Home
Jobs

2221 Siem Jobs - Page 20

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

7.0 - 15.0 years

16 - 18 Lacs

Bengaluru

Work from Office

Naukri logo

Required Skills Technology | Sentinel SIEM Tool Expert | Level 3 Support Technology | Securonix SIEM Tools Expert | Level 3 Support Technology | ArcSight SIEM Tools Administrator | Level 2 Support Technology | Cybersecurity General Administrator | Level 2 Support Technology | Network Traffic Analysis Administrator | Level 2 Support Education Qualification : Engineer - B.E / B.Tech / MCA Certification Mandatory / Desirable : Technology | CompTIA Security+/Certified SOC Analyst (CSA)/GIAC Security Essentials (GSEC)/Certified Ethical Hacker (CEH)/Cisco Certified CyberOps Associate/GIAC Certified Incident Handler (GCIH)/GIAC Security Operations Certified (GSOC) Delivery Skills required are: - Technical Expertise: - *Expert knowledge of threat detection techniques and tools. *Leading incident response efforts, including advanced techniques for containment, eradication, and recovery. *Conducting in-depth digital forensics investigations. *Expertise in configuring and optimizing SIEM (Security Information and Event Management) systems. Analytical Skills: - *Deep understanding of log analysis techniques and tools. *Identifying patterns and anomalies in large datasets. *Integrating threat intelligence into monitoring and response processes. *Staying updated on the latest threat intelligence and applying it to enhance security. Collaboration and Coordination: - *Working closely with other IT and security teams to ensure comprehensive security coverage. *Leading the coordination of response efforts during major incidents. *Ensuring effective communication and collaboration among all stakeholders. *Coordinating with external partners and vendors for specialized support. Continuous Improvement: - *Continuously evaluating and improving security processes and procedures. *Implementing lessons learned from incidents to enhance the overall security posture. *Contributing to the development and updating of security policies and procedures.

Posted 1 week ago

Apply

3.0 - 8.0 years

12 - 14 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

Corning Technologies is looking for Network Security Engineer to join our dynamic team and embark on a rewarding career journey. Analyzing customer needs to determine appropriate solutions for complex technical issues Creating technical diagrams, flowcharts, formulas, and other written documentation to support projects Providing guidance to junior engineers on projects within their areas of expertise Conducting research on new technologies and products in order to recommend improvements to current processes Developing designs for new products or systems based on customer specifications Researching existing technologies to determine how they could be applied in new ways to solve problems Reviewing existing products or concepts to ensure compliance with industry standards, regulations, and company policies Preparing proposals for new projects, identifying potential problems, and proposing solutions Estimating costs and scheduling requirements for projects and evaluating results

Posted 1 week ago

Apply

1.0 - 3.0 years

3 - 8 Lacs

Chennai

Work from Office

Naukri logo

Protect enterprise systems and data by monitoring threats, analyzing vulnerabilities, and implementing proactive cybersecurity measures. Job Summary We are hiring a Security Engineer to support SOC operations by identifying threats, mitigating risks, and improving cyber defense mechanisms. The ideal candidate will be passionate about cybersecurity, skilled in threat analysis, and comfortable working in a 24x7 environment. Required Skills Experience in SOC operations with direct client interaction Proficiency in SIEM, threat hunting tools, and familiarity with SOAR platforms Strong understanding of cybersecurity principles, network defense, and the threat landscape Knowledge of scripting languages and exposure to EDR tools Desirable certifications: GCIA, GCFA, CISSP Strong communication, problem-solving, and interpersonal skills Willingness to work in 24x7 rotational shifts Passion for learning and enhancing cyber threat detection

Posted 1 week ago

Apply

12.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Director Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. As a cybersecurity generalist at PwC, you will focus on providing comprehensive security solutions and experience across various domains, maintaining the protection of client systems and data. You will apply a broad understanding of cybersecurity principles and practices to address diverse security challenges effectively. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us. At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: We are seeking a professional to join our Cybersecurity and Privacy services team, where you will have the opportunity to help clients implement effective cybersecurity programs that protect against threats, drive transformation, and foster growth. As companies increasingly adopt digital business models, the generation and sharing of data among organizations, partners, and customers multiply. We play a crucial role in ensuring that our clients are protected by developing transformation strategies focused on security, efficiently integrating and managing new or existing technology systems, and enhancing their cybersecurity investments. As a Director, you will be responsible for overseeing regular operations, driving continuous improvement processes, and managing client and vendor interactions. This role involves managing complex incidents escalated from L2 analysts, operating the Security Incident process, and mentoring junior team members to build a cohesive and motivated unit. Responsibilities Review cybersecurity events analyzed by L2 security analysts, serving as the escalation point for detection, response, and remediation activities. Monitor and guide the team in triaging cybersecurity events, prioritizing, and recommending/performing response measures. Provide technical support for IT teams in response and remediation activities for escalated cybersecurity events/incidents. Follow up on cybersecurity incident tickets until closure. Guide L1 and L2 analysts in analyzing events and response activities. Expedite cyber incident response and remediation activities when delays occur, coordinating with L1 and L2 team members. Review and provide suggestions for information security policies and best practices in client environments. Ensure compliance with SLAs and contractual requirements, maintaining effective communication with stakeholders. Review and share daily, weekly, and monthly dashboard reports with relevant stakeholders. Update and review documents, playbooks, and standard operational procedures. Validate and update client systems and IT infrastructure documentation. Share knowledge on current security threats, attack patterns, and tools with team members. Create and review new use cases based on evolving attack trends. Analyze and interpret Windows, Linux OS, firewall, web proxy, DNS, IDS, and HIPS log events. Develop and maintain threat detection rules, parsers, and use cases. Understand security analytics and flows across SaaS applications and cloud computing tools. Validate use cases through selective testing and logic examination. Maintain continuous improvement processes and build/groom teams over time. Develop thought leadership within the SOC. Mandatory Skill Sets Bachelor’s degree (minimum requirement). 12+years of experience in SOC operations. Experience analyzing malicious traffic and building detections. Experience in application security, network security, and systems security. Knowledge of security testing tools (e.g., BurpSuite, Mimikatz, Cobalt Strike, PowerSploit, Metasploit, Nessus, HP Web Inspect). Proficiency in common programming and scripting languages (Python, PowerShell, Ruby, Perl, Bash, JavaScript, VBScript). Familiarity with cybersecurity frameworks and practices (OWASP, NIST CSF, PCI DSS, NY-DFS). Experience with traditional security operations, event monitoring, and SIEM tools. Knowledge of MITRE or similar frameworks and procedures used by adversaries. Ability to develop and maintain threat detection rules and use cases. Preferred Skill Sets Strong communication skills, both written and oral. Experience with SMB and large enterprise clients. Good understanding of ITIL processes (Change Management, Incident Management, Problem Management). Strong expertise in multiple SIEM tools and other SOC environment devices. Knowledge of firewalls, IDS/IPS, AVI, EDR, Proxy, DNS, email, AD, etc. Understanding of raw log formats of various security devices. Foundational knowledge of networking concepts (TCP/IP, LAN/WAN, Internet network topologies). Relevant certifications (CEH, CISA, CISM, etc.). Strong work ethic and time management skills. Coachability and dedication to consistent improvement. Ability to mentor and encourage junior teammates. Knowledge of regex and parser creation. Ability to deploy SIEM solutions in customer environments. Years Of Experience Required 12 + years Education Qualification B.Tech Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering Degrees/Field Of Study Preferred Certifications (if blank, certifications not specified) Required Skills Accenture Managed Detection and Response (MDR) Ops Security Engineering Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Analytical Thinking, Azure Data Factory, Coaching and Feedback, Communication, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Influence, Innovation, Intellectual Curiosity, Learning Agility, Managed Services, Optimism {+ 20 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date Show more Show less

Posted 1 week ago

Apply

8.0 years

0 Lacs

India

Remote

Linkedin logo

Job Title: Manager – SOAR Administration Department: Information Security Group (ISG) Duration: 6 months Reports To: VP – Head of Cyber Defense Center Location: REMOTE,India Job Purpose The Manager – SOAR Administration is responsible for the end-to-end administration and optimization of Security Orchestration, Automation, and Response (SOAR) solutions within the Cyber Defense Center. This role is critical to enhancing the efficiency and effectiveness of the organization’s security operations through the use of automation and orchestration. The role involves collaborating with the SOC team, integrating security tools, developing automated workflows, and improving incident response capabilities to bolster the overall cyber resilience of the organization. Key Result Areas Lead the implementation, configuration, and administration of SOAR platforms (e.g., Splunk SOAR, Palo Alto Cortex XSOAR, IBM Resilient). Design, build, and optimize automated playbooks for incident detection and response. Ensure orchestration and integration across various security tools (SIEM, threat intelligence platforms, etc.). Drive process automation using scripting languages (Python, PowerShell, Bash). Support the incident response lifecycle and coordinate with the SOC during incidents. Monitor and enhance the SOAR ecosystem to reduce mean time to detect and respond (MTTD/MTTR). Deliver projects related to SOAR optimization and innovation. Key Principles Business Alignment: Ensure SOAR initiatives are aligned with the bank’s strategic security objectives. Accountability: Own SOAR processes, outcomes, and reporting. Maturity Improvement: Continuously drive enhancements to cyber defense posture. Impact-Driven Approach: Focus on tangible results such as reduced response times and risk mitigation. Innovation & Automation: Promote scalable automation strategies and cutting-edge solutions. Continuous Improvement: Regularly review and upgrade SOAR processes and playbooks. Operating Environment & Relationships Collaborate with: Group-level CISOs, Cyber Defense Center staff Regulatory bodies, local and global teams First, Second, and Third Lines of Defense (e.g., DPP, IT, Risk, Audit, Compliance) Ensure alignment with: Cybersecurity standards and frameworks Bank-wide governance and regulatory mandates Problem Solving & Critical Thinking Analyze and resolve complex cybersecurity incidents through automation and orchestration. Develop innovative solutions where standard approaches fall short. Apply strong technical knowledge of security frameworks, protocols, and SOAR integrations. Decision-Making Authority & Responsibility Serve as the subject matter expert (SME) for all SOAR-related initiatives. Validate the adequacy of process controls against internal policies and regulatory requirements. Influence strategic direction for automation in incident response and security operations. Knowledge, Skills & Experience Essential Knowledge & Experience 8+ years in Information Security, including 4–6 years in Security Incident Response using SOAR. Proven hands-on experience with platforms such as Microsoft Sentinel, Splunk SOAR, Cortex XSOAR, or IBM Resilient. Familiar with advanced SOC tools, frameworks (NIST, CERT/CC, ISO 27035), and regulatory requirements. Strong background in the BFSI sector, preferably in a SOC function. In-depth understanding of governance, compliance, risk management, and incident response. Technical Skills & Application Expertise in scripting (Python, PowerShell, Bash) for playbook development. Ability to assess, design, and review SOAR use cases, automation logic, and integrations. Maintain up-to-date knowledge of evolving threat landscapes and defense mechanisms. Demonstrate resilience in enhancing security hygiene and monitoring capabilities. Other Requirements Bachelor’s degree in Computer Science, Information Security, or related discipline. Strong awareness of emerging technologies and evolving threat vectors. Professional certifications such as GCIH, CISSP, CEH are highly preferred. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

About noon noon, the region's leading consumer commerce platform. On December 12th, 2017, noon launched its consumer platform in Saudi Arabia and the UAE, expanding to Egypt in February 2019. The noon ecosystem of services now includes marketplaces for food delivery, quick-commerce, fintech, and fashion. noon is a work in progress; we’re six years in, but only 5% done. noon’s mission: every door, everyday. What we are looking for Noon’s Cybersecurity department, Security operations team is looking for a talented, experienced, and enthusiastic Senior Threat Detection Engineer to help build and scale the Detection & Threat Hunting program at Noon. The ideal candidate will be someone who has diverse security skill-set (IR, TI, SOC..) and specialized in detecting engineering and threat hunting. The focus area for this role will be on designing and implementing advanced detection mechanisms based on known/emerging attacks and pivoting techniques. The Sr. Threat Detection will be working on proactive approaches to advance steps ahead of attackers and help in building detection to identify advanced, current and emerging threats. He will be responsible for the design and implementation of security intelligence and detection capabilities across our applications and networks. This role will be assisting in building the strategy and the team for our Detection and Threat Hunting Program. He will be the focal point for the planning and execution of security investigation, response process and coordination of relevant parties when an information security incident occurs. In addition, documentation, analytical and critical thinking skills, investigation and forensics, and the ability to identify needs and take the initiative are key requirements of this position. About the role Help build and scale the Detection & Threat hunting Program at Noon Drive improvements in detection and response capabilities, and operations for the Internal SOC/TI Write detection signatures, tune security monitoring systems/ tools, develop automation scripts and correlation rules. Work closely with other Security Team members to strengthen our detection and defence mechanisms in regards to, Web applications, Cloud and Network. Exhibit knowledge of attacker lifecycle, TTPs, indicators of compromise (IOCs), and proactively implementing countermeasures to neutralize the threats. Identifies opportunities to enhance the development and implementation of new methods for detecting attacks and malicious activities. Participate as a member of the CSIRT during major incidents and lend contributions to post-Incident review and continuous improvement Proactive threat hunting of anomalies to identify IOCs and derive custom snort signatures for the IOCs Identifying and managing a wide range of intelligence sources to provide a holistic view of the threat landscape. (OSINT aggregation) Work closely with the Red Team and Blue Team to implement custom detection of new and emerging threats, and develop monitoring use cases. Coordinate in red teaming activities such as table-top and adversarial simulation exercises. Responsible for owning all confirmed incidents. This includes publishing Incident Report, documenting Lessons Learnt and updating Knowledge Base. Required Expertise: Required: Senior level experience in a threat intel, detection, IR, or similar cybersecurity roles for medium to large organizations. Required: Technical professional security certifications in Incident Response, Digital Forensics, Offensive Security, or Malware Analysis, such as GCIH, GCFA, GNFA, GCTI, OSCP or similar Bachelor’s degree in Computing, Information Technology, Engineering or a related field, with a strong security component. Hands-on experience in detection engineering, advanced cyber threat intelligence activities, intrusion detection, incident response, and security content development (e.g., signatures, rules, etc.) A broad and diverse security skill-set with an advanced understanding of modern network security technologies (e.g. Firewalls, Intrusion Detection/Prevention Systems, Access Control Lists, Network Segmentation, SIEMs, Auditing/Logging and Identity & Access Management solutions, DDoS protection etc.). Knowledge of at least one common scripting language (Python, Ruby, Go). Experience handling and building a SOAR such as Chronicle’s SOAR, Demisto, Phantom or similar tools. Experience conducting and leading incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Insider Threats .. etc. Understanding of log collection and aggregation techniques, Elastic Search, Logstash, Kibana (ELK), Syslog-NG, Windows Event Forwarding (WEF), etc. Experience with endpoint security agents (Carbon Black, Crowdstrike, etc.). Preferred Qualifications: Hands on experience with Chronicle SIEM/SOAR and Google SecOps Expertise in threat hunting in one or more public cloud solutions such as AWS and GCP Ability to work with a team or independently with minimal direction/leadership Hands-on experience in offensive/defensive web applications security is a big plus for this role. Highly motivated and self-directed with a passion for solving complex problems Establishes industry expertise through writing, speaking or online presence. Who will excel? We’re looking for people with high standards, who understand that hard work matters. You need to be relentlessly resourceful and operate with a deep bias for action. We need people with the courage to be fiercely original. noon is not for everyone; readiness to adapt, pivot, and learn is essential. Show more Show less

Posted 1 week ago

Apply

3.0 - 5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. STS Service Provisioning - Senior Security Analyst Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team help protect the EY brand and build client trust. In Information Security, we combine risk strategy, digital identity, cyber defense, application security, and technology solutions throughout the security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting, and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity The Security Technology Services (STS) group is a division of Information Security that ensures secure access to systems and information for more than 390,000 people in over 150 countries. You will be part of STS DLP Engineering Team specifically to support the Enterprise Data Loss Prevention (DLP) solution. The STS team is responsible for the delivery of DLP Services and the maintenance of the global DLP applications. The team is geographically dispersed and comprises of all disciplines required to deliver Data Security Services for our customers. Your Key Responsibilities The Senior Analyst will be primarily responsible for configuring Data Security Solutions like the enterprise Data Loss Prevention System. The main duties of this role will include helping to translate business requirements to secure data with our technical capabilities, especially overseeing the configuration of the DLP environments in a heterogenous global environment. This role requires strong hands-on experience in leading data security solutions with a strong focus on DLP. It will also participate in Data Access Governance Program development and assist in administering the program. The Senior Analyst will help to supervise and mentor junior analysts on the team. The role will also interface with internal customers, stakeholders and support teams at various levels within the organization including Legal, Data Protection, IT Operations and Engineering. Skills And Attributes For Success Technical knowledge in Data Protection technology (DLP, SIEM, SOAR, Data Access Governance, Networking) Administration of the DLP tools which includes configuring policies, upgrading, and patching, etc Proven effective verbal and written communication skills Ability to independently research and solve technical issues Demonstrated integrity in a professional environment Knowledge of core Information Security concepts related to Governance, Risk & Compliance Excellent teaming skills Ability to work in and adapt to a changing environment Flexibility to adjust to multiple demands, shifting priorities, ambiguity and rapid change Ability to efficiently handle customer concerns and difficult situations with ease and professionalism Essential Functions Of The Job Work with vendors to support the different security technologies Configuration of the Security tools which includes configuring policies, response rules & notifications Work with Monitor & Response team to analyse alerts generating from various systems to tune their configuration Understand and follow the incident response process through event escalations Work with Senior level stakeholders (Risk Management, Compliance & Data Protection) Understand Business requirements and translate into technical controls Ability to work within and alongside diverse, global and virtual teams To qualify for the role you must have Degree in Computer Science, Information Systems, Engineering or a related field. Knowledge of security controls: data classification; data labeling and data loss 3-5 years of experience in one or more of the following: Data Loss Prevention (DLP) Technology support and Event Handling Information Security concepts related to Governance, Risk & Compliance Supporting Information Security Technology English language skills - excellent written and verbal communication Exceptional judgement, tact and decision-making ability Ideally, you’ll also have Demonstrated integrity in a professional environment Ability to work within diverse, global, virtual teams Ability to appropriately balance firm security needs with business impact and benefit What We Look For Good interpersonal, communication and presentation skills Ability to deal with ambiguity and change, and exercise appropriate time management to meet deliverables Prioritization of work items to ensure timelines are achieved Good judgment, tact, and decision-making ability Deep critical thinking skills demonstrating analytical and systematic approach to problem solving Experience working in a global virtual environment Ability to work independently but also within a team environment What We Offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply

1.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

About Us Radware is at the forefront of cloud security innovation, and we're expanding our cloud business with next-generation management and protection solutions. Responsibilities Include Provide security architecture design and guidance for IT and R&D environments, Cloud and On prem. Implement and maintain security infrastructure and tools, for Cloud and on prem environments. Assess and research current and future information security processes and technologies. Develop processes for improving operational security efficiencies, Day-to-day security operations, including monitoring, incident response, Analyze security logs and alerts to identify & respond to security incidents. Conduct regular security assessments and manage the remediations program. Support internal network infrastructure. Work with the IT & R&D teams to address the company security need Ideal Candidates Will Have At least 1 year of experience in Security Architecture, Monitoring or Engineering. Understanding of network architecture, including firewalls, switches and routers. Understanding of security industry standards and best practices. Hands-on experience in Windows based platforms. Hands-on experience with SIEM, XDR and patch management tools. Excellent spoken and written English. A team player with a good interpersonal communication skills. Extra Points For Relevant certifications Experience in cloud security, including Azure and Office 365. Hands on experience Checkpoint and FortiGate Firewalls. Hands on experience in L2 and L3 Corporate networks, VLANS, Routing and ACL’s Primary Location IN-IN-Chennai Work Locations Radware Shield Square India, Chennai Job Information / Cyber Security Show more Show less

Posted 1 week ago

Apply

3.0 - 5.0 years

7 - 12 Lacs

Noida

Work from Office

Naukri logo

We are seeking an experienced Associate skilled in Zscaler Proxy, Firewalls, Data Loss Prevention (DLP), and Endpoint Detection & Response (EDR) solutions. The successful candidate will play a pivotal role in ensuring the security, availability, and performance of our IT infrastructure by implementing both proactive and reactive measures to secure our network and endpoint environments. Key Responsibilities Zscaler Proxy Management Configure, manage, and optimize Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) solutions. Implement and enforce web security policies to ensure compliance with organizational standards. Troubleshoot and resolve Zscaler-related issues to ensure continuous internet and private application access. Conduct periodic health checks and performance tuning of the Zscaler infrastructure. Firewall Administration Manage and configure firewalls to secure internal and external network traffic. Create and maintain firewall rules, Network Address Translation (NAT) configurations, and VPN setups as per business requirements. Monitor and analyze firewall logs to detect and respond to potential security incidents. Regularly review firewall policies to ensure adherence to industry best practices and compliance standards. Endpoint and Data Protection Monitor endpoint activity for suspicious behavior and respond to threats promptly. Provide incident response support and recommend corrective actions for endpoint security incidents. Participate in vulnerability assessments and implement remediation plans. Collaborate with cross-functional teams to ensure seamless integration of security tools. Prepare and maintain technical documentation, configurations, and standard operating procedures. Experience 3-5 years of hands-on experience with Zscaler Proxy, Firewalls, DLP, and EDR solutions in an enterprise environment. Technical Skills: Strong knowledge of Zscaler technologies, including policy configuration, SSL inspection, and application control. Proficiency in managing firewalls, creating security rules, and implementing VPNs. Expertise in deploying and managing EDR tools for threat detection and response. Understanding of network protocols, IP subnetting, and traffic analysis tools. Familiarity with SIEM solutions and their integration with security tools. Strong understanding of security operations and incident management. Knowledge of endpoint security, malware detection, and response. Soft Skills: Strong problem-solving and analytical skills. Excellent verbal and written communication abilities. Capability to work independently and collaboratively in a fast-paced environment. Proactive attitude towards learning and adapting to new technologies. We are looking an experienced Associate skilled in Zscaler Proxy, Firewalls, Data Loss Prevention (DLP), and Endpoint Detection & Response (EDR) solutions. The candidate will play a pivotal role in ensuring the security, availability, and performance of our IT infrastructure by implementing both proactive and reactive measures to secure our network and endpoint environments. Key Responsibilities Zscaler Proxy Management Configure, manage, and optimize Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) solutions. Implement and enforce web security policies to ensure compliance with organizational standards. Troubleshoot and resolve Zscaler-related issues to ensure continuous internet and private application access. Conduct periodic health checks and performance tuning of the Zscaler infrastructure. Firewall Administration Manage and configure firewalls to secure internal and external network traffic. Create and maintain firewall rules, Network Address Translation (NAT) configurations, and VPN setups as per business requirements. Monitor and analyze firewall logs to detect and respond to potential security incidents. Regularly review firewall policies to ensure adherence to industry best practices and compliance standards. Endpoint and Data Protection Monitor endpoint activity for suspicious behavior and respond to threats promptly. Provide incident response support and recommend corrective actions for endpoint security incidents. Participate in vulnerability assessments and implement remediation plans. Collaborate with cross-functional teams to ensure seamless integration of security tools. Prepare and maintain technical documentation, configurations, and standard operating procedures. Experience 3-5 years of hands-on experience with Zscaler Proxy, Firewalls, DLP, and EDR solutions in an enterprise environment. Technical Skills: Strong knowledge of Zscaler technologies, including policy configuration, SSL inspection, and application control. Proficiency in managing firewalls, creating security rules, and implementing VPNs. Expertise in deploying and managing EDR tools for threat detection and response. Understanding of network protocols, IP subnetting, and traffic analysis tools. Familiarity with SIEM solutions and their integration with security tools. Strong understanding of security operations and incident management. Knowledge of endpoint security, malware detection, and response. Soft Skills: Strong problem-solving and analytical skills. Excellent verbal and written communication abilities. Capability to work independently and collaboratively in a fast-paced environment. Proactive attitude towards learning and adapting to new technologies.

Posted 1 week ago

Apply

4.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

About Marvell Marvell’s semiconductor solutions are the essential building blocks of the data infrastructure that connects our world. Across enterprise, cloud and AI, automotive, and carrier architectures, our innovative technology is enabling new possibilities. At Marvell, you can affect the arc of individual lives, lift the trajectory of entire industries, and fuel the transformative potential of tomorrow. For those looking to make their mark on purposeful and enduring innovation, above and beyond fleeting trends, Marvell is a place to thrive, learn, and lead. Your Team, Your Impact Joining Marvell as a CyberSecurity Analyst, you will be an expert at identifying and responding to threats against Marvell data and systems. The SOC is the central nervous system for the cybersecurity organization, a 24x7 service responsible for detection, assessing, and responding to security threats globally. You will be deeply engaged in the day-to-day operations that ensure we effectively detect and respond to evolving cyber threats using leading edge technology and robust processes. What You Can Expect Provide primary triage, analysis and operational support for security events and alerts. Perform correlation using security analytics tools, log aggregators, advanced network malware protection, data indicator mining tools, forensics tools and threat intelligence repositories. Perform real-time incident handling (e.g., intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Participate in analyzing nature of the attack and root cause analysis of an incident. Monitor external data sources proactively to determine which security issues may have an impact on the enterprise. Document and publish techniques, guidance, and reports on incident findings to appropriate constituencies within Marvell. Participate in the improvement tasks such as but not limited to false positive reduction, use case refinement. Effectively communicate both verbal and written updates on alerts and incidents What We're Looking For 4+ years' experience as a SOC Analyst preferably for a >5000 person enterprise. Experience in working with a geographically diverse team in multiple time zones around the globe Strong communication skills and an ability to adapt a message to audiences ranging from technology SMEs to company executives to stakeholders in every business discipline. Deep understanding of MITRE ATT&CK, with demonstrated experience building detection cases and playbooks around the tactics and techniques most relevant to your business. Proficient technical writing skills (documenting processes and procedures). Ability to solve problems and work through ambiguity and uncertainty. Proficiency with one or more DLP platform Experience working extensively with technologies such as IDS/IPS, NGFW, EDR, SIEM, HIDS/HIPS, AV, and Vulnerability Scanners. Expert level and continually expanding understanding of common and emerging security threats and vulnerabilities Self-motivated and proven ability to deliver end-to-end solutions in a high-tech and fast-moving industry. Industry security certifications such as C|EH and relevant GIAC certifications or equivalent highly desirable. Experience with infrastructure operations and processes associated with IT service management in an Enterprise-level organization. Additional Compensation And Benefit Elements With competitive compensation and great benefits, you will enjoy our workstyle within an environment of shared collaboration, transparency, and inclusivity. We’re dedicated to giving our people the tools and resources they need to succeed in doing work that matters, and to grow and develop with us. For additional information on what it’s like to work at Marvell, visit our Careers page. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. Show more Show less

Posted 1 week ago

Apply

2.0 - 3.0 years

3 - 5 Lacs

Mumbai

Work from Office

Naukri logo

Daily Monitoring and Investigation Monitor DLP alerts across email, endpoint, web, and cloud. Perform triage to determine false positives, true positives, and actual incidents. Document findings and escalate critical violations per SOPs. Incident Response Support Support incident response by providing evidence, logs, and context around DLP policy violations. Coordinate with IT, HR, and Legal teams for user engagement, awareness, and disciplinary action if necessary. Participate in Root Cause Analysis (RCA) for recurring or high-severity incidents. Policy Tuning and Optimization Analyse alert trends and false positive patterns to suggest and implement policy refinements. Work with business and security teams to validate policy changes and test updated rulesets before production deployment. Maintain documentation of policy changes, rationales, and approvals. Lifecycle Management Support onboarding business units, or geographies into DLP coverage. Maintain and update DLP dashboards and reporting structures. Stakeholder Communication Provide regular reports to CISO on DLP violations Interface with Data Owners, Business Units, and Compliance teams for policy alignment and exception management.

Posted 1 week ago

Apply

4.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

About Marvell Marvell’s semiconductor solutions are the essential building blocks of the data infrastructure that connects our world. Across enterprise, cloud and AI, automotive, and carrier architectures, our innovative technology is enabling new possibilities. At Marvell, you can affect the arc of individual lives, lift the trajectory of entire industries, and fuel the transformative potential of tomorrow. For those looking to make their mark on purposeful and enduring innovation, above and beyond fleeting trends, Marvell is a place to thrive, learn, and lead. Your Team, Your Impact Joining Marvell as a CyberSecurity Analyst, you will be an expert at identifying and responding to threats against Marvell data and systems. The SOC is the central nervous system for the cybersecurity organization, a 24x7 service responsible for detection, assessing, and responding to security threats globally. You will be deeply engaged in the day-to-day operations that ensure we effectively detect and respond to evolving cyber threats using leading edge technology and robust processes. What You Can Expect Provide primary triage, analysis and operational support for security events and alerts. Perform correlation using security analytics tools, log aggregators, advanced network malware protection, data indicator mining tools, forensics tools and threat intelligence repositories. Perform real-time incident handling (e.g., intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Participate in analyzing nature of the attack and root cause analysis of an incident. Monitor external data sources proactively to determine which security issues may have an impact on the enterprise. Document and publish techniques, guidance, and reports on incident findings to appropriate constituencies within Marvell. Participate in the improvement tasks such as but not limited to false positive reduction, use case refinement. Effectively communicate both verbal and written updates on alerts and incidents What We're Looking For 4+ years' experience as a SOC Analyst preferably for a >5000 person enterprise. Experience in working with a geographically diverse team in multiple time zones around the globe Strong communication skills and an ability to adapt a message to audiences ranging from technology SMEs to company executives to stakeholders in every business discipline. Deep understanding of MITRE ATT&CK, with demonstrated experience building detection cases and playbooks around the tactics and techniques most relevant to your business. Proficient technical writing skills (documenting processes and procedures). Ability to solve problems and work through ambiguity and uncertainty. Proficiency with one or more DLP platform Experience working extensively with technologies such as IDS/IPS, NGFW, EDR, SIEM, HIDS/HIPS, AV, and Vulnerability Scanners. Expert level and continually expanding understanding of common and emerging security threats and vulnerabilities Self-motivated and proven ability to deliver end-to-end solutions in a high-tech and fast-moving industry. Industry security certifications such as C|EH and relevant GIAC certifications or equivalent highly desirable. Experience with infrastructure operations and processes associated with IT service management in an Enterprise-level organization. Additional Compensation And Benefit Elements With competitive compensation and great benefits, you will enjoy our workstyle within an environment of shared collaboration, transparency, and inclusivity. We’re dedicated to giving our people the tools and resources they need to succeed in doing work that matters, and to grow and develop with us. For additional information on what it’s like to work at Marvell, visit our Careers page. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Trivandrum, Kerala, India

Remote

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Remote Access Product Engineer EY Technology: Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 350,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day. Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients. Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization. EY Technology supports our technology needs through three business units: Client Technology (CT) - focuses on developing new technology services for our clients. It enables EY to identify new technology-based opportunities faster and pursue those opportunities more rapidly. Enterprise Technology (ET) – ET supports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services. ET will also support our internal technology needs by focusing on a better user experience. Information Security (Info Sec) - Info Sec prevents, detects, responds and mitigates cyber-risk, protecting EY and client data, and our information management systems. The opportunity This exciting role is inside the Remote Access Product team, part of the ESPM, Network Product team in Enterprise Technology. In the role of a Remote Access Product Engineer, you'll be responsible for the design, engineering, documentation and release of Remote Access Products and technology components. This will include ensuring key technologies associated with remote access technology and controls across all aspects of the EY environment are suitably designed and modified to enable the production release of Remote Access Product initiatives. Additionally, you will provide consulting services to other teams, as well as acting as a level four escalation for the Operations teams for complex issues. Your Key Responsibilities Your role is essential to the success of the team’s products, you will be providing consultative engagement in the most complex problem management activities, thus helping to drive client satisfaction, demonstrated using various KPIs and metrics. You’ll be responsible for Solution Design and Engineering in conjunction with our Managed Service Provider [MSP], Solution Certification, Documentation and Operational Escalation support. In the Solution Design aspect, you will create designs based on industry best practices, solid engineering principles while clearly ensuring fit for purpose localization. As part of solution certification, you will ensure appropriate software versions have been selected, reviewed and appropriately tested. Deployment planning and management allowing the technology estate to be updated by deploying certified code and configurations globally. In the Service Documentation aspect, you will develop and maintain documentation for configuration guidelines and templates. Document new services as built for handover to the Operations team and provide consultancy on service operationalisation. Skills And Attributes For Success Create designs based on industry best practices, sound solid engineering principles incorporating both local and global requirements while clearly understanding that one size does not fit all Advanced skills in planning, designing and troubleshooting complex security environments including delivering projects within scope and budget Able to make technical decisions in support of Architecture, Strategy, Service Management and Operations functions within the project and escalated troubleshooting contexts Demonstrated experience in dealing with external vendors and suppliers in the network industry Excellent knowledge of remote access technology, environments, management and monitoring tools associated with EY security systems To qualify for the role, you must have You must be a Self-starter who can operate without direct supervision on multiple complex projects and tasks in parallel Present complex and difficult messages skilfully, using a variety of media and methods. Produce writing that contains clear, precise descriptive language. Experience with infrastructure implementation/management, service/operations management, etc. Maintains awareness of related new and emerging technologies. Knowledge of Windows and Mac Operating systems specifically around networking. SIEM reporting and data mining capability. Intermediate scripting knowledge, preferably Python and bash (Linux), PowerShell (Windows) Technology requirements. Zscaler Cloud Security technologies SonicWall VPN technologies SD-WAN awareness preferably Versa Wider cloud technologies, SAML Integrations, Azure AD Firewall (Check Point/Palo Alto/Fortinet) In depth understanding of networking concepts, including IoT, IPv4 and IPv6 and how to deploy and configure in the security product set. Ideally, you’ll also have Bachelor's degree in a technical discipline such as Engineering or Computer Science or a related discipline, plus an industry accreditation or equivalent work experience Demonstrable experience in various aspects of Security technology infrastructure design and implementation. Security related Professional qualifications Service management qualifications [ITIL Foundation] What We Look For We look for inclusive, proactive, high achieving team players who show a passion for the technology and services that it delivers. We are a small team, in diverse locations providing a service at global scale. This will necessitate an individual who is flexible in their working patterns with a strong work ethic to do the right thing at the right time – even if that is late evening or at weekends. What Working At EY Offers We offer a competitive remuneration package where you’ll be rewarded for your individual and team performance. Our comprehensive Total Rewards package includes support for flexible working and career development, and with FlexEY you can select benefits that suit your needs, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY is committed to being an inclusive employer and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply

3.0 - 6.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Job Track Description: Performs tasks based on established procedures. Uses data organizing and coordination skills to perform business support or technical work. Requires vocational training, certifications, licensures, or equivalent experience. General Profile Requires limited prior training or licenses and training certifications. Has basic operational or analytical skills to perform tasks. Works within clearly defined standard operating procedures and adheres to quality guidelines. Work is completed with close supervision and under clearly defined procedures. Functional Knowledge Requires a basic understanding of theories, practices, and procedures. Business Expertise Understanding of how best teams integrate and work together to achieve company goals. Impact Responsible for the accuracy of work. Receives close supervision and duties are clearly defined. Methods and tasks are described in detail. Leadership Has no supervisory responsibilities. Problem Solving Uses existing procedures to solve standard problems. Has limited opportunity to exercise discretion. Interpersonal Skills Exchanges information and ideas effectively. Responsibility Statements Performs first level Sourcing process such as requisition and purchase order creation, following client standard operating instructions. Ability to review and analyze input data for completeness. Requests additional information if required. Achieves productivity and quality targets set for the project. Performs any other first-level tasks assigned. Performs other duties as assigned. Complies with all policies and standards.

Posted 1 week ago

Apply

3.0 - 6.0 years

4 - 8 Lacs

Kochi

Work from Office

Naukri logo

Job Track Description: Performs tasks based on established procedures. Uses data organizing and coordination skills to perform business support or technical work. Requires vocational training, certifications, licensures, or equivalent experience. General Profile Requires limited prior training or licenses and training certifications. Has basic operational or analytical skills to perform tasks. Works within clearly defined standard operating procedures and adheres to quality guidelines. Work is completed with close supervision and under clearly defined procedures. Functional Knowledge Requires a basic understanding of theories, practices, and procedures. Business Expertise Understanding of how best teams integrate and work together to achieve company goals. Impact Responsible for the accuracy of work. Receives close supervision and duties are clearly defined. Methods and tasks are described in detail. Leadership Has no supervisory responsibilities. Problem Solving Uses existing procedures to solve standard problems. Has limited opportunity to exercise discretion. Interpersonal Skills Exchanges information and ideas effectively. Responsibility Statements Performs first level Sourcing process such as requisition and purchase order creation, following client standard operating instructions. Ability to review and analyze input data for completeness. Requests additional information if required. Achieves productivity and quality targets set for the project. Performs any other first-level tasks assigned. Performs other duties as assigned. Complies with all policies and standards.

Posted 1 week ago

Apply

4.0 - 7.0 years

6 - 10 Lacs

Kochi

Work from Office

Naukri logo

Job Track Description: Performs tasks based on established procedures. Uses data organizing and coordination skills to perform business support or technical work. Requires vocational training, certifications, licensures, or equivalent experience. General Profile Has advanced, specialized expertise within a range of analytical or operational processes. Completes assignments and facilitates the work of others. May coordinate assignments beyond work area. Proposes improvements to processes and methods. Acts as a lead, coordinating the work of others, but is not a supervisor. Works autonomously within established procedures. Functional Knowledge Has developed skills in a range of processes, procedures, and systems. Acts as a technical expert in some areas. Business Expertise Understanding of how best teams integrate and work together to achieve company goals. Impact Impacts a team, by example, through the quality service and information provided. Suggests enhancements to work procedures and practices to improve efficiency. Leadership Serves as a team lead. May allocate work to team members. Provides subject matter guidance to junior team members. Problem Solving Provides solutions to atypical problems with little or no precedent. Interpersonal Skills Exchanges information and ideas effectively. Uses tact and diplomacy when dealing with others. Responsibility Statements Supports emergency procurement processes as needed by the client. Monitors open requisitions, expedite, and closeout before turnaround. Works with stakeholders to ensure proper recommendation and documentation is received for the procurement process. Assists Team Leaders in extracting data for dashboard on process and reconciliation metrics. Provides supporting records and documentation to assist with audits. Ensures that adequate and updated process documentation and desktop procedures exist and are utilized. Contributes towards quality efforts and guides the quality verifiers team. Participates in first-level tasks and quality check tasks. Performs other duties as assigned. Complies with all policies and standards.

Posted 1 week ago

Apply

7.0 - 11.0 years

13 - 18 Lacs

Kochi

Work from Office

Naukri logo

Job Track Description Requires formal education and relevant expertise in a professional, sales, or technical area. Performs technical-based activities. Contributes to and manages projects. Uses deductive reasoning to solve problems and make recommendations. Interfaces with and influences key stakeholders. Leverages previous knowledge and expertise to achieve results. Ability to complete work self-guided. College or university degree required. General Profile Requires knowledge and experience in field. Uses best practices and knowledge of business to improve products or services. Solves complex problems and takes a new perspective on existing procedures. Self-starter, requiring minimal guidance. Acts as a resource for colleagues with less experience. Functional Knowledge Requires conceptual expertise of theories, practices, and procedures. Business Expertise Has knowledge of best practices and team integration. Aware of the competition and what differentiates them. Impact Impacts a range of customer, operational, project or service activities. Works within broad guidelines and policies. Leadership Acts as a resource for colleagues with less experience. May guide small projects with manageable risks and resource requirements. Problem Solving Solves complex problems. Takes a new perspective on existing solutions. Exercises judgment based on the review of multiple information sources. reviewing many sources of information. Skills Clearly articulates difficult or sensitive information. Works to build consensus within a team. Responsibility Statements Supports the development of strategies for new client offerings. Ensures the effective use and application of resources. Assesses customer requirements and assists with the development of solutions. Reviews service and operating procedures to ensure compliance with industry standards and regulations. Works closely with the solutions team and sales, practice, and delivery leaders to develop the solution strategy and approach. Developing proficiency in market trends, best practices, and innovation. Performs other duties as assigned. Complies with all policies and standards.

Posted 1 week ago

Apply

5.0 - 8.0 years

25 - 30 Lacs

Mumbai, Mumbai Suburban, Mumbai (All Areas)

Work from Office

Naukri logo

- Design, develop & maintain playbooks within Cortex XSOAR - Integrate security tools & threat intelligence sources with XSOAR - Implement & manage security alerts using XSIAM, SIEM & SOAR platforms - Fine-tune & optimize securty automation processes Required Candidate profile Exp. : 6+ yrs CTC : Upto 30 Lacs Location : Remote WFH (1 Opening) / Central Mumbai WFO (2 Open) Comm. Skills - Excellent Strong in Cortex XSOAR along with automation and XSIAM, SOAR, and SIEM tools.

Posted 1 week ago

Apply

2.0 - 7.0 years

15 - 20 Lacs

Hyderabad

Work from Office

Naukri logo

Job Area: Engineering Group, Engineering Group > Software Engineering General Summary: Key responsibilities : Working as part of multi-skilled IOT platform team working across different tech areas on various Linux based operating systems. Contributing to end-to-end software execution of Qualcomm SoC based IOT products. Work closely with Product Marketng team to understand new platforms, and requirements, Evaluate feature requirements, come up with resource planning, lead a small team on engineers with varied skills Feature development for Android and Linux/Ubuntu based Snapdragon products. Support platform bringups across various SoCs, co-ordianate with cross functional teams on identifying and fix the issues Work with customer engineering team to support customer esclated issues which are platform specific Ensuring that the product deliverables are made on-time, and are competitive with respect to functionality, stability and performance. Working closely with geographically distributed core & execution teams spread across time-zones. : Bachelors/Masters degree in Engineering, Information Systems, Computer Science, or related field. Strong development experience with C/C++ and good programming skills. Experience scoping new requirements, working with cross functional teams, assigning works and managing teams Strong communication skills and analytics skills Strong hands-on experience on Android and/or Ubuntu and understanding of Linux related concepts like systemd, SELinux, Snaps, Sandboxing, Container, Docker, etc. Strong understanding of Linux kernel and internals. Strong understanding of SOC systems and related concepts, including bring-up. Good know-how of Multimedia subsystems like Camera, Video, Audio, Display and Graphics. Strong hands-on experience with troubleshooting software and system issues. Strong hands-on experience with full software development life cycle including design, implementation, deployment and support. Strong aptitude, quick learner, self-motivated, willing to explore and work across breadth of various technology areas. Deductive problem solving, good verbal and written communication skills for collaboration across teams. Minimum Qualifications: Bachelor's degree in Engineering, Information Systems, Computer Science, or related field and 2+ years of Software Engineering or related work experience. OR Master's degree in Engineering, Information Systems, Computer Science, or related field and 1+ year of Software Engineering or related work experience. OR PhD in Engineering, Information Systems, Computer Science, or related field. 2+ years of academic or work experience with Programming Language such as C, C++, Java, Python, etc.

Posted 1 week ago

Apply

10.0 - 15.0 years

20 - 25 Lacs

Bengaluru

Work from Office

Naukri logo

Job Area: Engineering Group, Engineering Group > Systems Engineering General Summary: In this position you will join the team responsible for the security architecture of Qualcomm Snapdragon processors. The team works at a system level spanning across hardware, software and infrastructure while striving for industry-leading solutions. This team interacts with product management, customers (e.g., OEMs), partners, HW/SW engineering, and Services engineering teams to find the optimal Security solution. Snapdragon processors are utilized in a variety of devices, including mobile phones, laptops, automotive systems, and data centers, each with distinct security needs. These processors are engineered to address most of these requirements, encompassing a wide range of security technologies found in consumer electronics, such as Root of Trust, Integrated Secure Element, Virtualization, and Confidential Compute. Minimum Qualifications 10+ years industry experience in SoC Security encompassing both architecture and design 5+ years industry experience in Compute and/or Data Centre SoC Architecture Demonstrated expertise in Security Technologies (Root of Trust, TEE, Access Control, I/O Security) Proficient in Confidential Compute Architecture (RME, TDX, SEV-SNP, TDISP) Strong understanding of Security Software Architecture for Compute and Data Centers, with a focus on Secure Boot. Skilled in HW/SW threat analysis Strong capabilities in creating and presenting architecture-level documentation. Preferred Qualifications Proficient in isolation-related extensions, including TrustZone, Virtualization, and RME. Extensive knowledge of Server Platform security architecture covering lifecycle/debug management, provisioning, attestation/measurement. Expertise in Applied Cryptography and Protocols. Knowledgeable about Security Certification Processes and (such as OCP) Excellent communication and teamwork skills. Leadership and management experience at the project level Key Responsibilities Establish system security requirements (both hardware and software) for Server SoC focusing on functionality, performance, and security levels. Specify and review the architecture and implementation of System/SoC level security mechanisms. Conduct platform security threat analysis. Perform competitive analysis of security systems and features Explore future and roadmap server security-related technologies. Serve as the technical interface to product management and standards teams. Minimum Qualifications: Bachelors degree in engineering, Computer Science, or related field and 8+ years of Security Engineering or related work experience. ORMasters degree in engineering, Computer Science, or related field and 7+ years of Security Engineering or related work experience.ORPhD in Engineering, Computer Science, or related field and 6+ years of Security Engineering or related work experience. Note References to a particular number of years experience are for indicative purposes only. Applications from candidates with equivalent experience will be considered, provided that the candidate can demonstrate an ability to fulfill the principal duties of the role and possesses the required competencies. Minimum Qualifications: Bachelor's degree in Engineering, Information Systems, Computer Science, or related field and 4+ years of Systems Engineering or related work experience. OR Master's degree in Engineering, Information Systems, Computer Science, or related field and 3+ years of Systems Engineering or related work experience. OR PhD in Engineering, Information Systems, Computer Science, or related field and 2+ years of Systems Engineering or related work experience.

Posted 1 week ago

Apply

5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Job Title: L3 SOAR Administrator – ArcSight SOAR Expert Location: Gurgaon Experience: 5+ years (Minimum 2+ years in SOAR administration) Position Type: Full-Time Department: Cybersecurity / Security Operations Centre (SOC) Budget: 18-20 LPA Role Overview: We are seeking an experienced and skilled L3 SOAR Administrator with hands-on expertise in ArcSight SOAR to lead the administration and enhancement of our SOAR platform. The candidate will be responsible for ensuring platform stability, developing advanced playbooks, integrating threat intelligence feeds, and enabling seamless automation across SOC tools and processes. Key Responsibilities: SOAR Platform Administration: Manage and maintain the ArcSight SOAR platform, ensuring high availability and performance. Oversee upgrades, patching, and system optimization. Playbook Creation & Management: Design, develop, and maintain complex automated playbooks for incident response and security operations. Optimize existing playbooks based on evolving threat scenarios and feedback from L1/L2 teams. Automation Development: Develop automation scripts and workflows to enhance SOC efficiency. Utilize Python, REST APIs, and built-in SOAR capabilities to build scalable automations. Integration Management: Integrate ArcSight SOAR with various security technologies including SIEMs, EDRs, firewalls, threat intel platforms, ticketing systems, and email gateways. Ensure seamless bi-directional communication across platforms. Threat Intelligence Integration: Configure and maintain ingestion of external and internal threat intelligence feeds into SOAR. Automate enrichment and correlation of indicators of compromise (IOCs). Required Skills & Qualifications: Minimum 5-8 years of experience in a security operations center (SOC) or incident response role.. Proven expertise in ArcSight SOAR (formerly Micro Focus SOAR). Strong knowledge of security operations processes , incident response lifecycle, and threat hunting techniques. Good understanding of SIEM (ArcSight, Splunk, etc.), EDR (CrowdStrike, SentinelOne), and other security tools. Familiarity with MITRE ATT&CK framework and threat intel feeds. Good written & verbal communication & presentation skills Bachelor’s degree in computer science, Information Security, or related field (or equivalent work experience). Intermediate to advanced certifications such as GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), or equivalent preferred. Strong leadership and communication skills. Regards Kirti Rustagi hr1@raspl.com Show more Show less

Posted 1 week ago

Apply

4.0 - 9.0 years

0 - 3 Lacs

Chennai

Hybrid

Naukri logo

Qualification Bachelors degree in Cybersecurity, Information Security, Computer Science, or a related field, or equivalent work experience. Strong experience with SIEM (e.g., Splunk, QRadar, ArcSight). Proficient in EDR and Endpoint Security tools (e.g., CrowdStrike, Microsoft Defender). Hands-on experience in threat and malware analysis . Familiarity with email security systems (e.g., Proofpoint, Mimecast). Strong understanding of network protocols, firewalls, and intrusion detection/prevention systems. Knowledge of security frameworks and industry standards (e.g., MITRE ATT&CK, NIST). Excellent analytical and problem-solving skills.

Posted 1 week ago

Apply

10.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Job Summary: We're looking for a seasoned Product Management leader to spearhead our Cloud Security product portfolio, defining and executing product strategies that protect our customers' cloud infrastructure, data, and applications from emerging threats. You'll lead the product vision, strategy, and roadmap for our UTM, CWPP, CNAPP, and CSPM offerings, leveraging your deep understanding of cloud security technologies and market dynamics. Key Responsibilities: * Develop and execute product strategy for cloud security solutions, aligning with organization goals and customer needs. * Simplify adoption of cloud security products by developing intuitive onboarding processes, streamlined workflows, and user-centric features. * Collaborate with cross-functional teams to define product roadmaps, features, and requirements. * Lead product roadmap development, aligned with market needs and technology trends. * Conduct Build/Buy/Partner evaluations to determine optimal product offering strategies. * Drive innovation in cloud security products, ensuring seamless integration across the security stack and our existing cloud products * Build market leadership in cloud security technologies (UTM, CWPP, CNAPP, CSPM, IAM, SIEM, WAF/WAAP, NGFW, VAPT, etc.). * Own product P&L, drive revenue growth, develop pricing strategies and win against competition * Create go-to-market strategies for new features and products * Support complex technical sales cycles Required Qualifications: * Bachelor s degree in computer science, Engineering, or related field from a premier institute * 10+ years of experience in product management, with at least 5 years in security products * Deep understanding of enterprise security technologies, architecture, and cloud-native security solutions * Experience in at least one major cloud platform (AWS, Azure, GCP, or OCI) * Proven ability to lead cross-functional teams & Strong stakeholder management capabilities Desired Skills & Expertise: * Experience & ability to articulate technical solutions and product differentiators in RFP context * MBA or relevant advanced degree preferred (from premier institutes like IIMs, ISB, or equivalent) * Security certifications (CISSP, CCSP, etc.) are a plus Show more Show less

Posted 1 week ago

Apply

10.0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Linkedin logo

Description This position is responsible for the leadership of the India Information Security (IS) department as part of the Global Information Security Directorate. Areas of responsibility will include coordination with the other IS Departments to ensure standard enforcement of security polices and controls, interfacing with local India IT teams and business leaders, and mitigating risks to the organization's information assets. Responsibilities Manage India Information Security team’s day to day operations. Support the global Security Operations (SecOps) department to safeguard digital assets by assisting with detecting, investigating, and resolving cybersecurity threats Assist the global Governance, Risk & Compliance (GRC) department with enforcing cybersecurity policies, overseeing cybersecurity risk, facilitating cybersecurity compliance audits, and conducting cybersecurity awareness training. Assist the global Cybersecurity Infrastructure and Design (CID) department with management and maintenance of the cybersecurity systems, platforms, and controls. Implement Secure Software Development Lifecycle (SSDLC) in India office by enforcing the compliance of global policies, processes, procedures and principles. Qualifications Bachelor’s degree in Cyber/Information Security or Information Technology, Computer Science, Computer Engineering Professional certifications such as CISSP, CISM, or equivalent multi-domain cybersecurity focused certification. At least 10 years of experience in IT security management, with a proven track record of managing teams in global matrix environment Experience with security technologies: EDR, SIEM, SOAR, CASM, CASB, CSPM, IAM, PAM Excellent communication and interpersonal skills to effectively engage internal stakeholders. Demonstrated ability to analyze complex security issues, devise solutions, and enforce established security controls. Strong leadership skills to drive standardization of processes, procedures, and principles. Job Engineering Primary Location India-Maharashtra-Mumbai Schedule: Full-time Travel: No Req ID: 251101 Job Hire Type Experienced Not Applicable #BMI N/A Show more Show less

Posted 1 week ago

Apply

12.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Director Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. As a cybersecurity generalist at PwC, you will focus on providing comprehensive security solutions and experience across various domains, maintaining the protection of client systems and data. You will apply a broad understanding of cybersecurity principles and practices to address diverse security challenges effectively. *Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: We are seeking a professional to join our Cybersecurity and Privacy services team, where you will have the opportunity to help clients implement effective cybersecurity programs that protect against threats, drive transformation, and foster growth. As companies increasingly adopt digital business models, the generation and sharing of data among organizations, partners, and customers multiply. We play a crucial role in ensuring that our clients are protected by developing transformation strategies focused on security, efficiently integrating and managing new or existing technology systems, and enhancing their cybersecurity investments. As a Director, you will be responsible for overseeing regular operations, driving continuous improvement processes, and managing client and vendor interactions. This role involves managing complex incidents escalated from L2 analysts, operating the Security Incident process, and mentoring junior team members to build a cohesive and motivated unit. Responsibilities: Review cybersecurity events analyzed by L2 security analysts, serving as the escalation point for detection, response, and remediation activities. Monitor and guide the team in triaging cybersecurity events, prioritizing, and recommending/performing response measures. Provide technical support for IT teams in response and remediation activities for escalated cybersecurity events/incidents. Follow up on cybersecurity incident tickets until closure. Guide L1 and L2 analysts in analyzing events and response activities. Expedite cyber incident response and remediation activities when delays occur, coordinating with L1 and L2 team members. Review and provide suggestions for information security policies and best practices in client environments. Ensure compliance with SLAs and contractual requirements, maintaining effective communication with stakeholders. Review and share daily, weekly, and monthly dashboard reports with relevant stakeholders. Update and review documents, playbooks, and standard operational procedures. Validate and update client systems and IT infrastructure documentation. Share knowledge on current security threats, attack patterns, and tools with team members. Create and review new use cases based on evolving attack trends. Analyze and interpret Windows, Linux OS, firewall, web proxy, DNS, IDS, and HIPS log events. Develop and maintain threat detection rules, parsers, and use cases. Understand security analytics and flows across SaaS applications and cloud computing tools. Validate use cases through selective testing and logic examination. Maintain continuous improvement processes and build/groom teams over time. Develop thought leadership within the SOC. Mandatory skill sets: Bachelor’s degree (minimum requirement). 12+years of experience in SOC operations. Experience analyzing malicious traffic and building detections. Experience in application security, network security, and systems security. Knowledge of security testing tools (e.g., BurpSuite, Mimikatz, Cobalt Strike, PowerSploit, Metasploit, Nessus, HP Web Inspect). Proficiency in common programming and scripting languages (Python, PowerShell, Ruby, Perl, Bash, JavaScript, VBScript). Familiarity with cybersecurity frameworks and practices (OWASP, NIST CSF, PCI DSS, NY-DFS). Experience with traditional security operations, event monitoring, and SIEM tools. Knowledge of MITRE or similar frameworks and procedures used by adversaries. Ability to develop and maintain threat detection rules and use cases. Preferred skill sets: Strong communication skills, both written and oral. Experience with SMB and large enterprise clients. Good understanding of ITIL processes (Change Management, Incident Management, Problem Management). Strong expertise in multiple SIEM tools and other SOC environment devices. Knowledge of firewalls, IDS/IPS, AVI, EDR, Proxy, DNS, email, AD, etc. Understanding of raw log formats of various security devices. Foundational knowledge of networking concepts (TCP/IP, LAN/WAN, Internet network topologies). Relevant certifications (CEH, CISA, CISM, etc.). Strong work ethic and time management skills. Coachability and dedication to consistent improvement. Ability to mentor and encourage junior teammates. Knowledge of regex and parser creation. Ability to deploy SIEM solutions in customer environments. Years of experience required: 12 + years Education qualification: B.Tech Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills Accenture Managed Detection and Response (MDR) Ops Security Engineering Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Analytical Thinking, Azure Data Factory, Coaching and Feedback, Communication, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Influence, Innovation, Intellectual Curiosity, Learning Agility, Managed Services, Optimism {+ 20 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date Show more Show less

Posted 1 week ago

Apply

Exploring SIEM Jobs in India

The Security Information and Event Management (SIEM) job market in India is thriving, with a growing demand for professionals who can monitor, analyze, and respond to security incidents in real-time. SIEM jobs offer lucrative career opportunities for individuals with a strong understanding of cybersecurity concepts and technologies.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Delhi/NCR
  5. Mumbai

Average Salary Range

The average salary range for SIEM professionals in India varies based on experience level: - Entry-level: INR 4-6 lakhs per annum - Mid-level: INR 8-12 lakhs per annum - Experienced: INR 15-20 lakhs per annum

Career Path

Career progression in the SIEM field typically follows a path from: - SIEM Analyst - SIEM Engineer - SIEM Consultant - SIEM Architect

Related Skills

In addition to SIEM expertise, professionals in this field are often expected to have knowledge of: - Network Security - Incident Response - Threat Intelligence - Security Operations Center (SOC) operations

Interview Questions

  • What is SIEM and how does it work? (basic)
  • Can you explain the difference between IDS and SIEM? (medium)
  • How would you handle a security incident detected by the SIEM tool? (medium)
  • What are some common challenges faced when implementing a SIEM solution? (advanced)
  • How do you stay updated with the latest cybersecurity threats and trends? (basic)
  • Can you describe a successful SIEM deployment project you were involved in? (medium)
  • What are some key performance indicators (KPIs) used to measure the effectiveness of a SIEM system? (advanced)
  • How do you ensure compliance with industry regulations using a SIEM tool? (medium)
  • Explain the concept of correlation rules in SIEM. (medium)
  • How do you handle false positives in a SIEM system? (advanced)
  • Describe a time when you had to troubleshoot a SIEM-related issue. (medium)
  • What are the benefits of integrating threat intelligence feeds with a SIEM tool? (medium)
  • Can you explain the concept of log aggregation in the context of SIEM? (basic)
  • How do you prioritize security alerts generated by a SIEM tool? (medium)
  • What are the key components of a SIEM architecture? (advanced)
  • How would you assess the effectiveness of a SIEM tool in an organization? (medium)
  • What are some best practices for SIEM tuning and optimization? (advanced)
  • How do you handle data retention and storage requirements in a SIEM system? (medium)
  • Explain the role of machine learning in enhancing SIEM capabilities. (advanced)
  • How do you ensure the confidentiality and integrity of SIEM data? (medium)
  • Can you discuss the importance of user behavior analytics in a SIEM environment? (medium)
  • What are the limitations of a SIEM tool and how can they be overcome? (advanced)
  • How do you collaborate with other teams (e.g., IT, compliance) to enhance SIEM operations? (medium)
  • Describe a time when you had to communicate a complex security incident detected by the SIEM to non-technical stakeholders. (medium)

Closing Remark

As you explore SIEM jobs in India, remember to continuously upgrade your skills, stay informed about the latest cybersecurity trends, and practice answering interview questions to showcase your expertise confidently. With the right preparation and dedication, you can excel in the dynamic field of SIEM and carve out a successful career for yourself. Good luck!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies