Threat Intelligence) data gathering, reporting, and analysis activities. Leverage automation and orchestration solutions to automate repetitive tasks. Research and explore new avenues to by using the latest technologies and cybersecurity standards. The Essentials - You Will Have: Bachelor's degree in cyber security, Computer Science, Information Systems, Software Engineering, Computer Engineering or related field, or equivalent work experience. Typically requires a minimum of 6 years of experience in the Information Security field. 1+ years of experience in SIEM and UEBA solutions such as Splunk, LogRhythm and Elastic. Understanding of log collection methodologies and aggregation techniques such as Syslog, NXlog and Windows Event Forwarding. Working knowledge of cloud platforms such as AWS, Azure and GCP. The Preferred - You Might Also Have: Strong knowledge of at least one programming or scripting language (ex. Python, PowerShell, PHP, Perl) is preferrable. Understanding of security models and frameworks (ex. MITRE ATT&CK, MITRE D3FEND, Cyber Kill Chain (CKC)). Demonstrated experience providing customer-driven solutions or service. Ability to communicate effectively with all levels of an organisation from Engineering, Operations to C-level audiences. Security certifications (Security+, GSEC, GCIH, GCIA, CISSP, NCSF etc.) will be an added advantage. Sentinel and Datalake experience are preferrable. Familiar with Risk-based Alerting (RBA) frameworks and implementation. Experienced in architecting, planning, deploying, and using SIEM or UEBA platforms. Experienced in integrating or using endpoint security and host-based intrusion detection solutions. Extensive knowledge and understanding of directory services. Demonstrated experience in one of the following fields Cyber Threat Intelligence, Incident Response, or Computer Forensics is preferrable. Having solid knowledge of one or more programming or scripting language such as Python, PowerShell, PHP and Perl is preferrable. What We Offer: Our benefits package includes … Comprehensive mindfulness programmes with a premium membership to Calm. Volunteer Paid Time off available after 6 months of employment for eligible employees. Company volunteer and donation matching programme – Your volunteer hours or personal cash donations to an eligible charity can be matched with a charitable donation. Employee Assistance Program. Personalised wellbeing programmes through our OnTrack programme. On-demand digital course library for professional development. ... and other local benefits! At Rockwell Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles. #LI-Hybrid #LI-RS1 Rockwell Automation’s hybrid policy aligns that employees are expected to work at a Rockwell location at least Mondays, Tuesdays, and Thursdays unless they have a business obligation out of the office.
Posted 1 week ago
0 years
3 - 4 Lacs
Bengaluru
Remote
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Network Access Control Product Engineer EY Technology: Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 350,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day. Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients. Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization. EY Technology supports our technology needs through three business units: Client Technology (CT) - focuses on developing new technology services for our clients. It enables EY to identify new technology-based opportunities faster and pursue those opportunities more rapidly. Enterprise Technology (ET) – ET supports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services. ET will also support our internal technology needs by focusing on a better user experience. Information Security (Info Sec) - Info Sec prevents, detects, responds and mitigates cyber-risk, protecting EY and client data, and our information management systems. The opportunity This exciting role is inside the Network Access Control Product team, part of the ESPM, Network Product team in Enterprise Technology. In the role of a Network Access Control Product Engineer, you'll be responsible for the design, engineering, documentation and release of Network Access Control Products and technology components across all instances and use cases in EY. This will include ensuring key technologies and controls associated with Network Access Control across all aspects of the EY environment are suitably designed and modified to enable the production release of Network Access Control Product initiatives. Additionally, you will provide consulting services to other teams, as well as acting as a level four escalation for the Operations teams for complex issues. Your key responsibilities Your role is essential to the success of the team’s products, you will be providing consultative engagement in the most complex problem management activities, thus helping to drive client satisfaction, demonstrated using various KPIs and metrics. You’ll be responsible for Solution Design and Engineering, Solution Certification, Documentation and Operational Escalation support. In the Solution Design aspect, you will create designs based on industry best practices, solid engineering principles while clearly ensuring fit for purpose localization. As part of solution certification, you will ensure appropriate software versions have been selected, reviewed and appropriately tested. Deployment instructions and standards are created allowing the technology estate to be updated by deploying certified code and configurations globally. In the Service Documentation aspect, you will develop and maintain documentation for configuration guidelines and templates. Document new services as built for handover to the Operations team. You will engage with Level 3 support teams ensuring they have the necessary training and knowledge base articles to be successful. This will include the creation and periodic review, and maintenance of Knowledgebase articles as required. Skills and attributes for success Create designs based on industry best practices, sound solid engineering principles incorporating both local and global requirements while clearly understanding that one size does not fit all Advanced skills in planning, designing and troubleshooting complex environments including delivering projects within scope and budget Able to make technical decisions in support of Architecture, Strategy, Service Management and Operations functions within the project and escalated troubleshooting contexts Demonstrated experience in dealing with external vendors and suppliers in the network industry Excellent knowledge of network access control technologies, environments, management and monitoring tools associated with EY security systems To qualify for the role, you must have Expert level knowledge and experience with Cisco ISE including database management. 802.1x authentication, the interaction with external authentication mechanisms such as PKI or MFA In depth understanding of enterprise office network environments, including IoT. Knowledge of Windows and Macintosh Operating systems specifically around network access control Maintains awareness of related new and emerging technologies. Reporting and data mining capability, Splunk and MS Sentinel preferred. You must be a Self-starter who can operate without direct supervision on multiple complex projects and tasks in parallel Present complex and difficult messages skilfully, using a variety of media and methods. Produce writing that contains clear, precise descriptive language. Experience with infrastructure implementation/management, service/operations management, etc. Ideally, you’ll also have Bachelor's degree in a technical discipline such as Engineering or Computer Science or a related discipline, plus an industry accreditation or equivalent work experience Demonstrable experience in various aspects of Security technology infrastructure design and implementation. Security related Professional qualifications Service management qualifications [ITIL Foundation] What we look for We look for inclusive, proactive, high achieving team players who show a passion for the technology and services that it delivers. We are a small team, in diverse locations providing a service at global scale. This will necessitate an individual who is flexible in their working patterns with a strong work ethic to do the right thing at the right time – even if that is late evening or at weekends. What working at EY offers We offer a competitive remuneration package where you’ll be rewarded for your individual and team performance. Our comprehensive Total Rewards package includes support for flexible working and career development, and with FlexEY you can select benefits that suit your needs, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 1 week ago
0.0 - 4.0 years
0 Lacs
Bengaluru
On-site
Position Summary Associate Product Analyst analyses and understands the clinical content developed by clinicians for the product and analyses the clinical requirements from the clients. Participate in the definition of strategies to identify target markets, analyse results and manage product life cycle. PRINCIPLE JOB RESPONSIBILITIES: Knowledge of full Content Development Life Cycle (CDLC) with understanding of platforms such as clinical Assessments, sentinel rules package and SSRS Reports. Accountable to own and maintain the functionalities for assigned clinical Assessments, sentinel rule packages and SSRS Reports. Work with clinicians, Product analysts, Implementation analyst, database analysts, development analysts and development leads to document all necessary changes to meet the requirements of the product or project request. Develop and deliver product artefacts such as: product catalogues, business case documents, business requirements documents, product requirements documents/Functional requirement documents, work flows and process documents. Be an expert on assigned product components. Work on Jiva core product track and client specific solutions to meet the requirements. Work with Product Development teams to clarify queries, resolve issues and provide solutions. Be creative and curious to bring new product introduction and continuous enhancements. Provide the critical link between the clinical and technology sides of the organization by effectively identifying and analysing the true needs of business end users. Effectively communicate and apply project standards in accordance with the project. Participating in testing of product releases to ensure that the requirements were interpreted correctly. Responsible for annual reviews of product clinical content. Changes to be identified and reported to the Development Team and to be incorporated according to the Product Standards. Transforming high-level business and user requirements into functional, quality requirements specified in an appropriate level of detail. Representing requirements using alternative views, such as analysis models (diagrams) and scenarios. Business Analysis experience of 0-4 years in a similar work area or healthcare industry. Preferred experience in US healthcare market Education Bachelor's degree/ Master's degree with MBA (preferred) from reputed Univeristy with excellent English communication skills Skills BC - Dependability and Reliability BC - Initiative BC - Time Management FC - Implementation Planning Support - Clients FC - Infrastructure Support - Clients FC - Oral Communication FC - Post Implementation Support - Clients FC - Written Communication Competencies BC - Collaboration & Interpersonal Skills DC - US Healthcare domain Knowledge FC - Analytical Skills FC - Business Analysis FC - Communication Skills FC - Quality PC - Jiva Product Knowledge TC - Documentation Development TC - LDAP / AD Authentication TC - MS Visio TC - Product Catalog Development
Posted 1 week ago
3.0 years
6 - 9 Lacs
Chennai
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cyber Managed Service -Threat Detection & Response - Security Orchestration, Automation and Response (Splunk SOAR) - Senior KEY Capabilities: Excellent teamwork skills, passion and drive to succeed and combat Cyber threats Working with the customer to identify security automation strategies and provide creative integrations and playbooks. Work collaboratively with other team members to find creative and practical solutions to customers’ challenges and needs. Responsible for execution and maintenance of Splunk SOAR related analytical processes and tasks Management and administration of Splunk SOAR platform Developing custom scripts and playbooks to automate repetitive tasks and response actions. Experienced developer with at least 2 + yrs of experience using Python programming language, REST API and JSON. Must have basic SQL knowledge. Knowledge on Incident Response and Threat Intelligence tools. Creation of reusable and efficient Python-based Playbooks. Use Splunk SOAR platform to enable automation and orchestration on various tools and technologies by making use of existing or custom integration Partner with security operations teams, threat intelligence groups and incident responders. Should have worked in a security operations center and gained understanding of SIEM solutions like Splunk, Microsoft Sentinel and other log management platforms. Having experience in Splunk content development will be an added advantage Willing to learn new technologies and take up new challenges. Assist in developing high-quality technical content such as automation scripts/tools, reference architectures, and white papers. Good grasp in conceptualizing and/or implementing automation for business process workflows Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in endpoint protection tools, techniques and platforms such as Carbon Black, Tanium, Microsoft Defender ATP, Symantec, McAfee or others Should be able to assist, support and mitigate production issues. Should have the capability to work with partners and client stack holders to full fill their asks Ability to Coordinate with Vendor to incident closure on according to the severity Review, assess, benchmark and develop issue remediation action plans for all aspects of an engagement. Qualification & experience: Minimum of 3+ years’ experience in cyber security with a depth of network architecture knowledge that will translate over to deploying and integrating Splunk SOAR solution in global enterprise environments. Experience working in ServiceNow SOAR is also an added advantage Strong oral, written and listening skills are an essential component to effective consulting. Strong background in network administration. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary. Should have strong hands-on experience with scripting technologies like Python, REST, JSON, SOAP, ODBC, XML etc. Must have honours degree in a technical field such as computer science, mathematics, engineering or similar field Minimum 2 years of working in SOAR (Splunk) Experience in Process Development, Process Improvement, Process Architecture, and Training Quick to apprehend and adapt new applications. Knowledgeable in Cybersecurity and Incident Response Management Certification in Splunk will be an added advantage Certifications in a core security related discipline will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 1 week ago
0 years
0 Lacs
Chennai
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. CMS-TDR Senior As part of our EY-cyber security team, who shall work as SME for Microsoft Sentinel solutions in TDR team The opportunity We’re looking for Senior Consultant with expertise in Cloud Security solutions. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Your key responsibilities Architecting and implementation of cloud security monitoring platforms MS Sentinel Provide consulting to customers during the testing, evaluation, pilot, production, and training phases to ensure a successful deployment. Perform as the subject matter expert on Cloud Security solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. Securing overall cloud environments by applying cybersecurity tools and best practices Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. Content development which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Skills and attributes for success Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities. Expertise in content management in MS Sentinel Good knowledge in threat modelling. Experience in creating use cases under Cyber kill chain and Mitre attack framework Expertise in integrating critical devices/applications including unsupported (in-house built) by creating custom parsers Below mentioned experiences/expertise on Sentinel Develop a migration plan from Splunk/QRadar/LogRhythm to MS Sentinel Deep understanding of how to implement best practices for designing and securing Azure platform Experiencing advising on Microsoft Cloud Security capabilities across Azure platform Configure data digestion types and connectors Analytic design and configuration of the events and logs being digested Develop, automate, and orchestrate tasks(playbooks) with logic apps based on certain events Configure Sentinel Incidents, Workbooks, Hunt queries, Notebooks Experience in other cloud native security platforms like AWS and GCP is a plus Scripting knowledge (Python, Bash, PowerShell) Extensive knowledge of different security threats Good knowledge and experience in Security Monitoring Good knowledge and experience in Cyber Incident Response To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Demonstrate both technical acumen and critical thinking abilities. Strong interpersonal and presentation skills. Certification in Azure (any other cloud vendor certification is a plus) Ideally, you’ll also have People/Project management skills. What working at EY offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 1 week ago
7.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Job Title: Senior SOC Analyst Department: IT Infrastructure Location: Bangalore / Coimbatore Job Type: Full-Time Experience: 7+ years Immediate joiners or notice period of less than 30days are needed. Job Role: A Senior SOC Analyst is a cybersecurity professional responsible for proactively monitoring, analyzing, and responding to security threats within Logixhealth network and systems. They play a crucial role in detecting, investigating, and containing security incidents, as well as developing and improving security solutions. SOC 24/7, SOC monitoring Role Description: The analyst performs monitoring, research, assessment and analysis on Intrusion Detection and Prevention tools as well as Anomaly Detection systems, Firewalls, Antivirus systems, proxy devices (IPS IDS) which requires demonstrable security incident response experience. Perform initial risk assessment on new threats and vulnerabilities, perform assessment phase of Vulnerability and Threat Management process. Perform assessment as well as troubleshooting and help isolate issues with IDS/IPS sensors, Antivirus Cloud MS O365 Defender, Application monitor control, Mobile management (Intune), Vulnerability scanners Nessus professional ,Qualys PCI DSS scanners or other vulnerability Management tools. Patch management & MS O365 Defender Console monitoring. Participate in daily and ad-hoc conference calls as well as compliance and controls, self-assessment processes and documentation related tasks. Log and event management log monitoring and share the daily report. Exposure to User behavior analytics tools. MS Azure sentinel Vulnerability Management. Compliant / Non-Compliant (Devices) Management using Intune. Application control using MS Cloud App security. Working Knowledge of Taegis Secure works or any XDR/EDR/MDR Products Working Knowledge of Password management tools similar tool Bit warden Microsoft Purview and Entra (Azure AD Identity Management) working knowledge. Key Deliverables: Being Proactive and handling SOC Alerts Provide analysis and trending of security log data from a large number of heterogeneous security devices. Analyze and respond to previously undisclosed software and hardware vulnerabilities Zero Day Exploits Coordinate with Intel analysts on open source activities impacting SLTT governments. Integrate and share information with other analysts and other teams Compliance ISO 27001-2022 ,SOC 2 type 2,HIPAA,Hi-Trust Flexible, quick learning, willing to work 24/7 and rotational shifts. Senior Security analysts are expected to be on-call to respond to incidents that arise outside of business hours Monitor, Manage, Remediate (Vulnerability Management) Advise based Vulnerability advisories (CISA, MS-ISAC,USCERT) and escalate to respective teams. Other duties as assigned Independent worker Able to read and Analyze Counter Threat Intelligence Reports and suggest appropriate actions. Manage SIEM and On board devices and respond to Alerts and Analyze and remediate. Skills: Incident response, Security posture management vulnerability Management in Hybrid environment (Cloud and Onsite) Creating and managing security tools and policies in tools such as SIEM, EDR, and DLP, Exposure to Application vulnerability management, API security. Strong understanding of networking, operating systems, and security technologies. Ability to analyze data, identify patterns, and draw conclusions. Ability to investigate and resolve security incidents effectively. Ability to communicate technical information clearly and concisely with all stakeholders and advise appropriate action. Significant experience in security operations, incident response, and threat analysis. Identifying areas for improvement in security processes and tools. Developing and implementing new security solutions Using threat intelligence to identify and mitigate potential risks. Staying up-to-date on the latest cyber threats and attack vectors. Ability to lead Security Projects and Programs and drive towards closure and stakeholder satisfaction. Other skills: Excellent knowledge of Intrusion Detection (TCP/IP knowledge, and Cyber security), various operating systems (Windows, and web technologies (focusing on Internet security) Ability to read and understand packet level data Intrusion detection and prevention and Network Security Products (IDS/IPS, firewalls, etc) Host Security Products (HIPS, AV, scanners, XDR,EDR) Knowledge of threats and technologies effecting Web Application vulnerabilities and recent internet threats Exposure on Vulnerability assessment as well as penetration testing Preferred Certifications from EC-Council, GIAC, (ISC)² are preferred [CISSP, CEH, GCIA, CCNA-Security] Good knowledge of forensics and Log analysis. Incident response and remediation Knowledge of Playbooks. Qualification: Any degree/BE/B. Tech (computer science, Cybersecurity) with technical certification from EC-Council, GIAC, (ISC)² [CISSP, CEH, GCIA, CCSP, CCNA-Security] Show more Show less
Posted 1 week ago
0 years
0 Lacs
India
On-site
We are seeking a highly skilled and motivated Cyber Security Engineer to join our dynamic team. In this role, you will be responsible for developing, implementing, and managing security measures to protect our clients’ sensitive data and ensure compliance with regulatory requirements, including HIPAA and NIST frameworks. The ideal candidate will have a strong background in cybersecurity, with deep expertise in HIPAA compliance , NIST standards , and relevant industry best practices. Key Responsibilities: Security Design & Implementation: Design, implement, and maintain secure network systems, applications, and infrastructure for client environments, ensuring compliance with HIPAA and NIST standards. Risk Assessment & Vulnerability Management: Perform regular risk assessments and vulnerability testing to identify potential threats to systems and data. Develop and implement remediation strategies. Compliance & Documentation: Ensure all security processes and activities are aligned with HIPAA, NIST, and other relevant industry standards. Maintain comprehensive documentation related to security policies, incidents, and procedures. Incident Response & Monitoring: Monitor systems for security breaches and respond to security incidents swiftly, following best practices for remediation. Lead the investigation and analysis of security incidents, including forensic analysis. Policy & Process Development: Develop and implement security policies, procedures, and practices that align with HIPAA and NIST guidelines. Collaborate with other teams to ensure that security is integrated across all operations. Security Audits & Reporting: Perform periodic security audits and assessments to evaluate the effectiveness of security controls. Prepare reports for internal stakeholders and regulatory bodies as needed. Collaboration & Training: Work closely with IT, operations, and management teams to ensure cybersecurity best practices are followed across the organization. Provide training and awareness programs on security protocols and compliance. Required Skills & Experience: Proven experience in cybersecurity roles with a focus on HIPAA compliance and NIST cybersecurity frameworks . In-depth knowledge of industry regulations, including HIPAA, NIST, PCI DSS, and other security standards . Strong experience with security technologies (firewalls, intrusion detection/prevention systems, VPNs, etc.). Familiarity with cloud security platforms and services (AWS, Azure, Google Cloud). Hands-on experience with security monitoring tools and SIEM solutions (Splunk, Sentinel, etc.). Expertise in encryption technologies, vulnerability management, and identity access management. Proficiency in security best practices and disaster recovery planning. Strong analytical and problem-solving skills with attention to detail. Ability to work under pressure, manage multiple tasks, and meet deadlines. Preferred Qualifications: Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified HIPAA Professional (CHP) Experience with incident management and recovery procedures. Familiarity with security automation and orchestration tools. Show more Show less
Posted 1 week ago
7.0 - 9.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Role Description L3 SOC Analyst - Sentinel and Defender Experience : 7 to 9 years Location : Bangalore/Hyderabad/Chennai/Trivandrum/Kochi Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. Must-Have Skills Experience with SIEM tool Sentinel and EDR tool Defender Incident response and threat hunting expertise Strong knowledge of attack patterns, Tools, Techniques, and Procedures (TTPs) Experience in writing procedures, runbooks, and playbooks Strong analytical and problem-solving skills Hands-on experience with system logs, network traffic analysis, and security tools Proficiency in identifying Indicators of Compromise (IOCs) and Advanced Persistent Threats (APTs) Good-to-Have Skills Experience setting up SIEM solutions and troubleshooting connectivity issues Familiarity with security frameworks and best practices Ability to collaborate with IT and security teams effectively Responsibilities Act as an escalation point for high and critical severity security incidents Conduct in-depth investigations to assess impact and understand the extent of compromise Analyze attack patterns and provide recommendations for security improvements Perform proactive threat hunting and log analysis to detect potential threats Provide guidance on mitigating risks and improving security hygiene Identify gaps in security processes and propose enhancements Ensure end-to-end management of security incidents Document and update incident response processes and define future outcomes Participate in war room discussions, team meetings, and executive briefings Train team members on security tools and incident resolution procedures Show more Show less
Posted 1 week ago
9.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Role Description Cyber Threat Hunter Experience : 9 to 12 years Location : Bangalore/Hyderabad/Chennai/Trivandrum/Kochi Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence We are looking for a highly skilled and analytical Threat Hunter to proactively detect and mitigate advanced cyber threats. This role involves deep investigation into potential threats, identifying patterns of malicious activity, and developing detection strategies to enhance our security posture. Key Responsibilities Threat Hunting: Conduct proactive threat hunts using SIEM, EDR, and threat intelligence tools. Identify anomalies, suspicious behaviors, and indicators of compromise (IOCs) across endpoints, networks, and cloud environments. Detection Engineering Develop and refine detection rules, queries, and scripts to identify malicious activity. Collaborate with SOC and incident response teams to validate and operationalize findings. Threat Intelligence Integration Leverage internal and external threat intelligence to inform hunting hypotheses. Map findings to frameworks like MITRE ATT&CK and cyber kill chain. Incident Investigation Assist in deep-dive investigations of security incidents and root cause analysis. Provide detailed reports and recommendations for remediation and prevention. Collaboration & Reporting Work closely with blue and red teams to improve detection capabilities. Document hunting methodologies, findings, and lessons learned. Required Skills & Qualifications Bachelor’s degree in Cybersecurity, Computer Science, or related field. 3+ years of experience in threat hunting, incident response, or SOC operations. Proficiency with tools such as Defender, Sentinel, SentinelOne. Strong understanding of attacker TTPs, malware behavior, and network protocols. Experience with scripting (Python, PowerShell, etc.) for automation and analysis. Familiarity with MITRE ATT&CK, threat modeling, and behavioral analytics. Preferrd Certifications GIAC Cyber Threat Intelligence (GCTI) GIAC Threat Hunting (GCTH) Certified Ethical Hacker (CEH) Offensive Security Certified Professional (OSCP) Show more Show less
Posted 1 week ago
5.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Role Description L2 SOC Analyst - Sentinel and Defender Experience : 5 to 7 years Location : Bangalore/Hyderabad/Chennai/Trivandrum/Kochi Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence Key Roles & Responsibilities Resolve, escalate, report, and raise recommendations for resolving and remediating security incidents Handle the advanced monitoring of system logs, SIEM tools, and network traffic for unusual or suspicious activity Set up SIEM solutions and troubleshoot connectivity issues Investigate and resolve security violations by providing post-mortem analysis to illuminate issues and possible solutions Collate security incident and event data to produce monthly exception and management reports Report unresolved network security exposure, misuse of resources, or noncompliance situations using defined escalation processes Assist and train team members in the use of security tools, the preparation of security reports, and the resolution of security issues Develop and maintain documentation for security systems and procedures Recommend, schedule, and apply fixes, security patches, and any other measures required, in the event of a security breach Experience & Qualifications Required Minimum 3+ years of experience as an Analyst working as part of a SOC team Experience with SIEM (Sentinel) and EDR tool (Defender) and have Nozomi experience in the OT side. Experience in incident response, and in writing procedures runbooks and playbooks Ability to work with customer’s IT and security teams Skills SOC Monitoring,Communication,Cyber Security,Nozomi Show more Show less
Posted 1 week ago
2.0 - 3.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Role Description L1 SOC Analyst - Sentinel Experience : 2 to 3 years Location : Bangalore/Hyderabad/Chennai/Trivandrum/Kochi Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. Main Tasks And Accountabilities Resolve, escalate, report, and raise recommendations for resolving and remediating security incidents. Be an escalation point for investigations of clients and suggest optimization activities to improve their performance. Proactively monitor and review threats and suspicious events from customers participating in the service. Handle the advanced monitoring of system logs, SIEM tools, and network traffic for unusual or suspicious activity Set up SIEM solutions and troubleshoot connectivity issues. Investigate and resolve security violations by providing post-mortem analysis to illuminate issues and possible solutions. Collate security incident and event data to produce monthly exception and management reports. Report unresolved network security exposure, misuse of resources, or noncompliance situations using defined escalation processes. Assist and train team members in the use of security tools, the preparation of security reports, and the resolution of security issues. Develop and maintain documentation for security systems and procedures. Maintain excellent customer satisfaction through professional, proactive and personal service What do we expect from you? University Degree in Cyber Security / Bachelor’s in Science or Engineering with training in cyber security Experience in SIEM tool (Sentinel) and EDR tool (Defender) Having worked in a SOC before would be an advantage. Up to date in cyber security s and incidents. Intermediate understanding of enterprise IT Infrastructure including Networks Firewalls OS Databases Web Applications etc. Understanding of ISMS principles and guidelines; relevant frameworks (e.g. ISO27001) Desirable – Training / Certification in Ethical Hacking SIEM Tool etc. Show more Show less
Posted 1 week ago
7.0 - 9.0 years
0 Lacs
Kochi, Kerala, India
On-site
Role Description L2 SOC Lead Experience : 7 to 9 years Location : Bangalore/Trivandrum/Kochi Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence Cyberproof is looking to hire a L2 team Lead for managing the existing shared services team. Role Proficiency SOC Analyst L2 is an operational role, focusing on ticket quality and security incident deeper investigation and will be responsible to handle the escalated incidents from Level 1 team within SLA. The lead will be responsible for quality and ensuring processes are defined globally across all customers in Cyberproof. Responsibilities SOC Analyst L2 would work closely with SOC L1 team, L3 team & customer and responsible for performing deeper analysis and need to interact with client in daily calls and need to take the responsibility of handling the True Positive incidents on time. When L1 escalates an incident to L2, need to conduct more analysis and, if needed, escalate to the customer/L3 team, or L2 analyst must advise L1 team members until the incident is resolved. Perform deep analysis to security incidents to identify the full kill chain Handle L2 and above level technical escalations from L1 Operations team and resolve within SLA. Identify the security gaps and need to recommend new rules/solution to L3/Customer Need to suggest finetuning for existing rules based on the high count/wherever required Create and manage the Incident handling playbook, process runbooks and ad-hoc documents whenever needed Respond to clients’ requests, concerns, and suggestions Proactively support L1 team during an incident. Performs and reviews tasks as identified in a daily task list. Ready to work in 24x7 rotational shift model including night shift Incident detection, triage, analysis and response. Coordinating with customers for their security related problems and providing solutions. Share knowledge to other analysts in their role and responsibilities Provide knowledge transfer to L1 such as advance hunting techniques, guides, cheat sheets etc Knowledge Experience Experience of Managing L2 resources in a multi-location basis. Minimum of 3 years of experience in Cyber security, SOC At least 2 years of working in the SOC Proficient in Incident Management and Response Experience in leading a team of more than 9 analysts Experience in searching and log analysis in at least 2 of the below SIEM tools or more than 3 SIEM in total: Sentinel, QRadar, Splunk, LogRhythm, Google Chronicle Experience in analysis and response in at least 2 of the below EDR tools or more than 3 EDR in total:Crowd strike, MS Defender, Carbon Black, Cybereason, Sentinel One In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc. Up to date in cyber security and incidents; intermediate understanding of enterprise IT Infrastructure including Networks Firewalls OS Databases Web Applications etc. Understanding of ISMS principles and guidelines; relevant frameworks (e.g. ISO27001) Desirable – Training / Certification in Ethical Hacking/SIEM Tool etc. Additional Desired Skills Strong verbal and written English communication Strong interpersonal and presentation skills Ability to work with minimal levels of supervision Responsible for working in a 24x7 Security Operation centre (SOC) environment. Essential Skills Knowledge and hands-on experience with Azure Sentinel, Microsoft 365 Defender, Microsoft Defender for Cloud Apps & Identity Protection. Continuous Learning Innovation And Optimization Ensure completion of learning programs as suggested by Managers Suggest ideas that will help innovation and optimization of processes. Help develop the ideas into proposals. Provide suggestions to reduce the manual work Teamwork Assist L1 team members where possible. Show more Show less
Posted 1 week ago
0.0 - 1.0 years
0 Lacs
Bengaluru, Karnataka
On-site
· To maintain a clean and sterile OT. · To check equipment and take necessary action. · To maintain the sterility of instruments. · To see that the trolleys are set for each procedure with enough and correct instruments, sutures, linen etc. · To assist the surgeon in the procedure. · To be the nurse –advocate of the patient. · To take over and hand over the patient to the floors/ICU. · To count the instruments and swab before closing the operated part. · To check the specimen is send to lab with correct label and request. · To see that the instruments are washed, packed and autoclaved for the next use. · Maintain hospital infection control protocols. · To maintain the OT records. · Responsible for maintaining temperature, humidity and air changes as per defined norms. · Report any Incidence occurrence and sentinel events. · Checking daily inventory. Assist the incharge to maintain the quality indicator data. Job Type: Full-time Pay: ₹25,000.00 - ₹36,000.00 per month Benefits: Provident Fund Schedule: Night shift Rotational shift Experience: Registered Nurse: 1 year (Required) License/Certification: Karnataka Nursing Council (Required) Work Location: In person
Posted 1 week ago
4.0 - 7.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Description Description This is a full-time position that requires strong experience and knowledge on Windows Servers, Azure technologies such as Entra ID, Storage accounts, App services etc with understanding of other clouds like AWS and GCP. T he Senior Systems Administrator will be responsible for configuring, deploying, monitoring and managing in Trinity’s Infrastructure hosted on Azure, AWS and GCP. Additionally, the Senior Systems Administrator will be responsible for ensuring the proper backup are in place of Infrastructure regardless of the platform. This position also includes the responsibility of vulnerability and patch management. The Senior Systems Administrator will be working directly with other departments of organization when and where needed. Technical Skills : Strong knowledge of Microsoft Windows operating systems. Strong experience with Azure cloud technologies such as (but not limited to) Azure Entra ID, App service, Databricks, Storage Account, Virtual Machine, Azure recovery services, networking components. Strong knowledge of Enterprise applications and SSO configurations. Knowledge of security tools management such as Zscaler, Sentinel One or any other. Strong experience in backup administration using tools such as Veeam Backup. Strong experience in monitoring tools such as SolarWinds, Logic Monitoring etc. Strong understanding of Networking protocols such as DNS, DHCP, TCP/IP, HTTP/HTTPS and SFTP. Strong knowledge of Patch management and vulnerability remediation. Should have knowledge of Automations using PowerShell scripting. Should be good in maintaining SOPs and documentation. Should be well versed with ITIL process and ticketing tool such as Service-Now. Technical Skills (Good to Have): Experience in Linux operating systems troubleshooting. Experience with SOC or other common IT regulatory standards. Experience with AWS/GCP cloud services. Experience in Office365 Administration and support Experience on GitHub Experience on Azure DevOps. Basic understanding of network management on Cisco switches and firewalls. Qualifications Education: B.E/BTech in Computer Science or related field Work Experience: 4 to 7 years of hands-on experience on system administration, network management, and security protocols on Azure cloud. The ideal candidate will have a proven track record of managing complex systems and ensuring their reliability, security, and performance. Show more Show less
Posted 1 week ago
0 years
0 Lacs
Pune/Pimpri-Chinchwad Area
Remote
Company Description WNS (Holdings) Limited (NYSE: WNS), is a leading Business Process Management (BPM) company. We combine our deep industry knowledge with technology and analytics expertise to co-create innovative, digital-led transformational solutions with clients across 10 industries. We enable businesses in Travel, Insurance, Banking and Financial Services, Manufacturing, Retail and Consumer Packaged Goods, Shipping and Logistics, Healthcare, and Utilities to re-imagine their digital future and transform their outcomes with operational excellence.We deliver an entire spectrum of BPM services in finance and accounting, procurement, customer interaction services and human resources leveraging collaborative models that are tailored to address the unique business challenges of each client. We co-create and execute the future vision of 400+ clients with the help of our 44,000+ employees. Job Description Must Have Skills Windows Servers | Domain Controllers | Active Directory | Azure Active Directory | Group Policy Enterprise Proxy Solution - Preferably Zscaler or Netskope. Inline CASB, Web DLP. Zero Trust Platform (Zero Trust Application Access / Zero Trust Remote VPN) Privilege Access Management (PIM/PAM) Basics of hardware, networking, IP addressing, VLAN, LAN, WAN, MPLS Endpoint Security Management. Preferably EDR/XDR CS Falcon, Sentinel One, MS Defender for Endpoint, DLP, ATP, Web Security. Good in Soft skills, logical and analytical thinking, troubleshooting and problem management, ticketing systems, SLA Management, Good to have Azure information protection Microsoft Enterprise Mobility and Security Office 365 Security administration Cloud Computing Basics with Azure / AWS Security administration Web Application Firewall management. Qualifications Basic Graduation and Proficiency in technology areas mentioned. Professional Certifications would be an added advantage. Qualifications Basic Graduation and Proficiency in technology areas mentioned. Professional Certifications would be an added advantage. Show more Show less
Posted 1 week ago
5.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Cloud Security Architecture Good to have skills : Microsoft Azure Security, Hybrid Cloud Security Minimum 5 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Summary: As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. Your typical day will involve collaborating with various teams to ensure the security of information and infrastructures, while also addressing potential cyber threats. You will engage in proactive measures to safeguard business processes and contribute to the overall security posture of the organization, ensuring that all systems are resilient against evolving cyber risks. Roles & Responsibilities: - Expected to be an SME. - Collaborate and manage the team to perform. - Responsible for team decisions. - Engage with multiple teams and contribute on key decisions. - Provide solutions to problems for their immediate team and across multiple teams. - Conduct regular security assessments and audits to identify vulnerabilities. - Develop and implement security policies and procedures to enhance organizational security. - Design, implement, and manage baseline security controls for cloud environments (Azure, GCP) - Develop and enforce security policies using Infrastructure as Code (IaC) and Policy as Code (PaC) principles - Collaborate with development, operations, and security teams to integrate security measures into the DevSecOps toolchain - Conduct security assessments of cloud infrastructure to identify vulnerabilities and ensure compliance with security standards - Implement automated security testing and monitoring solutions to detect and respond to security incidents - Provide guidance and best practices for secure coding and configuration management - Stay updated with the latest security threats, vulnerabilities, and industry trends to continuously improve security posture - Document security policies, procedures, and incident response plans Professional & Technical Skills: - Must To Have Skills: Proficiency in Cloud Security Architecture. - Good To Have Skills: Experience with Hybrid Cloud Security, Microsoft Azure Security. - Strong understanding of security frameworks and compliance standards. - Experience with risk assessment and management methodologies. - Familiarity with security tools and technologies for threat detection and response. - Proven experience (min. 3 years) in cloud security with focus on GCP and Azure - Strong understanding of Infrastructure as Code (IaC) and Policy as Code (PaC) concepts - Proficiency in security tools and frameworks (e.g., Terraform, Sentinel) - Experience with DevSecOps practices and tools - Certification in cloud security (e.g., GCP Professional Cloud Security Engineer, Azure Security Engineer) - Experience with security compliance standards (e.g., ISO 27001, SOC 2, GDPR) - Knowledge of containerization and orchestration technologies (Docker, Kubernetes) Additional Information: - The candidate should have minimum 5 years of experience in Cloud Security Architecture. - This position is based at our Hyderabad office. - A 15 years full time education is required. Show more Show less
Posted 1 week ago
13.0 years
0 Lacs
Indore, Madhya Pradesh, India
On-site
Technical Specialist - Windows Admin - L3 JOB PURPOSE: Seeking a highly skilled and experienced Windows Admin L3 professional to join our team. The ideal candidate will be responsible for the advanced management, troubleshooting, and support of Windows-based systems. This role demands expertise in Server Administration , Patch Management , Vulnerability Management , Performance Management, Windows Hardening and Security , Active Directory , Backup administration , and Storage Management . EXPERIENCE: Overall Experience : 10–13 years, Relevant Experience : 8–10 years, with a minimum of 3–5 years in L3-level roles RESPONSIBILITIES (INCLUDES ALL TASKS): We are seeking a highly skilled and experienced Windows Admin L3 professional to join our team. The ideal candidate will be responsible for the advanced management, troubleshooting, and support of Windows-based systems. This role demands expertise in Server Administration , Patch Management , Antivirus & Vulnerability Management , Active Directory , Backup administration , and Storage Management . Candidates with additional knowledge of Linux environments will have a competitive edge. Key Responsibilities: Windows Server Administration : Manage and support Windows server environments at an advanced level. Provide Level 3 troubleshooting and resolution for complex system issues. Virtualization and Windows cluster administration Windows Server Upgrade and Migration management Patching and Updates : Plan, implement, and manage patching activities using tools like ManageEngine or SCCM . Ensure compliance with security standards and operational policies. Security: Windows Hardening and Security Vulnerability mitigation management Antivirus administration (Ex: Sentinel, TrendMicro) Active Directory (AD) : Administer, optimize, and troubleshoot Active Directory (AD) and Group Policy Objects (GPO) . Maintain security and best practices for AD management. Backup and Disaster Recovery : Manage backup and disaster recovery processes using Veeam solutions. Safeguard data integrity and availability through robust disaster recovery procedures. System Monitoring and Optimization : Proactively monitor system performance, identify issues, and implement enhancements. Handle critical incidents swiftly to minimize downtime. Documentation and Reporting : Maintain comprehensive documentation for system configurations, processes, and updates. Generate detailed reports on system performance, backup activities, and patch management status. Collaboration and Teamwork : Collaborate with cross-functional teams to ensure smooth IT services integration. Provide mentorship and guidance to junior team members Show more Show less
Posted 1 week ago
2.0 - 5.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Are you a passionately curious individual who possesses a steady and unshakable eye for detail? Are you not afraid of searching for a needle in the stack of hay? Do you think you have the skillset, knowledge, to be the first line of defense between cyber adversaries and the organization? Do you believe in working for a mission to protect your organization 365*24*7? If you are in love with the tools and technology that help you to solve this daunting challenge, then we are looking for you. Who we are? Payatu is a GPTW certified company where we strive to create a culture of excellence, growth and innovation that empowers our employees to reach new heights in their careers. We are young and passionate folks driven by the power of the latest and innovative technologies in IoT, AI/ML, Blockchain, and many other advanced technologies. We are on the mission of making Cyberworld safe for every organization, product, and individual. What we look for outside work parameters? Your expertise is your primary qualification, not your degree or certification. Your publicly known contributions are your credentials . Your write-up and blogs reflect your interests and ethics. You are a perfect technical fit if: At least 2 to 5 years of experience handling SIEM tools ( Splunk ), Incident Response. Knowledge and Hands-on experience on Security appliances like (IPS, Proxy, XDR/EDR, Email Security Gateway, Cloud Access Security Broker). Experience in Security Orchestration and Automation. Should possess strong working knowledge of Power BI, Tableau, and Power Automate. Should have good knowledge of one or more programming/scripting languages like Python, Go, PowerShell, Bash. Have good experience in handling IT Security incidents, phishing analysis, triaging and analyzing malware, developing and fine-tuning use cases. Experience in host and network forensics. Experience in analyzing logs and should have hands-on experience in Windows and Linux. Should have experience in working on and monitoring cloud environment [ AWS & Azure] . Should have experience on Entra ID, Microsoft Defender, Sentinel, KQL. You Have All Our Desired Qualities, if: You like scripting and automating stuff. You like writing tools. You have excellent written and verbal communication skills and the ability to express your thoughts clearly. You have the skill to articulate and present technical things in business language. You can work independently as well as within a team. You have strong problem solving, troubleshooting, and analysis skills. You are passionate about your area of expertise and self-driven. You are comfortable working in a dynamic and fast-paced work environment. You are Self-driven, proactive, hardworking, team-player. You are working on something on your own in your field apart from official work. Your everyday work will look like: Automation & Orchestration: Automate mundane and repetitive tasks to improve existing workflows and improve response times. Engineering: Create custom solutions for various Incident Response activities as per business requirement. Incident Response activities: Identity, investigate and respond to potential security incidents to minimize the operational and organizational impact. Malware Analysis: Analyse and triage the malware found on the system. Forensics: Perform forensic analysis on system and network artifacts to identify indicators of compromise. Identify Gaps: Investigate and document gaps in controls, event data, and work with internal teams to resolve. Process Improvement: Execute, develop, and document Incident Handling Guides and processes. Show more Show less
Posted 1 week ago
5.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Hi, Exp: 5-10 Years Minimum of 4+ years’ experience with Microsoft DLP (Microsoft Defender /MS Purview & Compliance) and Microsoft Sentinel tool equivalent with other similar data leakage tool etc.) · Must have hands on experience for data loss product evaluations, building and implementing it, operationalize and integrating with existing systems for effective and efficient use and providing technical support and stakeholder management experience. · Must have hands-on experience with rule creation and maintenance, antispam and anti-phishing administration, report analysis and providing recommendations of future configurations and rules · Exposure/ knowledge of Data Loss Prevention integration with SIEM technologies (i.e.: Splunk, HP ArcSight, etc.) · Knowledge of programming languages a plus (i.e.: Java, .NET, Python, etc.) Top 3 Skills Required MS Purview & Compliance (MS DLP) MS Sentinel Basic scripting for automation If interested please share resume at deepika.eaga@quesscorp.com Show more Show less
Posted 1 week ago
10.0 years
0 Lacs
India
On-site
Role Overview We at viamagus are looking for an experienced and visionary Head of Engineering to lead, scale, and inspire our growing technology team. In this pivotal role, you will define the company’s technical strategy and engineering roadmap, working closely with founders and senior stakeholders to build a world‑class engineering culture that delivers high‑impact products and services. This is a hands‑on leadership position where you will ensure engineering excellence, drive fast iteration, and build scalable systems in a cloud‑first environment. If you are passionate about architecting robust solutions, mentoring teams, and balancing product innovation with service delivery, we want to hear from you. Key Responsibilities Technical Strategy & Execution Define and drive the overall technology vision and roadmap. Establish engineering processes that enable rapid, high‑quality release cycles and continuous improvement. Champion modern best practices and foster a culture of innovation and experimentation. Architecture & Scalability Lead architectural design reviews to ensure systems are scalable, secure, and maintainable. Provide hands‑on technical guidance on key design decisions, code reviews, and infrastructure choices. Oversee cloud deployment strategies, performance tuning, and cost optimization. Team Leadership & Development Hire, mentor, and retain top engineering talent, building a high‑performance culture of ownership and collaboration. Develop engineers and future leaders through coaching, feedback, and clear growth paths. Cultivate an inclusive environment that values continuous learning and knowledge sharing. Cross‑Functional Collaboration Partner with Product, Design, QA, and Delivery teams to translate business requirements into robust technical solutions. Align engineering initiatives with broader company goals and client commitments. Act as a technical representative in stakeholder meetings, customer pitches, and due‑diligence calls. Delivery & Operational Excellence Own end‑to‑end execution of engineering projects, ensuring on‑time and on‑budget delivery. Define and uphold standards for code quality, automated testing, CI/CD, and documentation. Lead incident management and root‑cause analysis for critical issues, driving continuous reliability improvements. Product Lifecycle Ownership Guide the team through the full product lifecycle—from concept and design to deployment and production support. Ensure clear technical documentation, timely progress updates, and smooth handovers across all stages. Measure and improve post‑launch success through observability, user feedback, and iterative enhancements. Must‑Have Qualifications 5–10 years of software engineering experience, including several years in senior leadership (Engineering Manager, Head of Engineering, or similar). Proven track record of building multiple applications from scratch to production , including post‑launch scaling and hardening. Deep expertise in at least 2-3 of our core technologies ( Node.js, React/React Native, Python, MySQL ) and solid competence in the rest. Hands‑on experience designing and deploying cloud‑based, scalable architectures (AWS or Azure) with strong knowledge of networking, security, CI/CD, container runtimes, and cost optimization. Strong command of microservices, domain‑driven design, event sourcing, caching layers, and data modeling Proficiency with observability and APM tools (Datadog, New Relic, Grafana, OpenTelemetry) and the ability to turn metrics into actionable improvements. Exceptional troubleshooting skills—comfortable diving into performance profiles, memory leaks, and distributed‑system edge cases. Excellent written and verbal communication; able to align executives, engineers, and clients around a shared technical vision. Bachelor’s degree in Computer Science, Engineering, or related field (Master’s preferred). Good‑to‑Have / Bonus Skills Prior experience building agentic or AI‑driven products (LLM orchestration, vector databases, RAG pipelines). Hands‑on knowledge of mobile CI/CD (Fastlane, EAS) and app‑store delivery workflows. Familiarity with infrastructure‑as‑code (Terraform, Pulumi) and policy‑as‑code (OPA, Sentinel). Exposure to data‑streaming tech (Kafka, Pulsar) and real‑time protocols (WebSockets, MQTT). Experience guiding organizations through security/compliance frameworks (SOC 2, ISO 27001). Contributions to open‑source projects, tech conferences, or developer communities. Technical Stack & Tools Backend: Node.js (JavaScript/TypeScript) and Python for APIs and services (Express, NestJS, Django, Flask). Frontend: React.js for web and React Native for mobile; state management via Redux or Context API. Database: RDS Databases Mysql, MsSql, PostgreSql; familiarity with NoSQL stores (e.g., MongoDB) and ORM/ODM frameworks is a plus. Cloud & DevOps: AWS/Azure/GCP infrastructure, Docker, Kubernetes, and CI/CD pipelines (Jenkins, GitHub Actions). Monitoring with Datadog, CloudWatch, or similar. Show more Show less
Posted 1 week ago
8.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Skills: Solution Engineer Cyber Security, SIEM SOAR Threat Hunting EDR Deception NTAA NBAD UEBA, IBM Splunk Qradar Email Security Gateway, Detection Engineer MITRE ATT&CK Framework OS Linux Networking, Implementing Cybersecurity Solutions, CISSP CEH GCIH OSCP OSCE, PreSales Solution Delivery, Greetings from Netsach - A Cyber Security Company. Currently we are looking for experienced, dynamic professionals for Solution Engineer role . This position plays a vital role in designing and implementing cybersecurity solutions to our esteemed clients. Job Title: Solution Engineer Location Hyderabad, Bangalore Desired Qualification B.Tech or BE Computers / MCA. Experience 8+ years ( Hands on Experience) Employment Type Full Time Certifications from CISSP, CEH, GCIH, OSCP, OSCE is a plus. Job Requirements Minimum 3 years experience working in a large-scale IT environment with focus on Cyber / Information Security. Areas of expertise should include Pre-Sales support, Service & Solution delivery, part of program management (Transition & Transformation). Key areas of expertise should include knowledge in SIEM, SOAR, Threat Hunting, EDR, Deception, NTA, NBAD, UEBA. 3+ years of hands-on experience on leading analytical platforms like Splunk, IBM QRadar, Hunters, Sumo Logic, Sentinel. Knowledge of other security technologies (such as Email Security Gateway, SOAR, IPS/IDS, Proxy, EDR, TI, DLP, CASB, PAM etc.) will be an added advantage. Deep understanding of Detection Engineering, MITRE ATT&CK Framework. Strong knowledge of OS (Linux, Windows) and Networking. Strong analytical and problem-solving skills. Staying up to date with IT/OT industry. Knowledge of Security Best Practices and Concepts. Seasoned in Digital Forensics, Malware Assessment, Incident Response and Threat Hunting. Good interpersonal skills clear communication, attentive & careful listening, empathetic behavior, being positive, supporting useful ideas & honest efforts of colleagues, being positive. Reliability and overall good communication skills both verbal and written. Capability to communicate and listen to needs from organizational or client stakeholders. Job Responsibilities Defining, Planning, and Implementing Cybersecurity Solutions. Conduct gap analysis in identifying and measuring the difference between the current state and the desired state of an organizations security posture. Possess detailed knowledge about requirement management and solution designing. Conduct technical, proof-of-concept (POC) demonstration to highlight solution ensuring alignment to organizational requirements. Translating technical solutions into business values in alignment with organizational objectives to enhance business efficiency. Respond to complex RFPs, delivering customized security solutions that meet client needs. Conduct thorough and meticulous design and implementation of security solutions across diverse industries. Conduct Competitive analysis, security workshops, technical briefing and executive presentations. Designing and presenting customized cybersecurity solutions that address specific client needs. Collaborate with cross-functional teams, to ensure end to end service delivery of Cybersecurity Solution as per client needs. Develop scenarios or use cases based on potential attacks on data relevant to the clients industry. Nice To Have Ethical hacking certifications or CISSP or GCIH or training is a major advantage. Thank You Emily Jha emily@netsach.co.in Netsach - A Cyber Security Company www.netsachglobal.com Show more Show less
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2