Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
5.0 - 8.0 years
5 - 8 Lacs
Cochin / Kochi / Ernakulam, Kerala, India
On-site
Your role and responsibilities Analyze and triage security incidents to determine their severity and impact on Infrastructure systems. Primary point of contact for Cyber Security Incident response in the Cyber Security Escalations team. Provide a first point of contact for L3 security escalations from the SOC team, ensuring a thorough review, escalation Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Conduct in-depth analysis of security events, collaborating directly with different stakeholders to escalate and thoroughly investigate incidents. Participate in Security Incident Response Team in the identification, containment, eradication, and resolution of security issues, This involves understanding the scope, impact, and root cause of incidents to tailor the response effectively, Collaborate with SOC teams to ensure effective incident response and continuous improvement. Assist in the development and refinement of SOC processes, procedures, and playbooks, Create and maintain incident reports, documenting findings, actions taken, and lessons learned Preferred technical and professional experience Stay current with emerging threats, vulnerabilities, and security technologies to proactively protect the organization. Notify Client of incident and required mitigation works. Track and update incidents and requests based on client's updates and analysis results. Good understanding on Phishing email analysis and their terminologies Having knowledge on EDR solutions (Preferred CrowdStrike), Participate in regular SOC team meetings and provide input on improving security posture. Communicate vertically and horizontally to keep stakeholders informed and involved on Security Operations matters
Posted 1 week ago
5.0 - 8.0 years
5 - 8 Lacs
Bengaluru / Bangalore, Karnataka, India
On-site
Your role and responsibilities Analyze and triage security incidents to determine their severity and impact on Infrastructure systems. Primary point of contact for Cyber Security Incident response in the Cyber Security Escalations team. Provide a first point of contact for L3 security escalations from the SOC team, ensuring a thorough review, escalation Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Conduct in-depth analysis of security events, collaborating directly with different stakeholders to escalate and thoroughly investigate incidents. Participate in Security Incident Response Team in the identification, containment, eradication, and resolution of security issues, This involves understanding the scope, impact, and root cause of incidents to tailor the response effectively, Collaborate with SOC teams to ensure effective incident response and continuous improvement. Assist in the development and refinement of SOC processes, procedures, and playbooks, Create and maintain incident reports, documenting findings, actions taken, and lessons learned Preferred technical and professional experience Stay current with emerging threats, vulnerabilities, and security technologies to proactively protect the organization. Notify Client of incident and required mitigation works. Track and update incidents and requests based on client's updates and analysis results. Good understanding on Phishing email analysis and their terminologies Having knowledge on EDR solutions (Preferred CrowdStrike), Participate in regular SOC team meetings and provide input on improving security posture. Communicate vertically and horizontally to keep stakeholders informed and involved on Security Operations matters
Posted 1 week ago
7.0 - 15.0 years
3 - 12 Lacs
Bengaluru / Bangalore, Karnataka, India
On-site
Required Skills Technology | Sentinel SIEM Tool Expert | Level 3 Support Technology | Securonix SIEM Tools Expert | Level 3 Support Technology | ArcSight SIEM Tools Administrator | Level 2 Support Technology | Cybersecurity General Administrator | Level 2 Support Technology | Network Traffic Analysis Administrator | Level 2 Support Education Qualification : Engineer - B.E / B.Tech / MCA Certification Mandatory / Desirable : Technology | CompTIA Security+/Certified SOC Analyst (CSA)/GIAC Security Essentials (GSEC)/Certified Ethical Hacker (CEH)/Cisco Certified CyberOps Associate/GIAC Certified Incident Handler (GCIH)/GIAC Security Operations Certified (GSOC) Technical Expertise: Expert knowledge of threat detection techniques and tools Lead incident response efforts, including advanced containment, eradication, and recovery techniques Conduct in-depth digital forensics investigations Expertise in configuring and optimizing SIEM (Security Information and Event Management) systems Analytical Skills: Deep understanding of log analysis techniques and tools Identify patterns and anomalies in large datasets Integrate threat intelligence into monitoring and response processes Stay updated on the latest threat intelligence and apply it to enhance security Collaboration and Coordination: Work closely with IT and security teams to ensure comprehensive security coverage Lead coordination of response efforts during major incidents Ensure effective communication and collaboration among all stakeholders Coordinate with external partners and vendors for specialized support Continuous Improvement: Continuously evaluate and improve security processes and procedures Implement lessons learned from incidents to enhance overall security posture Contribute to the development and updating of security policies and procedures
Posted 1 week ago
7.0 - 15.0 years
3 - 10 Lacs
Bengaluru / Bangalore, Karnataka, India
On-site
Expert knowledge of threat detection techniques and tools. Lead incident response efforts, including advanced containment, eradication, and recovery techniques. Conduct in-depth digital forensics investigations. Configure and optimize SIEM systems such as Sentinel, Securonix, and ArcSight. Analyze logs to identify patterns and anomalies in large datasets. Integrate threat intelligence into monitoring and response workflows. Stay updated on the latest threat intelligence and apply it to enhance security. Collaborate with IT and security teams to ensure comprehensive security coverage. Lead coordination of response efforts during major security incidents. Facilitate effective communication and collaboration among internal and external stakeholders. Coordinate with external partners and vendors for specialized support. Continuously evaluate and improve security processes and procedures. Implement lessons learned from incidents to strengthen overall security posture. Contribute to the development and updating of security policies and procedures.
Posted 1 week ago
8.0 - 12.0 years
16 - 25 Lacs
Pune, Bengaluru
Work from Office
Key Responsibilities: • Architecting & Designing Next-Gen SIEM/EDR. • Perform as the subject matter expert on any of the above solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. • Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. • Content development (Use case development) which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems • Work with the wider Delivery teams and customer to create SOC playbooks covering the SIEM and SOC setup • Create and configure SOAR workflows • Configure correlation searches and alerting including tweaking alerts to reduce false positives • Act as the SME for SIEM deployment and configure to assist delivery teams with the ingestion of data sources (AWS/Qualys) into the SIEM • Assist teams on implementation of SIEM alerts into Jira to track/manage alerts • Assist with setup and configuration of SIEM severity priorities in line with SLAs in both the SIEM, SOAR and Jira • Create and configure dashboards which can be used for reporting and incident response Skills Required Skills and Qualifications: • B. Tech./ B.E. with sound technical skills • Strong command on verbal and written English language. • Demonstrate both technical acumen and critical thinking abilities. • Strong interpersonal and presentation skills. • Minimum 10+ years of Hands-on experience of operating/implementing the above security tools. • Certification in any of the SIEM platforms is a plus
Posted 2 weeks ago
3 - 7 years
3 - 8 Lacs
Mumbai Suburbs, Navi Mumbai, Mumbai (All Areas)
Work from Office
Key Skills Required & Job Responsibilities SIEM configuration, patch Management OS upgrade server migration OS installation IP configuration Required Candidate profile Required Candidate profile Exp: 3+ Years Email Id : samiksha@peshr.com Mobile Number: 7498446998 Notice Period : Join Within 30 Days.
Posted 2 months ago
2 - 7 years
2 - 7 Lacs
Hyderabad, Mumbai (All Areas)
Work from Office
Key Skills Required & Job Responsibilities SIEM configuration, patch Management OS upgrade server migration OS installation IP configuration Required Candidate profile Required Candidate profile Exp: 3+ Years Email Id : samidha@peshr.com Mobile Number: 8828108691 Notice Period : Join Within 30 Days.
Posted 3 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2