Home
Jobs

2220 Siem Jobs - Page 21

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 years

0 Lacs

India

Remote

Linkedin logo

Acronis is a world leader in cyber protection—empowering people with cutting-edge technology that enables them to monitor, control, and protect the data that their businesses and lives depend on. We are looking for a Senior Product Manager who is ready to join our mission in creating a #CyberFit future! Our Cybersecurity Product Team is seeking an energetic, growth-oriented Senior Product Manager for Acronis RMM (Remote Monitoring and Management),a solution encompassing endpoint management, network monitoring, M365 security posture, SaaS security posture, and Center for Internet Security (CIS) compliance. As a key member of the product management team, you will drive innovation, align development efforts with customer needs, and ensure our RMM solution delivers exceptional value to Managed Service Providers (MSPs). This role demands a strong technical background, in-depth market understanding, and the ability to collaborate across functions to develop best-in-class RMM solutions. Experience with and a solid understanding of international regulatory compliance for MSPs is highly desirable. What You'll Do Shape Product Strategy: Assist in defining the vision and strategy for Acronis RMM, including endpoint management, network monitoring, M365 security posture, SaaS security posture, and compliance management, aligning with business goals and market trends. Engage Stakeholders: Collaborate with MSPs, customers, and internal teams to identify opportunities for innovation and differentiation based on market trends and customer needs. Own the Product Roadmap: Develop and maintain a roadmap aligned with business objectives, prioritizing features based on customer feedback, competitive analysis, and technology trends. Drive Execution: Work with R&D and UX teams to deliver clear requirements, oversee development, and ensure timely, high-quality rollouts. Collaborate Across Teams: Partner with marketing, sales, support, and design teams to ensure successful product launches and mentor teams on best practices. Measure Success: Track key metrics (e.g., user adoption, NPS, feature usage) to evaluate performance and guide product iterations. Present insights and updates to stakeholders. Be a Product Advocate: Promote product features and benefits to clients and internal teams. What You Bring Product Management Experience: 3+ years in product management, focusing on security, compliance, or IT governance tools, with a proven ability to identify opportunities and deliver impactful products. Expertise in Development and Integration: Experience in in-house development, OEM integration, managing complex roadmaps, and delivering compliance-focused solutions. Compliance Knowledge: Strong understanding of Center for Internet Security (CIS) benchmarks, including implementation and significance in securing systems. Familiarity with frameworks like NIST, ISO 27001, GDPR, HIPAA, and Essentials 8. CIS Tools and Frameworks: Hands-on experience with CIS compliance tools or frameworks in enterprise or SMB environments. IT Operations Platforms: Knowledge of platforms like RMM, SIEM, or ITSM tools. MSP and Enterprise Collaboration: Experience working with Managed Service Providers (MSPs) or large enterprises to manage compliance. Technical Expertise: Strong understanding of cybersecurity, endpoint security and management, or vulnerability management tools. MSP/IT Persona Insight: Deep understanding of MSP and IT team personas is essential. Leadership and Collaboration: Proven ability to lead, build consensus, and deliver results in a multi-stakeholder environment. Customer Engagement: Experience conducting customer discussions, gathering requirements, and effectively communicating roadmaps. Tool Proficiency: Proficient in using tools like Jira, Confluence, or similar platforms. Requirement Breakdown: Skilled in decomposing requirements into actionable work items, such as user stories. Communication Skills: Excellent verbal and written communication skills, with fluency in English. Please submit your resume and application in English. Who We Are Acronis is a global cyber protection company that provides natively integrated cybersecurity, data protection, and endpoint management for managed service providers (MSPs), small and medium businesses (SMBs), enterprise IT departments and home users. Our all-in-one solutions are highly efficient and designed to identify, prevent, detect, respond, remediate, and recover from modern cyberthreats with minimal downtime, ensuring data integrity and business continuity. We offer the most comprehensive security solution on the market for MSPs with our unique ability to meet the needs of diverse and distributed IT environments. A Swiss company founded in Singapore in 2003, Acronis offers over twenty years of innovation with 15 offices worldwide and more than 1800 employees in 50+ countries. Acronis Cyber Protect is available in 26 languages in 150 countries and is used by over 20,000 service providers to protect over 750,000 businesses. Our corporate culture is focused on making a positive impact on the lives of each employee and the communities we serve. Mutual trust, respect and belief that we can contribute to the world everyday are the cornerstones of our team. Each member of our “A-Team” plays an instrumental role in driving the success of our innovative and expanding business. We seek individuals who excel in dynamic, global environments and have a never give up attitude, contributing to our collective growth and impact. Our Interview Practices To maintain a fair and genuine hiring process, we kindly ask that all candidates participate in interviews without the assistance of AI tools or external prompts. Our interview process is designed to assess your individual skills, experiences, and communication style. We value authenticity and want to ensure we’re getting to know you—not a digital assistant. To help maintain this integrity, we ask to remove virtual backgrounds and include in-person interviews in our hiring process. Use of AI-generated responses or third-party support during live interviews may be grounds for disqualification from the recruitment process and a full criminal, education and identification background check is required for all new hires. Acronis is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, marital status, national origin, physical or mental disability, medical condition, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, gender identity or expression, or any other characteristic protected by applicable laws, regulations and ordinances. Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

Are you insatiably curious and do you lean into uncertainty, take risks, and learn quickly from Are you passionate about cybersecurity? Do you enjoy working on a high-performing, fast-paced sales team? Are you insatiably curious and do you lean into uncertainty, take risks, and learn quickly from your mistakes? If so, we are looking for you! The Microsoft Security organization’s mission of making the world a safer place has never been more important. As threats become more frequent and sophisticated, we should work to keep our customers safe through our Security Solutions. The Solution Specialist Unit team within the Microsoft Security organization is at the forefront of this effort, engaging directly with customers to contribute to their success. With thousands of global security experts worldwide, $1 billion+ invested annually in security research and development, and the cutting edge AI- based Security innovations, Microsoft is ideally placed to think outside of the box and protecting customers, and partners around the world. We are looking for passionate, experienced, and credible Security Technical Specialists with a drive to help solve complex security challenges for our customers, enabling them to help modernize their security architecture and posture. We are keen to hear your thoughts on how we can further achieve our purpose. Join our team and discover unique opportunities to grow, develop and learn. As a Security Technical Specialist , you will be a senior technical sales leader and trusted customer advisor, working with cutting-edge security technologies such as Microsoft M365 Defender, Defender for Cloud and Sentinel. You will lead a virtual team of other internal, partner and consulting resources to help map Microsoft solutions to customer security challenges and priorities, demonstrate and prove our solutions, and win the technical decision enabling the team to achieve and even exceed quarterly and annual revenue targets. You will spend 75% of your work hours a week on qualified customer work – planning and orchestration, preparation, meetings (technical presentations, demos, POCs, compete positioning, workshops, etc.), while the other 25% of your time will be focused on further growing your technical, industry and competition acumen. Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. By applying to this role, you will be considered for multiple opportunities within Microsoft across the United States including locations beyond where the role is posted. This role is flexible in that you can work up to 50% from home. Travel percentages will vary according to role. Responsibilities You will be the primary technical point of contact for potential customers during the sales process, owning and driving technical win for security opportunities. Deep technical understanding of cloud security architectures, solutions/technologies including Microsoft M365 Defender, Defender for cloud and Sentinel. Coordinate weekly with sellers and manager to understand opportunities, compete scenarios and engagements to focus on, engaging and driving to own and win the technical decisions Remediate blockers; leads and ensures technical wins for Microsoft Security and adjacent technologies. Engages with and reaches out to customers proactively and independently; builds credibility with customers as a trusted advisor for Microsoft Security; and searches for and uses Microsoft Security customer references; and drives customer intent to buy and facilitates handoff to customer success for post sales deployment. Develop strategies and recommendations to improve the client's security posture, shapes technical win plan and tailors Microsoft messaging to audience for security opportunities. Enhances team capabilities for extended detection and response (XDR), zero trust and cloud security and develops differentiated compete strategies for Microsoft Security for assigned customers. Lead technical presentations, demonstrations, workshops, architecture design sessions, explain, demonstrate, and architect the solution to help solve customer security challenges and priorities. Demonstrates and oversees proof of concepts, presents and applies architecture patterns, proves capabilities and integration into customer environment, and drives cross-workload support for Microsoft solutions for security. Leverages insights and coaches' teams to align new or changing technology to customer security needs. A technical specialist is responsible for engaging with other teams within and outside the organization throughout the sales cycle. Engaging partners in sell-with scenarios and supporting their technical capabilities is key to scaling solution delivery. You will stay sharp, share your knowledge and best practices enabling further scale and growth for the security business. You would spend 20% of your work hours maintaining deep theoretical and experiential technical knowledge of MS security solutions, competitive landscape and industry trends. As a technical specialist you would document and share best practices and learning with others enabling and contributing to the success of others on your team Share knowledge and learnings with partners to drive the sale, deployment, and adoption of Microsoft solutions. Completes required training and obtains relevant product and role certifications aligned to the role and workload/industry. Other Embody our culture and values Qualifications 5+ years of Security Technology pre-sales or Security Technology consulting experience. OR Bachelor's Degree in Computer Science, Information Technology, or related field AND 4+ years of technical pre-sales or technical consulting experience. OR Master's Degree in Computer Science, Information Technology, or related field AND 3+ years of technical pre-sales or technical consulting experience OR equivalent experience. Experience with Microsoft security solutions (M365 Defender, Defender for Cloud, Sentinel) or, one or more related technologies such as Prisma Cloud, Crowdstrike, Proofpoint, Splunk, etc. Experience presenting the value of technology solutions and architectures through customer presentations, design sessions, POCs accelerating technical wins. Preferred Qualifications 8+ years technical pre-sales, technical consulting, or technology delivery, or related experience OR equivalent experience. 6+ years experience with cloud and hybrid, or on premises infrastructures, architecture designs, migrations, industry standards, and/or technology management. Certification in relevant technologies or disciplines (e.g., Office 365, Power BI, Azure Architect and Development exams, Cloud Platform Technologies, Information Security, Architecture). Certification in Microsoft 365 Security Administration or Azure Security One or more of Industry certifications such as CISSP, CCSP, iAPP, etc. Hands on technical knowledge of relevant products and solutions, but not limited to: Security Information and Event Management (SIEM) systems Next Gen Web Application Firewalls and Secure Web Gateways. Threat detection technologies Log analysis and Incident Response Cloud security technologies, architectures and concepts such as Zero Trust, cloud security posture management, cloud workload protection, Cloud code security and Cloud infrastructure entitlement management. Cloud Computing: Infrastructure as a service (IaaS), Platform as a Services (PaaS), and Software as a service. Demonstrated knowledge and understanding of one or more cloud security standards and frameworks such as CIS, NIST, CSA, etc. Technical Sales Acumen: Experience presenting the value of technology solutions and architectures through customer presentations, design sessions, POCs accelerating technical wins. Expertise in extended detection and response (XDR), zero trust and cloud security solutions & architectures Professional interpersonal skills, with the ability to present technical information clearly and concisely. Develop and maintain technical expertise: A technical specialist should stay up to date with the latest developments and advancements in security space including new tech, competitors, and internal product and services offerings. Growth Mindset. Experience and passion for learning (technical and professional skills); implementing practices from others; trying, failing, and learning from both successes and failures; sharing practices and knowledge for others’ benefit. Problem Solving: Excellent analytical and problem-solving skills, with the ability to think creatively and develop innovative solutions to technical challenges. Multi-Tasking: Ability to work independently and manage multiple priorities simultaneously. Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

Remote

Linkedin logo

Required Skills and Qualifications Proven experience using Splunk SIEM, including the ability to analyze prepared use cases, contribute to the creation of custom dashboards, and fine-tune false positive alerts. Good knowledge of SIEM architecture. Excellent skills in email security incident handling, including investigating phishing emails and providing verdicts, as well as basic knowledge of Office 365 Email Exchange. Experience with CrowdStrike EDR for security monitoring and threat detection, along with static and dynamic malware analysis and interactive sandbox report analysis capabilities. ITIL tool experience, particularly with Service-Now. Exposure to firewall and WAF log analysis. Strong knowledge of security SOP creation and maintenance. Basic knowledge of file integrity monitoring. Understanding of security compliance frameworks such as PCI and NIST. Basic understanding of vulnerability management and experience with tools such as Rapid7 and Nessus. Experience with cloud security monitoring, including AD risky detections and Defender for Cloud. Excellent communication and presentation skills. Commitment to continuous learning and professional development. Flexibility to work shifts from 1 PM to 10 PM and 3 PM to 12 AM. Key Responsibilities Pursue specialization in specific areas of security operations, such as threat hunting, malware analysis, or digital forensics, through targeted training and hands-on experience. Utilize Splunk SIEM and CrowdStrike EDR tools to monitor, detect, and respond to security incidents. Develop and execute security monitoring strategies and initiatives, working closely with the SOC management team to align efforts with organizational goals. Create and maintain standard operating procedures (SOPs) to ensure consistent and effective security operations. Support Monitoring Team to take remote session with user for troubleshooting the user machines to remove malware. Lead the preparation and delivery of weekly presentations to provide executive-level insights into SOC operations, including key metrics, trends, and emerging threats. Take ownership of false positive report preparations, ensuring accurate identification and documentation of false positives to improve detection and response capabilities. shift-leading capabilities, managing SOC operations during assigned shifts, including supervision of GET/Associate Security Analysts and coordination of incident response activities. Collaborate with the Security Specialist team on high-priority security incidents, providing expertise and assistance as needed to facilitate incident resolution. Flexible to Provide support to 24/7 L1 Monitoring shift members. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

LiveRamp is the data collaboration platform of choice for the world’s most innovative companies. A groundbreaking leader in consumer privacy, data ethics, and foundational identity, LiveRamp is setting the new standard for building a connected customer view with unmatched clarity and context while protecting precious brand and consumer trust. LiveRamp offers complete flexibility to collaborate wherever data lives to support the widest range of data collaboration use cases—within organizations, between brands, and across its premier global network of top-quality partners. Hundreds of global innovators, from iconic consumer brands and tech giants to banks, retailers, and healthcare leaders turn to LiveRamp to build enduring brand and business value by deepening customer engagement and loyalty, activating new partnerships, and maximizing the value of their first-party data while staying on the forefront of rapidly evolving compliance and privacy requirements. LiveRamp is looking for a skilled and versatile Staff Security Engineer to drive the advancement and growth of our detection and automation initiatives. Reporting to the Senior Manager of Security Engineering and Operations, this role will collaborate with cross-functional teams and external partners to mitigate risks and implement security measures that safeguard sensitive data and systems against infiltration and cyber-attacks. The position will also lead our incident response efforts and the development of threat detection platforms. You Will Lead the development, research, and creation of automations within our SOAR platform. Develop, maintain and troubleshoot security policies within our security platforms. Responsible for the health of our CASB, Email Security, and EDR appliances. Design and develop automation playbooks using both out-of-the-box and custom integrations and functions. Create custom integrations and automation scripts using languages like Python or PowerShell. Participate in architecture design and analysis related to security automation. Troubleshoot and resolve issues related to automation processes or tools. Collaborate with teams such as network engineering and downstream applications to ensure seamless integration of automation solutions. Catalog and review identified security automation use cases with stakeholders. Develop and maintain documentation for automation processes and procedures. Your Team Will Execute LiveRamp’s security strategy and roadmap. Refine security response by implementing orchestration and automation. Innovate new methods and processes that will improve LiveRamp’s security posture. About You Bachelor’s degree in Security Engineering, Computer Engineering, Computer Science, Data Science, or similar technical discipline Familiarity with a broad range of security technologies: SIEM, CASB, SOAR, DLP, and EDR. Technical proficiency with one or more of the major cloud computing environments. Several years of experience with the Python programming language. Excellent software design, problem-solving, and debugging skills. Energetic, passionate about security, and professionally curious about the cyber security threat landscape Benefits Flexible paid time off, paid holidays, options for working from home, and paid parental leave. Comprehensive Benefits Package: LiveRamp offers a comprehensive benefits package designed to help you be your best self in your personal and professional lives. Our benefits package offers medical, dental, vision, accident, life and disability, an employee assistance program, voluntary benefits as well as perks programs for your healthy lifestyle, career growth, and more. Your medical benefits extend to your dependents including parents. More About Us LiveRamp’s mission is to connect data in ways that matter, and doing so starts with our people. We know that inspired teams enlist people from a blend of backgrounds and experiences. And we know that individuals do their best when they not only bring their full selves to work but feel like they truly belong. Connecting LiveRampers to new ideas and one another is one of our guiding principles—one that informs how we hire, train, and grow our global team across nine countries and four continents. Click here to learn more about Diversity, Inclusion, & Belonging (DIB) at LiveRamp. To all recruitment agencies : LiveRamp does not accept agency resumes. Please do not forward resumes to our jobs alias, LiveRamp employees or any other company location. LiveRamp is not responsible for any fees related to unsolicited resumes. Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

Thiruvananthapuram, Kerala, India

On-site

Linkedin logo

Security Operations Center Manager will be responsible for leading Envestnet Security Incident response program by ensuring an appropriate, riskbased approach for SecurityMonitoring/Incident detection, Security Incident Response and Remediation process by partnering with MDR (Managed Detection and Response) service and internal teams. This will be accomplished through the effective functional management of day today tasks of securityanalysts, third party MDR provider, Implementations and maintenance of processs, and deployed security tools for detection, prevention, and response. Job Responsibilities: Lead the enterprise-wide security incident management and response. Review, evaluate, and enhance incident detection and response capabilities by periodic review of tools, processes, and IR playbooks. Ability to handle 24 * 7 operations with a hybrid operating model (In House + MDR) to gain the maximum efficiency and business benefits. Generating security metrics that align with business risks, reports, and dashboards for management consumption. Lead efforts to drive automation using SOAR of incident triage and response and expand advanced threat hunting capabilities. Provide functional direction and support for daily support activities. Develop and mentor staff through open communication, training, and developmentopportunities. Develop strategic goals to transform the Security operations center to be ready for the changing threat landscapes and evolving challenges. Required Skills: Minimum 5 years of leading a Security team, with experience managing security incident detection and Response program. Creative thinker with exceptional business, strategic, analytical, management, and relationship management skills. Strong knowledge of networks, operating systems, cryptography, preventive,detective, and offensive security solutions. Experience working with cloud services like Amazon Web Services, Google, and Microsoft Azure Cloud Excellent understanding of information security concepts, protocols, tools, industry best practices, and strategies. Focus on a business appropriate measured response, strong time management, Effective prioritization, and proper sense of urgency in day-today Security Operations. Ability to identify needs, take the initiative, and prioritize work efforts — balancing operational tasks with longer-term strategic security efforts. Experience in designing, implementing, and measuring relevant security and technologymanagement critical success factors, key performance indicators, and metrics. Experience working with security detection/prevention platforms like EDR, ContainerSecurity, Identity product, Vulnerability Management products and process,MicrosoftSecurity platforms, Data protection platforms, Threat/Brand Intel and Identity Intelligence, SIEM, SOAR platforms etc. Experience working with industry-standard forensics tools (XWay forensics, Encase, Access data, SIFT, FTK) Excellent understanding & concept of standard audits such as PCI, SOC2, ISO27001, and SOX.Security certifications such as CISSP. Show more Show less

Posted 1 week ago

Apply

20.0 years

0 Lacs

Gurgaon, Haryana, India

On-site

Linkedin logo

About Rackspace Cyber Defence Rackspace Cyber Defence is our next generation cyber defence and security operations capability that builds on 20+ years of securing customer environments to deliver proactive, risk-based, threat-informed and intelligence driven security services. Our purpose is to enable our customers to defend against the evolving threat landscape across on-premises, private cloud, public cloud and multi-cloud workloads. Our goal is to go beyond traditional security controls to deliver cloud-native, DevOps-centric and fully integrated 24x7x365 cyber defence capabilities that deliver a proactive , threat-informed , risk-based , intelligence-driven approach to detecting and responding to threats. Our mission is to help our customers: Proactively detect and respond to cyber-attacks – 24x7x365 Defend against new and emerging risks that impact their business Reduce their attack surface across private cloud, hybrid cloud, public cloud, and multi-cloud environments Reduce their exposure to risks that impact their identity and brand Develop operational resilience Maintain compliance with legal, regulatory and compliance obligations What we’re looking for To support our continued success and deliver a Fanatical Experience™ to our customers, Rackspace Cyber Defence is looking for an Indian based Security Operations Analyst (L3) to support Rackspace’s strategic customers. This role is particularly well-suited to a self-starting, experienced and motivated Sr. Sec Ops Analyst, who has a proven record of accomplishment in the cloud security monitoring and incident detection domain. As a Security Operations Analyst(L3), you will be responsible for detecting, analysing, and responding to threats posed across customer on-premises, private cloud, public cloud, and multi-cloud environments. The primary focus will be on triaging alerts and events (incident detection), which may indicate malicious activity, and determining if threats are real or not. You will also be required to liaise closely with the customer’s key stakeholders, which may include incident response and disaster recovery teams as well as information security. Key Accountabilities Should have experience of 10 years in SOC and 5 years in Azure Sentinel. Ensure the Customer’s operational and production environment remains secure at all the times and any threats are raised and addressed in a timely manner. Critical incident handling & closure. Escalation management and handling escalations from L2 Analysts. Proactive discovery of threats based on MITRE ATT&CK framework. Deep investigation and analysis of critical security incidents. Post breach forensic incident analysis reporting. Review the weekly and monthly reports. Review new use cases created by L2 and implement in cloud-native SIEM (Security Information and Event Management). Assist with customer onboarding (such as use case development, identifying data sources, configuring data connectors etc) Advanced threat hunting. Develop custom dashboards and reporting templates. Develop complex to customer specific use cases. Advanced platform administration. Solution recommendation for issues. Co-ordinate with vendor for issue resolution. Basic and intermediate playbook and workflow enhancement. Maintain close working relationships with relevant teams and individual key stakeholders, such as incident response and disaster recovery teams as well as information security etc. Develop the custom parsers for the incident and alert enrichment. Problem specific playbook and workflow creation and enhancements Required to work flexible timings. Skills & Experience Existing experience as a Security Operations Analyst, or equivalent Experience of working in large scale, public cloud environments and with using cloud native security monitoring tools such as: - Microsoft Sentinel Microsoft 365 Defender Microsoft Defender for Cloud Endpoint Detection & Response (EDR) tools such as Crowdstrike, Microsoft Defender for Endpoint Firewalls and network security tools such as Palo Alto, Fortinet, Juniper, and Cisco Web Application Firewall (WAF) tools such as Cloudflare, Akamai and Azure WAF Email Security tools such as Proofpoint, Mimecast and Microsoft Defender for Office Data Loss Prevention (DLP) tools such as Microsoft Purview, McAfee and Symantec Nice to have skills/experience includes: Google Cloud Platform (GCP) security tools such as Chronicle and Security Command Centre Amazon Web Services (AWS) security tools such as Security Hub, AWS Guard Duty, AWS Macie, AWS Config and AWS CloudTrail Experience of analysing malware and email headers, and has skills in network security, intrusion detection and prevention systems; operating systems; risk identification and analysis; threat identification and analysis and log analysis Experience of security controls, such as network access controls; identity, authentication, and access management controls (IAAM); and intrusion detection and prevention controls Knowledge of security standards (good practice) such as NIST, ISO27001, CIS (Center for Internet Security), OWASP and Cloud Controls Matrix (CCM) etc Experience with scripting and coding with languages such as Terraform, python, javascript, golang, bash and/or powershell Experience with DevOps practices and tools such as Backlogs, Repo’s, Pipelines, Artifacts, CI/CD, JIRA, Azure DevOps, CircleCI, GitHub Actions, Ansible and/or Jenkins Computer science, engineering, or information technology related degree (although not a strict requirement) Holds one, or more, of the following certificates (or equivalent): - Certified Information Security Systems Professional (CISSP) Microsoft Certified: Azure Security Engineer Associate (AZ500) Microsoft Certified: Security Operations Analyst Associate (SC-200) CREST Practitioner Intrusion Analyst (CPIA) CREST Registered Intrusion Analyst (CRIA) CREST Certified Network Intrusion Analyst (CCNIA) Systems Security Certified Practitioner (SSCP) Certified Cloud Security Professional (CCSP) GIAC Certified Incident Handler (GCIH) GIAC Security Operations Certified (GSOC) A highly self-motivated and proactive individual who wants to learn and grow and has an attention to detail A great analyser, trouble-shooter and problem solver who understands security operations, programming languages and security architecture Highly organised and detail oriented. Ability to prioritise, multitask and work under pressure An individual who shows a willingness to go above and beyond in delighting the customer Show more Show less

Posted 1 week ago

Apply

20.0 years

0 Lacs

Gurgaon, Haryana, India

On-site

Linkedin logo

Rackspace Security (Public Cloud) Security Engineer L3 (Endpoint Security) About Rackspace Cyber Defence Rackspace Cyber Defence is our next generation cyber defence and security operations capability that builds on 20+ years of securing customer environments to deliver proactive, risk-based, threat-informed and intelligence driven security services. Our purpose is to enable our customers to defend against the evolving threat landscape across on-premises, private cloud, public cloud and multi-cloud workloads. Our goal is to go beyond traditional security controls to deliver cloud-native, DevOps-centric and fully integrated 24x7x365 cyber defence capabilities that deliver a proactive , threat-informed , risk-based , intelligence-driven approach to detecting and responding to threats. Our mission is to help our customers: Defend against new and emerging risks that impact their business Reduce their attack surface across private cloud, hybrid cloud, public cloud, and multi-cloud environments Reduce their exposure to risks that impact their identity and brand Develop operational resilience Maintain compliance with legal, regulatory and compliance obligations What we’re looking for To support our continued success and deliver a Fanatical Experience™ to our customers, Rackspace Cyber Defence is looking for an Indian based Security Engineer, with a specialism in Endpoint Security to support Rackspace’s strategic customers. This role is particularly well-suited to a self-starting, experienced and motivated Sr. Security Engineer, who has a proven record of accomplishment in the design, delivery, management, operation and continuous improvement of enterprise-level Endpoint Security platforms or delivering Managed Endpoint Detection & Response (EDR) services to customers. The primary focus will be on the design, implementation, management, operation and continuous improvement of cloud-native Endpoint Detection & Response (EDR) platforms such as Crowdstrike Falcon or Microsoft Defender for Endpoint; used by the Rackspace Cyber Defence Center to deliver managed security services to our customers. You will also be required to liaise closely with the customer’s key stakeholders, which may include incident response and disaster recovery teams as well as information security. Key Accountabilities Ensure the Customer’s operational and production environment remains healthy and secure at all the times Assist with customer onboarding – customer/device onboarding, policy configuration, platform configuration and service transition to security operations team(s). Advance platform administration. Critical platform incident handling & closure. As an SME, act as an L3 escalation and point of contact for SecOps Analysts during an incident response process As an SME, act as a champion and centre of enablement by delivering training, coaching and thought leadership across Endpoint Security and Endpoint Detection & Response. Develop and document runbooks, playbooks and knowledgebase articles that drive best practice across teams. Drive continuous improvement of Rackspace Managed EDR services through custom development, automation and integration; in collaboration with SecOps Engineering and other Security Engineering team(s) Maintain close working relationships with relevant teams and individual key stakeholders, such as incident response and disaster recovery teams as well as information security etc. Co-ordinate with vendor for issue resolution. Required to work flexible timings Skills & Experience Should have 8+ years experience in Security Engineering Experience working in either large, enterprise environments or managed security services environments with a focus on Endpoint Detection & Response Experience of working with cloud native Endpoint Security and Endpoint Detection & Response (EDR) tools such as Crowdstrike, Microsoft Defender for Endpoint and/or Microsoft Defender for Cloud Experience of working in two (or more) of the following additional security domains: o SIEM platforms such as Microsoft Sentinel (preferred), Google Chronicle, Splunk, QRadar, LogRhythm, Securonix etc. o AWS (Amazon Web Services) Security Hub including AWS Guard Duty, AWS Macie, AWS Config and AWS CloudTrail . Experience of analysing malware and email headers, and has skills in network security, intrusion detection and prevention systems; operating systems; risk identification and analysis; threat identification and analysis and log analysis Experience of security controls, such as network access controls; identity, authentication, and access management controls (IAAM); and intrusion detection and prevention controls Knowledge of security standards (good practice) such as NIST, ISO27001, CIS (Center for Internet Security), OWASP and Cloud Controls Matrix (CCM) etc Knowledge of scripting and coding with languages such as Terraform, python, javascript, golang, bash and/or powershell Knowledge of Malware reverse engineering, threat detection and threat hunting. Computer science, engineering, or information technology related degree (although not a strict requirement) Holds one, or more, of the following certificates (or equivalent): - o Microsoft Certified: Azure Security Engineer Associate (AZ500) o Microsoft Certified: Security Operations Analyst Associate (SC-200) o Systems Security Certified Practitioner (SSCP) o Certified Cloud Security Professional (CCSP) o GIAC Certified Incident Handler (GCIH) o GIAC Security Operations Certified (GSOC) o CrowdStrike admin Certified A highly self-motivated and proactive individual who wants to learn and grow and has an attention to detail A great analyser, trouble-shooter and problem solver who understands security operations, programming languages and security architecture Highly organised and detail oriented. Ability to prioritise, multitask and work under pressure An individual who shows a willingness to go above and beyond in delighting the customer A good communicator who can explain security concepts to both technical and non-technical audiences About Rackspace Technology We are the multicloud solutions experts. We combine our expertise with the world’s leading technologies — across applications, data, and security — to deliver end-to-end solutions. We have a proven record of advising customers based on their business challenges, designing solutions that scale, building and managing those solutions, and optimizing returns into the future. Named a best place to work, year after year according to Fortune, Forbes, and Glassdoor, we attract and develop world-class talent. Join us on our mission to embrace technology, empower customers and deliver the future. More about Rackspace Technology Though we are all different, Rackers thrive through our connection to a central goal: to be a valued member of a winning team on an inspiring mission. We bring our whole selves to work every day. And we embrace the notion that unique perspectives fuel innovation and enable us to best serve our customers and communities around the globe. We welcome you to apply today and want you to know that we are committed to offering equal employment opportunity without regard to age, colour, disability, gender reassignment or identity or expression, genetic information, marital or civil partner status, pregnancy or maternity status, military or veteran status, nationality, ethnic or national origin, race, religion or belief, sexual orientation, or any legally protected characteristic. If you have a disability or special need that requires accommodation, please let us know. Show more Show less

Posted 1 week ago

Apply

6.0 - 8.0 years

13 - 17 Lacs

Gurugram, Delhi / NCR

Hybrid

Naukri logo

Role & responsibilities: 1. Provides Monitoring and Analysis support of Cybersecurity events Identify and detect security threats Perform initial triage Report security events, in accordance with established processes and procedures Perform threat analysis, risk analysis, security assessments, and vulnerability testing Anticipate threats and alerts to avoid their occurrence Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc. 2. Investigate, analyze, and contain malware incidents Includes performing computer forensic investigations 3. Understanding of common malware types and behaviors and common infection vectors Ability to identify attacker Tactics, Techniques, and procedures (TTPs) Experience with IoC lifecycle (development, organization, sharing, effective usage) 4. Will be responsible for: Developing alerting, reporting, and automated detection solutions Authoring rules and creating new ML features 5. Strong experience in leveraging Next gen SIEM with SOAR/XDR capabilities to detect & investigate the cyber security incident and reporting in defined template. 6. SIEM solution management and maintenance: Ensure health of underlying architecture Create ruleset and alerts to cover the current threat landscape Remediate alerts generated by the system Manage vendor relationship with OEM 7. Security Log Analysis Monitor and analyze the logs from various security tools e.g. SIEM, EDR, DLP, AV etc. and manually correlate system analyzed events 8. Practical/Working experience with tools like EDR, DLP, Zero Trust, Threat intel software, IPS/IDS, Email Security tools 9. Collaborate with various IT groups to collaborate for analysis, troubleshooting, and ensure that their requirements and new initiatives adhere to information security policies and best practices 10. Responding to escalations to resolve detection effectiveness issues (misclassified spam/phish and false positives) Design and develop novel threat detection techniques or methodologies from creating proof-of-concept to productizing the solution. 11. Perform device reviews to ensure compliance with hardening standards, access controls and security related configuration settings 12. Prepare and update security documentation including security procedures, standards, notifications, and alerts in support of other teams within the EgonZehnder Security department. 13. Proactively hunting threats, blue teaming, performing exploit and vulnerability research, all in order to find and a gap that can be exploited by bad actors Preferred candidate profile: 1. Prior work experience in SOC 2. Should be able to conduct advanced forensics including packet captures using tools such as Wireshark, Netmon etc. 3. Knowledge and experience of configuration and operation of SIEM Solutions 4. Expert knowledge of configuration and operation of Security Solutions including, Firewalls, IDS, Internet Filters, DLP, Vulnerability Scanners, Anti Malware Solutions, etc. 5. A basic understanding of Linux and Windows operating systems and OS event logging 6. Strong analytical and problem-solving skills 7. Excellent communication skills both verbal and written 8. Experience in evaluating and implementing new tools, and solutions by working directly with the vendor Relevant Professional Qualifications (Preferred) Certified Ethical Hacker (CEH) Global Information Assurance Certifications (GIAC) e.g. Certified Incident Handler (GCIH), Certified Intrusion Analyst (GCIA), Certified Enterprise Defender (GCED) Benefits: Benefits which make us unique At EZ, we know that great people are what makes a great firm. We value our people and offer employees a comprehensive benefits package. Learn more about what working at Egon Zehnder can mean for you! Benefits Highlights: 5 Days working in a Fast-paced work environment Work directly with the senior management team Reward and Recognition Employee friendly policies Personal development and training Health Benefits, Accident Insurance Potential Growth for you! We will nurture your talent in an inclusive culture that values diversity. You will be doing regular catchups with your Manager who will act as your career coach and guide you in your career goals and aspirations.

Posted 1 week ago

Apply

8.0 - 10.0 years

0 Lacs

India

On-site

Linkedin logo

Company Description: Seceon Inc. is a leading provider of next-generation cybersecurity solutions through their cutting-edge threat management platform. The platform offers real-time monitoring, proactive threat detection, and automatic breach prevention to maximize cybersecurity ROI for businesses. Built with ML, AI, and dynamic threat models, the platform consolidates tools like NG-SIEM, SOAR, UEBA, NDR, and Threat Intelligence into a single solution. Role: Senior Marketing Executive – Drive Growth & Brand Impact We’re looking for a Marketing Executive (8-10 years of experience) to take our brand to the next level. This role is ideal for someone with a strong background in digital marketing, content strategy, and pipeline growth. Responsibilities: Develop and execute digital marketing strategies to drive MQL-to-SQL conversions Lead content creation and brand awareness efforts across multiple platforms Optimize HubSpot, CRM tools, and automation for lead generation and nurturing Build and refine GTM frameworks to accelerate customer understanding. Drive customer education initiatives through engaging content and campaigns Qualifications: 8-10 years of experience in B2B marketing, digital strategy, and content creation Proficiency in HubSpot, CRM tools, and marketing automation Strong track record in demand generation and MQL pipeline conversion Experience in developing GTM strategies and customer education programs Ability to analyse data and optimize campaigns for maximum impact If you’re a results-driven marketing professional ready to make an impact, let’s connect! Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Kochi, Kerala, India

On-site

Linkedin logo

Role Description Cloud Solution Architect Experience : 12 plus years About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world’s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. About The Role We are seeking an experienced Solution Architect to take on a critical technical leadership role with one of our key clients in the insurance sector. The successful candidate will play a key role in designing, implementing, and overseeing IT solutions that align with the client’s goals and regulatory requirements. This position requires close interaction with multiple stakeholders across the client organization and within our company, ensuring effective communication and strategic alignment on all technical aspects of the projects. Key Responsibilities Take a technical leading role in driving technical solutions, acting as the primary point of contact for the client’s technical and business teams. Collaborate with cross-functional teams, both internally and with the client, to translate business requirements into robust and scalable solutions. Provide technical expertise and leadership in the areas of networking, cloud solutions, and cybersecurity security, particularly for Azure (required) and Google Cloud (preferred). Design, implement, and manage SIEM solutions both on-premises and in the cloud: Microsoft: Sentinel, Defender XDR stack, Purview Google SecOps AI-driven tools like Copilot for Security and Gemini in SecOps Guide the client through best practices in network architecture, security frameworks, and compliance, ensuring all solutions are aligned with the client’s operational and regulatory needs. Required Skills And Qualifications Proven track record in IT networking, including experience with network architecture, security, and regulatory compliance in the insurance sector. Expertise in cloud solutions with a strong focus on Microsoft Azure (mandatory) and familiarity with Google Cloud (preferred). Extensive experience with SIEM solutions, both on-premises and cloud-based, with proficiency in Microsoft Sentinel and Google SecOps. Demonstrated ability to lead cross-functional technical teams and drive complex projects to successful completion. Strong communication skills with the ability to effectively interact with both technical and business stakeholders. Preferred Qualifications Certifications in Azure: Azure Solutions Architect Expert, Cybersecurity Architect Expert Google SecOps, and SIEM platforms are highly desirable. Skills Azure Cloud,Google Cloud,Architecture,Technology Solutions Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

We deliver the world’s most complex projects Work as part of a collaborative and inclusive team Enjoy a varied & challenging role Building on our past. Ready for the future Worley is a global professional services company of energy, chemicals and resources experts headquartered in Australia. Right now, we’re bridging two worlds as we accelerate to more sustainable energy sources, while helping our customers provide the energy, chemicals and resources that society needs now. We partner with our customers to deliver projects and create value over the life of their portfolio of assets. We solve complex problems by finding integrated data-centric solutions from the first stages of consulting and engineering to installation and commissioning, to the last stages of decommissioning and remediation. Join us and help drive innovation and sustainability in our projects. The Role As a Senior Cyber Security Analyst with Worley, you will work closely with our existing team to deliver projects for our clients while continuing to develop your skills and experience etc. We are seeking a Senior Cyber Security Analyst -a Subject Matter Expert (SME)- to join our Information Security team. The ideal candidate will be responsible for designing, implementing, monitoring, reacting, and reporting on information security events within the DLP scope. Additionally, the role includes managing security tools and IT systems with a special focus on DLP enablement. DLP Strategy & Policy Design Serve as a Subject Matter Expert (SME) for DLP solutions, technologies, and best practices. Design, implement, and optimize DLP policies to detect and prevent unauthorized access, sharing, and data exfiltration. Define and maintain DLP governance frameworks, aligning with regulatory requirements Identify sensitive data requiring protection across endpoints, cloud, email, and network. Implementation & Configuration Deploy and configure DLP controls to monitor, alert, and block potential data leaks. Define and enforce DLP rules for structured & unstructured data, including Personally Identifiable Information (PII), Intellectual Property (IP), and financial data. Integrate DLP solutions with other security tools. Monitoring & Continuous Improvement Monitor and analyze DLP alerts and incidents, identifying trends and areas for improvement. Ensuring DLP alerts and incidents get routed to monitoring/response processes in accordance with defined internal procedures Perform regular tuning and updates to enhance detection accuracy and reduce false positives. Develop automated response actions to mitigate risks and ensure business continuity. Compliance & Stakeholder Collaboration Ensure compliance with data protection regulations and industry security standards. Collaborate with cross-functional teams to resolve complex technical issues and to align DLP policies with business needs. Provide guidance and training to employees on DLP policies, security best practices, and insider threat awareness. Reporting & Documentation Define and generate DLP metric supporting the reporting needs across the organization Document DLP configurations, policies, and operational procedures. Provide technical recommendations to enhance data security strategies. About You To be considered for this role it is envisaged you will possess the following attributes: Ability to balance security measures with business needs A proactive approach to identifying and mitigating data loss risks before they become security incidents Proven experience with DLP solutions (e.g., Microsoft Purview, Symantec, Forcepoint, McAfee/Trellix, Digital Guardian, Zscaler). Strong knowledge of DLP policies, rules, content inspection techniques, and data classification models. Experience working with cloud-based DLP (e.g., CASB, SaaS security, O365 DLP, Google Workspace DLP) Understanding of network security, endpoint security, and encryption techniques. Familiarity with SIEM, SOC workflows, and incident response processes. Moving forward together We want our people to be energized and empowered to drive sustainable impact. So, our focus is on a values-inspired culture that unlocks brilliance through belonging, connection and innovation. We’re building a diverse, inclusive and respectful workplace. Creating a space where everyone feels they belong, can be themselves, and are heard. And we're not just talking about it; we're doing it. We're reskilling our people, leveraging transferable skills, and supporting the transition of our workforce to become experts in today's low carbon energy infrastructure and technology. Whatever your ambition, there’s a path for you here. And there’s no barrier to your potential career success. Join us to broaden your horizons, explore diverse opportunities, and be part of delivering sustainable change. Worley takes personal data protection seriously and respects EU and local data protection laws. You can read our full Recruitment Privacy Notice Here. Please note: If you are being represented by a recruitment agency you will not be considered, to be considered you will need to apply directly to Worley. Company Worley Primary Location IND-MM-Mumbai Other Locations IND-KR-Bangalore, IND-AP-Hyderabad, IND-MM-Pune, IND-MM-Navi Mumbai Job Cyber Security Schedule Full-time Employment Type Employee Job Level Experienced Job Posting Jun 10, 2025 Unposting Date Jul 10, 2025 Reporting Manager Title Manager Show more Show less

Posted 1 week ago

Apply

0.0 - 5.0 years

0 Lacs

Kolkata, West Bengal

On-site

Indeed logo

Relevant Experience: 5-7 Years on SOC Operation Education: BE/BTECH/MCA/BCA/MSC/BSC in Computer Science Certification: CISA/CISSP/CISM/Any OEM Certification in the field of IT Security Skills – Security Tools : Ø ArcSight (SIEM) Ø DLP Ø WAF Ø DAM Ø NBA Ø PIM Ø AlgoSec Ø Anti Malware Ø Cisco HCI Ø Tenable Job Type: Full-time Pay: ₹800,000.00 - ₹1,400,000.00 per year Schedule: Rotational shift Ability to commute/relocate: Kolkata, West Bengal: Reliably commute or planning to relocate before starting work (Required) Application Question(s): What is your current CTC? What is your expected CTC? What is your notice period? What is your current location? In which of the following tools do you have hands-on experience? (ArcSight, DLP, WAF, DAM, NBA, PIM, AlgoSec, Anti Malware, Cisco HCI, Tenable) Which level are you supporting? Experience: total work: 5 years (Required) SOC Operation: 5 years (Required) Work Location: In person

Posted 1 week ago

Apply

1.0 years

0 Lacs

Kochi, Kerala, India

On-site

Linkedin logo

Company Description CyberDisti is a next-generation cyber security value-added distributor offering comprehensive cyber security solutions tailored to meet clients' specific needs. Our vision is to provide advanced cyber security solutions to facilitate secure digital transformation for our customers. By partnering with leading vendors in the industry, CyberDisti holds a unique competitive advantage in delivering cutting-edge cyber security products and solutions. Job Description Analyze and investigate security events from various sources. Manage security incidents through all phases of the incident response process through to closure Using SIEM, Full Packet Capture, Intrusion Detection, Vulnerability Scanning and Malware analysis technologies for even detection and analysis. Update tickets, write incident reports and document actions for false positive reduction Developing knowledge of attack types and fine-tuning detective capabilities such as writing Snort/Sourcefire signatures Incident validation Detailed analysis of attacks and incident response Solution recommendation for issues Manage security devices Risk analysis for change management for security devices Escalation points for device issue resolution · Resolve escalation, Identified missed incidents, maintain knowledge base, defining security breaches Follow-up with the concerned departments/vendor on the remediation steps taken Resolve queries from Client’s stakeholders Coordinate and be present to discuss with Client stakeholders in person Qualifications & Skills 1+ years of experience in working with SIEMs/SEMs and other log analysis technologies Bachelor's in computer science or computer engineering Detailed understanding of the TCP and IP protocol suites and ability to dissect and explain the contents of traffic and packets. Demonstrated ability to work well independently with little input, and as a part of a team Experience with configuration of debug, event generation and logging functionality within application and operating systems, using Syslog or flat file generation. Operating systems and system administration skills in at least one of the following (Windows, Solaris, Linux) including good command line skills. 3-5 years of experience in SIEM, log monitoring, event correlation and analysis Experience in vulnerability assessments, penetration testing Experience in handling events, patch management, configuration management Understanding of TCP/IP, networking concepts and internet protocols Show more Show less

Posted 1 week ago

Apply

3.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Description And Requirements CareerArc Code CA-JF Hybrid "At BMC trust is not just a word - it's a way of life!" We are an award-winning, equal opportunity, culturally diverse, fun place to be. Giving back to the community drives us to be better every single day. Our work environment allows you to balance your priorities, because we know you will bring your best every day. We will champion your wins and shout them from the rooftops. Your peers will inspire, drive, support you, and make you laugh out loud! We help our customers free up time and space to become an Autonomous Digital Enterprise that conquers the opportunities ahead - and are relentless in the pursuit of innovation! Our IS&T (Information Services and Technology) department provides all the required technology and operational support services to run our business here in BMC! We have over 200 servers on premises to support production, disaster recovery, databases, applications and over 1000 servers in Lab environment. IS&T is transformational not only for BMC but also for the customer experience, because we give a 360 degrees view to the customer about the products they should know, opportunities in the pipeline, and any service issues outstanding with the customer. We use cutting-edge technologies to manage BMC's infrastructure and showcase it to the customers – program is called BMC on BMC! BMC is looking for a Senior Information Security Engineer to join our amazing global Corporate Cybersecurity team! A Sr Information Security Engineer will be a part of the operations wing of Cybersecurity team at BMC. The Cybersecurity team at BMC is responsible for securing BMC IT infrastructure and assets from unauthorized access and to ensure countermeasures are in place against any cyber-attacks. Here is how, through this exciting role, YOU will contribute to BMC's and your own success: Security Engineering Participate in vendor identification and implement Cybersecurity tools for the team. Manage & maintain security tools & systems used for incident response. Create & maintain playbooks for responding to different types of security incidents. Security Monitoring Respond to escalations from the SOC on security alerts, eliminate false positives, triage significant security events based on impact and nature of the security incident, and escalate according to the established procedures. Continuously monitor and analyse security events & newly reported threats to proactively identify any opportunities for process enhancement. Review automated daily security reports of key security controls, identify anomalies and, escalate critical security events to the appropriate stakeholders and follow-up as required. Participate in internal & external security audits. Security Incident Response Conduct thorough investigative actions based on security events and remediate as dictated by standard operating procedures. Participate in all the phases of security incident response process, including detection, containment, eradication, root cause analysis and post-incident reporting. Collaborate with cross-functional teams as well as external vendors/customers/partners for incident response as required. Record detailed Security Incident Response activities in the Case Management System. To ensure you’re set up for success, you will bring the following skillset & experience: Bachelor’s Degree or equivalent in IT or Computer Science. Security Trainings/Certifications (e.g. SANS, CDAC-DITISS). 3+ years of relevant SOC IR experience. Should be ready to work in 24x7 rotating shifts. Strong analytical and reasoning abilities. Motivation to identify and solve problems. Hands-on experience with SIEM & other cybersecurity tools like AV, EDR, Firewall, SOAR. System & Network Log Analysis. Whilst these are nice to have, our team can help you develop in the following skills: Good verbal and written communication skills. Familiarity with various Cloud & OS environments. Scripting, malware analysis, vulnerability & threat analysis. BMC Software maintains a strict policy of not requesting any form of payment in exchange for employment opportunities, upholding a fair and ethical hiring process. At BMC we believe in pay transparency and have set the midpoint of the salary band for this role at 2,790,000 INR. Actual salaries depend on a wide range of factors that are considered in making compensation decisions, including but not limited to skill sets; experience and training, licensure, and certifications; and other business and organizational needs. The salary listed is just one component of BMC's employee compensation package. Other rewards may include a variable plan and country specific benefits. We are committed to ensuring that our employees are paid fairly and equitably, and that we are transparent about our compensation practices. ( Returnship@BMC ) Had a break in your career? No worries. This role is eligible for candidates who have taken a break in their career and want to re-enter the workforce. If your expertise matches the above job, visit to https://bmcrecruit.avature.net/returnship know more and how to apply. Min salary 2,092,500 Our commitment to you! BMC’s culture is built around its people. We have 6000+ brilliant minds working together across the globe. You won’t be known just by your employee number, but for your true authentic self. BMC lets you be YOU! If after reading the above, You’re unsure if you meet the qualifications of this role but are deeply excited about BMC and this team, we still encourage you to apply! We want to attract talents from diverse backgrounds and experience to ensure we face the world together with the best ideas! BMC is committed to equal opportunity employment regardless of race, age, sex, creed, color, religion, citizenship status, sexual orientation, gender, gender expression, gender identity, national origin, disability, marital status, pregnancy, disabled veteran or status as a protected veteran. If you need a reasonable accommodation for any part of the application and hiring process, visit the accommodation request page. Mid point salary 2,790,000 Max salary 3,487,500 Show more Show less

Posted 1 week ago

Apply

2.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Description And Requirements CareerArc Code CA-JF Hybrid "At BMC trust is not just a word - it's a way of life!" We are an award-winning, equal opportunity, culturally diverse, fun place to be. Giving back to the community drives us to be better every single day. Our work environment allows you to balance your priorities, because we know you will bring your best every day. We will champion your wins and shout them from the rooftops. Your peers will inspire, drive, support you, and make you laugh out loud! We help our customers free up time and space to become an Autonomous Digital Enterprise that conquers the opportunities ahead - and are relentless in the pursuit of innovation! Our IS&T (Information Services and Technology) department provides all the required technology and operational support services to run our business here in BMC! We have over 200 servers on premises to support production, disaster recovery, databases, applications and over 1000 servers in Lab environment. IS&T is transformational not only for BMC but also for the customer experience, because we give a 360 degrees view to the customer about the products they should know, opportunities in the pipeline, and any service issues outstanding with the customer. We use cutting-edge technologies to manage BMC's infrastructure and showcase it to the customers – program is called BMC on BMC! We are seeking a proactive and technically capable Cyber Threat Management Engineer to join our cybersecurity threat management team. This early-career role is ideal for individuals with foundational experience in cybersecurity who are ready to grow their technical skills and contribute to BMC’s threat detection and response capabilities. You will play an integral part in identifying, analyzing, and mitigating cyber threats across BMC’s global environment. Here is how, through this exciting role, YOU will contribute to BMC's and your own success: Monitor and analyze data from security systems including open source and enterprise solutions. Effectively communicate identified threats and track remediations until completion. Participate in the investigation and technical analysis of security incidents and provide remediation guidance. Integrate threat intelligence feeds and use frameworks like MITRE ATT&CK to assess and defend against current adversary tactics. Contribute to automation initiatives to streamline threat detection, alerting, and response workflows. Support threat hunting and red team exercises. Document findings, techniques, and outcomes in knowledge bases and reports. To ensure you’re set up for success, you will bring the following skillset & experience: Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field—or equivalent hands-on experience. Foundational experience (e.g., 1–2 years) in cybersecurity operations, threat analysis, or incident response. Proficiency with at least one SIEM platform (e.g., Splunk, QRadar, Sentinel). Proficiency with enterprise solutions providing dark web monitoring, attack surface management, threat intelligence, and risk rating. Understanding of network protocols, operating systems, and cybersecurity fundamentals. Strong scripting or automation skills (e.g., Python, PowerShell, Bash) Excellent communication and documentation abilities. Whilst these are nice to have, our team can help you develop in the following skills: Familiarity with threat intelligence tools and frameworks (e.g., MISP, STIX/TAXII). Knowledge of cloud security practices (AWS, Azure, or GCP). Relevant certifications such as CompTIA Security+, CySA+, SC-200, or GIAC (GCIH, GCIA, GCTI). Curiosity for cybersecurity and continuous learning. BMC Software maintains a strict policy of not requesting any form of payment in exchange for employment opportunities, upholding a fair and ethical hiring process. At BMC we believe in pay transparency and have set the midpoint of the salary band for this role at 1,725,800 INR. Actual salaries depend on a wide range of factors that are considered in making compensation decisions, including but not limited to skill sets; experience and training, licensure, and certifications; and other business and organizational needs. The salary listed is just one component of BMC's employee compensation package. Other rewards may include a variable plan and country specific benefits. We are committed to ensuring that our employees are paid fairly and equitably, and that we are transparent about our compensation practices. ( Returnship@BMC ) Had a break in your career? No worries. This role is eligible for candidates who have taken a break in their career and want to re-enter the workforce. If your expertise matches the above job, visit to https://bmcrecruit.avature.net/returnship know more and how to apply. Min salary 1,294,350 Our commitment to you! BMC’s culture is built around its people. We have 6000+ brilliant minds working together across the globe. You won’t be known just by your employee number, but for your true authentic self. BMC lets you be YOU! If after reading the above, You’re unsure if you meet the qualifications of this role but are deeply excited about BMC and this team, we still encourage you to apply! We want to attract talents from diverse backgrounds and experience to ensure we face the world together with the best ideas! BMC is committed to equal opportunity employment regardless of race, age, sex, creed, color, religion, citizenship status, sexual orientation, gender, gender expression, gender identity, national origin, disability, marital status, pregnancy, disabled veteran or status as a protected veteran. If you need a reasonable accommodation for any part of the application and hiring process, visit the accommodation request page. Mid point salary 1,725,800 Max salary 2,157,250 Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Description And Requirements CareerArc Code CA_UT Hybrid "At BMC trust is not just a word - it's a way of life!" We are an award-winning, equal opportunity, culturally diverse, fun place to be. Giving back to the community drives us to be better every single day. Our work environment allows you to balance your priorities, because we know you will bring your best every day. We will champion your wins and shout them from the rooftops. Your peers will inspire, drive, support you, and make you laugh out loud! We help our customers free up time and space to become an Autonomous Digital Enterprise that conquers the opportunities ahead - and are relentless in the pursuit of innovation! Customer Success brings the transcendent customer experience to life by empowering customers to achieve the value and impact of their BMC investments. Customer Success accelerates core business outcomes, mitigates risk, cultivates relationships, removes friction, and improves customer experience. No better team to join when customer centricity is at the heart of BMC's strategy! BMC is looking for a Customer Success Specialist - (Mainframes) is responsible for ensuring the success of BMC Mainframe customers. The CSS will bring BMC best ideas, innovations, and capabilities to our portfolio of customers and match these to the customers’ business goals, driving greater business value and executive alignment between BMC and the Customer. As a CSS, you will be responsible for driving customer adoption and success by providing governance advice, usage/adoption recommendations, risk identification and mitigation. The end result is increased customer satisfaction, retention and expansion of the BMC footprint. In addition to the business process and change management skills needed for the role, the CSS should possess mainframe functional or IT expertise in combination with exceptional customer management experience at the C-level. Working closely with the entire account team to drive the customer relationship and alignment at all levels in order to execute the overall account strategy is key to your success. You will also serve as an escalation point for issues that impact the customer’s success and drive risk mitigation. CSSs are required to maintain strong working relationships with other BMC customer facing personnel in the Sales, Services, Engineering, Marketing and Product Management eco systems with the goal of owning the post-sale strategy. Here is how, through this exciting role, YOU will contribute to BMC's and your own success: As the Customer Success Specialist, you ensure that customers derive maximum value from their investment, utilize all their licenses, identify new opportunities, and collaborate with sales teams to ensure growth attainment and increased footprint. Mentor and foster a working collaboration between customers, other BMC functions and partners. Ensure customer renewal and drive the growth of customer advocates. Partner with Sales to manage assigned accounts to ensure customer success with BMC. Partner with the customer to establish a transformational Business Roadmap/Blueprint to ensure achievement of business goals. Develop a comprehensive understanding of the customer’s industry business challenges and objectives to appropriately map Helix ITSM features and associated business benefits to address their needs. Play a fundamental part in helping your customers establish and manage their Change Management/Governance/Centre of Excellence programs. Identify risks to the customer achieving their stated business goals and developing a risk mitigation plan. Serve as a customer advocate in driving industry best practices and the evolution of BMC product and platform functionality, courses and administrative services integral to the customer's success. Develop and maintain long-term relationships with stakeholders in your account portfolio by networking between customers, partners and BMC. Contribute thought leadership and best practice, both internally and externally, around business transformation. Work with the other areas within Customer Success and BMC to develop and deliver repeatable processes and solution outcomes that improve the overall customer experience. Deliver successful customers to the contract renewal cycle and, where necessary, support the renewals process to minimize customer attrition. To ensure you’re set up for success, you will bring the following skillset & experience: Strong communication (verbal & written) and customer handling skills. Proven problem-solving, analytical, and organizational/time management abilities. Ability to multitask and manage complex, senior-level IT/business accounts. Experience leading executive meetings/workshops and handling diverse portfolio engagements (1 week–several months). Quick learner with expertise in customer support tools/resources. BS in Computer Systems or related field OR equivalent programming experience. 5+ years in z/OS systems or major subsystems (STORAGE, IMS, CICS, DB2). Experience with AMI Monitor for CICS, AMI Auto Operator, or Mainview products. Proficiency in IBM utilities, RACF commands, REXX coding. 5+ years in Windows/Unix/Linux OS management, networking, security, and SIEM tools. Strong understanding of networking and security concepts. Excellent diagnostics, debugging, and troubleshooting skills. Whilst these are nice to have, our team can help you develop in the following skills: Experience with Splunk Enterprise, batch files, and programming (C, C++, C#, Python, JavaScript preferred). Ability to understand and write Assembler helpful, but not essential BMC Software maintains a strict policy of not requesting any form of payment in exchange for employment opportunities, upholding a fair and ethical hiring process. At BMC we believe in pay transparency and have set the midpoint of the salary band for this role at 4,166,900 INR. Actual salaries depend on a wide range of factors that are considered in making compensation decisions, including but not limited to skill sets; experience and training, licensure, and certifications; and other business and organizational needs. The salary listed is just one component of BMC's employee compensation package. Other rewards may include a variable plan and country specific benefits. We are committed to ensuring that our employees are paid fairly and equitably, and that we are transparent about our compensation practices. ( Returnship@BMC ) Had a break in your career? No worries. This role is eligible for candidates who have taken a break in their career and want to re-enter the workforce. If your expertise matches the above job, visit to https://bmcrecruit.avature.net/returnship know more and how to apply. Min salary 3,125,175 Our commitment to you! BMC’s culture is built around its people. We have 6000+ brilliant minds working together across the globe. You won’t be known just by your employee number, but for your true authentic self. BMC lets you be YOU! If after reading the above, You’re unsure if you meet the qualifications of this role but are deeply excited about BMC and this team, we still encourage you to apply! We want to attract talents from diverse backgrounds and experience to ensure we face the world together with the best ideas! BMC is committed to equal opportunity employment regardless of race, age, sex, creed, color, religion, citizenship status, sexual orientation, gender, gender expression, gender identity, national origin, disability, marital status, pregnancy, disabled veteran or status as a protected veteran. If you need a reasonable accommodation for any part of the application and hiring process, visit the accommodation request page. Mid point salary 4,166,900 Max salary 5,208,625 Show more Show less

Posted 1 week ago

Apply

4.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

Job Title : Presales Lead Job Location: Mumbai (Thane/Andheri) Job Purpose: The Presales Lead will drive cybersecurity solutioning, customer engagement, and sales enablement across MDR/CES/MSSP services. They must have strong expertise in security technologies (SIEM, EDR, firewalls, cloud security) and IT infrastructure. Responsibilities include responding to RFPs, conducting PoCs, crafting proposals, and engaging with C-level executives. Strong consultative selling, presentation, and negotiation skills are essential. The role requires collaboration with sales, technical, and product teams, along with CRM proficiency. Roles & Responsibilities 1. Solutioning & Technical Expertise Understand customer security needs and design tailored cybersecurity solutions across MDR/CES/MSSP services. Conduct Proof of Concepts (PoCs), product demos, and technical workshops to showcase solutions. Stay updated on cybersecurity trends and technologies (SIEM, SOAR, XDR, Cloud Security, IAM/PAM, Firewalls, Endpoint Security, Threat Intelligence). 2. RFP/RFI & Proposal Management Lead technical responses to RFPs/RFIs, ensuring high-quality proposal submissions. Develop and present compelling business cases, solution architectures, and value propositions for clients. Work with internal teams to create pricing models, service offerings, and customized solutions based on client needs. 3. Sales & Customer Engagement Engage with C-level executives, IT teams, and security stakeholders to drive technical discussions. Act as a trusted advisor , translating complex cybersecurity concepts into business-friendly solutions. Support the sales team in deal closure by addressing objections, defining technical scopes, and guiding the sales cycle. 4. Market Intelligence & Competitive Analysis Analyze competitor offerings, industry trends, and emerging threats to refine presales strategies. Collaborate with marketing and product teams to enhance solution messaging and positioning. Identify upselling and cross-selling opportunities by aligning solutions with customer business goals. 5. Internal & Cross-Functional Collaboration Work closely with the delivery, technical, and product teams to ensure seamless solution deployment. Train and enable sales teams on cybersecurity products, services, and market differentiators . Maintain accurate pipeline tracking and reporting using CRM tools (Salesforce, HubSpot, Zoho, etc.) . Skills / Certificates Required: The Presales Lead should have expertise in cloud security (AWS, Azure, GCP), Zero Trust, IAM, PAM, and SOC operations, along with knowledge of automation (SOAR, XDR) and AI-driven threat detection. Strong business acumen, leadership, and stakeholder management skills are essential. Preferred certifications include AWS Security, SC-900, CISA, CRISC, OSCP, GPEN, and ITIL or PMP for project management. Experience with SIEM tools like Splunk and QRadar is a plus. The role requires a strategic mindset, problem-solving skills, and the ability to assess security investments and ROI while aligning cybersecurity solutions with business needs. Experience: 4+ years in a pre-sales or solution consulting role, preferably in MDR, MSSP, CES, or cybersecurity services. Show more Show less

Posted 1 week ago

Apply

6.0 - 10.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

At Cadence, we hire and develop leaders and innovators who want to make an impact on the world of technology. Position: Sr. Information Security Analyst Grade: IT3 Location: Noida/Bangalore Job Description Key Responsibilities Led and implement security architecture and solutions to safeguard enterprise systems, networks, and data. Conduct vulnerability assessments, penetration testing, and risk assessments to identify and mitigate security threats. Develop and enforce security policies, procedures, and best practices to ensure compliance with internal standards and industry regulations. Collaborate with cross-functional teams to design secure systems and provide guidance on secure coding practices and vulnerability management. Continuously monitor the security landscape for new threats and ensure proactive defense mechanisms are in place. Required Skills & Qualification Hands-on experience in securing corporate environment. Hands-on experience in security frameworks (NIST, ISO 27001, CIS) and experience with risk management and compliance Hands-on experience securing Windows (Workstations and Servers), Linux (Workstations and Servers), and Mac Hands-on experience conducting risk management by identifying gaps and providing strategies for mitigation. Hands-on experience documenting vulnerability assessment results in a clear and actionable format. Expertise in network security, firewalls, IDS/IPS, and security monitoring tools such as SIEM Proficiency with cloud security technologies (AWS, Azure, GCP) and securing cloud-based infrastructure. Experience with incident response, forensics, and managing security incidents from detection to resolution. Determines security violations and inefficiencies. Knowledge of mergers and acquisitions Experience Should have relevant experience of at least 6-10 years. Qualification Engineering (Computers, Electronics, IT) or equivalent We’re doing work that matters. Help us solve what others can’t. Show more Show less

Posted 1 week ago

Apply

0.0 years

0 Lacs

Hyderabad, Telangana

On-site

Indeed logo

Security Operations Engineer II Hyderabad, Telangana, India Date posted Jun 11, 2025 Job number 1830118 Work site Microsoft on-site only Travel 0-25 % Role type Individual Contributor Profession Security Engineering Discipline Security Operations Engineering Employment type Full-Time Overview Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world. Develop and maintain automation solutions to enhance Security Operations Centre (SOC) efficiency. Provide technical insight on automation platforms, scalable automation solutions, and security engineering practices. Collaborate with cross-functional teams to define scope, responsibilities, and automation strategies. Continuously improve automation frameworks to drive operational excellence. Align with Microsoft’s values through teamwork, coaching, and knowledge sharing. Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. In alignment with our Microsoft values, we are committed to cultivating an inclusive work environment for all employees to positively impact our culture every day. Qualifications 5+ years of experience in Security Operations or related automation roles. Strong experience with security automation tools such as SOAR, SIEM, and scripting-based automation frameworks. Hands-on experience with Microsoft Cloud Security Technologies such as Azure Sentinel, Azure Defender, MDE, Azure Data Explorer, and Azure Log Analytics. Experience with automation tools such as Logic Apps, Power Automate, or similar Low Code/No Code platforms. Proficiency in scripting languages like Python, PowerShell, or equivalent for automating security tasks. Experience with data processing and analysis using KQL, SQL, Splunk, or PowerBI. Strong understanding of SDLC, DevOps methodologies, and CI/CD pipelines. Ability to work effectively in ambiguous environments and adapt to evolving security challenges. Excellent problem-solving, analytical, and communication skills. Ability to collaborate with security analysts, engineers, and leadership to drive automation initiatives. Responsibilities Design and implement automation solutions to improve security operations efficiency and effectiveness. Identify automation opportunities and develop scripts, workflows, and integrations. Contribute to engineering requirements that enhance security posture through automation. Work with security teams to enhance detection, triage, and response processes using automation. Ensure high availability and reliability of automation platforms. Develop and maintain technical documentation related to automation workflows and integrations. Analyze operational performance data and identify opportunities for automation-driven enhancements. Zartner across teams to drive holistic solutions to systemic security challenges. Support SOC teams by developing automation tools for precision alerting, faster triage, and optimized response processes. Advocate for automation best practices and innovative solutions within the organization. Benefits/perks listed below may vary depending on the nature of your employment with Microsoft and the country where you work.  Industry leading healthcare  Educational resources  Discounts on products and services  Savings and investments  Maternity and paternity leave  Generous time away  Giving programs  Opportunities to network and connect Microsoft is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations.

Posted 1 week ago

Apply

0 years

0 Lacs

Delhi, India

Remote

Linkedin logo

As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn’t changed — we’re here to stop breaches, and we’ve redefined modern security with the world’s most advanced AI-native platform. Our customers span all industries, and they count on CrowdStrike to keep their businesses running, their communities safe and their lives moving forward. We’re also a mission-driven company. We cultivate a culture that gives every CrowdStriker both the flexibility and autonomy to own their careers. We’re always looking to add talented CrowdStrikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you. About The Role Join the CrowdStrike mission to stop breaches as a technical expert working with our largest Global System Integrators and Telco partners. Ideal candidates are based close to Bengaluru, Delhi, or Mumbai, and have strong experience in architecting and enabling security solutions with major GSI and Telco partners, transforming how they deliver cybersecurity to their customers. Working closely with our Global Alliance Managers, you'll shape how global partners build and deliver next-generation security services using CrowdStrike's technology. As a Solution Architect, you will be part of the team revolutionizing the cybersecurity landscape through CrowdStrike's AI-Native Security Platform. Working with the world's leading technology partners, your expertise will directly influence how major global partners protect millions of endpoints and help organizations worldwide secure their customers. What You'll Do Lead, proactively engage, and build trusted relationships with partners’ key technical counterparts to achieve technical proficiency and self-sufficiency in service delivery and platform implementation Architect and design security services with partners, leveraging CrowdStrike's Falcon platform capabilities Drive platform adoption strategy, helping partners build comprehensive security offerings Drive technical strategy and growth with assigned Global System Integrators and Telco partners Develop and execute long-term technical plans supporting go-to-market initiatives Build and maintain relationships with partner technical and sales leadership teams across endpoint, cloud, identity and data protection Guide partners in embedding Falcon Platform within their managed services portfolio Design technical solutions that integrate CrowdStrike into partners' existing security services Create and deliver technical training programs enabling partners to demo, deploy, and support CrowdStrike solutions Support POC/POV methodologies and provide competitive positioning guidance Participate in quarterly business reviews and technical planning sessions Drive technical partner programs including Falcon Champions Represent CrowdStrike at partner events and conferences Bridge communication between partners and CrowdStrike technical teams Oversee proper usage of partner resources and demo environments What You'll Need Proven track record in Technical Consulting or Solution Architecture with GSI / MSPs Partners Strong background in endpoint security, cloud security, and zero-trust architectures Experience designing and implementing security solutions at enterprise scale Hands-on experience with major cloud platforms (AWS, Azure, GCP) Working knowledge of SIEM/XDR solutions and security operations Technical expertise in endpoint protection, identity management, and cloud workload security Experience with API integration and basic scripting capabilities Understanding of threat intelligence and incident response methodologies Strong communication and presentation skills, able to engage technical and business audiences Ability to build and maintain technical relationships at all levels Self-motivated with excellent organizational and problem-solving skills Comfortable working autonomously in a fast-paced environment Ability to travel regularly to partner offices, corporate locations, and industry events within India and, occasionally, worldwide Fluent English Industry certifications (CISSP, SANS, etc.) preferred Benefits Of Working At CrowdStrike Remote-friendly and flexible work culture Market leader in compensation and equity awards Comprehensive physical and mental wellness programs Competitive vacation and holidays for recharge Paid parental and adoption leaves Professional development opportunities for all employees regardless of level or role Employee Networks, geographic neighborhood groups, and volunteer opportunities to build connections Vibrant office culture with world class amenities Great Place to Work Certified™ across the globe CrowdStrike is proud to be an equal opportunity employer. We are committed to fostering a culture of belonging where everyone is valued for who they are and empowered to succeed. We support veterans and individuals with disabilities through our affirmative action program. CrowdStrike is committed to providing equal employment opportunity for all employees and applicants for employment. The Company does not discriminate in employment opportunities or practices on the basis of race, color, creed, ethnicity, religion, sex (including pregnancy or pregnancy-related medical conditions), sexual orientation, gender identity, marital or family status, veteran status, age, national origin, ancestry, physical disability (including HIV and AIDS), mental disability, medical condition, genetic information, membership or activity in a local human rights commission, status with regard to public assistance, or any other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social/recreational programs--on valid job requirements. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an accommodation, please contact us at recruiting@crowdstrike.com for further assistance. Show more Show less

Posted 1 week ago

Apply

2.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

Role - Security Analyst Experience - 2+ years Location - Trivandrum About Role A Security Analyst job description typically involves protecting an organization's digital assets and infrastructure from cyber threats. This includes monitoring systems for suspicious activity, investigating security incidents, and implementing security measures to prevent breaches. Security Analysts also help develop and maintain security policies and procedures, and provide security training and awareness to users Keyskills Strong analytical and problem-solving skills. Knowledge of network security principles and technologies. Familiarity with security tools and technologies, such as firewalls, intrusion detection systems, and SIEM tools. Ability to communicate technical information clearly and concisely. Experience with incident response and vulnerability management. Understanding of security standards and regulations. Ability to work independently and as part of a team. Certifications such as CISSP, CEH, or CompTIA Security+ are often beneficial (ref:hirist.tech) Show more Show less

Posted 1 week ago

Apply

10.0 years

0 Lacs

Itanagar, Arunachal Pradesh, India

Remote

Linkedin logo

Job Description Job Title : Splunk ITSI Engineer Location : 100% Remote (India Only) Experience : 10+ Years Total, 5+ Years Recent in Pharma Domain Job Summary We are a global healthcare organization dedicated to making life better for people around the world. With a mission centered on innovation, care, and improving disease management, we are seeking passionate professionals committed to making a meaningful impact. Our team is looking for a Splunk ITSI Engineer to enhance enterprise observability and IT operations through Splunk's powerful cloud and intelligence solutions. Requirements 4 - 5+ years of hands-on Splunk experience 3 - 5+ years of Splunk ITSI (IT Service Intelligence) development experience (mandatory) 4 - 8 years of overall industry experience as a technology practitioner Successful implementation experience with Splunk Cloud at an enterprise level is a plus Skilled in gathering requirements, analyzing and documenting them, and supporting testing : Prior experience supporting Splunk Enterprise Cloud in a large enterprise (>5,000 servers) Expertise in developing Splunk ITSI glass tables, service trees, correlation searches, KPIs, and notable event aggregation policies Splunk Certification (or equivalent real-world experience) - Preferred Experience in enterprise-scale operations and maintenance environments Minimum 2+ years of experience with rule creation and advanced logic in Splunk Familiarity with cloud runtime services (AWS EC2, Lambda, CloudWatch, Azure Functions, etc.) Strong communication skills - both written and verbal Ability to interface effectively with end users and stakeholders Primary Responsibilities Engineer, configure, administer, and support the enterprise observability platform, including Splunk Cloud, ITSI, and Infrastructure Monitoring (Enterprise Edition) Develop ITSI glass tables, service trees, entity designs, KPIs, and correlation searches Build front-end searches, dashboards, and reports using Splunks SPL (Search Processing Language) for IT operations and threat detection Perform root-cause analysis and provide post-implementation support Independently create low-level design artifacts and contribute to high-level designs Scale and expand use cases, integrating new data sources into Splunk Conduct Splunk health checks, optimize search performance, and enhance platform efficiency Provide knowledge transfer sessions to IT engineers and Ops analysts Collaborate with risk, compliance, and cybersecurity teams to align with log management and SIEM standards Improve log ingestion and management through automation and architectural best practices Design and implement dashboards and reports to support business goals Work with stakeholders to continuously improve the companys SIEM posture Ensure high system availability (24x7 uptime) Identify opportunities to enhance system performance, availability, and reliability (ref:hirist.tech) Show more Show less

Posted 1 week ago

Apply

2.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Description and Requirements "At BMC trust is not just a word - it's a way of life!" Description And Requirements CareerArc Code CA-JF Hybrid "At BMC trust is not just a word - it's a way of life!" We are an award-winning, equal opportunity, culturally diverse, fun place to be. Giving back to the community drives us to be better every single day. Our work environment allows you to balance your priorities, because we know you will bring your best every day. We will champion your wins and shout them from the rooftops. Your peers will inspire, drive, support you, and make you laugh out loud! We help our customers free up time and space to become an Autonomous Digital Enterprise that conquers the opportunities ahead - and are relentless in the pursuit of innovation! Our IS&T (Information Services and Technology) department provides all the required technology and operational support services to run our business here in BMC! We have over 200 servers on premises to support production, disaster recovery, databases, applications and over 1000 servers in Lab environment. IS&T is transformational not only for BMC but also for the customer experience, because we give a 360 degrees view to the customer about the products they should know, opportunities in the pipeline, and any service issues outstanding with the customer. We use cutting-edge technologies to manage BMC's infrastructure and showcase it to the customers – program is called BMC on BMC! We are seeking a proactive and technically capable Cyber Threat Management Engineer to join our cybersecurity threat management team. This early-career role is ideal for individuals with foundational experience in cybersecurity who are ready to grow their technical skills and contribute to BMC’s threat detection and response capabilities. You will play an integral part in identifying, analyzing, and mitigating cyber threats across BMC’s global environment. Here is how, through this exciting role, YOU will contribute to BMC's and your own success: Monitor and analyze data from security systems including open source and enterprise solutions. Effectively communicate identified threats and track remediations until completion. Participate in the investigation and technical analysis of security incidents and provide remediation guidance. Integrate threat intelligence feeds and use frameworks like MITRE ATT&CK to assess and defend against current adversary tactics. Contribute to automation initiatives to streamline threat detection, alerting, and response workflows. Support threat hunting and red team exercises. Document findings, techniques, and outcomes in knowledge bases and reports. To ensure you’re set up for success, you will bring the following skillset & experience: Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field—or equivalent hands-on experience. Foundational experience (e.g., 1–2 years) in cybersecurity operations, threat analysis, or incident response. Proficiency with at least one SIEM platform (e.g., Splunk, QRadar, Sentinel). Proficiency with enterprise solutions providing dark web monitoring, attack surface management, threat intelligence, and risk rating. Understanding of network protocols, operating systems, and cybersecurity fundamentals. Strong scripting or automation skills (e.g., Python, PowerShell, Bash) Excellent communication and documentation abilities. Whilst these are nice to have, our team can help you develop in the following skills: Familiarity with threat intelligence tools and frameworks (e.g., MISP, STIX/TAXII). Knowledge of cloud security practices (AWS, Azure, or GCP). Relevant certifications such as CompTIA Security+, CySA+, SC-200, or GIAC (GCIH, GCIA, GCTI). Curiosity for cybersecurity and continuous learning. BMC Software maintains a strict policy of not requesting any form of payment in exchange for employment opportunities, upholding a fair and ethical hiring process. At BMC we believe in pay transparency and have set the midpoint of the salary band for this role at 1,725,800 INR. Actual salaries depend on a wide range of factors that are considered in making compensation decisions, including but not limited to skill sets; experience and training, licensure, and certifications; and other business and organizational needs. The salary listed is just one component of BMC's employee compensation package. Other rewards may include a variable plan and country specific benefits. We are committed to ensuring that our employees are paid fairly and equitably, and that we are transparent about our compensation practices. ( Returnship@BMC ) Had a break in your career? No worries. This role is eligible for candidates who have taken a break in their career and want to re-enter the workforce. If your expertise matches the above job, visit to https://bmcrecruit.avature.net/returnship know more and how to apply. Show more Show less

Posted 1 week ago

Apply

10.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Job Description : Cyber Security Analyst L3 Position Overview We are seeking a highly skilled and experienced Cyber Security Analyst L3 to join our team. The ideal candidate will have strong expertise in cybersecurity investigation strategies, incident response, malware analysis, and advanced threat investigation techniques. The role also requires proficiency in open-source SIEM tools, EDR platforms, cloud security assessments, and server hardening practices. This position involves working with US-based clients and requires excellent communication skills. Key Responsibilities Threat Investigation & Incident Response : Develop and implement advanced investigation strategies for cybersecurity incidents. Conduct detailed log analysis to identify threats, anomalies, and potential breaches. Perform malware analysis to understand behavior and mitigate threats. Manage end-to-end incident response processes and root cause analyses. Open-Source SIEM Expertise : Operate and integrate open-source SIEM platforms such as Wazuh, AlienVault, and others. Configure and fine-tune SIEM to enhance log ingestion, rule creation, and threat detection. Endpoint Detection and Response (EDR) : Investigate incidents using EDR solutions like Microsoft Defender, CrowdStrike, Carbon Black, and SentinelOne. Analyze endpoint telemetry and execute threat hunting processes. Cloud Security : Conduct cloud security reviews for platforms such as AWS, Azure, and Google Cloud. Provide recommendations to strengthen cloud architecture and user authentication processes. Server Hardening & CIS Benchmarks : Implement server hardening techniques based on CIS benchmarks. Perform security assessments to address identified vulnerabilities. Threat Intelligence & SOAR Integration : Leverage threat intelligence platforms to proactively identify and mitigate potential threats. Work on SOAR (Security Orchestration, Automation, and Response) platforms to automate incident handling processes. Incident Handling & Communication : Lead incident handling efforts, coordinating with internal and external stakeholders. Provide clear, concise, and actionable communication to technical and non-technical audiences. Linux & Log Analysis : Review and analyze Linux system logs to identify potential security issues. Investigate unauthorized access attempts and system anomalies. Client Management : Collaborate with US-based clients, ensuring their cybersecurity needs are met. Deliver regular reports, updates, and recommendations to clients. Required Skills And Qualifications 10+ years of hands-on experience in cybersecurity, incident response, and threat investigation. Expertise in open-source SIEM platforms like Wazuh, AlienVault, and their integration. Proficiency with EDR solutions such as Microsoft Defender, CrowdStrike, Carbon Black, and SentinelOne. Strong knowledge of cloud security best practices and architecture reviews. Experience in server hardening following CIS benchmarks. Familiarity with SOAR platforms and threat intelligence tools. Solid understanding of Linux systems and log review methodologies. Excellent communication skills for client interactions and technical reporting. Proven ability to work with international clients, especially in the US. Preferred Certifications Certified Information Systems Security Professional (CISSP) Certified Incident Handler (GCIH) Certified Ethical Hacker (CEH) Microsoft Certified: Azure Security Engineer Associate AWS Certified Security Specialty This role provides an excellent opportunity for growth and exposure to advanced cybersecurity practices while working with a global team. Apply now. (ref:hirist.tech) Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Required Education/Qualifications/Experience Bachelor's degree in information technology, information security, computer science, or related field One plus (1+) years of experience working with security solutions and technologies One plus (1+) years of experience working with information/endpoint/network security : Security Operations Center experience Experience with Endpoint Protection Platforms, Network Intrusion Protection Systems, and Web Application Firewalls Required Skills/Abilities Basic knowledge of security incident response processes Working knowledge of Information Security technologies (EDR, NDR, IPS, WAF, SIEM, etc.) Understanding of networking protocols (TCP/IP), security methodologies (ACL/NAC), and topologies Working knowledge of Windows and Linux OS Strong critical thinking and problem-solving skills Ability to communicate effectively with other team members Excellent attention to detail and follow-through to completion Ability to handle multiple tasks in a fast-paced and deadline-driven environment Desired Skills/Abilities Solid understanding of Information Security Methodology Working knowledge of analyzing, responding, and remediating network intrusions, web app, and server attacks Working knowledge of scripting (PowerShell, Bash, Python) Knowledge of containerization concepts and tools (Kubernetes, Docker, etc.) Knowledge of root cause determination - Understanding of impacts to environment and clients WORKING Environment/Physical Demands Work at assigned locations Perform tasks for long periods of time on a computer Regular attendance and a regular work schedule are essential functions of this job Work includes on call rotations as part of a 24/7/365 team (ref:hirist.tech) Show more Show less

Posted 1 week ago

Apply

Exploring SIEM Jobs in India

The Security Information and Event Management (SIEM) job market in India is thriving, with a growing demand for professionals who can monitor, analyze, and respond to security incidents in real-time. SIEM jobs offer lucrative career opportunities for individuals with a strong understanding of cybersecurity concepts and technologies.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Delhi/NCR
  5. Mumbai

Average Salary Range

The average salary range for SIEM professionals in India varies based on experience level: - Entry-level: INR 4-6 lakhs per annum - Mid-level: INR 8-12 lakhs per annum - Experienced: INR 15-20 lakhs per annum

Career Path

Career progression in the SIEM field typically follows a path from: - SIEM Analyst - SIEM Engineer - SIEM Consultant - SIEM Architect

Related Skills

In addition to SIEM expertise, professionals in this field are often expected to have knowledge of: - Network Security - Incident Response - Threat Intelligence - Security Operations Center (SOC) operations

Interview Questions

  • What is SIEM and how does it work? (basic)
  • Can you explain the difference between IDS and SIEM? (medium)
  • How would you handle a security incident detected by the SIEM tool? (medium)
  • What are some common challenges faced when implementing a SIEM solution? (advanced)
  • How do you stay updated with the latest cybersecurity threats and trends? (basic)
  • Can you describe a successful SIEM deployment project you were involved in? (medium)
  • What are some key performance indicators (KPIs) used to measure the effectiveness of a SIEM system? (advanced)
  • How do you ensure compliance with industry regulations using a SIEM tool? (medium)
  • Explain the concept of correlation rules in SIEM. (medium)
  • How do you handle false positives in a SIEM system? (advanced)
  • Describe a time when you had to troubleshoot a SIEM-related issue. (medium)
  • What are the benefits of integrating threat intelligence feeds with a SIEM tool? (medium)
  • Can you explain the concept of log aggregation in the context of SIEM? (basic)
  • How do you prioritize security alerts generated by a SIEM tool? (medium)
  • What are the key components of a SIEM architecture? (advanced)
  • How would you assess the effectiveness of a SIEM tool in an organization? (medium)
  • What are some best practices for SIEM tuning and optimization? (advanced)
  • How do you handle data retention and storage requirements in a SIEM system? (medium)
  • Explain the role of machine learning in enhancing SIEM capabilities. (advanced)
  • How do you ensure the confidentiality and integrity of SIEM data? (medium)
  • Can you discuss the importance of user behavior analytics in a SIEM environment? (medium)
  • What are the limitations of a SIEM tool and how can they be overcome? (advanced)
  • How do you collaborate with other teams (e.g., IT, compliance) to enhance SIEM operations? (medium)
  • Describe a time when you had to communicate a complex security incident detected by the SIEM to non-technical stakeholders. (medium)

Closing Remark

As you explore SIEM jobs in India, remember to continuously upgrade your skills, stay informed about the latest cybersecurity trends, and practice answering interview questions to showcase your expertise confidently. With the right preparation and dedication, you can excel in the dynamic field of SIEM and carve out a successful career for yourself. Good luck!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies