Jobs
Interviews

903 Sentinel Jobs - Page 9

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 4.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Position Overview Job Title – Strategic Development Analyst, AS Location – Mumbai, India Role Description As a Strategic Development Analyst supporting the Business Supervisory Office (BSO), you will assist the BSO in ensuring the US Private Banking Business is compliant with local rules and regulations in transacting business for its clients. The Strategic Development Analyst will also assist in ensuring that all business transacted for the clients are in their best interest (i.e. compliance with the Regulation Best Interest) and in line with their Suitability and risk profiles. This will require the analyst to review and provide disposition for daily trade alerts generated via the Surveillance systems implemented. Further, the analyst will also be required to analyze trade related data and identify any market manipulation themes such market manipulation, front running, insider trading, pump and dump etc. which in turn would need to be escalated to relevant onshore stakeholders (i.e. in compliance with applicable Market Abuse Regulations). In addition to Trade Surveillance related activities, the analyst will also be required to assist the onshore stakeholders with Transaction Monitoring i.e. reviewing all domestic/cross-border wire transfers executed by the client with the sole objective of ensuring all such activity is in sync with the anticipated activity for the account and there is no suspicion of money laundering. The analyst would be required to identify and explore any scope for enhancing current processes in place thereby increasing efficiency in terms of process delivery. The analyst might be included to participate in internal reviews by Group Audit and Compliance Testing & Assurance (CT&A). What We’ll Offer You As part of our flexible scheme, here are just some of the benefits that you’ll enjoy Best in class leave policy Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your Key Responsibilities Assist in carrying out supervision of the US Private Banking Business to ensure compliance with applicable rules and regulations Assist in the surveillance of capital market trades i.e. analyze trade alerts to identify relevant Market Abuse themes such as front running, pump and dump, market manipulation etc. Verify the trades executed are in the best interest and in line with the suitability (i.e. risk profile) of the client Maintain knowledge of AML risks and applicable regulations from a US perspective Analyze cross border customer transactions to determine whether the transactions are in line with the anticipated activity for the client or if there exists reasonable suspicion of money laundering Assist in reviewing customer transactions to identify any money laundering flags and rapidly dispositioning them along with escalating cases which require further review Research entities and/or individuals using both public domain and database search services. Assist with the maintenance of existing Key Operating Procedures and the development of new Key Operating Procedures covering different processes/controls owned and executed by the BSO Coordinate with and support business divisions and/or infrastructure functions in executing their responsibilities in improving the quality of the data and any data quality remediation actions. Your Skills And Experience 3 to 4 years of Regulatory and Brokerage Trade Surveillance experience, preferably for the Wealth Management business Functional and conceptual knowledge of Market Manipulation themes such as Front Running, Pump and Dump, Insider Trading, Spoofing etc. Experience with PM1, SunGard/FIS Protegent Surveillance tool (equivalents like LZ Sentinel, Aladdin, Charles River, JPM Trac, etc.) and SunGard front-end systems such as NetX360 is a plus Strong understanding of Private Banking AML risks Knowledge of Financial Crime regulations Experience in the financial services industry and/or BSA/AML regulations with sound banking knowledge of product and service offerings Ability to co-ordinate with multiple stakeholders and manage projects/tasks on an end to end basis How We’ll Support You Training and development to help you excel in your career Coaching and support from experts in your team A culture of continuous learning to aid progression A range of flexible benefits that you can tailor to suit your needs About Us And Our Teams Please visit our company website for further information: https://www.db.com/company/company.htm We strive for a culture in which we are empowered to excel together every day. This includes acting responsibly, thinking commercially, taking initiative and working collaboratively. Together we share and celebrate the successes of our people. Together we are Deutsche Bank Group. We welcome applications from all people and promote a positive, fair and inclusive work environment.

Posted 2 weeks ago

Apply

0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Do you want to be part of an inclusive team that works to develop innovative therapies for patients? Every day, we are driven to develop and deliver innovative and effective new medicines to patients and physicians. If you want to be part of this exciting work, you belong to Astellas! Astellas Pharma Inc. is a pharmaceutical company conducting business in more than 70 countries around the world. We are committed to turning innovative science into medical solutions that bring value and hope to patients and their families. Keeping our focus on addressing unmet medical needs and conducting our business with ethics and integrity enables us to improve the health of people throughout the world. For more information on Astellas, please visit our website at www.astellas.com . Astellas’ Global Capability Centers Overview Astellas’ Global Capability Centers (GCCs) are strategically located sites that give Astellas the ability to access talent across various functions in the value chain and to co-locate core capabilities that are currently dispersed. Our three GCCs are located in India, Poland, and Mexico. The GCCs will enhance our operational efficiency, resilience, and innovation potential, enabling a timely response to changing business demands. Our GCCs are an integral part of Astellas, guided by our shared values and behaviors, and are critical enablers of the company’s strategic priorities, sustainable growth, and commitment to turn innovative science into VALUE for patients. This position is based in Bangalore, India & will require work from the office at least the minimum number of days per week as agreed by the business leader. Purpose And Scope As a Cyber Security Engineer, you will play a critical role in safeguarding our organization’s information systems and data. This position has arisen due to Astellas insourcing the responsibility for managing security operations, developing automation for threat detection, and working towards ‘best in industry’ incident response. The successful candidate will work collaboratively within the Security Operations Center (SOC) and other Value Teams across the organization to ensure a proactive security posture and to mitigate risks associated with cyber threats in several areas. Astellas has several roles that may fit candidates who do not have experience in all the areas outlined in the next section, therefore we encourage applicants who have experience in two or more areas listed below. Responsibilities Security Operations Center (SOC) Management: Support daily SOC operations, ensuring effective monitoring support, development of use cases and response to security incidents. Manage application ingestion processes and email security protocols. Support SIEM management, including logging and alerting. Automation Development Develop and implement automation solutions for alerts from various security sources, ensure firewalls, IDS and EDR tools are working effectively. Streamline processes to enhance the efficiency of security operations and help develop communication with other teams. Threat Modelling Conduct threat modelling for applications to identify vulnerabilities and recommend mitigation strategies. Analyze email tickets and develop tooling to improve response times and effectiveness. Provide root cause analysis for the threat found and assist with remediation. Anti-Malware And Endpoint Detection Assist in operational efforts to implement a global strategy for anti-virus (AV) solutions and optimize detection capabilities. Ensure consistent standards for endpoint detection and response across the organization. Incident Response Lead or support incident response efforts using an industry-recognized model and report escalations to senior leadership when required. Collaborate with Red, Blue, and Purple teams to conduct penetration testing and improve security posture. Conduct forensic analysis to investigate security incidents and recommend improvements. Proactive Threat Hunting Engage in proactive threat hunting to identify potential security threats before they materialize. Collaborate with teams to enhance detection and response capabilities. Reporting And Data Analysis Engage in proactive collaboration across Value Teams, working with an agile mindset, and assist in the creation of dashboards and reporting for security governance. Assist in the governance of security within cloud infrastructure. Required Bachelor’s degree in Computer Science, Information Technology, Cyber Security, or a related field. Proven experience in a cybersecurity role, preferably within a SOC/SIEM/SOAR environment. Experience in using Microsoft Sentinel & Defender / Crowdstrike EDR / Wizz Cloud Security. Strong knowledge of security frameworks, threat modelling, and incident response methodologies. Awareness of infrastructure and network security features like firewall rules, event IDs, logging/detection, and managing assets in manufacturing / OT environments. Experience of working with cloud security and insourced capabilities, as well as MSPs. Experience with SIEM/Cloud security tools and automation technologies.Familiarity with anti-malware solutions and endpoint detection strategies.Proficiency in scripting languages for automation (e.g., Python, PowerShell) is an advantage. Experience in digital forensics (log analysis and technical root cause assessment). Preferred Security certification is an advantage. Demonstrate knowledge of change management principles. Relevant certifications (e.g., Certified Information Systems Security Professional CISSP, Certified Ethical Hacker CEH or CompTIA Security+, etc.)Excellent analytical and problem-solving skills. Strong communication skills and the ability to work collaboratively in a small team environment where we share capacity and effort. International/global experience is an advantage. Category TechX Astellas is committed to equality of opportunity in all aspects of employment. EOE including Disability/Protected Veterans

Posted 2 weeks ago

Apply

3.0 - 7.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Roles & Responsibilities: 1.Handling alerts and incident on XDR platform 2.Alert & incident triage and analysis 3.Proactively investigating suspicious activities 4.Log all findings, actions taken, and escalations clearly in the XDR and ITSM platform 5.Execute predefined actions such as isolating blocking IPs or disabling user accounts, based on set protocols. 6.Adhere to established policies, procedures, and security practices. 7.Follow-up with tech team for incident closure 8.Participating in daily standup and review meeting 9.L2 Analyst has responsibility to closely track the incidents and support for closure. 10.Working with logsource and usecase management in integrating log sources and developing & testing usecase 11.Work & support on multiple cybersecurity tool (DLP, GRC, Cloudsec tool, DAM) 12.Developing SOP / instruction manual for L1 team 13.Guiding L1 team for triage/analysis and assist in clousure of cybersecurity alert and incidents 14.Handle XDR alerts and followup with customer team for agent updates 15.Escalate more complex incidents to L3 SME for deeper analysis. Key Responsibilities: Security Monitoring & Incident Response Governance Define and maintain security monitoring, threat detection, and incident response policies and procedures.Establish and mature a threat intelligence program, incorporating tactical and strategic threat feeds.Align SOC operations with evolving business risk priorities and regulatory frameworks.Platform & Toolset Management Evaluate, implement, and enhance SIEM platforms, ensuring optimal log ingestion, correlation, and rule effectiveness.Assess and manage deployment of EDR, XDR, SOAR, and Threat Intelligence solutions.Maintain and update incident response playbooks and automation workflows.Ensure consistent platform hygiene and technology stack effectiveness across SOC tooling.SOC Operations & Threat Detection Oversee 24x7 monitoring of security events and alerts across enterprise assets.Lead and coordinate proactive threat hunting across networks, endpoints, and cloud.Manage and support forensic investigations to identify root cause and recovery paths.Govern use case development, log source onboarding, and alert/event triage processes.Regulatory Compliance & Incident Management Ensure timely and accurate incident reporting in compliance with RBI, CERT-In, and other authorities.Retain logs in accordance with regulatory data retention mandates.Enforce and monitor security baselines for endpoints, in line with internal and regulatory standards.Advanced Threat Management & Reporting Plan, conduct, and report on Red Teaming and Purple Teaming exercises to test detection and response capabilities.Participate in and contribute to the Risk Operations Committee (ROC) meetings and initiatives.Review and track SOC effectiveness through KPIs, metrics, and regular reporting dashboards. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field.3-7 years of experience in SOC management, incident response, or cyber threat detection roles.Hands-on expertise with SIEM (e.g., Splunk, QRadar, Sentinel), EDR/XDR tools, and SOAR platforms.Proven experience in playbook development, forensics, and threat hunting methodologies.Strong understanding of RBI/CERT-In incident reporting guidelines and log retention requirements.Familiarity with MITRE ATT&CK, threat modeling, and adversary emulation techniques. Preferred technical and professional experience Preferred Certifications: GCIA, GCIH, GCFA, CISSP, OSCP, CEH, CHFI, or similar certifications"

Posted 2 weeks ago

Apply

3.0 - 5.0 years

3 - 8 Lacs

Bengaluru

Work from Office

Roles & Responsibilities: 1.Handling alerts and incident on XDR platform 2.Alert & incident triage and analysis 3.Proactively investigating suspicious activities 4.Log all findings, actions taken, and escalations clearly in the XDR and ITSM platform 5.Execute predefined actions such as isolating blocking IPs or disabling user accounts, based on set protocols. 6.Adhere to established policies, procedures, and security practices. 7.Follow-up with tech team for incident closure 8.Participating in daily standup and review meeting 9.L2 Analyst has responsibility to closely track the incidents and support for closure. 10.Working with logsource and usecase management in integrating log sources and developing & testing usecase 11.Work & support on multiple cybersecurity tool (DLP, GRC, Cloudsec tool, DAM) 12.Developing SOP / instruction manual for L1 team 13.Guiding L1 team for triage/analysis and assist in clousure of cybersecurity alert and incidents 14.Handle XDR alerts and followup with customer team for agent updates 15.Escalate more complex incidents to L3 SME for deeper analysis. Key Responsibilities: Security Monitoring & Incident Response Governance Define and maintain security monitoring, threat detection, and incident response policies and procedures.Establish and mature a threat intelligence program, incorporating tactical and strategic threat feeds.Align SOC operations with evolving business risk priorities and regulatory frameworks.Platform & Toolset Management Evaluate, implement, and enhance SIEM platforms, ensuring optimal log ingestion, correlation, and rule effectiveness.Assess and manage deployment of EDR, XDR, SOAR, and Threat Intelligence solutions.Maintain and update incident response playbooks and automation workflows.Ensure consistent platform hygiene and technology stack effectiveness across SOC tooling.SOC Operations & Threat Detection Oversee 24x7 monitoring of security events and alerts across enterprise assets.Lead and coordinate proactive threat hunting across networks, endpoints, and cloud.Manage and support forensic investigations to identify root cause and recovery paths.Govern use case development, log source onboarding, and alert/event triage processes.Regulatory Compliance & Incident Management Ensure timely and accurate incident reporting in compliance with RBI, CERT-In, and other authorities.Retain logs in accordance with regulatory data retention mandates.Enforce and monitor security baselines for endpoints, in line with internal and regulatory standards.Advanced Threat Management & Reporting Plan, conduct, and report on Red Teaming and Purple Teaming exercises to test detection and response capabilities.Participate in and contribute to the Risk Operations Committee (ROC) meetings and initiatives.Review and track SOC effectiveness through KPIs, metrics, and regular reporting dashboards. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Required Qualifications: Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field.3-5 years of experience in SOC management, incident response, or cyber threat detection roles.Hands-on expertise with SIEM (e.g., Splunk, QRadar, Sentinel), EDR/XDR tools, and SOAR platforms.Proven experience in playbook development, forensics, and threat hunting methodologies.Strong understanding of RBI/CERT-In incident reporting guidelines and log retention requirements.Familiarity with MITRE ATT&CK, threat modeling, and adversary emulation techniques. Preferred technical and professional experience Preferred Certifications: GCIA, GCIH, GCFA, CISSP, OSCP, CEH, CHFI, or similar certifications

Posted 2 weeks ago

Apply

15.0 - 20.0 years

13 - 17 Lacs

Gurugram

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Operation Automation Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and transitioning to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud technologies and security threats. Roles & Responsibilities:1)Design and implement Microsoft Sentinel architecture, including data connectors, analytics rules, and workbooks.2)Integrate Sentinel with various data sources, including Azure services on-premises systems, and third-party security products.3)Develop and maintain data connectors, APIs and custom integrations.4)Configure and optimize incident response workflows, including automated response actions and playbooks.5)Collaborate with security operations teams to implement Sentinel-based security monitoring and incident response processes.6)Provide training and support to security teams on Sentinel features and functionality7)Continuously monitor and optimize Sentinel performance, scalability, and reliability8)Develop and maintain custom dashboards, reports, and workbooks to provide security insights and metrics. 9)Integrate Azure Logic Apps with Azure Sentinel to automate security workflows and incident response.10)Develop custom connectors for Logic apps to integrate with Azure Sentinel and other security tools. 11)Collaborate with security teams, developers, and operation teams to ensure seamless integration and deployment of Logic Apps with Azure Sentinel12)Configure and maintain Sentinel workspaces, including data connectors, analytics rules. 13)Optimize Sentinel workspace performance, scalability, and security.14)Develop and maintain reports and dashboards to provide visibility into security metrics and trends.15)Strong knowledge of KQL and experience writing complex queries.- Proficiency in Microsoft Sentinel, Azure Security Center and Azure Monitor- Experience with data analytics, machine learning, and threat intelligence. Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Develop and maintain comprehensive documentation of security architecture and frameworks.- Conduct regular assessments and audits to ensure compliance with security policies and standards. Professional & Technical Skills: - Must To Have Skills: Proficiency in Azure Sentinel & KQL.- Strong understanding of cloud security principles and best practices.- Experience with security incident response and management.- Familiarity with security compliance frameworks such as ISO 27001, NIST, or CIS.- Knowledge of automation tools and scripting languages to enhance security operations. Additional Information:- The candidate should have minimum 5 years of experience in Security Operation Automation.- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

3.0 - 7.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Company Description About Sopra Steria Sopra Steria, a major Tech player in Europe with 50,000 employees in nearly 30 countries, is recognised for its consulting, digital services and solutions. It helps its clients drive their digital transformation and obtain tangible and sustainable benefits. The Group provides end-to-end solutions to make large companies and organisations more competitive by combining in-depth knowledge of a wide range of business sectors and innovative technologies with a collaborative approach. Sopra Steria places people at the heart of everything it does and is committed to putting digital to work for its clients in order to build a positive future for all. In 2024, the Group generated revenues of €5.8 billion. Job Description The world is how we shape it. Key Responsibilities: Implement and maintain endpoint security solutions such as EDR, antivirus, encryption, and application control tools. Monitor, analyze, and respond to security alerts and incidents originating from workstations and endpoints. Apply and manage workstation hardening standards, including adherence to security baselines. Conduct vulnerability assessments on endpoints and coordinate timely remediation activities. Manage patch deployment for operating systems and applications to ensure compliance with internal policies and reduce exposure to threats. Ensure endpoint systems comply with security policies, standards, and regulatory frameworks. Actively participate in incident response efforts related to endpoint breaches or malware incidents. Contribute to risk assessments and provide input during security architecture reviews related to endpoints. Maintain a strong understanding of Windows and macOS operating systems from a security perspective. Required Skills & Experience: Hands-on experience with EDR/XDR platforms such as Microsoft Defender for Endpoint or Sentinel One. Familiarity with vulnerability management tools. Knowledge of endpoint technologies including: BitLocker (encryption) Application control Endpoint privilege management Windows Defender Firewall Mobile Device Management (MDM), particularly Intune Understanding of endpoint threat intelligence and ability to analyze threat data. Scripting or automation experience using PowerShell or other scripting languages. Total Experience Expected: 03-07 years Qualifications B.tech/BE/BCA Additional Information At our organization, we are committed to fighting against all forms of discrimination. We foster a work environment that is inclusive and respectful of all differences. All of our positions are open to people with disabilities.

Posted 2 weeks ago

Apply

40.0 years

0 Lacs

Hyderābād

On-site

India - Hyderabad JOB ID: R-208858 ADDITIONAL LOCATIONS: India - Hyderabad WORK LOCATION TYPE: On Site DATE POSTED: Jul. 14, 2025 CATEGORY: Information Systems ABOUT AMGEN Amgen harnesses the best of biology and technology to fight the world’s toughest diseases, and make people’s lives easier, fuller and longer. We discover, develop, manufacture and deliver innovative medicines to help millions of patients. Amgen helped establish the biotechnology industry more than 40 years ago and remains on the cutting-edge of innovation, using technology and human genetic data to push beyond what’s known today. Role Description: The SOC Tier 2 Analyst serves as the primary escalation point for the Tier 1 SOC team, responsible for advanced threat detection, investigation, and incident response coordination. This role acts as a technical lead, ensuring that security incidents are properly triaged, investigated, and remediated while continuously improving security operations processes. The SOC Tier 2 Analyst plays a critical role in cybersecurity defense, supporting real-time monitoring, forensic analysis, and threat hunting. They will assist incident responders across all lifecycle phases, from detection to post-incident reviews, and contribute to SOC process optimizations. Roles & Responsibilities: Act as the primary escalation point for SOC Tier 1 analysts, providing technical expertise and guidance in incident handling. Perform deep-dive analysis of security events, leveraging SIEM, EDR, IDS/IPS, and other security tools. Identify common attack techniques (MITRE ATT&CK framework) and investigate anomalies to detect advanced persistent threats (APTs). Assist in security incident response, leading containment, eradication, and recovery efforts. Conduct artifact analysis to determine the root cause and scope of security incidents. Collaborate with Threat Intelligence and Threat Hunting teams to improve detection rules and incident response playbooks. Develop and refine SOC standard operating procedures (SOPs) to enhance security event triage and response. Work with engineering teams to fine-tune security controls and improve overall SOC efficiency. Mentor and train Tier 1 analysts to improve SOC maturity and ensure effective knowledge transfer. Support security audits, compliance initiatives, and reporting efforts as required. Basic Qualifications and Experience: Master’s degree in Information Technology or Cybersecurity OR Bachelor’s degree with 1 year of experience in Security Operations or related field OR Diploma with 2 years of experience in Security Operations or a related field Functional Skills: Must-Have Skills: Strong understanding of SOC operations, including event triage, escalation, and investigation. Experience analyzing cybersecurity threats and understanding attacker TTPs (Tactics, Techniques, and Procedures). Proficiency in security tools such as SIEM (Splunk, QRadar, Sentinel), EDR (CrowdStrike, Defender ATP), IDS/IPS, and firewall logs. Experience in incident response across all phases (detection, containment, eradication, recovery). Knowledge of Windows and Linux security, including log analysis, PowerShell, and Bash scripting. Good-to-Have Skills: Experience in 24/7 SOC operations and shift leadership. Knowledge of forensic tools (Volatility, Autopsy, FTK) and malware analysis techniques. Understanding of cloud security monitoring (AWS, Azure, GCP). Familiarity with MITRE ATT&CK, NIST Cybersecurity Framework, and CIS controls. Threat hunting experience to proactively detect unknown threats. Professional Certifications: CompTIA Security+ (preferred) CEH (preferred) GSEC (preferred) GCFA (preferred) MTA Security Fundamentals (preferred) CISSP (preferred) Soft Skills: Strong communication and collaboration skills, particularly when working with global teams. Ability to manage and prioritize tasks effectively in a high-pressure environment. Critical thinking and problem-solving abilities, especially in incident response situations. A commitment to continuous learning and knowledge sharing. EQUAL OPPORTUNITY STATEMENT Amgen is an Equal Opportunity employer and will consider you without regard to your race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, or disability status. We will ensure that individuals with disabilities are provided with reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.

Posted 2 weeks ago

Apply

0 years

2 - 8 Lacs

Chennai

On-site

Role: Secops/Network Security Operations Location: Chennai Designs and maintains secure, high-performance network architectures with policy compliance. Skilled in Sentinel, MS Defender, Palo Alto Firewalls (HA), IDS/IPS, and vulnerability management tools. Leads advanced incident response, triage, investigations, and documentation. Develops incident plans, threat hunts, and detection use cases with SIEM and threat intelligence. Enhances detection through rule tuning, hunting strategies, and vulnerability analysis. Collaborates with teams, mentors analysts, and ensures timely resolution of incidents. Preferred certifications: GCIH, CISSP, Security+. Best regards, Steve Jackson steve.jackson@arthurgrand.com Arthur Grand Technologies Inc Arthur Grand Technologies is an Equal Opportunity Employer (including disability/vets) Job Types: Full-time, Permanent Schedule: UK shift Work Location: In person

Posted 2 weeks ago

Apply

0 years

3 - 7 Lacs

Chennai

On-site

Arthur Grand Technologies is currently seeking a highly motivated and skilled Network Security Operations Level 3 for one of our clients. Position: Network Security Operations Level 3 Location: Chennai Duration: Fulltime Job Description: In-depth knowledge of Sentinel, MS Defender, other Threat centric tools, IDS/IPS, email security, vulnerability scanners and other security technologies. Worked on PaloAlto Firewall enterprise network infrastructure with HA. Ability to investigate potential threats identified through security alerts via SIEM, anomalies, or intelligence reports. Relevant industry certifications such as GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), or CompTIA Security+ are highly desirable Best regards, Sheema H Sheema.h@arthurgrand.com Arthur Grand Technologies Inc www.arthurgrand.com Arthur Grand Technologies is an Equal Opportunity Employer (including disability/vets) Job Type: Full-time Work Location: In person

Posted 2 weeks ago

Apply

3.0 - 7.0 years

5 - 6 Lacs

Noida

On-site

Company Description About Sopra Steria Sopra Steria, a major Tech player in Europe with 50,000 employees in nearly 30 countries, is recognised for its consulting, digital services and solutions. It helps its clients drive their digital transformation and obtain tangible and sustainable benefits. The Group provides end-to-end solutions to make large companies and organisations more competitive by combining in-depth knowledge of a wide range of business sectors and innovative technologies with a collaborative approach. Sopra Steria places people at the heart of everything it does and is committed to putting digital to work for its clients in order to build a positive future for all. In 2024, the Group generated revenues of €5.8 billion. The world is how we shape it. Job Description Key Responsibilities: Implement and maintain endpoint security solutions such as EDR, antivirus, encryption, and application control tools. Monitor, analyze, and respond to security alerts and incidents originating from workstations and endpoints. Apply and manage workstation hardening standards , including adherence to security baselines . Conduct vulnerability assessments on endpoints and coordinate timely remediation activities . Manage patch deployment for operating systems and applications to ensure compliance with internal policies and reduce exposure to threats. Ensure endpoint systems comply with security policies, standards, and regulatory frameworks . Actively participate in incident response efforts related to endpoint breaches or malware incidents. Contribute to risk assessments and provide input during security architecture reviews related to endpoints. Maintain a strong understanding of Windows and macOS operating systems from a security perspective. Required Skills & Experience: Hands-on experience with EDR/XDR platforms such as Microsoft Defender for Endpoint or Sentinel One . Familiarity with vulnerability management tools . Knowledge of endpoint technologies including: BitLocker (encryption) Application control Endpoint privilege management Windows Defender Firewall Mobile Device Management (MDM), particularly Intune Understanding of endpoint threat intelligence and ability to analyze threat data. Scripting or automation experience using PowerShell or other scripting languages. Total Experience Expected: 03-07 years Qualifications B.tech/BE/BCA Additional Information At our organization, we are committed to fighting against all forms of discrimination. We foster a work environment that is inclusive and respectful of all differences. All of our positions are open to people with disabilities.

Posted 2 weeks ago

Apply

4.0 years

0 Lacs

Bengaluru, Karnataka, India

Remote

Title: DevOps Engineer – Terraform Qualification: BE / MCA Experience: 6+Yrs to 8 Yrs Notice period: Immediate joiners only. Location: Bangalore Mode of work - Part time / Freelancer Responsibilities: Design, develop, and manage scalable infrastructure using Terraform. Collaborate with cloud architects and developers to define infrastructure requirements and deploy services across AWS/Azure/GCP. Create reusable modules and maintain consistent infrastructure code across environments. Automate provisioning, configuration, and deployment tasks using Terraform and related tools. Integrate Terraform with CI/CD pipelines using tools such as Jenkins, GitLab CI, GitHub Actions, etc. Monitor and troubleshoot infrastructure issues and contribute to improving system reliability. Maintain documentation for infrastructure design and procedures. Ensure infrastructure follows security and compliance best practices. Mandatory Skills: 2–4 years of experience in DevOps, Infrastructure Engineering, or related roles. Hands-on experience with Terraform in production environments. Good understanding of cloud services (preferably AWS, but Azure or GCP experience also acceptable). Experience with CI/CD pipelines and version control tools like GitLab, Git Familiarity with Linux-based systems and scripting languages (Bash, Python, etc.). Working knowledge of IaC principles, configuration management, and system orchestration. Experience using Terraform modules, state management, and remote backends. Systems performance monitoring and maintenance Troubleshooting of issues across DevOps processes. Good to have: Exposure to containerization (Docker, Kubernetes). Knowledge of monitoring tools like Cloud-native monitoring services and or Prometheus, Grafana, EKS Experience with policy-as-code tools like Terraform Sentinel or OPA. Certification in any major cloud platform (AWS/Azure/GCP) is a plus Note: Request you to apply for this role only if you have the mandatory skills mentioned above.

Posted 2 weeks ago

Apply

0.0 - 3.0 years

0 Lacs

Hyderabad, Telangana

Remote

Security Research Hyderabad, Telangana, India Date posted Jul 14, 2025 Job number 1846575 Work site Up to 50% work from home Travel None Role type Individual Contributor Profession Security Engineering Discipline Security Research Employment type Full-Time Overview Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world. We are seeking for a passionate cybersecurity professionals to join our growing team of Defenders. In this role, you will proactively detect, investigate, and respond to advanced threats across enterprise environments using cutting-edge and AI enabled security tools and threat intelligence. The ideal candidate combines strong security expertise with a curious mindset and skills to conduct deep threat analysis. Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. Qualifications Required Qualification Graduate degree in engineering or equivalent discipline. 1–3 years of experience in cybersecurity (SOC, IR, Threat Hunting, Red Team). Hands-on experience with SIEM, EDR, and cloud-native security tools (Microsoft XDR, Sentinel, CrowdStrike, etc.). Experience with at least one cloud platform (Azure, AWS, GCP) and its associated security services and configurations. Familiarity in KQL, Python, or similar scripting languages for data analysis and automation. Strong knowledge of MITRE ATT&CK, Cyber Kill Chain, and adversary TTPs. Familiarity with operating system internals (Windows, Linux) and endpoint/network forensics. Preferred Qulaification Certifications like CISSP, OSCP, CEH, GCIH, AZ-500, SC-200 or similar/equivalent are a plus. Responsibilities Monitor, triage, and respond to security incidents using alerts and incidents from Microsoft Defender products (MDE, MDI, MDO, MDA, MDC etc.) Perform proactive threat hunting using hypothesis, and telemetry from endpoints, identities, cloud and network. Develop hunting queries using Kusto Query Language (KQL) or similar to uncover suspicious patterns and behaviors. Investigate security incidents across hybrid environments and contribute to root cause analysis and containment strategies. Collaborate with internal teams (defender, threat intelligence, engineering) to enhance detection logic, develop automations, and improve incident response workflows. Contribute to incident documentation, detection playbooks, and operational runbooks. Stay current with evolving threat landscapes, cloud attack vectors, and advanced persistent threats (APT). Benefits/perks listed below may vary depending on the nature of your employment with Microsoft and the country where you work.  Industry leading healthcare  Educational resources  Discounts on products and services  Savings and investments  Maternity and paternity leave  Generous time away  Giving programs  Opportunities to network and connect Microsoft is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations.

Posted 2 weeks ago

Apply

0 years

0 Lacs

India

Remote

Job Title: Responsibilities: Investigate coastal geomorphological dynamics (e.g., erosion, sediment transport, sea-level rise impacts) and urban landscape evolution using remote sensing (RS) and GIS technologies. Analyze multi-temporal satellite imagery (e.g., Landsat, Sentinel, Lidar) and aerial data to quantify geomorphological changes in coastal and urban environments. Develop predictive models of shoreline changes, urban subsidence, and flood-risk zones using geospatial tools (e.g., ArcGIS Pro, QGIS, ERDAS IMAGINE). Conduct field validation studies in coastal/urban sites and integrate ground-truth data with RS analysis. Publish findings in high-impact journals (Q1/ISI) and present at international conferences. Collaborate with interdisciplinary teams on climate adaptation and hazard mitigation projects. Qualifications: MSc/PhD in Geomorphology, Physical Geography, Geosciences, or related field. Expertise in RS/GIS software: Advanced proficiency in ArcGIS, ENVI, Google Earth Engine, and Python/R for geospatial analysis. Experience with digital terrain modeling (DTM/DEM), change detection, and spectral indices (e.g., NDVI, NDWI). Demonstrated research in coastal geomorphology (e.g., dune dynamics, deltaic systems) and urban landscape transformation. Strong publication record in geomorphology, remote sensing, or GIS journals. Fieldwork competency (topographic surveys, sediment sampling) and data integration skills. Preferred Skills: Knowledge of machine learning applications in geomorphology (e.g., land cover classification, change prediction). Experience with SAR data (InSAR for subsidence monitoring) or hyperspectral imagery. Familiarity with coastal vulnerability indices (CVI) and urban growth modeling. Offer: Competitive salary + grants for international conferences. Access to high-resolution satellite data, UAV/drone equipment, and advanced computing resources. Collaboration with leading research networks in geosciences. 📍 Location: [Iran] 📧 Apply: Send CV, cover letter, and 2 relevant publications to [h.amoonia@cfu.ac.ir] with subject: “Coastal Urban Geomorphology Researcher Application – [Your Name]” .

Posted 2 weeks ago

Apply

15.0 - 20.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisation's security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure. Translating the vision, you set the tone, and inspire others to follow. Your role is crucial in driving business growth, shaping the direction of client engagements, and mentoring the next generation of leaders. You are expected to be a guardian of PwC's reputation, understanding that quality, integrity, inclusion and a commercial mindset are all foundational to our success. You create a healthy working environment while maximising client satisfaction. You cultivate the potential in others and actively team across the PwC Network, understanding tradeoffs, and leveraging our collective strength. Skills Examples of the skills, knowledge, and experiences you need to lead and deliver value at this level include but are not limited to: Lead in line with our values and brand. Develop new ideas, solutions, and structures; drive thought leadership. Solve problems by exploring multiple angles and using creativity, encouraging others to do the same. Balance long-term, short-term, detail-oriented, and big picture thinking. Make strategic choices and drive change by addressing system-level enablers. Promote technological advances, creating an environment where people and technology thrive together. Identify gaps in the market and convert opportunities to success for the Firm. Adhere to and enforce professional and technical standards (e.g. refer to specific PwC tax and audit guidance) the Firm's code of conduct, and independence requirements. Platform: Cybersecurity Experience: 15-20 years Minimum Degree Required: Bachelor’s or master’s degree in Computer Science/Communications or related field from reputed Indian universities Certification(s) Preferred : Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), or Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC) Job Responsibilities:- Lead Cyber Defense pillar consisting of multiple sub capabilities (including SIEM/SOC, Network Security, Cloud Security, IOT Security). Driving support in sales lifecycle and crafting a narrative that helps convert an opportunity to a WIN Manage/coach a team of practitioners that deliver client services in areas listed above Managing multiple stakeholders including senior leadership to help realise stated vision/goals Identify and build new capabilities to help expand the current portfolio of offerings Having the ability to mentor and support Managers/Senior Managers to the fullest extent in practice development Drive practice operations that include hiring, managing supply/demand, grooming staff towards a path of continuous improvement Creating career paths and enabling team members to pursue their professional goals that tie into the practice goals Collaborating with extended leadership to drive initiatives that are of utmost importance to the firm’s goals Skills Required Must have hands-on experience SIEM platforms (Splunk, Sentinel) / Network Security / Cloud Security / IOT Security /SNOW / ITIL / Agile Methodologies Good understanding of use case development based on client requirements. Experience in developing project plans and tracking the complete project delivery Driving stand up call with team / clients Exposure \ knowledge of integration on various SIEM platforms Experience on implementing EDR solutions Experience in implementing DLP solutions Experience in Network Security & Cloud Security (AWS/Azure). Previous experience as a Cyber security architect is a plus. Experience on handling client proposals a plus Have good understanding of the MITRE framework Knowledge of programming languages a plus (Python, Perl and Shell scripting etc.) Experience working with US clients Good communications skills Minimum Degree Required: Bachelor’s or master’s degree in Computer Science/Communications or related field from reputed Indian universities Certification(s) Preferred : Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), or Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC)

Posted 3 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

Qualcomm India Private Limited is seeking a Hardware Engineer to join their dynamic Customer engineering team. As a Hardware Engineer at Qualcomm, you will be responsible for integrating Qualcomm solutions into customer end products across various markets such as Mobile, PC, IoT, Automotive, and consumer electronics. You will play a key role in designing industry standard form factor modules, utilizing schematic capture tools like OrCAD and Siemens Mentor Graphics Designer, and working with PCB layout tools such as Cadence Allegro and Siemens Mentor Graphics Expedition. In addition, you will be involved in Power Distribution Network (PDN) methodologies, routing topologies for high-speed interfaces, and high-speed simulation tools like Ansys Q3D and Cadence Sigrity. The ideal candidate should possess excellent communication skills to interact with external customers globally. Hands-on experience with PDN simulations, analog, power, digital, and RF PCB layout, multilayer PCBs, and knowledge of PCB layout tools like Altium Designer and Mentor PADS are desired. Familiarity with thermal impacts and mechanical constraints on PCBs, as well as documenting PCB guidelines and rules is essential. The candidate should have 5-8 years of relevant experience and expertise in Digital/High Speed/SoC domain skills. Candidates should be proficient in reviewing schematics & PCB layouts, conducting electrical tests & measurements, and have exposure to prototyping platforms like Arduino and Raspberry Pi. Sound understanding of HW and PCB design, signal integrity, EMC principles, Design for Manufacturability (DFM), and Design for Testability (DFT) practices are preferred qualifications. The ability to perform design reviews, provide constructive feedback, solve problems effectively, and meet project deadlines is crucial. Qualcomm is an equal opportunity employer committed to providing accessible processes for individuals with disabilities. If you require accommodations during the application/hiring process, please contact Qualcomm's toll-free number or email disability-accommodations@qualcomm.com. The company expects its employees to adhere to all applicable policies and procedures, including security measures for protecting confidential information. Staffing and recruiting agencies are advised not to submit unsolicited profiles, applications, or resumes to Qualcomm. If you are passionate about hardware engineering, possess the required qualifications, and are eager to work on cutting-edge technologies and products, we encourage you to apply for this exciting opportunity at Qualcomm India Private Limited.,

Posted 3 weeks ago

Apply

4.0 - 7.0 years

3 - 7 Lacs

Bengaluru

Hybrid

Key Responsibilities: Understands SIEM tools (Sentinel ) functionality and logic behind creating rules and filters, integrating with different solution based on client security policy and requirements e.g. AV software, IDS, IPS etc... Good TCP /IP concepts Good understanding on Vulnerability Management tools such Nessus, Qualys Guard Diagnosing and resolving issues and problems with the clients information technology systems involving several processes. Act as a point of escalation for L1Team Members Develop/Fine Tune Use Cases Monitor logs and security events across network infrastructure. Log, monitor, investigate, and report on access violations. Provide log analysis to provide views of misuse, fraudulent or malicious activities. Provide updates as the incident progresses through the incident response process as requested by client. Support security incident response processes in the event of a security breach by providing logging and audit information and by providing incident reporting. Coordinate with client Information Security and Capgemini activities required to respond to security incident notifications received from Capgemini. Implement and manage a security incident management process according to the Security Policy. Maintain a security corrective action tracking methodology. Coordinate notification of security incident occurrence with client. Provide periodic trending problem reports. Create and maintain a Security Incident log that is also provided to client Information Security to facilitate historical analysis. Assist investigators of security incidents involving the client Sites and other locations, document findings, and coordinate resolution. Investigating causes, analyzing and diagnosing the problem and repairing or providing detailed alternative solutions. Technical Experience: - 1: Experience in SIEM tools, Strong working experience in SIEM ES 2: Team management Incident handling skills, use case management, risk assessment 3: SOC operations for very large enterprises 4: Security Analytics skills is added advantage 5: Should have excellent customer handling skills Professional Attributes: 1: Good verbal communication skills to connect with customers at varying levels of the organization methods 2: Ability to operate independently and make decisions with little or no supervision. Educational Qualification: Bachelor or college degree in related field or equivalent work experience

Posted 3 weeks ago

Apply

0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Join our digital revolution in NatWest Digital X In everything we do, we work to one aim. To make digital experiences which are effortless and secure. So we organise ourselves around three principles: engineer, protect, and operate. We engineer simple solutions, we protect our customers, and we operate smarter. Our people work differently depending on their jobs and needs. From hybrid working to flexible hours, we have plenty of options that help our people to thrive. This role is based in India and as such all normal working days must be carried out in India. Job Description Join us as a Security Analyst We’ll look to you to assess, triage, and respond proactively and effectively to security related threats, incidents, requests, and events The work you do will be vital in defending our assets, information, and systems from unauthorised access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction Collaborating with internal and external stakeholders including third party suppliers, you’ll ensure activities relating to incident response, user access, alert monitoring, root cause analysis, and scenario planning are completed in line with standard operating procedures and to a high standard This role is available at associate vice president level What you’ll do Working with an array of domains, stakeholders, and specialists, you’ll take a proactive role to anticipate and identify security events, incidents, and trends that could adversely impact the bank, our customers, employees, or assets. You’ll contribute to security operations including production support, incident response, and on-call rota, and you’ll carry out and contribute to root cause analysis on security incidents and events, conduct training and scenario planning to prepare for and anticipate future events. As such, you’ll minimise future reoccurrence, and prepare reports and briefings as needed and to a high quality. You’ll also develop and maintain response plans, procedures, and playbooks to increase consistency and effectiveness of response capability. As well as this, you’ll: Proactively identify and effectively manage risks to deliver key security related customer and compliance outcomes, escalating and driving actions as necessary Actively contribute to security operations such as production support, incident response and on-call rota Maintain the end-to-end security response as directed, and ensure that security related services are delivered in line with expectations and that process change is implemented smoothly Act with pace when responding to customer queries and complaints and when responding to security events, make sure that feedback loops are in place to learn how to improve service and response Interrogate and interpret large volumes of data and analyse and assess data to understand trends and causal factors The skills you’ll need We’re looking for someone with a passion for cloud security and automation using Agile and DevOps methodologies, as well as promoting shift-left culture, which integrates security analysis into each CI/CD stage. You’ll have experience with Azure Cloud and security stack including Defender, Azure Sentinel and Azure Security Centre. You’ll also have expertise in automated security assessments and familiarity with third-party security tools integration such as Qualys and Tenable and compliance standards like PCI-DSS. In addition to this, you’ll demonstrate: Experience and knowledge of security controls The ability to communicate technical issues in business terms to range of stakeholders Experience in penetration testing and vulnerability management An understanding of Agile methodologies with experience of working in an Agile team

Posted 3 weeks ago

Apply

4.0 - 10.0 years

5 - 9 Lacs

Bengaluru

On-site

Job Description: We are looking for a dedicated and skilled Assistant Manager – Quality to support our hospital’s quality and accreditation programs. The candidate must have hands-on experience in NABH accreditation , internal audits, quality data monitoring, and compliance coordination. Key Responsibilities: Coordinate and support all NABH accreditation activities and hospital quality initiatives. Assist in drafting and reviewing hospital policies, clinical protocols, SOPs, and operational guidelines. Ensure proper documentation and version control related to quality and accreditation. Conduct regular internal audits and ensure follow-up on corrective/preventive actions. Coordinate with departments to ensure compliance with NABH standards. Collect periodic updates from departments on accreditation readiness. Assist in self-assessment exercises and mock audits for NABH preparedness. Help implement and maintain the Quality Management System (QMS) in line with accreditation norms. Facilitate data collection and analysis related to patient care outcomes and quality indicators. Coordinate the Internal Quality Audit Program and report findings to Senior Management. Conduct induction training for new staff on Quality, Emergency Codes, and Patient Safety. Support the documentation and analysis of medication errors, adverse events, and sentinel events. Participate in CME programs, quality awareness sessions, and internal training programs. Eligibility Criteria: Educational Qualification: MHA / MBA in Hospital Administration (Mandatory) Experience: 4–10 years in hospital quality management with practical experience in NABH accreditation Interested candidates may apply through Indeed or email their resume to careers@rmhospital.in Job Type: Full-time Pay: ₹45,000.00 - ₹80,000.00 per month Work Location: In person

Posted 3 weeks ago

Apply

1.0 years

3 - 4 Lacs

India

On-site

· To maintain a clean and sterile OT. · To check equipment and take necessary action. · To maintain the sterility of instruments. · To see that the trolleys are set for each procedure with enough and correct instruments, sutures, linen etc. · To assist the surgeon in the procedure. · To be the nurse –advocate of the patient. · To take over and hand over the patient to the floors/ICU. · To count the instruments and swab before closing the operated part. · To check the specimen is send to lab with correct label and request. · To see that the instruments are washed, packed and autoclaved for the next use. · Maintain hospital infection control protocols. · To maintain the OT records. · Responsible for maintaining temperature, humidity and air changes as per defined norms. · Report any Incidence occurrence and sentinel events. · Checking daily inventory. Assist the incharge to maintain the quality indicator data. Job Type: Full-time Pay: ₹25,000.00 - ₹36,000.00 per month Benefits: Provident Fund Schedule: Night shift Rotational shift Experience: OT Registered Nurse: 1 year (Required) Work Location: In person

Posted 3 weeks ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

Remote

About Client: Our Client is a global IT services company headquartered in Southborough, Massachusetts, USA. Founded in 1996, with a revenue of $1.8B, with 35,000+ associates worldwide, specializes in digital engineering, and IT services company helping clients modernize their technology infrastructure, adopt cloud and AI solutions, and accelerate innovation. It partners with major firms in banking, healthcare, telecom, and media. Our Client is known for combining deep industry expertise with agile development practices, enabling scalable and cost-effective digital transformation. The company operates in over 50 locations across more than 25 countries, has delivery centers in Asia, Europe, and North America and is backed by Baring Private Equity Asia. Job Title: BeyondTrust Developer/ BeyondTrust Support Key Skills: Vaulting, Session Management, Credential Rotation, AAPM, PRA, EPM, IAM Job Locations: Hyderabad Experience: 6 – 10 Years Budget: Based on your Experience Education Qualification : Any Graduation Work Mode: Hybrid Employment Type: Contract Notice Period: Immediate - 15 Days Interview Mode: 2 Rounds of Technical Interview + Including Client round Job Description: JD for BeyondTrust Developer Skill: Deep hands-on expertise with BeyondTrust products: BeyondTrust Password Safe (Vaulting, Session Management, Credential Rotation, AAPM). BeyondTrust Privileged Remote Access (PRA) and Jumpoint architecture. BeyondTrust Endpoint Privilege Management (EPM) policy creation and troubleshooting. Strong understanding of Identity and Access Management (IAM) concepts: Authentication, Authorization, Single Sign-On (SSO), Multi-Factor Authentication (MFA). Roles and Responsibilities: · Ensure BeyondTrust deployments align with security best practices, compliance requirements (e.g., SOC 2, NIST, Zero Trust), and organizational policies. · Deeply understand and manage integrations between BeyondTrust products and other critical enterprise systems. · Troubleshoot complex integration issues with Identity Providers (IdPs) like Active Directory, Azure AD (Entra ID), Okta, Ping Identity, and other LDAP sources. · Work with SIEM/SOAR platforms (e.g., Splunk, Microsoft Sentinel, IBM QRadar) to ensure proper logging, alerting, and automated responses for BeyondTrust events. · Collaborate on integrations with ITSM tools (e.g., ServiceNow) for streamlined incident, problem, and change management workflows. · Develop and implement advanced monitoring strategies for BeyondTrust components to proactively identify performance bottlenecks, security anomalies, and potential failures. JD for BeyondTrust Support: Skills Deep hands-on expertise with BeyondTrust products BeyondTrust Password Safe (Vaulting, Session Management, Credential Rotation, AAPM). BeyondTrust Privileged Remote Access (PRA). BeyondTrust Endpoint Privilege Management (EPM) policy creation and troubleshooting. Experience in administration and maintenance of BeyondTrust components Thorough understanding of BeyondTrust integration with various platforms, such as different LDAP providers, Windows servers, UNIX servers, Databases and networking devices Knowledge of CyberArk PAM solutions Scripting skills: PowerShell is essential; Python or Bash is a plus for automation tasks. Basic understanding of SQL Server administration and querying. Strong understanding of modern cybersecurity principles, Zero Trust, and least privilege. Excellent problem-solving and communication skills to work cross-functionally with security, compliance, and IT teams. Prior experience with Agile practices such as Kanban or Scrum Roles and Responsibilities Support BeyondTrust solutions and services to securely manage privileged accounts and credentials across CUSTOMER platforms, systems and applications. Perform health check monitoring on all BeyondTrust severs to ensure consistent availability of system to end user. Troubleshoot and resolve technical issues related to BeyondTrust components and integrations. Monitor logs and events for Windows, UNIX and User identity management platforms to provide views of misuse or malicious activities. Participate in incident and response activities, including investigation and mitigation of security incidents involving privileged accounts. Interested Candidates please share your CV t o vamsi.v@people-prime.com

Posted 3 weeks ago

Apply

3.0 years

0 Lacs

Kochi, Kerala, India

On-site

About Client: Our Client is a global IT services company headquartered in Southborough, Massachusetts, USA. Founded in 1996, with a revenue of $1.8B, with 35,000+ associates worldwide, specializes in digital engineering, and IT services company helping clients modernize their technology infrastructure, adopt cloud and AI solutions, and accelerate innovation. It partners with major firms in banking, healthcare, telecom, and media. Our Client is known for combining deep industry expertise with agile development practices, enabling scalable and cost-effective digital transformation. The company operates in over 50 locations across more than 25 countries, has delivery centers in Asia, Europe, and North America and is backed by Baring Private Equity Asia. Hi....! We are hiring for below Positions Job Title: SOC Sentinel Key Skills: SOC , Sentinel , SIEM , KQL , Managed Detection & Response (MDR) Job Locations: Kochi Experience: 3 - 12Yrs Education Qualification : Any Graduation Work Mode: Hybrid Employment Type: Contract Notice Period: Immediate - 15 Days Interview Mode: 2 Rounds of Technical Interview + Including Client round Job Description: SOC Sentinel Key Responsibilities Act as an escalation point for high/critical severity incidents and perform thorough investigations. Analyze TTPs (Tools, Techniques, and Procedures) to identify attack vectors and lifecycle stages. Recommend improvements to security controls and organizational security hygiene. Conduct threat hunting and IOC/APT detection through advanced log analysis. Collaborate with clients’ security teams and internal teams for incident resolution and documentation. Identify process gaps and propose enhancements for the incident response lifecycle. Create, maintain, and improve runbooks, playbooks, and incident response processes. Actively participate in war room discussions, executive briefings, and team meetings. Must-Have Skills Minimum 3+ years of experience as a SOC L3 Analyst in a global SOC environment. Hands-on experience with SIEM tools such as Microsoft Sentinel, including rule writing in KQL and Use Case development. Strong incident response skills and experience writing response procedures and playbooks. Expertise in advanced threat detection, forensic investigation, and root cause analysis. Knowledge of threat hunting techniques and familiarity with attacker TTPs and MITRE ATT&CK framework. Experience with security monitoring, log analysis, and network traffic inspection. Ability to resolve and escalate incidents and provide detailed post-mortem analyses. Excellent communication and documentation skills for cross-functional collaboration. Good-to-Have Skills Familiarity with Use Case Factory and Managed Detection & Response (MDR) operations. Exposure to various security tools, including EDRs, vulnerability scanners, and SOAR platforms. Experience in training junior analysts and creating knowledge-sharing materials. Prior experience working in global customers/ MSSP environments with multiple customers. Interested Candidates please share your CV to sushma.n@people-prime.com

Posted 3 weeks ago

Apply

4.0 - 8.0 years

0 Lacs

lucknow, uttar pradesh

On-site

Agoda is an online travel booking platform that connects travelers with a global network of 4.7M hotels and holiday properties worldwide, as well as flights, activities, and more. As part of Booking Holdings and based in Asia, Agoda has a diverse team of 7,100+ employees from 95+ nationalities across 27 markets. The work environment at Agoda is characterized by diversity, creativity, and collaboration, fostering a culture of experimentation and ownership to enhance the travel experience for customers. The Security Department at Agoda oversees security, compliance, GRC, and security operations to ensure the safety and protection of the company and its employees. As a member of the Security Operations (SecOps) Team, you will be at the forefront of designing, implementing, and maintaining cutting-edge security solutions to safeguard Agoda's large-scale global environment. This role offers the opportunity to work with advanced security tools, collaborate across multiple teams, and contribute directly to Agoda's mission of secure, seamless travel for millions of users worldwide. Key responsibilities in this role include implementing and managing secure cloud deployments across AWS, Azure, and GCP using Infrastructure-as-Code (IaC) tools like Terraform, identifying and remediating misconfigurations in cloud resources, providing expert guidance on cloud architecture and deployment strategies, and utilizing advanced tools for monitoring, detecting, and mitigating security threats. Additionally, you will be expected to develop scalable solutions using programming languages like Python and Go, design automated workflows to enhance threat detection capabilities, and establish secure practices for Kubernetes environments and CI/CD pipelines. To succeed in this role, you should have a minimum of 4 years of experience in a hands-on information security role, expertise in IDP/IAM solutions, familiarity with Microsoft security tools, proficiency in programming languages for automation tasks, and experience in managing cloud environments such as AWS, Google Cloud, or Azure. Effective communication skills are essential for conveying complex security concepts clearly to various stakeholders. Agoda offers a relocation package for those interested in moving to Bangkok, Thailand, along with a range of benefits including a hybrid working model, WFH set up allowance, remote working opportunities, employee accommodation discounts, a diverse global team, annual CSR/volunteer time off, and access to various subscription services and support programs. Agoda is an Equal Opportunity Employer and keeps applications on file for future vacancies. Please note that Agoda does not accept third-party resumes and is not responsible for any fees related to unsolicited resumes. For more details, please refer to the privacy policy.,

Posted 3 weeks ago

Apply

5.0 years

0 Lacs

Jaipur, Rajasthan, India

On-site

Functional Overview: The Security Operations Analyst is responsible for monitoring, reporting, and analyzing the organization’s global security posture. They must be able to analyze all available information, including logs, network traffic, and other data generated by the security systems in place, to identify actual anomalies, security breaches, and other incidents, distinguishing between false positives and genuine threats. Duties and responsibilities: Continuously monitors the alert queue and analyzes available logs and context necessary to initiate incident response work. Coordinate triage with local stakeholders on security alerts Analyzes and determines actionable items based on all available logs, packet captures, and other relevant data, accurately distinguishing between actionable and non-actionable information and weeding out false positives and irrelevant data. Handle security offense tickets and ensure compliance with the Service Level Agreement (SLA) by communicating, escalating, and following up with the internal team and stakeholders, providing timely updates until resolution. Conduct vulnerability assessments and resolve security issues identified through evaluations and other sources. Support numerous security project implementations from a technical perspective. Evangelize security within the company and serve as an advocate for maintaining trust with partners and customers. Staying up to date with emerging security threats, including applicable regulatory security requirements. Other responsibilities and additional duties as assigned by the security management team Minimum competencies: Minimum 5 years of experience working within information security. Experience with Microsoft Azure Sentinel and Microsoft 365 Defender is required. Working experience in creating SOC playbooks and threat hunting. Strong understanding of phishing detection and response. Knowledgeable in Windows/Unix or any penetration testing tools. Strong written communication skills and presentation skills. Strong understanding of security incident management, malware management, and vulnerability management processes. Knowledge of network protocols, firewalls, and IDS/IPS systems. Cloud Security & Firewalls: Microsoft Azure (Azure Firewall, Defender for Cloud), Palo Alto SIEM & SOAR Tools: Microsoft Azure Sentinel, M365 Defender Network and Security Certification is a huge plus (CCNA, CCNP, CompTIA (Network+ce, Security+ce, CySa+ce)

Posted 3 weeks ago

Apply

0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In cybersecurity incident management at PwC, you will focus on effectively responding to, and mitigating, cyber threats, maintaining the security of client systems and data. You will be responsible for identifying, analysing, and resolving security incidents to minimise potential damage and protect against future attacks. Driven by curiosity, you are a reliable, contributing member of a team. In our fast-paced environment, you are expected to adapt to working with a variety of clients and team members, each presenting varying challenges and scope. Every experience is an opportunity to learn and grow. You are expected to take ownership and consistently deliver quality work that drives value for our clients and success as a team. As you navigate through the Firm, you build a brand for yourself, opening doors to more opportunities. Skills Examples of the skills, knowledge, and experiences you need to lead and deliver value at this level include but are not limited to: Apply a learning mindset and take ownership for your own development. Appreciate diverse perspectives, needs, and feelings of others. Adopt habits to sustain high performance and develop your potential. Actively listen, ask questions to check understanding, and clearly express ideas. Seek, reflect, act on, and give feedback. Gather information from a range of sources to analyse facts and discern patterns. Commit to understanding how the business works and building commercial awareness. Learn and apply professional and technical standards (e.g. refer to specific PwC tax and audit guidance), uphold the Firm's code of conduct and independence requirements. TDR – Security Analysts (SOC Analyst) SOC L1 Analyst Responsibilities: Monitoring: Continuously monitor security alerts and events generated by various security tools, such as SIEM (Security Information and Event Management) systems,Endpoint Detection and Response (EDR),intrusion detection systems, SOAR, UEBA,Email Gateway,Proxy and firewalls. Incident Detection and Analysis: Analyze security events and incidents to identify potential security breaches or threats. This involves investigating alerts, analyzing network traffic, user/host anomaly,Phishing and conducting initial triage to determine the severity and impact of the incident. Incident Response: Respond to security incidents by following established procedures,protocols and SLAs. This may involve escalating incidents to higher-level analysts or incident response teams, coordinating with Endusers/Stakeholders and IT teams, and documenting incident details as per the standard templates. Threat Intelligence: Stay updated on the latest security threats, vulnerabilities, and Zero-Day attacks. Leverage threat intelligence sources to identify potential indicators of compromise/Indicators of Attack and proactively detect emerging threats and also notifying about these threats to Leadership and Client teams. Threat Hunting: To detect and mitigate potential threats that may bypass traditional security measures. You will utilize various tools and techniques to identify indicators of compromise (IOCs) and potential attack vectors. By continuously monitoring threat intelligence feeds and analyzing security bulletins, you will stay updated on the latest attack techniques and vulnerabilities. Collaborating with other security teams, you will investigate incidents, develop hunting techniques, document findings, and provide reports to management. Documentation and Reporting: Maintain accurate and detailed records of security incidents, including incident timelines, actions taken, and outcomes. Prepare incident reports and contribute to post-incident reviews and lessons learned sessions also working on Client weekly,Monthly and quarterly reports. Collaboration: Collaborate with other analysts of the SOC team, as well as with Leadership teams, to share knowledge, insights, and best practices. Work closely with Client incident response teams to ensure effective incident resolution and mitigation. Continuous Improvement: Contribute to the improvement of security monitoring and incident response processes by identifying areas for SOP/Procedure enhancement, proposing solutions, Automations and Alert tunings. Compliance: Ensure compliance with relevant security standards, regulations, and policies, such as PCI DSS, HIPAA, or GDPR. Tools Knowledge: Splunk,Sentinel,MS Defender EDR, CrowdStrike, Cortex XDR,Palo alto XSOAR, Phantom,0365,ProofPoint,DLP

Posted 3 weeks ago

Apply

3.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In cybersecurity incident management at PwC, you will focus on effectively responding to, and mitigating, cyber threats, maintaining the security of client systems and data. You will be responsible for identifying, analysing, and resolving security incidents to minimise potential damage and protect against future attacks. Driven by curiosity, you are a reliable, contributing member of a team. In our fast-paced environment, you are expected to adapt to working with a variety of clients and team members, each presenting varying challenges and scope. Every experience is an opportunity to learn and grow. You are expected to take ownership and consistently deliver quality work that drives value for our clients and success as a team. As you navigate through the Firm, you build a brand for yourself, opening doors to more opportunities. Skills Examples of the skills, knowledge, and experiences you need to lead and deliver value at this level include but are not limited to: Apply a learning mindset and take ownership for your own development. Appreciate diverse perspectives, needs, and feelings of others. Adopt habits to sustain high performance and develop your potential. Actively listen, ask questions to check understanding, and clearly express ideas. Seek, reflect, act on, and give feedback. Gather information from a range of sources to analyse facts and discern patterns. Commit to understanding how the business works and building commercial awareness. Learn and apply professional and technical standards (e.g. refer to specific PwC tax and audit guidance), uphold the Firm's code of conduct and independence requirements. Associate TDR Operations Associate L1 (India) A career in our Cyber Managed Services will provide you the opportunity to solve our clients' most critical business and data protection-related challenges. You will be part of a growing team driving strategic programs, data analytics, innovation, deals, cyber resiliency, response, and technical implementation activities. You will have access to not only the top Cybersecurity, Privacy, and Forensics professionals at PwC, but also to our clients and industry analysts across the globe. A career in our Advisory Acceleration Center is the natural extension of PwC’s leading class global delivery capabilities. We provide premium, cost-effective, high-quality services that support process quality and delivery capability in support of client engagements. Our Acceleration Center team extends our leading Cybersecurity, Privacy & Forensics capabilities. Responsibilities As a Cyber Ops Associate, you'll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to: Share and collaborate effectively with others, creating a positive team spirit. Identify and make suggestions for improvements when problems and/or opportunities arise. Validate data and analysis for accuracy and relevance. Follow risk management and compliance procedures. Keep up-to-date with developments in your area of specialty. Communicate confidently in a clear, concise, and articulate manner - verbally and in written form. Seek opportunities to learn about the wider economy alongside the business models/corporate governance and/or regulatory environment of our clients. Uphold the firm's code of ethics and business conduct. Basic Qualifications Minimum Degree Required: Bachelor’s Degree Minimum Years of Experience: 3-5 Years Certification(s) Preferred: CEH, Security+, CHFI, CTIA, or Any SANS certification. Preferred Knowledge/Skills Demonstrates knowledge, leadership, and/or a proven record of success in the following areas: Networking and applying Network Principles (including the OSI Model, TCP/IP, DNS, HTTP, SMTP), System Administration, and Security Architecture. Applying Incident Response Frameworks and Handling Procedures. Fluency with the cyber attack lifecycle and/or the tactics, techniques, and procedures of threat actors. Information security, compliance, assurance, and/or other security best practices and principles. Possessing and fostering an inquisitive mindset amongst team members. SOC L1 Analyst Responsibilities Monitoring: Continuously monitor security alerts and events generated by various security tools, such as SIEM (Security Information and Event Management) systems, Endpoint Detection and Response (EDR), intrusion detection systems, SOAR, UEBA, Email Gateway, Proxy, and firewalls. Incident Detection and Analysis: Analyze security events and incidents to identify potential security breaches or threats. This involves investigating alerts, analyzing network traffic, user/host anomalies, phishing, and conducting initial triage to determine the severity and impact of the incident. Incident Response: Respond to security incidents by following established procedures, protocols, and SLAs. This may involve escalating incidents to higher-level analysts or incident response teams, coordinating with end-users/stakeholders and IT teams, and documenting incident details as per the standard templates. Threat Intelligence: Stay updated on the latest security threats, vulnerabilities, and Zero-Day attacks. Leverage threat intelligence sources to identify potential indicators of compromise/Indicators of Attack and proactively detect emerging threats, notifying leadership and client teams about these threats. Threat Hunting: Detect and mitigate potential threats that may bypass traditional security measures. Utilize various tools and techniques to identify indicators of compromise (IOCs) and potential attack vectors. By continuously monitoring threat intelligence feeds and analyzing security bulletins, stay updated on the latest attack techniques and vulnerabilities. Collaborate with other security teams to investigate incidents, develop hunting techniques, document findings, and provide reports to management. Documentation and Reporting: Maintain accurate and detailed records of security incidents, including incident timelines, actions taken, and outcomes. Prepare incident reports and contribute to post-incident reviews and lessons learned sessions, also working on client weekly, monthly, and quarterly reports. Collaboration: Collaborate with other analysts of the SOC team, as well as with leadership teams, to share knowledge, insights, and best practices. Work closely with client incident response teams to ensure effective incident resolution and mitigation. Continuous Improvement: Contribute to the improvement of security monitoring and incident response processes by identifying areas for SOP/procedure enhancement, proposing solutions, automations, and alert tunings. Compliance: Ensure compliance with relevant security standards, regulations, and policies, such as PCI DSS, HIPAA, or GDPR. Tools Knowledge SentinelOne, Splunk, MS Sentinel, MS Defender EDR, CrowdStrike, Cortex XDR, Palo Alto XSOAR, Phantom, O365, Proofpoint, DLP SentinelOne: Monitoring and analyzing security alerts and logs through SentinelOne SIEM, performing initial triage of security incidents and escalating them as needed. Additionally, collaborate closely with L2/L3 analysts to support incident response and threat hunting efforts. Engage in basic dashboard building, watchlist creation, running queries, and developing an understanding of security use cases to enhance detection capabilities.

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies