Home
Jobs
Companies
Resume

2819 Siem Jobs

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 10.0 years

7 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

Hello Visionary! We empower our people to stay resilient and relevant in a constantly evolving world. We’re looking for people who are always searching for creative ways to grow and learn. People who want to make a real impact, now and in the future. Does that sound like youThen it seems like you’d make a great addition to our vibrant team. We are looking for Sr. SAP S4 HANA Security & Authorization Specialist . Before our software developers write even a single line of code, they have to understand what drives our customers. What is the environmentWhat is the user story based onImplementation means – trying, testing, and improving outcomes until a final solution emerges. Knowledge means exchange – discussions with colleagues from all over the world. Join our Digitalization Technology and Services (DTS) team based in Bangalore. You’ll make a difference by: Designing, implementing, and maintaining security and authorization concepts in our SAP S4 HANA environment, with additional expertise in SAP BTP security being a plus. Job / Skills: Key Responsibilities: Design, implement and maintain role-based access control (RBAC) concepts in SAP S4 HANA Develop and maintain authorization concepts aligned with business requirements and compliance standards Create and maintain custom roles and authorization objects Perform security audits and access reviews Troubleshoot authorization-related issues Provide documentation for authorization concepts and role designs Support SAP security implementations and upgrade projects Collaborate with business process owners for role design and access management Handle user access management and periodic access reviews BTP-Related Responsibilities: Design and implement authorization concepts for SAP BTP applications Configure and maintain Identity Authentication Service (IAS) and Identity Provisioning Service (IPS) Manage role collections and role templates in BTP environment Implementation of single sign-on (SSO) solutions Integration of authorization concepts between S4 HANA and BTP Required Qualifications: Bachelor's degree in Computer Science, Information Technology, or related field 5+ years of experience in SAP Security and Authorization Strong expertise in SAP S4 HANA security and authorization concepts In-depth knowledge of GRC Access Control Experience with User Access Management and Role Design Proficiency in authorization trace analysis and troubleshooting Understanding of security audit logs and their implementation Knowledge of SAP security best practices and industry standards Preferred Qualifications: Experience with SAP BTP security and authorization concepts Knowledge of Identity and Access Management (IAM) principles Familiarity with cloud security concepts SAP security certifications Experience with SAP Fiori security Knowledge of ABAP security Understanding of OAuth, SAML, and other authentication protocols Technical Skills: SAP S4 HANA Security SU01, PFCG, SU24 GRC Access Control Authorization Objects and Profiles SAP BTP Security (preferred) Identity Authentication Service (preferred) ABAP Security SAP Fiori Security Create a better #TomorrowWithUs! This role is in Bangalore, where you’ll get the chance to work with teams impacting entire cities, countries – and the craft of things to come. We’re Siemens. A collection of over 312,000 minds building the future, one day at a time in over 200 countries. All employment decisions at Siemens are based on qualifications, merit and business need. Bring your curiosity and creativity and help us craft tomorrow. At Siemens, we are always challenging ourselves to build a better future. We need the most innovative and diverse Digital Minds to develop tomorrow ‘s reality. Find out more about the Digital world of Siemens herewww.siemens.com/careers/digitalminds

Posted 8 hours ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

Proactively lead and support incident response team during an incident. Experience in advance investigation, triaging, analysis and escalation of security incidents with recommendations Hands-on basic experience with configurations and management of SIEM tools(Qradar)including log source integrations, custom parser built, fine tuning and optimizing the correlation rules and use cases recommendations Is MUST. Proven Experience on any of the Security information and event management (SIEM) tools using Qradar Data-driven threat hunting using SIEM, EDR and XDR tools Basic Experience is SOAR tools such as Qradar Resilient, PaloAlto XSOAR Identify quick defence techniques till permanent resolution. Recognize successful intrusions and compromises through review and analysis of relevant event detail information. Review incidents escalated by Level 1 analysts. Launch and track investigations to resolution. Recognize attacks based on their signatures, differentiates false positives from true intrusion attempts. Actively investigates the latest in security vulnerabilities, advisories, incidents, and penetration techniques and notifies end users when appropriate. Identify the gaps in security environment & suggest the gap closure Drive & Support Change Management Performs and reviews tasks as identified in a daily task list. Report Generation and Trend Analysis. Participate in the Weekly and Monthly governance calls to support the SOC metrics reporting Good to have hands on experience with managing SIEM solutions on public/private clouds like Amazon AWS, Microsoft Azure, etc. Willing to work in 24x7 rotational shift model including night shift. Required education Bachelor's Degree Preferred education Bachelor's Degree Required technical and professional expertise 5+ YearsHands-on experience required in Qradar SIEM and SOAR. Desired experience in Threat hunting, Threat intelligence. Worked on tools belongs to Qradar, UEBA, UAX. Bachelor’s degree in engineering/information security, or a related field. Relevant certifications such as CEH, CISSP, CISM, CompTIA CASP+, or equivalent. Proven experience to work in a SOC environment. Preferred technical and professional experience Proven experience in managing and responding to complex security incidents. Strong analytical and problem-solving skills. Excellent communication and collaboration abilities. Ability to work in a fast-paced, dynamic environment. Deep technical knowledge of security technologies and advanced threat landscapes.

Posted 9 hours ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Chennai

Work from Office

Naukri logo

Proactively lead and support incident response team during an incident. Experience in advance investigation, triaging, analysis and escalation of security incidents with recommendations Hands-on basic experience with configurations and management of SIEM tools(Qradar)including log source integrations, custom parser built, fine tuning and optimizing the correlation rules and use cases recommendations Is MUST. Proven Experience on any of the Security information and event management (SIEM) tools using Qradar Data-driven threat hunting using SIEM, EDR and XDR tools Basic Experience is SOAR tools such as Qradar Resilient, PaloAlto XSOAR Identify quick defence techniques till permanent resolution. Recognize successful intrusions and compromises through review and analysis of relevant event detail information. Review incidents escalated by Level 1 analysts. Launch and track investigations to resolution. Recognize attacks based on their signatures, differentiates false positives from true intrusion attempts. Actively investigates the latest in security vulnerabilities, advisories, incidents, and penetration techniques and notifies end users when appropriate. Identify the gaps in security environment & suggest the gap closure Drive & Support Change Management Performs and reviews tasks as identified in a daily task list. Report Generation and Trend Analysis. Participate in the Weekly and Monthly governance calls to support the SOC metrics reporting Good to have hands on experience with managing SIEM solutions on public/private clouds like Amazon AWS, Microsoft Azure, etc. Willing to work in 24x7 rotational shift model including night shift. Required education Bachelor's Degree Preferred education Bachelor's Degree Required technical and professional expertise 5+ Years Hands-on experience required in Qradar SIEM and SOAR. Desired experience in Threat hunting, Threat intelligence. Worked on tools belongs to Qradar, UEBA, UAX. Bachelor’s degree in engineering/information security, or a related field. Relevant certifications such as CEH, CISSP, CISM, CompTIA CASP+, or equivalent. Proven experience to work in a SOC environment. Preferred technical and professional experience Proven experience in managing and responding to complex security incidents. Strong analytical and problem-solving skills. Excellent communication and collaboration abilities. Ability to work in a fast-paced, dynamic environment. Deep technical knowledge of security technologies and advanced threat landscapes.

Posted 9 hours ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Hyderabad

Work from Office

Naukri logo

As Security Services Consultant, you are responsible for managing day to day operations of Security Device Management SIEM, Arcsight, Qradar, incident response, threat hunting, Use case engineering, SOC analyst, device integration with SIEM. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to explore new opportunities every single day. And if you relish the freedom to bring creative, thoughtful solutions to the table, there's no limit to what you can accomplish here. What will you do * Responsible for implementation partner to see project on track along with providing required reports to management and client Handle the project as well as BAU operations while ensuring high level of systems security compliance Coordinate with and act as an authority to resolve incidents by working with other information security specialists to correlate threat assessment data. Analyze data, such as logs or packets captures, from various sources within the enterprise and draw conclusions regarding past and future security incidents Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise 4+ years of experience in IT security with at least 3+ Years in SOC. Expertise in Security Device Management SIEM, Arcsight, Qradar, incident response, threat hunting, Use case engineering, SOC analyst, device integration with SIEM Working knowledge of industry standard risk, governance and security standard methodologies Proficient in incident response processes - detection, triage, incident analysis, remediation and reporting Competence with Microsoft Office, e.g. Word, PowerPoint, Excel, Visio, etc. Preferred technical and professional experience One or more security certificationsCEH, Security+, GSEC, GCIH, etc., Ability to multitask and work independently with minimal direction and maximum accountability. Intuitive individual with an ability to manage change and proven time management Proven interpersonal skills while contributing to team effort by accomplishing related results as needed Up-to-date technical knowledge by attending educational workshops, reviewing publications

Posted 9 hours ago

Apply

4.0 - 9.0 years

6 Lacs

Mumbai

Work from Office

Naukri logo

Project Role : Solution Architect Project Role Description : Translate client requirements into differentiated, deliverable solutions using in-depth knowledge of a technology, function, or platform. Collaborate with the Sales Pursuit and Delivery Teams to develop a winnable and deliverable solution that underpins the client value proposition and business case. Must have skills : Solution Architecture Good to have skills : Security Architecture DesignMinimum 12 year(s) of experience is required Educational Qualification : Minimum BE BTech from a reputed university Summary :As a Solution Architect, you will translate client requirements into differentiated, deliverable solutions using in-depth knowledge of a technology, function, or platform. Collaborate with the Sales Pursuit and Delivery Teams to develop a winnable and deliverable solution that underpins the client value proposition and business case. To design and deploy cyber security solutions in on-premises and public cloud infrastructure for large scale technology projects such as data lake, digital platform, and other core business and supporting applications Cyber Security Architect Roles & Responsibilities:-SPOC for cyber security design and deployment for any designated projects-Take full accountability of design of cyber security domain including network connectivity to various entities such as on-premises data centers and partner networks -Take ownership of design related issues and challenges and drive for solutions working with various internal teams and third-party solution providers such as OEMs and technology partners-Define and develop high level operating procedures for seamless operations of the project-Support transition of projects from deployment to operations-Anchor design and implementation of cyber security components-Be a SPOC for all cyber security initiatives in existing project and able to navigate through the clients landscape to upsell new initiatives in infrastructure space or able to pave ways for upselling value-driven initiatives for the client in other related domains such as application modernization, network transformation, and information security.-Lead the teams across various security solutions and thrive for upskilling and cross skilling to rationalize the resources across the towers and across the clients.-Introduce innovative solutions such as automation to increase productivity and improve service delivery quality -Participate in architecture and design review and approval forums to ensure the design principles are adhered to for any changes in the existing landscape or any new initiatives being rolled out in the existing landscape-Participate in client account planning and discussions to ensure security level initiatives are accounted for and issues are escalated to the right leaders for resolution-Build strong relationships with all client stakeholders and Accenture project teams for effective collaboration and outcomes Professional & Technical Skills: -Must have:-Hands-on Architecture and Design skills for SIEM, SOAR, UEBA, and cyber security-operations in on-premises data centers and public cloud-Strong experience working in Splunk, Palo Alto, and other leading OEMs in security domain-Strong Communication skills-Ability to drive discussions and ideas with clients senior leadership forums-Problem solving skills-Good to have-TOGAF or any equivalent certification in enterprise Security Architecture Additional Information:-Total IT experience of minimum 15 years; and-Minimum 4 years of experience in design and deployment of cyber security solutions in public cloud infrastructure (anyone from AWS, Azure, GCP, and OCI)-Minimum 10 years of experience in design and deployment of cyber security in on-premises infrastructure (SIEM, SOAR, UEBA, and cyber security operations)- This position is based at our Mumbai office.- A Minimum BE BTech from a reputed university is required. Qualification Minimum BE BTech from a reputed university

Posted 9 hours ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Mumbai

Work from Office

Naukri logo

Person should be responsible for administration & management of three or more technologies listed Firewall, F5 WAF, F5 SSLO, Ant-DDoS, Packet Broker, Anti-Apt, IPS, etc. Managing complete administration including but not limited of creation, modification of rules and configuration, system upgrades. Handling escalated calls and providing SME support on above technologies. On-boarding of new applications in F5 SSLO, F5 WAF, Packet Broker and handle critical issues for the same. Single point of contact for above mentioned technologies. Incident management & timely escalation of incident. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Overall 4+ years of experience in the field of network security Person should be able to manage the team. Person should have good understanding on SIEM IR & should be able to guide the team. Require advance level of network security devices troubleshooting knowledge, tcpdump, log analysis etc. B. E. / B.Tech in Computer Science or Electronics & Telecommunications Preferred technical and professional experience Person should have good understanding on SIEM IR & should be able to guide the team. Require advance level of network security devices troubleshooting knowledge, tcpdump, log analysis etc.

Posted 9 hours ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Mumbai

Work from Office

Naukri logo

The CyberArk Operation Support Team Lead is a pivotal role responsible for overseeing and managing the day-to-day operations of the CyberArk environment. This position involves leading a team of support professionals, ensuring the availability, performance, and security of CyberArk solutions, and collaborating with cross-functional teams to deliver efficient privileged access management. Key Responsibilities * Team LeadershipSupervise and mentor a team of CyberArk support professionals, fostering collaboration and skill development. * Operational ManagementOversee the operational aspects of CyberArk solutions, ensuring 24/7 availability, scalability, and optimal performance. * Incident ManagementLead the resolution of CyberArk-related incidents and problems, coordinating with technical teams and stakeholders to ensure timely and effective solutions. * Security EnhancementCollaborate with the security team to implement and enhance security controls, policies, and procedures for privileged access management. * Performance MonitoringMonitor system performance, conduct regular health checks, and proactively identify and address potential performance bottlenecks. * Patch and Upgrade ManagementPlan and execute system upgrades, patches, and enhancements, ensuring minimal disruption to ongoing operations. * DocumentationMaintain thorough documentation of configurations, processes, and procedures related to CyberArk operations. * Vendor ManagementCoordinate with CyberArk vendors for support, troubleshooting, and escalations to ensure timely issue resolution. * Continuous ImprovementDrive continuous improvement initiatives to enhance the effectiveness and efficiency of CyberArk operations. * ReportingGenerate regular reports on system performance, incident management, and operational metrics for management review. * Willing to work in 24/7 operations and project support activities Required education Bachelor's Degree Preferred education Associate's Degree/College Diploma Required technical and professional expertise Proven experience in CyberArk operations and support, with a minimum of 4+years of hands-on experience. * Professional certifications such as CyberArk Certified Trustee (CCT) or Certified Delivery Engineer (CDE). Strong knowledge of privileged access management concepts and CyberArk technologies. Experience in organizations control, monitor, and secure privileged access across their IT infrastructure. Good Exposure in endpoint Analytics capabilities to identify unusual or suspicious activities related to privileged access. Preferred technical and professional experience * Leadership skills with the ability to guide and mentor a team effectively. * Problem-solving aptitude with a proactive approach to resolving technical challenges. * Strong communication skills for effective collaboration with cross-functional teams. * Detail-oriented mindset with a commitment to maintaining high standards. * Adaptability to changing requirements and a willingness to stay updated on emerging technologies

Posted 9 hours ago

Apply

5.0 - 7.0 years

7 - 9 Lacs

Mumbai, Chennai, Ahmedabad

Work from Office

Naukri logo

Key Responsibilities: Design, install, monitor, integrate, and fine-tune cybersecurity tools and systems, including but not limited to, SIEM, SOAR, EDR, E-mail Security Gateways, and network Proactively monitor the environment to detect and implement steps to mitigate cyber-attacks before they occur. Provides technical expertise regarding security-related concepts to operational teams within the Information Technology Department and the business. Review, investigate, and respond to real-time alerts within the environment. Review real-time and historical reports for security and/or compliance violations. Monitor online security-related resources for new and emerging cyber threats. Assesses new security technologies to determine potential value for the enterprise. Conducts vulnerability assessments of firm systems and networks. Manage systems owned by the Information Security Team. Required Skills and Qualifications: Technical Skills & Experience: At least 5-7 years of experience in Cybersecurity with an emphasis on data and security event correlation, incident response, and the installation, configuration, administration, and management of cybersecurity tools such as SIEM, SOAR, firewalls, and hardening of IT infrastructure in compliance with cybersecurity frameworks. Works in a highly collaborative and fast-paced work environment with other SOC and Network Operations Center (NOC), Technical Support, Telecom, Project Management and Product Development staff. Strong writing skills, as well as the ability to articulate security-related concepts to a broad range of technical and non-technical staff. Working experience with creating, implementing, and managing a threat-hunting program within a corporate environment. Education Bachelors degree in computer science, information systems, Cybersecurity or Cloud Computing UG: B.Sc in Any Specialization, B.Tech/B.E. in Any Specialization

Posted 9 hours ago

Apply

0 years

0 - 0 Lacs

Mohali

On-site

Job Description: Cyber Security Analyst at Actualisation Location: On-site (Mohali) About Us: Actualisation is a leading firm specializing in AI. We pride ourselves on innovative solutions and a dynamic work environment that fosters growth and creativity. Role Overview: We are seeking a talented Cyber Security Analyst to join our team. This position offers a stimulating opportunity to contribute to our company's security posture while working in a collaborative and supportive atmosphere. Key Responsibilities: Monitor our systems for security breaches and investigate violations when they occur. Implement security measures to protect computer systems, networks, and data. Conduct regular security assessments and vulnerability testing. Develop and maintain incident response protocols. Stay updated on emerging threats and industry best practices. Required Skills and Qualifications: Bachelor’s degree in Computer Science, Information Technology, or related field. Proficiency in security tools and technologies such as SIEM, IDS/IPS, endpoint protection, etc. Strong analytical and problem-solving skills. Excellent communication and collaboration abilities. Relevant certifications (e.g., CompTIA Security+, CISSP) preferred. Benefits: Competitive salary package. 5 days working environment. Opportunities for professional development and growth. Job Types: Full-time, Permanent Pay: ₹10,000.00 - ₹25,000.00 per month Schedule: Day shift Morning shift Work Location: In person

Posted 11 hours ago

Apply

4.0 years

10 - 22 Lacs

Bhubaneshwar

On-site

Bhubaneswar, India Job Category : Security Research Posting Date : 01 January 2024 Job Type : Engineering Years of Experience : 5-10 Does this position require a security clearance? No Applicants are required to read,write and speak the following languages Hindi/English Additional Info : Job Description As an esteemed Security Research Engineer with expertise in offensive methodologies and substantiating exploitation, your indispensable role within our security team cannot be understated. Your principal task entails spearheading team exercises to evaluate and enhance our organizational defenses. Moreover, you will partake in team exercises, working alongside the team to strengthen detection prowess and simulate intricate attack scenarios. As part of your role, you will have the responsibility of overseeing and implementing an efficient security strategy, along with security programs and services that are both effective and reliable. Responsibilities Ensure that you remain ahead in the industry by consistently enhancing your understanding of emerging threats, up-to-date attack techniques, and well-documented vulnerabilities. Conduct diverse exercises, including internal and external penetration tests and lateral movement assessments. Evaluate and circumvent security systems to uncover vulnerabilities and propose enhancements. Improve tools for managing configuration or attack paths. Simulate advanced methods and detect different approaches to Tactics, Techniques, and Procedures (TTPs) that could remain unnoticed. Create comprehensive reports that thoroughly document the discoveries, approaches, and applicable suggestions derived from Team engagements. Construct concise and persuasive reports that proficiently convey identified weaknesses, potential attack paths, and potential consequences to relevant parties. Guarantee that reports offer pragmatic advice for rectifying vulnerabilities and improving overall security. Qualifications Bachelor's degree in Computer Science or certifications in Offensive Security such as OSCP, OSCE, or similar qualifications. Minimum of 4 years of experience in a similar role, showcasing a strong background in offensive security and penetration testing. Required Skills Proficient in writing IPS/SIEM detection logic using tools like Splunk or Anvilogic. Hands-on experience in blue team activities with SPL, KQL, YARA-L, and SIGMA. Skilled in crafting detection logic for SIEM or Data Lakes, including Splunk, Anvilogic, etc. Excellent English communication skills, both written and verbal, to effectively communicate complex technical concepts to technical and non-technical stakeholders. Capable of sharing knowledge effectively to educate others. Strong problem-solving abilities and a creative mindset for identifying attack vectors and developing innovative strategies. Disclaimer Hiring Range: from 1000000 to 2250000 per annum. May be eligible for bonus and equity. We maintain broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Nirmalya’s differing products, industries and lines of business. Candidates are typically placed into the range based on the preceding factors as well as internal peer equity. About Us Nirmalya's career has the potential to encompass various industries, roles, countries, and cultures, allowing for growth in novel positions and driving innovation, while effectively balancing work and personal life. Nirmalya has achieved success over the years by embracing change, fostering innovation, and consistently upholding ethical principles, thereby delivering exceptional results for leading companies across multiple industries.To foster and support the talents responsible for such accomplishments, our dedication lies in cultivating an inclusive culture that appreciates and embraces diverse insights and perspectives. We strive to create a workforce that inspires thought leadership and sparks innovation, ensuring a thriving environment for all. Nirmalya Employee Benefits are meticulously designed to prioritize equality, reliability, and affordability. Our comprehensive package encompasses essential features such as Medical and Life Insurance, while also granting access to Retirement Planning and more. Additionally, we actively encourage our employees to actively contribute to the well-being of the communities where we operate. We firmly believe that fostering diversity and inclusion lays the foundation for innovation. To shape a brighter tomorrow, we seek talent from diverse backgrounds, embracing a range of perspectives and abilities. We are committed to providing reasonable accommodations to individuals with disabilities throughout the job application, interview, and prospective role stages, thereby enabling them to effectively perform crucial job functions. Our dedication lies in fostering an inclusive workforce that enables every individual to thrive. We believe in the power of diverse perspectives and value every voice, as it is this harmony that propels us to surpass previous achievements. As an Equal Employment Opportunity Employer, Nirmalya ensures that all applicants are treated fairly and without discrimination. We promote equality regardless of race, color, religion, national origin, gender identity, disability, protected veterans’ status, or any other characteristic protected by law. Additionally, Oracle complies with applicable legislation by considering qualified applicants with arrest and conviction records for employment opportunities. Join our team where diversity is celebrated, and everyone's unique contribution is respected. Together, we embrace innovation and strive towards excellence – a testament to our commitment to fostering an inclusive and thriving workplace.

Posted 11 hours ago

Apply

7.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

At Bayer we’re visionaries, driven to solve the world’s toughest challenges and striving for a world where ,Health for all, Hunger for none’ is no longer a dream, but a real possibility. We’re doing it with energy, curiosity and sheer dedication, always learning from unique perspectives of those around us, expanding our thinking, growing our capabilities and redefining ‘impossible’. There are so many reasons to join us. If you’re hungry to build a varied and meaningful career in a community of brilliant and diverse minds to make a real difference, there’s only one choice. Sr. Cyber Security Analyst POSITION PURPOSE: We are seeking a highly skilled Sr. Cyber Threat Intelligence Analyst responsible for leading our efforts in cyber threat intelligence at Bayer. In this senior position, you will conduct sophisticated threat analyses and deliver actionable intelligence reporting to enable threat-informed cyber defense across our global organization. As part of our Cyber Defense Center (CDC) Platform, you'll play a critical role in identifying, analyzing, and mitigating cyber threats to protect Bayer's digital assets and operations. Join our team and help protect one of the world's leading life sciences companies against evolving cyber threats while developing your expertise in a dynamic and challenging environment. YOUR TASKS AND RESPONSIBILITIES: Monitor and analyze global cyber threat landscapes to identify trends relevant to Bayer's industry and operations Perform comprehensive threat analyses to identify and track threat actors, vulnerabilities, and emerging attack vectors Conduct in-depth analysis of security-relevant events and assess Bayer's threat situation in real-time Develop and implement threat intelligence use cases and detection rules for security monitoring systems Interface with internal and external partners globally (e.g. Security Operation Center, Incident Response Teams, Vulnerability Management, Senior Management, and other Stakeholders) Prepare detailed intelligence reports and deliver presentations of findings to technical and non-technical audiences Collaborate with security engineering teams to implement defensive measures based on intelligence findings Participate in incident response planning related to identified threats Contribute to the further development of existing and new cyber threat intelligence services Create and maintain process guidelines and documentation for threat intelligence operations WHO YOU ARE: BS or MA in computer science, information security, cybersecurity, or a related field (7+ years of relevant working experience may be considered an equivalent) First experience in cyber threat intelligence, security operations, or related fields Demonstrated experience with OSINT (Open Source Intelligence) tools and methodologies Strong knowledge of the MITRE ATT&CK framework and Cyber Kill Chain methodology Proficiency with Threat Intelligence Platforms like RecordedFuture, Crowdstrike, Google Threat Intelligence and MISP are an advantage Experience with SIEM platforms and log analysis tools (e.g., SENTINEL, Splunk, or similar) Background in penetration testing, red team/incident response, or as a security operations analyst are an advantage Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Threat Intelligence Analyst (CTIA), or similar certifications are an advantage Familiarity with standards like ISO 27001 or NIST CSF Connections and contacts in relevant IT security communities are an advantage Required Skills: Exceptional analytical thinking and problem-solving abilities Strong understanding of network protocols, security architectures, and common attack vectors Excellent written and verbal communication skills with ability to translate technical findings for non-technical audiences Languages: Fluent English required; additional languages beneficial Proficiency in report writing, investigational techniques, and presenting to large audiences Ability to work effectively under pressure and manage multiple priorities Self-motivated with strong attention to detail and ability to work independently Team-oriented mindset with excellent collaboration skills Ever feel burnt out by bureaucracy? Us too. That's why we're changing the way we work- for higher productivity, faster innovation, and better results. We call it Dynamic Shared Ownership (DSO). Learn more about what DSO will mean for you in your new role here https://www.bayer.com/enfstrategyfstrategy Bayer does not charge any fees whatsoever for recruitment process. Please do not entertain such demand for payment by any individuals / entities in connection with recruitment with any Bayer Group entity(ies) worldwide under any pretext. Please don’t rely upon any unsolicited email from email addresses not ending with domain name “bayer.com” or job advertisements referring you to an email address that does not end with “bayer.com”. For checking the authenticity of such emails or advertisement you may approach us at HROP_INDIA@BAYER.COM. YOUR APPLICATION Bayer is an equal opportunity employer that strongly values fairness and respect at work. We welcome applications from all individuals, regardless of race, religion, gender, age, physical characteristics, disability, sexual orientation etc. We are committed to treating all applicants fairly and avoiding discrimination. Location: India : Karnataka : Bangalore Division: Enabling Functions Reference Code: 847153 Contact Us 022-25311234 Show more Show less

Posted 12 hours ago

Apply

6.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

TCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. TCS Hiring for Experience Range : - 6 + Years Job Locations: Pan India Technical/Functional Skills MUST HAVE SKILLS Desired skills for Tanium administrator include: Tanium Service Now, Strong troubleshooting skills in Windows\Linux Operating systems, VMWare, PS scripting In-depth knowledge of Windows patch lifecycle and Microsoft update management Experience with vulnerability management and compliance reporting . Roles & Responsibilities Design and optimize enterprise-wide patching strategies and maintenance windows. Customize TANIUM Deploy packages and create scripts for advanced software rollout and patching logic. Maintain and update patch source repositories, configuration baselines, and deployment templates. Perform root cause analysis for persistent patching issues and automate resolution processes. Develop dashboards and real-time metrics in TANIUM Performance and Reporting modules. Collaborate with security teams for CVE-based remediation through TANIUM Comply. Integrate TANIUM with other ITSM and security tools (e.g., ServiceNow, SCCM, SIEM) for seamless workflows. Mentor and support junior engineers in patching operations and best practices. Execute patch deployments across desktop and server environments using TANIUM Deploy. Monitor patch compliance and remediation status using TANIUM Patch and TANIUM Comply. Troubleshoot failed patches or deployments on endpoints and provide timely resolution. Respond to and resolve service tickets related to patching, software distribution, and endpoint configuration. Perform vulnerability scans with TANIUM Comply and assist in remediation tracking. Run TANIUM Interact queries to validate system health, software versions, and patch status. Follow change control processes and ensure documentation and approvals for patch schedules. Escalate complex issues or recurring failures to L3 support with detailed incident documentation. Coordinate with Vendor and complete necessary tasks that need vendor intervention Show more Show less

Posted 12 hours ago

Apply

2.0 - 4.0 years

0 Lacs

Delhi, India

On-site

Linkedin logo

Are you passionate about cybersecurity and driven to protect organizations from evolving threats? Do you thrive in a collaborative environment where you work with sharp minds to detect, respond, and stay ahead of cyber adversaries? Join our DTS - Global Security Operations Team The Security Operations Team is responsible for safeguarding the security of Control Risks systems, infrastructure and providing internal advocacy for security practices. Opportunity to work closely with product and platform teams throughout the company to help ensure that Control Risks systems meet both safety and security compliance. As a Security Analyst, you will be responsible for continuous threat detection, monitoring, and incident response across the organization's environment. This role plays a critical part in safeguarding systems, networks, and data from cyber threats and requires a combination of technical expertise, situational awareness, and analytical thinking. Requirements What You'll Do: Key Responsibilities: Continuously detect, investigate, analyze, and respond to security incidents, providing root cause analysis and documenting findings for post-incident reviews. Collect, evaluate, and integrate threat intelligence—specifically related to Microsoft products and services—to strengthen detection and response capabilities. Identify and implement opportunities for automation and process improvement to reduce manual efforts and improve operational efficiency. Perform detailed analysis of security investigations and incidents to generate metrics and assess the effectiveness of operational workflows. Develop and enforce procedures for auditing and remediating non-compliance with established information security standards. Investigate, contain, and coordinate recovery from security incidents across both enterprise and cloud environments. Support the creation, enhancement, and continuous improvement of incident response playbooks and escalation procedures. To be successful in this role you will: Bring 2-4 years of relevant experience in Security Operations, IT Security, or a related domain. Have practical knowledge of security technologies including network firewalls, proxy solutions, endpoint detection and response (EDR), security information and event management (SIEM), and email security systems. Demonstrate hands-on experience with security tools and platforms, preferably but not mandatorily including Microsoft Defender for Endpoint, Microsoft Sentinel, Microsoft Defender for Identity, and Azure Security Center. Be familiar with key cybersecurity frameworks and standards such as ISO 27001, Cyber Essentials, and NIST. Have working knowledge of both Windows and Linux environments, along with exposure to open-source intelligence (OSINT) tools and techniques. Exhibit strong analytical thinking and problem-solving abilities, complemented by excellent technical documentation skills. Communicate effectively and confidently, with the ability to explain complex security issues to both technical and non-technical audiences. Show more Show less

Posted 12 hours ago

Apply

7.0 years

0 Lacs

India

Remote

Linkedin logo

Job Title: Cybersecurity Architect Company: US-Based Law Firm Location: Remote (India) Employment Type: Contractual (3 Months, with the possibility of extension or conversion to full-time) Experience: 5–7 Years (as a Cybersecurity Architect or in a similar senior security role) Education: B.Tech (Mandatory); MCA or M.Tech in Cybersecurity or related field (Preferred, not compulsory); Certifications like CISSP, CISM, TOGAF, AWS Security are a plus Working Days: Monday to Friday Shift Timing: 6:00 AM to 3:00 PM EST Experience: Strong background in designing and implementing secure enterprise and cloud infrastructure. Experience working with security frameworks and standards like ISO 27001, NIST, GDPR, and HIPAA. Proficiency in embedding security within DevSecOps, SDLC, and CI/CD environments. Prior experience implementing Zero Trust Architecture is preferred. About the Role: We are looking for a highly skilled Cybersecurity Architect to lead the design and maintenance of our cybersecurity architecture. This role is critical in ensuring the Confidentiality, Integrity, and Availability (CIA) of our systems and data. You will work across departments to integrate security into every aspect of our IT environment, aligning with business needs and regulatory requirements. Key Responsibilities: 1. Architecture Design & Implementation Design and implement secure, enterprise-grade architecture. Recommend and evaluate cybersecurity tools and solutions. Develop secure network topologies, data flow diagrams, and cloud security frameworks. 2. Security Strategy & Planning Create and maintain cybersecurity architecture blueprints and roadmaps. Establish and update organization-wide security policies and best practices. Contribute to business continuity and disaster recovery strategies. 3. Risk Management & Compliance Identify infrastructure vulnerabilities through regular risk assessments. Ensure ongoing compliance with ISO, NIST, GDPR, HIPAA, and other relevant standards. Coordinate with auditors and regulatory bodies as needed. 4. Solution Review & Integration Review new technologies for security implications. Collaborate with development and infrastructure teams to integrate security into workflows. Drive the adoption of Zero Trust principles across systems. 5. Monitoring & Incident Response Support Partner with SOC teams to enhance threat detection and SIEM performance. Support incident response processes and recommend post-incident improvements. Act on findings from penetration testing and vulnerability assessments. 6. Stakeholder Collaboration Work with IT, legal, compliance, and business stakeholders to ensure security coverage across operations. Mentor junior team members and promote cybersecurity awareness across teams. Show more Show less

Posted 12 hours ago

Apply

10.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Job Description Join our team as a Domain Solution Architect in the Autonomous Network Security domain, where you will drive the design and implementation of complex security solutions. You will work with cutting-edge security technologies, assess vulnerabilities, and strengthen cybersecurity frameworks. This role offers an opportunity to work with global teams, provide technical guidance, and drive innovation in security architecture. How You Will Contribute And What You Will Learn Drive end-to-end security architecture design and implementation for complex security solutions. Deliver NetGuard Security Products & Solutions, including NIAM (NetGuard Identity Access Manager), FW (Firewall), and DNS (Domain Name System). Conduct security assessments, penetration testing, and audits to identify vulnerabilities. Develop high-level and low-level security designs, test plans, and validation strategies. Provide expert guidance on cybersecurity frameworks, compliance, and risk assessment. Work with cross-functional teams to ensure security integration across platforms. Support pre-sales efforts, solution feasibility analysis, and cost estimation. Oversee security infrastructure, ensuring resilience against cyber threats. Offer technical mentorship and guidance to global security teams. Key Skills And Experience You have: Bachelor's degree or equivalent with 10+ years of experience in security architecture. Practical experience in cybersecurity frameworks (NIST, ISO 27001) and compliance (GDPR). Hands-on experience with cloud security (AWS, GCP), IAM, SIEM, DevSecOps, and API security. Comfort to travel as required (up to 50%) to address business needs. It would be nice if you also had: Experience in Java, Kubernetes, Docker, OpenStack, microservices, and automation tools. Strong problem-solving, troubleshooting, and partnering skills for effective stakeholder engagement. About Us Come create the technology that helps the world act together Nokia is committed to innovation and technology leadership across mobile, fixed and cloud networks. Your career here will have a positive impact on people’s lives and will help us build the capabilities needed for a more productive, sustainable, and inclusive world. We challenge ourselves to create an inclusive way of working where we are open to new ideas, empowered to take risks and fearless to bring our authentic selves to work What we offer Nokia offers continuous learning opportunities, well-being programs to support you mentally and physically, opportunities to join and get supported by employee resource groups, mentoring programs and highly diverse teams with an inclusive culture where people thrive and are empowered. Nokia is committed to inclusion and is an equal opportunity employer Nokia has received the following recognitions for its commitment to inclusion & equality: One of the World’s Most Ethical Companies by Ethisphere Gender-Equality Index by Bloomberg Workplace Pride Global Benchmark At Nokia, we act inclusively and respect the uniqueness of people. Nokia’s employment decisions are made regardless of race, color, national or ethnic origin, religion, gender, sexual orientation, gender identity or expression, age, marital status, disability, protected veteran status or other characteristics protected by law. We are committed to a culture of inclusion built upon our core value of respect. Join us and be part of a company where you will feel included and empowered to succeed. About The Team As Nokia's growth engine, we create value for communication service providers and enterprise customers by leading the transition to cloud-native software and as-a-service delivery models. Our inclusive team of dreamers, doers and disruptors push the limits from impossible to possible. Show more Show less

Posted 12 hours ago

Apply

5.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

TCS present an excellent opportunity for Kubernetes / OpenShift Engineer Greetings from TCS !!! Job Title : ServiceNow Sr. Developer IRM (GRC) & SecOps Location- Chennai/Bangalore/HYD/Pune/Mumbai Experience required: 8 to 10 yrs. keywords- ServiceNow Developer, CMDB, Socops, GRC Must-Have At least 5+ years’ experience required with Hands-on design, development, and deployment experience with the Service-now platform (SecOps & IRM). Proficiency in ServiceNow platform configuration (e.g., workflows, forms, UI policies, ACLs). Familiarity with relational databases (e.g., MySQL, SQL Server). Experience working with Agile teams, methodologies, and tools in a virtual environment. Strong knowledge of ServiceNow CMDB, ITSM, ITOM, and Security Operations workflows. Proficiency in ServiceNow Scripting (JavaScript, Glide Script, Business Rules, Script Includes, REST APIs). Experience integrating ServiceNow with SIEM, SOAR, vulnerability management, and risk platforms. Hands-on experience with automated workflows, playbooks, and security orchestration. Familiarity with cybersecurity frameworks (MITRE ATT&CK, NIST, ISO, GDPR, SOC 2, HIPAA, PCI-DSS, etc.). Good-to-Have Design and implement IRM (Integrated Risk Management) and SecOps solutions within the ServiceNow platform. Ensure proper integration of IRM & SecOps with CMDB, ITSM, ITOM, and other enterprise applications. Provide expertise in data modeling, table structures, relationships, and ACL configurations within ServiceNow. Automate security incident response playbooks using Security Orchestration, Automation, and Response (SOAR). Enable vulnerability scanning and patch automation by integrating with VM tools. Develop SecOps dashboards and reports for tracking security posture, incident trends, and compliance gaps. SN Role descriptions / Expectations from the Role 1 Requirement gathering on ServiceNow GRC, SecOps Module requirement 2 Design & develop the solutions on requirement on above mentioned modules 3 Customer facing role as Technical SME 4 Independent contributor for development and deployment **Mandatory Documents- Updated CV, Adhar or Pan Card Copy, Passport Size Photo** Note- Do not apply Freshers. and EX TCSers Thanks & Regards, Supriya Kashid Human Resource Team (TAG) Tata Consultancy Services Mailto: supriya.kashid@tcs.com Show more Show less

Posted 12 hours ago

Apply

5.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

About QpiAI At QPiAI, we are leading the effort to discover optimal AI and Quantum systems in Life sciences, Healthcare, Transportation, Finance, Industrial, and Space technologies. QPiAI is building a full stack Enterprise Quantum Computers. QPiAI Quantum hardware team is responsible for designing and characterization of Quantum Processor, Cryogenic Quantum Control Circuits, RF Control Hardware, and QPiAI ASGP. Job Summary: We are looking for a skilled and proactive Cybersecurity Analyst/Engineer to protect the organization's digital assets, systems, and networks from cyber threats. The ideal candidate will be responsible for identifying security risks, monitoring security events, and implementing protective measures to ensure the confidentiality, integrity, and availability of information systems. Key Responsibilities: Monitor, analyze, and respond to security alerts and incidents. Conduct vulnerability assessments and penetration testing. Configure and maintain firewalls, antivirus software, and intrusion detection/prevention systems (IDS/IPS). Implement and enforce security policies, procedures, and best practices. Manage user access controls, multi-factor authentication, and identity management systems. Support compliance efforts for industry standards such as ISO 27001, GDPR, HIPAA, or NIST. Conduct regular audits and risk assessments to identify security gaps. Investigate and report on security breaches and incidents. Provide security awareness training for employees. Keep systems and security tools up to date with the latest patches and updates. Participate in disaster recovery and business continuity planning. Required Skills and Qualifications: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field. 2–5 years of experience in a cybersecurity role (analyst, engineer, or equivalent). Strong knowledge of network security, endpoint protection, and cloud security principles. Experience with SIEM tools (e.g., Splunk, QRadar, LogRhythm). Familiarity with common threat intelligence platforms and frameworks (MITRE ATT&CK, OWASP). Understanding of firewalls, VPNs, IDS/IPS, and endpoint detection and response (EDR). Working knowledge of operating systems (Windows, Linux) and scripting languages (PowerShell, Python) is a plus. Relevant certifications such as CompTIA Security+, CEH, CISSP, or CISM are preferred. Soft Skills: Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Ability to work independently and collaboratively in a team environment. Attention to detail and ability to manage multiple tasks effectively. Show more Show less

Posted 13 hours ago

Apply

2.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Job Requisition ID # 25WD88811 Position Overview The Incident Response Analyst is responsible for monitoring, identifying, assessing, containing, and responding to various information security events in a large and complex environment, as well as analyze, triage, and report on these incidents and investigations. The candidate must have knowledge of system security design, network/cloud security best practices and in-depth knowledge of systems security operations, threat actors frequently used attack vectors, and general user behavior analytics. The candidate will be part of an established security team and work closely with teams across the company in remediating security issues and driving Incident Response. The candidate should have a strong passion for security and growth and be willing to accept challenging projects and incidents. Responsibilities Responsible for handling day-to day operations to monitor, identity, triage and investigate security events from various Endpoint (EDR), Network and Cloud security tools and detect anomalies, and report remediation actions Analyze firewall logs, server, and application logs to investigate events and incidents for anomalous activity and produce reports of findings Conduct reviews and analysis of proxy logs, Microsoft Windows and Active Directory logs, and malicious code to identify, contain, eradicate, and ensure recovery from incidents Help create and maintain process tools and documentation Perform all stage of incident response from detection to postmortem Collaborate with stakeholders in building and improving our Security Orchestration Platform Clearly document notes for incidents in our case management solution Perform basic forensics and malware analysis based on our playbooks and procedures Responsible for working in a 24/7 environment, with shifts determined by business needs Maintain a high level of confidentiality and Integrity Minimum Qualifications BS in Computer Science, Information Security, or equivalent professional experience 2+ years of cyber security experience in incident response Technical depth in one or more specialties including: Malware analysis, Host analysis and Digital forensics Strong understanding of Security Operations and Incident Response process and practices Experience performing security monitoring, response capabilities, log analysis and forensic tools Strong understanding of operating systems including Windows, Linux and OSX Experience with SIEM, SOAR, EDR, Network, AWS, and Azure security tools Excellent critical thinking and analytical skills, organizational skills, and the ability to work as part of a team Excellent verbal and written communication skills Ability to design playbooks for responding to security incidents Ability to support off-hours, weekends, and holidays if needed in support of incident response Preferred Qualifications Advanced interpersonal skills to effectively promote ideas and collaboration at various levels of the organization One or more security-related certifications from any of the following organizations: GCIH, GCFE, GCFA, AWS, Azure Cloud security Certifications or equivalent is desired Learn More About Autodesk Welcome to Autodesk! Amazing things are created every day with our software – from the greenest buildings and cleanest cars to the smartest factories and biggest hit movies. We help innovators turn their ideas into reality, transforming not only how things are made, but what can be made. We take great pride in our culture here at Autodesk – our Culture Code is at the core of everything we do. Our values and ways of working help our people thrive and realize their potential, which leads to even better outcomes for our customers. When you’re an Autodesker, you can be your whole, authentic self and do meaningful work that helps build a better future for all. Ready to shape the world and your future? Join us! Salary transparency Salary is one part of Autodesk’s competitive compensation package. Offers are based on the candidate’s experience and geographic location. In addition to base salaries, we also have a significant emphasis on discretionary annual cash bonuses, commissions for sales roles, stock or long-term incentive cash grants, and a comprehensive benefits package. Diversity & Belonging We take pride in cultivating a culture of belonging and an equitable workplace where everyone can thrive. Learn more here: https://www.autodesk.com/company/diversity-and-belonging Are you an existing contractor or consultant with Autodesk? Please search for open jobs and apply internally (not on this external site). Show more Show less

Posted 13 hours ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Job Requisition ID # 25WD88680 Position Overview In the role of Triage Manager, you will be responsible for overseeing the full spectrum of security alert triage across Autodesk’s global infrastructure. Your primary objective is to ensure that all Tier 1 alerts are promptly actioned and resolved while efficiently routing more complex issues to seasoned security analysts. You will manage a team that includes both internal staff and vendor personnel, and you'll work collaboratively with our Detections and Monitoring groups to fine-tune alert configurations and drive automation initiatives. Your expertise in managing alerts across on-premises systems and cloud platforms (Azure, AWS, and GCP) will be vital in maintaining a robust, responsive security posture. Key Responsibilities Alert Management & Triage: Oversee and streamline the alert triage process, ensuring all Tier 1 alerts are promptly acknowledged, investigated, and resolved. Ensure that higher complexity alerts are escalated to more seasoned analysts for in-depth investigation Team Coordination: Lead a mixed team of full-time employees and vendor staff, ensuring optimal coverage and efficient operations within the alert queues Provide mentorship, operational guidance, and continuous training to team members Process Optimization: Collaborate with Detections and Monitoring teams to tune alert thresholds, reduce false positives, and eliminate noise. Identify which alerts are suitable for automation and partner with engineering teams to develop and deploy automated solutions Multi-Cloud Alert Management: Manage and maintain situational awareness of alerts coming from diverse environments including on-premises, Azure, AWS, and GCP infrastructures. Ensure consistent triage standards are applied across all platforms Operational Reporting & Improvement: Develop and maintain metrics to evaluate alert handling performance. Produce regular status reports to drive continuous improvement in triage processes Collaboration & Communication: Serve as a critical communication bridge between frontline security operations and higher-level incident response teams. Ensure clear, timely, and accurate documentation and communication of triage activities and incident escalations Minimum Qualifications Experience: Minimum of 5+ years in security operations or incident response, with at least 2 years in a supervisory or management role overseeing alert triage or a similar SOC function Technical Skills: Strong command of SIEM platforms, especially Splunk, with proven experience in configuring and optimizing alerting mechanisms Solid understanding of telemetry integration and alert correlation across varied data sources in both on-prem and cloud environments Operational Expertise: Demonstrated experience managing high-volume security alert environments, with the ability to make swift, informed decisions under pressure Expertise in developing and refining alert triage processes, reducing noise, and automating routine tasks Soft Skills: Exceptional leadership and communication skills; capable of effectively managing a mixed team of internal and vendor staff Strong analytical and problem-solving abilities to quickly assess and escalate security incidents Cloud Agnostic: Proven knowledge of and experience with managing security alerts across multiple cloud platforms, including Azure, AWS, and GCP Learn More About Autodesk Welcome to Autodesk! Amazing things are created every day with our software – from the greenest buildings and cleanest cars to the smartest factories and biggest hit movies. We help innovators turn their ideas into reality, transforming not only how things are made, but what can be made. We take great pride in our culture here at Autodesk – our Culture Code is at the core of everything we do. Our values and ways of working help our people thrive and realize their potential, which leads to even better outcomes for our customers. When you’re an Autodesker, you can be your whole, authentic self and do meaningful work that helps build a better future for all. Ready to shape the world and your future? Join us! Salary transparency Salary is one part of Autodesk’s competitive compensation package. Offers are based on the candidate’s experience and geographic location. In addition to base salaries, we also have a significant emphasis on discretionary annual cash bonuses, commissions for sales roles, stock or long-term incentive cash grants, and a comprehensive benefits package. Diversity & Belonging We take pride in cultivating a culture of belonging and an equitable workplace where everyone can thrive. Learn more here: https://www.autodesk.com/company/diversity-and-belonging Are you an existing contractor or consultant with Autodesk? Please search for open jobs and apply internally (not on this external site). Show more Show less

Posted 13 hours ago

Apply

2.0 years

0 Lacs

Coimbatore, Tamil Nadu, India

On-site

Linkedin logo

Job Title: Network Security Analyst – IT Audit & ISO 27001 Location: Coimbatore (Work from Office) Experience: 2+ years Availability: Immediate Joiners Preferred Job Description: We are seeking a motivated and skilled Network Security Analyst with experience in IT Audit and ISO 27001 implementation to join our team in Coimbatore. The ideal candidate will play a key role in assessing and strengthening our network security infrastructure while ensuring compliance with information security standards. Key Responsibilities: Perform regular network security assessments and vulnerability reviews Monitor and manage firewalls, IDS/IPS, VPNs, and endpoint security controls Conduct IT audits focusing on infrastructure, access control, and change management Assist in implementing and maintaining ISO 27001 standards , including risk assessments, controls mapping, and documentation Coordinate with internal teams to remediate audit findings and ensure continuous compliance Maintain and update security policies, procedures, and incident response plans Support security awareness initiatives and training programs Requirements: Minimum 2 years of experience in network security and IT audits Solid understanding of TCP/IP, network protocols, and security controls Working knowledge of ISO 27001 framework, including internal audits and documentation Experience with firewalls, IDS/IPS, antivirus, SIEM tools Strong analytical, communication, and documentation skills Preferred certifications: ISO 27001 LA , CEH , CompTIA Security+ Show more Show less

Posted 13 hours ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

TCS is conducting in-person interview drive for Hyderabad & Chennai location NOTE: Candidate interested in WALK-IN DRIVE in Hyderabad & Chennai must apply TCS is hosting an In-Person Interview Drive on Saturday, 21st June , we’d like to invite you to join us! This is a great opportunity to explore exciting career opportunities with us and meet our hiring team face-to-face. Role **: SOC Analyst / Consultant Desired Skill Set: Cyber security, SIEM, A ntivirus, Vulnerability management, Web Proxy, Security Patch management. Experience Range: 4-10yrs & 10+yrs Joining Location: PAN India Venue : Hyderabad : TCS Synergy Park Phase1 ,Premises No 2-56/1/36, Gachibowli, Opposite IIIT Hyderabad Campus, Seri Lingampally, RR District, Hyderabad, Telangana 500019 Chennai : TCS Siruseri ATL Building- 1/G1, SIPCOT IT Park Navalur, Siruseri, Tamil Nadu 603103 Job Description: Monitor multiple security technologies such as SIEM, Antivirus, Vulnerability management, Web Proxy, Security Patch management. Tune/Create SIEM correlation rules. Perform in-depth incident and event analysis. Respond and handle the security incidents. Agree and align on reporting and monitoring requirements with business stakeholders. Conduct research on emerging security threats. Modify Standard Operating Procedures (SOPs) and training documentation. Coach junior team members. Good Knowledge on SIEM tools like QROC, Arcsight, SPLUNK or Sentinel. Knowledge and experience with PCs, LAN topologies, routers, hubs, and terminal servers Knowledge of security applications such as IDS, Security Event Management and anomaly detection tools. Knowledge of VPN technology. Knowledge of investigation tools like FTK imager, memory dump, threat analysis tools. Ability to read and interpret network diagrams. Oversight of facilitates for other offices in the UK and provide support and guidance where required. Ability to translate event analysis findings into new monitoring proposals. Remain flexible with 24/7 shift and task assignments. Show more Show less

Posted 13 hours ago

Apply

0 years

0 Lacs

Bangalore Urban, Karnataka, India

On-site

Linkedin logo

Responsibilities Implementation of Core-PAS CyberArk components (EPV, DR EPV, HA EPV, PVWA, PSM, PSMP, CPM). Implementation of Privileged Threat Analytics (PTA) Implementation of Advanced Modules (AAM – CP, AAM – CCP, Alero, HTML 5) Development of Connection components using Auto-IT for Web applications & thick clients Knowledge about PAM Access Reviews Knowledge about Identity modules (Eg: Sailpoint, ISIM) Knowledge about Access Modules (Eg: Azure SSO, ISAM) Knowledge about Active Directories (Microsoft AD, Azure AD) Integration of SIEM, SNMP, SMTP, SAML, LDAPS with CyberArk Development of CPM Plugins for SSH & Web based applications. Certification – Defender/Sentry (Mandatory), CDE (Optional) Preparation of Architecture designs for all modules of CyberArk Creation & review of High level project plan Provide consulting advise to customer/stakeholders during technical discussions. Creation of Project Documentation (HLD, DTD, SoP, KEDB, Breakglass, etc.,) Assist colleagues from Support & Project team with technical queries Knowledge on CyberArk REST API’s Atleast 1 Programming Language at L2 level (Eg: Powershell, Python, etc.,) Able to assist Develop & tester with Automation initiates Able to create Discovery rules Run DNA Scans Hands-on with Device types – Windows, *Nix, Network, Database, SAP, Web applications, Tier 0&1 accounts, Domain Controllers Understanding of Azure PIM Knowledge about one more PAM solution is a added advantage Assist with new SOW/Contract Creation & prepare effort estimation for new initiates Prepare roadmap for the customer based on the vision Knowledge about Power BI reporting Knowledge about PAS Reporter, Telemetry, Export Vault Data Show more Show less

Posted 14 hours ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

L3 Security Incident Analyst Position Overview The L3 Security Incident Analyst is responsible for handling complex security incidents and leading incident response efforts. This role involves advanced threat analysis and strategy development to improve the organization’s security posture. Key Responsibilities - Lead investigations of complex security incidents and advanced persistent threats. - Develop and implement advanced threat detection and response strategies. - Collaborate with cross-functional teams to address vulnerabilities and improve security measures. - Perform forensics and malware analysis to understand and counter threats. - Develop and refine incident response plans and playbooks. - Provide expert guidance and training to L1 and L2 analysts. - Stay updated on emerging threats and technologies to enhance security defenses. Skill Required: Education: Bachelor’s degree in computer science, Information Security, or related field (or equivalent work experience). Certifications: Intermediate to advanced certifications such as GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), or equivalent preferred. Experience: years of experience in a security operations center (SOC) or incident response role. Technical Skills: Strong expertise in analyzing security events and incident response processes. Extensive experience in cybersecurity and incident response. Proficiency in using SIEM platforms and security monitoring tools. Proficiency in advanced security tools and technologies (firewalls, IDS/IPS, antivirus, CASB, EDR. SIEM, SOAR, TI etc.). Strong understanding of network protocols, operating systems, and common attack vectors. Understanding of enterprise IT Systems, applications and databases, cloud infrastructure and security principles, solutions, and technologies Expertise in threat analysis, forensics, and malware analysis, reverse engineering, and vulnerability assessment. E- Good written & verbal communication & presentation skills Strong leadership and communication skills. Regards Kirti Rustagi kirti.rustagi@raspl.com Show more Show less

Posted 14 hours ago

Apply

2.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Summary : We are seeking a proactive and detail-oriented CyberSecurity Specialist to join our team and protect our organization’s digital infrastructure. You will play a key role in identifying vulnerabilities, responding to incidents, and implementing security solutions to prevent unauthorized access, data loss, and cyberattacks. This role requires both technical expertise and a strategic mindset to stay ahead of emerging threats. Responsibilities : Monitor networks for security breaches and investigate violations Conduct vulnerability scans and risk assessments Configure and manage firewalls, antivirus software, and intrusion detection systems Develop and update incident response protocols Analyze security incidents and create reports on findings Implement and maintain data loss prevention strategies Ensure compliance with security policies and industry regulations (e.g., ISO 27001, NIST, GDPR) Train employees on security best practices and awareness Assist in security audits and assessments Collaborate with IT and DevOps teams to integrate security into development processes Requirements : Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field 2+ years of hands-on cybersecurity experience Knowledge of firewalls, VPNs, IDS/IPS, endpoint protection Familiarity with SIEM tools (e.g., Splunk, QRadar) Understanding of OWASP Top 10, MITRE ATT&CK framework Strong analytical and problem-solving skills Relevant certifications are a plus (e.g., CompTIA Security+, CEH, CISSP, CISM) Show more Show less

Posted 16 hours ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Senior Detection Engineer / Threat Hunter Overview The next evolution of AI-powered cyber defense is here. With the rise of cloud and modern technologies, organizations struggle with the vast amount of data and thereby security alerts generated by their existing security tools. Cyberattacks continue to get more sophisticated and harder to detect in the sea of alerts and false positives. According to the Forrester 2023 Enterprise Breach Benchmark Report, a security breach costs organizations an average of $3M and takes organizations over 200 days to investigate and respond. AiStrike’s platform aims to reduce the time to investigate and respond to threats by over 90%. Our approach is to leverage the power of AI and machine learning to adopt an attacker mindset to prioritize and automate cyber threat investigation and response. The platform reduces alerts by 100:5 and provides detailed context and link analysis capabilities to investigate the alert. The platform also provides collaborative workflow and no code automation to cut down the time to respond to threats significantly. We’re seeking a senior-level Detection Engineer and Threat Hunter with deep expertise in modern SIEMs and a strong focus on AI-augmented threat detection and investigation. In this role, you’ll design scalable, modular detection content using Sigma, KQL, and platform-specific query languages — while working with AI to automate detection tuning, threat hunting hypotheses, and investigation workflows across enterprise and cloud environments. Key Responsibilities Develop high-fidelity, AI-ready detection templates to build detection rules in Sigma, KQL, SPL, Lucene, etc., for Microsoft Sentinel, Chronicle, Splunk, and Elastic. Leverage AI-powered engines to prioritize, cluster, and tune detection content dynamically based on environment behavior and telemetry changes. Identify visibility and data coverage gaps across cloud, identity, EDR, and SaaS log sources; work cross-functionally to close them. Lead proactive threat hunts driven by AI-assisted hypotheses, anomaly detection, and known threat actor TTPs. Contribute to AI-enhanced detection-as-code pipelines, integrating rules into CI/CD workflows and feedback loops. Collaborate with SOC, threat intel, and AI/data science teams to continuously evolve detection efficacy and reduce alert fatigue. Participate in adversary emulation, purple teaming, and post-incident reviews to drive continuous improvement. Required Skills 5+ years of hands-on experience in detection engineering, threat hunting, or security operations. Expert-level knowledge of at least two major SIEM platforms: Microsoft Sentinel, Google Chronicle, Splunk, Elastic, or similar. Strong proficiency in detection rule languages (Sigma, KQL, SPL, Lucene) and mapping to MITRE ATT&CK. Experience using or integrating AI/ML for detection enrichment, alert correlation, or anomaly-based hunting. Familiarity with telemetry sources (EDR, cloud, identity, DNS, proxy) and techniques to enrich or normalize them. Ability to document, test, and optimize detection rules and threat hunt queries in a modular, scalable fashion. Strong communication skills and the ability to translate complex threat scenarios into automated, AI-ready detection logic. Nice to Have Experience integrating AI/ML platforms for security analytics, behavior baselining, or entity risk scoring. Familiarity with detection-as-code and GitOps workflows for rule development, testing, and deployment. Scripting knowledge (Python, PowerShell) for enrichment, custom detection logic, or automation. Experience with purple teaming tools like Atomic Red Team, SCYTHE, or Caldera. AiStrike is committed to providing equal employment opportunities. All qualified applicants and employees will be considered for employment and advancement without regard to race, color, religion, creed, national origin, ancestry, sex, gender, gender identity, gender expression, physical or mental disability, age, genetic information, sexual or affectional orientation, marital status, status regarding public assistance, familial status, military or veteran status or any other status protected by applicable law. Show more Show less

Posted 17 hours ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies