Home
Jobs

2144 Siem Jobs - Page 16

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world. Develop and maintain automation solutions to enhance Security Operations Centre (SOC) efficiency. Provide technical insight on automation platforms, scalable automation solutions, and security engineering practices. Collaborate with cross-functional teams to define scope, responsibilities, and automation strategies. Continuously improve automation frameworks to drive operational excellence. Align with Microsoft’s values through teamwork, coaching, and knowledge sharing. Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day. Responsibilities Design and implement automation solutions to improve security operations efficiency and effectiveness. Identify automation opportunities and develop scripts, workflows, and integrations. Contribute to engineering requirements that enhance security posture through automation. Work with security teams to enhance detection, triage, and response processes using automation. Ensure high availability and reliability of automation platforms. Develop and maintain technical documentation related to automation workflows and integrations. Analyze operational performance data and identify opportunities for automation-driven enhancements. Zartner across teams to drive holistic solutions to systemic security challenges. Support SOC teams by developing automation tools for precision alerting, faster triage, and optimized response processes. Advocate for automation best practices and innovative solutions within the organization. Qualifications 5+ years of experience in Security Operations or related automation roles. Strong experience with security automation tools such as SOAR, SIEM, and scripting-based automation frameworks. Hands-on experience with Microsoft Cloud Security Technologies such as Azure Sentinel, Azure Defender, MDE, Azure Data Explorer, and Azure Log Analytics. Experience with automation tools such as Logic Apps, Power Automate, or similar Low Code/No Code platforms. Proficiency in scripting languages like Python, PowerShell, or equivalent for automating security tasks. Experience with data processing and analysis using KQL, SQL, Splunk, or PowerBI. Strong understanding of SDLC, DevOps methodologies, and CI/CD pipelines. Ability to work effectively in ambiguous environments and adapt to evolving security challenges. Excellent problem-solving, analytical, and communication skills. Ability to collaborate with security analysts, engineers, and leadership to drive automation initiatives. Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations. Show more Show less

Posted 6 days ago

Apply

7.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Job Description – C++ Firewall & Network Security Developer Location: Noida Experience Required: 5–7 Years Job Type: Full-time Department: Network Security & Systems Engineering Company: Maple Cloud Technologies About the Role We are looking for a C++ Firewall & Network Security Developer with deep expertise in network protocol stacks, C++ systems programming, and real-time packet processing. In this role, you will work on the design and development of high-performance firewall components, including packet filtering, DPI, policy enforcement, and network traffic analysis. The ideal candidate has a strong foundation in networking (OSI Model, TCP/IP, UDP, HTTP/S, DNS, SSL/TLS), and has experience implementing and optimizing networked systems with multithreading, sockets, and security protocols. Key Responsibilities · Design and implement modules for a next-generation firewall using C++17/20 with focus on network-layer filtering, connection tracking, and application-level control. · Build high-performance network packet processing pipelines using raw sockets or libraries like libpcap . · Implement Deep Packet Inspection ( DPI ) and application detection using known libraries (e.g., nDPI ) or custom engines. · Develop and maintain components that work with network protocols like TCP, UDP, ICMP, HTTP/S, DNS, FTP, and TLS . · Integrate OpenSSL to support TLS inspection and secure control channels (e.g., HTTPS APIs, secure sync). · Build or interface with rule engines for access control, rate limiting, and traffic shaping. · Support development of alerting systems, log collectors, and network health monitoring tools. · Optimize code for latency and throughput, using concurrency control, SIMD, and lock-free techniques. · Work with multi-interface systems, Linux/Windows networking stacks, and handle routing/firewall table updates (e.g., iptables, pf, iproute2 ). · Collaborate with GUI teams for management interfaces built using QT/QML or WPF, and expose APIs using REST or gRPC . Required Skills & Experience · 6+ years of experience in modern C++ (C++11/14/17/20), OOP, and STL. · Strong foundation in networking protocols and OSI model (L2-L7). · Hands-on experience with TCP/IP socket programming, packet parsing, and flow/session tracking. · In-depth knowledge of TLS/SSL, encryption techniques (RSA, AES), and OpenSSL APIs. · Experience with multithreading, concurrency primitives, and performance optimization. · Familiarity with network protocol analysis tools (e.g., Wireshark, tcpdump) and debugging. · Proficiency in Linux/Unix internals, network configuration, and system diagnostics. Nice to Have (Preferred) · Experience with firewalls, NGFW, intrusion detection, or network sniffers. · Exposure to libpcap, nDPI, Netfilter/iptables, pfctl, or eBPF . · Experience with high availability (HA), VRRP/CARP, or clustered deployments. · Familiarity with Protobuf, gRPC, REST APIs , and secure service design. · Background in security appliances, VPNs, or Windows Credential Providers. · Comfortable with log rotation, SIEM integration, and custom monitoring hooks. Thanks and Regards KM Chandni HR Executive chandani@maplecloudtechnologies.com / hr@maplecloudtechnologies.com 7982255779 Show more Show less

Posted 6 days ago

Apply

3.0 - 5.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Job Description: PCI Internal Security Assessor (ISA) Department: Enterprise Security & Technology Risk Management Employment Type: Contractor Job Overview The PCI Internal Security Assessor (ISA) is responsible for ensuring that complies with the Payment Card Industry Data Security Standard (PCI DSS). The ISA will assess, monitor, and enforce the security measures necessary to protect cardholder data and maintain PCI compliance across all systems and processes. This role works closely with internal stakeholders and external parties to maintain a secure environment, mitigate risks, and improve overall security posture. Key Responsibilities: PCI DSS Compliance Management: Conduct regular internal assessments and audits to ensure the organization's compliance with PCI DSS. Develop and implement PCI compliance policies, procedures, and controls. Serve as the internal point of contact for PCI DSS-related matters and ensure all applicable security controls are in place. Collaborate with the external Qualified Security Assessor (QSA) to facilitate annual PCI DSS certification audits. Risk Assessment and Mitigation: Identify and assess potential risks to cardholder data environments and provide recommendations for risk mitigation. Implement and enforce necessary security controls to address gaps identified during assessments. Ensure vulnerability scanning, penetration testing, and security reviews are conducted to identify weaknesses and ensure continuous compliance. Documentation and Reporting: Prepare and maintain comprehensive documentation, including policies, procedures, and reports required for PCI DSS compliance. Maintain comprehensive documentation of assessment findings, corrective actions, and compliance status. Manage the submission of the Self-Assessment Questionnaires (SAQs) and Attestation of Compliance documents (AOCs) as needed. Training and Awareness: Conduct internal PCI DSS training for staff to ensure a deep understanding of the importance of compliance and security measures. Provide ongoing guidance and support to departments regarding security best practices related to PCI DSS. Collaboration and Communication: Work closely with projects, Enterprise Security, Technology, and other relevant departments to align PCI DSS compliance with overall security policies and practices. Proactively identify and/or promptly escalate risks and issues affecting PCI compliance status. Stay updated on changes in PCI DSS requirements and industry best practices to ensure CIBC Caribbean remains compliant. Present PCI DSS compliance status reports to senior management and external stakeholders. Act as a liaison where necessary between CIBC Caribbean and external vendors or service providers involved in processing or storing cardholder data. Qualifications: Education: Bachelor’s degree in Information Security, Computer Science, or a related field (or equivalent work experience). Experience: Minimum of 3-5 years of experience in information security, PCI compliance, or a related field. Previous experience as an ISA, QSA, or a similar role is highly desirable. Certifications: Certified PCI Internal Security Assessor (ISA) or Certified PCI Professional (PCIP) certifications preferred. Additional certifications such as CISSP, CISM, CISA, or CEH are a plus. Skills and Competencies: Deep understanding of PCI DSS requirements and data security best practices. Familiarity with security frameworks (NIST, ISO 27001, CIS Controls) and security technologies (firewalls, IDS/IPS, encryption, etc.). Strong analytical, problem-solving, and project management skills. Excellent communication and interpersonal skills with the ability to work cross-functionally. Proficiency in using security assessment tools and techniques (e.g., vulnerability scanners, SIEM). Other Requirements: Ability to work independently and handle sensitive information confidentially. Detail-oriented with strong organizational skills. Occasional travel may be required for audits or compliance reviews. Show more Show less

Posted 6 days ago

Apply

3.0 years

0 Lacs

Patiala, Punjab

On-site

Indeed logo

Position: Cloud / System Architect Company: RBH Solutions Pvt. Ltd. Location: Patiala, Punjab (On-site). Job Summary: RBH Solutions Pvt. Ltd. is seeking a skilled and experienced Cloud / System Architect to design, implement, and manage scalable cloud and on-premise infrastructure solutions. The ideal candidate should have experience in real-time systems and a solid understanding of enterprise deployment frameworks, microservices architecture, and cybersecurity. Requirements: Minimum 3 years of experience as a Cloud / System Architect Strong understanding of AI/ML concepts and their integration into cloud systems Knowledge of AI-based tools to enhance coding, testing, automation, and deployment workflows Understanding of real-time systems, IoT, and energy management is an added advantage Design and manage infrastructure across virtual machines (VMs), Linux, Windows, and physical servers Develop and implement enterprise-level cloud strategies and deployment frameworks Architect microservices-based solutions for real-time database applications Provide unified deployment solutions across on-premises, AWS, Azure, and Google Cloud Define tools and strategies for data ingestion, storage, processing, and analysis Optimize system architecture for performance, cost-efficiency, and scalability Prepare functional specifications and ensure compliance with project scope Monitor and optimize cloud infrastructure performance Troubleshoot and resolve infrastructure-related issues Security Focus: Contribute to security requirements for RFPs/RFIs, focusing on: Network security (Firewalls, VPNs, Intrusion Detection/Prevention Systems, Access Controls) Implement and manage: o Network Access Control (NAC) o Data Loss Prevention (DLP) o Security Information and Event Management (SIEM) Ensure system security and data privacy across all infrastructure layers Conduct or support cybersecurity testing such as Vulnerability Assessment and Penetration Testing (VAPT) Apply secure-by-design principles throughout infrastructure planning and implementation Qualification & Skill Requirements: Education: Bachelor’s or Master’s degree in Computer Science, Information Technology, Electronics, or a related engineering field Proficiency in multiple operating systems (Linux, Windows) Strong communication skills for cross-functional collaboration Programming knowledge in Python, C#, and Java Strong understanding of cloud security principles Ability to automate and integrate IT system processes PostgreSQL knowledge is an added advantage Job Type: Full-time Pay: ₹80,000.00 - ₹160,000.00 per month Schedule: Day shift Work Location: In person

Posted 6 days ago

Apply

89.0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Linkedin logo

Business Unit: Global Technology Reporting To: Director, Cybersecurity Shift: EMEA (1:30 pm - 10:30 pm IST) (India) About Russell Investments, Mumbai: Russell Investments is a leading outsourced financial partner and global investment solutions firm providing a wide range of investment capabilities to institutional investors, financial intermediaries, and individual investors around the world. Building on an 89-year legacy of continuous innovation to deliver exceptional value to clients, Russell Investments works every day to improve the financial security of its clients. The firm is “Top 12 Ranked Consultant (2009-2024)” in P&I survey 2024 with $906 billion in assets under advisement (as of December 31, 2024) and $331.9 billion in assets under management (as of March 31, 2025) for clients in 30 countries. Headquartered in Seattle, Washington in the United States, Russell Investments has offices around the world, including London, New York, Toronto, Sydney, Tokyo, Shanghai – and has opened a new office in Mumbai, India in June 2023. Joining the Mumbai office is an incredible opportunity to work closely with global stakeholders to support the technology and infrastructure that drives the investment and trading processes of a globally recognized asset management firm. Be part of the team based out of Goregaon (East) and contribute to the foundation and culture of the firm’s growing operations in India. The Mumbai office operates with varying shifts to accommodate time zones around the world. For more information, please visit https://www.russellinvestments.com. Job Description: Location : Mumbai, India Department : Global Technology/Cybersecurity Reporting to : Global Head of Cybersecurity Role Overview The Head of Cybersecurity – India will lead the cybersecurity strategy, operations, and governance for the region. The role is responsible for ensuring robust protection of the organization's data, systems, and networks against cyber threats, while enabling compliance with regulatory requirements. This senior leadership role requires expertise in threat management, risk assessment, and cybersecurity technologies, as well as strong people and project management skills. Key Responsibilities Strategic Leadership Develop and implement the cybersecurity strategy for India in alignment with global and regional security objectives. Ensure alignment of cybersecurity initiatives with business goals and regulatory requirements. Lead a high-performing cybersecurity team. Assist Global Head of Cybersecurity in preparing presentations to the various Boards and Committees. Operational Security Oversee the design, implementation, and maintenance of security technologies, including firewalls, intrusion detection systems, endpoint protection, and cloud security tools. Monitor, detect, and respond to cyber threats, ensuring rapid resolution of incidents. Identify risks in technology selections and configurations in the region and create plans for remediation. Ensure business continuity through robust disaster recovery and incident response plans and revise such plans to leverage this regional office. Risk & Compliance Assess, monitor, and mitigate cybersecurity risks in collaboration with business units. Ensure compliance with local and international regulations (e.g., GDPR, IT Act 2000, ISO 27001). Report regularly to Global Head of Cybersecurity on the state of cybersecurity and risks. Ensure compliance with all global corporate Policies, Standards and best practices for the India office. Stakeholder Engagement Collaborate with global cybersecurity leaders to share insights, resources, and strategies. Act as the primary point of contact for regulators, auditors, and third-party security assessments in India. Facilitate cybersecurity awareness program for employees in India to foster a security-conscious culture and ensure completion of required training. Innovation and Trends Stay updated on emerging cybersecurity threats, technologies, and best practices. Recommend and implement innovative solutions to strengthen the organization’s cybersecurity posture. Manage Cybersecurity intranet site and ensure fresh and relevant content is provided. Qualifications Education Bachelor’s/Master’s degree in Computer Science, Information Security, or a related field. Certifications (Preferred) CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CRISC (Certified in Risk and Information Systems Control) Experience 12+ years of experience in information security, with at least 5 years in a leadership role. Proven track record of managing cybersecurity strategies in a large organization, preferably in a global or regional context. Hands-on experience with security frameworks like NIST, ISO 27001, or COBIT. Skills Strong knowledge of security technologies, tools, and practices (e.g., SIEM, EDR, DLP, cloud security). Experience managing cybersecurity in multi-cloud and hybrid environments. Excellent leadership, communication, and decision-making skills. Ability to balance technical requirements with business needs. Show more Show less

Posted 6 days ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. Position Summary Gruve is looking for a skilled IT Systems Administrator to support and enhance our organization’s IT infrastructure with a primary focus on Microsoft technologies while also managing a diverse range of systems and platforms. This role involves overseeing server and network operations, supporting cloud and on-prem environments, and ensuring security, performance, and availability across IT assets. The ideal candidate has strong experience in Microsoft ecosystems while also being comfortable with general IT systems and network management. Key Responsibilities Microsoft Environment Management Administer Windows Server (2016/2019/2022), Active Directory, Group Policy, and DNS/DHCP services. Manage Microsoft 365 suite, including Exchange Online, Teams, SharePoint, and OneDrive. Support Azure Active Directory integration, Intune/Endpoint Manager for device policies, and cloud security controls. Create and maintain PowerShell scripts to automate administrative tasks and deployments. General Systems Administration Deploy, configure, and maintain physical and virtual servers (VMware, Hyper-V). Monitor system performance, availability, and capacity; proactively resolve bottlenecks or outages. Administer Linux servers for specific workloads or services (if applicable). Manage IT assets, inventory, and lifecycle planning. Network and Security Operations Maintain enterprise networking equipment: firewalls, switches, routers, VPNs (Cisco, Ubiquiti, or equivalent). Ensure robust network security, including patching, antivirus, endpoint protection, and SIEM integration. Implement and manage backup/recovery solutions and participate in disaster recovery planning/testing. Cloud and SaaS Support Manage hybrid environments involving Azure, AWS, or Google Cloud platforms. Support cloud-based storage, identity, and SaaS applications beyond Microsoft (e.g., Zoom, Slack, Atlassian). End-User and Tier 2/3 Support Provide escalated support for desktops, software, network connectivity, and account access. Collaborate with helpdesk and engineering teams to address recurring issues and implement root cause fixes. Documentation and Process Improvement Maintain up-to-date system/network documentation, runbooks, and change logs. Identify opportunities for automation, optimization, or standardization across the IT environment. Basic Qualifications Bachelor’s degree in computer science, Information Technology, or related field. 3–5+ years of experience in IT systems/network administration with significant Microsoft exposure. Windows Server, Active Directory, Azure AD, Microsoft 365 Cloud platforms like Azure, AWS, or GCP Endpoint management tools like Intune, or Jamf (for Mac) Preferred Qualifications VMware or Hyper-V Linux systems Cisco CCNA (LAN/WAN/VPN management) Work Environment Must be comfortable supporting global teams and working in PST or overlapping time zones when required. Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted. Show more Show less

Posted 6 days ago

Apply

0 years

0 Lacs

Barasat-I, West Bengal, India

On-site

Linkedin logo

Leads IT security projects in terms of design, plan, and implementation of security infrastructure & solutions including d evelopment and management of overall enterprise security approach in terms of Infrastructure, Network, Data, Cloud and Endpoint Security. Analyse business requirements by partnering with key stakeholders across the organization to develop security solutions. Develop and review security-related documents such as SOPs, Process documents, Operational Reports & Metrics Dashboards, etc. Hands on experience with implementation of various security solutions, such as Cloud Security Solutions, Data Security Solutions, Network Security Solutions & Endpoint Security Solutions. Validate use cases and events configured on SIEM in coordination with SOC Manager. Develop & implement strategies for Infra and Application hardening. Prepare plan and strategies to ensure security of the organization including both high and low risk events. Identify & implement security best practices through fine tuning of appliances, solutions and applying audit recommendations. Well-versed and experienced in threat landscape, risk profiling and continuous improvement in security processes. Work with IT service providers and partners to ensure industry standard platform, network, and endpoint security posture is maintained. Lead vulnerability management and penetration testing activities for Infrastructure, improvise them and ensure closure as per the established practices alongwith analysing, reporting, and tracking of all the identified vulnerabilities. Work in collaboration with internal teams and other business units to identify and highlight security issues and ensure timely closure. Should be able to work under pressure and ensure that timelines are met, and projects and other initiatives are delivered in agreed timelines. Leads on the identification of data security and information protection risks across the organisation and works with stakeholders to develop and implement mitigation plans, escalating issues as appropriate. Help to achieve the highest standards of information security across the organisation. Implements measures to protect digital files and information systems against unauthorized access, modification, or destruction. Develops strategies to respond to and recover from a security breach. Coordinate’s security activities with relevant vendors. Working alongside the cross-functional teams & stakeholders in conjunction with Cloud Development, Architecture and DevOps teams to provide visibility of cloud security posture including security of Containers & Serverless environments. Day to day management, troubleshooting and housekeeping of security toolsets. Delivering and maintaining security metrics and improvements. Should have experience in presenting the overall Information security status to CISO with all security metrices for defined KPIs. Planning and implementation of automated remediation activities. Ensuring work is completed in such a way to comply with established compliance and other internal standards. Show more Show less

Posted 6 days ago

Apply

0.0 - 10.0 years

0 Lacs

Gurugram, Haryana

On-site

Indeed logo

Location Gurgaon, Haryana, 122001 Category Engineering / Information Technology Job Type Full time Job Id 1183234 No Security Tower Head This role has been designed as ‘’Onsite’ with an expectation that you will primarily work from an HPE partner/customer office. Who We Are: Hewlett Packard Enterprise is the global edge-to-cloud company advancing the way people live and work. We help companies connect, protect, analyze, and act on their data and applications wherever they live, from edge to cloud, so they can turn insights into outcomes at the speed required to thrive in today’s complex world. Our culture thrives on finding new and better ways to accelerate what’s next. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. If you are looking to stretch and grow your career our culture will embrace you. Open up opportunities with HPE. Job Description: HPE Operations is our innovative IT services organization. It provides the expertise to advise, integrate, and accelerate our customers’ outcomes from their digital transformation. Our teams collaborate to transform insight into innovation. In today’s fast paced, hybrid IT world, being at business speed means overcoming IT complexity to match the speed of actions to the speed of opportunities. Deploy the right technology to respond quickly to market possibilities. Join us and redefine what’s next for you. What you will do Security Tower Head role at HPE's critical large customer is a strategic role that needs deep experience in a similar capacity of CISO and as Lead Cybersecurity Architect for at least 10 years and has a total experience in the security domain for a minimum of 15 years. This role shall also demand for a strong stakeholder management. The experience of leading a large team of cybersecurity specialists from various domains such as VAPT, DLP, Edge Security/EDR, WAF, LB, SIEM SOAR UEBA, ITSM, GRC, SAST DAST, Cloud Security, DevSECOps, and related scripting/coding experience in the above domains including AI/ML based Cybersecurity modelling is mandatory. Responsible for IS operations Oversee formal risk assessment and self-assessments program for various Information Services systems and processes Manage and Monitor, organization technology security policy, ISO 27001, Data privacy and regulatory requirement to remediate new and outstanding issues; track & resolve security-related issues Carry out audits for ensuring enforcement of information security policies Promote and monitor our corporate wide IS Security awareness for ISO 27001 program Responsible for design, develop and update the policies regarding Information Security, data governance and privacy Responsible for application security, Governance and Compliance Responsible for Initiating and advocating safe practices and Industry standards Advises the CISO office on the emerging information security risks and their mitigation strategies Responsible for performing all Security audits & IT risk assessment activities Responsible for initiating and managing required information security Compliance certification processes Responsible for integration and gap analysis of the Information security of any company that company acquires Strong knowledge of the requirement of Computer Applications and Network security technologies and principles Develop, promulgate, and maintain policies, standards and practices of Information Security by establishing and maintaining efficient processes to monitor compliance of defined policies, standards and practices. Implement policies through digital workflows. Ensure activities related to BCP-DR and Emergency operations are performed in timely manner Assist in planning for information security risk monitoring, risk analysis, incident management, Change Management and overall information security requirements needed to support strategic IT and business needs What you need to bring: Qualifications BE/ B.Tech/ M.Tech/ MSc/ MCA qualification or equivalent Certifications: LA ISO 27001 (mandatory requirement) and any one of the IT risk management or Information security certificates such as CISA, CISSP, CISM, CRISC, ISO31000 Experience Experience of 10 years and minimum IT Audit experience of 3 Years Experience in driving key meetings for closing identified IS issues or gaps across different teams and vendors and achieve the outcomes within the define deadlines Strong understanding of ISO 27001 as well as industry security frameworks Strong knowledge of risk assessment and mitigation Additional Skills: Accountability, Accountability, Active Learning (Inactive), Active Listening, Bias, Business Growth, Client Expectations Management, Coaching, Creativity, Critical Thinking, Cross-Functional Teamwork, Customer Centric Solutions, Customer Relationship Management (CRM), Design Thinking, Empathy, Follow-Through, Growth Mindset, Information Technology (IT) Infrastructure, Infrastructure as a Service (IaaS), Intellectual Curiosity (Inactive), Long Term Planning, Managing Ambiguity, Process Improvements, Product Services, Relationship Building {+ 5 more} What We Can Offer You: Health & Wellbeing We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing. Personal & Professional Development We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have — whether you want to become a knowledge expert in your field or apply your skills to another division. Unconditional Inclusion We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. Let's Stay Connected: Follow @HPECareers on Instagram to see the latest on people, culture and tech at HPE. #india #operations Job: Services Job Level: TCP_05 HPE is an Equal Employment Opportunity/ Veterans/Disabled/LGBT employer. We do not discriminate on the basis of race, gender, or any other protected category, and all decisions we make are made on the basis of qualifications, merit, and business need. Our goal is to be one global team that is representative of our customers, in an inclusive environment where we can continue to innovate and grow together. Please click here: Equal Employment Opportunity. Hewlett Packard Enterprise is EEO Protected Veteran/ Individual with Disabilities. HPE will comply with all applicable laws related to employer use of arrest and conviction records, including laws requiring employers to consider for employment qualified applicants with criminal histories.

Posted 6 days ago

Apply

2.0 - 6.0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Linkedin logo

Company Overview At Zuora, we do Modern Business. We’re helping people subscribe to new ways of doing business that are better for people, companies and ultimately the planet. It’s an approach resulting from the shift to the Subscription Economy that puts customers first by building recurring relationships instead of one-time product sales and focuses on sustainable growth. Through our leading expertise and multi-product suite, we are transforming all industries and working with the world’s most innovative companies to monetize new business models, nurture subscriber relationships and optimize their digital experiences. The Team & Role The IT Security Operations team at Zuora is responsible for safeguarding digital assets, defending against cyber threats, and maintaining the confidentiality, integrity, and availability of information systems. The team implements a comprehensive framework of policies, technologies, and procedures to identify, assess, and mitigate security risks across Z’s infrastructure, networks, applications, and endpoints. Role Monitor, Detect and Respond to alerts generated by security controls as part of IT Security operations team Security Incident Response, Containment and Remediation handling. Analyze, document and report on potential security incidents and perform Threat Hunting for business critical environments Collaborating with cross-functional teams to address and resolve vulnerabilities detected within the environment. This is a hybrid position, so you'll work both remotely and in the office. Whenever it is required the engineer should be working from the office Our Tech Stack: Rapid7, Zscaler, CrowdStrike, AWS , WIZ, GCP, HP Aruba, Palo Alto,... What you’ll do Evaluate, implement, and configure security tools and platforms (e.g., SIEM, EDR, NDR, SOAR) to enhance detection, monitoring, and response capabilities. Familiarity with cloud security (AWS, Azure, GCP), endpoint protection, and network security best practices. Design and implement robust detection and response strategies to identify and mitigate cyber threats. Conduct threat hunting activities and provide recommendations for improving detection capabilities. Deploy and integrate security tools and frameworks into the existing environment. Conduct security assessments, gap analyses, and vulnerability assessments to identify security risks and recommend solutions. Design and implement automation solutions for security operations, incident response, and monitoring processes (e.g., using SOAR tools or custom scripts). Create playbooks, automated workflows, and integration strategies to reduce response time and increase operational efficiency. Provide expert guidance and hands-on support for security incident response efforts, from detection to containment and recovery. Your experience 2-6 years of security experience, specifically on SIEM/ SOC operations. Strong understanding of Network Security, System Security, Web application security, End-point Security including hands-on exploitation skills coupled with defensive skills. Familiarity with infrastructure and systems security domains and automation. Ability to explain complex security issues and their impact to diverse audiences. Be a fast learner and have experience partnering with cross-functional teams. Strong communication and interpersonal skills, with the ability to explain complex technical concepts to nontechnical stakeholders. BA/BSc in Computer Science or similar technical degree or equivalent experience Nice To Haves Industry certifications such as Certified SOC Analyst (CSA), CISM,CISSP or similar are preferred. Additional certifications in security automation (e.g., SOAR tools) or specific technologies like Rapid7, Zscaler, CrowdStrike, Palo Alto are a plus. #ZEOLife at Zuora As an industry pioneer, our work is constantly evolving and challenging us in new ways that require us to think differently, iterate often and learn constantly—it’s exciting. Our people, whom we refer to as “ZEOs" are empowered to take on a mindset of ownership and make a bigger impact here. Our teams collaborate deeply, exchange different ideas openly and together we’re making what’s next possible for our customers, community and the world. As Part Of Our Commitment To Building An Inclusive, High-performance Culture Where ZEOs Feel Inspired, Connected And Valued, We Support ZEOs With Competitive compensation, variable bonus and performance reward opportunities, and retirement programs Medical, dental and vision insurance Generous, flexible time off Paid holidays, “wellness” days and company wide end of year break 6 months fully paid parental leave Learning & Development stipend Opportunities to volunteer and give back, including charitable donation match Free resources and support for your mental wellbeing Specific benefits offerings may vary by country and can be viewed in more detail during your interview process. Location & Work Arrangements Organizations and teams at Zuora are empowered to design efficient and flexible ways of working, being intentional about scheduling, communication, and collaboration strategies that help us achieve our best results. In our dynamic, globally distributed company, this means balancing flexibility and responsibility — flexibility to live our lives to the fullest, and responsibility to each other, to our customers, and to our shareholders. For most roles, we offer the flexibility to work both remotely and at Zuora offices. Our Commitment to an Inclusive Workplace Think, be and do you! At Zuora, different perspectives, experiences and contributions matter. Everyone counts. Zuora is proud to be an Equal Opportunity Employer committed to creating an inclusive environment for all. Zuora does not discriminate on the basis of, and considers individuals seeking employment with Zuora without regards to, race, religion, color, national origin, sex (including pregnancy, childbirth, reproductive health decisions, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, genetic information, political views or activity, or other applicable legally protected characteristics. We encourage candidates from all backgrounds to apply. Applicants in need of special assistance or accommodation during the interview process or in accessing our website may contact us by sending an email to assistance(at)zuora.com. Show more Show less

Posted 1 week ago

Apply

6.0 years

0 Lacs

Chandigarh, India

On-site

Linkedin logo

Skills: Vulnerability Management, SIEM, EDR, Email Security Gateways, Firewalls, L3, Hiring Security Operations Center (SOC) L3 . LinkedIn IDs must. Mode of hire : C2H mode only Experience 6 to 10 Years Notice period : Immediate. Location: Bangalore/Chandigarh Work Mode - Hybrid If Interested can share your resume at heena@aliqan.com Accountabilities Job description Develop, enhance, and operationalize IT Security processes. Lead, coach, and mentor a high-performing, highly engaged team, supporting initiatives covering Information Security, Incident Management, and Vulnerability Management. Develop, measure, analyze, and maintain the internal and external service metrics for Security Service Operations, providing timely reports to leadership teams. Lead, coordinate, and train others on effective management of security incidents and operational responses Collaborate across various business units to deliver the most Resource work in shifts - 2:30AM till 10:3AM or 10:30AM to 7:30PM IST comprehensive security response Implement security and risk programs to ensure operational efficiency and auditability. Understand business needs and intuitively recommend secure solutions. Lead and manage IR issues and provide timely feedback to management and supervisor Provide guidance to the IT security team members. Assign tasks and projects to team members based on their skills and expertise. Assess and prioritize security risks and vulnerabilities and develop mitigation strategies. Lead the response to security incidents, including breaches, attacks, and data breaches. Conduct post-incident reviews to identify lessons learned and improve incident response processes. Monitor security alerts and events, and coordinate appropriate responses Collaborate with other IT teams, departments, and business units to integrate security measures and requirements Provide regular reports to Leadership on the productivity, Team performance Maintain comprehensive documentation of security procedures, incident responses, and configurations Develops and maintains a productive work teams by hiring qualified personnel, training, and managing performance. Manages teams with integrity, ethical business practices, and in accordance with Mouser policies, procedures, and practices. Customarily and regularly directs the work of two or more full-time employees or their equivalent. Makes suggestions and recommendation for these employees regarding performance, including hiring, transfer, advancement, and termination. Manages daily operations to meet department and company objectives. Works with minimum supervision and makes independent judgments. Flexible to meet the changing needs of the business and willingness to take on new responsibilities and assignments. Initiates, establishes and maintains highly effective relationships with internal and external business contacts of various cultures, and at all levels. Extremely confidential and trustworthy. Demonstrates knowledge, experience and understanding of critical job functions of the team. Assists management with development of results oriented strategies. Regular attendance at work is an essential part of the job. Skills & Certifications Extensive knowledge of key IT Security Technologies Preferred to have an Industry respected Certification (CISSP, CISM, CRISC, CISA) Maintain current and extensive knowledge of emerging security threats Possess excellent verbal, interpersonal and written technical and non-technical communication skills. Education & Experience Bachelors Degree in any field, or minimum of 3 years prior work experience that is relevant to the team you will supervise. Including: 6+ years of experience working with SIEM, EDR, Email Security Gateways, Vulnerability Management Software, Firewalls, etc. 6+ years of experience working with security systems, user authentication and management Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

**********Looking for someone working with engineering background, NOT Analyst******* Description: Client is looking for a skilled and versatile Security Engineer (NOT Analyst) to drive the advancement and growth of our detection and automation initiatives. Reporting to the Senior Manager of Security Engineering and Operations, this role will collaborate with cross-functional teams and external partners to mitigate risks and implement security measures that safeguard sensitive data and systems against infiltration and cyber-attacks. The position will also lead our incident response efforts and the development of threat detection platforms. Must Have Skills to Qualify: Building automation workflows from scratch Owning SOAR playbook architecture Hands-on Python scripting for integrations Deploying detection logic across hybrid environments ● Familiarity with a broad range of security technologies: SIEM, CASB, SOAR, DLP, and EDR. ● Technical proficiency with one or more of the major cloud computing environments. ● Several years of experience with the Python programming language. ● Excellent software design, problem-solving, and debugging skills. ● Energetic, passionate about security, and professionally curious about the cyber security threat landscape Responsibilities: ● Lead the development, research, and creation of automations within our SOAR platform. ● Design and develop automation playbooks using both out-of-the-box and custom integrations and functions. ● Create custom integrations and automation scripts using languages like Python or PowerShell. ● Integrate existing technologies with the XSOAR platform. ● Participate in architecture design and analysis related to security automation. ● Troubleshoot and resolve issues related to automation processes or tools. ● Collaborate with teams such as network engineering and downstream applications to ensure seamless integration of automation solutions. ● Catalogue and review identified security automation use cases with stakeholders. ● Lead automation use case/playbook design sessions. ● Develop and maintain documentation for automation processes and procedures. Your team will: ● Execute Client’s security strategy and roadmap. ● Refine security response by implementing orchestration and automation. ● Innovate new methods and processes that will improve Client’s security posture. Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. About The Role We are looking for a highly skilled SIEM Consultant with deep hands-on experience in designing, implementing, and configuring Splunk SIEM solutions. The ideal candidate will be responsible for deploying Splunk into customer environments, onboarding diverse log sources, configuring security use cases, and integrating external tools for end-to-end threat visibility. This role demands strong technical expertise, project delivery experience, and the ability to translate security monitoring requirements into Splunk configurations and dashboards. Key Responsibilities SIEM Design s Implementation Lead the design and deployment of Splunk architecture (single/multi-site, indexer clustering, search head clustering, ). Define data ingestion strategies and architecture best Install, configure, and optimize Splunk components (forwarders, indexers, heavy forwarders, search heads, deployment servers). Set up and manage Splunk deployment servers, apps, and configuration bundles. Log Source Onboarding Identify, prioritize, and onboard critical log sources across IT, cloud, network, security, and application Develop onboarding playbooks for common and custom log Create parsing, indexing, and field extraction logic using conf, transforms.conf, and custom apps. Ensure log data is normalized and categorized according to CIM (Common Information Model). Use Case Development s Configuration Work with SOC teams to define security monitoring requirements and detection Configure security use cases, correlation rules, and alerting within Splunk Enterprise Security (ES) or core Develop dashboards, alerts, and scheduled reports to support threat detection, compliance, and operational Tune and optimize correlation rules to reduce false Tool Integration Integrate Splunk with third-party tools and platforms such as: Ticketing systems (ServiceNow, JIRA) Threat Intelligence Platforms (Anomali) SOAR platforms (Splunk SOAR, Palo Alto XSOAR) Endpoint C Network tools (CrowdStrike, Fortinet, Cisco, ) Develop and manage APIs, scripted inputs, and custom connectors for data ingestion and bidirectional Documentation s Handover Maintain comprehensive documentation for architecture, configurations, onboarding steps, and operational Conduct knowledge transfer and operational training for security Create runbooks, SOPs, and configuration backups for business Prepare HLD and LLD documents for Solution Required Skills s Experience 5+ years of experience in SIEM implementation, with at least 3 years focused on Strong knowledge of Splunk architecture, deployment methods, data onboarding, and advanced search. Experience in building Splunk dashboards, alerts, and use case logic using SPL (Search Processing Language). Familiarity with Common Information Model (CIM) and data normalization Experience integrating Splunk with external tools and writing automation scripts (Python, Bash, ). Preferred Certifications Splunk Core Certified Power User Splunk Certified Admin or Architect Splunk Enterprise Security Certified Admin (preferred) Security certifications like CompTIA Security+, GCIA, or CISSP (optional but beneficial) Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted. Show more Show less

Posted 1 week ago

Apply

1.0 - 3.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. About The Role We are seeking a skilled SIEM Administrator to manage and optimize different SIEM solutions. The ideal candidate will be responsible for system administration, log integration, troubleshooting, Deployment, Implementation and maintaining security posture for the organization. Key Responsibilities SIEM Administration: Install, configure, maintain, and upgrade SIEM components. (IBM Qradar SIEM, DNIF, Splunk & Securonix). Log Management Onboard, parse, and normalize logs from various data sources (firewalls, servers, databases, applications, etc.) Custom log source integration and parser development. System Monitoring & Troubleshooting Ensure SIEM tools are functioning optimally. Monitor & regular health check perform for SIEM tools. troubleshoot system errors and resolve performance issues. Conduct regular performance tuning and capacity planning Perform root cause analysis for system failures & performance issues. Optimize system performance and storage management for SIEM Integration & Automation Integrate third-party security tools (firewalls, EDR, threat intelligence feeds) with SIEM. Compliance & Audits Ensure log retention policies comply with regulatory standards. Develop & enforce SIEM access controls & user roles/permissions. Documentation & Training Document system configurations, SOP’s & troubleshooting documents. Prepare monthly/ weekly reports and PPT, onboarding documentation as per business/ client requirement. Dashboard & Report Development Create & maintain custom dashboards & reports Optimize searches & reports for performance and efficiency. Other Knowledge Base Hands on experience with Linux OS & Windows OS Basic to mediator level knowledge in networking skills Should be familiar with Azure, AWS or GCP products Required Skills & Qualifications B.E/B.Tech degree in computer science, Cybersecurity, or related field (preferred). 1-3 years experience as Soc Admin Strong knowledge of SIEM architecture, log sources, and event correlation. Proficiency in log management, regular expressions, and network security concepts. Experience integrating SIEM with various security tools (firewalls, IDS/IPS, antivirus, etc.). Scripting knowledge (Python, Bash, or PowerShell) is a plus. Training or Certificate on Splunk or IBM Qradar Preferred. Soft Skills Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Ability to work independently and in a team. Must Have Skills Hands-on experience with SIEM tools like IBM QRadar, Splunk, Securonix, LogRhythm, Microsoft Sentinel, DNIF etc. Proficiency in IBM Qradar & Splunk administration Configuring, maintaining, and troubleshooting SIEM solutions. Log source integration, parsing, and normalization. Strong knowledge of TCP/IP, DNS, HTTP, SMTP, FTP, VPNs, proxies, and firewall rules. Familiarity with Linux and Windows system administration. Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted. Show more Show less

Posted 1 week ago

Apply

3.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. About The Role We are seeking a highly skilled Security Analyst (Level 2) to join our MSSP SOC team. The ideal candidate will have expertise in SIEM (Splunk, QRadar), XDR/EDR solutions, and security analysis with hands-on experience in investigating and responding to security alerts. This role requires proficiency in reviewing and analyzing Level 1 alerts, providing detailed recommendations, and engaging with customers for incident handling. The candidate should also have basic SIEM administration knowledge and Python scripting skills for troubleshooting and playbook development. Key Responsibilities Threat Detection & Response: Analyze and investigate security alerts, events, and incidents generated by SIEM, XDR, and EDR solutions. Incident Investigation & Handling: Conduct in-depth security incident investigations, assess impact, and take appropriate actions. Incident Escalation & Communication: Escalate critical incidents to Level 3 analysts or senior security teams while maintaining detailed documentation. Content Management: Develop and fine-tune correlation rules, use cases, and alerts in SIEM/XDR platforms to improve detection accuracy. Malware Analysis: Perform basic malware analysis and forensic investigation to assess threats. Customer Request Handling: Collaborate with customers to address security concerns, provide recommendations, and respond to inquiries. SIEM Administration: Assist in the administration and maintenance of SIEM tools like Splunk or QRadar, ensuring smooth operations. Automation & Playbooks: Utilize Python scripting for automation, troubleshooting, and playbook development to enhance SOC efficiency. Reporting & Documentation: Prepare detailed reports on security incidents, trends, and mitigation strategies. Basic Qualifications B.E/B. Tech degree in computer science, Information Technology, Masters in Cybersecurity 3+ years of experience in a SOC or cybersecurity operations role. Strong knowledge of SIEM tools (Splunk, QRadar) and XDR/EDR solutions. Hands-on experience in threat detection, security monitoring, and incident response. Knowledge of network security, intrusion detection, malware analysis, and forensics. Basic experience in SIEM administration (log ingestion, rule creation, dashboard management). Proficiency in Python scripting for automation and playbook development. Good understanding of MITRE ATT&CK framework, security frameworks (NIST, ISO 27001), and threat intelligence. Strong analytical, problem-solving, and communication skills. Ability to work in a 24x7 SOC environment (if applicable) Preferred Qualifications Certified SOC Analyst (CSA) Certified Incident Handler (GCIH, ECIH) Splunk Certified Admin / QRadar Certified Analyst CompTIA Security+ / CEH / CISSP (preferred but not mandatory Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted. Show more Show less

Posted 1 week ago

Apply

4.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. About The Role We are seeking a skilled SIEM Administrator to manage and optimize different SIEM solutions. The ideal candidate will be responsible for system administration, log integration, troubleshooting, Deployment, Implementation and maintaining security posture for the organization. Key Responsibilities SIEM Administration: Install, configure, maintain, and upgrade SIEM components. (IBM Qradar SIEM, DNIF, Splunk & Securonix). Log Management Onboard, parse, and normalize logs from various data sources (firewalls, servers, databases, applications, etc.) Custom log source integration and parser development. System Monitoring & Troubleshooting Ensure SIEM tools are functioning optimally. Monitor & regular health check perform for SIEM tools. troubleshoot system errors and resolve performance issues. Conduct regular performance tuning and capacity planning Perform root cause analysis for system failures & performance issues. Optimize system performance and storage management for SIEM Integration & Automation Integrate third-party security tools (firewalls, EDR, threat intelligence feeds) with SIEM. Compliance & Audits Ensure log retention policies comply with regulatory standards. Develop & enforce SIEM access controls & user roles/permissions. Documentation & Training Document system configurations, SOP’s & troubleshooting documents. Prepare monthly/ weekly reports and PPT, onboarding documentation as per business/ client requirement. Dashboard & Report Development Create & maintain custom dashboards & reports Optimize searches & reports for performance and efficiency. Hands on experience with Linux OS & Windows OS Basic to mediator level knowledge in networking skills Should be familiar with Azure, AWS or GCP products Basic Qualifications B.E./B.Tech in Computers or related field (preferred). 4+ Years of Experience in SOC Administration. Strong knowledge of SIEM architecture, log sources, and event correlation. Preferred Qualifications Proficiency in log management, regular expressions, and network security concepts. Experience integrating SIEM with various security tools (firewalls, IDS/IPS, antivirus, etc.) Scripting knowledge (Python, Bash, or PowerShell) is a plus. Training or Certificate on Splunk or IBM Qradar Preferred. Experience with SIEM tools like IBM QRadar, Splunk, Securonix, LogRhythm, Microsoft Sentinel, DNIF etc. Proficiency in IBM Qradar & Splunk administration. Configuring, maintaining, and troubleshooting SIEM solutions. Strong analytical and problem-solving skills. Excellent communication and documentation abilities. Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted. Show more Show less

Posted 1 week ago

Apply

10.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

The Key Skills Required. Hands-on experience with M365, AD DS, DNS, DHCP, backup process. Hands-on experience on firewalls, IDS/IPS, SIEM, EDR, antivirus, and vulnerability scanning tools. At least 10 years’ working with large Infrastructure. Advanced knowledge about Windows Server, Windows Clients, Linux Server. Understanding of attack vectors, Familiarity with different network topologies and protocols such as TCP/IP, DNS, HTTP(S), SMTP, VLANs, VPNs, WLAN and routing/switching. Firm knowledge of technical details of SMTP / e-mail in general and therefore to analyze e-mail headers in order to determine additional data such as real origin etc. Expert regarding the operation of Outlook & Exchange from a user’s perspective Firm grasp of phishing techniques and e-mail based attack patterns Commitment to continuous learning. Familiarity with security-related regulations, such as GDPR, HIPAA, and PCI-DSS. Excellent verbal, written, and interpersonal communication skills, especially ability to break down complex technical information to non-technical stakeholders and articulate the impact of security design flaws, attack surfaces and vulnerabilities Should possess very good knowledge in the areas of : Understanding of IT security (and related) compliance frameworks like NIST, ISO, SOC 2, HIPAA. Deploy and maintain security tools and systems. Implement security policy, standards, guidelines, processes, and procedures to ensure ongoing security posture. This role requires a deep understanding of endpoint security, network protocols, server virtualization, and data transfer processes to ensure the smooth and secure operation of the company's IT systems. Perform run the business SAN administrative duties including Backup Management Participate in large scale component upgrades datacenter migrations and similar enterprise initiatives. Develop communicate and monitor the operational standards and procedures for backups. Perform all routine administrative and operational tasks Manage current storage environment. Incorporates disk /SAN and storage software. Resolve storage short falls. Alert and resolve performance issues and advise end users. High availability of data to all applications. Hyper -V Data Migrations & Replication. Work with application developers to determine storage requirements. Work with existing programmers System Administrators and DBAs to optimize storage. Maintain proper backup schedules. Restore and recover data as requested. Extensive experience deploying mission critical servers in a 24 by 7 production environment. Mentor and create documentation knowledge base articles for routine tasks and troubleshoot on the infrastructure under support. Align job policy for retention and compliance by mandated legal and agency data handling requirements. Operate hardware software for the Backup and Recovery infrastructure Show more Show less

Posted 1 week ago

Apply

10.0 years

0 Lacs

India

On-site

Linkedin logo

JOB DESCRIPTION We are seeking a Senior Cloud Security Architect with deep expertise in securing cloud infrastructures in AWS and Azure. This role will drive secure cloud adoption, design security architectures, and implement proactive threat detection and risk mitigation strategies. The ideal candidate will be a technical leader with hands-on experience securing complex cloud environments, integrating automation, DevSecOps, and compliance frameworks into scalable cloud security solutions. Key Responsibilities Cloud Security Architecture & Implementation: - Design and implement secure, scalable cloud architectures in AWS and Azure. - Develop security frameworks, policies, and standards. - Architect IAM, RBAC, and CIEM solutions. - Secure cloud-native services (serverless, Kubernetes, containers). - Deploy and secure network security controls (firewalls, VPNs, IPS). Threat Detection & Response: - Manage SIEM, SOAR, and EDR/XDR solutions. - Implement real-time threat detection and automated response. - Analyze network traffic, logs, and security events. - Use threat intelligence platforms and CSPM solutions. DevSecOps & CI/CD Security: - Secure CI/CD pipelines (Jenkins, GitHub Actions, GitLab CI/CD). - Integrate automated security testing (SAST, DAST, SCA). - Implement API security best practices. Offensive Security & Compliance: - Conduct penetration testing and security assessments. - Implement data security controls (encryption, DLP). - Ensure compliance with NIST 800-53, ISO 27001, PCI DSS, HIPAA, GDPR. - Perform risk assessments and develop remediation plans. REQUIRED SKILLS AND EXPERIENCE - 10+ years of security experience, with 4+ years in cloud security architecture and engineering - Expert knowledge of AWS and Azure security architectures, cloud-native services, and security controls - Deep expertise in cloud networking, cryptography, and security protocols (TLS, OAuth, OIDC, Zero Trust, etc.) - Experience with Infrastructure as Code (Terraform, CloudFormation, Bicep) for secure cloud deployments - Proficiency in automation and scripting (Python, PowerShell, Bash) for security orchestration - Strong understanding of Kubernetes security, including Open Policy Agent (OPA), Kyverno, Kubernetes Pod Security Standards (PSS), and service mesh technologies NICE TO HAVE SKILLS AND EXPERIENCE - Cloud Certifications, such as AWS Certified Solutions Architect - Professional, AWS Certified Security - Specialty, Microsoft Certified Azure Solutions Architect Expert, Azure Security Engineer Associate, Google Cloud Architect, CISSP, CCSP, CISM Compensation : $18/hr to $20/hr. Exact compensation may vary based on several factors, including skills, experience, and education. Benefit packages for this role will start on the 31st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law. Show more Show less

Posted 1 week ago

Apply

7.0 - 12.0 years

2 - 7 Lacs

Mumbai

Work from Office

Naukri logo

SUMMARY Our client is IT MNC part of one of the major insurance groups based out of Germany and Europe. The Group is represented in around 30 countries worldwide, with Over 40,000 people worldwide, focusing mainly on Europe and Asia. Our client offers a comprehensive range of insurances, pensions, investments and services by focusing on all cutting edge technologies majorly on Could, Digital, Robotics Automation, IoT, Voice Recognition, Big Data science, advanced mobile solutions and much more to accommodate the customers future needs around the globe thru supporting millions of internal and external customers with state of-the-art IT solutions to everyday problems & dedicated to bringing digital innovations to every aspect of the landscape of insurance. Job Location: Hiranandani Gardens, Powai, Mumbai Mode: Work from Office Requirements Roles & Responsibilities: Define project scope, objectives, and deliverables in collaboration with stakeholders. Develop comprehensive project plans, including timelines, budgets, and resource allocation. Manage and coordinate project teams, including security engineers, analysts, and other technical resources. Track project progress, identify and manage risks and issues, and implement effective mitigation strategies. Ensure adherence to project management methodologies and best practices. Stay up-to-date with the latest cyber security trends and technologies. Skill & Competencies: Strong track record of delivering IT projects in a large, complex environment. (7 years), especially experience in the implementation of financial and regulatory requirements in the CFO context in Group-wide systems and their integration Proven 5+ years experience as a PM Bachelor's degree in Computer Science, Information Technology, or a related field. Proven experience (typically 5+ years) managing IT projects, with a significant focus on cyber security initiatives.

Posted 1 week ago

Apply

6.0 - 10.0 years

0 Lacs

India

Remote

Linkedin logo

Title: Microsoft Security Consultant Sector: IT & Services Consulting Location: Permanent Work From Home (Anywhere in India) Working Hours: Monday to Friday, Eastern Standard Time Zone The impact you will have: As a Professional Services Consultant (MS Security), you will have the opportunity to work alongside one of North America’s most trusted teams of workplace, cloud, and pre-sales professionals to meet with customers, develop a deep understanding of their objectives, and spot new opportunities when possible. In this highly visible customer-facing role, you will impact their business through innovative solutions and support. What you’ll do: Requirement Assessment: Conduct workshops with senior members of customer organizations to drive requirement assessment. Solution Design: Architect comprehensive solutions that integrate Microsoft Sentinel with third-party products, ensuring alignment with business goals. Customization and Integration: Design and implement customizations and integrations to meet specific client needs. Documentation: Collect, analyze, validate, and document business requirements, creating detailed technical specifications for the implementation team. Build and Configuration: Lead the build and configuration of the system, ensuring adherence to the original design and client requirements. Provide expert knowledge and best practices during the Build phase. Testing Support: Provide guidance and support during the testing phase, including functional testing and integration testing. Effective Communication: Effectively communicate complex technical concepts to both technical and non-technical stakeholders using use cases, visual diagrams, and process flow charts. Client Management: Foster strong relationships with client Project teams, acting as a trusted advisor and ensuring high levels of client satisfaction. Mentoring: Mentor and guide team members on advanced modules and solution aspects. What you’ll bring to the table: Bachelor’s degree or equivalent in Computer Science or a related field. 6 to 10 years of experience implementing or supporting enterprise environments (MS Sentinel, Splunk, etc.). Relevant experience as a consultant in a professional services environment. Extensive experience in implementing solutions for medium-to-large enterprise customers. Thorough understanding of business, process, and technology relating to SIEM solutions. Experience with requirement gathering, solution designing, implementing, and configuring SIEM solutions. Demonstrated track record in delivering quality, on-time technology and business solutions to a diverse customer base. Solid interpersonal skills to interface with co-workers and customers, managing specific tasks to completion with minimal direction. Excellent verbal and written communication skills. Show more Show less

Posted 1 week ago

Apply

15.0 - 20.0 years

50 - 55 Lacs

Bengaluru

Work from Office

Naukri logo

Your Impact Youll be responsible for engaging with senior customer representatives including CISO and other C-suite stakeholders to engage on topics around CyberSecurity, adjacent technical areas, and application of technology and programs in the business. Provides trusted support, advice and guidance on the latest trends and developments in CyberSecurity and how these can be used to provide lasting business value and impact for our customers. Applying your wide and deep experience in solving these challenges elsewhere youll help our customers with their journey, articulating Ciscos unique value proposition and architecture for CyberSecurity and how Cisco can help our customers succeed with their CyberSecurity goals. By establishing yourself as a trusted advisor and building lasting relationships, youll help bridge the communications gap between customer needs and what Cisco can offer. Identifies opportunities for Cisco to provide additional products and services that are aligned to achieving the customers CyberSecurity goals. Results and Outcomes Youll proactively strengthen and expand Ciscos presence and technology leadership in the CyberSecurity domain through externally visible activities such as blog posts, social media posts, papers, external speaking engagements and serving on external forums and boards. Youll continually acquire the knowledge and expertise necessary to pioneer new thinking and approaches. Youll contribute new materials and innovative articles rather than solely parroting existing materials or campaigns. Youll have a strongly accretive impact on Ciscos CyberSecurity business as evidenced by pipeline generation and supporting sales of products. Youll actively contribute to talent development, ensuring the principals of improving inclusion and diversity are honoured and promoted. Minimum Qualifications: * Bachelor or Masters degree in a relevant area, an MBA is preferred * CertificationsCISSP, CRISC, CISA and CISMand advantage. * Telco expertise and hands on implementation * 15+ years relevant experience with at least five (5 )years as: a CISO, Head of Risk or equivalent in a major organization; Partner or Associate, Principal, or Managing Director in a big 4+1 company or other leading consulting organization; or a combination thereof. * Proven experience and recognized as a thought leader in CyberSecurity in one or more industry verticals such as Financial Services; Service Provider; Manufacturing, Mining, Transportation, Oil and Gas, or Utilities; or Technology. * A proven record of business leadership in a technical domain and experience in transformational or strategic programs, with evidence of where past contributions have a significant impact on business. * Proven track record of C-suite engagement with an extensive personal contact base. * Published author, conference speaker and social media presence. Preferred Skills * Proven experience and recognized as a thought leader in CyberSecurity in Service Provider is highly desired * Proven experience in delivering security solutions, knowing cisco security solution is a plus.

Posted 1 week ago

Apply

5.0 years

0 Lacs

India

On-site

Linkedin logo

Required Skills & Experience - 5+ years in detection engineering, threat hunting, or security operations. - Deep expertise with CrowdStrike Falcon Endpoint, Next-Gen SIEM, CS IDP, FUSION, and SOAR platforms. - Strong experience with cloud security (AWS, Azure). - Proficiency in CrowdStrike Query Language (FQL/CQL) and scripting (Python, PowerShell). - Proven ability to troubleshoot CrowdStrike sensor issues, agent health, and platform integration. - Familiarity with MITRE ATT&CK, NIST 800-53, and modern detection frameworks. - Expertise in CRBL and/or CRBL-like data optimization tools Nice to Have Skills & Experience - CrowdStrike certifications (e.g., CCFA, CCFH) - Experience with threat intelligence platforms and adversary emulation. - Familiarity with CI/CD pipelines, detection-as-code, and infrastructure-as-code practices. Job Description We are seeking a highly experienced Senior Detection Engineer to lead the development and optimization of advanced threat detection and response capabilities. This role requires deep expertise in CrowdStrike Falcon Endpoint, Next-Gen SIEM, CS Identity Protection (IDP), FUSION, SOAR platforms, and cloud security. The ideal candidate will serve as the subject matter expert (SME) for the entire CrowdStrike ecosystem, including sensor deployment, troubleshooting, automation, and query development. Key Responsibilities - Develop and maintain high-fidelity detection rules using CrowdStrike Falcon, Next-Gen SIEM, and FUSION. - Leverage CS IDP to detect identity-based threats and lateral movement. - Write and optimize queries using CrowdStrike Query Language (FQL/CQL) for threat hunting and detection validation. - Build and tune detections for cloud environments (AWS, Azure, GCP) and integrate with cloud-native logging tools. - Function as the primary SME for CrowdStrike, including Falcon, IDP, FUSION, and related modules. - Troubleshoot and resolve sensor deployment issues, agent health problems, and telemetry gaps. - Serve as the escalation point for CrowdStrike-related errors, automation failures, and detection tuning. - Design and implement automated response playbooks using SOAR platforms to reduce dwell time and automate/streamline triage. - Conduct threat modeling for enterprise systems, cloud platforms, and business-critical applications. Compensation : 30 LPA to 40 LPA Exact compensation may vary based on several factors, including skills, experience, and education. Benefit packages for this role will start on the 31st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law. Show more Show less

Posted 1 week ago

Apply

3.0 years

0 Lacs

Mohali district, India

On-site

Linkedin logo

Job Title: GRC Professional Location: Mohali Experience: 3+ Years Employment Type: Full-Time Job Summary: We are seeking a skilled and proactive GRC Professional to join our team in Mohali. The ideal candidate will play a pivotal role in developing and maintaining the organization’s Governance, Risk, and Compliance (GRC) framework, with a strong emphasis on Business Continuity Management (BCM) and the governance of security tools . This role serves as a bridge between security operations and compliance requirements, ensuring a resilient and well-governed IT environment. Key Responsibilities: GRC & Compliance Governance: Develop, implement, and maintain GRC policies, procedures, and standards aligned with industry best practices (e.g., ISO 27001, NIST) and applicable regulatory frameworks. Conduct regular assessments of internal controls, identify gaps, and recommend improvements. Support internal and external audit processes by preparing documentation and evidence of compliance. Business Continuity Management (BCM): Govern and continuously improve the organization's Business Continuity Management System (BCMS) . Lead efforts in Business Impact Analysis (BIA) , Business Continuity Planning (BCP) , and Disaster Recovery Planning (DRP) . Coordinate testing and review of continuity plans to ensure organizational resilience. Security Tool Governance: Oversee the governance of critical security tools including SIEM, DLP, EDR, IAM, and Firewalls . Define and enforce policies for the effective configuration, deployment, and monitoring of these tools. Establish accountability frameworks for tool ownership, usage, and compliance. Performance Metrics & Reporting: Develop and maintain dashboards and reports to track GRC, BCM, and security tool effectiveness. Present insights and recommendations to senior stakeholders. Cross-Functional Collaboration: Work closely with IT security, infrastructure, and business units to embed GRC practices into daily operations. Ensure security governance is aligned with business and IT strategies. Qualifications: Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related discipline. Minimum of 3 years of hands-on experience in GRC, with strong exposure to BCM and security tool governance . Sound understanding of security frameworks and regulatory requirements. Experience with tools such as SIEM, DLP, IAM, EDR, and firewalls. Strong analytical, documentation, and communication skills. Preferred Skills (Nice to Have): Relevant certifications such as ISO 27001 Lead Implementer/Auditor , CBCP , CISA , or CISSP . Experience in managing third-party risk or vendor assessments. Immediate joiners preferred. Show more Show less

Posted 1 week ago

Apply

10.0 years

0 Lacs

India

On-site

Linkedin logo

Job Description We are seeking a Senior Cloud Security Architect with deep expertise in securing cloud infrastructures in AWS and Azure. This role will drive secure cloud adoption, design security architectures, and implement proactive threat detection and risk mitigation strategies. The ideal candidate will be a technical leader with hands-on experience securing complex cloud environments, integrating automation, DevSecOps, and compliance frameworks into scalable cloud security solutions. Required Skills & Experience - 10+ years of (cybersecurity) security experience, with 4+ years in cloud security architecture and engineering - Expert knowledge of AWS and Azure security architectures, cloud-native services, and security controls like (IAM, Firewalls, and Encryption) - Deep expertise in cloud networking, cryptography, and security protocols (TLS, OAuth, OIDC, Zero Trust, etc.) - Experience with Infrastructure as Code (Terraform, CloudFormation, Bicep) for secure cloud deployments - Proficiency in automation and scripting (Python, PowerShell, Bash) for security orchestration - Strong understanding of Kubernetes security, including Open Policy Agent (OPA), Kyverno, Kubernetes Pod Security Standards (PSS), and service mesh technologies Nice to Have Skills & Experience - Cloud Certifications, such as AWS Certified Solutions Architect - Professional, AWS Certified Security - Specialty, Microsoft Certified Azure Solutions Architect Expert, Azure Security Engineer Associate, Google Cloud Architect, CISSP, CCSP, CISM Key Responsibilities Cloud Security Architecture & Implementation: - Design and implement secure, scalable cloud architectures in AWS and Azure. - Develop security frameworks, policies, and standards. - Architect IAM, RBAC, and CIEM solutions. - Secure cloud-native services (serverless, Kubernetes, containers). - Deploy and secure network security controls (firewalls, VPNs, IPS). Threat Detection & Response: - Manage SIEM, SOAR, and EDR/XDR solutions. - Implement real-time threat detection and automated response. - Analyze network traffic, logs, and security events. - Use threat intelligence platforms and CSPM solutions. DevSecOps & CI/CD Security: - Secure CI/CD pipelines (Jenkins, GitHub Actions, GitLab CI/CD). - Integrate automated security testing (SAST, DAST, SCA). - Implement API security best practices. Offensive Security & Compliance: - Conduct penetration testing and security assessments. - Implement data security controls (encryption, DLP). - Ensure compliance with NIST 800-53, ISO 27001, PCI DSS, HIPAA, GDPR. - Perform risk assessments and develop remediation plans. Compensation : 30 LPA to 40 LPA Exact compensation may vary based on several factors, including skills, experience, and education. Benefit packages for this role will start on the 31st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law. Show more Show less

Posted 1 week ago

Apply

8.0 - 10.0 years

3 - 5 Lacs

Gurugram

Work from Office

Naukri logo

AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. AtAHEAD, we prioritize creating a culture of belonging,where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer,anddo not discriminatebased onan individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, maritalstatus,or any other protected characteristic under applicable law, whether actual or perceived. SOC Analysts at AHEAD monitor customer environments and perform Incident Detection, Validation, and Incident Reporting. SOC Analysts are the frontline of SOC and are customer-facing representatives. SOC Analysts are responsible for triaging events, incidents, and reporting validated incidents to the customer for incident response. Incumbents will possess strong technical and analytical skills while providing accurate analysis of security related problems. They have a well-rounded networking background and are responsible for performing troubleshooting of customer issues. This individual is user focused and works to resolve client needs in a timely manner. These needs may involve resolving hardware/software failures, investigating, and responding to security threats, and making change request to the security policy of company devices. The SOC Analystis expected to monitor security feeds streaming from client servers, network devices, and end user workstations, operate and maintain network security equipmentat client locations. The Analystis expected to be familiar with a wide range of security tools and understand basic security fundamentals. TheAnalystwill perform information security event analysis and must possess knowledge of operating systems, TCP/IP networking, network attacks, attack signatures, defense countermeasures, vulnerability management, and log analysis. Roles & Responsibilities: Monitor and analyze network traffic and alerts Investigate intrusion attempts and perform in-depth analysis of exploits Provide network intrusion detection expertise to support timely and effective decision making of when to declare an incident Conduct proactive threat research Review security events that are populated in a Security Information and Event Management (SIEM) system Tuning of rules, filters, and policies for detection-related security technologies to improve accuracy and visibility Data mining of log sources to uncover and investigate anomalous activity, along with related items of interest Independently follow procedures to contain, analyze, and eradicate malicious activity Document all activities during an incident and provide leadership with status updates during the life cycle of the incident Incident management, response, and reporting Provide information regarding intrusion events, security incidents, and other threat indications and warning information to the client Track trends, statistics, and key figures for each assigned client Assist with the development of processes and procedures to improve incident response times, analysis of incident, and overall SOC functions Reporting Incident reports Security status reports Client-facing security meetings Position : Incident handling/response experience Working knowledge of common operating systems (Windows, Linux, etc.) and basic endpoint security principles Understanding ofanda strong desire to learn common security technologies (IDS, Firewall, SIEM, etc.) The ability to think creatively to find elegant solutions to complex problems Excellent verbal and written communication skills The desire to work both independently and collaboratively with a larger team A willingness to be challenged along with a strong appetite for learning 8-10years of experience in Information Security, Incident Response, etc. (or related field) Hands-on experience with common security technologies (IDS, Firewall, SIEM, etc.) Knowledge of common security analysis tools & techniques Understanding of common security threats, attack vectors, vulnerabilities and exploits Knowledge of regular expressions Education: BachelorsDegree in Computer Science, Information Security or related/equivalent educational or work experience One or more of the following certificationsCISSP, GCIA, Security+, CEH, ACSE

Posted 1 week ago

Apply

7.0 - 15.0 years

16 - 18 Lacs

Bengaluru

Work from Office

Naukri logo

Required Skills Technology | Sentinel SIEM Tool Expert | Level 3 Support Technology | Securonix SIEM Tools Expert | Level 3 Support Technology | ArcSight SIEM Tools Administrator | Level 2 Support Technology | Cybersecurity General Administrator | Level 2 Support Technology | Network Traffic Analysis Administrator | Level 2 Support Education Qualification : Engineer - B.E / B.Tech / MCA Certification Mandatory / Desirable : Technology | CompTIA Security+/Certified SOC Analyst (CSA)/GIAC Security Essentials (GSEC)/Certified Ethical Hacker (CEH)/Cisco Certified CyberOps Associate/GIAC Certified Incident Handler (GCIH)/GIAC Security Operations Certified (GSOC) Delivery Skills required are: - Technical Expertise: - *Expert knowledge of threat detection techniques and tools. *Leading incident response efforts, including advanced techniques for containment, eradication, and recovery. *Conducting in-depth digital forensics investigations. *Expertise in configuring and optimizing SIEM (Security Information and Event Management) systems. Analytical Skills: - *Deep understanding of log analysis techniques and tools. *Identifying patterns and anomalies in large datasets. *Integrating threat intelligence into monitoring and response processes. *Staying updated on the latest threat intelligence and applying it to enhance security. Collaboration and Coordination: - *Working closely with other IT and security teams to ensure comprehensive security coverage. *Leading the coordination of response efforts during major incidents. *Ensuring effective communication and collaboration among all stakeholders. *Coordinating with external partners and vendors for specialized support. Continuous Improvement: - *Continuously evaluating and improving security processes and procedures. *Implementing lessons learned from incidents to enhance the overall security posture. *Contributing to the development and updating of security policies and procedures.

Posted 1 week ago

Apply

Exploring SIEM Jobs in India

The Security Information and Event Management (SIEM) job market in India is thriving, with a growing demand for professionals who can monitor, analyze, and respond to security incidents in real-time. SIEM jobs offer lucrative career opportunities for individuals with a strong understanding of cybersecurity concepts and technologies.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Delhi/NCR
  5. Mumbai

Average Salary Range

The average salary range for SIEM professionals in India varies based on experience level: - Entry-level: INR 4-6 lakhs per annum - Mid-level: INR 8-12 lakhs per annum - Experienced: INR 15-20 lakhs per annum

Career Path

Career progression in the SIEM field typically follows a path from: - SIEM Analyst - SIEM Engineer - SIEM Consultant - SIEM Architect

Related Skills

In addition to SIEM expertise, professionals in this field are often expected to have knowledge of: - Network Security - Incident Response - Threat Intelligence - Security Operations Center (SOC) operations

Interview Questions

  • What is SIEM and how does it work? (basic)
  • Can you explain the difference between IDS and SIEM? (medium)
  • How would you handle a security incident detected by the SIEM tool? (medium)
  • What are some common challenges faced when implementing a SIEM solution? (advanced)
  • How do you stay updated with the latest cybersecurity threats and trends? (basic)
  • Can you describe a successful SIEM deployment project you were involved in? (medium)
  • What are some key performance indicators (KPIs) used to measure the effectiveness of a SIEM system? (advanced)
  • How do you ensure compliance with industry regulations using a SIEM tool? (medium)
  • Explain the concept of correlation rules in SIEM. (medium)
  • How do you handle false positives in a SIEM system? (advanced)
  • Describe a time when you had to troubleshoot a SIEM-related issue. (medium)
  • What are the benefits of integrating threat intelligence feeds with a SIEM tool? (medium)
  • Can you explain the concept of log aggregation in the context of SIEM? (basic)
  • How do you prioritize security alerts generated by a SIEM tool? (medium)
  • What are the key components of a SIEM architecture? (advanced)
  • How would you assess the effectiveness of a SIEM tool in an organization? (medium)
  • What are some best practices for SIEM tuning and optimization? (advanced)
  • How do you handle data retention and storage requirements in a SIEM system? (medium)
  • Explain the role of machine learning in enhancing SIEM capabilities. (advanced)
  • How do you ensure the confidentiality and integrity of SIEM data? (medium)
  • Can you discuss the importance of user behavior analytics in a SIEM environment? (medium)
  • What are the limitations of a SIEM tool and how can they be overcome? (advanced)
  • How do you collaborate with other teams (e.g., IT, compliance) to enhance SIEM operations? (medium)
  • Describe a time when you had to communicate a complex security incident detected by the SIEM to non-technical stakeholders. (medium)

Closing Remark

As you explore SIEM jobs in India, remember to continuously upgrade your skills, stay informed about the latest cybersecurity trends, and practice answering interview questions to showcase your expertise confidently. With the right preparation and dedication, you can excel in the dynamic field of SIEM and carve out a successful career for yourself. Good luck!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies