Jobs
Interviews

5041 Siem Jobs - Page 27

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

0 years

5 - 8 Lacs

Hyderābād

On-site

Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Associate Managed Services Information Security Analyst is an entry level subject matter expert, responsible for monitoring, analyzing, interpreting and reporting on the incoming client data for the purpose of delivering security information and recommendations to the clients, enabling the organization to deliver the contracted security services. This role includes performing tasks such as security incident detection and response, security event reporting, threat hunting, content maintenance (tuning) and interacting with clients to ensure their understanding of the information generated, recommending client system changes as well as answering security related queries from the clients. This is an entry level role within the Managed Services Information Security Analyst team and works under guidance of more experienced analysts within the team. Key responsibilities: Works as part of a global Cyber Defense Centre (CDC) team that works 24/7 on rotational shifts. Works with client stakeholders and relevant internal teams to tune the MSSP platform and client SIEM to enable more efficient detection, analysis and reporting. Under guidance, generates continuous improvement ideas for supported security tools/technologies, to enable improvements to the company services, employee experience and client experience. Adheres to SOPs, customer Run Books and standard processes to ensure a globally consistent delivery whilst also proposing changes and improvements to these standards. Utilizes and document best practices and amend existing documentation as required. Support with security incident handling and response from several vectors including End Point Protection and Enterprise Detection and response tools, attack analysis, malware analysis, network forensics, computer forensics. Learns and utilizes a broad range of skills in LAN technologies, Windows and Linux O/S’s, and general security infrastructure. Ensures usage of knowledge articles in incident diagnosis and resolution. Under guidance, perform defined tasks to inform and monitor service delivery against service level agreements and maintain records of relevant information. Cooperates closely with colleagues to share knowledge and build a cohesive and effective team environment, benefiting the individual, the business and the client. Performs any other related task as required. To thrive in this role, you need to have: Knowledge on implementation and monitoring of a company supported SIEM or security tools/technologies/concepts. Knowledge on security architecture, worked across different security technologies. Knowledge and understanding of the operation of modern computer systems and networks and how they can be compromised. Displays excellent customer service orientation and pro-active thinking. Displays problem solving abilities and is highly driven and self-organized. Good attention to detail. Displays analytical and logical thinking. Well spoken and written communication abilities. Ability to remain calm in pressurized situations. Ability to keep current on emerging trends and new technologies in area of specialization. Academic qualifications and certifications: Bachelor's degree or relevant qualification in Information Technology or Computing or a related field. Security certifications such as (but not limited to) AZ-500, SC-200, Security+, CEH, CISSP, CISM or similar Certification in different networking technologies such as CCNA, JNCIA, ACCA, PCNSA, CCSA is advantageous. Required experience: Entry level experience in SOC Analysis Operations. Entry level experience in SIEM usage for investigations. Entry level experience in Security technologies such as (but not limited to) Firewall, IPS, IDS, Proxy. Entry level experience in dealing with technical support to clients. Entry level experience in handling security incidents end to end. Entry level experience in configuring/managing security controls, such as SIEM, Firewall, IDS/IPS, EDR, NDR, UTM, Proxy, SOAR, Honeypots and other security tools. Entry level experience in Security Analysis or Engineering preferably gained within a global services organization. Workplace type : Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

Posted 1 week ago

Apply

3.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cyber Managed Service -Threat Detection & Response - Security Orchestration, Automation and Response (Sentinel SOAR) - Senior KEY Capabilities : Excellent teamwork skills, passion and drive to succeed and combat Cyber threats Working with the customer to identify security automation strategies and provide creative integrations and playbooks. Work collaboratively with other team members to find creative and practical solutions to customers’ challenges and needs. Responsible for execution and maintenance of Sentinel SOAR related analytical processes and tasks Management and administration of Sentinel SOAR platform Developing custom scripts and playbooks to automate repetitive tasks and response actions. Experienced developer with at least 2 + yrs of experience using Python programming language, REST API and JSON. Must have basic SQL knowledge. Knowledge on Incident Response and Threat Intelligence tools. Creation of reusable and efficient Python-based Playbooks. Use Splunk SOAR platform to enable automation and orchestration on various tools and technologies by making use of existing or custom integration Partner with security operations teams, threat intelligence groups and incident responders. Should have worked in a security operations center and gained understanding of SIEM solutions like Splunk, Microsoft Sentinel and other log management platforms. Having experience in Splunk content development will be an added advantage Willing to learn new technologies and take up new challenges. Assist in developing high-quality technical content such as automation scripts/tools, reference architectures, and white papers. Good grasp in conceptualizing and/or implementing automation for business process workflows Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in endpoint protection tools, techniques and platforms such as Carbon Black, Tanium, Microsoft Defender ATP, Symantec, McAfee or others Should be able to assist, support and mitigate production issues. Should have the capability to work with partners and client stack holders to full fill their asks Ability to Coordinate with Vendor to incident closure on according to the severity Review, assess, benchmark and develop issue remediation action plans for all aspects of an engagement. Qualification & experience: Minimum of 3+ years’ experience in cyber security with a depth of network architecture knowledge that will translate over to deploying and integrating Sentinel SOAR solution in global enterprise environments. Experience working in ServiceNow SOAR is also an added advantage Strong oral, written and listening skills are an essential component to effective consulting. Strong background in network administration. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary. Should have strong hands-on experience with scripting technologies like Python, REST, JSON, SOAP, ODBC, XML etc. Must have honours degree in a technical field such as computer science, mathematics, engineering or similar field Minimum 2 years of working in SOAR (Sentinel) Experience in Process Development, Process Improvement, Process Architecture, and Training Quick to apprehend and adapt new applications. Knowledgeable in Cybersecurity and Incident Response Management Certification in any one of the SIEM Solution such as Splunk or SC-200 will be an added advantage Certifications in a core security related discipline will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 week ago

Apply

0 years

3 - 3 Lacs

Hyderābād

On-site

Description Why Join DAZN? Joining DAZN in Hyderabad means being part of a cutting-edge sports streaming company in a vibrant tech hub. You’ll work alongside passionate, talented professionals on innovative projects that reach millions of fans worldwide. Hyderabad offers a dynamic work environment with a great balance of career growth and lifestyle. If you’re excited about shaping the future of live and on-demand sports entertainment, DAZN Hyderabad is the perfect place to make your mark and grow your career. The Role: Join DAZN's Security Operations team as a Security Operations Analyst and help protect the world's leading global sports streaming platform. You'll be part of a dynamic team responsible for detecting, investigating, and responding to security threats across our diverse technology stack, from cloud infrastructure to broadcasting systems that deliver live sports to millions of fans worldwide. Key Responsibilities Threat Detection & Response Configure, maintain, and monitor security alerts and escalations from various tools including Microsoft Sentinel SIEM, Defender for Endpoint, WIZ, AWS WAFv2, Tenable, and other security platforms Lead and drive incident response activities from initial detection through remediation to prevention Conduct thorough incident root cause analysis and recommend actionable steps to prevent future occurrences Triage and investigate security alerts, determining true positives from false positives Threat Intelligence & Analysis Monitor and analyze global threat intelligence trends with potential impact on DAZN's business operations Get hands-on with threat feeds and real-time attack data, with particular focus on threats targeting broadcasting and streaming environments Configure new detection rules and alerts based on emerging threats, hunt results, or lessons learned from incident analysis. Security Operations Enhancement Identify, develop, and implement new processes and procedures to strengthen our security operations program Contribute to the development of custom automation tools to enhance monitoring and response capabilities Collaborate with the team to continuously improve security monitoring across our cloud and on-prem environments. Stakeholder Support Respond to internal security-related questions and requests from teams across DAZN Provide security and privacy expertise to support multiple business units and technical teams Participate in security awareness initiatives and help educate colleagues on security best practices. Skills, Knowledge & Expertise Essential Requirements Strong passion for cybersecurity, particularly threat detection and response Experience handling complex security incidents and conducting investigations Knowledge across multiple cybersecurity domains (network security, identity security, endpoint protection, cloud security, etc.) Familiarity with SIEM platforms (Microsoft Sentinel experience preferred) Understanding of security tools such as EDR, CASB, CSPM solutions Ability to work independently with minimal guidance while managing multiple tasks within set timeframes Strong analytical and problem-solving skills with attention to detail. Experience with Microsoft 365 E5 security stack and Azure security services Knowledge of AWS security services and cloud security best practices Familiarity with vulnerability management tools (Tenable, Nessus, Qualys) Experience with security automation and scripting Understanding of streaming/broadcasting technology security considerations Relevant security certifications (Security+, CySA+, GCIH, etc.) About DAZN At DAZN, we bring ambition to life. We are innovators, game-changers and pioneers. So, if you want to push boundaries and make an impact, DAZN is the place to be. As part of our team, you'll have the opportunity to make your mark and the power to make change happen. We're doing things no-one has done before, giving fans and customers access to sport anytime, anywhere. We're using world-class technology to transform sports and revolutionise the industry and we're not going to stop. DAZN VALUES – THE ‘HOW’ IN WHAT WE DO: Agility and creativity fuel growth and innovation, to Make It Happen. Prioritising what matters drives progress and positive outcomes, Focusing On Impact. Collective ambition builds optimism and success, in order to Win As One. At DAZN, we are committed to fostering an inclusive environment that values equality and diversity, where everyone can contribute and have their voices heard. This means hiring and developing talent across all races, ethnicities, religions, age groups, sexual orientations, gender identities and abilities. Everyone has the opportunity to make change and impact our DEI journey by joining our ERGs: Proud@DAZN, Women@DAZN, Disability@DAZN and ParentZone. If you’d like to include a cover letter with your application, please feel free to. Please do not feel you need to apply with a photo or disclose any other information that is not related to your professional experience. Our aim is to make our hiring processes as accessible for everyone as possible, including providing adjustments for interviews where we can. We look forward to hearing from you.

Posted 1 week ago

Apply

0 years

6 - 8 Lacs

Delhi

On-site

Advanced Troubleshooting & Support: Act as an escalation point (L2) for Zscaler-related issues. Diagnose and resolve complex security, networking, and performance-related issues. Work closely with vendors and internal teams to resolve critical incidents. Implementation & Administration: Lead the deployment and configuration of Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA). Optimize security policies, access control lists (ACLs), and traffic forwarding methods. Manage integrations with SIEM, EDR, and other security tools. Performance Optimization & Tuning: Analyze and fine-tune Zscaler performance metrics, including latency, bandwidth, and routing. Conduct deep packet inspection (DPI) and log analysis for security monitoring. Security Policy Management: Design and implement web filtering, SSL inspection, data loss prevention (DLP), and sandboxing policies. Enforce zero-trust security principles across the organization. Collaboration & Documentation: Work closely with SOC, NOC, and IT teams to align security policies with business requirements. Create detailed documentation for configurations, troubleshooting steps, and best practices. Provide training and knowledge transfer to L1/L2 teams. Required Skills : Troubleshooting & Analysis: Strong experience in packet capture analysis (Wireshark, tcpdump). Proficiency in using Zscaler logs, dashboards, and reporting tools for incident resolution. Ability to diagnose and resolve proxy bypass, latency, authentication, and tunneling issues. Soft Skills: Excellent problem-solving and analytical skills. Strong communication and collaboration abilities. Job Types: Full-time, Permanent Pay: ₹600,000.40 - ₹800,000.34 per year Benefits: Health insurance Provident Fund Work Location: In person

Posted 1 week ago

Apply

0 years

2 - 3 Lacs

Delhi

On-site

About the Role As a fresher SOC Analyst in an OEM environment, you'll learn how to operate SIEM platforms that monitor networking devices and hardware logs. This is a hands-on opportunity to develop foundational cybersecurity skills, from basic alert triage to refining detection capabilities. Key Responsibilities 1. SIEM Monitoring & Alert Triage Use SIEM tools to monitor alerts and events from network devices, and endpoints. Perform initial triage: distinguish security incidents from false positives, and escalate them appropriately. Document and log all alert investigations clearly in the SOC ticketing system. 2. Log & Incident Documentation Analyze system and network logs to detect anomalies or IOC patterns. Support incident documentation with root cause analysis and step-by-step actions taken. Maintain detailed incident records to support compliance and escalation. 3. SIEM Configuration Support Assist in onboarding new log sources: collect, normalize, and categorize OEM system logs. Help tune existing correlation rules to reduce alert fatigue and improve accuracy under guidance 4. Learning, Process & Collaboration Collaborate with senior analysts and network engineers to enhance detection coverage and FAQ procedures. Participate in SIEM rule tuning, dashboard creation, and documenting standard operating procedures (SOPs). Engage in continuous learning: attend training, internal sessions, and keep up with emerging threats and best practices. Technical Skills & Qualifications Basic knowledge of networking (OSI model, TCP/IP, DNS, HTTP), security principles, and common cyber threats (malware, phishing, ransomware) . Hands-on experience with home labs or training platforms . Strong problem-solving skills and attention to detail when investigating logs. Exposure to Python, PowerShell, or regex helpful for log parsing or automation. Soft Skills Demonstrable curiosity and eagerness to learn the best entry-level analysts are team players looking to grow and iterate fast . Effective communication , both written and verbal for documenting incidents and collaborating across teams. Attention to detail and discipline in following SOPs and logging investigative steps. Ability to work in shifts (including early or late hours) as part of a SOC 24/7 environment. Job Type: Full-time Pay: ₹240,000.00 - ₹300,000.00 per year Location: Dehli, Delhi (Required) Work Location: In person

Posted 1 week ago

Apply

1.0 - 2.0 years

2 - 4 Lacs

Mohali

On-site

About Us: Cywarden is a fast-growing cybersecurity firm based in the United States. We provide advanced security solutions to protect businesses from ever-evolving digital threats. Our mission is to make the digital world safer—one organization at a time. We are looking for a results-driven Cybersecurity Sales Executive who is passionate about technology and eager to drive revenue growth by identifying, developing, and closing new business opportunities. Key Responsibilities: Identify and engage new business prospects through cold outreach, networking, and inbound leads. Understand client needs and present tailored cybersecurity solutions to address their pain points. Manage the full sales cycle – from lead generation and proposal development to contract negotiation and closing. Build and maintain strong, long-term relationships with clients and key decision-makers. Meet or exceed monthly and quarterly sales targets. Collaborate with the marketing and technical teams to align messaging and strategies. Stay updated on industry trends, competitor offerings, and evolving cybersecurity threats. Qualifications: 1-2 years of B2B sales experience, preferably in cybersecurity, SaaS, IT services, or tech. Proven track record of meeting or exceeding sales targets. Strong understanding of cybersecurity products and services (e.g., SOC, SIEM, endpoint protection, penetration testing, etc.) is a big plus. Excellent communication, presentation, and negotiation skills. Self-starter with the ability to work independently and manage multiple deals simultaneously. Bachelor’s degree in Business, Marketing, Information Technology, or a related field preferred. Job Type: Full-time Pay: ₹18,000.00 - ₹34,000.00 per month Location: Mohali, Punjab (Required) Shift availability: Night Shift (Required) Work Location: In person

Posted 1 week ago

Apply

2.0 years

3 - 4 Lacs

Ahmedabad

On-site

Key Responsibilities: ● Develop, implement, and maintain information security policies, standards, and procedures aligned with organizational goals. ● Monitor security incidents and events, utilizing security information and event management (SIEM) tools to identify and respond to threats. ● Conduct risk assessments and vulnerability assessments to identify potential security threats and weaknesses. ● Support the incident response process by investigating and documenting security incidents. ● Collaborate with IT teams to ensure that security best practices are integrated into the design and architecture of systems and applications. ● Lead incident response activities, including investigation, documentation, and reporting of security incidents ● Conduct training and awareness programs to educate employees on security policies, practices, and emerging threats. ● Assist in compliance audits and reviews to ensure adherence to industry standards and regulations . ● Stay current on emerging security threats and trends, recommending appropriate mitigation strategies and technologies. ● Participate in security awareness initiatives and promote a culture of security within the organization. ● Assist in the evaluation and implementation of security tools and technologies to enhance the organization's security posture. Job Types: Full-time, Permanent Pay: ₹358,200.35 - ₹439,311.00 per year Schedule: Morning shift Experience: Information security: 2 years (Preferred) Work Location: In person

Posted 1 week ago

Apply

2.0 - 5.0 years

4 - 8 Lacs

Hyderabad, Madhwapur

Work from Office

THIS JOB IS FOR HYDERABAD LOCATION. Overview Information Security Analyst: Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Maintains hardware, software and network firewalls and encryption protocols. Administers security policies to control physical and virtual access to systems. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Job Code Tip: May be internal or external, client-focused, working in conjunction with Professional Services and outsourcing functions. May include company-wide, web-enabled solutions. Individuals whose primary focus is on developing, testing, debugging and deploying code or processing routines that support security protocols for an established system or systems should be matched to the appropriate Programmer or Programmer/Analyst family in the Information Technology/MIS functional area. Responsibilities Should have process knowledge and technical knowledge on any of the SIEM tools ( like Qradar, LogRhythm, AlienVault, Splunketc). L2/L3 level is added advantage. Should have process knowledge and technical knowledge in AV tools like Symantec, McAfee, Trend Microetc. L2/L3 level is added advantage. Should have knowledge in managing Vulnerability tools and various remediation efforts. Review security logs generated by applications, devices and other systems, taking action or escalating to appropriate teams as needed. Enforce incident response service level agreement. Work with the global IT Security team to analyze, test and recommend tools to strengthen the security posture of the company Create and maintain operational reports allowing IT management team to understand the current and historical landscape of the IT security risks Vulnerability management assessment and remediation Participate in daily and ad-hoc meetings related to cyber security, controls and compliance, processes and documentation related tasks Research the latest information technology (IT) security trends Help plan and carry out an organizations way of handling security Develop security standards and best practices for the organization Recommend security enhancements to management or senior IT staff Document security breaches and assess the damage they cause. Performs other duties as assigned. Uphold the companys core values of Integrity, Innovation, Accountability, and Teamwork. Demonstrate behavior consistent with the companys Code of Ethics and Conduct. It is the responsibility of every employee to report to their manager or a member of senior management any quality problems or defects in order for corrective action to be implemented and to avoid recurrence of the problem. Duties may be modified or assigned at any time to meet the needs of the business. Qualifications B. Tech, B.E or M.C.A 2-5 years Experience working in a Security Operations Center 2 years minimum in the computer industry Knowledge working with complex Windows environments Knowledgeable in various security frameworks such as NIST 800-53 / NIST 800-171 / ISO27001 Knowledge in design and administration of security tools Good written and verbal communication skills

Posted 1 week ago

Apply

3.0 years

0 Lacs

Noida

On-site

Role Description We are seeking a highly skilled and self-driven Cybersecurity Specialist with hands-on experience in Imperva Database Activity Monitoring (DAM) to join our security operations team. The ideal candidate will have deep expertise in deploying, configuring, and troubleshooting Imperva DAM solutions, along with broad knowledge of various other enterprise security tools. The role requires strong problem-solving abilities, attention to detail, and a proactive mindset for enhancing our security posture. Job Responsibilities Install, configure, and manage Imperva DAM across diverse environments. Perform ongoing administration, health checks, and tuning of Imperva systems. Develop and maintain security policies, rulesets, and custom alerts within Imperva DAM. Work closely with DBAs, system admins, and compliance teams to support audit and monitoring requirements. Troubleshoot and resolve performance, connectivity, and configuration issues related to security tools. Deploy and support other security tools such as SIEMs, vulnerability scanners, endpoint security platforms, firewalls, etc. Maintain detailed technical documentation, SOPs, and architectural diagrams. Stay current with emerging threats, vulnerabilities, and best practices in data protection and security monitoring. Assist in incident response and investigations involving data access or database-related threats. Required Qualifications 3+ years of experience in cybersecurity, with 2+ years of hands-on work with Imperva DAM . Strong understanding of database environments (Oracle, SQL Server, MySQL, etc.) and how DAM integrates with them. Proven experience in installation, configuration, upgrade, and troubleshooting of security tools in enterprise environments. Working knowledge of Linux and Windows systems. Familiarity with SIEM (e.g., Splunk, QRadar), endpoint protection (e.g., CrowdStrike, SentinelOne), and vulnerability scanners (e.g., Qualys, Nessus). Strong scripting skills (e.g., Shell, PowerShell, Python) are a plus. Excellent communication, documentation, and analytical skills. Job Type: Full-time Pay: ₹10,523.07 - ₹67,466.61 per month Work Location: In person

Posted 1 week ago

Apply

15.0 years

0 Lacs

Calcutta

On-site

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Security Information and Event Management (SIEM), Splunk Security Information and Event Management (SIEM) Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary: We are looking for a proactive and detail-oriented SOC Analyst (Incident Response) to join our Security Operations Center (SOC) team. In this role, you will be responsible for detecting, analyzing, and responding to cybersecurity incidents using a combination of technology solutions and processes. Roles & Responsibilities: - Monitor security alerts and events from various sources (SIEM, EDR, firewall logs, IDS/IPS, etc.) to detect potential security incidents. - Triage, investigate, and respond to incidents following standard operating procedures (SOPs) and incident response playbooks. - Perform in-depth analysis of security incidents to identify root causes, scope, and impact. - Escalate complex incidents to appropriate stakeholders and support containment, eradication, and recovery efforts. - Work with internal teams and external partners to contain and remediate threats. - Contribute to continuous improvement of detection capabilities and IR processes. - Maintain incident documentation and provide detailed reports post-incident. - Stay current with emerging threats, vulnerabilities, and incident response best practices. Professional & Technical Skills: - 2–5 years of experience in a Security Operations Center (SOC) or similar cybersecurity role. - Strong understandin of security technologies such as SIEM, EDR, IDS/IPS, firewalls, and antivirus. - Experience with incident detection, triage, analysis, and response. - Familiarity with MITRE ATT&CK framework and other threat models. - Knowledge of operating systems (Windows/Linux), networking protocols, and cloud environments. - Strong analytical and problem-solving skills. - Excellent verbal and written communication skills. - Industry certifications such as CEH, GCIH, GCIA, or CompTIA Security+ are a plus. Additional Information: - The candidate should have minimum 3 years of experience in Splunk, QRadar or any SIEM tool. - This position is based at our Bengaluru office. - A 15 years full time education is required. 15 years full time education

Posted 1 week ago

Apply

0.0 - 1.0 years

1 - 2 Lacs

India

On-site

Job Title: SOC Analyst with Python Knowledge (Fresher Level) Location: Indore Experience: 0–1 year Employment Type: Full-Time Job Summary: We are looking for a motivated and technically skilled fresher to join our cybersecurity team as a SOC Analyst with Python expertise . The ideal candidate should have a strong understanding of cybersecurity principles and hands-on experience with Python scripting to automate tasks and analyze data. This is an excellent opportunity for someone eager to kickstart a career in cybersecurity and grow in a dynamic, fast-paced environment. Key Responsibilities: Monitor security alerts and events using SIEM tools and escalate threats as per defined protocols Perform initial analysis of security incidents and assist in threat detection and incident response Create and enhance Python scripts for log parsing, automation, alerting, and data analysis Assist in implementing security use cases and correlating logs for detection Prepare daily/weekly reports and dashboards from SOC tools Stay updated with the latest cybersecurity threats and trends Collaborate with senior analysts and support investigation of incidents Required Skills and Qualifications: Bachelor’s degree in Computer Science, IT, Cybersecurity, or related field Knowledge of SOC operations, SIEM tools (e.g., Splunk, QRadar, ArcSight), IDS/IPS, and basic incident response workflow Strong hands-on experience in Python scripting (file handling, APIs, data analysis, etc.) Understanding of networking protocols, logs (Windows, Linux, firewall, etc.), and cyber threat landscape Analytical thinking with strong problem-solving skills Good communication and documentation skills Preferred (Good to Have): Any internship or academic project related to SOC or security analysis Exposure to Linux command line and log management Basic knowledge of MITRE ATT&CK or cyber kill chain Job Type: Full-time Pay: ₹15,000.00 - ₹17,000.00 per month Benefits: Cell phone reimbursement Paid time off Provident Fund Work Location: In person

Posted 1 week ago

Apply

4.0 years

3 - 5 Lacs

Jaipur

On-site

Vaibhav Global limited Jaipur, Rajasthan khushboo.rathore@vaibhavglobal.com Posted : 5 hours ago Vaibhav Global Ltd (VGL) Company Overview: Listed in 1996-97 on Indian stock exchanges, Vaibhav Global Ltd (VGL) is an end-to-end electronic deep discount retailer of fashion jewelry, gemstones, and lifestyle products, operating in the US, UK, Germany, and Canada. Shopping Experience: Today's customers seek convenience, and VGL meets this demand through its proprietary 24/7 TV shopping channels (Shop LC in the US and Germany, and Shop TJC in the UK), as well as through various digital mediums including websites, mobile apps, OTT platforms, social media, and third-party marketplaces. VGL reaches almost 124 million households across the US, UK, and Germany. As digitization progresses and online retail continues to grow, VGL's portfolio and omni-channel strategy will evolve accordingly. Financials and Workforce: VGL reported a group turnover of approximately Rs. 3,041 Crore (FY 2023-2024) and employs over 3800 people globally. The company’s head office and main manufacturing facility are in Jaipur, India, employing around 3000 people, including contract workers. Acquisitions: Mindful Souls B.V.: In FY23-24, VGL acquired Mindful Souls B.V., a Netherlands-based e-commerce company specializing in subscription-based online sales of fashion jewelry, gemstones, and lifestyle products. This acquisition is expected to leverage VGL's sourcing and manufacturing strengths while enhancing digital business capabilities. Ideal World: VGL, through its subsidiary Shop TJC Ltd (UK), acquired the assets of Ideal World, a well-known teleshopping and digital retail brand in the UK. This acquisition includes IP rights, broadcasting rights, studio equipment, and other intangible assets. Environmental and Social Responsibility: VGL is committed to sustainable business practices and renewable energy initiatives. The company's SEZ unit in India received the ‘Excellence Award’ for ‘IGBC Performance Challenge 2021 for Green Built Environment,’ reflecting its dedication to environmental sustainability. VGL's ‘Your Purchase Feeds...’ initiative has provided 87 million meals to school children in India, the US, and the UK. The company encourages employees to donate at least two hours each month to charitable causes, tracked through its performance system. VGL is also a Great Place to Work (GPTW) certified organization. Shop LC Overview: Shop LC, a VGL subsidiary, was established in Austin, TX in 2007 and now broadcasts live to 75 million homes in the US. The growing e-commerce presence is supported by the website Shop LC. Shop LC ships approximately 25,000 products daily to US customers and employs around 550 people in various operational roles. The US is VGL’s largest market, contributing 68% to consolidated revenue. TJC Overview: TJC, another VGL subsidiary, was established in London, UK in 2006 and broadcasts live to 25 million homes in the UK. The company’s e-commerce presence is supported by the website TJC. TJC ships approximately 12,000 products daily to UK customers and employs around 220 people in London, with extended teams in India. Shop LC Germany Overview: Launched in 2021 from Dusseldorf, Germany, Shop LC Germany TV & e-commerce is a new market with significant growth potential. The business currently reaches 27 million households and is expanding. The e-commerce site can be accessed at Shop LC Germany. Our Purpose: Delivering joy. Our Vision: Be the Value Leader in Electronic Retailing of Jewelry and Lifestyle Products. Our Mission: To deliver one million meals per day to children in need by FY40 through our one-for-one meal program: your purchase feeds... Our Core Values: Teamwork Honesty Commitment Passion Positive Attitude As a Security Specialist, you will help keep our digital systems safe. This includes setting up firewalls and web protections, monitoring network activity, and responding to security issues quickly. You’ll also support compliance, document security procedures, and work with other teams on technical tools. Key Responsibilities Install and manage firewalls (e.g., Fortinet, Palo Alto) and WAF tools (e.g., Azure WAF, Cloudflare) Set up and maintain Azure networking (routing, private access) Create and enforce security access rules Monitor logs, detect threats, and resolve incidents Implement CNAPP/CSPM tools in Azure cloud environments Collaborate with DevOps to add security to CI/CD pipelines Support audits (like PCI-DSS, ISO 27001, SOC 2) Write SOPs, runbooks, and incident support documentation Evaluate new tools and run tests as needed Required Skills and Experience 4–7 years working in network and cloud security Strong experience with NGFWs, WAFs, Azure cloud security tools Knowledge of SIEM platforms and packet capture tools (e.g., Wireshark) Good understanding of VPNs, TCP/IP, and application security Excellent problem-solving and communication skills Job Overview Compensation ₹ Competitive Salary & Benefits Yearly Level Mid Location Jaipur, Rajasthan Experience 3+ Years Qualification Bachelors Degree Work Mode: Onsite Job Type: Fulltime

Posted 1 week ago

Apply

4.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-TDR Senior As part of our EY-cyber security team, who shall work as SOC Senior consultant who will assist clients in Administration and management of security solutions. The opportunity We’re looking for Senior Security consultant with expertise in CrowdStrike. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Your Key Responsibilities Administration and management support of CrowdStrike Perform as the subject matter expert on any of the above solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. Content development which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Skills And Attributes For Success Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities. Experience in managing CrowdStrike Good knowledge of SIEM technologies such as Splunk, Azure Sentinel from an Analyst’s point of view Exposure to IOT/OT monitoring (Claroty, Nozomi Networks etc.) is a plus Good knowledge and experience in Security Monitoring Good knowledge and experience in Cyber Incident Response Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in other endpoint protection tools, techniques, and platforms such as Carbon Black, Symantec, or others To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Demonstrate both technical acumen and critical thinking abilities. Strong interpersonal and presentation skills. Minimum 4 years of Hands-on experience of operating/implementing the above security tools. Certification in any of the SIEM platforms is a plus Knowledge of RegEx, Perl scripting and SQL query language. Certification - CCSA, CEH, CISSP, GCIH, GIAC. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 week ago

Apply

3.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cyber Managed Service -Threat Detection & Response - Security Orchestration, Automation and Response (Sentinel SOAR) - Senior KEY Capabilities : Excellent teamwork skills, passion and drive to succeed and combat Cyber threats Working with the customer to identify security automation strategies and provide creative integrations and playbooks. Work collaboratively with other team members to find creative and practical solutions to customers’ challenges and needs. Responsible for execution and maintenance of Sentinel SOAR related analytical processes and tasks Management and administration of Sentinel SOAR platform Developing custom scripts and playbooks to automate repetitive tasks and response actions. Experienced developer with at least 2 + yrs of experience using Python programming language, REST API and JSON. Must have basic SQL knowledge. Knowledge on Incident Response and Threat Intelligence tools. Creation of reusable and efficient Python-based Playbooks. Use Splunk SOAR platform to enable automation and orchestration on various tools and technologies by making use of existing or custom integration Partner with security operations teams, threat intelligence groups and incident responders. Should have worked in a security operations center and gained understanding of SIEM solutions like Splunk, Microsoft Sentinel and other log management platforms. Having experience in Splunk content development will be an added advantage Willing to learn new technologies and take up new challenges. Assist in developing high-quality technical content such as automation scripts/tools, reference architectures, and white papers. Good grasp in conceptualizing and/or implementing automation for business process workflows Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in endpoint protection tools, techniques and platforms such as Carbon Black, Tanium, Microsoft Defender ATP, Symantec, McAfee or others Should be able to assist, support and mitigate production issues. Should have the capability to work with partners and client stack holders to full fill their asks Ability to Coordinate with Vendor to incident closure on according to the severity Review, assess, benchmark and develop issue remediation action plans for all aspects of an engagement. Qualification & experience: Minimum of 3+ years’ experience in cyber security with a depth of network architecture knowledge that will translate over to deploying and integrating Sentinel SOAR solution in global enterprise environments. Experience working in ServiceNow SOAR is also an added advantage Strong oral, written and listening skills are an essential component to effective consulting. Strong background in network administration. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary. Should have strong hands-on experience with scripting technologies like Python, REST, JSON, SOAP, ODBC, XML etc. Must have honours degree in a technical field such as computer science, mathematics, engineering or similar field Minimum 2 years of working in SOAR (Sentinel) Experience in Process Development, Process Improvement, Process Architecture, and Training Quick to apprehend and adapt new applications. Knowledgeable in Cybersecurity and Incident Response Management Certification in any one of the SIEM Solution such as Splunk or SC-200 will be an added advantage Certifications in a core security related discipline will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 week ago

Apply

17.0 years

0 Lacs

New Delhi, Delhi, India

On-site

Greetings from GIGABIT Technologies !! With 17+ years of deep expertise in the Cybersecurity and Enterprise IT solutions space , GIGABIT Technologies has proudly established itself as one of the leading System Integrators in North India , serving critical sectors including government, enterprise, and BFSI . As we continue to grow and expand our footprint across India, we are looking to strengthen our technical team with passionate, skilled, and driven individuals. Role Description As a Network & Security Engineer , you will be responsible for designing, deploying, configuring, and supporting complex network and security infrastructure solutions across multiple client environments. You will work closely with internal sales, OEM partners, and customer IT teams to deliver secure, scalable, and high-performance infrastructure solutions. Reach out to us with your updated resume at krishnak@gigabittech.in Key Responsibilities: Solution Design & Deployment: Design and implement enterprise-grade network and cybersecurity solutions as per customer requirements. Configure and deploy firewalls, routers, switches, wireless controllers, and security appliances (Fortinet, Cisco, Arista, Palo Alto, etc.). Integrate security tools such as endpoint protection, DLP, SIEM, email security, and MFA solutions. Work on Layer 2/3 switching, routing protocols (OSPF, BGP), VLANs, VPNs, and load balancers. Customer Support & Project Execution: Deliver end-to-end project execution including installation, configuration, UAT, documentation, and handover. Provide L2/L3 technical support for troubleshooting and incident resolution in customer environments. Work in coordination with OEMs for escalations and TAC support. Pre-sales & Technical Consultation: Assist the sales team with solution design, BOM preparation, and proposal documentation. Participate in customer meetings, technical presentations, and POCs (Proof of Concept). Conduct site surveys and assessments for solution sizing and planning. Documentation & Compliance: Prepare high-quality implementation and configuration documentation. Ensure adherence to best practices and customer-specific compliance requirements (ISO, PCI-DSS, etc.). Required Skills & Experience: Bachelor's degree in IT, Computer Science, or related field. 4–6 years of relevant experience in system integration, networking, and cybersecurity. Hands-on experience with OEM solutions like Cisco, Fortinet, Sophos, Palo Alto, Check Point, Aruba, etc. Strong grasp of IP networking, firewalls, NAT, ACLs, IDS/IPS, VLANs, and VPNs. Experience with cloud networking/security (Azure, AWS, GCP) is an added advantage. Certification preferred: CCNA, CCNP, Fortinet NSE (4 or above), Sophos, PCNSE, etc.

Posted 1 week ago

Apply

2.0 - 3.0 years

11 - 16 Lacs

Pune

Work from Office

Application Security Risk Classification Analyst Project description Do you have the know-how to apply business analysis techniques to deliver process and control execution in Application Security area? Are you a committed and collaborative team player with an analytical and logical mind-set? Are you motivated to work in a complex, diverse and global environment? ASCA (Application Security Risk Classification (ASCA) is part of a global organization within Technology Information Security Office (TISO). Our services focus on Cyber Hygiene for applications and infrastructure, detecting/remediating/governing measures for cyber threats. . You'll be working as part of our global Application Security team. As an ASCA Analyst, you'll play an important role in ensuring the on-going cyber-security of our client. We offer flexibility in the workplace and equal opportunities to all our team members. Our team is global, diverse and collaborative as we work across organizations to keep our technology, applications and the businesses they support secure. Responsibilities We're looking for a ASCA business analyst to: On-board applications to Application Security Framework (ASF) in cooperation with the Software Component Manager (SWCM) Management of applications in scope of control processes and execution Management of the pipeline of the applications to be onboarded Coordinating entries to Application Security Management System Compliance reporting to stakeholders, including risk and compliance teams. Production Tollgate verification for releasing applications into Production environment. Skills Must have Your expertise Ideally 2-3 years of experience in applying cyber security analysis or administration, preferably in IT Security or Risk Management projects (Application Security area preferred). Experience with data analysis proficiency with Excel is a must. Ability to work independently on assigned tasks and driving them from start to completion. Ability to challenge and propose possible improvements (in various areas, e.g. process, reporting) Ability to explain complex concepts in a clear and concise manner Use to work with stakeholders on different levels of the organization Use to work in a demanding and variable environment Excellent written and verbal communication skills Fluent in English Nice to have Experience within Application Security area preferred

Posted 1 week ago

Apply

3.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Company Description Aguna Solutions is an IT services company that leverages the power of technology to build better futures for our customers, colleagues, environment, and communities. We focus on modernizing operations and driving innovations through Robotics Process Automation, Product Development, Custom Development, Cyber/Information Security, Cloud services, Consulting, Implementation, Support, and Business Intelligence. Our mission is to fuel the future of digital innovation through inspired creativity, breaking free from traditional software, security, and systems limitations. Located at the nexus of Innovation and Engineering, we are committed to delivering high-quality services managed by proven processes and models. Role Description We are seeking a highly skilled and self-driven Cybersecurity Specialist with hands-on experience in Imperva Database Activity Monitoring (DAM) to join our security operations team. The ideal candidate will have deep expertise in deploying, configuring, and troubleshooting Imperva DAM solutions, along with broad knowledge of various other enterprise security tools. The role requires strong problem-solving abilities, attention to detail, and a proactive mindset for enhancing our security posture. Job Responsibilities Install, configure, and manage Imperva DAM across diverse environments. Perform ongoing administration, health checks, and tuning of Imperva systems. Develop and maintain security policies, rulesets, and custom alerts within Imperva DAM. Work closely with DBAs, system admins, and compliance teams to support audit and monitoring requirements. Troubleshoot and resolve performance, connectivity, and configuration issues related to security tools. Deploy and support other security tools such as SIEMs, vulnerability scanners, endpoint security platforms, firewalls, etc. Maintain detailed technical documentation, SOPs, and architectural diagrams. Stay current with emerging threats, vulnerabilities, and best practices in data protection and security monitoring. Assist in incident response and investigations involving data access or database-related threats. Required Qualifications 3+ years of experience in cybersecurity, with 2+ years of hands-on work with Imperva DAM . Strong understanding of database environments (Oracle, SQL Server, MySQL, etc.) and how DAM integrates with them. Proven experience in installation, configuration, upgrade, and troubleshooting of security tools in enterprise environments. Working knowledge of Linux and Windows systems. Familiarity with SIEM (e.g., Splunk, QRadar), endpoint protection (e.g., CrowdStrike, SentinelOne), and vulnerability scanners (e.g., Qualys, Nessus). Strong scripting skills (e.g., Shell, PowerShell, Python) are a plus. Excellent communication, documentation, and analytical skills. Preferred Qualifications Imperva Certified Implementation Specialist (if applicable). Experience with cloud deployments (AWS, Azure) of security tools. Prior experience supporting GRC/audit requirements (e.g., PCI-DSS, SOX). Knowledge of database security best practices and insider threat detection.

Posted 1 week ago

Apply

3.0 years

0 Lacs

Pune, Maharashtra, India

Remote

Summary: We are looking for a skilled Network Security Engineer with 2–3 years of hands-on experience in configuring, managing, and troubleshooting Palo Alto Networks security appliances. The ideal candidate should have a strong understanding of firewall policies, threat prevention features, and security best practices. Key Responsibilities: Configure, deploy, and manage Palo Alto Next-Generation Firewalls (NGFWs) Maintain and optimize security policies, NAT rules, and VPN tunnels (site-to-site and remote access) Monitor firewall logs, generate reports, and analyze security incidents Implement security features, including Threat Prevention, URL Filtering, App-ID, and WildFire Conduct regular firmware upgrades and patch management for Palo Alto appliances Collaborate with network and system teams to ensure secure architecture and deployment Perform routine audits and vulnerability assessments using Palo Alto tools Create and maintain documentation for configurations, processes, and security procedures Document configurations, processes, and troubleshooting steps clearly and professionally Communicate effectively with clients and team members to explain technical details. Work collaboratively with network, systems, and application teams to ensure secure deployments Required Skills and Qualifications –3 years of hands-on experience with Palo Alto NGFWs Solid knowledge of network protocols (TCP/IP, DNS, HTTP/S, VPNs) Experience with Panorama and Strata Cloud Manager for centralized firewall management Familiarity with security standards such as NIST, ISO, and compliance frameworks Strong troubleshooting skills and attention to detail Preferred Qualifications: Any Graduate or PCNSA or PCNSE certification Knowledge of SIEM tools and integration

Posted 1 week ago

Apply

3.0 - 8.0 years

3 - 12 Lacs

Chennai

Work from Office

Responsibilities: * Conduct threat analysis using SOC tools like QRadar & LogRhythm. * Collaborate with incident response team on security incidents. * Monitor network activity for suspicious behavior.

Posted 1 week ago

Apply

3.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Skills :- Devops background, SCA, Product security,Stakeholder management Shift Timing :- 2.00 pm - 11.00 pm Location :- Hyderabad Engineer, Product Security Omnicom Global Solutions, Hyderabad IN About Omnicom Global Solutions Omnicom Global Solutions is an integral part of Omnicom Group, a leading global marketing and corporate communications company. Omnicom’s branded networks and numerous specialty firms provide advertising, strategic media planning and buying, digital and interactive marketing, direct and promotional marketing, public relations, and other specialty communications services to over 5,000 clients in more than 70 countries. OGS India plays a critical role for our group companies and global agencies by providing stellar products, solutions, and services across Creative Services, Technology, Marketing Science (Data & Analytics), Advanced Analytics, Market Research, Business Support Services, Media Services, and Project Management. With over 4500 talented colleagues in India, we are growing rapidly and are looking for professionals like you to help build the next chapter of our journey. Let’s build this together! Role Overview We have an exciting opportunity for an Engineer, Product Security at our Hyderabad office. This role supports secure software development, risk mitigation, and product security best practices across automated platforms and infrastructure-as-code environments. The Product Security Engineer will perform vulnerability assessments, provide risk analysis, support incident response, and collaborate with development and DevOps teams to embed security into all stages of the product lifecycle. This role plays a vital part in enabling secure, scalable, and compliant services across Omnicom’s digital ecosystem. Key Responsibilities Assist in implementing secure software development standards and practices. Support integration of security measures into automated service platforms and infrastructure-as-code. Conduct regular security assessments and vulnerability scans for applications and infrastructure. Analyse and report on security risks and vulnerabilities; provide mitigation recommendations. Collaborate with the incident response team on investigations and real-time threat intelligence. Monitor and manage security tools to detect and respond to application and infrastructure threats. Continuously monitor cloud environments and SaaS platforms for emerging security threats. Work closely with development, QA, and IT teams to support secure software delivery. Prepare and present security metrics, reports, and summaries to Product Security Leads and stakeholders. Deliver security awareness training on secure software development and SecDevOps practices. Contribute to the maintenance of security documentation and internal guidelines. Required Qualifications 3-5 years of experience in cybersecurity, software engineering, or DevOps with a focus on product security. Familiarity with security assessment tools (e.g., SAST, DAST scanners) and CI/CD environments. Basic understanding of secure coding, cloud security, and infrastructure-as-code practices. Hands-on experience with tools such as GitHub, AWS, Terraform, Jenkins, Docker, etc. Understanding of IT governance frameworks (e.g., SDLC, ITIL) is a plus. Strong analytical, documentation, and troubleshooting capabilities. Bachelor's degree in Cybersecurity, Computer Science, IT, or related field. Strong technical skills relevant to Information Security such as secure coding standards, ethical hacking techniques, network security, SIEM, and risk analysis Certifications such as Security+ or CEH are a plus. Preferred Qualifications AppSec depth (CSSLP, eWPT), Cloud specialization (AWS Security), Foundational credibility (Security+), and CEH are a plus. Experience with cloud security frameworks and zero trust architecture.

Posted 1 week ago

Apply

15.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Position Title: Cloud Solutions Practice Head Location: Hyderabad, India (Travel as Needed) Reports To: CEO / Executive Leadership Team Employment Type: Full-Time | Senior Leadership Role Industry: Information Technology & Services | Cloud Solutions | AI & Digital Transformation Join the Future of Enterprise Cloud At BPMLinks , we are building a cloud-first future for enterprise clients across the globe. As our Cloud Solutions Practice Head , you won’t just lead a team, you’ll shape a legacy. Position Overview: BPMLinks LLC is seeking an accomplished and visionary Cloud Solutions Practice Head to establish and lead our newly launched Cloud Solutions Practice , aligning cloud innovation with business value creation. This is a pivotal leadership role that will oversee the full spectrum of cloud consulting, engineering, cost optimization, migration, and AI/ML-enabled services across our global delivery portfolio. The ideal candidate is a cloud thought leader with deep expertise across AWS, Azure, GCP , and modern data platforms (e.g., Snowflake, Databricks, Azure Data Factory, Oracle ). You will play a key role in scaling multi-cloud capabilities, building high-performing teams, and partnering with clients to drive cost efficiency, performance, security, and digital innovation. Key Responsibilities: 🔹 Practice Strategy & Leadership Define and execute the vision, roadmap, and service catalog for the Cloud Solutions Practice. Build a world-class delivery team of cloud architects, engineers, DevOps professionals, and data specialists. Align the practice’s capabilities with BPMLinks’ broader business transformation initiatives. 🔹 Cloud & Data Architecture Oversight Lead the design and deployment of scalable, secure, cost-optimized cloud solutions on AWS, Azure, and GCP. Direct complex cloud and data migration programs , including: Transitioning from legacy systems to Snowflake, Databricks, and BigQuery Data pipeline orchestration using Azure Data Factory, Airflow, Informatica Modernization of Oracle and SQL Server environments Guide hybrid cloud and multi-cloud strategies across IaaS, PaaS, SaaS, and serverless architectures. 🔹 Cloud Cost Optimization & FinOps Leadership Architect and institutionalize cloud cost governance frameworks and FinOps best practices. Leverage tools like AWS Cost Explorer, Azure Cost Management, and third-party FinOps platforms. Drive resource rightsizing, workload scheduling, RIs/SPs adoption, and continuous spend monitoring. 🔹 Client Engagement & Solution Delivery Act as executive sponsor for strategic accounts, engaging CXOs and technology leaders. Lead cloud readiness assessments, transformation workshops, and solution design sessions. Ensure delivery excellence through agile governance, quality frameworks, and continuous improvement. 🔹 Cross-Functional Collaboration & Talent Development Partner with sales, marketing, and pre-sales teams to define go-to-market strategies and win pursuits. Foster a culture of knowledge sharing, upskilling, certification, and technical excellence. Mentor emerging cloud leaders and architects across geographies. Cloud Services Portfolio You Will Lead: Cloud Consulting & Advisory Cloud readiness assessments, cloud strategy and TCO analysis Multi-cloud and hybrid cloud governance, regulatory advisory (HIPAA, PCI, SOC2) Infrastructure, Platform & Application Services Virtual machines, networking, containers, Kubernetes, serverless computing App hosting, API gateways, orchestration, cloud-native replatforming Cloud Migration & Modernization Lift-and-shift, refactoring, legacy app migration Zero-downtime migrations and DR strategies Data Engineering & Modern Data Platforms Snowflake, Databricks, BigQuery, Redshift Azure Data Factory, Oracle Cloud, Informatica, ETL/ELT pipelines DevOps & Automation CI/CD, Infrastructure-as-Code (Terraform, CloudFormation, ARM) Release orchestration and intelligent environment management Cloud Security & Compliance IAM, encryption, CSPM, SIEM/SOAR, compliance audits and policies Cost Optimization & FinOps Reserved instances, spot instances, scheduling automation Multi-cloud FinOps dashboards, showback/chargeback enablement AI/ML & Analytics on Cloud Model hosting (SageMaker, Vertex AI, Azure ML), RAG systems, semantic vector search Real-time analytics with Power BI, Looker, Kinesis Managed Cloud Services 24/7 monitoring (NOC/SOC), SLA-driven support, patching, DR management Training & Enablement Certification workshops, cloud engineering training, CoE development Required Qualifications: 15+ years of experience in enterprise IT and cloud solutions, with 5+ years in senior leadership roles Expertise in AWS, Azure, GCP (certifications preferred) Proven success in scaling cloud practices or large delivery units Hands-on experience with data platforms: Snowflake, Databricks, Azure Data Factory, Oracle In-depth understanding of FinOps principles, cost governance, and cloud performance tuning Excellent executive-level communication, strategic thinking, and client-facing presence Preferred Qualifications: Experience serving clients in regulated industries (healthcare, finance, public sector) Strong commercial acumen with experience in pre-sales, solutioning, and deal structuring MBA or advanced degree in Computer Science, Engineering, or Technology Management What We Offer: Opportunity to define and scale a global Cloud Practice from the ground up Direct influence on innovation, customer impact, and company growth Collaboration with a forward-thinking executive team and top-tier AI engineers Competitive compensation, performance-linked incentives, and potential equity Culture of ownership, agility, and continuous learning

Posted 1 week ago

Apply

3.0 - 8.0 years

0 Lacs

India

Remote

About Us Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. In addition to MDR and other services, Sophos’ complete portfolio includes industry-leading endpoint, network, email, and cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threat intelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at www.sophos.com. Role Summary Sophos is seeking a talented, experienced Software Development Engineer in Test to join our Sophos Central team. As a member of the Sophos Central Software Development Engineer in Test team, you will be working directly with Development, UX, PM and other functional groups to ensure highest quality software development and releases for the Central product. We look forward to welcoming another fantastic member onto our team! What You Will Do Design, develop, and maintain scalable and reliable test automation frameworks to ensure thorough coverage of application features Create and execute comprehensive test plans, including unit, integration, functional, and end-to-end tests to ensure high-quality releases Implement and optimize test automation within CI/CD pipelines for faster feedback cycles, leveraging parallel test execution and intelligent test segmentation Continuously improve test coverage and maintain high-quality standards by identifying gaps and addressing flaky tests. Provide detailed reporting and metrics on test results and quality status Work closely with developers, product managers, and other stakeholders to understand requirements and deliver high-quality software with automated tests from the start Incorporate performance and security testing into the automation pipeline, using tools like JMeter and OWASP ZAP to ensure robust and secure applications What Will You Bring 3-8 years of experience in Java automation testing Proficiency in Java coding and experience in writing maintainable, efficient, and scalable Java test scripts Proven experience in test automation framework development (preferably using Selenium) Experience testing RESTful web services Strong knowledge of CI/CD pipelines and experience with automation in environments like Jenkins, GitLab CI, or similar Familiarity with performance testing tools (e.g., JMeter, Gatling) and security testing tools (e.g., OWASP ZAP, Burp Suite) Desired to have experience with version control systems (e.g., Git) and code coverage tools (e.g., JaCoCo, Istanbul) Solid understanding of Agile methodologies and test strategies (unit, integration, regression, E2E, TDD) Expertise in writing clear, maintainable, and scalable test scripts Familiarity with cloud environments (e.g., preferably AWS) and containerization technologies (e.g., Docker) for scalable test execution Strong problem-solving skills and the ability to troubleshoot complex test automation issues Ready to Join Us? At Sophos, we believe in the power of diverse perspectives to fuel innovation. Research shows that candidates sometimes hesitate to apply if they don't check every box in a job description. We challenge that notion. Your unique experiences and skills might be exactly what we need to enhance our team. Don't let a checklist hold you back – we encourage you to apply. What's Great About Sophos? · Sophos operates a remote-first working model, making remote work the primary option for most employees. However, some roles may necessitate a hybrid approach. Please refer to the location details in our job postings for further information. · Our people – we innovate and create, all of which are accompanied by a great sense of fun and team spirit · Employee-led diversity and inclusion networks that build community and provide education and advocacy · Annual charity and fundraising initiatives and volunteer days for employees to support local communities · Global employee sustainability initiatives to reduce our environmental footprint · Global fitness and trivia competitions to keep our bodies and minds sharp · Global wellbeing days for employees to relax and recharge · Monthly wellbeing webinars and training to support employee health and wellbeing Our Commitment To You We’re proud of the diverse and inclusive environment we have at Sophos, and we’re committed to ensuring equality of opportunity. We believe that diversity, combined with excellence, builds a better Sophos, so we encourage applicants who can contribute to the diversity of our team. All applicants will be treated in a fair and equal manner and in accordance with the law regardless of gender, sex, gender reassignment, marital status, race, religion or belief, color, age, military veteran status, disability, pregnancy, maternity or sexual orientation. We want to give you every opportunity to show us your best self, so if there are any adjustments we could make to the recruitment and selection process to support you, please let us know. Data Protection If you choose to explore an opportunity, and subsequently share your CV or other personal details with Sophos, these details will be held by Sophos for 12 months in accordance with our Privacy Policy and used by our recruitment team to contact you regarding this or other relevant opportunities at Sophos. If you would like Sophos to delete or update your details at any time, please follow the steps set out in the Privacy Policy describing your individual rights. For more information on Sophos’ data protection practices, please consult our Privacy Policy Cybersecurity as a Service Delivered | Sophos

Posted 1 week ago

Apply

3.0 - 5.0 years

0 Lacs

Gujarat, India

On-site

Job Summary: We are seeking a highly experienced “Senior VAPT & Penetration Testing Specialist” to lead and ensure the quality and effectiveness of our vulnerability assessment and penetration testing operations. This role involves findings, validating findings, reviewing technical reports, ensuring compliance with standards (OWASP, PTES, NIST, etc.), and improving methodologies and tools. Key Responsibilities: Conduct in-depth vulnerability assessments and penetration tests on web, mobile, network, API, and cloud infrastructure using manual and automation. Utilize industry-standard tools like SQLMap, Burp Suite, Nessus, Nmap, and custom scripts for advanced exploitation techniques. Simulate various cyber-attacks including DDoS, Brute Force, XSS, SQL Injection, DNS attacks, and Social Engineering to identify system vulnerabilities. Perform peer reviews of technical deliverables and verify accuracy of findings and recommendations. Ensure that all assessments are aligned with industry standards such as OWASP, PTES, MITRE ATT&CK, and NIST. Act as a technical lead and mentor for junior VAPT team and QA team members. Identify gaps in the current testing methodologies and implement process improvements. Prepare detailed documentation and the VA report and ensure clear, actionable, and risk-rated reporting. Collaborate with clients and internal teams to understand scope and provide post-assessment clarifications. Present the client meeting for the future VAPT assignments. Stay updated with emerging threats, tools, techniques, and frameworks. Required Skills & Qualifications: Bachelor's or Master's degree in Computer Science, Cybersecurity, or related field. 3 to 5 years of hands-on experience in VAPT and penetration testing. In-depth knowledge of web, network, mobile, cloud, and API security. Strong understanding of secure coding practices and vulnerability management. Expertise in tools like Burp Suite, Nmap, Nessus, Metasploit, Qualys, Kali Linux, Wireshark, etc. Familiarity with SIEM, IDS/IPS, EDR tools is a plus. Excellent report writing and documentation skills. Strong communication and overseas client-interaction skills. Preferred Certifications: OSCP (Offensive Security Certified Professional) – Highly preferred CEH (Certified Ethical Hacker) CREST / GPEN / GWAPT / CISSP – Optional but desirable ISO 27001 Lead Auditor or Lead Implementer – Added advantage

Posted 1 week ago

Apply

7.0 years

0 Lacs

Jaipur, Rajasthan, India

On-site

Vaibhav Global Ltd (VGL) Company Overview Listed in 1996-97 on Indian stock exchanges, Vaibhav Global Ltd (VGL) is an end-to-end electronic deep discount retailer of fashion jewelry, gemstones, and lifestyle products, operating in the US, UK, Germany, and Canada. Shopping Experience Today's customers seek convenience, and VGL meets this demand through its proprietary 24/7 TV shopping channels (Shop LC in the US and Germany, and Shop TJC in the UK), as well as through various digital mediums including websites, mobile apps, OTT platforms, social media, and third-party marketplaces. VGL reaches almost 124 million households across the US, UK, and Germany. As digitization progresses and online retail continues to grow, VGL's portfolio and omni-channel strategy will evolve accordingly. Financials And Workforce VGL reported a group turnover of approximately Rs. 3,041 Crore (FY 2023-2024) and employs over 3800 people globally. The company’s head office and main manufacturing facility are in Jaipur, India, employing around 3000 people, including contract workers. Acquisitions Mindful Souls B.V.: In FY23-24, VGL acquired Mindful Souls B.V., a Netherlands-based e-commerce company specializing in subscription-based online sales of fashion jewelry, gemstones, and lifestyle products. This acquisition is expected to leverage VGL's sourcing and manufacturing strengths while enhancing digital business capabilities. Ideal World: VGL, through its subsidiary Shop TJC Ltd (UK), acquired the assets of Ideal World, a well-known teleshopping and digital retail brand in the UK. This acquisition includes IP rights, broadcasting rights, studio equipment, and other intangible assets. Environmental And Social Responsibility VGL is committed to sustainable business practices and renewable energy initiatives. The company's SEZ unit in India received the ‘Excellence Award’ for ‘IGBC Performance Challenge 2021 for Green Built Environment,’ reflecting its dedication to environmental sustainability. VGL's ‘Your Purchase Feeds...’ initiative has provided 87 million meals to school children in India, the US, and the UK. The company encourages employees to donate at least two hours each month to charitable causes, tracked through its performance system. VGL is also a Great Place to Work (GPTW) certified organization. Shop LC Overview Shop LC, a VGL subsidiary, was established in Austin, TX in 2007 and now broadcasts live to 75 million homes in the US. The growing e-commerce presence is supported by the website Shop LC. Shop LC ships approximately 25,000 products daily to US customers and employs around 550 people in various operational roles. The US is VGL’s largest market, contributing 68% to consolidated revenue. TJC Overview TJC, another VGL subsidiary, was established in London, UK in 2006 and broadcasts live to 25 million homes in the UK. The company’s e-commerce presence is supported by the website TJC. TJC ships approximately 12,000 products daily to UK customers and employs around 220 people in London, with extended teams in India. Shop LC Germany Overview Launched in 2021 from Dusseldorf, Germany, Shop LC Germany TV & e-commerce is a new market with significant growth potential. The business currently reaches 27 million households and is expanding. The e-commerce site can be accessed at Shop LC Germany. Our Purpose Delivering joy. Our Vision Be the Value Leader in Electronic Retailing of Jewelry and Lifestyle Products. Our Mission To deliver one million meals per day to children in need by FY40 through our one-for-one meal program: your purchase feeds... Our Core Values Teamwork Honesty Commitment Passion Positive Attitude As a Security Specialist, you will help keep our digital systems safe. This includes setting up firewalls and web protections, monitoring network activity, and responding to security issues quickly. You’ll also support compliance, document security procedures, and work with other teams on technical tools. Key Responsibilities Install and manage firewalls (e.g., Fortinet, Palo Alto) and WAF tools (e.g., Azure WAF, Cloudflare) Set up and maintain Azure networking (routing, private access) Create and enforce security access rules Monitor logs, detect threats, and resolve incidents Implement CNAPP/CSPM tools in Azure cloud environments Collaborate with DevOps to add security to CI/CD pipelines Support audits (like PCI-DSS, ISO 27001, SOC 2) Write SOPs, runbooks, and incident support documentation Evaluate new tools and run tests as needed Required Skills And Experience 4–7 years working in network and cloud security Strong experience with NGFWs, WAFs, Azure cloud security tools Knowledge of SIEM platforms and packet capture tools (e.g., Wireshark) Good understanding of VPNs, TCP/IP, and application security Excellent problem-solving and communication skills

Posted 1 week ago

Apply

0.0 years

2 - 3 Lacs

Delhi, Delhi

On-site

About the Role As a fresher SOC Analyst in an OEM environment, you'll learn how to operate SIEM platforms that monitor networking devices and hardware logs. This is a hands-on opportunity to develop foundational cybersecurity skills, from basic alert triage to refining detection capabilities. Key Responsibilities 1. SIEM Monitoring & Alert Triage Use SIEM tools to monitor alerts and events from network devices, and endpoints. Perform initial triage: distinguish security incidents from false positives, and escalate them appropriately. Document and log all alert investigations clearly in the SOC ticketing system. 2. Log & Incident Documentation Analyze system and network logs to detect anomalies or IOC patterns. Support incident documentation with root cause analysis and step-by-step actions taken. Maintain detailed incident records to support compliance and escalation. 3. SIEM Configuration Support Assist in onboarding new log sources: collect, normalize, and categorize OEM system logs. Help tune existing correlation rules to reduce alert fatigue and improve accuracy under guidance 4. Learning, Process & Collaboration Collaborate with senior analysts and network engineers to enhance detection coverage and FAQ procedures. Participate in SIEM rule tuning, dashboard creation, and documenting standard operating procedures (SOPs). Engage in continuous learning: attend training, internal sessions, and keep up with emerging threats and best practices. Technical Skills & Qualifications Basic knowledge of networking (OSI model, TCP/IP, DNS, HTTP), security principles, and common cyber threats (malware, phishing, ransomware) . Hands-on experience with home labs or training platforms . Strong problem-solving skills and attention to detail when investigating logs. Exposure to Python, PowerShell, or regex helpful for log parsing or automation. Soft Skills Demonstrable curiosity and eagerness to learn the best entry-level analysts are team players looking to grow and iterate fast . Effective communication , both written and verbal for documenting incidents and collaborating across teams. Attention to detail and discipline in following SOPs and logging investigative steps. Ability to work in shifts (including early or late hours) as part of a SOC 24/7 environment. Job Type: Full-time Pay: ₹240,000.00 - ₹300,000.00 per year Location: Dehli, Delhi (Required) Work Location: In person

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies