Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
0 years
0 Lacs
Bangalore Urban, Karnataka, India
On-site
What Success Looks Like In This Role Analyzing network traffic to identify compromised systems, negate denial of service attacks, and pinpoint resource abuse. Incorporate threat intelligence feeds into Microsoft Sentinel to enhance threat detection and response capabilities. Develop and implement security automation scripts and playbooks in Microsoft Sentinel to streamline security operations. Create reports and documentation related to security incidents, investigations, and overall security posture. Supporting priority incident investigations and threat intelligence discoveries with hunting expertise to identify the extent of any potential compromise. Respond to security incidents by containing, eradicating, and recovering from them using Microsoft Defender's tools and features. Educate users and colleagues about cybersecurity best practices and the use of Microsoft Defender. Perform onboarding and offboarding defender agents. Troubleshoot Defender agents not reporting to the portal Conduct investigations using EDR and live response Conduct Vulnerability Assessment using Defender. Investigate, identify, and prevent or mitigate abusive activities such as intrusion attempts, DDoS, malware distribution, phishing attacks, etc. Monitoring threat/vulnerability landscape and security advisories Appropriately manage time and customer issues based on issue severity and business needs Continuously monitors the security alerts queue, triages security alerts Monitors health of customer security sensors and SIEM infrastructure Ensures documented processes and procedures are relevant and up to date Investigate, document, and report on any security threat issues as well as emerging trends Enabling a world-class cyber defense program by working closely with other technical, vulnerability management, incident management, intelligence analyst and forensic personnel to develop a fuller understanding of the intent, objectives, and activity of cyber threat actors, and ultimately drive improvement to the organizations’ overall security posture Notify appropriate business stakeholders about serious security events, implement security improvements by assessing current situation, evaluating market trends, and anticipating requirements Perform threat hunting and threat analysis Monitor, detect, and analyze network threats Employ automation to aid in research and hunting tasks Write blogs and papers related to threat hunting and analysis Investigate, document, and report all security issues to contribute to incident response You will be successful in this role if you have: Qualifications Key Qualifications A Bachelor’s or Master's degree from a university (preferably in Computer Science, Engineering, or a related discipline), or equivalent security industry work experience Unisys is proud to be an equal opportunity employer that considers all qualified applicants without regard to age, blood type, caste, citizenship, color, disability, family medical history, family status, ethnicity, gender, gender expression, gender identity, genetic information, marital status, national origin, parental status, pregnancy, race, religion, sex, sexual orientation, transgender status, veteran status or any other category protected by law. This commitment includes our efforts to provide for all those who seek to express interest in employment the opportunity to participate without barriers. If you are a US job seeker unable to review the job opportunities herein, or cannot otherwise complete your expression of interest, without additional assistance and would like to discuss a request for reasonable accommodation, please contact our Global Recruiting organization at GlobalRecruiting@unisys.com or alternatively Toll Free: 888-560-1782 (Prompt 4). US job seekers can find more information about Unisys’ EEO commitment here. Show more Show less
Posted 1 week ago
5.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Role Description Years of Experience: At least 5+ years in the cybersecurity field. Expertise: Strong experience with Azure Cloud technologies and expert-level script development, preferably KQL scripts. The prerequisites for an Azure SIEM Engineer profile typically include: Hands-on administration of Microsoft Azure and hybrid environments. Technical Knowledge: Strong familiarity with compute, network, and storage in Azure and Microsoft Entra, Sentinel Architecture. Certification: Azure Security Engineer Associate certifications like AZ 500, SC 200, Other SIEM certifications are a plus. Skills: Ability to manage identity and access, secure networking, and secure compute, storage, and databases. Knowledge: Detailed practical knowledge of Internet protocols, firewalls, proxies, and intrusion detection/prevention systems, SIEM etc. Onboarding new devices to Sentinel, taking care of Parsing etc. Develop and maintain relevant custom scripts/connectors for various device integration Familiarity in working & Creation of new SOC Run Books. Skills Cyber security, Azure Cloud Technologies Show more Show less
Posted 1 week ago
3.0 - 5.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Your potential, unleashed. India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks Your work profile As Assistant Manager in our Cyber Team you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: - We are looking for a skilled Cribl Data Engineer to design, manage, and optimize data pipelines that process and route machine data at scale. The ideal candidate will have hands-on experience with Cribl Stream , Cribl Edge , or Cribl Search , and a strong understanding of telemetry data workflows, observability tools, and data platforms like Splunk, Sentinel, Elastic, or S3. Design and build streaming data pipelines using Cribl Stream for routing, transforming, and enriching logs, metrics, and trace data. Configure data sources (e.g., Syslog, HEC, TCP, S3, Kafka) and destinations (e.g., Splunk, Sentinel, Elasticsearch, Data Lakes). Develop pipelines, routes, packs, and knowledge objects using Cribl’s UI and scripting features. Optimize data ingestion workflows to reduce costs, improve performance, and enhance data usability. Implement filtering, masking, sampling, and transformation logic using Cribl Functions (Regex, Eval, Lookup, JSON, etc.). Work with SIEM and observability teams to ensure clean, enriched, and correctly formatted data flows into tools like Splunk, Sentinel, S3, or OpenSearch. Monitor Cribl infrastructure and debug pipeline issues in real time using Cribl Monitoring and Health Checks. Implement version control, testing, and CI/CD for Cribl pipelines (using GitHub or GitLab). Participate in PoC evaluations, vendor integrations, and best practices documentation.\ Desired qualifications Education: Bachelor’s degree in Information Security, Computer Science, or a related field. A Master’s degree in Cybersecurity or Business Management is preferred. Experience: 3 to 5 Year Hands-on experience with Cribl Stream and knowledge of Cribl Edge or Cribl Search. Strong understanding of log formats (Syslog, JSON, CSV, Windows Event Logs, etc.) Familiarity with SIEM platforms like Splunk, Microsoft Sentinel, Elastic Stack, QRadar, or Exabeam. Proficient in regex, JSON transformations, and scripting logic. Comfortable with cloud platforms (AWS/Azure/GCP) and object storage systems (e.g., S3, Azure Blob). Familiarity with Kafka, Fluentd, Fluent Bit, Logstash, or similar tools is a plus. Location and way of working Base location: Noida/Gurgaon Professional is required to work from office. Your role as a Assistant Manager We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society. In addition to living our purpose, Senior Executive across our organization must strive to be: Inspiring - Leading with integrity to build inclusion and motivation Committed to creating purpose - Creating a sense of vision and purpose Agile - Achieving high-quality results through collaboration and Team unity Skilled at building diverse capability - Developing diverse capabilities for the future Persuasive / Influencing - Persuading and influencing stakeholders Collaborating - Partnering to build new solutions Delivering value - Showing commercial acumen Committed to expanding business - Leveraging new business opportunities Analytical Acumen - Leveraging data to recommend impactful approach and solutions through the power of analysis and visualization Effective communication – Must be well abled to have well-structured and well-articulated conversations to achieve win-win possibilities Engagement Management / Delivery Excellence - Effectively managing engagement(s) to ensure timely and proactive execution as well as course correction for the success of engagement(s) Managing change - Responding to changing environment with resilience Managing Quality & Risk - Delivering high quality results and mitigating risks with utmost integrity and precision Strategic Thinking & Problem Solving - Applying strategic mindset to solve business issues and complex problems Tech Savvy - Leveraging ethical technology practices to deliver high impact for clients and for Deloitte Empathetic leadership and inclusivity - creating a safe and thriving environment where everyone's valued for who they are, use empathy to understand others to adapt our behaviors and attitudes to become more inclusive. How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome… entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals. *Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices. At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution. Show more Show less
Posted 1 week ago
0 years
4 - 7 Lacs
Bengaluru
Remote
Job Summary Join our dynamic team as a Cyber Security Analyst where you will play a crucial role in safeguarding our digital assets. With a focus on SOC you will monitor and respond to security incidents ensuring the integrity and confidentiality of our systems. This hybrid role offers the opportunity to work both remotely and on-site with occasional travel required. Responsibilities Monitor security alerts and incidents using SOC tools to ensure timely detection and response to threats. Analyze security incidents to determine root causes and implement corrective actions to prevent future occurrences. Collaborate with IT teams to develop and implement security measures that protect the organizations data and systems. Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements. Provide expert guidance on security best practices to enhance the organizations overall security posture. Develop and maintain incident response plans to ensure quick and effective handling of security breaches. Utilize Microsoft Sentinel to enhance threat detection and response capabilities. Prepare detailed reports on security incidents and trends to inform management and stakeholders. Stay updated on the latest cybersecurity threats and trends to proactively address potential risks. Participate in the development and implementation of security policies and procedures. Conduct training sessions to raise awareness of cybersecurity threats and best practices among employees. Coordinate with external partners and vendors to ensure comprehensive security coverage. Support compliance efforts related to SOC1 Type1&2 SAAE18 and SSAE16 standards. Qualifications Possess a strong understanding of SOC and SIEM technologies with hands-on experience in C-SOC Demonstrate expertise in cybersecurity principles and practices with a focus on threat detection and response. Have experience with Microsoft Sentinel for enhanced security monitoring and incident management. Exhibit knowledge of compliance standards such as SOC1 Type1&2 SAAE18 and SSAE16. Show proficiency in conducting security assessments and audits to identify and mitigate risks. Display excellent analytical and problem-solving skills to address complex security challenges. Communicate effectively with technical and non-technical stakeholders to convey security concepts. Certifications Required Certified Information Systems Security Professional (CISSP) Certified SOC Analyst (CSA)
Posted 1 week ago
140.0 years
0 Lacs
India
On-site
Mitsui O.S.K. Lines (MOL) is one of the world's largest multimodal deep-sea carriers, with a rich maritime legacy spanning over 140 years . Operating across Asia, the Middle East, Europe, Africa, North America, South America, and Oceania , MOL connects global trade routes with a strong presence in international shipping and logistics. MOL Information Technology (MOL-IT) is the dedicated ICT solutions provider for the MOL Group, delivering customized technology solutions across the shipping, logistics, and supply chain domains . Established in 1997 , MOL-IT has expanded significantly, operating from four offices in Kolkata, Hyderabad, Mumbai, and Hong Kong , with a talented team of over 380 software and management professionals . As part of its growth strategy, MOL-IT is enhancing its suite of ICT solutions for existing customers while exploring opportunities to diversify beyond the MOL Group. For further details about organization, please visit www.mol-it.com/ Video - An Introduction to MOL-IT - YouTube Challenge Innovate through insight Honesty Do the right thing Accountability Commit to acting with a sense of ownership Reliability Gain the trust of customers Teamwork Build a strong team Safety Pursue the world’s highest level of safety culture Position Overview : As a Software Analyst, you will contribute to requirement analysis sessions to understand business needs and create comprehensive requirement documents (BRD, etc.). Collaborate with stakeholders to translate business objectives into technical solutions. Contribute to designing software solutions that meet project goals and industry standards, considering scalability and usability SOC Security Analyst (L2) will be responsible for responsible for day-to-day security threat monitoring and analysis. You will manage security incidents and review security alerts. You will work on known or suspected security threats. You will also work on threat intelligence, forensics and incident response adhering to security practices and frameworks. You will be part of 24x7 Security Operations Centre (SOC) team. You will be required to work in shifts. Job Responsibilities Experience of monitoring threats in a 24x7 Security Operation Center (SOC) Responsible for investigating incidents, analyzing attack methods, researching new defense techniques and tools, developing security policy, and documenting procedures for SOC. Correct root cause analysis as well identify suitable corrective steps. Perform deep packet analysis, collection of IOC (Indicator of Compromise). Collection of evidence, malware reverse engineering and write custom scripts whenever required. Threat mitigation and reporting are top priority for this position. Rule base Management, SOC Fine tuning and administer SIEM tools Manage and coordinate with team to accomplish daily operational tasks as per defined standard and Maintaining the SLA’s. Identify vulnerabilities, recommend corrective measures and ensure the adequacy of existing information security controls. Advanced working skills with Microsoft Sentinel, Cortex XDR, Trend Micro Exchange Security, Microsoft Defender for Endpoint, Fortigate etc. Relevant certification is a plus. Good working knowledge with SOAR and EDR tools. Investigate and respond to security incidents. Document and report on information security issues Evaluate and implement SIEM use cases. Document and continuously improve playbooks. Monitor for threats, analyze, and escalate as per process. Analyze functional and technical cases and provide a resolution in accordance with agreed metrics. Knowledge about different type of attacks like XSS, CSRF, LFI, Bruteforce, MITM etc. Basic knowledge of Linux operating system and windows events logs Manage and support the log collection, security scanning, intrusion detection, proxy, mail gateway and other security technologies. Review, triage security alerts, provide analysis, suggest remediation, track remediation. Support in resolving security incidents. Monitor networks and systems for potential threats. Knowledge of network data flows, ports, protocols, and other network and application services/technologies. Respond to incidents by collecting, analyzing and preserving digital evidence to assist with remediation of critical information security incidents. Improve and challenge existing processes and procedures in a very agile and fast-moving information security environment. Ability to write technical documentation and present technical briefings to diverse audiences. Strong understanding of threat landscape in terms of the tools, tactics, and techniques of threats employing both commodity and custom malware. Current knowledge of security threat intelligence and recent attack vectors Strong forensics analysis skills Minimum Qualification & Background: 3-5 years of Information Security experience. Minimum 3 years in a large 24x7 Security Operations Centre (SOC) Relevant security certification CEH, CompTIA Network Security Plus, CHFI, Certified SOC analyst will be a plus. Basic knowledge about SIEM Knowledge of current security threats, techniques, and landscape. Security events, incident review and triage experience with Endpoint Detection and Response (EDR) tools Experience and knowledge related to the configuration and maintenance of security monitoring and reporting platforms. Ability to conduct detailed analysis of various security related events like Phishing, Spoofing, Ransomware and SQL Injections etc. Incident Response experience (identifying, investigating, and responding to complex attacks) Experience with threat hunting.
Posted 1 week ago
0 years
0 Lacs
Pune, Maharashtra, India
On-site
About Zscaler Serving thousands of enterprise customers around the world including 40% of Fortune 500 companies, Zscaler (NASDAQ: ZS) was founded in 2007 with a mission to make the cloud a safe place to do business and a more enjoyable experience for enterprise users. As the operator of the world’s largest security cloud, Zscaler accelerates digital transformation so enterprises can be more agile, efficient, resilient, and secure. The pioneering, AI-powered Zscaler Zero Trust Exchange™ platform, which is found in our SASE and SSE offerings, protects thousands of enterprise customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Named a Best Workplace in Technology by Fortune and others, Zscaler fosters an inclusive and supportive culture that is home to some of the brightest minds in the industry. If you thrive in an environment that is fast-paced and collaborative, and you are passionate about building and innovating for the greater good, come make your next move with Zscaler. Our Engineering team built the world's largest cloud security platform from the ground up, and we keep building. With more than 100 patents and big plans for enhancing services and increasing our global footprint, the team has made us and our multitenant architecture today's cloud security leader, with more than 15 million users in 185 countries. Bring your vision and passion to our team of cloud architects, software engineers, security experts, and more who are enabling organizations worldwide to harness speed and agility with a cloud-first strategy. Responsibilities We're looking for an experienced Staff Security Researcher to join our Zscaler Threat Hunting team. Reporting to the Director, Zscaler Threat Hunting, you'll be responsible for: Analyze emerging threats, adversarial behaviors, and tactics, techniques, and procedures (TTPs) to understand attacker methodologies and improve detection capabilities Conducting proactive and retroactive threat hunting using Zscaler telemetry drawing from proven experience in behavioral-based threat hunting Researching, analyzing, validating, and clearly documenting threat hunting findings Independently hunting and responding to customers while working flexible schedules, including weekend night shifts and providing on-call support as needed to meet operational demands while getting two days off during the weekdays What We're Looking For (Minimum Qualifications) Proven experience in one or more of the following - threat hunting, incident response, security operations, malware analysis, blue teaming, purple teaming or network defence Hands-on experience in a Security Information and Event Management (SIEM) tool, such as Splunk, Microsoft Sentinel, or ElasticSearch Familiarity with MITRE ATT&CK framework and modern Tactics, Techniques, and Procedures (TTPs) Bachelor’s or graduate degree from four-year college or university (preferably in Computer Science, Engineering, or a related discipline), or equivalent security industry work experience What Will Make You Stand Out (Preferred Qualifications) Must be able to validate findings, perform root cause analysis, and deliver recommendations Scripting and automation skills (Python preferable) Must have excellent reporting and analytical skills and experience writing IDS/IPS, YARA signatures Experience in network-based threat detection At Zscaler, we are committed to building a team that reflects the communities we serve and the customers we work with. We foster an inclusive environment that values all backgrounds and perspectives, emphasizing collaboration and belonging. Join us in our mission to make doing business seamless and secure. Benefits Our Benefits program is one of the most important ways we support our employees. Zscaler proudly offers comprehensive and inclusive benefits to meet the diverse needs of our employees and their families throughout their life stages, including: Various health plans Time off plans for vacation and sick time Parental leave options Retirement options Education reimbursement In-office perks, and more! By applying for this role, you adhere to applicable laws, regulations, and Zscaler policies, including those related to security and privacy standards and guidelines. Zscaler is committed to providing equal employment opportunities to all individuals. We strive to create a workplace where employees are treated with respect and have the chance to succeed. All qualified applicants will be considered for employment without regard to race, color, religion, sex (including pregnancy or related medical conditions), age, national origin, sexual orientation, gender identity or expression, genetic information, disability status, protected veteran status, or any other characteristic protected by federal, state, or local laws. See more information by clicking on the Know Your Rights: Workplace Discrimination is Illegal link. Pay Transparency Zscaler complies with all applicable federal, state, and local pay transparency rules. Zscaler is committed to providing reasonable support (called accommodations or adjustments) in our recruiting processes for candidates who are differently abled, have long term conditions, mental health conditions or sincerely held religious beliefs, or who are neurodivergent or require pregnancy-related support. Show more Show less
Posted 1 week ago
0 years
0 Lacs
Bangalore Urban, Karnataka, India
Remote
Job Summary Join our dynamic team as a Cyber Security Analyst where you will play a crucial role in safeguarding our digital assets. With a focus on SOC you will monitor and respond to security incidents ensuring the integrity and confidentiality of our systems. This hybrid role offers the opportunity to work both remotely and on-site with occasional travel required. Responsibilities Monitor security alerts and incidents using SOC tools to ensure timely detection and response to threats. Analyze security incidents to determine root causes and implement corrective actions to prevent future occurrences. Collaborate with IT teams to develop and implement security measures that protect the organizations data and systems. Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements. Provide expert guidance on security best practices to enhance the organizations overall security posture. Develop and maintain incident response plans to ensure quick and effective handling of security breaches. Utilize Microsoft Sentinel to enhance threat detection and response capabilities. Prepare detailed reports on security incidents and trends to inform management and stakeholders. Stay updated on the latest cybersecurity threats and trends to proactively address potential risks. Participate in the development and implementation of security policies and procedures. Conduct training sessions to raise awareness of cybersecurity threats and best practices among employees. Coordinate with external partners and vendors to ensure comprehensive security coverage. Support compliance efforts related to SOC1 Type1&2 SAAE18 and SSAE16 standards. Qualifications Possess a strong understanding of SOC and SIEM technologies with hands-on experience in C-SOC Demonstrate expertise in cybersecurity principles and practices with a focus on threat detection and response. Have experience with Microsoft Sentinel for enhanced security monitoring and incident management. Exhibit knowledge of compliance standards such as SOC1 Type1&2 SAAE18 and SSAE16. Show proficiency in conducting security assessments and audits to identify and mitigate risks. Display excellent analytical and problem-solving skills to address complex security challenges. Communicate effectively with technical and non-technical stakeholders to convey security concepts. Certifications Required Certified Information Systems Security Professional (CISSP) Certified SOC Analyst (CSA) Show more Show less
Posted 1 week ago
0 years
0 Lacs
Bangalore Urban, Karnataka, India
Remote
Job Summary Join our dynamic team as a Cyber Security Analyst where you will play a crucial role in safeguarding our digital assets. With a focus on SOC you will monitor and respond to security incidents ensuring the integrity and confidentiality of our systems. This hybrid role offers the opportunity to work both remotely and on-site with occasional travel required. Responsibilities Monitor security alerts and incidents using SOC tools to ensure timely detection and response to threats. Analyze security incidents to determine root causes and implement corrective actions to prevent future occurrences. Collaborate with IT teams to develop and implement security measures that protect the organizations data and systems. Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements. Provide expert guidance on security best practices to enhance the organizations overall security posture. Develop and maintain incident response plans to ensure quick and effective handling of security breaches. Utilize Microsoft Sentinel to enhance threat detection and response capabilities. Prepare detailed reports on security incidents and trends to inform management and stakeholders. Stay updated on the latest cybersecurity threats and trends to proactively address potential risks. Participate in the development and implementation of security policies and procedures. Conduct training sessions to raise awareness of cybersecurity threats and best practices among employees. Coordinate with external partners and vendors to ensure comprehensive security coverage. Support compliance efforts related to SOC1 Type1&2 SAAE18 and SSAE16 standards. Qualifications Possess a strong understanding of SOC and SIEM technologies with hands-on experience in C-SOC Demonstrate expertise in cybersecurity principles and practices with a focus on threat detection and response. Have experience with Microsoft Sentinel for enhanced security monitoring and incident management. Exhibit knowledge of compliance standards such as SOC1 Type1&2 SAAE18 and SSAE16. Show proficiency in conducting security assessments and audits to identify and mitigate risks. Display excellent analytical and problem-solving skills to address complex security challenges. Communicate effectively with technical and non-technical stakeholders to convey security concepts. Certifications Required Certified Information Systems Security Professional (CISSP) Certified SOC Analyst (CSA) Show more Show less
Posted 1 week ago
0 years
0 Lacs
Coimbatore, Tamil Nadu, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. CMS-TDR Senior As part of our EY-cyber security team, who shall work as SME for Microsoft Sentinel solutions in TDR team The opportunity We’re looking for Senior Consultant with expertise in Cloud Security solutions. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Your Key Responsibilities Architecting and implementation of cloud security monitoring platforms MS Sentinel Provide consulting to customers during the testing, evaluation, pilot, production, and training phases to ensure a successful deployment. Perform as the subject matter expert on Cloud Security solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. Securing overall cloud environments by applying cybersecurity tools and best practices Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. Content development which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Skills And Attributes For Success Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities. Expertise in content management in MS Sentinel Good knowledge in threat modelling. Experience in creating use cases under Cyber kill chain and Mitre attack framework Expertise in integrating critical devices/applications including unsupported (in-house built) by creating custom parsers Below mentioned experiences/expertise on Sentinel Develop a migration plan from Splunk/QRadar/LogRhythm to MS Sentinel Deep understanding of how to implement best practices for designing and securing Azure platform Experiencing advising on Microsoft Cloud Security capabilities across Azure platform Configure data digestion types and connectors Analytic design and configuration of the events and logs being digested Develop, automate, and orchestrate tasks(playbooks) with logic apps based on certain events Configure Sentinel Incidents, Workbooks, Hunt queries, Notebooks Experience in other cloud native security platforms like AWS and GCP is a plus Scripting knowledge (Python, Bash, PowerShell) Extensive knowledge of different security threats Good knowledge and experience in Security Monitoring Good knowledge and experience in Cyber Incident Response To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Demonstrate both technical acumen and critical thinking abilities. Strong interpersonal and presentation skills. Certification in Azure (any other cloud vendor certification is a plus) Ideally, you’ll also have People/Project management skills. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 1 week ago
7.0 years
0 Lacs
Kerala, India
Remote
🚨 We're Hiring! 🚨 Position: DevSecOps + Security Analyst Experience: 5–7 years Location: Work from Home (Remote) Shift: 10 PM – 7 AM IST Education: PG / B.Tech Preference: Candidates from Kerala 🇮🇳 We’re on the lookout for a DevSecOps + Security Analyst who can blend DevOps automation with strong cybersecurity practices to secure every stage of the SDLC and infrastructure. If you're passionate about integrating security into CI/CD pipelines and have a knack for monitoring and responding to security events, this is the role for you! 🔐 Key Responsibilities: ✅ Integrate security into CI/CD (GitLab CI, Jenkins, GitHub Actions) ✅ Automate SAST, DAST, SCA, IaC scanning ✅ Secure cloud/on-prem infrastructure with Ansible, Terraform, Docker ✅ Monitor and respond to threats via SIEM (Splunk, ELK, Sentinel) ✅ Perform vulnerability assessments, incident response 💡 Must-Have Skills: DevOps automation + Cybersecurity hands-on experience Strong in CI/CD tools and pipeline security Scripting (Python, Bash, PowerShell) Familiar with AWS/Azure/GCP security practices Understanding of frameworks like SOC2, NIST, HIPAA, PCI-DSS 💬 If you’re a Keralite with a passion for security and automation, and thrive in a night-shift WFH setup — we want to hear from you! #hiring #DevSecOps #CyberSecurity #DevOps #KeralaJobs #WFH #SecurityAnalyst #CI_CD #CloudSecurity #KeralaPreferred Show more Show less
Posted 1 week ago
10.0 - 12.0 years
0 Lacs
Mumbai, Maharashtra, India
Remote
Hi, We are having an opening for Network Security Operations Manager at our Mumbai location. Job Summary : We are looking for a highly capable Network Security Operations Manager to lead, manage, and enhance the organizations network security infrastructure and operations. This role will be responsible for managing key security technologies such as firewalls, proxies, VPNs, NAC, DNS security, WAF , EDR & Data Security and ensuring operational governance and compliance. The ideal candidate should have hands-on experience managing large-scale network security operations and coordinating with cross-functional and incident response teams. Areas Of Responsibility : Security Operations Management Lead day-to-day operations of all network security tools and platforms , including: Firewalls (NGFW Palo Alto, Fortinet, Cisco)- Policy governance, segmentation, and high-availability Web Proxy & Cloud Proxy (e.g., Zscaler, Netskope)- URL filtering, threat prevention, and data leak protection VPN (IPSec, SSL VPN, Remote Access Solutions)- Strong encryption and access control for workforce and partner Network Access Control (NAC)- Role-based access, posture checks, and OT/IoT security DNS Security & Filtering- DNS-layer protection, malicious domain filtering, and response management Web Application Firewall (WAF) On-prem & Cloud-based- Protection of patient data, portals, financial apps, and APIs Ensure continuous monitoring, tuning, and updating of policies and signatures across platforms. Manage security device configurations, rule optimization, and lifecycle management. Compliance, Audit & Governance Ensure adherence to security compliance requirements such as ISO 27001, NIST, GDPR, and internal IT security policies . Ensure full compliance with sector-specific regulations ( Pharma: GxP, 21 CFR Part 11, HIPAA) Prepare and present periodic audit reports, incident reports, and configuration review summaries . Drive risk assessments and remediation plans for security operations. Maintain security documentation, SOPs, and audit trails Team & Vendor Management Lead and mentor a team of network security engineers and analysts. Oversee vendor engagements, support contracts, SLAs, and AMC renewals for security technologies. Engage with audit, QA, compliance, and legal teams for incident reporting and regulatory inspections Coordinate with for integrated security coverage (EDR/DS, if escalation/overlap arises). Incident Response & Troubleshooting Collaborate with SOC for effective investigation and response to network security incidents . Coordinate the response to security incidents, including detection, analysis, containment, eradication, and recovery. Lead root cause analysis and containment for network-based threats (e.g., suspicious VPN activity, firewall rule violations). Manage escalations and coordinate with external vendors or OEMs for critical issues. Projects & Improvements Drive security hardening and optimization projects related to network security tools. Lead or support security hardening, firewall rule optimization, and proxy architecture redesign projects Lead or contribute to technology upgrades, migration projects, mergers, acquisitions, data center shifts. Maintain security documentation, playbooks, and standard operating procedures. Prepare and validate BOM, BOQ, and risk registers for new deployments Educational Qualification : Bachelor's or Masters in Computer Science, Information Security, or related field Specific Certification : CISSP, CISM, CCNP Security, CP, Palo Alto PCNSE, Fortinet NSE, ISO 27001 LA Experience : 10-12 years of experience in network operations, with 3-5 years in leadership or managerial role Skill (Functional & Behavioural): Firewalls: Checkpoint, Fortinet, Palo Alto, Cisco Firepower Proxies: Netskope, Forcepoint, Zscaler VPN: Cloudflare, Cisco AnyConnect, FortiClient, GlobalProtect NAC: Forescout, Cisco ISE, Aruba ClearPass DNS Security: Cisco Umbrella, Infoblox, Cloudflare DNS WAF: AWS/Azure WAF, F5, Imperva, Akamai, Cloudflare EDR & DS: Crowdstrike, Falcon, Trellix, MS Defender, Sentinel, etc Show more Show less
Posted 1 week ago
3.0 - 7.0 years
6 - 8 Lacs
Hyderābād
On-site
At DuPont, our purpose is to empower the world with essential innovations to thrive. We work on things that matter. Whether it’s providing clean water to more than a billion people on the planet, producing materials that are essential in everyday technology devices from smartphones to electric vehicles, or protecting workers around the world. Discover the many reasons the world’s most talented people are choosing to work at DuPont. Why Join Us | DuPont Careers Job Title: Security Engineer – Microsoft 365 & Azure Location: Hyderabad, India Reports To: Director of Cybersecurity, Qnity Electronics Segment Position Summary We are seeking a skilled and motivated Security Engineer with deep expertise in Microsoft 365 and Azure security technologies to join our cybersecurity engineering team. This role will focus on the implementation, configuration, and continuous improvement of Microsoft Purview, Defender (365, for Cloud, and Cloud Apps), and Sentinel to safeguard our enterprise collaboration and cloud environments. As part of the Qnity Electronics business unit, you will ensure that security controls applied across the Microsoft cloud estate are technically sound, operationally efficient, and compliant with regulatory and industry standards applicable to a public manufacturing company serving the electronics end market. Key Responsibilities Engineer, configure, and manage Microsoft Purview Information Protection and Data Loss Prevention (DLP) controls for structured and unstructured data across M365 workloads. Deploy and optimize Microsoft Defender for Endpoint, Office 365, Identity, Cloud Apps, and Cloud to ensure threat protection coverage across users, devices, SaaS, and cloud workloads. Design, implement, and maintain Microsoft Sentinel analytics, incident correlation, and response automation for proactive threat detection and response. Apply security controls in accordance with internal policy and external standards (e.g., SOX, NIST 800-53, ISO 27001), ensuring traceability and evidence for audit readiness. Collaborate with infrastructure, compliance, and IT operations teams to enforce secure baselines for Microsoft 365, Azure subscriptions, and hybrid identities (Entra ID). Conduct control gap assessments, assist with remediation efforts, and manage engineering backlog in support of security governance and compliance efforts. Contribute to incident investigations and root cause analysis involving cloud-based services, maintaining logs and telemetry in line with forensic and audit requirements. Support continuous hardening of collaboration tools such as Teams, SharePoint Online, and Exchange Online while enabling business productivity. Required Qualifications 3–7 years of experience in cybersecurity engineering, with specific focus on Microsoft technologies. Strong proficiency with Microsoft Defender suite, Purview, Sentinel, and Azure native security tooling. Demonstrated ability to apply enterprise security controls to cloud platforms with compliance mapping to NIST, SOX, or similar frameworks. Familiarity with Entra ID (Azure AD), Conditional Access, RBAC, and Zero Trust architectures. Experience in a public company or regulated manufacturing environment is strongly preferred. Scripting or automation skills (PowerShell, KQL, ARM/Bicep, or Terraform a plus). Excellent documentation practices and ability to maintain technical records for audit traceability. Preferred Qualifications Microsoft Certified: Cybersecurity Architect Expert or Security Operations Analyst Associate Experience in securing collaboration and manufacturing IT environments with mixed IT/OT boundaries Prior experience supporting security engineering within a divested or restructuring business unit is a plus Join our Talent Community to stay connected with us! On May 22, 2024, we announced a plan to separate our Electronics and Water businesses in a tax-free manner to its shareholders. On January 15, 2025, we announced that we are targeting November 1, 2025, for the completion of the intended separation of the Electronics business (the “Intended Electronics Separation”)*. We also announced that we would retain the Water business. We are committed to ensuring a smooth and successful separation process for the Future Electronics business. We look forward to welcoming new talent interested in contributing to the continued success and growth of our evolving organization. (1)The separation transactions are subject to satisfaction of customary conditions, including final approval by DuPont's Board of Directors, receipt of tax opinion from counsel, the filing and effectiveness of Form 10 registration statements with the U.S. Securities and Exchange Commission, applicable regulatory approvals, and satisfactory completion of financing. For further discussion of risks, uncertainties and assumptions that could impact the achievement, expected timing and intended benefits of the separation transactions, see DuPont’s announcement . DuPont is an equal opportunity employer. Qualified applicants will be considered without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability or any other protected class. If you need a reasonable accommodation to search or apply for a position, please visit our Accessibility Page for Contact Information. DuPont offers a comprehensive pay and benefits package. To learn more visit the Compensation and Benefits page.
Posted 1 week ago
15.0 years
9 - 10 Lacs
Bengaluru
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Title: Associate Director or Assistant Director – Solution Architect (General) Enterprise Technology provides reliable, secure and resilient technology services and solutions to support our 400,000 EY people. As part of Enterprise Technology, you’ll be at the forefront of enabling innovative technologies including emerging collaboration tools and top-tier technology infrastructure. Our aim is to create a superior customer experience with clear investment in innovation, alongside operational excellence that delivers efficient, quality services and solutions. You will work with technologists and business experts to meet the increasing pace of our business. That means more growth for you, exciting learning opportunities, career choices and the chance to make a real impact. The opportunity We are seeking a Solution Architect that is a highly skilled senior role with industry leading architecture and design expertise to support one or more programs. He/she has a deep end to end understanding of architecture standards and platform solution development expertise. In this role you will be responsible for bringing strategy to fruition through the creation and delivery of architectural solution artifacts, and so candidates should be proficient on Microsoft Azure, M365 services, Network and On-prem Infrastructure technology solutions. Candidate must be a self-starter with Agile framework experience and provide RISK/Constraints to product leaders. Ideal candidate must be able to drive the delivery of solutions which align with the strategy. This role will report to the Associate Director of Solution Architecture and Cross Functional Governance. Your key responsibilities Core Drive the successful delivery of Cloud, Network and Platform technology investment efforts. Provides guidance on complex production designs, applications or system problems Solution design will include the creation of reusable, repeatable IP and artifacts. Work closely with security, networking, and operations teams to design integrated and compliant solutions. Manage stakeholders, sponsors, engineering, and operations teams across EY Technology to drive development of IT products, services, and solutions. Manages the technical dependencies across the different products and services Work with Enterprise Architects to ensure alignment with strategic objectives and targets, while providing input into strategic direction as needed. Translate business needs into technical requirements and formulation of solutions, while identifying gaps, strategic impacts, financial impacts and the risk profile in the technical solution or offering. Drive proof-of-concept, prototype design and implementation activities from an architectural perspective. Develop and maintain solution architecture documents and other artifacts to guide design creation and implementations. Stay abreast of industry trends and new technology offerings, perform in-depth research analysis and maintain collaborative partnership with internal IT teams and business customers along with external technology vendors and service providers to ensure robust outcomes. Present subject matter to program / project teams, governance forums and other audiences as needed. Skills and attributes for success We are interested in people with a deep and broad networking background, who bring in experience working in large enterprise environments, performing senior architecture or solution design role. A successful candidate will have technical and all-round experience in being part of a fast-paced team that is enabling the realization of strategic intent by solutioning and building modern network landscapes. These experiences include: History of working credibly with senior stakeholders Strong verbal and written skills including strong cross-cultural communication and the ability to draft effective communications Ability to work with people in a variety of cultures, countries and time zones Demonstrate excellent technical & architecture skills in the context of cloud-based platform/product design, service management and product lifecycle management Demonstrate ability to rapidly learn new and emerging technologies and developing a vision of their suitability and role as a new product within a platform & product landscape Design and develop scalable, secure, and resilient M365 solutions, including Exchange Online, SharePoint, Teams, OneDrive, and Security & Compliance features. Architect hybrid and cloud-native solutions leveraging Azure cloud services, including networking, compute, storage, and security. Design security frameworks leveraging Microsoft Defender, Sentinel, Intune, and Conditional Access policies. Experience with AI-powered IT operations (AIOps) for proactive issue detection, automated troubleshooting, and anomaly detection. Familiarity with Zero Trust architecture, policies and supporting network and security technologies. Strong ability to document processes, procedures and network designs clearly and accurately for distribution to internal teams and customers. To qualify for the role, you must have Creative and self-starter mindset with strong analytical and quantitative skills to operate without direct supervision on multiple complex projects and tasks, and their shifting priorities in parallel. Effective listening skills and display openness to other people's ideas and thoughts. Ability to deal efficiently with escalations, conflicts and difficult situations/people under pressure. Strong influencing skills to collaborate effectively and efficiently across the firm. English language skills - excellent written and verbal communication. Flexibility to work out of regular office hours to cater to the global organization needs. Ideally, you’ll also have Prior experience working for a large organization with a complex environment Education: Bachelor’s or master’s degree from an accredited college or university in Computer Science, Computer Engineering, MIS, or a closely related field Experience: 15+ years of experience in IT architecture, with a focus on Microsoft 365, data centers, and Azure cloud infrastructure. Possession of a current (non-expired) professional, industry recognized certification. Experience with enterprise IT governance, compliance, and risk management frameworks. Familiarity/experience with TOGAF methodology. What we offer As part of this role, you'll work in a highly integrated, global team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning : You’ll develop the mindset and skills to navigate whatever comes next. Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way. Transformative leadership : We’ll give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 1 week ago
1.0 years
0 - 0 Lacs
Bengaluru
On-site
· To maintain a clean and sterile OT. · To check equipment and take necessary action. · To maintain the sterility of instruments. · To see that the trolleys are set for each procedure with enough and correct instruments, sutures, linen etc. · To assist the surgeon in the procedure. · To be the nurse –advocate of the patient. · To take over and hand over the patient to the floors/ICU. · To count the instruments and swab before closing the operated part. · To check the specimen is send to lab with correct label and request. · To see that the instruments are washed, packed and autoclaved for the next use. · Maintain hospital infection control protocols. · To maintain the OT records. · Responsible for maintaining temperature, humidity and air changes as per defined norms. · Report any Incidence occurrence and sentinel events. · Checking daily inventory. Assist the incharge to maintain the quality indicator data. Job Type: Full-time Pay: ₹25,000.00 - ₹36,000.00 per month Benefits: Provident Fund Schedule: Night shift Rotational shift Experience: Nursing: 1 year (Required) Work Location: In person
Posted 1 week ago
21.0 years
0 Lacs
Vadodara, Gujarat, India
On-site
Civica develops software for local and national government, education, health and care. Over 5,000 public bodies across the globe use our software to help deliver critical services to over 100 million citizens. Our aspiration is to be a GovTech champion everywhere we work around the globe, supporting the needs of citizens and those that serve them every day. Building on 21 years of continuous growth and success, we're at a pivotal point on our journey to realise that aspiration. As a company, we're passionate about what we do and the citizens we help to serve. If you too would like to help champion the use of technology in public services, to improve outcomes for citizens and public sector organisations, then Civica is the right place for you. We will help you unlock the best version of yourself, achieve growth in your career whilst making a real difference to people and communities. Why will you love this opportunity as Security Operations Centre (SOC) at Civica? As a vital member of our dynamic Security Operations Centre (SOC) team, comprising Analysts, Engineers, and a SOC Manager, you'll take the lead in monitoring our SIEM and various security systems to safeguard both CIVICA Group and our valued customers. Your keen eye will assess real-time and historical logs across multiple technologies, helping to uncover potential attack patterns, instances of compromise, and security vulnerabilities. Working closely with your team, you'll swiftly determine the most effective response to security events and incidents, while meticulously documenting every step taken to contain and resolve the issues. You'll also manage internal customer requests, particularly in relation to phishing, spam, and Anti-virus challenges. Additionally, you'll evaluate risks using a Surface Attack Tool, develop and utilize OSINT tools to gather open-source intelligence from various published sources, and collaborate with different business units to inform, mitigate, or remediate any issues. In this role, you'll be in charge of supervising Microsoft Sentinel and Microsoft Defender systems, while also managing other technologies as needed, including IPS, Email Gateways, Web Filtering services, and Antivirus solutions. You'll be on the lookout for patterns of misuse or recurring issues, working together with the team to contain, control, and resolve any incidents. Plus, you'll have the chance to identify opportunities for improvement in our personnel, processes, or technology to enhance the team's overall effectiveness. Requirements A deep understanding of security principles Use of Microsoft Sentinel and/or Defender Minimum 3 years' experience working in IT, with at least 1 year in a security-based role. Any recognised certifications in security or evidence that you are studying for an exam Excellent problem-solving skills and the ability to "think outside the box" under pressure. Security Incident Response and Handling techniques An expert knowledge of enterprise and cloud security infrastructure and systems, Ability to identify Email, IPS and Anti-Virus events and take appropriate action. Ability to research and develop new practices for self-development, but also to enhance the teams' capabilities. Excellent communication skills Knowledge of threat intelligence platforms or scripting (e.g., PowerShell) Understanding of Vulnerability management tools and/or Surface Attack Tools. Be able to work in rotating shift patterns (changing monthly) to help secure offices in different time zones Benefits We know that when our people are happy, they will work better and have greater work satisfaction. Here's what you can expect: We provide an inclusive, safe, and welcoming environment to all staff Training - CIVICA offers training to help learn about our changing technical environment and also help you develop new skills. Mentoring - Within the wider security team (Blue team, red team strategic security) there are opportunities to learn from others. Giving culture - we encourage you to "give back" with benefits such as our Days of Difference leave where you can volunteer for a charity of your choice. Apply for this job - If you have a diverse background in IT, enjoy solving problems with your teammates, have organisational skills to pull complex findings together and are a critical thinker, who can think about the impact of events and/or actions you might take, this role is perfect for you. Show more Show less
Posted 1 week ago
4.0 - 6.0 years
1 - 6 Lacs
Bengaluru
Hybrid
Role & responsibilities Strong background developing Azure Sentinel/DEVO analytics rules, incidents, playbooks, notebooks, workbooks, threat hunting within the Azure Cloud. Strong and demonstrated background working with Log Analytics Workspaces, Kusto Query Language (KQL), Language integrated query Dashboard\workbook development. Strong understanding of Azure PaaS services. Solid experience with Logic Apps in Azure Experience in Creation of Resource groups, Log analytics workspace for Azure Sentinel & DEVO Integration to Data sources Develop SIEM and SOAR use cases and log data collection utilizing the Azure Sentinel, DEVO and Azure Log Analytics toolsets. Highly proficient with Azure Sentinel, DEVO and Azure Log Analytics. Develop analytics rules, incidents, playbooks, notebooks, workbooks, threat hunting and KQL queries for data normalization and parsing capabilities within Log Analytics' data ingestion pipeline. Develop incident response capabilities using Logic Apps in Azure. Integrate and automate developed use cases into Azure DevOps CI/CD pipelines. Develop Jupyter notebooks in Python and integrate them with Azure Sentinel Understanding of Azure Lighthouse, Azure AD, B2B, and common Cloud authentication patterns. Ability to configure, automate, harden, and deploy Azure Sentinel Services. Possess skills on Use case Development DEVO, Sentinel, Splunk. Hands-on experience with Sentinel/Splunk SIEM use case creation and tuning. Strong understanding of Cloud Security and Networking Concepts and practices. Work with Tactical Use Case Development team to assist in processing the more intricate use case development tickets from our customer request queue. Excellent knowledge on MITRE Tactics and Techniques Work closely with our Threat Intel team to identify security alerting gaps that we can fill with our detection services. Back up Operation Use Case Development team on SIEM onboarding tasks and Security Analyst collaboration. Experience with multiple attack vectors such as Malware, Trojans, Exploit Kits, Ransomware and Phishing techniques Provide superior technical security expertise to ensure that the Security Operations Centre (SOC) is always delivering a professional service to its customers Conduct detailed analytical queries and investigations, identify areas that require specific attention, identify indicators of compromise (IOC) or events of interest (EOI) that need further investigation and develop use cases and rules to be developed into the SIEM platform Develop and improve Security Information and Event Management (SIEM) content and all relevant technologies used in the team, continually refining and create the rules and logic (use cases) to make the detection capabilities more efficient and effective Create and enhance internal processes and procedures Professional communications and reporting to SOC stakeholders and customers Act as a mentor and team lead to all First Level Security Analysts, support and supervise them, ensure knowledge transfer within the team Deliver qualified information about actual threats and indications, recommendations how the associated risk can be mitigated Contribute to the overall performance and success of the Security Operations Centre Build on and continuously improve SOC analytics framework Ensure effective operation of SIEM content: filters, rules, expressions and other identification mechanisms of the threat and vulnerability management technologies used within the SOC Mentor and guide the First Level Security Analysts Provides professional data analysis within the SOC processes and to SOC customers in order to drive further security measures and risk mitigation activities. Responsible for execution and maintenance of SOC related analytical processes and tasks Detailed technical security reporting to Management operating companies and appropriate stakeholders Work closely with other Information Security teams to ensure effective intrusion detection and incident response Continually maintain and improve technical capabilities through individual development activities, accreditations and certifications to remain constantly prepared to challenge the ever-evolving cyber threat Deep information security expertise Knowledge of network concepts, Windows and Unix administration Knowledge of typical security devices such as firewalls, intrusion detection systems, AV and End Point security, Web Application Firewalls, anti-spam systems, event correlation systems, etc. Understanding of security threats, attack scenarios; analysis and intrusion detection skills Analytical and Communication Skills: a. Excellent analytical skills and out-of-the box thinking b. Excellent communication capabilities c. Team player d. Fluent in English Quick learner and intuitive thinker the more you learn, the faster you’ll grow. Effective time task management skills. Confidence in independently delivering technical solution. Good problem-solving skills; ability to visualize a problem/situation and think abstractly to solve it
Posted 1 week ago
12.0 years
0 Lacs
Gurugram, Haryana, India
Remote
We are seeking a talented individual to join our Investments team at Mercer. This role will be based in Gurgaon/Mumbai/Noida. This is a hybrid role that has a requirement of working at least three days a week in the office. Director – Operations Due Diligence - Investments Mercer Wealth is a leading global provider of investment consulting services. We offer customised advice at every stage of the investment decision, risk management and investment monitoring process. In addition to core consulting, we have developed a number of specialist teams; the Financial Strategy Group, Mercer Sentinel, Manager Research, Responsible Investment and Fiduciary Management, thereby ensuring we offer a full range of services to our clients. We are looking for talented colleagues who understand the financial services industry and the operational functions of investment managers. Will work as part of a team of ODD specialist and client consultants. We will count on you to: Work as an extension of the UK/US team to conduct operational due diligence risk assessments of investment managers using Mercer Sentinel’s framework incorporating house views as appropriate Understanding of investment manager middle and back office operations, fund administration, portfolio accounting, custody, regulatory compliance and other relevant industry experience Maintaining knowledge of operational risk frameworks across the Mercer universe of asset classes, including equity and fixed income, hedge funds, private equity, private debt, real estate and infrastructure Liaise with investment managers to collate information, coordinate on-site visits and schedules Review responses and documentation provided by investment managers for the risk assessment and author research notes in advance of the meeting of the onsite team to support the onshore team Support virtual investment manager “on-site” visits through the preparation of pre-meeting notes, note taking in the meeting and producing high quality draft written reports after the meeting Challenging and improving operational processes for Mercer’s ODD framework Contribute to Mercer Sentinel’s intellectual capital through market research and process innovation Contribute towards Mercer Sentinel’s other products including but not limited to Surveys and Operational Reviews; support onshore team’s efforts towards key projects or activities including business development among others. Update and maintain pertinent tools/database with relevant information including research publications and coordinate with asset managers for requisite data and for scheduling research calls; prepare and distribute Ratings Committee (RC) minutes from the weekly RC call. Project management, work allocation, real-time capacity management, peer review, process training and development of team members Lead and manage end-to-end operations and ensure the seamless delivery of reports/projects. Liaison with stakeholders to build relationship for service delivery management. Play anchor role for all strategic projects and provide directions to the team. Prepare and manage KPIs and handle escalations. Lead efforts for people engagement, knowledge development initiatives for the team, and ensure adherence to compliance policy and organizational imperatives. Driving Process Improvement Initiatives and delivering results in line with Business Priorities Demonstrate subject matter expertise in leading the ODD vertical Maintain updated investment due diligence notes, meeting notes and recommendations in proprietary database Ensuring storage and organizing data on a central database What you need to have: A Master's degree in economics, finance or other business-related areas with a high level of written content Professional qualification (Actuarial, ACA, ACCA, CFA or equivalent) – preferential requisite 12+ Years of experience with operational due diligence investment management, operations, fund management or investment consulting Previous experience in operational risk analysis, fund administration, and or financial / portfolio accounting would be beneficial Thorough knowledge of Microsoft Office applications (Word, Excel, PowerPoint) Takes ownership for work, always ensuring standards and deadlines are met and keeping others informed and up-to-date Works well under pressure, with the ability to prioritise and manage multiple tasks, stakeholders and deliverables simultaneously; candidate may be expected to attend calls with US based asset managers couple days in a week; responsibilities may stretch to taking calls with asset managers in other geographies including Pacific, UK, Europe, Middle East and Asia depending on the business requirements. Excellent organisational and time management skills Openly shares information and own expertise with colleagues Possess excellent team working skills in a global/remote working environment What makes you stand out: Demonstrates excellent oral and written communication skills Self-motivated with an eagerness to learn and a positive work ethic Challenges existing practices and conventional thinking Highly proficient in Microsoft Excel and other core Microsoft Office products (Word, PowerPoint, etc.) Why join our team: We help you be your best through professional development opportunities, interesting work and supportive leaders. We foster a vibrant and inclusive culture where you can work with talented colleagues to create new solutions and have impact for colleagues, clients and communities. Our scale enables us to provide a range of career opportunities, as well as benefits and rewards to enhance your well-being. Mercer, a business of Marsh McLennan (NYSE: MMC), is a global leader in helping clients realize their investment objectives, shape the future of work and enhance health and retirement outcomes for their people. Marsh McLennan is a global leader in risk, strategy and people, advising clients in 130 countries across four businesses: Marsh, Guy Carpenter, Mercer and Oliver Wyman. With annual revenue of $24 billion and more than 90,000 colleagues, Marsh McLennan helps build the confidence to thrive through the power of perspective. For more information, visit mercer.com, or follow on LinkedIn and X. Marsh McLennan is committed to embracing a diverse, inclusive and flexible work environment. We aim to attract and retain the best people and embrace diversity of age, background, caste, disability, ethnic origin, family duties, gender orientation or expression, gender reassignment, marital status, nationality, parental status, personal or social status, political affiliation, race, religion and beliefs, sex/gender, sexual orientation or expression, skin color, or any other characteristic protected by applicable law. Marsh McLennan is committed to hybrid work, which includes the flexibility of working remotely and the collaboration, connections and professional development benefits of working together in the office. All Marsh McLennan colleagues are expected to be in their local office or working onsite with clients at least three days per week. Office-based teams will identify at least one “anchor day” per week on which their full team will be together in person. R_306140 Show more Show less
Posted 1 week ago
7.0 - 9.0 years
0 Lacs
Bangalore Urban, Karnataka, India
On-site
Shift Timings : 06:00 Pm to 03:30 Am Location : Bangalore Job Description: Candidates will gain exposure to a wide range of industries and investment structures. As a result of the breadth of the experience, candidates will develop a unique understanding of companies, capital structures, and credit markets. This candidate will work directly with the Specialty Finance investment team within the Blackstone Insurance Structure. Responsibilities: Analyzing investment guidelines and interpret them to build logic-based rules to implement into automated investment compliance system for monitoring. Candidates with experience in CLOs, Solvas Support onshore team by assisting them in post trade compliance monitoring activities across all the investment strategies. Assist in identifying the data governance and data reconciliation issues. Must be good with people management skills, must have on papers experience Investment Compliance (Mandatory/Must Have) Compliance monitoring (Mandatory/Must Have ) UCITS, 1940 , Portfolio review, Rule coding Qualifications: Bachelor’s degree with a preference to advanced degree or progression towards CFA/FRM/CAIA 7-9 years of relevant experience in investment compliance monitoring with an exposure towards rule coding. Knowledge of guideline monitoring or coding in compliance systems e.g., Charles River, Bloomberg, LZ Sentinel, Aladdin or Clearwater Analytics would be an added advantage. Candidates with experience in CLOs, Solvas Show more Show less
Posted 1 week ago
0 years
0 Lacs
Noida, Uttar Pradesh, India
Remote
TITLE: MAC OS Support Engineer SHIFT: EST business hours (US) OVERVIEW: We are looking for a Senior MAC Support Engineer who has experience using JAMF and has completed multiple, moderately complex technical tasks. Good to have experience in the Windows Desktop support process as well. REQUIREMENTS: Expertise with MacOS: Sentinel One, JamfPro, Advanced knowledge of the JAMF Pro management platform Advanced knowledge of patch management concepts and methodologies Advanced knowledge of macOS and Apple hardware MAC OS Support Engineer Scope of Role: Proficient in one or more modern scripting languages (Ex: Python, Bash, Shell, PowerShell) Provide automated software deployment to user workstations via the JAMF management solution. Provide tier 2 and tier 3 support for all related technical questions for the Mac OS platform. Support and management of the Macintosh environment, knowledge of the following Mac infrastructure -Mac OS Security and Policy Compliance to include patching, encryption, configuration management, energy management, remote device management, and reporting/visibility, image creation, and compatibility that support desktop/laptops. Qualification required: Bachelor's: B.Tech/ BCA/ B.Sc or Any Graduate Show more Show less
Posted 1 week ago
15.0 years
0 Lacs
Gurgaon, Haryana, India
Remote
Join the Future of Supply Chain Intelligence — Powered by Agentic AI At Resilinc, we’re not just solving supply chain problems — we’re pioneering the intelligent, autonomous systems that will define its future. Our cutting-edge Agentic AI enables global enterprises to predict disruptions, assess impact instantly, and take real-time action — before operations are even touched. Recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Supply Chain Risk Management, we are trusted by marquee clients across life sciences, aerospace, high tech, and automotive to protect what matters most — from factory floors to patient care. Our advantage isn’t just technology — it’s the largest supplier-validated data lake in the industry, built over 15 years and constantly enriched by our global intelligence network. It’s how we deliver multi-tier visibility, real-time risk assessment, and adaptive compliance at scale. But the real power behind Resilinc? Our people. We’re a fully remote, mission-driven global team, united by one goal: ensuring vital products reach the people who need them — when and where they need them. Whether it’s helping ensure cancer treatments arrive on time or flagging geopolitical risks before they disrupt critical supply lines, you’ll see your impact every day. If you're passionate about building technology that matters, driven by purpose, and being an agent of change who is ready to shape the next era of self-healing supply chains, we’d love to meet you. Resilinc | Innovation with Purpose. Intelligence with Impact. About The Role Are you a seasoned cloud security expert with a passion for protecting complex, fast-moving environments? We're looking for a Senior Security Analyst to take the lead in securing our Azure infrastructure and DevOps pipelines across cutting-edge, cloud-native SaaS applications. This is your opportunity to step into a high-impact role where your technical expertise, strategic mindset, and hands-on skills will directly influence the security posture of a rapidly growing tech organization. You'll work at the intersection of Azure cloud, CI/CD pipelines, and enterprise-grade security tools — from Azure Security Center and Sentinel to Terraform and CrowdStrike — while navigating critical compliance landscapes like SOC 2, ISO 27001, FedRAMP, and GDPR. If you're driven by challenge, thrive in complex environments, and want to make a real difference in cloud security, we want to hear from you. What You Will Do Monitor, investigate, and respond to security events and incidents in the Azure cloud environment, including networking, applications, and data storage Collaborate with DevOps to integrate security best practices into Azure-based CI/CD pipelines and infrastructure-as-code processes (e.g., ARM templates, Terraform) Develop, document, and enforce Azure security policies and best practices (e.g., role-based access control (RBAC), AzureAD, Azure Security Center) Automate security detection, response, and vulnerability management tasks within Azure environments Conduct threat hunting activities to identify potential security risks within cloud-based infrastructure Guide teams on how to implement secure cloud-native services, including secure API access, encryption, and identity management within Azure Perform thread modelling, vulnerability assessments, and risk analysis for Azure resources and provide remediation recommendations Support compliance initiatives such as SOC2, ISO 27001, FedRAMP, and GDPR, ensuring that Azure deployments meet necessary security standards and regulations Improve security automation in Azure environments, leveraging tools like Azure Sentinel, Microsoft Defender, and Azure Security Center What You Will Bring 5-8 years of experience in cybersecurity, with a strong focus on Azure cloud security and DevOps environments Extensive hands-on experience securing Azure cloud infrastructure, including knowledge of Azure AD, Azure Security Center, Azure Sentinel, and Microsoft Defender Familiarity with Azure-native security features such as encryption at rest, key vault management, and secure access controls (RBAC) Strong experience with infrastructure-as-code (e.g., Terraform, Azure Resource Manager templates) and CI/CD pipeline security Proficient with security tools like SIEM (Splunk, ELK), EDR solutions (CrowdStrike, SentinelOne), and cloud security posture management (CSPM) platforms Experience in Thread Modelling for cloud native SAAS applications Understanding of compliance frameworks (SOC2, ISO 27001, FedRAMP, GDPR) and how they apply to Azure environments Certifications such as Microsoft Certified: Azure Security Engineer Associate, OSCP, or similar are highly desirable What Will Make You Stand Out Experience with container security (Kubernetes, Docker) in Azure Familiarity with Azure-specific security services like Azure Firewall, Azure Bastion, and Azure Key Vault Knowledge of threat intelligence integration with Azure Sentinel and other SIEM tools Experience in building and maintaining automated vulnerability scanning and remediation solutions in Azure Why You Will Love It Here Lead Azure Security – Own and strengthen the security of mission-critical Azure cloud infrastructure and DevOps pipelines Tech Depth Meets Purpose – Apply your expertise across tools like Azure Sentinel, Defender, Terraform, and CrowdStrike while protecting supply chains that impact real lives High-Impact –Work at the forefront of cloud-native security and AI innovation Remote-Friendly Flexibility: Work from anywhere in India What's in it for you? At Resilinc, we’re fully remote, with plenty of opportunities to connect in person. We provide a culture where ownership, purpose, technical growth and a voice in shaping impactful technology are at our core. Oh, and the perks? Full-stack benefits to keep you thriving. Hit up your talent acquisition contact for a location-specific FAQ. Curious to know more about us? Dive in at www.resilinc.ai If you are a person with a disability needing assistance with the application process please contact HR@resilinc.com. Show more Show less
Posted 1 week ago
10.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Unilever Bengaluru, Karnataka, India Posted on Jun 5, 2025 Apply now Job Title: Cyber Security Forensics SME Location: UniOps Bangalore About Unilever Be part of the world’s most successful, purpose-led business. Work with brands that are well-loved around the world, that improve the lives of our consumers and the communities around us. We promote innovation, big and small, to make our business win and grow; and we believe in business as a force for good. Unleash your curiosity, challenge ideas and disrupt processes; use your energy to make this happen. Our brilliant business leaders and colleagues provide mentorship and inspiration, so you can be at your best. Every day, nine out of ten Indian households use our products to feel good, look good and get more out of life – giving us a unique opportunity to build a brighter future. Every individual here can bring their purpose to life through their work. Join us and you’ll be surrounded by inspiring leaders and supportive peers. Among them, you’ll channel your purpose, bring fresh ideas to the table, and simply be you. As you work to make a real impact on the business and the world, we’ll work to help you become a better you. About Uniops Unilever Operations (UniOps) is the global technology and operations engine of Unilever offering business services, technology, and enterprise solutions. UniOps serves over 190 locations and through a network of specialized service lines and partners delivers insights and innovations, user experiences and end-to-end seamless delivery making Unilever Purpose Led and Future Fit. Responsibilities The person in this role is expected to generate leads for the Incident Response team (based on forensic evidence) for timely containment and response actions. It is expected that the person leads all in-house investigations and also coordinates with external investigators/specialists in major incidents. Conducts forensics analysis of cyber security incidents to deduce RCA and understand the relevant threat (for example malware behaviour and TTP through static and dynamic analysis) and potential impact. Utilizes latest and advanced knowledge of SOC Technologies and Forensic technologies (such as Memory Forensics, Network Forensics, Filesystem Forensics, Malware analysis and Reverse Engineering, Device Forensics - HDD/SSD/Smart Phone) across various platforms (end-points, servers, AWS/Azure/GCP cloud) and Operating Systems (Windows, Linux, UNIX, Mac, AIX, etc.) for supporting Forensics investigations. Participates in scoping discussions with stakeholders for forensics capability projects and investigations to understand the requirement, identifies and communicates feasibility and approach, undertake and follow-up actions till timely delivery and successful conclusion. Ensures that all investigations are appropriately conducted and documented as per cardinal forensic principles and evidence handling (collection, analysis, sharing and preservation) is compliant to the process. Effectively and timely triage and respond to incident investigation. Key Requirements MANDATORY Strong ethics, communication and team skills Hands-on experience with Enterprise SIEM (like Splunk, QRadar, Sentinel, etc) and EDR tools (like Microsoft Defender, CrowdStrike Falcon, etc) Hands-on experience with Enterprise Forensics tools (like EnCase, FTK, AXIOM, etc) Hands-on experience in memory forensics, network forensics and malware analysis Minimum 10 years of enterprise experience in a global SOC (Security Operations Centre) / DFIR (Digital Forensics or Incident Response) domain. Working knowledge of at least one of the scripting tools: Python/ Perl/ PowerShell EnCase Certified Examiner (EnCE) GIAC Certification GCFE/ GCFA/ GREM/ GNFA At HUL, we believe that every individual irrespective of their race, colour, religion, gender, sexual orientation, gender identity or expression, age, nationality, caste, disability or marital status can bring their purpose to life. So apply to us, to unleash your curiosity, challenge ideas and disrupt processes; use your energy to make the world a better place. As you work to make a real impact on the business and the world, we’ll work to help you become a better you! Apply now See more open positions at Unilever Show more Show less
Posted 1 week ago
7.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
At DuPont, our purpose is to empower the world with essential innovations to thrive. We work on things that matter. Whether it’s providing clean water to more than a billion people on the planet, producing materials that are essential in everyday technology devices from smartphones to electric vehicles, or protecting workers around the world. Discover the many reasons the world’s most talented people are choosing to work at DuPont. Why Join Us | DuPont Careers Job Title: Security Engineer – Microsoft 365 & Azure Location: Hyderabad, India Reports To: Director of Cybersecurity, Qnity Electronics Segment Position Summary We are seeking a skilled and motivated Security Engineer with deep expertise in Microsoft 365 and Azure security technologies to join our cybersecurity engineering team. This role will focus on the implementation, configuration, and continuous improvement of Microsoft Purview, Defender (365, for Cloud, and Cloud Apps), and Sentinel to safeguard our enterprise collaboration and cloud environments. As part of the Qnity Electronics business unit, you will ensure that security controls applied across the Microsoft cloud estate are technically sound, operationally efficient, and compliant with regulatory and industry standards applicable to a public manufacturing company serving the electronics end market. Key Responsibilities Engineer, configure, and manage Microsoft Purview Information Protection and Data Loss Prevention (DLP) controls for structured and unstructured data across M365 workloads. Deploy and optimize Microsoft Defender for Endpoint, Office 365, Identity, Cloud Apps, and Cloud to ensure threat protection coverage across users, devices, SaaS, and cloud workloads. Design, implement, and maintain Microsoft Sentinel analytics, incident correlation, and response automation for proactive threat detection and response. Apply security controls in accordance with internal policy and external standards (e.g., SOX, NIST 800-53, ISO 27001), ensuring traceability and evidence for audit readiness. Collaborate with infrastructure, compliance, and IT operations teams to enforce secure baselines for Microsoft 365, Azure subscriptions, and hybrid identities (Entra ID). Conduct control gap assessments, assist with remediation efforts, and manage engineering backlog in support of security governance and compliance efforts. Contribute to incident investigations and root cause analysis involving cloud-based services, maintaining logs and telemetry in line with forensic and audit requirements. Support continuous hardening of collaboration tools such as Teams, SharePoint Online, and Exchange Online while enabling business productivity. Required Qualifications 3–7 years of experience in cybersecurity engineering, with specific focus on Microsoft technologies. Strong proficiency with Microsoft Defender suite, Purview, Sentinel, and Azure native security tooling. Demonstrated ability to apply enterprise security controls to cloud platforms with compliance mapping to NIST, SOX, or similar frameworks. Familiarity with Entra ID (Azure AD), Conditional Access, RBAC, and Zero Trust architectures. Experience in a public company or regulated manufacturing environment is strongly preferred. Scripting or automation skills (PowerShell, KQL, ARM/Bicep, or Terraform a plus). Excellent documentation practices and ability to maintain technical records for audit traceability. Preferred Qualifications Microsoft Certified: Cybersecurity Architect Expert or Security Operations Analyst Associate Experience in securing collaboration and manufacturing IT environments with mixed IT/OT boundaries Prior experience supporting security engineering within a divested or restructuring business unit is a plus Join our Talent Community to stay connected with us! On May 22, 2024, we announced a plan to separate our Electronics and Water businesses in a tax-free manner to its shareholders. On January 15, 2025, we announced that we are targeting November 1, 2025, for the completion of the intended separation of the Electronics business (the “Intended Electronics Separation”)*. We also announced that we would retain the Water business. We are committed to ensuring a smooth and successful separation process for the Future Electronics business. We look forward to welcoming new talent interested in contributing to the continued success and growth of our evolving organization. The separation transactions are subject to satisfaction of customary conditions, including final approval by DuPont's Board of Directors, receipt of tax opinion from counsel, the filing and effectiveness of Form 10 registration statements with the U.S. Securities and Exchange Commission, applicable regulatory approvals, and satisfactory completion of financing. For further discussion of risks, uncertainties and assumptions that could impact the achievement, expected timing and intended benefits of the separation transactions, see DuPont’s announcement. DuPont is an equal opportunity employer. Qualified applicants will be considered without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability or any other protected class. If you need a reasonable accommodation to search or apply for a position, please visit our Accessibility Page for Contact Information. DuPont offers a comprehensive pay and benefits package. To learn more visit the Compensation and Benefits page. Show more Show less
Posted 1 week ago
7.0 - 12.0 years
11 - 16 Lacs
Mumbai
Work from Office
SUMMARY Our client is IT MNC part of one of the major insurance groups based out of Germany and Europe. The Group is represented in around 30 countries worldwide, with Over 40,000 people worldwide, focusing mainly on Europe and Asia. Our client offers a comprehensive range of insurances, pensions, investments and services by focusing on all cutting edge technologies majorly on Could, Digital, Robotics Automation, IoT, Voice Recognition, Big Data science, advanced mobile solutions and much more to accommodate the customers future needs around the globe thru supporting millions of internal and external customers with state of-the-art IT solutions to everyday problems & dedicated to bringing digital innovations to every aspect of the landscape of insurance. Job Location: Hiranandani Gardens, Powai, Mumbai Mode: Work from Office Requirements Key Responsibilities: : Business-Cybersecurity Alignment: o Work closely with business stakeholders, IT security teams, and cross-functional teams to ensure cybersecurity initiatives align with the organization’s broader business goals. o Translate business needs into technical security requirements that can be effectively executed by the security and IT teams. Risk Analysis & Security Assessments: o Conduct risk assessments in the context of hybrid IT environments (cloud, on-premises, and edge) to identify security gaps and vulnerabilities. o Collaborate with security teams to evaluate existing security controls and recommend solutions to mitigate identified risks, balancing business needs with security requirements. Cybersecurity Frameworks & Compliance: o Ensure that all business and technical security requirements comply with relevant regulatory compliance frameworks (e.g., NIST CSF, ISO 27001, GDPR, HIPAA). o Support audits and compliance assessments, identifying any gaps between current practices and regulatory standards. (must have) Security Process Improvement: o Identify opportunities for process improvements within the cybersecurity function, including streamlining security incident response, access management processes, and threat detection workflows. o Develop business cases for proposed security improvements, including cost-benefit analyses and risk assessments. The Business Analyst will have comprehensive responsibilities spanning multiple cybersecurity domains, and should have expertise in at least 5 of the following areas o SIEM Sentinel & Security Operations: Manage and optimize SIEM solutions, particularly Sentinel, for effective monitoring, incident detection, and security event correlation across hybrid environments. Collaborate with security operations teams to ensure proper configuration, tuning, and reporting within SIEM platforms to support proactive threat management. o Security Tools & Technology Integration: Work with security teams to implement and optimize security tools such as SIEM (e.g., Splunk, Microsoft Sentinel), EDR (e.g., CrowdStrike, MS Purview/Defender), SOAR platforms, CASB (Cloud Access Security Broker), and Threat Intelligence systems. Help define and document requirements for the integration of cybersecurity tools into the broader security ecosystem. o User Access Management (UAM) & RBAC: Work closely with identity and access management teams to ensure the implementation of UAM and RBACsystems that align with the organization's security policy and business requirements. Support the development of processes for managing user roles, privileges, and access rights across enterprise systems. o Cloud & Encryption Security: Ensure that security policies and controls are applied across both on-premises and cloud environments(AWS, Azure, Google Cloud), addressing challenges related to cloud security, data encryption, and access management. Collaborate with technical teams to implement strong encryption methods for data - in - transit, data-at-rest, and data-in-use in line with organizational security policies. o AI & ML in Cybersecurity: (Good to have) Contribute to the use of AI/ML technologies to enhance threat detection, anomaly identification, and predictive analytics within the organization’s security operations. Collaborate with data scientists and security teams to define requirements for AI/ML-based security models and incident response automation. o SOAR Integration & Incident Response: Assist with the integration of Security Orchestration, Automation, and Response (SOAR) solutions into the incident response lifecycle to streamline response times and automate repetitive tasks. Support the continuous improvement of incident response procedures and playbooks, ensuring a consistent, rapid, and efficient approach to security incidents. Benefits
Posted 1 week ago
3.0 years
3 - 5 Lacs
Cochin
On-site
Job Duties (Summary): Senior Security SOC Analyst works in 24/7 team and in shifts which include nights and rotational weekends. The role is a key part of our Security Monitoring Incident Response team, involving in investigating alerts/events that trigger from MS Sentinel / SIEM and EDR Tools and other end point tools. Senior Analyst will be the internal escalation point for the Security analysts within the shift/team and will assist Security Analysts in responding to Security Incidents. This role also needs exceptional communication skills (verbal and written), and an ability quickly understand complex information while recognizing familiar elements within complex situations. Required Skills & Experience: Responsible for 24/7 monitor, triage, analysing security events and alerts. Including Malware analysis. Should have good hands-on in Microsoft Sentinel and should have ability to query using KQL [Mandatory] Familiarity with core concepts of security incident response, e.g., the typical phases of response, vulnerabilities vs threats vs actors, Indicators of Compromise (IoCs), etc... Strong knowledge of email security threats and security controls, including experience analysing email headers. Analysing Phishing emails and associated Threats and to remediate them by blocking the Url’s analysing the malware(s),link(s),IOC’s. Good understanding of Threat Intel and Hunting. Good hands on experience in investigating EDR alerts (Tanium, CrowdStrike, etc..) Good hands on experience in using XSOAR Platforms (Demisto, Phantom, etc..) Strong technical understanding of network fundamentals and common Internet protocols, specifically DNS, HTTP, HTTPS / TLS, and SMTP. Experience analysing network traffic using tools such as Wireshark, to investigate either security issues or complex operational issues. Experience reviewing system and application logs (e.g., web or mail server logs), either to investigate security issues or complex operational issues. Knowledge in investigating security issues within Cloud infrastructure such as AWS, GCP, Azure (Preferred not mandatory) Good knowledge and hands-on experience with SIEM systems such as SentinelOne/RSA Netwitness/Splunk/AlienVault/QRadar, ArcSight or similar in understanding/creating new detection rules, correlation rules etc... Experience In defining use cases for playbooks and runbooks (Preferred) Experience in understanding log types and log parsing Strong passion in information security, including awareness of current threats and security best practices. Basic Qualifications (Preferred not mandatory ? if Candidate has equivalent knowledge) Bachelor’s Degree in Computer Sciences or equivalent (Preferred not mandatory) Minimum of 3 years of experience in a Security Operations Centre (SOC) or incident response team (CSIRT Team member). Overall 3+ experience in Information Security/IT Security/Network Security. CEH, CISSP, OSCP, CHFI, ECSA, GCIH, GCIA, GSEC, GCFA certification (minimum One certification - Preferred not mandatory) A relevant specialist degree (e.g., information security or digital forensics). Knowledge in NIST CSF, MiTRE & ATTACK Framework. Active involvement in the Information Security community. Certified in Azure Security [SC-200, AZ-500, AZ-900] ? Either one or more [Mandatory]
Posted 1 week ago
8.0 years
15 - 25 Lacs
Noida
Remote
Experience- 8+ years Shift Timing: 24/7 Job Summary: An experienced professional to set up SOC L1 operations, including processes, procedures, and team integration. The role requires collaboration with Cadence SOC L2/L3 teams and the ability to establish a fully operational L1 framework. Candidate should be SME in various tools being used in SOC ecosystem in Cadence – Splunk, Devo and Sentinel One Key Responsibilities: Design and implement SOC L1 workflows, processes, and escalation paths. Onboard and guide the L1 team, ensuring alignment with L2/L3 operations. Develop SOPs, incident response playbooks, and documentation. Configure monitoring tools and dashboards for effective threat management. Provide full-time onsite support for 6-8 weeks, transitioning to part-time remote. Qualifications: Proven experience in SOC operations and team setup. Strong knowledge of SOC tools (e.g., SIEM) and cybersecurity frameworks Excellent documentation and communication skills. Relevant certifications (e.g., Security+, CSA) are a plus. Job Type: Full-time Pay: ₹1,500,000.00 - ₹2,500,000.00 per year Schedule: Rotational shift Ability to commute/relocate: Noida, Uttar Pradesh: Reliably commute or planning to relocate before starting work (Required) Application Question(s): What is your current CTC? What is your expected CTC? What is your notice period? What is your current location? Which level are you supporting? How many years of experience do you have in SOC tools (e.g., SIEM) and cybersecurity frameworks? How many years of experience do you have in SOC operations? Do you have experience in Splunk and Sentinel One? Are you comfortable with the 24/7 support? Experience: total work: 8 years (Required) Work Location: In person
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The job market for sentinel roles in India is currently on the rise, with a high demand for professionals who can effectively monitor and secure systems, networks, and data. Sentinel jobs are crucial in ensuring the safety and integrity of digital assets for organizations across various industries.
The salary range for sentinel professionals in India varies based on experience and location. Entry-level positions may start around INR 3-5 lakhs per annum, while experienced professionals can earn upwards of INR 10-15 lakhs per annum.
In the field of sentinel, a typical career path may progress from roles such as Security Analyst or Information Security Specialist to Senior Security Engineer, Security Architect, and eventually Chief Information Security Officer (CISO) or Security Consultant.
Alongside expertise in sentinel, professionals in this field are often expected to have knowledge of cybersecurity, network security, risk management, incident response, and penetration testing.
As you prepare for your journey into the sentinel job market in India, remember to showcase your expertise, experience, and passion for cybersecurity. Stay updated with the latest trends and technologies, practice your skills, and approach interviews with confidence. Best of luck in your job search!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2