Jobs
Interviews

9 Sentinel One Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 7.0 years

0 Lacs

hyderabad, telangana

On-site

As a Cybersecurity Incident Responder at Hitachi Vantara, you will be responsible for responding to security incidents promptly and efficiently. You will be required to provide guidance and coaching to team members, act as an escalation point for high severity incidents, and collaborate with Incident Response teams across different regions. Your role will involve interacting with various IT departments, including Help Desk, System Administration, and Networking, during high-priority incidents. To excel in this role, you must possess a strong working knowledge of networking concepts, firewalls, ACLs, and packet capture utilities. Experience in responding to host-based threats, log analysis using a SIEM, and familiarity with EDR and Anti-Malware technology is essential. Proficiency in tools such as Sentinel One and Microsoft Defender is highly desirable. The ideal candidate should have at least 3 years of experience in IT or cybersecurity, with a minimum of 2 years working in a SOC analyst or incident response role. Holding a security certification such as CISSP, CISM, or CEH would be advantageous. Knowledge of AWS and Microsoft Azure environments, as well as experience leading small teams, is highly desirable. At Hitachi Vantara, we value diversity, equity, and inclusion as integral aspects of our culture. We encourage individuals from all backgrounds to apply and bring their unique perspectives to our global team of innovators. We offer industry-leading benefits, support, and flexible arrangements that prioritize your holistic health and wellbeing, fostering an environment where you can thrive and grow professionally. If you are passionate about cybersecurity, enjoy working in a dynamic team environment, and are dedicated to making a real-world impact with your skills, we invite you to join us at Hitachi Vantara and contribute to our mission of co-creating meaningful solutions to complex challenges.,

Posted 2 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

chennai, tamil nadu

On-site

The ideal candidate will review and evaluate the existing cloud infrastructure to identify areas for improvement and implement necessary changes to enhance networking and firewalls (WAFs). You should have hands-on experience in handling Linux Servers and Windows, configuring and monitoring Routers, Switches, Firewall, including VPC Enabling, and troubleshooting issues in AWS. It would be an added advantage if you have implemented CCNA or Redhat Linux. You will be responsible for configuring and deploying cyber security tools (e.g., Sentinel One) to protect the AWS infrastructure from potential threats and vulnerabilities. Implementing best practice resiliency measures, such as spam filters, to ensure the stability and reliability of the cloud infrastructure is also a key aspect of the role. As part of the job, you will conduct thorough reviews of the existing AWS infrastructure, identify areas for optimization, and implement best practice configurations on existing web services. Designing, deploying, and managing cloud-based solutions on the AWS platform will be one of your primary responsibilities. Collaboration with development teams to optimize application performance and scalability in the AWS environment is essential. Ensuring the security, availability, and reliability of AWS resources and applications will be a critical part of your role. It is also important to stay up to date with the latest trends and developments in cloud computing and AWS services to bring continuous improvement to the infrastructure.,

Posted 2 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

chennai, tamil nadu

On-site

The role involves reviewing and evaluating the existing cloud infrastructure to identify areas for improvement and implementing necessary changes to enhance networking and firewalls (WAFs). The ideal candidate should have hands-on experience in handling Linux Servers and Windows, VMWare, and VSphere. They should be proficient in configuring and monitoring Routers, Switches, Firewalls, and VPC Enabling in Windows. Monitoring and troubleshooting issues in AWS and experience in Terraform for creating a duplicate environment would be an added advantage. Strong exposure in security focusing on OS, Patches, Firewalls, Lan Debugging, Windows, and Servers is essential. Having CCNA or Redhat Linux implementation experience would be advantageous. Additionally, the responsibilities include configuring and deploying cyber security tools such as Sentinel One to protect the AWS infrastructure from potential threats and vulnerabilities. Implementing best practice resiliency measures like spam filters to ensure the stability and reliability of the cloud infrastructure is crucial. The candidate will be required to conduct thorough reviews of the existing AWS infrastructure, optimize areas for improvement, and implement best practice configurations on web services. Designing, deploying, and managing cloud-based solutions on the AWS platform is a key aspect of the role. Collaborating with development teams to optimize application performance and scalability in the AWS environment is essential. Ensuring the security, availability, and reliability of AWS resources and applications is a priority. Staying updated with the latest trends and developments in cloud computing and AWS services is expected. Possessing a certification in VMware administration would be an added advantage.,

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

hyderabad, telangana

On-site

You will be joining RSM, a leading provider of professional services to the middle market globally, with a focus on instilling confidence in a world of change and enabling clients and employees to achieve their full potential. The exceptional team at RSM creates an inclusive culture that values talent and provides a compelling experience for clients. As an associate in Risk Consulting in Hyderabad, Telangana, you will play a key role in supporting ongoing security operations for RSM clients across various industries and locations. Your responsibilities will include investigating security incidents using tools such as SIEM, automation, and cybersecurity technologies like ServiceNow, Stellar Cyber, Hyas Insight, and DNS Protect. You will analyze and escalate critical security incidents, improve existing processes, and challenge procedures in an agile and fast-paced information security environment. Additionally, you will process IDS alerts, perform vulnerability scans, conduct malware analysis, and handle incident intake and reporting of cyber events and threat intelligence. To excel in this role, you should have a minimum B.A. or B.S. degree in computer science, information technology, or a related field, along with 3-5 years of experience in a security operations center or threat intelligence capacity. Possessing a security industry certification such as CYSA+, Security+, CISSP, or SANS GIAC is preferred. A strong understanding of security standards, compliance frameworks, and best practices, including SSAE 16, SOC 2, SOC3, OWASP Top 10, and NIST, is essential. You should also have a curious mindset, basic knowledge of cloud technologies, and experience with operating systems like Windows and Linux. At RSM, we offer a competitive benefits and compensation package, along with flexibility in your schedule to help you balance work and personal life. If you are passionate about cybersecurity and enjoy working in a collaborative team environment, this opportunity to join RSM's Risk Consulting team in Hyderabad, Telangana, may be the perfect fit for you. Apply now to be a part of a dynamic and inclusive organization where your skills and expertise will be valued and nurtured.,

Posted 1 month ago

Apply

8.0 - 12.0 years

0 Lacs

noida, uttar pradesh

On-site

You are an experienced professional with over 8 years of experience, seeking to set up SOC L1 operations, develop processes, procedures, and integrate teams. In this role, you will collaborate with Cadence SOC L2/L3 teams to establish a fully operational L1 framework. Your expertise in tools used in the SOC ecosystem such as Splunk, Devo, and Sentinel One is essential. Your key responsibilities will include designing and implementing SOC L1 workflows, processes, and escalation paths, onboarding and guiding the L1 team to align with L2/L3 operations, developing SOPs, incident response playbooks, and documentation. You will configure monitoring tools and dashboards for effective threat management and provide full-time onsite support for 6-8 weeks, transitioning to part-time remote support. To excel in this role, you should have proven experience in SOC operations and team setup, strong knowledge of SOC tools like SIEM and cybersecurity frameworks, excellent documentation, and communication skills. Possessing relevant certifications such as Security+ or CSA would be advantageous. This is a full-time position with a rotational shift schedule. The job requires you to be based in Noida, Uttar Pradesh and have the flexibility to commute or relocate before starting work. You will also be expected to provide details regarding your current CTC, expected CTC, notice period, current location, the level you are supporting, years of experience in SOC tools and cybersecurity frameworks, experience in Splunk and Sentinel One, and your comfort level with 24/7 support. If you meet the qualifications and are ready to take on the challenges of setting up SOC L1 operations and collaborating with cross-functional teams, this role offers an exciting opportunity to contribute to Cadence's cybersecurity initiatives.,

Posted 1 month ago

Apply

3.0 - 5.0 years

13 - 17 Lacs

Hyderabad

Work from Office

We are seeking analyst level individuals with experience working in the field of cybersecurity and a desire to help organizations improve their operations to join our team and help run the ongoing security operations for RSM clients in a variety of industries and geographic locations. Successful candidates will have working knowledge in some or all these areas IT operations, security monitoring, active directory, IP networking and various cloud technologies. Position and Key Responsibilities At RSM, analysts work with large and small companies in variety of industries. They develop strong working relationships with their peers within the security operations center (SOC) while learning their clients businesses and challenges facing their organizations. Analysts work as part of a broader team under the direction of more senior analysts, threat hunters, shift leads, intelligence analysts and SOC managers in support of multiple clients. Working in a mutually respectful team environment helps our analysts perform at their best and integrate their career with their personal life. You will have the opportunity to: Role Responsibilities: Investigate security incidents using SIEM tools, automation, and other cybersecurity technologies (i.e. ServiceNow, Stellar Cyber, Hyas Insight and DNS Protect, sentinel One, ELK Stack, Virus total, Shodan, NetFlow, Passive DNS, Silobreaker, Tenable.io, Hatching Triage Sandbox) Analyze, escalate, and assist in remediation of critical security incidents. Improve and challenge existing processes and procedures in a very agile and fast-paced information security environment serving multiple clients Process IDS alerts and identifying incidents and events in customer data. Setup and execution and analysis of vulnerability scans Perform advanced analysis and investigation into alerts as they are identified Performing initial basic malware analysis utilizing automated means (static and dynamic sandbox analysis or other available tools) Incident intake, ticket updates and reporting of cyber events and threat intelligence Understanding, identifying, and researching indicators of compromise (IOCs) from a variety of sources such as threat intelligence reports and feeds Writing incident reports, process documentation, and interact with clients as required Transcribe and implement atomic indicators into a monitoring environment. Consume policy documentation and determine applicability in a network. Work with protocols at layers 2 and higher in the OSI model, to include ARP TCP, UDP, ICMP, DNS, Telnet, SSH, HTTP, SSL, SNMP, SMTP, and other common protocols that use well-known ports. Develops the playbooks to respond and recovery from various attacks/incidents. Drives the automation efforts focused on the closing cases, responding to Cyber events and analyzing data required to enable efficient response activities. Processing of Cyber Threat Intel that is used across RSM detection platforms to understand and prepare for potential threats. Threat intel is heavily used across RSM platforms drive issue prioritization. Open to working shifts in a 24x7 operations environment. Qualifications and Experience: Minimum B.A. or B.S. degree or equivalent from an accredited university by the time employment commences or prior relevant military / law enforcement experience. Computer science, information technology, information systems management, or other similar degrees preferably with a focus on information security 3-5 years experience working in a security operations center, networking operations center or threat intelligence capacity. Possess at least one security industry certification such as CYSA+, Security+, CISSP, SANS GIAC (GSOC, GCIA, GMON, CGCDA) Knowledge of security standards and information security and compliance frameworks, controls, and best practices, including SSAE 16, SOC 2 and SOC3, OWASP Top 10, SANS, NIST Must have a naturally curious mindset and approach to solving problems. Basic understanding of cloud technologies and their operations Experience supporting various operating systems such as Windows/Linux Understanding of IP network protocols

Posted 1 month ago

Apply

5.0 - 9.0 years

5 - 10 Lacs

Kochi

Work from Office

Exp in SIEM,AV,Asset Monitoring tools(Rapid7,SentinelOne,Palo Alto Panorama,Nagios,Proofpoint TAP).Knowledge of malware prevention,threat detection,IT infra.Familiar with Office365,Azure,Citrix(XenApp),Windows OS.Exp in ticketing system(ConnectWise) Required Candidate profile Degree inMIS, Computer Science or similar. MS Certified (MCSE) or equivalent certification a plus.Security Certification (current/within 6 months),CompTIA Security+, CySA or Network+, ISC-2 CC

Posted 2 months ago

Apply

0.0 - 3.0 years

4 - 8 Lacs

Hyderabad, Telangana, India

On-site

Role Summary: Protects endpoint devices (laptops, servers, mobile) from cyber threats. Key Responsibilities: Design and implement endpoint protection strategies. Monitor and manage antivirus, EDR, and DLP tools. Respond to endpoint-related incidents. Maintain awareness of emerging threats Skills Required: Knowledge of Windows/Linux OS security. Experience with endpoint protection platforms (CrowdStrike, Sentinel One). Familiarity with encryption and certificate management. Qualifications: Bachelors in IT or Cybersecurity. Certifications: CISSP, CEH, or GIAC.

Posted 2 months ago

Apply

5.0 - 9.0 years

3 - 7 Lacs

Nagpur, Akola, Amravati

Work from Office

Role & responsibilities - Lead Engineer - Email gateway Reports to Senior Manager/Architect location) University degree in the field of computer science or IT. This role involves acting as primary point of contact for operational tickets resolution, enhancing, email security measures and providing document support. Experience/Qualifications * The ideal candidate will have a strong background in email security and vendor collaboration. * Must possess patching experience as well as upgrade and update and implementation of email gateways * Mandatory skills are Email authentication spf, dkim. dmarc also should be aware of spam, phishing, spoofing * Should possess basic networking and dns records knowledge Act as a primary point of contact for resolving operational tickets related to Trend micro email gateway which specifically includes ddei and imsva Daily monitoring reports for services, resource optimization, patching and Responsibilities upgrade activity. Rca preparation for mail flow issues Provide full email analysis for spam, spoofing,phishing, malware etc. Manage and maintaining server resources for email gateway Preferred candidate profile - Mandatory skills are Email authentication spf, dkim.dmarc also should be aware of spam, phishing, spoofing Must possess patching experience as well as upgrade and update and implementation of email gateways Rca preparation for mail flow issues

Posted 3 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies