Jobs
Interviews

4984 Siem Jobs - Page 3

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

10.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Synax seeks an experienced SOC Leader (10+ years) to address global customers' cybersecurity needs and empower our partner network to achieve next-level service cyber-Security excellence. Why Join Synax Technologies Lead and pioneer a strategic cybersecurity initiative from inception. Thrive in a collaborative, innovative environment with ambitious growth objectives. Gain exposure and influence at a global, enterprise scale. Enjoy competitive compensation, career advancement, and executive visibility. What You'll Own: Design the Blueprint. Architect and scale a global SOC from the ground up—set the strategy, define the roadmap, and own the outcome. Build the Dream Team. Recruit, lead, and inspire top-tier cybersecurity pros—from threat hunters to incident responders. Set the Standard. Create world-class frameworks, playbooks, and metrics aligned with global best practices. Outsmart Threats. Lead the charge on cutting-edge detection and response using the full tech arsenal: SIEM, SOAR, EDR, XDR, UEBA, threat intel, and automation. Innovate Relentlessly. Drive a culture of continuous evolution, powered by AI, machine learning driven automation. You're the Perfect Fit If You Have: Deep Roots in Cybersecurity: Minimum 10 years of experience navigating the world of security products and solutions, including 6 years in leading SOC/CSOC teams on a global scale. A Track Record of Building Greatness: You've successfully built and rapidly scaled SOC/CSOC teams from scratch, turning vision into reality—and you're eager to do it again. Technical Mastery: Your expertise runs deep in cybersecurity operations, threat intelligence, incident response, and cutting-edge endpoint security technologies. Certifications That Count: Industry-recognized credentials like CISSP, CISM, or CISA showcase your professional commitment and credibility. Industry Savvy: Bonus points if you have experience working in highly regulated sectors—like BFSI, Healthcare, Government, or Telecom—where cybersecurity truly matters. Solid Academic Grounding: You hold a Bachelor’s degree in Information Security, Cybersecurity, Computer Science Engineering, or related fields (a Master’s degree makes you shine even brighter). Note: Preference will be given to candidates with current experience at Tier-1 SOC providers, who are locally available and can join immediately. This role requires international travel as and when needed.

Posted 1 day ago

Apply

7.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Supervising Security Analyst - Cyber Triage and Forensics Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity The Senior Security Analyst in Cyber Defense CTF (Cyber Triage and Forensics) plays a pivotal role in enhancing EY’s security posture by vigilantly monitoring, assessing, and managing incidents effectively. In collaboration with the team and leadership, to ensure strong security oversight and contribute to joint security monitoring and incident response initiatives. Key duties include triage, detailed investigations, clear communication, and comprehensive reporting, all contributing to the integrity and resilience of the EY’s cyber defenses. Essential Functions of the Job : You will work collaboratively to detect and respond to information security incidents, develop, maintain, and follow procedures for security event alerting, and participate in security investigations. Engage in proactive threat hunting and provide expert security assessments, utilizing EDR, SIEM, and other tools to understand and counteract the cybercrime landscape Communicate with IT stakeholders during incident response activities, ensuring effective containment, remediation, and accurate identification of compromise indicators Report on incident metrics, analyse findings, and develop reports to ensure comprehensive resolution and understanding of security events Act as an escalation point for incident response, shift lead, mentor junior team members, and contribute to team skill enhancement Analyse security events, provide feedback on security controls, and drive process improvements to strengthen the organization's security posture Maintain and improve security incident processes, protocols, and standard operating procedures to reflect best practices in security incident response Skills And Attributes For Success Proficient in Cyber investigation including evidence management in line with best practices and using advanced tools for threat detection and incident management including advanced querying with KQL Proficient in analyzing varied data sets, identifying malware, and conducting comprehensive security event analysis from network traffic attributes and host-based attributes to detect information security incidents and latent threats. Proficient in conducting detailed forensic investigations across various operating systems, with a keen eye for obfuscation and the ability to clearly communicate findings In-depth understanding of Active Directory security, with strong scripting abilities to automate response measures and improve operational effectiveness To qualify for the role, you must have Undergraduate or Postgraduate Degree in Computer Science, Engineering, or a related field (MCA/MTech/BTech/BCA/BSc CS or BSc IT) At least 7 years of overall experience with a minimum of 5 years specialized in incident response, computer forensics, and Security Operations. Proficiency in operating within a Security Monitoring/Security Operations Center (SOC) environment, including experience with CSIRT and CERT operations Demonstrated experience in investigating security events, threats, and vulnerabilities Strong understanding of electronic investigation and forensic methodologies, including log correlation, electronic data handling, investigative processes, and malware analysis In-depth knowledge of Windows and Unix/Linux operating systems, and experience with EDR solutions for threat detection and response Ideally, you’ll also Desired certifications such as SSCP, CEH, GCIH, GCFA, GCIA, GSEC, GIAC, Security+. Experience with security incident response in cloud environments, including Azure. Knowledge of legal considerations in electronic discovery and analysis Proficiency in scripting or programming (e.g., Shell scripting, PowerShell, C, C#, Python) Solid understanding of security best practices for network architecture and server configuration What We Look For Demonstrates integrity in a professional environment Strong ethical behavior Ability to work independently Possesses a global mindset for working with diverse cultures and backgrounds Knowledgeable in industry-standard security incident response processes, procedures, and lifecycle Positive attitude and Excellent teaming skills Excellent social, communication, and writing skills Good presentation skills Excellent investigative, analytical, and problem-solving skills Supervising Responsibilities: Coordinate escalations and collaborate with internal technology teams to ensure timely resolution of issues Provide mentoring and training to other team members as required, supporting their development and ensuring consistent team performance Other Requirements: Should be willing to work in shifts What We Offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. We ensure that individuals with disabilities are provided reasonable accommodations to participate in the job application or interview process, to perform essential job functions and to receive other benefits and privileges of employment. Please contact us to request accommodation. EY is committed to being an inclusive employer, and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance. If you can confidently demonstrate that you meet the criteria above, please contact us as soon as possible. Make your mark. Apply now EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 day ago

Apply

4.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Summary Position Summary Job title: Azure Cloud Security Engineer (Senior Consultant) About At Deloitte, we do not offer you just a job, but a career in the highly sought-after risk Management field. We are one of the business leaders in the risk market. We work with a vision to make the world more prosperous, trustworthy, and safe. Deloitte’s clients, primarily based outside of India, are large, complex organizations that constantly evolve and innovate to build better products and services. In the process, they encounter various risks and the work we do to help them address these risks is increasingly important to their success—and to the strength of the economy and public security. By joining us, you will get to work with diverse teams of professionals who design, manage, and implement risk-centric solutions across a variety of domains. In the process, you will gain exposure to the risk-centric challenges faced in today’s world by organizations across a range of industry sectors and become subject matter experts in those areas. Our Risk and Financial Advisory services professionals help organizations effectively navigate business risks and opportunities—from strategic, reputation, and financial risks to operational, cyber, and regulatory risks—to gain competitive advantage. We apply our experience in ongoing business operations and corporate lifecycle events to help clients become stronger and more resilient. Our market-leading teams help clients embrace complexity to accelerate performance, disrupt through innovation, and lead in their industries. We use cutting-edge technology like AI/ML techniques, analytics, and RPA to solve Deloitte’s clients ‘most complex issues. Working in Risk and Financial Advisory at Deloitte US-India offices has the power to redefine your ambitions. The Team Cyber & Strategic Risk We help organizations create a cyber-minded culture, reimagine risk to uncover strategic opportunities, and become faster, more innovative, and more resilient in the face of ever-changing threats. We provide intelligence and acuity that dynamically reframes risk, transcending a manual, reactive paradigm. The cyber risk services—Identity & access management (IAM) practice helps organizations in designing, developing, and implementing industry-leading IAM solutions to protect their information and confidential data, as well as help them build their businesses and supporting technologies to be more secure, vigilant, and resilient. The IAM team delivers service to clients through following key areas: User provisioning Access certification Access management and federation Entitlements management Work you’ll do As a Cloud Security Engineer, you will be at the front lines with our clients supporting them with their Cloud Cyber Risk needs: Executing on cloud security engagements across the lifecycle – assessment, strategy, design, implementation, and operations. Performing technical health checks for cloud platforms/environments prior to broader deployments. Assisting in the selection and tailoring of approaches, methods and tools to support cloud adoption, including for migration of existing workloads to a cloud vendor. Designing and developing cloud-specific security policies, standards and procedures. e.g., user account management (SSO, SAML), password/key management, tenant management, firewall management, virtual network access controls, VPN/SSL/IPSec, security incident and event management (SIEM), data protection (DLP, encryption). Documenting all technical issues, analysis, client communication, and resolution. Supporting proof of concept and production deployments of cloud technologies. Assisting clients with transitions to cloud via tenant setup, log processing setup, policy configuration, agent deployment, and reporting. Operating across both technical and management leadership capacities. Providing internal technical training to Advisory personnel as needed. Performing cloud orchestration and automation (Continuous Integration and Continuous Delivery (CI/CD)) in single and multi-tenant environments using tools like Terraform, Ansible, Puppet, Chef, Salt etc. Experience with multiple security technologies like CSPM, CWPP, WAF, CASB, IAM, SIEM, etc. Required Skills 4+ years of information technology and/or information security operations experience. Ideally 2+ years of working with different Cloud platforms (SaaS, PaaS, and IaaS) and environments (Public, Private, Hybrid). Familiarity with the following will be considered a plus: Solid understanding of enterprise-level directory and system configuration services (Active Directory, SCCM, LDAP, Exchange, SharePoint, M365) and how these integrate with cloud platforms Solid understanding of cloud security industry standards such as Cloud Security Alliance (CSA), ISO/IEC 27017 and NIST CSF and how they help in compliance for cloud providers and cloud customers Hands-on technical experience implementing security solutions for Microsoft Azure Knowledge of cloud orchestration and automation (Continuous Integration and Continuous Delivery (CI/CD)) in single and multi-tenant environments using tools like Terraform, Ansible, Puppet, Chef, Salt etc. Knowledge of cloud access security broker (CASB) and cloud workload protection platform (CWPP) technologies Solid understanding of OSI Model and TCP/IP protocol suite and network segmentation principles and how these can be applied on cloud platforms Preferred: Previous Consulting or Big 4 experience. Hands-on experience with Azure, plus any CASB or CWPP product or service. Understanding of Infrastructure-as-Code, and ability to create scripts using Terraform, ARM, Ansible etc. Knowledge of scripting languages (PowerShell, JSON, .NET, Python, Javascript etc.) Qualification Bachelor’s Degree required.Ideally in Computer Science, Cyber Security, Information Security, Engineering, Information Technology. How You’ll Grow At Deloitte, we’ve invested a great deal to create a rich environment in which our professionals can grow. We want all our people to develop in their own way, playing to their own strengths as they hone their leadership skills. And, as a part of our efforts, we provide our professionals with a variety of learning and networking opportunities—including exposure to leaders, sponsors, coaches, and challenging assignments—to help accelerate their careers along the way. No two people learn in the same way. So, we provide a range of resources including live classrooms, team-based learning, and eLearning. DU: The Leadership Center in India, our state-of-the-art, world-class learning Center in the Hyderabad offices is an extension of the Deloitte University (DU) in Westlake, Texas, and represents a tangible symbol of our commitment to our people’s growth and development. Explore DU: The Leadership Center in India . Deloitte’s culture Our positive and supportive culture encourages our people to do their best work every day. We celebrate individuals by recognizing their uniqueness and offering them the flexibility to make daily choices that can help them to be healthy, centered, confident, and aware. Deloitte is committed to achieving diversity within its workforce, and encourages all qualified applicants to apply, irrespective of gender, age, sexual orientation, disability, culture, religious and ethnic background. We offer well-being programs and are continuously looking for new ways to maintain a culture that is inclusive, invites authenticity, leverages our diversity, and where our people excel and lead healthy, happy lives. Learn more about Life at Deloitte. Corporate citizenship Deloitte is led by a purpose: to make an impact that matters. This purpose defines who we are and extends to relationships with Deloitte’s clients, our people and our communities. We believe that business has the power to inspire and transform. We focus on education, giving, skill-based volunteerism, and leadership to help drive positive social impact in our communities. Learn more about Deloitte’s impact on the world. Recruiting tips Finding the right job and preparing for the recruitment process can be tricky. Check out tips from our Deloitte recruiting professionals to set yourself up for success. Check out recruiting tips from Deloitte recruiters . Benefits We believe that to be an undisputed leader in professional services, we should equip you with the resources that can make a positive impact on your well-being journey. Our vision is to create a leadership culture focused on the development and well-being of our people. Here are some of our benefits and programs to support you and your family’s well-being needs. Eligibility requirements may be based on role, tenure, type of employment and/ or other criteria. Learn more about what working at Deloitte can mean for you . Our people and culture Our people and our culture make Deloitte a place where leaders thrive. Get an inside look at the rich diversity of background, education, and experiences of our people. What impact will you make? Check out our professionals’ career journeys and be inspired by their stories. Professional development You want to make an impact. And we want you to make it. We can help you do that by providing you the culture, training, resources, and opportunities to help you grow and succeed as a professional. Learn more about our commitment to developing our people . © 2023. See Terms of Use for more information. Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ("DTTL"), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as "Deloitte Global") does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the "Deloitte" name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about our global network of member firms. Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Professional development At Deloitte, professionals have the opportunity to work with some of the best and discover what works best for them. Here, we prioritize professional growth, offering diverse learning and networking opportunities to help accelerate careers and enhance leadership skills. Our state-of-the-art DU: The Leadership Center in India, located in Hyderabad, represents a tangible symbol of our commitment to the holistic growth and development of our people. Explore DU: The Leadership Center in India . Benefits To Help You Thrive At Deloitte, we know that great people make a great organization. Our comprehensive rewards program helps us deliver a distinctly Deloitte experience that helps that empowers our professionals to thrive mentally, physically, and financially—and live their purpose. To support our professionals and their loved ones, we offer a broad range of benefits. Eligibility requirements may be based on role, tenure, type of employment and/ or other criteria. Learn more about what working at Deloitte can mean for you. Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Requisition code: 306470

Posted 1 day ago

Apply

2.0 - 5.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

Summary Position Summary Job title: Oracle PaaS Cloud Security – Consultant (ASA/SA) Deloitte’s Cyber Risk Services help our clients to be secure, vigilant, and resilient in the face of an ever-increasing array of cyber threats and vulnerabilities. Our Cyber Risk practice helps organizations with the management of information and technology risks by delivering end-to-end solutions using proven methodologies and tools in a consistent manner. Our services help organizations to address, in a timely manner, pervasive issues, such as identity theft, data security breaches, data leakage, cyber security, and system outages across organizations of various sizes and industries with the goal of enabling ongoing, secure, and reliable operations across the enterprise. Deloitte’s Cyber Risk Services have been recognized as a leader by a number of independent analyst firms. Kennedy Consulting Research & Advisory, a leading analyst firm, recently named Deloitte a global leader in cyber security consulting. Source: Kennedy Consulting Research & Advisory; Cyber Security Consulting 2013; Kennedy Consulting Research & Advisory estimates © 2013 Kennedy Information, LLC. Reproduced under license. Work you will do As a Consultant in our Cyber Application Security team, you will be part of our Oracle practice and will be responsible for delivering Oracle security and controls implementations services across a varied format of architectures. Responsibilities will include assessment, design and implementation of security and controls on cloud-based Oracle environment to secure this environment. The team Deloitte Advisory's Cyber Risk team helps complex organizations more confidently pursue their growth, innovation and performance agendas through proactive management of the associated cyber risks. Our professionals provide advisory and implementation services that integrate risk, regulatory, and technology skills to help clients transform their legacy programs into proactive Secure. Vigilant. Resilient. Cyber risk programs. Join the team developing the future state of cyber risk solutions. Learn more about Deloitte Advisory’s Cyber Risk Services practice. Work you’ll do The key job responsibilities will be to: Design, and implement customized, scalable and SOX compliant security solutions Lead requirements gathering, design documentation by conducting client workshops in onsite/offshore delivery model for projects Advanced debugging and troubleshoot issues, including interacting with technology vendors Architect, design and implement the SSO solutions for various Oracle SaaS/PaaS services Configure security for Oracle PaaS services (OIC, VBCS, FAW) Implement security in Oracle Cloud Infrastructure by designing groups using the security principle of least privilege Design, customize and implement Oracle Cloud Guard and Data Safe as part of Governance, Risk and Compliance solution Support security and compliance activities by identifying and driving initiatives that are relevant for the project delivery and help factor reusability and related benefits. Required Skills 2 to 5 years of experience delivering full cycle of Oracle Cloud IaaS and PaaS security assessments, design, and implementations as well as understanding of leading practices relates to IaaS and PaaS security Understanding of Identity and Access Management concepts, Single Sign-On and API authentication mechanisms, cloud security posture management Working Experience in any IAM tools (Oracle IDCS/SailPoint/Saviynt preferable) Experience in Oracle Identity Domains (OCI-IAM), like building custom user groups and IAM policies as per the business requirement and User administration activities like add/modify user accounts, add/remove user groups mappings, system for cross domain identity management (SCIM) provisioning etc. Experience in configuring Cloud Guard, Data Safe, Key Vaults, ATB Database authentication, SFTP security, VBCS Identity propagation etc. Experience in implementing streaming OCI logs to SIEM solution (like Splunk) audit end user accounts, permissions, and access rights, performing segregation of duties (SOD) and mitigating risks Experience in coordinating with development teams, functional teams, business leads, information security & risk management teams Excellent written and verbal communication skills Good project management and organizational skills Preferred Skills Experience in Oracle IaaS and PaaS security Experience in Oracle Identity Domains Previous Consulting or Big 4 experience preferred Security Certifications such as: CISSP, CCSP, Oracle Cloud Infrastructure Foundations Certification is a plus Automation using Terraform, Python, or VBA Troubleshooting and analytical skills using PL-SQL queries Qualification B.Tech/M.Tech/MS/MBA #CA-VKS Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Professional development At Deloitte, professionals have the opportunity to work with some of the best and discover what works best for them. Here, we prioritize professional growth, offering diverse learning and networking opportunities to help accelerate careers and enhance leadership skills. Our state-of-the-art DU: The Leadership Center in India, located in Hyderabad, represents a tangible symbol of our commitment to the holistic growth and development of our people. Explore DU: The Leadership Center in India . Benefits To Help You Thrive At Deloitte, we know that great people make a great organization. Our comprehensive rewards program helps us deliver a distinctly Deloitte experience that helps that empowers our professionals to thrive mentally, physically, and financially—and live their purpose. To support our professionals and their loved ones, we offer a broad range of benefits. Eligibility requirements may be based on role, tenure, type of employment and/ or other criteria. Learn more about what working at Deloitte can mean for you. Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Requisition code: 305059

Posted 1 day ago

Apply

100.0 years

0 Lacs

Civil Lines, Delhi, India

On-site

Posted: 01/08/2025 Closing Date: 29/08/2025 Job Type: Permanent - Full Time Location: The Lines Company - Head Office Job Category: Energy and Utilities Mō m ātou | About Us At The Lines Company (TLC), we’ve been powering the King Country for nearly 100 years. As a community-owned business, we’re all about people—our customers, our team, and our region. Whether it’s supporting local homes, farms, or schools, we work around the clock to keep the lights on and the region running. We offer job stability, competitive pay, and a workplace that values balance, development, and community. Job Description Mō te t ūranga | About the Role This is the perfect role for someone with a solid foundation in IT or cyber who’s looking to build deeper, real-world experience in a supportive team environment. As our IT Operations Analyst , you’ll be part of a small, tight-knit Digital team helping to monitor, secure, and support the critical systems that keep our electricity network running. You’ll get exposure to a range of technologies, tools, and security practices—plus the opportunity to develop across both IT and OT (Operational Technology). ✅ Confident working with digital systems and tools ✅ Interested in cybersecurity, incident response, and secure infrastructure ✅ Enjoy solving problems and learning new systems ✅ Calm under pressure and clear in your communication ✅ Ready to grow your knowledge across a broad IT environment Desired Skills And Experience Nā tāu rourou | What you’ll bring You’ve got a strong start to your IT journey, and now you’re ready for more hands-on experience: 1–2 years of experience in IT operations, infrastructure, or cybersecurity A qualification in Cyber Security, Information Technology, or a related field Familiarity with tools such as antivirus software, firewalls, SIEM, or backup systems A basic understanding of cybersecurity frameworks or compliance (like ISO27001 or the Privacy Act) Good documentation skills and attention to detail A proactive mindset and a collaborative, can-do attitude Bonus If You Have Experience or interest in the utilities or energy sectors Exposure to disaster recovery planning or incident response A curiosity about working in both IT and OT environments He aha tā mātou | What we offer We’re here to support your next step. You’ll gain exposure to cybersecurity, infrastructure, and business continuity in a real-world setting—plus the guidance and mentorship to help you succeed. We Offer Competitive salary and strong employee benefits Career growth and development opportunities across digital and cyber functions Wellbeing incentives to support your physical and mental health Medical and life insurance Extra leave days to help you recharge Flexible working options, plus a friendly, future-focused team culture If you’re looking for a role where you’ll learn by doing and make a meaningful contribution—this could be your next big move. Me pēhea te tono | How to apply 📅 Applications close 29/08/2025 but we’re reviewing as we go and may close early if we find the right person—so don’t wait! Please Note Applicants must be a New Zealand Citizen, Resident, or hold a valid NZ Work Visa. As part of our recruitment process, we conduct Ministry of Justice background checks and pre-employment medical and drug/alcohol screening. ⚡💻 Ready to take the next step in your IT career and support critical systems in your community? Apply now and grow with us. 🛡️🖥️

Posted 1 day ago

Apply

4.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Summary Position Summary Job title: Azure Cloud Security Engineer (Senior Consultant) About At Deloitte, we do not offer you just a job, but a career in the highly sought-after risk Management field. We are one of the business leaders in the risk market. We work with a vision to make the world more prosperous, trustworthy, and safe. Deloitte’s clients, primarily based outside of India, are large, complex organizations that constantly evolve and innovate to build better products and services. In the process, they encounter various risks and the work we do to help them address these risks is increasingly important to their success—and to the strength of the economy and public security. By joining us, you will get to work with diverse teams of professionals who design, manage, and implement risk-centric solutions across a variety of domains. In the process, you will gain exposure to the risk-centric challenges faced in today’s world by organizations across a range of industry sectors and become subject matter experts in those areas. Our Risk and Financial Advisory services professionals help organizations effectively navigate business risks and opportunities—from strategic, reputation, and financial risks to operational, cyber, and regulatory risks—to gain competitive advantage. We apply our experience in ongoing business operations and corporate lifecycle events to help clients become stronger and more resilient. Our market-leading teams help clients embrace complexity to accelerate performance, disrupt through innovation, and lead in their industries. We use cutting-edge technology like AI/ML techniques, analytics, and RPA to solve Deloitte’s clients ‘most complex issues. Working in Risk and Financial Advisory at Deloitte US-India offices has the power to redefine your ambitions. The Team Cyber & Strategic Risk We help organizations create a cyber-minded culture, reimagine risk to uncover strategic opportunities, and become faster, more innovative, and more resilient in the face of ever-changing threats. We provide intelligence and acuity that dynamically reframes risk, transcending a manual, reactive paradigm. The cyber risk services—Identity & access management (IAM) practice helps organizations in designing, developing, and implementing industry-leading IAM solutions to protect their information and confidential data, as well as help them build their businesses and supporting technologies to be more secure, vigilant, and resilient. The IAM team delivers service to clients through following key areas: User provisioning Access certification Access management and federation Entitlements management Work you’ll do As a Cloud Security Engineer, you will be at the front lines with our clients supporting them with their Cloud Cyber Risk needs: Executing on cloud security engagements across the lifecycle – assessment, strategy, design, implementation, and operations. Performing technical health checks for cloud platforms/environments prior to broader deployments. Assisting in the selection and tailoring of approaches, methods and tools to support cloud adoption, including for migration of existing workloads to a cloud vendor. Designing and developing cloud-specific security policies, standards and procedures. e.g., user account management (SSO, SAML), password/key management, tenant management, firewall management, virtual network access controls, VPN/SSL/IPSec, security incident and event management (SIEM), data protection (DLP, encryption). Documenting all technical issues, analysis, client communication, and resolution. Supporting proof of concept and production deployments of cloud technologies. Assisting clients with transitions to cloud via tenant setup, log processing setup, policy configuration, agent deployment, and reporting. Operating across both technical and management leadership capacities. Providing internal technical training to Advisory personnel as needed. Performing cloud orchestration and automation (Continuous Integration and Continuous Delivery (CI/CD)) in single and multi-tenant environments using tools like Terraform, Ansible, Puppet, Chef, Salt etc. Experience with multiple security technologies like CSPM, CWPP, WAF, CASB, IAM, SIEM, etc. Required Skills 4+ years of information technology and/or information security operations experience. Ideally 2+ years of working with different Cloud platforms (SaaS, PaaS, and IaaS) and environments (Public, Private, Hybrid). Familiarity with the following will be considered a plus: Solid understanding of enterprise-level directory and system configuration services (Active Directory, SCCM, LDAP, Exchange, SharePoint, M365) and how these integrate with cloud platforms Solid understanding of cloud security industry standards such as Cloud Security Alliance (CSA), ISO/IEC 27017 and NIST CSF and how they help in compliance for cloud providers and cloud customers Hands-on technical experience implementing security solutions for Microsoft Azure Knowledge of cloud orchestration and automation (Continuous Integration and Continuous Delivery (CI/CD)) in single and multi-tenant environments using tools like Terraform, Ansible, Puppet, Chef, Salt etc. Knowledge of cloud access security broker (CASB) and cloud workload protection platform (CWPP) technologies Solid understanding of OSI Model and TCP/IP protocol suite and network segmentation principles and how these can be applied on cloud platforms Preferred: Previous Consulting or Big 4 experience. Hands-on experience with Azure, plus any CASB or CWPP product or service. Understanding of Infrastructure-as-Code, and ability to create scripts using Terraform, ARM, Ansible etc. Knowledge of scripting languages (PowerShell, JSON, .NET, Python, Javascript etc.) Qualification Bachelor’s Degree required.Ideally in Computer Science, Cyber Security, Information Security, Engineering, Information Technology. How You’ll Grow At Deloitte, we’ve invested a great deal to create a rich environment in which our professionals can grow. We want all our people to develop in their own way, playing to their own strengths as they hone their leadership skills. And, as a part of our efforts, we provide our professionals with a variety of learning and networking opportunities—including exposure to leaders, sponsors, coaches, and challenging assignments—to help accelerate their careers along the way. No two people learn in the same way. So, we provide a range of resources including live classrooms, team-based learning, and eLearning. DU: The Leadership Center in India, our state-of-the-art, world-class learning Center in the Hyderabad offices is an extension of the Deloitte University (DU) in Westlake, Texas, and represents a tangible symbol of our commitment to our people’s growth and development. Explore DU: The Leadership Center in India . Deloitte’s culture Our positive and supportive culture encourages our people to do their best work every day. We celebrate individuals by recognizing their uniqueness and offering them the flexibility to make daily choices that can help them to be healthy, centered, confident, and aware. Deloitte is committed to achieving diversity within its workforce, and encourages all qualified applicants to apply, irrespective of gender, age, sexual orientation, disability, culture, religious and ethnic background. We offer well-being programs and are continuously looking for new ways to maintain a culture that is inclusive, invites authenticity, leverages our diversity, and where our people excel and lead healthy, happy lives. Learn more about Life at Deloitte. Corporate citizenship Deloitte is led by a purpose: to make an impact that matters. This purpose defines who we are and extends to relationships with Deloitte’s clients, our people and our communities. We believe that business has the power to inspire and transform. We focus on education, giving, skill-based volunteerism, and leadership to help drive positive social impact in our communities. Learn more about Deloitte’s impact on the world. Recruiting tips Finding the right job and preparing for the recruitment process can be tricky. Check out tips from our Deloitte recruiting professionals to set yourself up for success. Check out recruiting tips from Deloitte recruiters . Benefits We believe that to be an undisputed leader in professional services, we should equip you with the resources that can make a positive impact on your well-being journey. Our vision is to create a leadership culture focused on the development and well-being of our people. Here are some of our benefits and programs to support you and your family’s well-being needs. Eligibility requirements may be based on role, tenure, type of employment and/ or other criteria. Learn more about what working at Deloitte can mean for you . Our people and culture Our people and our culture make Deloitte a place where leaders thrive. Get an inside look at the rich diversity of background, education, and experiences of our people. What impact will you make? Check out our professionals’ career journeys and be inspired by their stories. Professional development You want to make an impact. And we want you to make it. We can help you do that by providing you the culture, training, resources, and opportunities to help you grow and succeed as a professional. Learn more about our commitment to developing our people . © 2023. See Terms of Use for more information. Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ("DTTL"), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as "Deloitte Global") does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the "Deloitte" name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about our global network of member firms. Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Professional development At Deloitte, professionals have the opportunity to work with some of the best and discover what works best for them. Here, we prioritize professional growth, offering diverse learning and networking opportunities to help accelerate careers and enhance leadership skills. Our state-of-the-art DU: The Leadership Center in India, located in Hyderabad, represents a tangible symbol of our commitment to the holistic growth and development of our people. Explore DU: The Leadership Center in India . Benefits To Help You Thrive At Deloitte, we know that great people make a great organization. Our comprehensive rewards program helps us deliver a distinctly Deloitte experience that helps that empowers our professionals to thrive mentally, physically, and financially—and live their purpose. To support our professionals and their loved ones, we offer a broad range of benefits. Eligibility requirements may be based on role, tenure, type of employment and/ or other criteria. Learn more about what working at Deloitte can mean for you. Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Requisition code: 306468

Posted 1 day ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

Remote

Functional Description (FD) – Network Security Engineer (Level II) Function Title: Network Security Engineer – Level II Function Category: Network & Security Operations Experience Level: Intermediate Function Purpose: To ensure the integrity, confidentiality, and availability of enterprise networks by managing and securing firewall and intrusion prevention infrastructure. This includes deployment, configuration, monitoring, and optimization of network security appliances such as Palo Alto Networks NGFW, Cisco ASA, and IPS/IDS platforms. Key Functional Responsibilities: 1. Firewall Management: o Configure and manage Palo Alto Networks Next-Gen Firewalls via Panorama. o Administer Cisco ASA firewalls, including rule base updates, NAT configuration, and VPN setup (IPSec/SSL). o Apply firewall best practices to enforce segmentation and threat prevention. 2. Intrusion Prevention: o Operate and fine-tune IPS/IDS systems to detect and block malicious activity. o Analyze IPS logs and correlate with threat intelligence sources. o Work with SOC teams on incident triage and escalation. 3. Security Policy Enforcement: o Maintain and optimize security policies across platforms. o Review firewall and IPS rules regularly for cleanup and compliance. o Participate in change control processes for security configurations. 4. Troubleshooting & Support: o Act as L2 escalation point for network security issues. o Conduct root cause analysis of incidents related to firewall, VPN, or IPS systems. o Support after-hours maintenance or on-call duties as needed. 5. Documentation & Compliance: o Maintain configuration baselines, change logs, and security documentation. o Ensure adherence to NIST, ISO 27001, or internal audit requirements. Required Technical Skills: • Hands-on expertise in Palo Alto NGFWs (Pan-OS, Panorama). • Strong knowledge of Cisco ASA firewall CLI and ASDM. • Experience configuring and supporting VPNs (site-to-site, remote access). • Exposure to IPS technologies (e.g., Snort, Cisco Firepower, Palo Alto Threat Prevention). • Familiarity with networking protocols and troubleshooting (TCP/IP, DNS, HTTP/S, routing protocols). • Comfort with tools like Wireshark, Syslog servers, and firewall rule management tools. Preferred Skills / Good to Have: • Working knowledge of Cisco Firepower/FTD. • Understanding of cloud firewalls (Azure NSG, AWS Security Groups, Palo Alto Prisma). • Scripting or automation skills (Python, Bash). • Knowledge of Zero Trust models and microsegmentation. • Exposure to log management/SIEM tools like Splunk or Elastic

Posted 1 day ago

Apply

2.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NA Minimum 2 Year(s) Of Experience Is Required Educational Qualification : 15 years full time education Summary: As a Level 1.5 SOC Analyst, your role involves deeper investigation of security alerts and confirmed incidents. You will validate escalated events using Sentinal One and Splunk SIEM, enrich them with context, and work closely with L3 analysts to assist in containment and timely remediation. You will also assist in improving detection fidelity and supporting SOAR automation. This role requires deep expertise in detection, investigation, containment, and remediation, as well as collaboration with multiple teams across security, IT, and compliance. Roles & Responsibilities: - Investigate alerts escalated by L1 to determine scope, impact, and root cause - Perform in-depth endpoint and network triage using Sentinel One - Use Sentinel One to perform endpoint analysis and threat validation - Correlate multiple log sources in Splunk to trace attacker activity - Enrich events with asset, identity, and threat intelligence context - Document investigation workflows, evidence, and final conclusions - Support L2 during major incidents by performing log or memory triage - Suggest improvements in alert logic & fine tunning. - Conduct threat research aligned to alert patterns and business context - Enhance alert fidelity with threat intel and historical context - Document investigation findings and communicate with stakeholders Professional & Technical Skills: - Alert Triage & Monitoring: Experience investigating escalated alerts using SIEM or EDR - Incident Response and Containment: Take necessary actions to contain, eradicate and recover from security incidents. - Identify opportunities for automation and work with SIEM Platform Support team for implementing it. - EDR Deep Dive: Using Real Time Response (RTR), Threat Graph, custom IOA rules - Proficiency in writing SPL queries, dashboards and providing fine tuning opportunities - Threat Hunting: Behavior-based detection using TTPs - Good understanding of malware, lateral movement, privilege escalation, and exfiltration patterns - Threat Intel Integration: Automation of IOC lookups and enrichment flows - Forensic Skills: Live host forensics, log correlation, malware behavioral analysis - Good experience in advanced threat detection and incident response - Proficiency in Sentinal One forensic and incident response capabilities - Playbook Development/Updation: Able to define, update, and optimize IR playbooks and workflows - Forensic analysis (memory, file systems, logs) - Cloud incident handling (AWS, Azure) - Dashboarding: Advanced visualizations and business-focused metrics in Splunk - Certifications: Splunk Certified Admin/ES Admin, SC-200, Sentinal One EDR vendor training - Sentinal One: Custom detections, forensic triage, threat graphs - Splunk SIEM (core + ES module): Searching Logs, Monitoring and investigating alerts. Additional Information: - The candidate should have minimum 2+ years in SOC/IR . - Experience in 24x7 environments, shift-based operations, or critical infrastructure response - This position is based at our Hyderabad office. - A 15 years full time education is required. - Bachelors in IT/Cybersecurity + advanced certifications (CISSP), Splunk Certified Admin/ES admin, EDR Certification (like Sentinal One) etc.

Posted 1 day ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Organizations everywhere struggle under the crushing costs and complexities of “solutions” that promise to simplify their lives. To create a better experience for their customers and employees. To help them grow. Software is a choice that can make or break a business. Create better or worse experiences. Propel or throttle growth. Business software has become a blocker instead of ways to get work done. There’s another option. Freshworks. With a fresh vision for how the world works. At Freshworks, we build uncomplicated service software that delivers exceptional customer and employee experiences. Our enterprise-grade solutions are powerful, yet easy to use, and quick to deliver results. Our people-first approach to AI eliminates friction, making employees more effective and organizations more productive. Over 72,000 companies, including Bridgestone, New Balance, Nucor, S&P Global, and Sony Music, trust Freshworks’ customer experience (CX) and employee experience (EX) software to fuel customer loyalty and service efficiency. And, over 4,500 Freshworks employees make this possible, all around the world. Fresh vision. Real impact. Come build it with us. Job Description We are seeking an experienced and proactive Lead SOC Analyst to join our Security Operations Center team. The ideal candidate will bring deep expertise in SIEM and EDR technologies, strong incident analysis capabilities, and hands-on experience in automating incident response using SOAR platforms, particularly Palo Alto Cortex XSOAR. This role involves leading investigations, refining detection and response processes, and mentoring junior analysts. Key Responsibilities: Lead and manage security incident investigations, ensuring timely containment, eradication, and recovery. Administer and fine-tune SIEM (e.g., Splunk, QRadar, Sentinel) and EDR platforms (e.g., CrowdStrike, SentinelOne, Carbon Black). Analyze and triage alerts from multiple sources, correlating events to detect threats and breaches. Design, develop, and maintain automated playbooks using Cortex XSOAR (Demisto) to streamline response workflows. Create and update runbooks, documentation, and reporting metrics for incident response activities. Provide technical guidance and mentorship to SOC analysts. Conduct regular threat hunting to proactively identify potential compromises. ​Recommend improvements in security posture based on incident patterns and root cause analysis.Qualif ications5-7 ye ars of hands-on experience in a Security Operations Center environment.1-2 ye ars of experience in Cortex XSOAR (or equivalent) playbook development and SOAR automation.Strong knowledge of SIEM and EDR platforms, their configuration, log ingestion, tuning, and administration.Profic iency in analyzing Windows/Linux/Mac/Cloud logs, network traffic, and endpoint telemetry.Solid understanding of attack vectors, malware behavior, threat actors, and MITRE ATT&CK framework.Experi ence with scripting languages (e.g., Python, Bash) for automation and enrichment tasks. Pref er red Qualifications:Certif ications such as GCIA, GCIH, CEH, CISSP, CySA+, or equivalent.Experi ence with threat hunting tools and methodologies.Knowle dge of cloud-native security monitoring (AWS, Azure, GCP). Soft S kills:Excell ent communication and documentation skills.Strong analytical thinking and problem-solving abilities.Abilit y to prioritize tasks under pressure and handle escalations effectively.Leader ship and mentoring capability in a fast-paced SOC environment. Addi ti onal InformationAt Fre shworks, we are creating a global workplace that enables everyone to find their true potential, purpose, and passion irrespective of their background, gender, race, sexual orientation, religion and ethnicity. We are committed to providing equal opportunity for all and believe that diversity in the workplace creates a more vibrant, richer work environment that advances the goals of our employees, communities and the business.

Posted 1 day ago

Apply

1.5 - 3.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Our technology services client is seeking multiple System Administrator to join their team on a contract basis. These positions offer a strong potential for conversion to full-time employment upon completion of the initial contract period. Below are further details about the role: Role: System Administrator Experience: 1.5 - 3 Years Location: Chennai, Kolkata Notice Period: Immediate- 15 Days Mandatory Skills: VMware , Onpremise, Windows, VMare Configuration Job Description: Maintenance, Administration, Configuration, Monitoring and Troubleshooting of Windows 2012 / 2016 / 2019 / 2025 Servers. VMware vSphere Infrastructure - Installation, configuration, troubleshooting of VMware ESXi servers, Virtual appliance, vCenter, ESXI host upgrade and patching. Creating and managing VMware cluster, Enabling HA, and DRS features in a cluster. Configuration of Virtual switches, port groups and network connections Creating and managing standard templates and keeping them update. Deploying VMs from template and allocates resources as per client requirements. Security hardening of VMs and Esxi servers for security compliance. Performing snapshots, cloning, migrations of VMs Vulnerability Management - Assist in providing support and resolution for the Critical/High open vulnerabilities on Windows/ VMware Servers. Providing support to mitigate external Vulnerabilities reported by KPMG team. Coordinate with Server Owners to fix Application related vulnerabilities with the defined SLA. Providing support to raise a risk on insight360 portal for servers which have surpassed the SLA. Data Centre Operations - Installation, Configuration, Monitoring and Troubleshooting of physical servers like DELL PowerEdge, HP ProLiant, Cisco UCS servers. Coordination with OEM/Partners Technical Support Team to resolve problems. Support for Windows Defender, SOC SIEM, BigFix, Qualys, CIS CAT, SolarWinds team for installation, configuration, upgradation and troubleshooting of applications. Coordination with Backup team, Database and Network team to resolve problems. Incident and RITM Management - Work on Incidents, RITM raised for Server OS issue, backup failure, access management, performance alerts etc. Change Management – Work on Change Requests for Commission of new servers, Decommission, Operating system upgradation, IP change Activity, virtual machine CPU/Memory/Disk upgradation and others. Installation of monthly windows security updates for the on-prem windows servers. If you are interested, share the updated resume to rajesh.s@s3staff.com

Posted 1 day ago

Apply

0 years

0 Lacs

India

On-site

We are seeking a highly motivated and detail-oriented Cyber Security Analyst to join our security team. The successful candidate will be responsible for monitoring, analyzing, and responding to security incidents and threats, as well as implementing measures to protect the organization’s systems, networks, and data from cyber-attacks. Key Responsibilities: Monitor network traffic and systems for security breaches, intrusions, or anomalies. Investigate and respond to security alerts and incidents in a timely manner. Analyze malware, phishing, and threat intelligence reports. Conduct vulnerability assessments and penetration testing. Maintain and improve endpoint protection, firewalls, SIEM, IDS/IPS, and other security tools. Assist in the development and enforcement of security policies and procedures. Collaborate with IT and DevOps teams to ensure secure configurations and compliance. Stay updated with the latest cyber security trends, threats, and technology. Prepare incident reports, documentation, and regular security status updates. Required Skills & Qualifications: Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field. Proven experience in a cyber security or IT security role. Strong understanding of network protocols, operating systems, and firewalls. Hands-on experience with SIEM tools, vulnerability scanners, and endpoint protection platforms. Knowledge of cybersecurity frameworks like NIST, ISO 27001, or CIS Controls. Familiarity with scripting languages (e.g., Python, Bash) is a plus. Excellent problem-solving and analytical skills. Strong communication and documentation abilities. Preferred Certifications (Not Mandatory): CompTIA Security+ CEH (Certified Ethical Hacker) CISSP (Certified Information Systems Security Professional) OSCP (Offensive Security Certified Professional) Why Join Us? Work with a passionate and growing cybersecurity team. Exposure to cutting-edge tools and real-world threat scenarios. Opportunities for professional development and certification support. Flexible work environment and competitive benefits.

Posted 1 day ago

Apply

3.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

About company : Netenrich boosts the effectiveness of organizations’ security and digital operations so they can avoid disruption and manage risk. Resolution Intelligence CloudTM is our native-cloud data analytics platform for enterprises and services providers that need highly scalable, multitenant security operations and/or digital operations management. Resolution Intelligence Cloud transforms security and operations data into intelligence that organizations can act on before critical issues occur. More than 3,000 customers and managed service providers rely on Netenrich to deliver secure operations at scale. Job Title: Implementation Engineer Years of Experience: Relevant 3+ Years Work Location: Hyderabad Job Summary: We are seeking a skilled and experienced Cybersecurity Implementation Engineer with expertise in customer parser development, Yara rules creation, playbook implementation, and data ingestion techniques. This role presents an exciting opportunity to contribute to the design and implementation of cutting-edge cybersecurity solutions while collaborating with a talented team of professionals. Responsibilities: · Develop custom parsers to extract and normalize data from diverse sources, including logs, network traffic, and endpoint data. · Design, develop, and maintain Yara rules for threat detection and malware analysis, ensuring high accuracy and effectiveness. · Create and implement playbook automation to streamline incident response processes and improve operational efficiency. · Design and implement data ingestion pipelines to collect, process, and analyze large volumes of security data from various sources. · Collaborate with cross-functional teams to understand customer requirements and customize cybersecurity solutions to meet their needs. · Conduct research and analysis to identify emerging threats and vulnerabilities, and develop proactive detection mechanisms. · Participate in security incident response activities, providing technical expertise and support as needed. · Stay abreast of the latest cybersecurity trends, technologies, and best practices, and share knowledge with the team. · Work closely with customers to understand their security challenges and requirements, and provide expert guidance and support. Qualifications: · Bachelor’s degree in Computer Science, Information Security, or related field. · 3 years of experience in cybersecurity, with a focus on implementation. · Strong expertise in developing custom parsers for log and data normalization. · Proficiency in creating and maintaining Yara rules for threat detection and malware analysis. · Experience in designing and implementing playbook automation using tools such as Demisto, Phantom, or similar platforms. · Solid understanding of data ingestion techniques and technologies, including log management systems and data lakes. · Hands-on experience with SIEM (Security Information and Event Management) solutions such as Splunk, ELK, or QRadar. · Excellent analytical and problem-solving skills, with the ability to troubleshoot complex technical issues. · Strong communication and interpersonal skills, with the ability to effectively collaborate with internal teams and customers. · Relevant cybersecurity certifications (e.g., CISSP, CEH, GIAC) are a plus. If you are a passionate and driven cybersecurity professional with expertise in customer parser development, Yara rules creation, playbook implementation, and data ingestion techniques, we want to hear from you. Join us in our mission to protect our organization and our customers from cyber threats.

Posted 1 day ago

Apply

0.0 - 4.0 years

0 Lacs

Kochi, Kerala

On-site

Job Title: SOC L2 Analyst Location: Kochi, Kerala Department: Information Security / Cybersecurity Operations Employment Type: Full-time Job Summary We are seeking a skilled and proactive SOC Level 2 Analyst to join our Cybersecurity Operations team in Kochi. The ideal candidate will have a strong background in Threat Intelligence and Log Analysis , with the ability to detect, investigate, and respond to advanced security threats. You will work closely with L1 SOC Analysts, Incident Response, and Threat Hunting teams to ensure rapid detection and mitigation of security incidents. Key Responsibilities Monitor and analyze security events from SIEM platforms, IDS/IPS, firewalls, and other security tools. Perform detailed log analysis to identify indicators of compromise (IoCs) and suspicious activity. Utilize threat intelligence feeds to correlate, enrich, and prioritize alerts. Investigate escalated incidents from L1 SOC analysts, determine root cause, and recommend remediation. Conduct proactive threat hunting based on emerging threats and attacker tactics. Support incident response activities, including containment, eradication, and recovery. Maintain accurate documentation of incidents, investigations, and findings. Contribute to the continuous improvement of SOC processes and detection use cases. Collaborate with cross-functional security teams to strengthen the organization’s cyber defense posture. Key Skills & Requirements Technical Skills: Proficiency in Threat Intelligence analysis and application in SOC workflows. Expertise in Log Analysis and interpretation from multiple security devices and platforms. Experience with SIEM tools (e.g., Splunk, QRadar, ArcSight, Sentinel). Familiarity with MITRE ATT&CK framework and common attacker techniques. Understanding of TCP/IP, network protocols, and cybersecurity fundamentals. Experience & Education: Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent experience). 2–4 years of experience in a SOC environment, preferably as an L2 Analyst. Industry certifications such as CEH, GCIA, GCIH, Security+, CySA+ or equivalent are a plus. Soft Skills: Strong analytical and problem-solving skills. Ability to work effectively in a fast-paced, 24/7 SOC environment. Excellent communication and documentation skills. Job Types: Full-time, Permanent Pay: Up to ₹700,000.00 per year Schedule: Day shift Supplemental Pay: Performance bonus Application Question(s): What is your current CTC in INR? What is your current notice period? What is your current company name and location? How many years of experience as Soc Analyst L2? Experience: minimum: 4 years (Required) Work Location: In person

Posted 1 day ago

Apply

0.0 - 8.0 years

0 Lacs

Tamil Nadu

On-site

Aditya Birla Money Limited Senior Manager - Information Security Location: Chennai-HO-Guindy IE, Tamil Nadu Security Tool Implementation and Monitoring alerts – DLP, EDR, SIEM, MFA, VMDR, WAF, PAM, Micro-segmentation etc. (Experience is preferred in above security tools) Information Security Incident Monitoring and Response. (Experience is preferred) ISO 27001: 2022 Standard - implementation and adoption Implement and ensure compliance of new SEBI directions and CERT In Regulations Digital Personal Data Protection Act and Framework: Data privacy control implementation and monitoring Business Continuity Management – Policy, Procedure, Track the implementation, Testing and Reporting Cyber Third-Party Risk Management Framework Implementation and Audit Support in Information Security projects for at ABML level and manage specialized cyber security controls as directed by CISO Minimum Experience Level 5 - 8 years Job Qualifications Under Graduate

Posted 1 day ago

Apply

5.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world. The Defender Experts (DEX) Research team is at the forefront of Microsoft’s threat protection strategy, combining world-class hunting expertise with AI-driven analytics to protect customers from advanced cyberattacks. Our mission is to move protection left—disrupting threats early, before damage occurs—by transforming raw signals into intelligence that powers detection, disruption, and customer trust. We’re looking for a passionate and curious Senior Threat Researcher to join this high-impact team. In this role, you will collaborate closely with researchers, analysts, and detection engineers to advance managed Sentinel expertise and drive research on emerging cloud threats that impact both Microsoft and third-party products. Leveraging a deep understanding of multi-cloud environments and diverse security architectures, you will develop strategies and models that enhance threat detection and response capabilities within Microsoft Sentinel. Your research will directly contribute to the development of real-time protections for enterprises worldwide, ensuring comprehensive coverage across cloud platforms and strengthening the security posture of organizations leveraging a heterogeneous mix of technologies. This is a unique opportunity to work at scale, tackle complex cloud security challenges, and shape the evolution of threat research within Microsoft Security. Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. Responsibilities We are seeking a Senior Threat Researcher with a deep passion for advancing cloud security and a proven track record in high-throughput, multi-tenant environments. The successful candidate will demonstrate expertise in designing and deploying advanced detection engineering solutions—including Sentinel playbooks, workbooks, analytical rules, and custom detections. In this pivotal role, you will drive advanced research on emerging threats, architect innovative detection and response solutions, and play a key role in enhancing Microsoft Security’s capabilities to anticipate, detect, and disrupt sophisticated attacks across complex, heterogeneous cloud ecosystems. Responsibilities Include Lead and execute advanced research on emerging cloud-based threats impacting Microsoft and third-party security products across heterogeneous cloud environments. Develop and refine detection and response strategies leveraging major SIEM platforms, with a strong emphasis on Microsoft Sentinel, to provide comprehensive threat coverage and response capabilities. Collaborate with internal and external security teams to design and implement scalable, innovative solutions for multi-cloud threat intelligence, detection, mitigation and response. Translate complex raw security data into actionable intelligence that enhances the effectiveness of cloud security operations for a global customer base. Mentor, guide, and drive best practices among researchers and detection engineers on advanced threat hunting and incident response across diverse SIEM ecosystems. Contribute to industry knowledge and Microsoft’s security posture by publishing research, developing threat models, and proactively identifying threats and attack trends in the cloud. Qualifications 5+ years of relevant experience in security research, detection engineering, threat lifecycle, cloud security in large-scale in complex cloud environments, as well as disciplines related to managed services for SIEM platforms. Proven ability to lead and execute advanced research on emerging cloud-based threats affecting both Microsoft and third-party security products across heterogeneous cloud environments. Demonstrated expertise in developing and refining detection and response strategies leveraging major SIEM platforms, with a strong emphasis on Microsoft Sentinel, to provide comprehensive threat coverage and response capabilities. Extensive hands-on experience with cloud platforms—including, but not limited to, Azure—as well as a deep understanding of multi-cloud security challenges and solutions. Strong practical experience identifying, analyzing, and mitigating real-world cyber threats in complex cloud environments. Proven ability to work independently and deliver complete solutions. Demonstrated capability to effectively articulate technical insights and influence multidisciplinary teams. Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations.

Posted 2 days ago

Apply

3.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world. The Defender Experts (DEX) Research team is at the forefront of Microsoft’s threat protection strategy, combining world-class hunting expertise with AI-driven analytics to protect customers from advanced cyberattacks. Our mission is to move protection left—disrupting threats early, before damage occurs—by transforming raw signals into intelligence that powers detection, disruption, and customer trust. We’re looking for a passionate and curious Threat Researcher to join this high-impact team. In this role, you will collaborate closely with researchers, analysts, and detection engineers to advance managed Sentinel expertise and drive research on emerging cloud threats that impact both Microsoft and third-party products. Leveraging a deep understanding of multi-cloud environments and diverse security architectures, you will develop strategies and models that enhance threat detection and response capabilities within Microsoft Sentinel. Your research will directly contribute to the development of real-time protections for enterprises worldwide, ensuring comprehensive coverage across cloud platforms and strengthening the security posture of organizations leveraging a heterogeneous mix of technologies. This is a unique opportunity to work at scale, tackle complex cloud security challenges, and shape the evolution of threat research within Microsoft Security. Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. Responsibilities We are seeking a Threat Researcher with a deep passion for advancing cloud security and a proven track record in high-throughput, multi-tenant environments. The successful candidate will demonstrate expertise in designing and deploying advanced detection engineering solutions—including Sentinel playbooks, workbooks, analytical rules, and custom detections. In this pivotal role, you will drive advanced research on emerging threats, architect innovative detection and response solutions, and play a key role in enhancing Microsoft Security’s capabilities to anticipate, detect, and disrupt sophisticated attacks across complex, heterogeneous cloud ecosystems. Responsibilities Include Execute advanced research on emerging cloud-based threats impacting Microsoft and third-party security products across heterogeneous cloud environments. Develop and refine detection and response strategies leveraging major SIEM platforms, with a strong emphasis on Microsoft Sentinel, to provide comprehensive threat coverage and response capabilities. Collaborate with internal and external security teams to implement scalable, innovative solutions for multi-cloud threat intelligence, detection, mitigation and response. Translate complex raw security data into actionable intelligence that enhances the effectiveness of cloud security operations for a global customer base. Mentor, guide, and drive best practices among researchers and detection engineers on advanced threat hunting and incident response across diverse SIEM ecosystems. Contribute to industry knowledge and Microsoft’s security posture by publishing research, developing threat models, and proactively identifying threats and attack trends in the cloud. Qualifications 3+ years relevant experience in security research, detection engineering, threat lifecycle, cloud security in large-scale in complex cloud environments, as well as disciplines related to managed services for SIEM platforms. Proven ability to execute advanced research on emerging cloud-based threats affecting both Microsoft and third-party security products across heterogeneous cloud environments. Demonstrated experience in developing and refining detection and response strategies leveraging major SIEM platforms, with a strong emphasis on Microsoft Sentinel, to provide comprehensive threat coverage and response capabilities. Extensive hands-on experience with cloud platforms—including, but not limited to, Azure—as well as an understanding of multi-cloud security challenges and solutions. Strong practical experience identifying, analyzing, and mitigating real-world cyber threats in complex cloud environments. Proven ability to work independently and deliver complete solutions. Demonstrated capability to effectively articulate technical insights and influence multidisciplinary teams. Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations.

Posted 2 days ago

Apply

7.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Security represents the most critical priorities for our customers in a world awash in digital threats, regulatory scrutiny, and estate complexity. Microsoft Security aspires to make the world a safer place for all. We want to reshape security and empower every user, customer, and developer with a security cloud that protects them with end to end, simplified solutions. The Microsoft Security organization accelerates Microsoft’s mission and bold ambitions to ensure that our company and industry is securing digital technology platforms, devices, and clouds in our customers’ heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a growth mindset, a theme of inspiring excellence, and encouraging teams and leaders to bring their best each day. In doing so, we create life-changing innovations that impact billions of lives around the world. We are seeking for a passionate cybersecurity professionals to join our growing team of Defenders. In this role, you will proactively detect, investigate, and respond to advanced threats across enterprise environments using cutting-edge and AI enabled security tools and threat intelligence. The ideal candidate combines strong security expertise with a curious mindset and skills to conduct deep threat analysis. Microsoft’s mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate to realize our shared goals. Each day we build on our values of respect, integrity, and accountability to create a culture of inclusion where everyone can thrive at work and beyond. Responsibilities Monitor, triage, and respond to security incidents using alerts and incidents from Microsoft Defender products (MDE, MDI, MDO, MDA, MDC etc.) Perform proactive threat hunting using hypothesis, and telemetry from endpoints, identities, cloud and network. Develop hunting queries using Kusto Query Language (KQL) or similar to uncover suspicious patterns and behaviors. Investigate security incidents across hybrid environments and contribute to root cause analysis and containment strategies. Collaborate with internal teams (defender, threat intelligence, engineering) to enhance detection logic, develop automations, and improve incident response workflows. Contribute to incident documentation, detection playbooks, and operational runbooks. Stay current with evolving threat landscapes, cloud attack vectors, and advanced persistent threats (APT). Qualifications Graduate degree in engineering or equivalent discipline. 3–7 years of experience in cybersecurity (SOC, IR, Threat Hunting, Red Team). Hands-on experience with SIEM, EDR, and cloud-native security tools (Microsoft XDR, Sentinel, CrowdStrike, etc.). Experience with at least one cloud platform (Azure, AWS, GCP) and its associated security services and configurations. Proficiency in KQL, Python, or similar scripting languages for data analysis and automation. Strong knowledge of MITRE ATT&CK, Cyber Kill Chain, and adversary TTPs. Familiarity with operating system internals (Windows, Linux) and endpoint/network forensics. Certifications like CISSP, OSCP, CEH, GCIH, AZ-500, SC-200 or similar/equivalent are a plus. Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations.

Posted 2 days ago

Apply

3.0 - 7.0 years

0 Lacs

thiruvananthapuram, kerala

On-site

As a Cyber Managed Service SAP IDAM Operations Specialist Staff at EY, you will play a crucial role in ensuring the security and efficiency of our identity and access management processes within the SAP environment. You will be responsible for providing L2 support for SAP IDAM-related issues, managing user identities and access rights, monitoring system performance, and collaborating with IT and security teams to ensure compliance with security policies. Your key responsibilities will include troubleshooting user access problems, managing user identities and access rights, monitoring system performance, ensuring compliance with security policies, contributing to policy documentation and training materials, conducting security reviews and audits, implementing security measures, resolving service requests, and staying updated on new SAP IDAM features. To excel in this role, you should have up to 3 years of experience in operations support, a Bachelor's degree in computer science or a related field, basic knowledge of SAP IDAM solutions, familiarity with network security and IAM technologies, and experience in customer support. Preferred skills include relevant certifications and familiarity with ITIL or other IT service management frameworks. You should be willing to travel, work as an on-call support engineer, work occasional overtime, and work in shifts as required. By joining EY, you will be part of a global network that is dedicated to building a better working world through innovative solutions and trust in capital markets.,

Posted 2 days ago

Apply

2.0 - 6.0 years

0 Lacs

karnataka

On-site

The OT Security Analyst Level 2 (L2) plays a crucial role in safeguarding operational technology (OT) environments against emerging cyber threats. Your responsibilities will involve conducting thorough analysis of security events and incidents within OT environments, utilizing SIEM and OT-specific monitoring tools. You will be expected to perform root cause analysis, develop incident timelines, and apply standard incident response frameworks to support forensics and remediation efforts. Additionally, you will collaborate with IT/OT teams, investigate unauthorized device communications, anomalous behaviors, and compromised industrial assets, and refine alert rules and detection logic to enhance OT SOC operations. Your technical skills and knowledge should include a strong understanding of OT/ICS protocols and industrial network topologies, hands-on experience with OT cybersecurity tools and platforms, familiarity with compliance requirements for OT, proficiency in using SIEM systems for log correlation and event triage, and an understanding of firewalls, WAFs, proxies, and network segmentation principles in OT. Experience with vulnerability management, patch advisory for OT assets, and tools such as THOR Scanner, VMRay, or Recorded Future will be advantageous. It would be beneficial if you have exposure to Red Team/Blue Team exercises focused on OT/ICS and familiarity with GRC platforms and risk assessment tools tailored to OT. Your role will also involve liaising with the IT SOC and CIR teams, participating in threat hunting activities, and contributing to the continuous improvement of the OT SOC playbooks and knowledge base.,

Posted 2 days ago

Apply

2.0 - 5.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Overview Information Security Analyst: Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Maintains hardware, software and network firewalls and encryption protocols. Administers security policies to control physical and virtual access to systems. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Job Code Tip: May be internal or external, client-focused, working in conjunction with Professional Services and outsourcing functions. May include company-wide, web-enabled solutions. Individuals whose primary focus is on developing, testing, debugging and deploying code or processing routines that support security protocols for an established system or systems should be matched to the appropriate Programmer or Programmer/Analyst family in the Information Technology/MIS functional area. Responsibilities Should have process knowledge and technical knowledge on any of the SIEM tools ( like Qradar, LogRhythm, AlienVault, Splunk…etc). L2/L3 level is added advantage. Should have process knowledge and technical knowledge in AV tools like Symantec, McAfee, Trend Micro…etc. L2/L3 level is added advantage. Should have knowledge in managing Vulnerability tools and various remediation efforts. Review security logs generated by applications, devices and other systems, taking action or escalating to appropriate teams as needed. Enforce incident response service level agreement. Work with the global IT Security team to analyze, test and recommend tools to strengthen the security posture of the company Create and maintain operational reports allowing IT management team to understand the current and historical landscape of the IT security risks Vulnerability management assessment and remediation Participate in daily and ad-hoc meetings related to cyber security, controls and compliance, processes and documentation related tasks Research the latest information technology (IT) security trends Help plan and carry out an organization’s way of handling security Develop security standards and best practices for the organization Recommend security enhancements to management or senior IT staff Document security breaches and assess the damage they cause. Performs other duties as assigned. Uphold the company’s core values of Integrity, Innovation, Accountability, and Teamwork. Demonstrate behavior consistent with the company’s Code of Ethics and Conduct. It is the responsibility of every employee to report to their manager or a member of senior management any quality problems or defects in order for corrective action to be implemented and to avoid recurrence of the problem. Duties may be modified or assigned at any time to meet the needs of the business. Qualifications B. Tech, B.E or M.C.A 2-5 years’ Experience working in a Security Operations Center 2 years minimum in the computer industry Knowledge working with complex Windows environments Knowledgeable in various security frameworks such as NIST 800-53 / NIST 800-171 / ISO27001 Knowledge in design and administration of security tools Good written and verbal communication skills

Posted 2 days ago

Apply

8.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

This role is for one of Weekday's clients Min Experience: 8 years Location: Chennai JobType: full-time Requirements About the role Over 8 years of hands-on experience in designing and implementing robust security systems. Deep expertise in Linux and network security, with a thorough understanding of both at an architectural level. Strong foundational knowledge in security engineering, with proficiency in authentication protocols, security frameworks, and applied cryptography. Expertise in scripting using one or more languages such as Perl, Python, Go, or Shell, with a focus on automation and efficiency. A dedicated security professional, passionate about identifying and mitigating emerging threats, while continuously updating knowledge of evolving security technologies. Excellent interpersonal skills, capable of effectively communicating complex security concepts across various teams and departments. Experience with leading cloud platforms like AWS, Google Cloud, or Azure. Proven experience in implementing and managing HIDS/NIDS, FIM, and SIEM solutions for enhanced security monitoring. Familiarity with directory services and single sign-on (SSO) solutions, improving organizational access control. Strong knowledge of vulnerability management, patch automation, and VA/PT (Vulnerability Assessment & Penetration Testing) methodologies. Understanding of key security standards such as ISO 27001 and PCI-DSS, providing compliance and best practices.

Posted 2 days ago

Apply

0 years

0 Lacs

Tamil Nadu, India

On-site

Security Tool Implementation and Monitoring alerts – DLP, EDR, SIEM, MFA, VMDR, WAF, PAM, Micro-segmentation etc. (Experience is preferred in above security tools) Information Security Incident Monitoring and Response. (Experience is preferred) ISO 27001: 2022 Standard - implementation and adoption Implement and ensure compliance of new SEBI directions and CERT In Regulations Digital Personal Data Protection Act and Framework: Data privacy control implementation and monitoring Business Continuity Management – Policy, Procedure, Track the implementation, Testing and Reporting Cyber Third-Party Risk Management Framework Implementation and Audit Support in Information Security projects for at ABML level and manage specialized cyber security controls as directed by CISO

Posted 2 days ago

Apply

4.0 - 8.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Senior SOC Analyst / Administrator Location: [Insert Location] – Willingness to work in a 24x7 rotational shift environment Industry: Information Technology | BFSI | Fintech Experience Required: 4 to 8 years in Security Operations Center (SOC) with strong SOC analysis and administration skills Job Summary: We are looking for an experienced and dedicated SOC Analyst/Admin to join our 24x7 Cyber Security Operations team. The ideal candidate will have deep expertise in SIEM platforms (preferably ArcSight and IBM QRadar), strong analytical capabilities in threat detection and incident response, and a solid background in cyber defense operations. Key Responsibilities: Administer, maintain, and troubleshoot SIEM solutions (ArcSight, IBM QRadar). Perform real-time security monitoring and incident response across enterprise-wide environments. Analyze and investigate security alerts from tools including IDPS, SIEM, antivirus, EDR, UBA, and proxy systems. Build and enhance detection use cases, perform false-positive tuning, and implement threat-hunting initiatives. Actively support and manage Data Loss Prevention (DLP), Threat Intelligence, and Vulnerability Management activities. Participate in and enhance the full incident response lifecycle: detection, triage, containment, eradication, and recovery. Draft high-quality incident reports for high-severity events and contribute to root cause analysis. Develop and maintain SOPs, IR runbooks, and SOAR playbooks. Collaborate with internal teams and third-party vendors to resolve complex issues. Ensure high availability and performance of SOC infrastructure. Respond to Service Requests (SRs), Change Requests (CRs), and daily operations queries. Lead or support projects related to security tooling, automation, and process improvements. Key Skills & Qualifications: 4–8 years of experience in a SOC environment with a blend of analysis and SIEM administration. Strong experience with SIEM tools such as ArcSight and IBM QRadar (configuration, tuning, maintenance). Deep understanding of cybersecurity concepts including threat detection, malware analysis, network security, and endpoint security. Familiarity with threat intelligence platforms, DLP systems, and vulnerability scanning tools. Strong understanding of TCP/IP, common protocols, and the MITRE ATT&CK framework. Excellent troubleshooting and analytical thinking abilities. Strong documentation and communication skills. Preferred Certifications (Added Advantage): CEH (Certified Ethical Hacker) CTIA (Certified Threat Intelligence Analyst) CISM (Certified Information Security Manager) CCNA (Cisco Certified Network Associate) CND (Certified Network Defender) Work Environment: 24x7 shift-based work; must be open to working in night and weekend shifts as part of a rotating schedule. Fast-paced, highly collaborative security operations environment. Why Join Us? Work with cutting-edge cybersecurity technologies Engage in real-time threat defense and mitigation Opportunity to grow within a dynamic SOC team with continuous learning Let me know if you’d like a version customized for a particular company brand or formatted for a PDF/LinkedIn job post.

Posted 2 days ago

Apply

2.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

About Marriott: Marriott Tech Accelerator is part of Marriott International, a global leader in hospitality. Marriott International, Inc. is a leading American multinational company that operates a vast array of lodging brands, including hotels and residential properties. It consists of over 30 well-known brands and nearly 8,900 properties situated in 141 countries and territories. Role Title: Security Data Engineer Position Summary: Marriott International’s Global Information Security is seeking a Data Engineer who can build and maintain the infrastructure and systems that collect, process, and store large amounts of security data for Marriott to use for security related analysis and decision-making. Job Responsibilities: Implement and maintain scalable data pipelines using tools such as Cribl Stream and Splunk Develop and maintain ETL (Extract, Transform, Load) processes Ensure data quality and implement validation checks Automate data workflows and processes Work with distributed computing frameworks (e.g., Hadoop, Spark) Implement solutions for processing large-scale datasets Utilize cloud platforms (AWS, Azure) for data management Optimize data retrieval and query performance Build integrations with various data sources Ensure compatibility between different systems and platforms Implement data security controls and access management Maintain data integrity and reliability Work closely with security data scientists, analysts, and business stakeholders Translate business requirements into technical specifications Monitor and troubleshoot data system performance Implement optimizations for efficiency and scalability Ensure high availability of data resources Skill and Experience: 2-4 years of data engineering, data analytics, data management, and/or information security experience that includes: 2+ years of experience in data engineering and/or data analytics in an enterprise environment 1+ years of experience in information protection / information security. Strong background in statistics, mathematics, and software engineering. Proficiency in Python, R, Java, or Scala Strong knowledge of SQL Expertise in relational databases (e.g., MySQL, PostgreSQL) Experience with NoSQL databases (e.g., MongoDB, Cassandra) Familiarity with cloud platforms (AWS, Azure, GCP) and big data frameworks such as Hadoop, Spark, and Kafka Experience with ETL (Extract, Transform, Load) processes Proficiency in data pipeline development and optimization Knowledge of cybersecurity principles, tools, and best practices Preferred: Programming languages: Python, R, SQL Big data technologies: Hadoop, Spark, and Kafka Cloud platforms: AWS, Azure, GCP Relevant certifications such as AWS Certified Data Analytics – Specialty, Google Cloud Professional Data Engineer, or IBM Certified Data Engineer Experience with Security information and event management (SIEM) systems such as Splunk Experience with data pipeline management and data transformation tools such as Cribl Familiarity with MLOps practice Understanding of machine learning algorithms and AI applications in data engineering Verbal and written communication skills to articulate complex technical concepts to both technical and non-technical stakeholders Experience working in Agile and Scrum methodologies Education and Certifications: Bachelor’s degree in computer / data science, information management, Cybersecurity or related field or equivalent experience / certification Work location: Hyderabad, India. Work mode: Hybrid

Posted 2 days ago

Apply

360.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

About Us: MUFG Bank, Ltd. is Japan’s premier bank, with a global network spanning in more than 40 markets. Outside of Japan, the bank offers an extensive scope of commercial and investment banking products and services to businesses, governments, and individuals worldwide. MUFG Bank’s parent, Mitsubishi UFJ Financial Group, Inc. (MUFG) is one of the world’s leading financial groups. Headquartered in Tokyo and with over 360 years of history, the Group has about 120,000 employees and offers services including commercial banking, trust banking, securities, credit cards, consumer finance, asset management, and leasing. The Group aims to be the world’s most trusted financial group through close collaboration among our operating companies and flexibly respond to all the financial needs of our customers, serving society, and fostering shared and sustainable growth for a better world. MUFG’s shares trade on the Tokyo, Nagoya, and New York stock exchanges. MUFG Global Service Private Limited: Established in 2020, MUFG Global Service Private Limited (MGS) is 100% subsidiary of MUFG having offices in Bengaluru and Mumbai. MGS India has been set up as a Global Capability Centre / Centre of Excellence to provide support services across various functions such as IT, KYC/ AML, Credit, Operations etc. to MUFG Bank offices globally. MGS India has plans to significantly ramp-up its growth over the next 18-24 months while servicing MUFG’s global network across Americas, EMEA and Asia Pacific. Position details: In this role you will focus on researching threats posed by cyber criminals to various systems, technologies, operations, and programs, and analyzing research to determine a cyber criminal’s capabilities, intentions, and attack approaches, including those with multiple phases. Responsibilities include rapidly responding to incidents to minimize risk exposure and ensure system availability; proactively monitoring internal and external-facing environments; seeking opportunities to automate detection and remediation and reduce response times for incidents; and producing reports and briefings that include perspectives on the behavior of adversaries. Roles and Responsibilities: Perform cybersecurity threat detection, assessment, and mitigation efforts Support inquiries from compliance teams such as IT risk management and internal and external audit, to ensure documentation is complete and in compliance with information security policies Identify, evaluate, and monitor continually threats that could affect operational and business activities Support development of security operations playbooks to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats Create, Enhance and manage security use cases, dashboards and alerts using Splunk Research and look for opportunities to adopt the best practices and industry standards to enhance the SIEM and SOAR platforms Provide guidance to junior team members Job Requirements: Bachelor's degree in business, Management, Computer Sciences, or equivalent prior work experience in a related field Minimum of 3-5 years overall experience working in global, complex, matrix-managed organization Minimum of 2 years’ working experience in Cybersecurity Operations or Information Security Minimum of 2 years' experience in Incident Response and Forensic Investigations work Minimum of 2 years' experience in threat and vulnerability management Understanding of enterprise detection technologies and processes (advanced threat detection tools, intrusion detection system/intrusion prevention system (IDS/IPS), network packet analysis, endpoint protection, Anti malware/anti-virus). Understanding of network protocols and operating systems (Windows, Unix, Linux, databases) Knowledge in one or more security domains including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, and Incident Response and Forensics Knowledge of the following areas: IT security, incident handling and response, exploit analysis, intelligence gathering, digital forensics methods and procedures. Knowledge of Splunk, Phantom, Python, CrowdStrike, Tanium, Defender, Azure, AWS and forensic security tools is preferred. Knowledge of Information Assurance concepts and technologies Knowledge of cloud computing security, network, operating system, database, application, and mobile device security. Knowledge of vulnerability management and remediation. A diverse skill base in both product security and information security including organizational structure and administration practices, system development and maintenance procedures, system software and hardware security controls, access controls, computer operations, physical and environmental controls, and backup and recovery procedures. Solid experience in day-to-day operational processes such as security monitoring, data correlation, troubleshooting, security operations, etc. Experience working within the Financial Services Industry preferred. Experience in one or more security domains including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, and Incident Response and Forensics preferred. Experience with information security risk management, including conducting information security audits, reviews, and risk assessments. Knowledge of the Amazon Web Services (AWS) and/or Azure for infrastructure is preferred Working experience with MITRE ATT&CK or similar frameworks is preferred One to three years of experience in Splunk, Splunk Enterprise Security or Splunk Phantom is preferred Knowledge of scripting languages like Python is preferred Knowledge in RegEx is preferred Strong analytical skills (i.e., technical and non-technical problem solving skills). Maintain certifications in an information security related field. The following are recommended: CySA+, CISSP, ISSMP, SANS, GCIA, CISM, EnCE, CEH, GCFA, GCFE, GCIH, or GSEC and/or Splunk Certifications.

Posted 2 days ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies