Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
15.0 years
0 Lacs
Hyderābād
On-site
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Accenture MxDR Ops Security Threat Analysis Good to have skills : NA Minimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary: As a Security Engineer, you will apply your security skills to design, build, and protect enterprise systems, applications, data, assets, and people. Your typical day will involve collaborating with various teams to implement security measures, conducting assessments to identify vulnerabilities, and ensuring that the organization's information and infrastructure are safeguarded against potential cyber threats. You will also engage in continuous learning to stay updated on the latest security trends and technologies, contributing to a secure environment for all stakeholders. Roles & Responsibilities: - Expected to perform independently and become an SME. - Required active participation/contribution in team discussions. - Contribute in providing solutions to work related problems. - Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements. - Collaborate with cross-functional teams to implement security best practices and ensure compliance with industry standards. Professional & Technical Skills: - Must To Have Skills: Proficiency in Accenture MxDR Ops Security Threat Analysis. - Strong understanding of security frameworks and methodologies. - Experience with incident response and threat hunting. - Familiarity with security information and event management (SIEM) tools. - Knowledge of network security protocols and practices. Additional Information: - The candidate should have minimum 2 years of experience in Accenture MxDR Ops Security Threat Analysis. - This position is based at our Hyderabad office. - A 15 years full time education is required. 15 years full time education
Posted 1 week ago
0.0 years
4 - 7 Lacs
Hyderābād
On-site
POSITION SUMMARY Zoetis, Inc. is the world's largest producer of medicine and vaccinations for pets and livestock. The Zoetis Tech & Digital (ZTD) Global Technology Risk Management Organization is a key building block of ZTD. Join us at Zoetis India Capability Center (ZICC) in Hyderabad, where innovation meets excellence. As part of the world's leading animal healthcare company, ZICC is at the forefront of driving transformative advancements and applying technology to solve the most complex problems. Our mission is to ensure sustainable growth and maintain a competitive edge for Zoetis globally by leveraging the exceptional talent in India. At ZICC, you'll be part of a dynamic team that partners with colleagues worldwide, embodying the true spirit of One Zoetis. Together, we ensure seamless integration and collaboration, fostering an environment where your contributions can make a real impact. Be a part of our journey to pioneer innovation and drive the future of animal healthcare. The Information Security Strategy & Risk Management team at Zoetis ensures a secure strategy through a disciplined process of making colleagues security savvy, driving down residual risk, reducing the attack surface, all while enabling the business. This team is responsible for critical services that strengthen Zoetis' security posture, including protecting sensitive data, identifying and mitigating cyber threats and seamlessly integrating secure assets during organizational changes. Key functions within the team include Security Operations, Vulnerability Management, Threat Intelligence, Security Awareness, Mergers & Acquisitions Security and Operational Technology (OT) Security. Through these services, the team empowers the organization to operate securely and efficiently in a dynamic digital environment. The SOC Analyst will work closely with onshore security teams to support day-to-day monitoring, triage and investigation of alerts across Zoetis. This role plays an essential part in ensuring the reliability and responsiveness of security operations, with a focus on accurate alert handling and continuous improvement in detection and response workflows. The SOC Analyst will assist in the investigation of suspicious activity, escalation of potential incidents and documentation of response actions. This individual will gain hands-on experience with security technologies such as EDR, SIEM and threat intelligence tools while supporting ongoing tuning efforts and participating in post-incident reviews. Working as part of a global 24/7/365 team, the analyst will collaborate closely with peers and senior analysts to strengthen the SOC’s ability to detect, analyze and respond to cyber threats across the enterprise. POSITION RESPONSIBILITIES Percent of Time Partner with onshore SOC and incident response teams to triage, escalate and assist in the investigation of endpoint-related alerts using CrowdStrike EDR and SIEM. Analyze and interpret SIEM detections and endpoint telemetry to understand alert context, assess severity and support appropriate response actions. Contribute feedback on alert fidelity by documenting false positives, missed detections and behavioral anomalies encountered during investigations. Support efforts to improve endpoint visibility by assisting with sensor health checks, basic policy verification and telemetry validation activities. Participate in investigations of suspicious activity by gathering relevant data from EDR, SIEM and threat intelligence sources to aid in root cause analysis. Collaborate with senior analysts and cross-functional teams such as Threat Intel, Vulnerability Management, OT and Incident Response to contextualize alerts and broaden investigative scope. Assist in reviewing and updating incident response playbooks and SOPs to ensure alignment with current tools and team workflows. Follow established escalation procedures, documenting investigative steps clearly and contributing to knowledge sharing within the team. Help monitor the effectiveness of detections and response actions by tracking alert trends and contributing to internal metrics and reporting. Stay informed on emerging threats, attacker behaviors and security platform updates to continue building knowledge and improving investigation skills. Willingness to work in 24x7 rotational shifts including night and weekend shifts 100% ORGANIZATIONAL RELATIONSHIPS Collaborates closely with onshore security teams, including Security Operations, Vulnerability Management, Threat Intelligence, Operational Technology (OT), IDAM, Cloud Security and Security Awareness. Works with cross-functional teams such as Infrastructure, Application Development and Cloud Engineering to ensure seamless integration and operation of security tools. Partners with Identity and Access Management teams to implement and maintain secure access controls. Engages with external vendors and service providers to evaluate and integrate third-party security solutions. Coordinates with internal stakeholders to align security initiatives with business objectives and compliance requirements. EDUCATION AND EXPERIENCE Education: University Degree in Computer Science or Information Systems is required. MS or advanced identity courses or other applicable certifications is desirable. Relevant certifications in infrastructure security and vulnerability management, such as SANS GCIH, Offensive Security Certified Professional (OSCP) are highly preferred. Experience: A minimum of 0 to 1 year of relevant experience with a strong background in security operations, CrowdStrike EDR, threat intelligence and security engineering. 1+ years of experience in the pharmaceutical or other regulated industry, especially Animal Health. Experience working with global teams across multiple time zones. Demonstrated ability to work within diverse technical teams. TECHNICAL SKILLS REQUIREMENTS Working knowledge of security technologies such as EDR (CrowdStrike), SIEM platforms and basic exposure to threat intelligence and detection concepts. Basic familiarity with scripting or automation using Python, PowerShell, or Bash to support investigation workflows and alert enrichment. Exposure to cloud platforms (AWS, Azure, GCP) and a general understanding of cloud security fundamentals relevant to monitoring and response. Foundational understanding of network security principles, including firewalls, IDS/IPS, VPNs and modern access models like zero-trust. Experience working with or exposure to identity and access management (IAM) solutions such as Azure AD, Secret Server, or SailPoint in a security operations context. Understanding of core incident response processes, basic threat detection workflows and the role of vulnerability management in SOC operations. Awareness of encryption technologies, secure communication protocols and security best practices relevant to threat detection. Strong analytical thinking and the ability to interpret alert data, logs and telemetry to identify unusual patterns or behaviors. Familiarity with security compliance standards (e.g., GDPR, HIPAA, PCI DSS) and how they relate to incident documentation and escalation. Clear and professional communication skills, with the ability to document investigations and contribute effectively within a global security team. Full time
Posted 1 week ago
3.0 years
0 Lacs
Hyderābād
On-site
At Deliveroo, it is our mission to build the definitive food company. In order to do that, we’re building a company where everyone can belong, grow and do the best work of their lives. As a Threat Intelligence & Hunting analyst you’ll be part of a growing Security Operations team who are focused on detecting attacks against a backdrop of an ever-advancing cyber threat landscape with automation at the heart of everything we do. You’ll be responsible for performing in-depth research into the threats most likely to target Deliveroo, and then using this research to produce actionable insights, perform proactive threat investigations and take actions to secure our IT environment. This position operates during regular business hours and does not require shift work. The role is a unique opportunity to be part of the overall Security Operations strategy where you can harness our existing process and technology investments and bring new ways of working to help us protect our employees, customers, riders and restaurants. As we continue to grow our business, your specialist capabilities will play a key part in our story. What you’ll be doing Analyse and contextualise complex threat intelligence data to make it accessible and actionable for broader business use. Develop detailed and actionable threat intelligence and threat hunting reports for internal and external stakeholders Keep an eye on external cyber threat data to actively hunt for threat traces and effective respond to mitigate risks Evaluate the quality, accuracy and reliability of gathered intelligence sources to ensure quality insights. Conduct in-depth research on cyber threat trends, focusing on malware, vulnerabilities, and indicators of compromise (IOCs). Perform proactive threat hunting activities in our IT environment based on your own research, to identify evidence of malicious activity. Engineer new detection content to ensure we can continuously monitor and respond to the threats most likely to target Deliveroo. Analyse EDR, Cloud and SAAS log data for evidence of malicious activity and take action as required. Work alongside our incident response team to capture first hand experience of the threats targeting Deliveroo, and translate this into proactive threat intelligence and threat hunting activities that will help to secure our environment. Support other projects and tasks as assigned. Demonstrate a proactive approach to overcoming challenges and driving success. Foster strong relationships with internal security functions, key stakeholders in Enterprise Technology, and other relevant departments to ensure cohesive security efforts. Requirements At least 3 years experience in cybersecurity overall, with at least 1 year with a focus on threat intelligence / threat hunting Detailed understanding and experience with numerous types of cyber security incidents, attacks, and events. Previous use or strong understanding of CTI methodologies such as Diamond model or investigative frameworks such as MITRE ATT&CK and Cyber Kill Chain. Ability to write technical assessment reports that are accessible and understandable at all organisational levels. Experience in utilising commercial or open-source threat intelligence tools within an enterprise environment. Keen interest in dark web analysis using specialised tools and understanding the adversarial slang. Experience performing threat hunting tasks in an enterprise environment, or proven experience working closely with threat hunting teams. Ability to analyse various log sources (e.g. EDR, AWS CloudTrail, Google Workspace) for evidence of malicious activity. Experience or a keen interest in detection engineering, such as using EDR/XDR or SIEM/SOAR tools. Understanding of Security Operations and response in an enterprise environment, including supporting technologies and methodologies. Strong presentation and communication skills, both verbal and written. Preferred, but not required Malware analysis Scripting experience, e.g. Python Why Deliveroo? Our mission is to be the definitive food company. We are transforming the way the world eats by making food more convenient and accessible. We give people the opportunity to eat what they want, when and where they want it. We are a technology-driven company at the forefront of the most rapidly expanding industry in the world. We are still a small team, making a very large impact, seeking to answer some of the most interesting questions out there. We move fast, value autonomy and ownership, and we are always looking for new ideas. Workplace & Diversity At Deliveroo we know that people are the heart of the business and we prioritise their welfare. We offer a wide range of competitive benefits in areas including health, family, finance, community, convenience, growth and relocation. We believe a great workplace is one that represents the world we live in and how beautifully diverse it can be. That means we have no judgement when it comes to any one of the things that make you who you are - your gender, race, sexuality, religion or a secret aversion to coriander. All you need is a passion for (most) food and a desire to be part of one of the fastest growing startups in an incredibly exciting space.
Posted 1 week ago
4.0 years
0 Lacs
Gurgaon, Haryana, India
On-site
Should have strong knowledge in MS Sentinel SIEM engineering and administrative activities. People who are in operational profiles cannot apply for this position. Should have performed SIEM engineering role more than 4+ years. Problem solving & People management skill is required. Should have expertise in building custom analytical rules, tuning of analytical rules, building automation through Azure logic apps, management of entire product feature, end to end configuration. Should have expertise in forming KQL queries and functions for complex detection and monitoring requirements. Should have strong knowledge in MITRE attack framework and expertise in developing analytical rules and custom dashboards/workbooks across framework. Should have expertise in log management, retentions, maintenance of logs at low cost, performing access management, developing new custom dashboard based on different requirements. Should have proven record of implementing Sentinel advanced features, efficient log collection mechanisms, deployment and maintenance of log forwarders, maintenance of local agents. Should have expertise in integrating data sources which are not supported by Sentinel tool OOB. Custom parser development and ability to solve technical issues in Sentinel are must have requirements. Should have ability to prepare and maintain policy and procedure documentations around SIEM technology, document life cycle management skill is required. Should have expertise in consuming contents from content hub and management of log analytics workspace and ability to handle issues in MMA and AMA agents. Should have proven record of participation in customer or client reviews or global certifications regarding security controls in SIEM. Compliance and regulatory requirements understandings are good to have. Preference will be given for candidates completed Sentinel Ninja Level 400 Training and Certification. Good to have strong knowledge in Microsoft Sentinel pricing, Microsoft defender products, Microsoft Cloud services and Azure Arc. Should have ability to work with stakeholders to solve technical issues and also to support and deliver complex business, security and operational requirements. Should have ability to work with vendor technical support group and driving issues towards effective and permanent closure. Having knowledge and hands-on experience in Microsoft Defender XDR stack will be an added advantage. Show more Show less
Posted 1 week ago
2.0 - 5.0 years
6 - 10 Lacs
Mumbai
Work from Office
Your day at NTT DATA The Security Managed Services Engineer (L1) is an entry level engineering role, responsible for providing a managed service to clients to ensure that their Firewall infrastructure remain operational through proactively identifying, investigating, and routing the incidents to correct resolver group. The primary objective of this role is to ensure zero missed service level agreement (SLA) conditions and focuses on first-line support for standard and low complexity incidents and service requests. The Security Managed Services Engineer (L1) may also contribute to support on project work as and when required. What you'll be doing Responsibilities: Configure and maintain the SIEM system, ensuring that it's properly set up to collect and analyze security event data. Develop, customize, and manage security rules within the SIEM to detect and respond to security threats. Monitor SIEM alerts, investigate them, and take appropriate actions based on the severity and nature of the alerts. Oversee the collection, normalization, and storage of log data from various sources. Develop and document incident response procedures, and lead or assist in incident response efforts when security incidents occur. Analyze and investigate security events from various sources. Manage security incidents through all incident response phases to closure. Utilize SIEM, SOAR, UEBA, EDR, NBAD, PCAP, Vulnerability Scanning, and Malware analysis technologies for event detection and analysis. Update tickets, write incident reports, and document actions to reduce false positives. Develop knowledge of attack types and finetune detective capabilities. Identify log sources and examine system logs to reconstruct event histories using forensic techniques. Align SIEM rules and alerts with the LICs security policies and compliance requirements. Conduct computer forensic investigations, including examining running processes, identifying network connections, and disk imaging. Maintain and support the operational integrity of SOC toolsets. Collaborate with SIEM solution vendors for updates, patches, and support to ensure the system's reliability and effectiveness. Maintain thorough documentation of the SIEM system's configuration, procedures, and incident response plans. Proactively identify and report system security loopholes, infringements, and vulnerabilities to the Security Operations Centre Manager in a timely manner. Work closely with other IT and security teams during incident response, coordinating efforts and sharing information to mitigate security incidents effectively. Ensure that the SIEM system helps the LIC meet regulatory compliance requirements and is ready for security audits. Continuously optimize the SIEM system for efficient performance, ensuring it can handle the volume of data and remain responsive. Develop automation scripts and workflows to streamline common security response tasks and enhance efficiency. Workplace type : On-site Working
Posted 1 week ago
1.0 years
2 - 3 Lacs
India
On-site
Job Title: SOC L1 Analyst Experience: 1+ Years Location: Ahmedabad – Gujarat Employment Type: Full-Time [Rotational Shift, Exclusive Morning Shift] Department: SOC Department No of Position: 4 Key Job Responsibilities: · Work in a 24x7 rotational shift environment to ensure uninterrupted security monitoring. · Maintain continuous situational awareness ("eyes on glass") by actively monitoring all logs and alerts. · Detect incidents by monitoring SIEM console activities, including rules, reports, and dashboards. · Monitor SIEM resources to identify anomalies or unusual behavior. · Escalate incidents in accordance with defined SLAs when resolution thresholds are not met. · Monitor and ensure the operational health of the SIEM platform. · Support the SOC team in incident detection, analysis, and resolution processes. · Continuously monitor and analyze security alerts and events from multiple sources to identify and assess potential security incidents. · Lead in-depth investigations of security incidents, including determining root causes, assessing impact, and recommending appropriate response measures. · Coordinate and execute incident response activities to contain, eradicate, and recover from high-severity security incidents. · Collaborate with L2 SOC teams to prioritize, escalate, and manage security events effectively. · Maintain thorough documentation of incidents, including findings, actions taken, timelines, and strategic recommendations for future improvements. · Administer and optimize security tools and technologies within the SOC environment to ensure their effective performance. · Work closely with cross-functional teams (IT, network operations, system administrators) to coordinate and streamline incident response efforts. · Communicate incident status, remediation actions, and post-incident insights to both internal and external stakeholders. · Actively contribute to the development and continuous improvement of SOC procedures, workflows, and incident response strategies. · Stay updated on emerging cyber threats, industry trends, and advancements in security tools to enhance SOC capabilities. Qualifications: Bachelor’s or Master’s degree in Computer Science, Information Security, Cybersecurity, or a related field (or equivalent work experience), with a specialization in Cybersecurity preferred. Proven experience in a SOC environment, with a strong focus on incident response and advanced analysis. In-depth knowledge of cybersecurity principles, threat landscapes, and complex attack vectors. Proficiency with security technologies, including SIEM, IDS/IPS, firewalls, antivirus, and endpoint detection tools. Exceptional analytical and problem-solving skills, with a keen attention to detail. Strong communication skills, both written and verbal, with the ability to convey complex information clearly. Proven ability to thrive in a fast-paced environment and adapt to evolving priorities. Additional Certifications Required SIEM Certifications Other Cybersecurity Certifications Job Type: Full-time Pay: ₹200,000.00 - ₹350,000.00 per year Benefits: Cell phone reimbursement Paid time off Shift: Night shift Rotational shift Work Days: Monday to Friday Work Location: In person
Posted 1 week ago
0.0 - 5.0 years
1 - 1 Lacs
Hyderabad
Work from Office
SUMMARY Part-Time Weekend Job Join Barbeque Nation’s Team in Hyderabad Job Role: Weekend Supporting Staff Company: Barbeque Nation Location: Hyderabad Work Locations: Banjara Hills (Near City Center Mall) Gachibowli (SLN Terminus) Hitech City (Opposite Cyber Towers) Kukatpally (Forum Sujana Mall) Begumpet (Near Lifestyle Building) Shift Timing: 12:00 PM 9:00 PM Work Days: Saturday and Sunday Estimated Monthly Earnings: 5,000 7,000 Work 9 hours and earn extra income every weekend Key Responsibilities: Assist kitchen and service staff Serve starters, beverages, and non-vegetarian items (including chicken) Maintain cleanliness in service and dining areas Ensure smooth dining operations Requirements: No prior experience required (orientation provided) Must be energetic, disciplined, and customer-friendly Comfortable handling non-vegetarian food Age 18+ and available on both days What We Offer: Quick payouts Flexible part-time weekend work Work experience with a reputed restaurant brand Apply Now Make your weekends productive with Barbeque Nation!
Posted 1 week ago
2.0 - 5.0 years
6 - 10 Lacs
Mumbai
Work from Office
Your day at NTT DATA The Security Managed Services Engineer (L1) is an entry level engineering role, responsible for providing a managed service to clients to ensure that their Firewall infrastructure remain operational through proactively identifying, investigating, and routing the incidents to correct resolver group. The primary objective of this role is to ensure zero missed service level agreement (SLA) conditions and focuses on first-line support for standard and low complexity incidents and service requests. The Security Managed Services Engineer (L1) may also contribute to support on project work as and when required. What you'll be doing Key Responsibilities: Configure and maintain the SIEM system, ensuring that it's properly set up to collect and analyze security event data. Develop, customize, and manage security rules within the SIEM to detect and respond to security threats. Monitor SIEM alerts, investigate them, and take appropriate actions based on the severity and nature of the alerts. Oversee the collection, normalization, and storage of log data from various sources.Develop and document incident response procedures, and lead or assist in incident response efforts when security incidents occur. Analyze and investigate security events from various sources. Manage security incidents through all incident response phases to closure. Utilize SIEM, SOAR, UEBA, EDR, NBAD,PCAP, Vulnerability Scanning, and Malware analysis technologies for event detection and analysis.Update tickets, write incident reports, and document actions to reduce false positives. Develop knowledge of attack types and finetune detective capabilities.Identify log sources and examine system logs to reconstruct event histories using forensic techniques.Align SIEM rules and alerts with the LICs security policies and compliance requirements. Conduct computer forensic investigations, including examining running processes, identifying network connections, and disk imaging.Maintain and support the operational integrity of SOC toolsets.Collaborate with SIEM solution vendors for updates, patches, and support to ensure the system's reliability and effectiveness. Maintain thorough documentation of the SIEM system's configuration, procedures, and incident response plans.Proactively identify and report system security loopholes, infringements, and vulnerabilities to the Security Operations Centre Manager in a timely manner. Work closely with other IT and security teams during incident response, coordinating efforts and sharing information to mitigate security incidents effectively.Ensure that the SIEM system helps the LIC meet regulatory compliance requirements and is ready for security audits. Continuously optimize the SIEM system for efficient performance, ensuring it can handle the volume of data and remain responsive.Develop automation scripts and workflows to streamline common security response tasks and enhance efficiency. Workplace type : On-site Working
Posted 1 week ago
4.0 - 7.0 years
7 - 11 Lacs
Mumbai
Work from Office
Your day at NTT DATA The Security Managed Services Engineer (L2) is a developing engineering role, responsible for providing a managed service to clients to ensure that their Security Infrastructures and systems remain operational. Through the proactive monitoring, identifying, investigating, and resolving of technical incidents and problems, this role is able to restore service to clients. The primary objective of this role is to proactively review client requests or tickets and apply technical/process knowledge to resolve them without breaching service level agreement (SLA) and focuses on second-line support for incidents and requests with a medium level of complexity. The Security Managed Services Engineer (L2) may also contribute to support on project work as and when required. What you'll be doing Key Responsibilities: Continuously monitor network traffic and system logs to identify signs of potential security threats or anomalies. Formulate hypotheses about potential threats based on analysis of existing data and threat intelligence. Collect and analyze data from various sources, including logs, network traffic, and security tools, to validate or refute hypotheses. Identify patterns and behaviors that may indicate malicious activity, such as unusual traffic patterns or unauthorized access attempts. Utilize a variety of cybersecurity tools and technologies, including SIEM, UEBA, PCAP, NBAD, etc. Document findings, actions taken, and recommendations in detailed reports for internal stakeholders and management. Recommend improvements to security policies, procedures, and controls based on threat hunting insights. Academic Qualifications and Certifications: Bachelor's degree, Information Security, or a related field. 5+ years of experience Relevant certifications: CEH/CSA is must Knowledge and Attributes: Ability to communicate and work across different cultures and social groups. Ability to plan activities and projects well in advance, and takes into account possible changing circumstances. Ability to maintain a positive outlook at work. Ability to work well in a pressurized environment. Ability to work hard and put in longer hours when it is necessary. Ability to apply active listening techniques such as paraphrasing the message to confirm understanding, probing for further relevant information, and refraining from interrupting. Ability to adapt to changing circumstances. Ability to place clients at the forefront of all interactions, understanding their requirements, and creating a positive client experience throughout the total client journey. Workplace type : On-site Working
Posted 1 week ago
4.0 - 8.0 years
12 - 16 Lacs
Mumbai, Mumbai Suburban, Mumbai (All Areas)
Work from Office
Monitor,analyze security events,alerts across various platforms. Investigate potential security incidents,escalate as appropriate,following defined incident response processes. Correlate events from multiple sources to identify patterns or anomalies Required Candidate profile Lead,participate in threat hunting activities to proactively identify potential threats vulnerabilities Serve as the administrator for SOC tools including SIEM, EDR, SOAR,threat intelligence platforms Perks and benefits To be disclosed post interview
Posted 1 week ago
2.0 - 5.0 years
4 - 7 Lacs
Mumbai
Work from Office
Your day at NTT DATA The Security Managed Services Engineer (L1) is an entry level engineering role, responsible for providing a managed service to clients to ensure that their Firewall infrastructure remain operational through proactively identifying, investigating, and routing the incidents to correct resolver group. The primary objective of this role is to ensure zero missed service level agreement (SLA) conditions and focuses on first-line support for standard and low complexity incidents and service requests. The Security Managed Services Engineer (L1) may also contribute to / support on project work as and when required. What youll be doing Key Responsibilities: Configure and maintain the SIEM system, ensuring that its properly set up to collect and analyze security event data. Develop, customize, and manage security rules within the SIEM to detect and respond to security threats. Monitor SIEM alerts, investigate them, and take appropriate actions based on the severity and nature of the alerts. Oversee the collection, normalization, and storage of log data from various sources. Develop and document incident response procedures, and lead or assist in incident response efforts when security incidents occur. Analyze and investigate security events from various sources. Manage security incidents through all incident response phases to closure. Utilize SIEM, SOAR, UEBA, EDR, NBAD, PCAP, Vulnerability Scanning, and Malware analysis technologies for event detection and analysis. Update tickets, write incident reports, and document actions to reduce false positives. Develop knowledge of attack types and finetune detective capabilities. Identify log sources and examine system logs to reconstruct event histories using forensic techniques. Align SIEM rules and alerts with the LICs security policies and compliance requirements. Conduct computer forensic investigations, including examining running processes, identifying network connections, and disk imaging. Maintain and support the operational integrity of SOC toolsets. Collaborate with SIEM solution vendors for updates, patches, and support to ensure the systems reliability and effectiveness. Maintain thorough documentation of the SIEM systems configuration, procedures, and incident response plans. Proactively identify and report system security loopholes, infringements, and vulnerabilities to the Security Operations Centre Manager in a timely manner. Work closely with other IT and security teams during incident response, coordinating efforts and sharing information to mitigate security incidents effectively. Ensure that the SIEM system helps the LIC meet regulatory compliance requirements and is ready for security audits. Continuously optimize the SIEM system for efficient performance, ensuring it can handle the volume of data and remain responsive. Develop automation scripts and workflows to streamline common security response tasks and enhance efficiency. Academic Qualifications and Certifications: Bachelors degree or equivalent qualification in IT/Computing (or demonstrated equivalent work experience). CEH certification is Must.
Posted 1 week ago
2.0 - 4.0 years
4 - 6 Lacs
Gurugram
Hybrid
Your day at NTT DATA The Security Technical Architect is a seasoned subject matter expert, responsible for designing robust security architectures for our systems, applications, and infrastructure. collaborate with cross-functional teams to ensure that technF2:F6ology solutions are secure, compliant, and aligned with industry best practices. Expertise in protecting sensitive data, mitigating risks, and maintaining the confidentiality, integrity, and availability of organizational systems is crucial in this role. What youll be doing Key Responsibilities: Designs and develops comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs. Viewed as a trusted technical advisor to the client. Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle. Provides pre-sales technical support and expertise in analyzing client requirements, in conjunction with the clients current collaboration capabilities. Provides guidance and expertise in secure coding practices, network security, identity and access management, data protection, and other security domains. Evaluates and selects security technologies, tools, and frameworks to support our security architecture Ensures technical solutions will accomplish the clients objectives. Defines and enforces security policies, standards, and procedures to ensure compliance with industry regulations and best practices. Leads incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team. Develops or produces the technical design document to match the solution design specifications. Working with the relevant internal stakeholders, participate or lead in scope of work determination, product pricing and RFP/RFI responses. Assists with the determination of outsourcing, product pricing and collaborates with others to develop an implementation solution. Responsible for influencing and guiding members of the Sales team and to ensure that they are equipped to close deals and maintain visibility of forecasting and sales pipeline in order to influence potential deals. Manages client proof of concept (POC) initiatives, which will require the involvement of the appropriate resources, and setup and delivery of the POC. On all assigned engagements, owns the proposed solution and transitions the build / implementation to the delivery team. Specifically relating to opportunity pursuit this role will evaluate each opportunity for alignment with organizational capabilities and business policy, prepare the executive summary that outlines all of the information gathered from the client in regard to their needs, as understood, document the proposed technology solution, document the statement of work along with all labor requirements, work with the relevant internal stakeholders to prepare the pricing format that will be supplied to the customer, perform the actual solution design and prepare a parts list outlining equipment to be provided, develop and manage a proof-of-concept as such may be required, engage all technical resources required for an accurate solution design, prepare a network diagram outlining the proposed solution, document all deliverables and what constitutes a successful completion, review the final parts list as supplied and submit all information to the applicable bid team for final assembly, verify the proposals accuracy and sign off on the final documents to be presented to the client, assist during the final presentation to the client as appropriate. Knowledge and Attributes: Solid client engagement skills coupled solid technical consulting aptitude. Understanding of the vendors products business and technology positioning. Excellent analytical and problem-solving skills, with the ability to assess risks, analyze complex security issues, and propose effective solutions. Ability to collaborate and communicate effectively with team members, contributing to their success. Broad product knowledge integrated with technology understanding. Strong knowledge of security domains, including network security, application security, cloud security, data protection, identity and access management, cryptography, and secure coding practices. Proficiency in enterprise architecture principles, frameworks (such as TOGAF), and architectural patterns for designing secure and scalable systems. In-depth understanding of security regulations, standards, and frameworks (such as ISO 27001, NIST, PCI DSS) and their practical application Basic understanding of key vendor subscription models such as Cisco EA 3.0. Academic Qualifications and Certifications: Bachelors degree in information technology, computer science or information systems or a related field. Certification and working knowledge of Enterprise Architecture methodologies (for example, TOGAF, Zachman, SOA, ITIL, COBIT, etc.). Vendor product, sales and technology certifications. Software and programming languages, for example, C++. SAFe Scaled Agile certification advantageous. Additional certifications, such as CISSP, CISM, or GIAC are highly desirable. Required Experience: Seasoned professional technical experience within a large scale (preferably multi-national) technology services environment Seasoned experience as a Security Technical Architect or a similar role, designing and implementing security architectures for complex systems and applications. Seasoned experience in a professional technical role. Seasoned hands-on experience with security technologies and tools, such as firewalls, intrusion detection/prevention systems, SIEM, vulnerability scanners, and secure coding analysis tools. Experience in project management methodologies.
Posted 1 week ago
3.0 - 6.0 years
5 - 8 Lacs
Chennai
Work from Office
Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion its a place where you can grow, belong and thrive. Your day at NTT DATA The Security Managed Services Engineer (L2) is a developing engineering role, responsible for providing a managed service to clients to ensure that their Security Infrastructures and systems remain operational. Through the proactive monitoring, identifying, investigating, and resolving of technical incidents and problems, this role is able to restore service to clients. The primary objective of this role is to proactively review client requests or tickets and apply technical/process knowledge to resolve them without breaching service level agreement (SLA) and focuses on second-line support for incidents and requests with a medium level of complexity. The Security Managed Services Engineer (L2) may also contribute to / support on project work as and when required. What youll be doing Key Responsibilities: Proactively monitors the work queues. Performs operational tasks to resolve all incidents/requests in a timely manner and within the agreed SLA. Updates tickets with resolution tasks performed. Identifies, investigates, analyses issues and errors prior to or when they occur, and logs all such incidents in a timely manner. Captures all required and relevant information for immediate resolution. Provides second level support to all incidents, requests and identifies the root cause of incidents and problems. Communicates with other teams and clients for extending support. Executes changes with clear identification of risks and mitigation plans to be captured into the change record. Follows the shift handover process highlighting any key tickets to be focused on along with a handover of upcoming critical tasks to be carried out in the next shift. Escalates all tickets to seek the right focus from CoE and other teams, if needed continue the escalations to management. Works with automation teams for effort optimization and automating routine tasks. Ability to work across various other resolver group (internal and external) like Service Provider, TAC, etc. Identifies problems and errors before they impact a clients service. Provides Assistance to L1 Security Engineers for better initial triage or troubleshooting. Leads and manages all initial client escalation for operational issues. Contributes to the change management process by logging all change requests with complete details for standard and non-standard including patching and any other changes to Configuration Items. Ensures all changes are carried out with proper change approvals. Plans and executes approved maintenance activities. Audits and analyses incident and request tickets for quality and recommends improvements with updates to knowledge articles. Produces trend analysis reports for identifying tasks for automation, leading to a reduction in tickets and optimization of effort. May also contribute to / support on project work as and when required. May work on implementing and delivering Disaster Recovery functions and tests. Performs any other related task as required. Knowledge and Attributes: Ability to communicate and work across different cultures and social groups. Ability to plan activities and projects well in advance, and takes into account possible changing circumstances. Ability to maintain a positive outlook at work. Ability to work well in a pressurized environment. Ability to work hard and put in longer hours when it is necessary. Ability to apply active listening techniques such as paraphrasing the message to confirm understanding, probing for further relevant information, and refraining from interrupting. Ability to adapt to changing circumstances. Ability to place clients at the forefront of all interactions, understanding their requirements, and creating a positive client experience throughout the total client journey. Academic Qualifications and Certifications: Bachelors degree or equivalent qualification in IT/Computing (or demonstrated equivalent work experience). Certifications relevant to services supported. Certifications carry additional weightage on the candidates qualification for the role. CCNA certification in must, CCNP in Security or PCNSE certification is good to have. Required Experience: Moderate level of relevant managed services experience handling Security Infrastructure. Moderate level of knowledge in ticketing tools preferably Service Now. Moderate level of working knowledge of ITIL processes. Moderate level of experience working with vendors and/or 3rd parties.
Posted 1 week ago
5.0 - 7.0 years
7 - 12 Lacs
Mumbai
Hybrid
Your day at NTT DATA The Security Platform Engineer is a seasoned subject matter expert, responsible for facilitating problem resolution and mentoring for the overall Global Data Centers Office of Information Security (GDC-OIS) team. This role performs important tasks specialized at threat hunting, Crowdstrike, Network Security and other operational security tasks such as performance and availability monitoring, log monitoring, security incident detection and response, security event reporting, and content maintenance (tuning). The Security Platform Engineer is responsible for detecting and monitoring escalated threats and suspicious activity affecting the organization's technology domain (servers, networks, appliances and all infrastructure supporting production applications for the enterprise, as well as development environments). What you'll be doing KEY RESPONSIBILITIES Works as part of a 24/7 global team in IT/OT environment. ICS and SCADA knowledge preferred. Administers the organization's security tools to gather security logs from the environment and performs lifecycle management, including break-fix, patching, and live updates. Performs security incident handling and response from various vectors, including endpoint protection, enterprise detection and response tools, attack analysis, malware analysis, network forensics, and computer forensics. Conducts vulnerability assessments using automated scanning tools and manual techniques to identify security vulnerabilities in systems, networks, applications, and infrastructure components. Analyzes scan results, prioritizes vulnerabilities based on severity, impact, and exploitability, and provides detailed remediation recommendations to system owners, administrators, and IT teams. Monitors security alerts and maintains awareness of new threats and vulnerabilities to identify potential risks. Reads reports, makes risk assessments, works to detect the source of attacks, and tests current defenses against threats. Collaborates to develop practical mitigation strategies, configuration changes, and patch management processes to address identified vulnerabilities. Identifies opportunities to make automations that will help the incident response team. Ensures usage of knowledge articles in incident diagnosis and resolution and assists with updating as required. Investigates causes of incidents, seeks resolution, and escalates unresolved incidents, following up until resolved. Provides service recovery following the resolution of incidents and documents and closes resolved incidents according to agreed procedures. Maintains knowledge of specific , provides detailed advice regarding their application, and ensures efficient and comprehensive resolution of incidents. Logs all incidents in a timely manner with the required level of detail and cooperates with all stakeholders, including client IT environments, vendors, and carriers, to expedite diagnosis of errors and problems and identify a resolution. Analyzes data from various sources, including network traffic, email logs, malware files, web server logs, and DNS records, to identify potential risks and improve security measures Leads projects, self-starter, and performs any other related task as required. KNOWLEDGE & ATTRIBUTES Seasoned working knowledge on implementation and monitoring of any SIEM or security tools/technologies. ICS and SCADA knowledge preferred Seasoned knowledge on security architecture, worked across different security technologies. Customer service orientated and pro-active thinking. Problem solver who is highly driven and self-organized. Great attention to detail. Good analytical and logical thinking. Excellent spoken and written communication skills. Team leader with the ability to work well with others and in group with colleagues and stakeholders. ACADEMIC QUALIFICATIONS & CERTIFICATIONS Bachelor's degree or equivalent in Information Technology or related field. Relevant level of Security certifications such as CySA+, PenTest+, CCSP, GCIH, OSCP, etc. preferred. Relevant level of IT certifications such as GRID, GICSP, AZ-500, SC-200, etc. will be added advantage. REQUIRED EXPERIENCE Seasoned experience in Security technologies like (SIEM, PAM, IAM, PenTest, Threat Hunting, Firewall, Proxy etc.) preferably within a global IT services organization. Prior experience of working into Security Operation centers of a Data Center will be an added advantage. ICS and SCADA knowledge preferred. Seasoned experience in technical support to clients. Seasoned experience in diagnosis and troubleshooting. Seasoned experience providing remote support in Security Technologies. Seasoned experience in SOC/CSIRT Operations. Seasoned experience in handling security incidents end to end. Seasoned experience in Security Engineering. Knowledge on networking, Windows, Linux and security concepts. Seasoned experience in configuring/managing security controls such as RBAC, IAM, Zero Trust, UTM, Proxy, SOAR, etc.. Knowledge on log collection mechanism such as Syslog, Log file, DB API. Knowledge in security architecture. Prior experience of working on platforms like Crowd strike, Qualys, Palo Alto, Splunk, QRADAR, Cisco, VMWare and Ubuntu PHYSICAL REQUIREMENTS Primarily sitting with some walking, standing, and bending. Able to hear and speak into a telephone. Close visual work on a computer terminal. Dexterity of hands and fingers to operate any required to operate computer keyboard, mouse, and other technical instruments. WORK CONDITIONS & OTHER REQUIREMENTS This position is expected to be Hybrid for the foreseeable future with an occasional need to be onsite in a shared work environment. Must be comfortable with flexible working schedules across regions and their standard Time zones other than the base location. (US, EMEA & APAC) Extensive daily usage of workstation or computer. Must be comfortable working in a highly critical, fast paced environment with shifting priorities. Some domestic and/or international travel required, up to 25% of time. Perform work from a remote location with stable internet connection.
Posted 1 week ago
3.0 - 8.0 years
1 - 4 Lacs
Mumbai
Work from Office
Your day at NTT DATA The Security Managed Services Engineer (L1) is an entry level engineering role, responsible for providing a managed service to clients to ensure that their Firewall infrastructure remain operational through proactively identifying, investigating, and routing the incidents to correct resolver group. The primary objective of this role is to ensure zero missed service level agreement (SLA) conditions and focuses on first-line support for standard and low complexity incidents and service requests. The Security Managed Services Engineer (L1) may also contribute to support on project work as and when required. What you'll be doing Key Responsibilities: Min 3 Years exp in EDR and Trend Micro. The vendor should assess the existing endpoint security infrastructure and identify any gaps or vulnerabilities. The vendor should deploy EDR agents on endpoints, servers, and critical systems within the organization's network. The vendor should configure EDR agents to collect and analyze security events and activities on endpoints. The solution should monitor endpoints for suspicious activities, such as malware infections, unauthorized access attempts, and unusual user behavior. The solution should use behavioral analysis and machine learning to detect advanced threats and zero-day attacks. The solution should generate real-time alerts for potential security incidents and provide guidance for incident response and remediation. The vendor should enable endpoint forensics capabilities to investigate security incidents and identify the root cause of attacks. The solution should capture and store detailed endpoint activity logs and artifacts for further analysis. The vendor should integrate the tool with vulnerability management systems to assess the endpoint's security posture. The EDR solution should be able to rollout patches or upgrades from the EDR management console for agents onboarded on the platforms. The solution should alert and remediate endpoints with outdated or vulnerable software configurations. The solution should provide real-time alerts for anomalies that could indicate potential threats. The vendor should ensure the compatibility with other security systems, such as (but not limited to) SIEM, incident response tools, etc. The solution should correlate network anomalies with potential threats, aiding in early threat detection. The vendor is expected to deliver reports at periodic intervals as per Clients requirements. The vendor should re-deploy the agent as and when there is a change in the infrastructure or the operating systems. Knowledge and Attributes: Ability to communicate and work across different cultures and social groups. Ability to plan activities and projects well in advance, and takes into account possible changing circumstances. Ability to maintain a positive outlook at work. Ability to work well in a pressurized environment. Ability to work hard and put in longer hours when it is necessary. Ability to apply active listening techniques such as paraphrasing the message to confirm understanding, probing for further relevant information, and refraining from interrupting. Ability to adapt to changing circumstances. Ability to place clients at the forefront of all interactions, understanding their requirements, and creating a positive client experience throughout the total client journey. Academic Qualifications and Certifications: Bachelor's degree or equivalent qualification in IT/Computing (or demonstrated equivalent work experience). CEH certification is must. Required Experience: Entry-level experience with troubleshooting and providing the support required in security network/ data center/ systems/ storage administration and monitoring Services within a medium to large ICT organization. Basic knowledge of management agents, redundancy concepts, and products within the supported technical domain (such as Security, Network, Data Centre, Telephony, etc.). Working knowledge of ITIL processes. Workplace type : On-site Working
Posted 1 week ago
2.0 - 7.0 years
7 - 11 Lacs
Mumbai
Work from Office
Your day at NTT DATA The Security Managed Services Engineer (L2) is a developing engineering role, responsible for providing a managed service to clients to ensure that their Security Infrastructures and systems remain operational. Through the proactive monitoring, identifying, investigating, and resolving of technical incidents and problems, this role is able to restore service to clients. The primary objective of this role is to proactively review client requests or tickets and apply technical/process knowledge to resolve them without breaching service level agreement (SLA) and focuses on second-line support for incidents and requests with a medium level of complexity. The Security Managed Services Engineer (L2) may also contribute to support on project work as and when required. What you'll be doing Key Responsibilities: Min 4+ Years exp in Soc along with SIEM (Splunk). Min 2 years Hands on exp in Splunk. Configure and maintain the SIEM system, ensuring that it's properly set up to collect and analyze security event data. Develop, customize, and manage security rules within the SIEM to detect and respond to security threats. Monitor SIEM alerts, investigate them, and take appropriate actions based on the severity and nature of the alerts. Oversee the collection, normalization, and storage of log data from various sources. Develop and document incident response procedures, and lead or assist in incident response efforts when security incidents occur. Analyze and investigate security events from various sources. Manage security incidents through all incident response phases to closure. Utilize SIEM, SOAR, UEBA, EDR, NBAD, PCAP, Vulnerability Scanning, and Malware analysis technologies for event detection and analysis. Update tickets, write incident reports, and document actions to reduce false positives. Develop knowledge of attack types and finetune detective capabilities. Identify log sources and examine system logs to reconstruct event histories using forensic techniques. Align SIEM rules and alerts with the LICs security policies and compliance requirements. Conduct computer forensic investigations, including examining running processes, identifying network connections, and disk imaging. Maintain and support the operational integrity of SOC toolsets. Collaborate with SIEM solution vendors for updates, patches, and support to ensure the system's reliability and effectiveness. Maintain thorough documentation of the SIEM system's configuration, procedures, and incident response plans. Proactively identify and report system security loopholes, infringements, and vulnerabilities to the Security Operations Centre Manager in a timely manner. Work closely with other IT and security teams during incident response, coordinating efforts and sharing information to mitigate security incidents effectively. Ensure that the SIEM system helps the LIC meet regulatory compliance requirements and is ready for security audits. Continuously optimize the SIEM system for efficient performance, ensuring it can handle the volume of data and remain responsive. Develop automation scripts and workflows to streamline common security response tasks and enhance efficiency. Knowledge and Attributes: Ability to communicate and work across different cultures and social groups. Ability to plan activities and projects well in advance, and takes into account possible changing circumstances. Ability to maintain a positive outlook at work. Ability to work well in a pressurized environment. Ability to work hard and put in longer hours when it is necessary. Ability to apply active listening techniques such as paraphrasing the message to confirm understanding, probing for further relevant information, and refraining from interrupting. Ability to adapt to changing circumstances. Ability to place clients at the forefront of all interactions, understanding their requirements, and creating a positive client experience throughout the total client journey. Academic Qualifications and Certifications: Bachelor's degree or equivalent qualification in IT/Computing (or demonstrated equivalent work experience). Active CEH certification is Must. Required Experience: Moderate level of relevant managed services experience handling Security Infrastructure. Moderate level of knowledge in ticketing tools preferably Service Now. Moderate level of working knowledge of ITIL processes. Moderate level of experience working with vendors and/or 3rd parties. Workplace type : On-site Working
Posted 1 week ago
1.0 - 4.0 years
1 - 6 Lacs
Mumbai
Work from Office
Your day at NTT DATA The Senior Associate Information Security Analyst is a developing subject matter expert, responsible for designing and implementing security systems to protect the organization's computer networks from cyber-attacks, and to help set and maintain security standards. This role is required to monitor the organization's computer networks for security issues, install security software, and document any security issues or breaches found. The Senior Associate Information Security Analyst is responsible for assisting in the planning, implementation, and management of information security measures to safeguard the organization's digital assets and systems and contributes to maintaining a secure and compliant environment. What you'll be doing Key Responsibilities: Monitors security alerts and events from various sources, investigates potential threats, and escalates incidents as necessary. Assists in the implementation and monitoring of security controls, including firewalls, intrusion detection systems, and access controls. Performs regular vulnerability assessments, analyses scan results, and assists in prioritizing and remediating identified vulnerabilities. Supports the incident response team in investigating security incidents, documenting findings, and participating in remediation efforts. Assists in ensuring compliance with industry standards (for example, GDPR, ISO 27001) by conducting assessments and implementing necessary controls. Installs security measures and operates software to protect systems and information infrastructure, including firewalls and data encryption programs. Documents security breaches and assess the damage they cause. Works with the security team to perform tests and uncover network vulnerabilities. Fixes detected vulnerabilities to maintain a high-security standard. Develops organizational best practices for IT security. Performs penetration testing and upgrades systems to unable security software. Installs and upgrades antivirus software and tests and evaluates new technology. Assists with the installation of security software and understands information security management. Researches security enhancements and makes recommendations to management. Stays abreast of information technology trends and security standards. Contributes to security awareness initiatives by creating training materials, conducting workshops, and educating employees about best security practices. Maintains accurate records of security incidents, assessments, and actions taken for reporting and audit purposes. Assists in the management and maintenance of security tools, including antivirus software, encryption tools, and security information and event management (SIEM) systems. Participates in risk assessments to identify potential security threats, vulnerabilities, and associated risks to the organization. Collaborates with cross-functional teams, IT, and other teams to ensure security measures are integrated into the organization's processes and projects. Performs any other related task as required. Knowledge and Attributes: Good communication skills to effectively convey technical information to non-technical stakeholders. Good analytical thinking and problem-solving skills to prevent hacking on a network. Ability to identify and evaluate potential risks and to develop solutions. Ability to identify and mitigate network vulnerabilities and explain how to avoid them. Understands firewalls, proxies, SIEM, antivirus, and IDPS concepts. Understands patch management with the ability to deploy patches in a timely manner whilst understanding business impact. Developing proficiency with MAC and OS. Familiarity with security frameworks, standards, and regulations (for example, NIST, CIS, GDPR). Basic understanding of network and system architecture, protocols, and security controls. Ability to analyze security incidents and assess potential risks. Ability to work both independently and collaboratively in a fast-paced environment. Academic Qualifications and Certifications: Bachelor's degree or equivalent in information security, cybersecurity, computer science, or related. Security certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Information Security Manager (CISM) are advantageous. Required Experience: Moderate level of demonstrated experience in information security or cybersecurity, or related roles. Moderate level of demonstrated experience working in a global IT organization. Moderate level of demonstrated experience with computer network penetration testing and techniques. Moderate level of demonstrated experience with security assessment and vulnerability scanning tools. Workplace type : On-site Working
Posted 1 week ago
4.0 - 7.0 years
6 - 9 Lacs
Mumbai
Work from Office
Your day at NTT DATA The Security Managed Services Engineer (L2) is a developing engineering role, responsible for providing a managed service to clients to ensure that their Security Infrastructures and systems remain operational. Through the proactive monitoring, identifying, investigating, and resolving of technical incidents and problems, this role is able to restore service to clients. The primary objective of this role is to proactively review client requests or tickets and apply technical/process knowledge to resolve them without breaching service level agreement (SLA) and focuses on second-line support for incidents and requests with a medium level of complexity. The Security Managed Services Engineer (L2) may also contribute to support on project work as and when required. What you'll be doing Key Responsibilities: Configure and maintain the SIEM system, ensuring that it's properly set up to collect and analyze security event data. Develop, customize, and manage security rules within the SIEM to detect and respond to security threats. Monitor SIEM alerts, investigate them, and take appropriate actions based on the severity and nature of the alerts. Oversee the collection, normalization, and storage of log data from various sources. Develop and document incident response procedures, and lead or assist in incident response efforts when security incidents occur. Analyze and investigate security events from various sources. Manage security incidents through all incident response phases to closure. Utilize SIEM, SOAR, UEBA, EDR, NBAD, PCAP, Vulnerability Scanning, and Malware analysis technologies for event detection and analysis. Update tickets, write incident reports, and document actions to reduce false positives. Develop knowledge of attack types and finetune detective capabilities. Identify log sources and examine system logs to reconstruct event histories using forensic techniques. Align SIEM rules and alerts with the LICs security policies and compliance requirements. Conduct computer forensic investigations, including examining running processes, identifying network connections, and disk imaging. Maintain and support the operational integrity of SOC toolsets. Collaborate with SIEM solution vendors for updates, patches, and support to ensure the system's reliability and effectiveness. Maintain thorough documentation of the SIEM system's configuration, procedures, and incident response plans. Proactively identify and report system security loopholes, infringements, and vulnerabilities to the Security Operations Centre Manager in a timely manner. Work closely with other IT and security teams during incident response, coordinating efforts and sharing information to mitigate security incidents effectively. Ensure that the SIEM system helps the LIC meet regulatory compliance requirements and is ready for security audits. Continuously optimize the SIEM system for efficient performance, ensuring it can handle the volume of data and remain responsive. Develop automation scripts and workflows to streamline common security response tasks and enhance efficiency. Academic Qualifications and Certifications: Bachelor's degree or equivalent qualification in IT/Computing (or demonstrated equivalent work experience). CEH certification is Must. Workplace type : On-site Working
Posted 1 week ago
3.0 - 8.0 years
5 - 10 Lacs
Mumbai
Work from Office
Your day at NTT DATA The Senior Associate Collaboration Technical Services (TS) Systems Integration Specialist is a developing subject matter expert, responsible for ensuring that client solution requirements are resolved in line with Service Level Agreements (SLAs). This role performs configurations, actions installations and attends to break/fix events. This role works towards associate to professional level certification, whilst at the same time developing business knowledge. What you'll be doing Key Responsibilities: Owns larger portions of an installation, break/fix incidents at a low to medium level of complexity during project lifecycle Takes responsibility for problem resolution and troubleshooting during project lifecycle Escalates complex problems to the relevant third parties. Assists with the documentation of standard operating procedures relating to installations and fixes during ops handover Compiles and maintains project administration (Time Capture and feedback to stakeholders) Conducts elementary presentations within the customer's organization. Expected to take leadership from senior resources on relevant technologies according to specialization and best practice. Performs any other related task as required. Knowledge and Attributes: Developing fundamental project and administration ability Developing understanding and appreciation of technical design principles and compute layers. Ability to develop an understanding of fundamental project and administration processes. Display a strong learning orientation. Good verbal communication skills. Demonstrate a client service orientation. Hands-on proactive in approach. Knowledge on security concepts and application of those concepts. Ability in configuring/managing security controls, such as SIEM, Firewall, IDS/IPS, EDR, NDR, UTM, Proxy, SOAR, Honeypots, decoys, and other security tools. Developing knowledge on log collection mechanism such as Syslog, Log file, DB API. Developing knowledge in security architecture. Developing knowledge on log collection mechanism such as Syslog, Log file, DB API. Developing knowledge in security architecture. Developing knowledge in ETL concepts, data processing at scale and data stream pipelines through Terraform. Ability in cloud services on at least one of the following providers: AWS, Azure, GCP. Developing knowledge web service protocols and frameworks for high-availability, low-latency, resiliency, and auto-scaling. Developing understanding any of the following - Java, Python, TypeScript, JavaScript, R, .NET, PowerShell. Developing knowledge in serverless development. Analytical skills and ability to communicate effectively. Ability to solve problems in innovative ways while adhering to industry standards and practices. Developing understanding practices on securing data and systems by applying appropriate authentication and authorization controls. Developing understanding of Event Driven Development and asynchronous operations. Developing understanding project fundamentals which are demonstrated in the execution of installations and other assignments. Developing knowledge of security technologies and understanding of managed services concepts Academic Qualifications and Certifications: Bachelor's degree or equivalent in Information Technology or Computing or a related field. Vendor certification is mandatory. Azure Certified Security Engineer PCNSA FCA CCNA Security. Cloud Security certifications and certifications like AZ-500, SC-200, Security+, CEH, CISSP, CISM or similar Certification in different networking technologies such as CCDPCCNP Security, JNCIA, ACCA, PCNSE, PCNSA, FCP, CCSA, ITIL, Azure Security Engineer, Azure Certified DevOps Engineer, Azure Certified Network Engineer, Azure Administrator Associate, will be an advantage. Certifications relevant to the services provided (certifications carry additional weightage on a candidates qualification for the role) Terraform, Azure, Sentinel, EDR Defender for Cloud, Microsoft Security, Devops Ci/CD Pipelins, Azure Governance (Defender for Cloud, Azure Policies, Secure Score and Compliance), Version Control (Git), Microservices (Kubernetes, Azure Containers), Azure AWS/ GCP Infrastructure (IaaS, PaaS, SaaS), Azure Infrastructure as Code, Azure Administration, Hybrid Cloud, Networking (Firewalls, LAN, VPN), Automation, MS Office365, Power BI Administration, Scripting (PowerShell), ZTNA. Required Experience: Moderate level experience in SOC Analysis Operations. Moderate level experience in SIEM usage for Moderate level experience in Azure or AWS or GCP. Moderate level experience in Security technologies like Firewall, IPS, IDS, Proxy etc. Moderate level experience in technical support to clients. Moderate level experience in handling security incidents end to end. Moderate level experience in Security Analysis or Engineering Moderate level experience in configuring/managing security controls, such as SIEM, Firewall, IDS/IPS, EDR, NDR, UTM, Proxy, SOAR, Honeypots, and other security tools. Workplace type : On-site Working.
Posted 1 week ago
2.0 - 7.0 years
4 - 9 Lacs
Mumbai
Work from Office
Your day at NTT DATA The Security Managed Services Engineer (L2) is a developing engineering role, responsible for providing a managed service to clients to ensure that their Security Infrastructures and systems remain operational. Through the proactive monitoring, identifying, investigating, and resolving of technical incidents and problems, this role is able to restore service to clients. The primary objective of this role is to proactively review client requests or tickets and apply technical/process knowledge to resolve them without breaching service level agreement (SLA) and focuses on second-line support for incidents and requests with a medium level of complexity. The Security Managed Services Engineer (L2) may also contribute to support on project work as and when required. What you'll be doing Key Responsibilities: Min 4+ Years exp in Soc along with SIEM (Splunk). Min 2 years Hands on exp in Splunk. Configure and maintain the SIEM system, ensuring that it's properly set up to collect and analyze security event data. Develop, customize, and manage security rules within the SIEM to detect and respond to security threats. Monitor SIEM alerts, investigate them, and take appropriate actions based on the severity and nature of the alerts. Oversee the collection, normalization, and storage of log data from various sources. Develop and document incident response procedures, and lead or assist in incident response efforts when security incidents occur. Analyze and investigate security events from various sources. Manage security incidents through all incident response phases to closure. Utilize SIEM, SOAR, UEBA, EDR, NBAD, PCAP, Vulnerability Scanning, and Malware analysis technologies for event detection and analysis. Update tickets, write incident reports, and document actions to reduce false positives. Develop knowledge of attack types and finetune detective capabilities. Identify log sources and examine system logs to reconstruct event histories using forensic techniques. Align SIEM rules and alerts with the LICs security policies and compliance requirements. Conduct computer forensic investigations, including examining running processes, identifying network connections, and disk imaging. Maintain and support the operational integrity of SOC toolsets. Collaborate with SIEM solution vendors for updates, patches, and support to ensure the system's reliability and effectiveness. Maintain thorough documentation of the SIEM system's configuration, procedures, and incident response plans. Proactively identify and report system security loopholes, infringements, and vulnerabilities to the Security Operations Centre Manager in a timely manner. Work closely with other IT and security teams during incident response, coordinating efforts and sharing information to mitigate security incidents effectively. Ensure that the SIEM system helps the LIC meet regulatory compliance requirements and is ready for security audits. Continuously optimize the SIEM system for efficient performance, ensuring it can handle the volume of data and remain responsive. Develop automation scripts and workflows to streamline common security response tasks and enhance efficiency. Knowledge and Attributes: Ability to communicate and work across different cultures and social groups. Ability to plan activities and projects well in advance, and takes into account possible changing circumstances. Ability to maintain a positive outlook at work. Ability to work well in a pressurized environment. Ability to work hard and put in longer hours when it is necessary. Ability to apply active listening techniques such as paraphrasing the message to confirm understanding, probing for further relevant information, and refraining from interrupting. Ability to adapt to changing circumstances. Ability to place clients at the forefront of all interactions, understanding their requirements, and creating a positive client experience throughout the total client journey. Academic Qualifications and Certifications: Bachelor's degree or equivalent qualification in IT/Computing (or demonstrated equivalent work experience). Active CEH certification is Must. Required Experience: Moderate level of relevant managed services experience handling Security Infrastructure. Moderate level of knowledge in ticketing tools preferably Service Now. Moderate level of working knowledge of ITIL processes. Moderate level of experience working with vendors and/or 3rd parties. Workplace type : On-site Working
Posted 1 week ago
2.0 - 5.0 years
4 - 8 Lacs
Mumbai
Work from Office
Your day at NTT DATA The Security Managed Services Engineer (L1) is an entry level engineering role, responsible for providing a managed service to clients to ensure that their Firewall infrastructure remain operational through proactively identifying, investigating, and routing the incidents to correct resolver group. The primary objective of this role is to ensure zero missed service level agreement (SLA) conditions and focuses on first-line support for standard and low complexity incidents and service requests. The Security Managed Services Engineer (L1) may also contribute to support on project work as and when required. What you'll be doing Key Responsibilities: Configure and maintain the SIEM system, ensuring that it's properly set up to collect and analyze security event data. Develop, customize, and manage security rules within the SIEM to detect and respond to security threats. Monitor SIEM alerts, investigate them, and take appropriate actions based on the severity and nature of the alerts. Oversee the collection, normalization, and storage of log data from various sources. Develop and document incident response procedures, and lead or assist in incident response efforts when security incidents occur. Analyze and investigate security events from various sources. Manage security incidents through all incident response phases to closure. Utilize SIEM, SOAR, UEBA, EDR, NBAD,PCAP, Vulnerability Scanning, and Malware analysis technologies for event detection and analysis. Update tickets, write incident reports, and document actions to reduce false positives. Develop knowledge of attack types and finetune detective capabilities.Identify log sources and examine system logs to reconstruct event histories using forensic techniques.Align SIEM rules and alerts with the LICs security policies and compliance requirements.Conduct computer forensic investigations, including examining running processes, identifying network connections, and disk imaging. Maintain and support the operational integrity of SOC toolsets.Collaborate with SIEM solution vendors for updates, patches, and support to ensure the system's reliability and effectiveness.Maintain thorough documentation of the SIEM system's configuration, procedures, and incident response plans.Proactively identify and report system security loopholes, infringements, and vulnerabilities to the Security Operations Centre Manager in a timely manner. Work closely with other IT and security teams during incident response, coordinating efforts and sharing information to mitigate security incidents effectively.Ensure that the SIEM system helps the LIC meet regulatory compliance requirements and is ready for security audits.Continuously optimize the SIEM system for efficient performance, ensuring it can handle the volume of data and remain responsive.Develop automation scripts and workflows to streamline common security response tasks and enhance efficiency. Workplace type : On-site Working
Posted 1 week ago
4.0 - 8.0 years
6 - 10 Lacs
Bengaluru
Remote
Senior Technical Services Cross Technology Systems Integration Specialist / Technical Lead Your day at NTT DATA The Senior Cross Technology Technical Services (TS) Systems Integration Specialist Technical Lead is involved in highly complex environments for installation, integration, deployment, configuration and fault management. This role is able to compile technical specifications in a clear, concise, unambiguous manner to explain the advantages and disadvantages of options leading to the final solution and are able to create alternative solutions as backup planning. This role works towards expert level certification, whilst at the same time developing business knowledge. This role has advanced proficiency across two or more technologies, namely Networking, Data Centre, Security, Customer Experience, Collaboration and/or End User Compute. What you'll be doing Key Responsibilities: Interacts with clients on site and remote to meet more complex requirements of a solution. Escalates unresolved problems and issues to the relevant third parties. Delegates lower complexity tasks to engineers and technicians. Assumes responsibility for the coordination of the activities of the engineers, in line with performance targets, leading by example and monitoring the quality of engineer's and technician's work when required. Writes reports and proposals and completes and maintains project documentation. Assists with the documentation of standard operating procedures relating to installations and fixes. Acts as coach and mentor to more junior Implementation Engineers and Technicians. Assumes responsibility for the coordination of the activities of the Engineers, in line with performance targets. May be required to serve periodically on the customer service desk, providing third line telephonic, remote and on-site support and problem management. Included in complex design work, with input to the design expected. Expected to take ownership of relevant technologies according to domain or specialization. Engages vendors for priority escalations or bugs found during deployments. Performs any other related task as required. Knowledge and Attributes: Advanced understanding and appreciation of technical design and business principles. Advanced project fundamental and administration ability. Advanced project fundamentals which are demonstrated in the execution of installations and other assignments. Advanced customer engagement skills. Advanced relevant domain specialist knowledge. Excellent verbal communication skills. Client focused and displays a proactive approach to solving problems. Advanced ability to coach, mentor and provide guidance to team members. Ability to take ownership as technical lead during project lifecycle. Academic Qualifications and Certifications: Bachelor's degree or equivalent in Information Technology or Computing or related field. Collaboration - Valid CCIE Collaboration Certification required. Customer Experience - NICE plus 3 additional NICE Engage NCSE; NICE Engage NCIE (Installation); Sentinel Fundamentals; CXOne Basic Certification CXOne Advanced Certification; CXOne ACD Administrator Certification. Additional - Nexidia Data exchange framework; Nexidia NCSE; Nexidia NCIE; Advanced Processing Automation (RTAM); NICE WFM (IEX); Compliance Centre; NICE Inform; Avaya VOIP Integrations; Cisco VOIP Integrations. Encryption; Multiple Data Centres (MDC); NICE Real Time Authentication; NICE Trade Recording. Avaya certification plus additional such as Avaya Aura Core Avaya Aura Contact Centre Avaya IP Office; Avaya IP Office Contact Centre; Avaya Session Border Controller; Avaya Experience Portal Administration. Verint certification and additional such as Workforce Management (WFM); Interactions; Speech; DPA. Genesys foundational courses; Genesys Cloud CX - Implementation; Genesys Cloud CX - Contact Centre Administration; Genesys Cloud CX - Reporting and Analytics; Level 4 - Genesys Cloud: Edge Networking; Genesys Cloud - Edge BYOC Premise Configuration; Genesys Cloud - Edge How it Works; Genesys Cloud - Edge WebRTC; Genesys Cloud - Edge Survivability; Genesys Cloud - Edge BYOC Premises and Edge Introductory Concepts; Genesys Cloud - Edge Troubleshooting; Genesys Cloud - API Conversation Management; Genesys Cloud - API User Management; Genesys Cloud - API Workforce Management; Genesys Cloud - API Real-Time Reporting; Genesys Cloud - API Quality Report Generation; Genesys Cloud - API Historical Report Generation; Genesys Cloud - API Authorization; Genesys Cloud - API Introduction to the Platform API Genesys - Decisions Administration; Genesys - Decisions Strategic Planning. Data Centre - Relevant certifications such as HPE Proliant servers, 3PAR, Primera, Alletra, Simplicity, Synergy, StoreOnce, MSA Storage. Dell PowerEdge servers, Unity, PowerStore, Recoverpoint Appliance/VE, PowerScale Isilon PowerProtect/Data Domain, VxRail, VMware Certified VCP-DCV, vSAN, SRM. Dell Information Storage Associate - DCA-ISM. Veeam Backup and Recovery VMCA . Veritas Netbackup Admin and implementation. Azure Fundamentals. Cisco UCS Servers. Cisco MDS and Brocade SAN Switches - Zoning. Nutanix HCI NCP. End User Compute - Microsoft Certified Professional; Microsoft 365 Administrator (MS-100, MS-101); Microsoft 365 Certified - Modern Desktop Administrator Associate (MD-100, MD-101); Microsoft Azure Fundamentals Training & Certification (AZ-900); Microsoft 365 Certified: Teams Administrator Associate; AZ-103: Azure Administrator Associate; Microsoft Certified - Azure Identity and Access Administrator; AZ-500 - Microsoft Azure Security Technologies; Microsoft Certified Solutions Associate - Server 2016; AZ-500 - Microsoft Azure Security Technologies; Microsoft Certified - Azure Virtual Desktop Specialty; AZ-300 - Microsoft Azure Architect Technologies. Microsoft Certified - Azure Virtual Desktop Specialty. Networking - Professional level certification in different Networking technologies such as Cisco, Juniper, Aruba, F5, CCIE, JNCIE, ACMP etc.; Cisco Dev Net certification. Security - Azure Certified Solutions Architect PCNSE FCE CCNP Security CISSP Automation certifications or equivalent preferred. Cloud Security certifications and certifications such AZ-500, SC-200, Security+, CEH, CISSP, CISM or similar Certification in different networking technologies such as CCIE CCDP Security, JNCIA, ACCA, PCNSE, PCNSC, FCE, CCSA, ITIL, Azure Security Engineer, Azure Certified DevOps Engineer, Azure Certified Network Engineer, Azure Certified Solutions Architect, Azure Administrator Associate is advantageous. Certifications relevant to the services provided (certifications carry additional weightage). Terraform; Azure; Sentinel; EDR Defender for Cloud; Microsoft Security; Devops Ci/CD Pipelins; Azure Governance (Defender for Cloud, Azure Policies, Secure Score and Compliance); Version Control (Git); Microservices (Kubernetes, Azure Containers); Azure AWS/ GCP Infrastructure (IaaS, PaaS, SaaS); Azure Infrastructure as Code; Azure Administration; Hybrid Cloud; Networking (Firewalls, LAN, VPN); Automation; MS Office365. Power BI Administration; Scripting (PowerShell); ZTNA. Required Experience: Advanced work experience in a technical implementation engineering technologies such as Networking, Data Center, Security, Customer Experience, Collaboration and/or End User Compute etc. Advanced experience engaging with clients and conducting presentations. Advanced report writing experience. Advanced project management experience. Required Experience (Specific to Collaboration) - Advanced experience with Cisco Unified Communications Manager, Cisco Unity Connection, Cisco Unified Contact Centre Express, Cisco Attendant console, Cisco IMP, Cisco Customer Collaboration Platform and Expressway in enterprise deployments, including bulk administration, provisioning and management of endpoints and user accounts in large-scale systems. Advanced experience with voice gateways - MGCP, SIP, H.323, SCCP, digital PRI/E1, analog FXO/FXS. Advanced experience with Border Element, media resources, SRST/SRSV. Advanced experience with Cisco Unified Contact Center Express, including but not limited to UC Manager integration, scripting, high availability clustering. Advanced experience with design and implementation for UC environment. Advanced experience with CME/CUE. Advanced experience in dial plan designs and implementation. Advanced experience with virtualization, specifically VMware, Cisco UCS B/C-Series servers and wireshark. Advanced experience with Cisco TelePresence video solutions. Advanced experience with Cisco audio and video conferencing solutions. Advanced experience with Webex Calling and Webex Contact Centre solutions. Advanced experience with voice carrier systems i.e.. Openserv, Neotel, Vodacom, MTN, Experience with multi-cluster call manager environments. Advanced ARC and Call Cabinet expertise is advantageous. Required Experience (Specific to Security) - Advanced experience in SOC Analysis Operations. Advanced experience in SIEM usage for investigations. Advanced experience in Azure or AWS or GCP. Advanced experience in Security technologies like Firewall, IPS, IDS, Proxy etc. Advanced experience in technical support to clients. Advanced experience in handling security incidents end to end. Advanced experience in configuring/managing security controls, such as SIEM, Firewall, IDS/IPS, EDR, NDR, UTM, Proxy, SOAR, Honeypots, decoys, and other security tools. Advanced experience in log collection mechanism such as Syslog, Log file, DB API. Advanced experience in configuring/managing security controls, such as SIEM, Firewall, IDS/IPS, EDR, NDR, UTM, Proxy, SOAR, Honeypots, and other security tools. Advanced experience in web service protocols and frameworks for high-availability, low-latency, resiliency, and auto-scaling. Advanced experience in sound practices on securing data and systems by applying appropriate authentication and authorization controls. Advanced experience in Event Driven Development and asynchronous operations. Advanced experience in scripting languages such as Python, Perl, or Ruby, and experience with automation tools like Ansible, Puppet, or Chef. Workplace type : Remote Working
Posted 1 week ago
3.0 - 8.0 years
5 - 10 Lacs
Gurugram
Hybrid
Your day at NTT DATA The Senior Associate Security Technical Architect is a developing subject matter expert, responsible for assisting with designing robust security architectures for our systems, applications, and infrastructure. This role collaborates with cross-functional teams to ensure that technology solutions are secure, compliant, and aligned with industry best practices. Your expertise will be crucial in protecting sensitive data, mitigating risks, and maintaining the confidentiality, integrity, and availability of our systems. What you'll be doing Key Responsibilities: Designs and develops comprehensive security architectures for our systems, applications, and infrastructure, considering both current and future needs. Viewed as a trusted technical advisor to the client. Collaborates with stakeholders, including developers, engineers, and project managers, to integrate security requirements into the system design and development lifecycle. Provides pre-sales technical support and expertise in analyzing client requirements, in conjunction with the clients current security capabilities. Provides expertise in secure coding practices, network security, identity and access management, data protection, and other security domains. Supports the evaluation of and selects security technologies, tools, and frameworks to support our security architecture. Ensures technical solutions will accomplish the client's objectives. Defines and implements security policies, standards, and procedures to ensure compliance with industry regulations and best practices. Supports incident response activities, including identification, containment, eradication, and recovery, in coordination with the incident response team. Develops or produces the technical design document to match the solution design specifications. Working with the relevant internal stakeholders, participate in scope of work determination, product pricing and RFP/RFI responses. Assists with the determination of outsourcing, product pricing and collaborates with others to develop an implementation solution. Responsible for influencing and guiding members of the Sales team and to ensure that they are equipped to close deals and maintain visibility of forecasting and sales pipeline in order to influence potential deals. Manages client proof of concept (POC) initiatives, which will require the involvement of the appropriate resources, and setup and delivery of the POC. On all assigned engagements, owns the proposed solution and transitions the build implementation to the delivery team. Specifically relating to opportunity pursuit this role will evaluate each opportunity for alignment with organizational capabilities and business policy, prepare the executive summary that outlines all of the information gathered from the client in regards to their needs, as understood, document the proposed technology solution, document the statement of work along with all labor requirements, work with the relevant internal stakeholders to prepare the pricing format that will be supplied to the customer, perform the actual solution design and prepare a parts list outlining equipment to be provided, develop and manage a proof-of-concept as such may be required, engage all technical resources required for an accurate solution design, prepare a network diagram outlining the proposed solution, document all deliverables and what constitutes a successful completion, review the final parts list as supplied and submit all information to the applicable bid team for final assembly, verify the proposals accuracy and sign off on the final documents to be presented to the client, assist during the final presentation to the client as appropriate. Knowledge and Attributes: Demonstrates good client engagement skills coupled with technical consulting aptitude. Understanding of the vendors products business and technology positioning. Good analytical and problem-solving skills, with the ability to assess risks, analyze complex security issues, and propose effective solutions. Ability to collaborate and communicate effectively with team members, contributing to their success Good product knowledge integrated with technology understanding Good knowledge of security domains, including network security, application security, cloud security, data protection, identity and access management, cryptography, and secure coding practices. Proficiency in enterprise architecture principles, frameworks (such as TOGAF), and architectural patterns for designing secure and scalable systems. Good understanding of security regulations, standards, and frameworks (such as ISO 27001, NIST, PCI DSS) and their practical application Basic understanding of key vendor subscription models such as Cisco EA 3.0. Academic Qualifications and Certifications: Bachelor's degree in information technology, computer science or information systems or related field. Vendor product, sales and technology certifications. Relevant certifications, such as CISSP, CISM, GIAC, or TOGAF, are highly desirable. Required Experience: Moderate level technical experience within a large scale (preferably multi-national) technology services environment. Moderate level experience as a Security Technical Architect or a similar role, designing and implementing security architectures for complex systems and applications. Moderate level experience with security technologies and tools, such as firewalls, intrusion detection/prevention systems, SIEM, vulnerability scanners, and secure coding analysis tools. Experience in project management methodologies.
Posted 1 week ago
2.0 - 5.0 years
4 - 7 Lacs
Bengaluru
Remote
Your day at NTT DATA The Senior Information Security Incident Response Analyst is an advanced subject matter expert, responsible for detecting and monitoring escalated threats and suspicious activity affecting the organization's technology domain (servers, networks, appliances and all infrastructure supporting production applications for the enterprise, as well as development environments). This role acts as the technical second responder for the team and supports the work of technical staff from various business areas, as well as third-party technical experts. The Senior Information Security Incident Response uses their technical competencies of systems and automated mechanisms to detect unauthorized activity on company information assets. What you'll be doing Key Responsibilities: Manages the prevention and resolution of security breaches and ensure incident and problem management processes are initiated. Performs access management activities according to the policy. Implements and discusses security service audit schedules, review access authorization and perform the required access controls and testing to identify security weaknesses. Interacts with a global team of Cyber Security Analysts and specialists. Manages 2nd level triaging of security alerts, events, and notifications. Manages notifications of internal and/or external teams according to agreed alert priority levels, and escalation trees. Communicates status of response, resolution and final root cause analysis to the appropriate stakeholders. Follows and updates established and/or ad-hoc processes and work instructions and create procedures where deficiencies are identified. Logs, manages and coordinates service requests through to resolution including the identification, isolation, resolution and escalation of IT infrastructure faults. Maintains an understanding of current and emerging threats, vulnerabilities, and trends. Knowledge and Attributes: Advanced understanding of End Point Protection Software. Advanced understanding of Enterprise Detection and Response software. Advanced knowledge of technological advances within the information security arena. Advanced understanding of inter-relationships in an overall system or process. Advanced knowledge of information security management and policies. Advanced understanding risk management principles and frameworks is crucial for prioritizing and addressing security incidents Advanced understanding of the organization's business operations, goals, and objectives enables the analyst to align incident response efforts with the broader business strategy. Ability to effectively communicate technical information to both technical and non-technical stakeholders, and end-users, as well as working with cross-functional teams during incident response. Ability to think critically, analyze information, and solve medium to complex problems. Academic Qualifications and Certifications: Bachelors degree or equivalent in Information Technology, Computer Science or related preferred. SANS GIAC Security Essentials (GSEC) or equivalent preferred. SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent preferred. SANS GIAC Certified Incident Handler (GCIH) or equivalent preferred Required Experience: Advanced experience in a Technology Information Security Industry. Advanced experience or knowledge of SIEM and IPS technologies. Advanced experience with Wireshark or tcpdump to identify normal and abnormal/malicious traffic patterns and behaviors. Workplace type : Remote Working.
Posted 1 week ago
6.0 - 8.0 years
8 - 10 Lacs
Bengaluru
Work from Office
Your day at NTT DATA The Networking Managed Services Engineer (L2) is a developing engineering role, responsible for providing a managed service to clients to ensure that their IT infrastructure and systems remain operational through proactively monitoring, identifying, investigating, and resolving technical incidents and problems and restoring service to clients. The primary objective of this role is to proactively review client requests or tickets and apply technical/process knowledge to resolve them without breaching service level agreement (SLA) and focuses on second-line support for incidents and requests with a medium level of complexity. The Networking Managed Services Engineer (L2) may also contribute to support on project work as and when required. What you'll be doing Key Responsibilities: 6+ years of experience. Engineer should have expertise in areas Like troubleshooting and handling of various Network Security devices and technology viz., Firewalls, Load Balancers etc. Hands-on experience on troubleshooting Firewall & LB devices Hands-on experience on Firewall Policy rules and access control configuration Network security devices HA configuration build, monitor & support Monitor and Manage Network Security devices and related performance Experience in Performance Monitoring, Optimization and Capacity Planning for Network Security devices. Experience in Network Security Infrastructure solutions design, review Experience in DR solution design, build and support Escalation Management (Internal, within NSEIL and with OEM) Good communication skills. Academic Qualifications and Certifications: Bachelor's degree or equivalent qualification in IT/Computing (or demonstrated equivalent work experience). CCNP or equivalent certification. Certifications relevant to the services provided (certifications carry additional weightage on a candidates qualification for the role).
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The Security Information and Event Management (SIEM) job market in India is thriving, with a growing demand for professionals who can monitor, analyze, and respond to security incidents in real-time. SIEM jobs offer lucrative career opportunities for individuals with a strong understanding of cybersecurity concepts and technologies.
The average salary range for SIEM professionals in India varies based on experience level: - Entry-level: INR 4-6 lakhs per annum - Mid-level: INR 8-12 lakhs per annum - Experienced: INR 15-20 lakhs per annum
Career progression in the SIEM field typically follows a path from: - SIEM Analyst - SIEM Engineer - SIEM Consultant - SIEM Architect
In addition to SIEM expertise, professionals in this field are often expected to have knowledge of: - Network Security - Incident Response - Threat Intelligence - Security Operations Center (SOC) operations
As you explore SIEM jobs in India, remember to continuously upgrade your skills, stay informed about the latest cybersecurity trends, and practice answering interview questions to showcase your expertise confidently. With the right preparation and dedication, you can excel in the dynamic field of SIEM and carve out a successful career for yourself. Good luck!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.