Home
Jobs
Companies
Resume

7 Siem Configuration Jobs

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 8.0 years

5 - 8 Lacs

Cochin / Kochi / Ernakulam, Kerala, India

On-site

Foundit logo

Your role and responsibilities Analyze and triage security incidents to determine their severity and impact on Infrastructure systems. Primary point of contact for Cyber Security Incident response in the Cyber Security Escalations team. Provide a first point of contact for L3 security escalations from the SOC team, ensuring a thorough review, escalation Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Conduct in-depth analysis of security events, collaborating directly with different stakeholders to escalate and thoroughly investigate incidents. Participate in Security Incident Response Team in the identification, containment, eradication, and resolution of security issues, This involves understanding the scope, impact, and root cause of incidents to tailor the response effectively, Collaborate with SOC teams to ensure effective incident response and continuous improvement. Assist in the development and refinement of SOC processes, procedures, and playbooks, Create and maintain incident reports, documenting findings, actions taken, and lessons learned Preferred technical and professional experience Stay current with emerging threats, vulnerabilities, and security technologies to proactively protect the organization. Notify Client of incident and required mitigation works. Track and update incidents and requests based on client's updates and analysis results. Good understanding on Phishing email analysis and their terminologies Having knowledge on EDR solutions (Preferred CrowdStrike), Participate in regular SOC team meetings and provide input on improving security posture. Communicate vertically and horizontally to keep stakeholders informed and involved on Security Operations matters

Posted 1 week ago

Apply

5.0 - 8.0 years

5 - 8 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Foundit logo

Your role and responsibilities Analyze and triage security incidents to determine their severity and impact on Infrastructure systems. Primary point of contact for Cyber Security Incident response in the Cyber Security Escalations team. Provide a first point of contact for L3 security escalations from the SOC team, ensuring a thorough review, escalation Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Conduct in-depth analysis of security events, collaborating directly with different stakeholders to escalate and thoroughly investigate incidents. Participate in Security Incident Response Team in the identification, containment, eradication, and resolution of security issues, This involves understanding the scope, impact, and root cause of incidents to tailor the response effectively, Collaborate with SOC teams to ensure effective incident response and continuous improvement. Assist in the development and refinement of SOC processes, procedures, and playbooks, Create and maintain incident reports, documenting findings, actions taken, and lessons learned Preferred technical and professional experience Stay current with emerging threats, vulnerabilities, and security technologies to proactively protect the organization. Notify Client of incident and required mitigation works. Track and update incidents and requests based on client's updates and analysis results. Good understanding on Phishing email analysis and their terminologies Having knowledge on EDR solutions (Preferred CrowdStrike), Participate in regular SOC team meetings and provide input on improving security posture. Communicate vertically and horizontally to keep stakeholders informed and involved on Security Operations matters

Posted 1 week ago

Apply

7.0 - 15.0 years

3 - 12 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Foundit logo

Required Skills Technology | Sentinel SIEM Tool Expert | Level 3 Support Technology | Securonix SIEM Tools Expert | Level 3 Support Technology | ArcSight SIEM Tools Administrator | Level 2 Support Technology | Cybersecurity General Administrator | Level 2 Support Technology | Network Traffic Analysis Administrator | Level 2 Support Education Qualification : Engineer - B.E / B.Tech / MCA Certification Mandatory / Desirable : Technology | CompTIA Security+/Certified SOC Analyst (CSA)/GIAC Security Essentials (GSEC)/Certified Ethical Hacker (CEH)/Cisco Certified CyberOps Associate/GIAC Certified Incident Handler (GCIH)/GIAC Security Operations Certified (GSOC) Technical Expertise: Expert knowledge of threat detection techniques and tools Lead incident response efforts, including advanced containment, eradication, and recovery techniques Conduct in-depth digital forensics investigations Expertise in configuring and optimizing SIEM (Security Information and Event Management) systems Analytical Skills: Deep understanding of log analysis techniques and tools Identify patterns and anomalies in large datasets Integrate threat intelligence into monitoring and response processes Stay updated on the latest threat intelligence and apply it to enhance security Collaboration and Coordination: Work closely with IT and security teams to ensure comprehensive security coverage Lead coordination of response efforts during major incidents Ensure effective communication and collaboration among all stakeholders Coordinate with external partners and vendors for specialized support Continuous Improvement: Continuously evaluate and improve security processes and procedures Implement lessons learned from incidents to enhance overall security posture Contribute to the development and updating of security policies and procedures

Posted 1 week ago

Apply

7.0 - 15.0 years

3 - 10 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Foundit logo

Expert knowledge of threat detection techniques and tools. Lead incident response efforts, including advanced containment, eradication, and recovery techniques. Conduct in-depth digital forensics investigations. Configure and optimize SIEM systems such as Sentinel, Securonix, and ArcSight. Analyze logs to identify patterns and anomalies in large datasets. Integrate threat intelligence into monitoring and response workflows. Stay updated on the latest threat intelligence and apply it to enhance security. Collaborate with IT and security teams to ensure comprehensive security coverage. Lead coordination of response efforts during major security incidents. Facilitate effective communication and collaboration among internal and external stakeholders. Coordinate with external partners and vendors for specialized support. Continuously evaluate and improve security processes and procedures. Implement lessons learned from incidents to strengthen overall security posture. Contribute to the development and updating of security policies and procedures.

Posted 1 week ago

Apply

8.0 - 12.0 years

16 - 25 Lacs

Pune, Bengaluru

Work from Office

Naukri logo

Key Responsibilities: • Architecting & Designing Next-Gen SIEM/EDR. • Perform as the subject matter expert on any of the above solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. • Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. • Content development (Use case development) which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems • Work with the wider Delivery teams and customer to create SOC playbooks covering the SIEM and SOC setup • Create and configure SOAR workflows • Configure correlation searches and alerting including tweaking alerts to reduce false positives • Act as the SME for SIEM deployment and configure to assist delivery teams with the ingestion of data sources (AWS/Qualys) into the SIEM • Assist teams on implementation of SIEM alerts into Jira to track/manage alerts • Assist with setup and configuration of SIEM severity priorities in line with SLAs in both the SIEM, SOAR and Jira • Create and configure dashboards which can be used for reporting and incident response Skills Required Skills and Qualifications: • B. Tech./ B.E. with sound technical skills • Strong command on verbal and written English language. • Demonstrate both technical acumen and critical thinking abilities. • Strong interpersonal and presentation skills. • Minimum 10+ years of Hands-on experience of operating/implementing the above security tools. • Certification in any of the SIEM platforms is a plus

Posted 2 weeks ago

Apply

3 - 7 years

3 - 8 Lacs

Mumbai Suburbs, Navi Mumbai, Mumbai (All Areas)

Work from Office

Naukri logo

Key Skills Required & Job Responsibilities SIEM configuration, patch Management OS upgrade server migration OS installation IP configuration Required Candidate profile Required Candidate profile Exp: 3+ Years Email Id : samiksha@peshr.com Mobile Number: 7498446998 Notice Period : Join Within 30 Days.

Posted 2 months ago

Apply

2 - 7 years

2 - 7 Lacs

Hyderabad, Mumbai (All Areas)

Work from Office

Naukri logo

Key Skills Required & Job Responsibilities SIEM configuration, patch Management OS upgrade server migration OS installation IP configuration Required Candidate profile Required Candidate profile Exp: 3+ Years Email Id : samidha@peshr.com Mobile Number: 8828108691 Notice Period : Join Within 30 Days.

Posted 3 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies