Jobs
Interviews

5150 Siem Jobs - Page 31

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4.0 years

0 Lacs

Gurugram, Haryana, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-TDR Senior As part of our EY-cyber security team, who shall work as SOC Senior consultant who will assist clients in Administration and management of security solutions. The opportunity We’re looking for Senior Security consultant with expertise in CrowdStrike. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Your Key Responsibilities Administration and management support of CrowdStrike Perform as the subject matter expert on any of the above solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. Content development which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Skills And Attributes For Success Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities. Experience in managing CrowdStrike Good knowledge of SIEM technologies such as Splunk, Azure Sentinel from an Analyst’s point of view Exposure to IOT/OT monitoring (Claroty, Nozomi Networks etc.) is a plus Good knowledge and experience in Security Monitoring Good knowledge and experience in Cyber Incident Response Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in other endpoint protection tools, techniques, and platforms such as Carbon Black, Symantec, or others To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Demonstrate both technical acumen and critical thinking abilities. Strong interpersonal and presentation skills. Minimum 4 years of Hands-on experience of operating/implementing the above security tools. Certification in any of the SIEM platforms is a plus Knowledge of RegEx, Perl scripting and SQL query language. Certification - CCSA, CEH, CISSP, GCIH, GIAC. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 2 weeks ago

Apply

10.0 years

0 Lacs

Gurgaon

On-site

Security Tower Head This role has been designed as ‘’Onsite’ with an expectation that you will primarily work from an HPE partner/customer office. Who We Are: Hewlett Packard Enterprise is the global edge-to-cloud company advancing the way people live and work. We help companies connect, protect, analyze, and act on their data and applications wherever they live, from edge to cloud, so they can turn insights into outcomes at the speed required to thrive in today’s complex world. Our culture thrives on finding new and better ways to accelerate what’s next. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. If you are looking to stretch and grow your career our culture will embrace you. Open up opportunities with HPE. Job Description: HPE Operations is our innovative IT services organization. It provides the expertise to advise, integrate, and accelerate our customers’ outcomes from their digital transformation. Our teams collaborate to transform insight into innovation. In today’s fast paced, hybrid IT world, being at business speed means overcoming IT complexity to match the speed of actions to the speed of opportunities. Deploy the right technology to respond quickly to market possibilities. Join us and redefine what’s next for you. What you will do Security Tower Head role at HPE's critical large customer is a strategic role that needs deep experience in a similar capacity of CISO and as Lead Cybersecurity Architect for at least 10 years and has a total experience in the security domain for a minimum of 15 years. This role shall also demand for a strong stakeholder management. The experience of leading a large team of cybersecurity specialists from various domains such as VAPT, DLP, Edge Security/EDR, WAF, LB, SIEM SOAR UEBA, ITSM, GRC, SAST DAST, Cloud Security, DevSECOps, and related scripting/coding experience in the above domains including AI/ML based Cybersecurity modelling is mandatory. Responsible for IS operations Oversee formal risk assessment and self-assessments program for various Information Services systems and processes Manage and Monitor, organization technology security policy, ISO 27001, Data privacy and regulatory requirement to remediate new and outstanding issues; track & resolve security-related issues Carry out audits for ensuring enforcement of information security policies Promote and monitor our corporate wide IS Security awareness for ISO 27001 program Responsible for design, develop and update the policies regarding Information Security, data governance and privacy Responsible for application security, Governance and Compliance Responsible for Initiating and advocating safe practices and Industry standards Advises the CISO office on the emerging information security risks and their mitigation strategies Responsible for performing all Security audits & IT risk assessment activities Responsible for initiating and managing required information security Compliance certification processes Responsible for integration and gap analysis of the Information security of any company that company acquires Strong knowledge of the requirement of Computer Applications and Network security technologies and principles Develop, promulgate, and maintain policies, standards and practices of Information Security by establishing and maintaining efficient processes to monitor compliance of defined policies, standards and practices. Implement policies through digital workflows. Ensure activities related to BCP-DR and Emergency operations are performed in timely manner Assist in planning for information security risk monitoring, risk analysis, incident management, Change Management and overall information security requirements needed to support strategic IT and business needs What you need to bring: Qualifications BE/ B.Tech/ M.Tech/ MSc/ MCA qualification or equivalent Certifications: LA ISO 27001 (mandatory requirement) and any one of the IT risk management or Information security certificates such as CISA, CISSP, CISM, CRISC, ISO31000 Experience Experience of 10 years and minimum IT Audit experience of 3 Years Experience in driving key meetings for closing identified IS issues or gaps across different teams and vendors and achieve the outcomes within the define deadlines Strong understanding of ISO 27001 as well as industry security frameworks Strong knowledge of risk assessment and mitigation Additional Skills: Accountability, Accountability, Active Learning (Inactive), Active Listening, Bias, Business Growth, Client Expectations Management, Coaching, Creativity, Critical Thinking, Cross-Functional Teamwork, Customer Centric Solutions, Customer Relationship Management (CRM), Design Thinking, Empathy, Follow-Through, Growth Mindset, Information Technology (IT) Infrastructure, Infrastructure as a Service (IaaS), Intellectual Curiosity (Inactive), Long Term Planning, Managing Ambiguity, Process Improvements, Product Services, Relationship Building {+ 5 more} What We Can Offer You: Health & Wellbeing We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing. Personal & Professional Development We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have — whether you want to become a knowledge expert in your field or apply your skills to another division. Unconditional Inclusion We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. Let's Stay Connected: Follow @HPECareers on Instagram to see the latest on people, culture and tech at HPE. #india #operations Job: Services Job Level: TCP_05 HPE is an Equal Employment Opportunity/ Veterans/Disabled/LGBT employer. We do not discriminate on the basis of race, gender, or any other protected category, and all decisions we make are made on the basis of qualifications, merit, and business need. Our goal is to be one global team that is representative of our customers, in an inclusive environment where we can continue to innovate and grow together. Please click here: Equal Employment Opportunity. Hewlett Packard Enterprise is EEO Protected Veteran/ Individual with Disabilities. HPE will comply with all applicable laws related to employer use of arrest and conviction records, including laws requiring employers to consider for employment qualified applicants with criminal histories.

Posted 2 weeks ago

Apply

8.0 years

0 Lacs

Gurgaon

On-site

Designation: Manager Department: Digital Forensic Location: Gurugram Certification: Relevant certifications such as CHFI, GCFA, EnCE, CCE, CFE, CEH are highly preferred. ROLE & RESPONSIBILITIES: Lead and manage digital forensics investigations involving endpoints, servers, mobile devices, cloud environments, and network log analysis. Oversee forensic imaging, evidence acquisition, chain-of-custody protocols, and in-depth artifact analysis using tools such as EnCase, FTK, Intella, Autopsy, Cellebrite, Magnet AXIOM, Macquisition, and Falcon NEO. Support investigations involving data exfiltration, IP theft, malware, insider threats, and other cyber incidents. Manage and mentor a team of forensic analysts to ensure consistent quality, adherence to process, and timely delivery. Act as the client-facing lead, effectively managing communications with legal teams, compliance, and law enforcement during sensitive engagements. Review, refine, and finalize high-quality forensic reports, timelines, and findings tailored for legal, regulatory, and business audiences. Perform root cause analysis and post-incident reviews across security incidents such as ransomware, phishing, and unauthorized access. Coordinate across internal departments to ensure seamless and efficient delivery of DFIR services. Contribute to business development by supporting proposal creation, client discussions, and case study preparation. Stay current on emerging cyber threats, forensic methodologies, legal standards, and regulatory expectations. Required Skills Excellent communication and interpersonal skills; must be confident in dealing directly with clients, including CXOs and legal teams. Strong forensic report-writing abilities, capable of translating technical findings into clear, concise narratives for non-technical audiences. Ability to handle high-pressure investigations with maturity, discretion, and a solution-oriented mindset. Proven leadership in managing forensic engagements and handling multiple investigations simultaneously. High level of professional integrity, discretion, and attention to detail, especially when dealing with sensitive data. Willingness to travel for client engagements or investigations as required. Availability to support high-priority incidents during off-hours or weekends, if necessary. Experience: Graduate/Postgraduate in Computer Science, Cybersecurity, Forensic Science, or a related field. Relevant certifications such as CHFI, GCFA, EnCE, CCE, CFE, CEH are highly preferred. Minimum 8 years of experience in digital forensics and incident response, with at least 4 years in a leadership/managerial role. Proficient in industry-standard forensic tools including FTK, EnCase, Intella, Magnet AXIOM, Autopsy, Cellebrite, and Mac acquisition tools like Falcon NEO and Macquisition. Familiarity with EDR/SIEM platforms such as Splunk, CrowdStrike, or SentinelOne is an added advantage. Deep understanding of file systems (NTFS, HFS, APFS), Windows/Mac artifacts, log analysis, and chain-of-custody protocols. Experience in supporting legal processes, audits, or regulatory investigations related to cybercrime or data breaches. Job Description: As a Manager – Digital Forensics, you will lead and manage complex digital forensic and cyber investigations, with a strong focus on client communication, high-quality reporting, and team supervision. This role demands a balanced mix of forensic expertise, leadership, and exceptional communication skills. You will oversee engagements involving data breaches, IP theft, cyber fraud, insider threats, and more across varied digital environments. Academic Qualification: Graduate/Postgraduate in Computer Science, Cybersecurity, Forensic Science, or a related field. Relevant certifications such as CHFI, GCFA, EnCE, CCE, CFE, CEH are highly preferred.

Posted 2 weeks ago

Apply

10.0 years

0 Lacs

Delhi, India

On-site

We Are Hiring: Network Support Engineer Experience Required: 1–10 Years Location: Delhi, Bengaluru Employment Type: Full-time We are seeking talented Network Support Engineers, SOC, NOC, Network Engineer, across experience levels to join our growing security and infrastructure team. The ideal candidates will be responsible for ensuring the security, integrity, and performance of our network infrastructure across cloud and on-prem environments. Key Responsibilities: Monitor and manage network security systems including firewalls, IDS/IPS, VPNs, and proxies Analyze and respond to security incidents and vulnerabilities Implement and enforce security policies, standards, and best practices Conduct regular audits of network architecture and access controls Collaborate with IT and DevOps teams to secure networks, applications, and endpoints Perform vulnerability scanning and penetration testing Assist in incident response planning and disaster recovery testing Required Skills: Strong understanding of network protocols, TCP/IP, firewalls, and intrusion detection/prevention systems Hands-on experience with tools such as Palo Alto, Fortinet, Cisco ASA, or similar Familiarity with SIEM tools and log analysis Understanding of secure network design, segmentation, and access controls Experience with VPN configuration, DNS security, and endpoint protection Certifications like CCNA Security, CEH, CompTIA Security+, or CISSP (preferred but not mandatory) Why Join Us? Work on high-impact security infrastructure projects Grow your career in a fast-paced, learning-driven environment Competitive compensation and flexible working options

Posted 2 weeks ago

Apply

3.0 years

4 - 5 Lacs

Hyderābād

On-site

Job Description Lead the design and deployment of scalable security automation workflows and playbooks in Cortex XSOAR (or equivalent platforms such as Splunk SOAR, Siemplify, etc.). Serve as technical owner of the SOAR platform, managing connectors, integrations, performance monitoring, version control, and upgrades. Build custom automations using Python scripts, decision logic, and API integrations to support alert enrichment, containment, and notification tasks. Architect integrations with SIEMs (e.g., Splunk, QRadar), EDR, threat intel feeds (e.g., Anomali, VirusTotal), ticketing systems (e.g., ServiceNow, Jira), and other tools. Drive automation of incident response (IR) use cases including phishing, malware, lateral movement, data exfiltration, insider threats, and vulnerability exploitation. Partner with SOC, threat intelligence, and cloud security teams to identify automation opportunities and translate them into technical solutions. Optimize SOAR playbooks to reduce mean time to detect (MTTD) and respond (MTTR) while maintaining reliability and resilience. Mentor junior automation engineers and provide code reviews, best practices, and process guidance. Contribute to development of automation standards, security engineering roadmaps, and cross-team documentation. Stay abreast of emerging SOAR trends, threat landscapes, and new platform features. Required Qualifications: 3+ years specifically working with SOAR platforms—Cortex XSOAR strongly preferred; Splunk SOAR, Siemplify, or Chronicle SOAR also acceptable. Strong scripting experience in Python, especially within automation workflows. Proven expertise in integrating security tools using REST APIs, Python SDKs, and platform connectors. In-depth understanding of SOC operations, incident lifecycle, and security best practices (MITRE ATT&CK, NIST, etc.). Familiarity with SIEM platforms (e.g., Splunk) and threat intelligence enrichment techniques. Experience with version control (Git), CI/CD pipelines, and structured testing of automation code. Demonstrated ability to lead complex automation initiatives and work independently with minimal guidance. Strong written and verbal communication skills, especially in cross-functional team environments.

Posted 2 weeks ago

Apply

4.0 years

25 - 40 Lacs

Hyderābād

On-site

Must Have · Bachelor’s degree in Security Engineering, Computer Engineering, Computer Science, Data Science, or similar technical discipline · Familiarity with a broad range of security technologies: SIEM, CASB, SOAR, DLP, and EDR. · Technical proficiency with one or more of the major cloud computing environments. · Several years of experience with the Python programming language. · Excellent software design, problem-solving, and debugging skills. · Energetic, passionate about security, and professionally curious about the cybersecurity threat landscape Job Type: Full-time Pay: ₹2,560,609.46 - ₹4,000,000.00 per year Experience: SIEM: 4 years (Required) SOAR: 4 years (Required) Python: 5 years (Required) Security Engineer: 5 years (Required)

Posted 2 weeks ago

Apply

3.0 years

1 - 5 Lacs

Hyderābād

Remote

Description At Vitech, we believe in the power of technology to simplify complex business processes. Our mission is to bring better software solutions to market, addressing the intricacies of the insurance and retirement industries. We combine deep domain expertise with the latest technological advancements to deliver innovative, user-centric solutions that future-proof and empower our clients to thrive in an ever-changing landscape. With over 1,600 talented professionals on our team, our innovative solutions are recognized by industry leaders like Gartner, Celent, Aite-Novarica, and ISG. We offer a competitive compensation package along with comprehensive benefits that support your health, well-being, and financial security. Location: Hyderabad Reports To: Security Operations Manager Full-time | Hybrid/Remote flexibility based on business needs Full-time position with on-call responsibilities during critical incidents. What you will do: You’ll play a pivotal role in managing and optimizing our Sumo Logic SIEM environment while supporting critical day-to-day security operations. This is a hands-on technical role where your insights will directly enhance our threat detection and incident response capabilities. Note: Experience with Splunk is a strong plus, as we are currently transitioning to Sumo Logic and operating across multiple security platforms. Lead the administration of Sumo Logic SIEM Deploy, configure, and manage the platform Build and maintain dashboards, parsers, alerts, and queries Ingest and normalize logs from infrastructure, cloud, and identity sources Tune alerts to reduce noise and increase detection accuracy Monitor platform health, performance, and SLA compliance Strengthen security operations Investigate and triage alerts from Sumo Logic and other tools Support incident response activities and threat investigations Contribute to threat hunting, malware analysis, and vulnerability reviews Maintain security process documentation and runbooks Collaborate for continuous improvement Onboard new log sources in collaboration with application, cloud, and IT teams Work closely with InfoSec peers to evolve detection capabilities Support audit and compliance reporting requirements related to monitoring What We're Looking For: 3+ years of experience with Sumo Logic or another enterprise SIEM platform Strong understanding of log ingestion, threat detection, and SIEM alerting Hands-on experience writing and optimizing queries in Sumo Logic Familiarity with AWS, firewall, endpoint, and identity logs Working knowledge of frameworks such as MITRE ATT&CK and NIST Strong analytical, troubleshooting, and communication skills Bonus Points For: Deep experience with Sumo Logic administration and dashboards Exposure to cloud security, SOAR platforms, EDR, IDS/IPS Security certifications such as Security+, or equivalent Extra Credit: Experience transitioning from Splunk to Sumo Logic or working in hybrid environments Scripting knowledge (Python, Bash, PowerShell) for automation Understanding of compliance requirements (SOC 2, ISO 27001, HIPAA) Join Us at Vitech! Help shape our SIEM roadmap and elevate our security operations Work with a collaborative global InfoSec team and modern tech stack Access ongoing training, certifications, and professional growth Be part of a mission-driven company focused on innovation and excellence About Vitech At Vitech, Your Expertise Drives Transformative Change in Fintech For over 30 years, Vitech has empowered leading players in insurance, pensions, and retirement with cutting-edge, cloud-native solutions and implementation services. Our mission is clear: harness technology to simplify complex business processes and deliver intuitive, user-centric software that propels our clients' success. At Vitech, you won’t just fill a position; you’ll join a purpose-driven team on a mission that truly matters. Innovation is at our core, and we empower you to push boundaries, unleash creativity, and contribute to projects that make a real difference in the financial sector. Though our name may be new to you, our impact is recognized by industry leaders like Gartner, Celent, Aite-Novarica, ISG, and Everest Group. Why Choose Us? With Vitech, you won’t just fill a position; you’ll be part of a purpose-driven mission that truly matters. We pursue innovation relentlessly, empowering you to unleash your creativity and push boundaries. Here, you’ll work on cutting-edge projects that allow you to make a real difference—driving change and improving lives. We value strong partnerships that foster mutual growth. You will collaborate with talented colleagues and industry leaders, building trust and forming relationships that drive success. Your insights and expertise will be essential as you become an integral part of our collaborative community, amplifying not just your career but the impact we have on our clients. We are committed to a focus on solutions that makes a tangible difference. In your role, you will embrace the challenge of understanding the unique pain points faced by our clients. Your analytical skills and proactive mindset will enable you to develop innovative solutions that not only meet immediate needs but also create lasting value. Here, your contributions will directly influence our success and propel your professional growth. At Vitech, we foster an actively collaborative culture where open communication and teamwork are paramount. With our “yes and” philosophy, your ideas will be welcomed and nurtured, allowing you to contribute your unique insights and perspectives. This environment will enhance your ability to work effectively within diverse teams, empowering you to lead initiatives that result in exceptional outcomes. We believe in remaining curious and promoting continuous learning. You will have access to extensive resources and professional development opportunities that will expand your knowledge and keep you at the forefront of the industry. Your curiosity will fuel innovation, and we are committed to supporting your growth every step of the way. In addition to a rewarding work environment, we offer a competitive compensation package with comprehensive benefits designed to support your health, well-being, and financial security. At Vitech, you’ll find a workplace that challenges and empowers you to make meaningful contributions, develop your skills, and grow with a team that’s dedicated to excellence. If you’re ready to make a real impact in fintech and join a forward-thinking organization, explore the incredible opportunities that await at Vitech. Apply today and be part of our journey to drive transformative change!

Posted 2 weeks ago

Apply

3.0 years

12 - 18 Lacs

India

On-site

Job Title: Network Security Engineer Location: Hyderabad-IN Job Type: Full-Time No.of Positions : 2 Exp: 2-3yrs Budget : 12-18LPA + Key Responsibilities: Design, implement, and manage secure network architecture (firewalls, VPNs, IDS/IPS, NAC) Monitor networks for security breaches and investigate incidents Configure and manage firewalls, security appliances, and intrusion detection/prevention systems Conduct vulnerability assessments and penetration testing; remediate findings Develop and enforce security policies, standards, and procedures Manage secure access controls (e.g., AAA, RBAC, 802.1x) Analyze security alerts and provide appropriate responses and escalations Maintain and update security infrastructure (patches, firmware, rule sets) Perform risk analysis and provide recommendations for improvements Support compliance efforts (ISO 27001, NIST, GDPR, SOC 2, etc.) Collaborate with IT teams on secure deployment of new infrastructure or services Document all configurations, incidents, and procedures for auditing and knowledge sharing Required Skills & Qualifications: Bachelor’s degree in Computer Science, Infra Security, or related field 3+ years of experience in network and/or security engineering roles Strong understanding of network protocols and security technologies (TCP/IP, SSL, IPSec, DNS, etc.) Experience with firewalls and security platforms (e.g., Palo Alto, Fortinet, Cisco ASA, Check Point) Proficiency in intrusion detection/prevention systems, VPNs, and endpoint security Familiarity with SIEM tools (Splunk, QRadar, LogRhythm, etc.) Knowledge of authentication mechanisms (LDAP, RADIUS, SAML, MFA) Security certifications such as CEH, CCNP Security, Palo Alto PCNSA/PCNSE , or CompTIA Security+ Preferred Qualifications: Experience in cloud security (AWS, Azure, GCP) Scripting skills (Python, PowerShell, Bash) for automation Exposure to Zero Trust Network Architecture (ZTNA) and SASE frameworks Understanding of threat modeling and advanced persistent threats (APT) Familiarity with regulatory standards (HIPAA, PCI-DSS, etc.) Job Type: Full-time Pay: ₹1,200,000.00 - ₹1,800,000.00 per year Work Location: In person

Posted 2 weeks ago

Apply

4.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-TDR Senior As part of our EY-cyber security team, who shall work as SOC Senior consultant who will assist clients in Administration and management of security solutions. The opportunity We’re looking for Senior Security consultant with expertise in CrowdStrike. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Your Key Responsibilities Administration and management support of CrowdStrike Perform as the subject matter expert on any of the above solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. Content development which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Skills And Attributes For Success Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities. Experience in managing CrowdStrike Good knowledge of SIEM technologies such as Splunk, Azure Sentinel from an Analyst’s point of view Exposure to IOT/OT monitoring (Claroty, Nozomi Networks etc.) is a plus Good knowledge and experience in Security Monitoring Good knowledge and experience in Cyber Incident Response Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in other endpoint protection tools, techniques, and platforms such as Carbon Black, Symantec, or others To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Demonstrate both technical acumen and critical thinking abilities. Strong interpersonal and presentation skills. Minimum 4 years of Hands-on experience of operating/implementing the above security tools. Certification in any of the SIEM platforms is a plus Knowledge of RegEx, Perl scripting and SQL query language. Certification - CCSA, CEH, CISSP, GCIH, GIAC. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 2 weeks ago

Apply

0 years

5 - 8 Lacs

Hyderābād

On-site

Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Associate Managed Services Information Security Analyst is an entry level subject matter expert, responsible for monitoring, analyzing, interpreting and reporting on the incoming client data for the purpose of delivering security information and recommendations to the clients, enabling the organization to deliver the contracted security services. This role includes performing tasks such as security incident detection and response, security event reporting, threat hunting, content maintenance (tuning) and interacting with clients to ensure their understanding of the information generated, recommending client system changes as well as answering security related queries from the clients. This is an entry level role within the Managed Services Information Security Analyst team and works under guidance of more experienced analysts within the team. Key responsibilities: Works as part of a global Cyber Defense Centre (CDC) team that works 24/7 on rotational shifts. Works with client stakeholders and relevant internal teams to tune the MSSP platform and client SIEM to enable more efficient detection, analysis and reporting. Under guidance, generates continuous improvement ideas for supported security tools/technologies, to enable improvements to the company services, employee experience and client experience. Adheres to SOPs, customer Run Books and standard processes to ensure a globally consistent delivery whilst also proposing changes and improvements to these standards. Utilizes and document best practices and amend existing documentation as required. Support with security incident handling and response from several vectors including End Point Protection and Enterprise Detection and response tools, attack analysis, malware analysis, network forensics, computer forensics. Learns and utilizes a broad range of skills in LAN technologies, Windows and Linux O/S’s, and general security infrastructure. Ensures usage of knowledge articles in incident diagnosis and resolution. Under guidance, perform defined tasks to inform and monitor service delivery against service level agreements and maintain records of relevant information. Cooperates closely with colleagues to share knowledge and build a cohesive and effective team environment, benefiting the individual, the business and the client. Performs any other related task as required. To thrive in this role, you need to have: Knowledge on implementation and monitoring of a company supported SIEM or security tools/technologies/concepts. Knowledge on security architecture, worked across different security technologies. Knowledge and understanding of the operation of modern computer systems and networks and how they can be compromised. Displays excellent customer service orientation and pro-active thinking. Displays problem solving abilities and is highly driven and self-organized. Good attention to detail. Displays analytical and logical thinking. Well spoken and written communication abilities. Ability to remain calm in pressurized situations. Ability to keep current on emerging trends and new technologies in area of specialization. Academic qualifications and certifications: Bachelor's degree or relevant qualification in Information Technology or Computing or a related field. Security certifications such as (but not limited to) AZ-500, SC-200, Security+, CEH, CISSP, CISM or similar Certification in different networking technologies such as CCNA, JNCIA, ACCA, PCNSA, CCSA is advantageous. Required experience: Entry level experience in SOC Analysis Operations. Entry level experience in SIEM usage for investigations. Entry level experience in Security technologies such as (but not limited to) Firewall, IPS, IDS, Proxy. Entry level experience in dealing with technical support to clients. Entry level experience in handling security incidents end to end. Entry level experience in configuring/managing security controls, such as SIEM, Firewall, IDS/IPS, EDR, NDR, UTM, Proxy, SOAR, Honeypots and other security tools. Entry level experience in Security Analysis or Engineering preferably gained within a global services organization. Workplace type : Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cyber Managed Service -Threat Detection & Response - Security Orchestration, Automation and Response (Sentinel SOAR) - Senior KEY Capabilities : Excellent teamwork skills, passion and drive to succeed and combat Cyber threats Working with the customer to identify security automation strategies and provide creative integrations and playbooks. Work collaboratively with other team members to find creative and practical solutions to customers’ challenges and needs. Responsible for execution and maintenance of Sentinel SOAR related analytical processes and tasks Management and administration of Sentinel SOAR platform Developing custom scripts and playbooks to automate repetitive tasks and response actions. Experienced developer with at least 2 + yrs of experience using Python programming language, REST API and JSON. Must have basic SQL knowledge. Knowledge on Incident Response and Threat Intelligence tools. Creation of reusable and efficient Python-based Playbooks. Use Splunk SOAR platform to enable automation and orchestration on various tools and technologies by making use of existing or custom integration Partner with security operations teams, threat intelligence groups and incident responders. Should have worked in a security operations center and gained understanding of SIEM solutions like Splunk, Microsoft Sentinel and other log management platforms. Having experience in Splunk content development will be an added advantage Willing to learn new technologies and take up new challenges. Assist in developing high-quality technical content such as automation scripts/tools, reference architectures, and white papers. Good grasp in conceptualizing and/or implementing automation for business process workflows Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in endpoint protection tools, techniques and platforms such as Carbon Black, Tanium, Microsoft Defender ATP, Symantec, McAfee or others Should be able to assist, support and mitigate production issues. Should have the capability to work with partners and client stack holders to full fill their asks Ability to Coordinate with Vendor to incident closure on according to the severity Review, assess, benchmark and develop issue remediation action plans for all aspects of an engagement. Qualification & experience: Minimum of 3+ years’ experience in cyber security with a depth of network architecture knowledge that will translate over to deploying and integrating Sentinel SOAR solution in global enterprise environments. Experience working in ServiceNow SOAR is also an added advantage Strong oral, written and listening skills are an essential component to effective consulting. Strong background in network administration. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary. Should have strong hands-on experience with scripting technologies like Python, REST, JSON, SOAP, ODBC, XML etc. Must have honours degree in a technical field such as computer science, mathematics, engineering or similar field Minimum 2 years of working in SOAR (Sentinel) Experience in Process Development, Process Improvement, Process Architecture, and Training Quick to apprehend and adapt new applications. Knowledgeable in Cybersecurity and Incident Response Management Certification in any one of the SIEM Solution such as Splunk or SC-200 will be an added advantage Certifications in a core security related discipline will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 2 weeks ago

Apply

0 years

3 - 3 Lacs

Hyderābād

On-site

Description Why Join DAZN? Joining DAZN in Hyderabad means being part of a cutting-edge sports streaming company in a vibrant tech hub. You’ll work alongside passionate, talented professionals on innovative projects that reach millions of fans worldwide. Hyderabad offers a dynamic work environment with a great balance of career growth and lifestyle. If you’re excited about shaping the future of live and on-demand sports entertainment, DAZN Hyderabad is the perfect place to make your mark and grow your career. The Role: Join DAZN's Security Operations team as a Security Operations Analyst and help protect the world's leading global sports streaming platform. You'll be part of a dynamic team responsible for detecting, investigating, and responding to security threats across our diverse technology stack, from cloud infrastructure to broadcasting systems that deliver live sports to millions of fans worldwide. Key Responsibilities Threat Detection & Response Configure, maintain, and monitor security alerts and escalations from various tools including Microsoft Sentinel SIEM, Defender for Endpoint, WIZ, AWS WAFv2, Tenable, and other security platforms Lead and drive incident response activities from initial detection through remediation to prevention Conduct thorough incident root cause analysis and recommend actionable steps to prevent future occurrences Triage and investigate security alerts, determining true positives from false positives Threat Intelligence & Analysis Monitor and analyze global threat intelligence trends with potential impact on DAZN's business operations Get hands-on with threat feeds and real-time attack data, with particular focus on threats targeting broadcasting and streaming environments Configure new detection rules and alerts based on emerging threats, hunt results, or lessons learned from incident analysis. Security Operations Enhancement Identify, develop, and implement new processes and procedures to strengthen our security operations program Contribute to the development of custom automation tools to enhance monitoring and response capabilities Collaborate with the team to continuously improve security monitoring across our cloud and on-prem environments. Stakeholder Support Respond to internal security-related questions and requests from teams across DAZN Provide security and privacy expertise to support multiple business units and technical teams Participate in security awareness initiatives and help educate colleagues on security best practices. Skills, Knowledge & Expertise Essential Requirements Strong passion for cybersecurity, particularly threat detection and response Experience handling complex security incidents and conducting investigations Knowledge across multiple cybersecurity domains (network security, identity security, endpoint protection, cloud security, etc.) Familiarity with SIEM platforms (Microsoft Sentinel experience preferred) Understanding of security tools such as EDR, CASB, CSPM solutions Ability to work independently with minimal guidance while managing multiple tasks within set timeframes Strong analytical and problem-solving skills with attention to detail. Experience with Microsoft 365 E5 security stack and Azure security services Knowledge of AWS security services and cloud security best practices Familiarity with vulnerability management tools (Tenable, Nessus, Qualys) Experience with security automation and scripting Understanding of streaming/broadcasting technology security considerations Relevant security certifications (Security+, CySA+, GCIH, etc.) About DAZN At DAZN, we bring ambition to life. We are innovators, game-changers and pioneers. So, if you want to push boundaries and make an impact, DAZN is the place to be. As part of our team, you'll have the opportunity to make your mark and the power to make change happen. We're doing things no-one has done before, giving fans and customers access to sport anytime, anywhere. We're using world-class technology to transform sports and revolutionise the industry and we're not going to stop. DAZN VALUES – THE ‘HOW’ IN WHAT WE DO: Agility and creativity fuel growth and innovation, to Make It Happen. Prioritising what matters drives progress and positive outcomes, Focusing On Impact. Collective ambition builds optimism and success, in order to Win As One. At DAZN, we are committed to fostering an inclusive environment that values equality and diversity, where everyone can contribute and have their voices heard. This means hiring and developing talent across all races, ethnicities, religions, age groups, sexual orientations, gender identities and abilities. Everyone has the opportunity to make change and impact our DEI journey by joining our ERGs: Proud@DAZN, Women@DAZN, Disability@DAZN and ParentZone. If you’d like to include a cover letter with your application, please feel free to. Please do not feel you need to apply with a photo or disclose any other information that is not related to your professional experience. Our aim is to make our hiring processes as accessible for everyone as possible, including providing adjustments for interviews where we can. We look forward to hearing from you.

Posted 2 weeks ago

Apply

0 years

6 - 8 Lacs

Delhi

On-site

Advanced Troubleshooting & Support: Act as an escalation point (L2) for Zscaler-related issues. Diagnose and resolve complex security, networking, and performance-related issues. Work closely with vendors and internal teams to resolve critical incidents. Implementation & Administration: Lead the deployment and configuration of Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA). Optimize security policies, access control lists (ACLs), and traffic forwarding methods. Manage integrations with SIEM, EDR, and other security tools. Performance Optimization & Tuning: Analyze and fine-tune Zscaler performance metrics, including latency, bandwidth, and routing. Conduct deep packet inspection (DPI) and log analysis for security monitoring. Security Policy Management: Design and implement web filtering, SSL inspection, data loss prevention (DLP), and sandboxing policies. Enforce zero-trust security principles across the organization. Collaboration & Documentation: Work closely with SOC, NOC, and IT teams to align security policies with business requirements. Create detailed documentation for configurations, troubleshooting steps, and best practices. Provide training and knowledge transfer to L1/L2 teams. Required Skills : Troubleshooting & Analysis: Strong experience in packet capture analysis (Wireshark, tcpdump). Proficiency in using Zscaler logs, dashboards, and reporting tools for incident resolution. Ability to diagnose and resolve proxy bypass, latency, authentication, and tunneling issues. Soft Skills: Excellent problem-solving and analytical skills. Strong communication and collaboration abilities. Job Types: Full-time, Permanent Pay: ₹600,000.40 - ₹800,000.34 per year Benefits: Health insurance Provident Fund Work Location: In person

Posted 2 weeks ago

Apply

0 years

2 - 3 Lacs

Delhi

On-site

About the Role As a fresher SOC Analyst in an OEM environment, you'll learn how to operate SIEM platforms that monitor networking devices and hardware logs. This is a hands-on opportunity to develop foundational cybersecurity skills, from basic alert triage to refining detection capabilities. Key Responsibilities 1. SIEM Monitoring & Alert Triage Use SIEM tools to monitor alerts and events from network devices, and endpoints. Perform initial triage: distinguish security incidents from false positives, and escalate them appropriately. Document and log all alert investigations clearly in the SOC ticketing system. 2. Log & Incident Documentation Analyze system and network logs to detect anomalies or IOC patterns. Support incident documentation with root cause analysis and step-by-step actions taken. Maintain detailed incident records to support compliance and escalation. 3. SIEM Configuration Support Assist in onboarding new log sources: collect, normalize, and categorize OEM system logs. Help tune existing correlation rules to reduce alert fatigue and improve accuracy under guidance 4. Learning, Process & Collaboration Collaborate with senior analysts and network engineers to enhance detection coverage and FAQ procedures. Participate in SIEM rule tuning, dashboard creation, and documenting standard operating procedures (SOPs). Engage in continuous learning: attend training, internal sessions, and keep up with emerging threats and best practices. Technical Skills & Qualifications Basic knowledge of networking (OSI model, TCP/IP, DNS, HTTP), security principles, and common cyber threats (malware, phishing, ransomware) . Hands-on experience with home labs or training platforms . Strong problem-solving skills and attention to detail when investigating logs. Exposure to Python, PowerShell, or regex helpful for log parsing or automation. Soft Skills Demonstrable curiosity and eagerness to learn the best entry-level analysts are team players looking to grow and iterate fast . Effective communication , both written and verbal for documenting incidents and collaborating across teams. Attention to detail and discipline in following SOPs and logging investigative steps. Ability to work in shifts (including early or late hours) as part of a SOC 24/7 environment. Job Type: Full-time Pay: ₹240,000.00 - ₹300,000.00 per year Location: Dehli, Delhi (Required) Work Location: In person

Posted 2 weeks ago

Apply

1.0 - 2.0 years

2 - 4 Lacs

Mohali

On-site

About Us: Cywarden is a fast-growing cybersecurity firm based in the United States. We provide advanced security solutions to protect businesses from ever-evolving digital threats. Our mission is to make the digital world safer—one organization at a time. We are looking for a results-driven Cybersecurity Sales Executive who is passionate about technology and eager to drive revenue growth by identifying, developing, and closing new business opportunities. Key Responsibilities: Identify and engage new business prospects through cold outreach, networking, and inbound leads. Understand client needs and present tailored cybersecurity solutions to address their pain points. Manage the full sales cycle – from lead generation and proposal development to contract negotiation and closing. Build and maintain strong, long-term relationships with clients and key decision-makers. Meet or exceed monthly and quarterly sales targets. Collaborate with the marketing and technical teams to align messaging and strategies. Stay updated on industry trends, competitor offerings, and evolving cybersecurity threats. Qualifications: 1-2 years of B2B sales experience, preferably in cybersecurity, SaaS, IT services, or tech. Proven track record of meeting or exceeding sales targets. Strong understanding of cybersecurity products and services (e.g., SOC, SIEM, endpoint protection, penetration testing, etc.) is a big plus. Excellent communication, presentation, and negotiation skills. Self-starter with the ability to work independently and manage multiple deals simultaneously. Bachelor’s degree in Business, Marketing, Information Technology, or a related field preferred. Job Type: Full-time Pay: ₹18,000.00 - ₹34,000.00 per month Location: Mohali, Punjab (Required) Shift availability: Night Shift (Required) Work Location: In person

Posted 2 weeks ago

Apply

2.0 years

3 - 4 Lacs

Ahmedabad

On-site

Key Responsibilities: ● Develop, implement, and maintain information security policies, standards, and procedures aligned with organizational goals. ● Monitor security incidents and events, utilizing security information and event management (SIEM) tools to identify and respond to threats. ● Conduct risk assessments and vulnerability assessments to identify potential security threats and weaknesses. ● Support the incident response process by investigating and documenting security incidents. ● Collaborate with IT teams to ensure that security best practices are integrated into the design and architecture of systems and applications. ● Lead incident response activities, including investigation, documentation, and reporting of security incidents ● Conduct training and awareness programs to educate employees on security policies, practices, and emerging threats. ● Assist in compliance audits and reviews to ensure adherence to industry standards and regulations . ● Stay current on emerging security threats and trends, recommending appropriate mitigation strategies and technologies. ● Participate in security awareness initiatives and promote a culture of security within the organization. ● Assist in the evaluation and implementation of security tools and technologies to enhance the organization's security posture. Job Types: Full-time, Permanent Pay: ₹358,200.35 - ₹439,311.00 per year Schedule: Morning shift Experience: Information security: 2 years (Preferred) Work Location: In person

Posted 2 weeks ago

Apply

2.0 - 5.0 years

4 - 8 Lacs

Hyderabad, Madhwapur

Work from Office

THIS JOB IS FOR HYDERABAD LOCATION. Overview Information Security Analyst: Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Maintains hardware, software and network firewalls and encryption protocols. Administers security policies to control physical and virtual access to systems. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Job Code Tip: May be internal or external, client-focused, working in conjunction with Professional Services and outsourcing functions. May include company-wide, web-enabled solutions. Individuals whose primary focus is on developing, testing, debugging and deploying code or processing routines that support security protocols for an established system or systems should be matched to the appropriate Programmer or Programmer/Analyst family in the Information Technology/MIS functional area. Responsibilities Should have process knowledge and technical knowledge on any of the SIEM tools ( like Qradar, LogRhythm, AlienVault, Splunketc). L2/L3 level is added advantage. Should have process knowledge and technical knowledge in AV tools like Symantec, McAfee, Trend Microetc. L2/L3 level is added advantage. Should have knowledge in managing Vulnerability tools and various remediation efforts. Review security logs generated by applications, devices and other systems, taking action or escalating to appropriate teams as needed. Enforce incident response service level agreement. Work with the global IT Security team to analyze, test and recommend tools to strengthen the security posture of the company Create and maintain operational reports allowing IT management team to understand the current and historical landscape of the IT security risks Vulnerability management assessment and remediation Participate in daily and ad-hoc meetings related to cyber security, controls and compliance, processes and documentation related tasks Research the latest information technology (IT) security trends Help plan and carry out an organizations way of handling security Develop security standards and best practices for the organization Recommend security enhancements to management or senior IT staff Document security breaches and assess the damage they cause. Performs other duties as assigned. Uphold the companys core values of Integrity, Innovation, Accountability, and Teamwork. Demonstrate behavior consistent with the companys Code of Ethics and Conduct. It is the responsibility of every employee to report to their manager or a member of senior management any quality problems or defects in order for corrective action to be implemented and to avoid recurrence of the problem. Duties may be modified or assigned at any time to meet the needs of the business. Qualifications B. Tech, B.E or M.C.A 2-5 years Experience working in a Security Operations Center 2 years minimum in the computer industry Knowledge working with complex Windows environments Knowledgeable in various security frameworks such as NIST 800-53 / NIST 800-171 / ISO27001 Knowledge in design and administration of security tools Good written and verbal communication skills

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Noida

On-site

Role Description We are seeking a highly skilled and self-driven Cybersecurity Specialist with hands-on experience in Imperva Database Activity Monitoring (DAM) to join our security operations team. The ideal candidate will have deep expertise in deploying, configuring, and troubleshooting Imperva DAM solutions, along with broad knowledge of various other enterprise security tools. The role requires strong problem-solving abilities, attention to detail, and a proactive mindset for enhancing our security posture. Job Responsibilities Install, configure, and manage Imperva DAM across diverse environments. Perform ongoing administration, health checks, and tuning of Imperva systems. Develop and maintain security policies, rulesets, and custom alerts within Imperva DAM. Work closely with DBAs, system admins, and compliance teams to support audit and monitoring requirements. Troubleshoot and resolve performance, connectivity, and configuration issues related to security tools. Deploy and support other security tools such as SIEMs, vulnerability scanners, endpoint security platforms, firewalls, etc. Maintain detailed technical documentation, SOPs, and architectural diagrams. Stay current with emerging threats, vulnerabilities, and best practices in data protection and security monitoring. Assist in incident response and investigations involving data access or database-related threats. Required Qualifications 3+ years of experience in cybersecurity, with 2+ years of hands-on work with Imperva DAM . Strong understanding of database environments (Oracle, SQL Server, MySQL, etc.) and how DAM integrates with them. Proven experience in installation, configuration, upgrade, and troubleshooting of security tools in enterprise environments. Working knowledge of Linux and Windows systems. Familiarity with SIEM (e.g., Splunk, QRadar), endpoint protection (e.g., CrowdStrike, SentinelOne), and vulnerability scanners (e.g., Qualys, Nessus). Strong scripting skills (e.g., Shell, PowerShell, Python) are a plus. Excellent communication, documentation, and analytical skills. Job Type: Full-time Pay: ₹10,523.07 - ₹67,466.61 per month Work Location: In person

Posted 2 weeks ago

Apply

15.0 years

0 Lacs

Calcutta

On-site

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Security Information and Event Management (SIEM), Splunk Security Information and Event Management (SIEM) Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary: We are looking for a proactive and detail-oriented SOC Analyst (Incident Response) to join our Security Operations Center (SOC) team. In this role, you will be responsible for detecting, analyzing, and responding to cybersecurity incidents using a combination of technology solutions and processes. Roles & Responsibilities: - Monitor security alerts and events from various sources (SIEM, EDR, firewall logs, IDS/IPS, etc.) to detect potential security incidents. - Triage, investigate, and respond to incidents following standard operating procedures (SOPs) and incident response playbooks. - Perform in-depth analysis of security incidents to identify root causes, scope, and impact. - Escalate complex incidents to appropriate stakeholders and support containment, eradication, and recovery efforts. - Work with internal teams and external partners to contain and remediate threats. - Contribute to continuous improvement of detection capabilities and IR processes. - Maintain incident documentation and provide detailed reports post-incident. - Stay current with emerging threats, vulnerabilities, and incident response best practices. Professional & Technical Skills: - 2–5 years of experience in a Security Operations Center (SOC) or similar cybersecurity role. - Strong understandin of security technologies such as SIEM, EDR, IDS/IPS, firewalls, and antivirus. - Experience with incident detection, triage, analysis, and response. - Familiarity with MITRE ATT&CK framework and other threat models. - Knowledge of operating systems (Windows/Linux), networking protocols, and cloud environments. - Strong analytical and problem-solving skills. - Excellent verbal and written communication skills. - Industry certifications such as CEH, GCIH, GCIA, or CompTIA Security+ are a plus. Additional Information: - The candidate should have minimum 3 years of experience in Splunk, QRadar or any SIEM tool. - This position is based at our Bengaluru office. - A 15 years full time education is required. 15 years full time education

Posted 2 weeks ago

Apply

0.0 - 1.0 years

1 - 2 Lacs

India

On-site

Job Title: SOC Analyst with Python Knowledge (Fresher Level) Location: Indore Experience: 0–1 year Employment Type: Full-Time Job Summary: We are looking for a motivated and technically skilled fresher to join our cybersecurity team as a SOC Analyst with Python expertise . The ideal candidate should have a strong understanding of cybersecurity principles and hands-on experience with Python scripting to automate tasks and analyze data. This is an excellent opportunity for someone eager to kickstart a career in cybersecurity and grow in a dynamic, fast-paced environment. Key Responsibilities: Monitor security alerts and events using SIEM tools and escalate threats as per defined protocols Perform initial analysis of security incidents and assist in threat detection and incident response Create and enhance Python scripts for log parsing, automation, alerting, and data analysis Assist in implementing security use cases and correlating logs for detection Prepare daily/weekly reports and dashboards from SOC tools Stay updated with the latest cybersecurity threats and trends Collaborate with senior analysts and support investigation of incidents Required Skills and Qualifications: Bachelor’s degree in Computer Science, IT, Cybersecurity, or related field Knowledge of SOC operations, SIEM tools (e.g., Splunk, QRadar, ArcSight), IDS/IPS, and basic incident response workflow Strong hands-on experience in Python scripting (file handling, APIs, data analysis, etc.) Understanding of networking protocols, logs (Windows, Linux, firewall, etc.), and cyber threat landscape Analytical thinking with strong problem-solving skills Good communication and documentation skills Preferred (Good to Have): Any internship or academic project related to SOC or security analysis Exposure to Linux command line and log management Basic knowledge of MITRE ATT&CK or cyber kill chain Job Type: Full-time Pay: ₹15,000.00 - ₹17,000.00 per month Benefits: Cell phone reimbursement Paid time off Provident Fund Work Location: In person

Posted 2 weeks ago

Apply

4.0 years

3 - 5 Lacs

Jaipur

On-site

Vaibhav Global limited Jaipur, Rajasthan khushboo.rathore@vaibhavglobal.com Posted : 5 hours ago Vaibhav Global Ltd (VGL) Company Overview: Listed in 1996-97 on Indian stock exchanges, Vaibhav Global Ltd (VGL) is an end-to-end electronic deep discount retailer of fashion jewelry, gemstones, and lifestyle products, operating in the US, UK, Germany, and Canada. Shopping Experience: Today's customers seek convenience, and VGL meets this demand through its proprietary 24/7 TV shopping channels (Shop LC in the US and Germany, and Shop TJC in the UK), as well as through various digital mediums including websites, mobile apps, OTT platforms, social media, and third-party marketplaces. VGL reaches almost 124 million households across the US, UK, and Germany. As digitization progresses and online retail continues to grow, VGL's portfolio and omni-channel strategy will evolve accordingly. Financials and Workforce: VGL reported a group turnover of approximately Rs. 3,041 Crore (FY 2023-2024) and employs over 3800 people globally. The company’s head office and main manufacturing facility are in Jaipur, India, employing around 3000 people, including contract workers. Acquisitions: Mindful Souls B.V.: In FY23-24, VGL acquired Mindful Souls B.V., a Netherlands-based e-commerce company specializing in subscription-based online sales of fashion jewelry, gemstones, and lifestyle products. This acquisition is expected to leverage VGL's sourcing and manufacturing strengths while enhancing digital business capabilities. Ideal World: VGL, through its subsidiary Shop TJC Ltd (UK), acquired the assets of Ideal World, a well-known teleshopping and digital retail brand in the UK. This acquisition includes IP rights, broadcasting rights, studio equipment, and other intangible assets. Environmental and Social Responsibility: VGL is committed to sustainable business practices and renewable energy initiatives. The company's SEZ unit in India received the ‘Excellence Award’ for ‘IGBC Performance Challenge 2021 for Green Built Environment,’ reflecting its dedication to environmental sustainability. VGL's ‘Your Purchase Feeds...’ initiative has provided 87 million meals to school children in India, the US, and the UK. The company encourages employees to donate at least two hours each month to charitable causes, tracked through its performance system. VGL is also a Great Place to Work (GPTW) certified organization. Shop LC Overview: Shop LC, a VGL subsidiary, was established in Austin, TX in 2007 and now broadcasts live to 75 million homes in the US. The growing e-commerce presence is supported by the website Shop LC. Shop LC ships approximately 25,000 products daily to US customers and employs around 550 people in various operational roles. The US is VGL’s largest market, contributing 68% to consolidated revenue. TJC Overview: TJC, another VGL subsidiary, was established in London, UK in 2006 and broadcasts live to 25 million homes in the UK. The company’s e-commerce presence is supported by the website TJC. TJC ships approximately 12,000 products daily to UK customers and employs around 220 people in London, with extended teams in India. Shop LC Germany Overview: Launched in 2021 from Dusseldorf, Germany, Shop LC Germany TV & e-commerce is a new market with significant growth potential. The business currently reaches 27 million households and is expanding. The e-commerce site can be accessed at Shop LC Germany. Our Purpose: Delivering joy. Our Vision: Be the Value Leader in Electronic Retailing of Jewelry and Lifestyle Products. Our Mission: To deliver one million meals per day to children in need by FY40 through our one-for-one meal program: your purchase feeds... Our Core Values: Teamwork Honesty Commitment Passion Positive Attitude As a Security Specialist, you will help keep our digital systems safe. This includes setting up firewalls and web protections, monitoring network activity, and responding to security issues quickly. You’ll also support compliance, document security procedures, and work with other teams on technical tools. Key Responsibilities Install and manage firewalls (e.g., Fortinet, Palo Alto) and WAF tools (e.g., Azure WAF, Cloudflare) Set up and maintain Azure networking (routing, private access) Create and enforce security access rules Monitor logs, detect threats, and resolve incidents Implement CNAPP/CSPM tools in Azure cloud environments Collaborate with DevOps to add security to CI/CD pipelines Support audits (like PCI-DSS, ISO 27001, SOC 2) Write SOPs, runbooks, and incident support documentation Evaluate new tools and run tests as needed Required Skills and Experience 4–7 years working in network and cloud security Strong experience with NGFWs, WAFs, Azure cloud security tools Knowledge of SIEM platforms and packet capture tools (e.g., Wireshark) Good understanding of VPNs, TCP/IP, and application security Excellent problem-solving and communication skills Job Overview Compensation ₹ Competitive Salary & Benefits Yearly Level Mid Location Jaipur, Rajasthan Experience 3+ Years Qualification Bachelors Degree Work Mode: Onsite Job Type: Fulltime

Posted 2 weeks ago

Apply

4.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. EY-Cyber Security-TDR Senior As part of our EY-cyber security team, who shall work as SOC Senior consultant who will assist clients in Administration and management of security solutions. The opportunity We’re looking for Senior Security consultant with expertise in CrowdStrike. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering. Your Key Responsibilities Administration and management support of CrowdStrike Perform as the subject matter expert on any of the above solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. Content development which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Skills And Attributes For Success Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities. Experience in managing CrowdStrike Good knowledge of SIEM technologies such as Splunk, Azure Sentinel from an Analyst’s point of view Exposure to IOT/OT monitoring (Claroty, Nozomi Networks etc.) is a plus Good knowledge and experience in Security Monitoring Good knowledge and experience in Cyber Incident Response Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in other endpoint protection tools, techniques, and platforms such as Carbon Black, Symantec, or others To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Demonstrate both technical acumen and critical thinking abilities. Strong interpersonal and presentation skills. Minimum 4 years of Hands-on experience of operating/implementing the above security tools. Certification in any of the SIEM platforms is a plus Knowledge of RegEx, Perl scripting and SQL query language. Certification - CCSA, CEH, CISSP, GCIH, GIAC. What Working At EY Offers At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are. You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer: Support, coaching and feedback from some of the most engaging colleagues around Opportunities to develop new skills and progress your career The freedom and flexibility to handle your role in a way that’s right for you EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Cyber Managed Service -Threat Detection & Response - Security Orchestration, Automation and Response (Sentinel SOAR) - Senior KEY Capabilities : Excellent teamwork skills, passion and drive to succeed and combat Cyber threats Working with the customer to identify security automation strategies and provide creative integrations and playbooks. Work collaboratively with other team members to find creative and practical solutions to customers’ challenges and needs. Responsible for execution and maintenance of Sentinel SOAR related analytical processes and tasks Management and administration of Sentinel SOAR platform Developing custom scripts and playbooks to automate repetitive tasks and response actions. Experienced developer with at least 2 + yrs of experience using Python programming language, REST API and JSON. Must have basic SQL knowledge. Knowledge on Incident Response and Threat Intelligence tools. Creation of reusable and efficient Python-based Playbooks. Use Splunk SOAR platform to enable automation and orchestration on various tools and technologies by making use of existing or custom integration Partner with security operations teams, threat intelligence groups and incident responders. Should have worked in a security operations center and gained understanding of SIEM solutions like Splunk, Microsoft Sentinel and other log management platforms. Having experience in Splunk content development will be an added advantage Willing to learn new technologies and take up new challenges. Assist in developing high-quality technical content such as automation scripts/tools, reference architectures, and white papers. Good grasp in conceptualizing and/or implementing automation for business process workflows Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in endpoint protection tools, techniques and platforms such as Carbon Black, Tanium, Microsoft Defender ATP, Symantec, McAfee or others Should be able to assist, support and mitigate production issues. Should have the capability to work with partners and client stack holders to full fill their asks Ability to Coordinate with Vendor to incident closure on according to the severity Review, assess, benchmark and develop issue remediation action plans for all aspects of an engagement. Qualification & experience: Minimum of 3+ years’ experience in cyber security with a depth of network architecture knowledge that will translate over to deploying and integrating Sentinel SOAR solution in global enterprise environments. Experience working in ServiceNow SOAR is also an added advantage Strong oral, written and listening skills are an essential component to effective consulting. Strong background in network administration. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary. Should have strong hands-on experience with scripting technologies like Python, REST, JSON, SOAP, ODBC, XML etc. Must have honours degree in a technical field such as computer science, mathematics, engineering or similar field Minimum 2 years of working in SOAR (Sentinel) Experience in Process Development, Process Improvement, Process Architecture, and Training Quick to apprehend and adapt new applications. Knowledgeable in Cybersecurity and Incident Response Management Certification in any one of the SIEM Solution such as Splunk or SC-200 will be an added advantage Certifications in a core security related discipline will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 2 weeks ago

Apply

17.0 years

0 Lacs

New Delhi, Delhi, India

On-site

Greetings from GIGABIT Technologies !! With 17+ years of deep expertise in the Cybersecurity and Enterprise IT solutions space , GIGABIT Technologies has proudly established itself as one of the leading System Integrators in North India , serving critical sectors including government, enterprise, and BFSI . As we continue to grow and expand our footprint across India, we are looking to strengthen our technical team with passionate, skilled, and driven individuals. Role Description As a Network & Security Engineer , you will be responsible for designing, deploying, configuring, and supporting complex network and security infrastructure solutions across multiple client environments. You will work closely with internal sales, OEM partners, and customer IT teams to deliver secure, scalable, and high-performance infrastructure solutions. Reach out to us with your updated resume at krishnak@gigabittech.in Key Responsibilities: Solution Design & Deployment: Design and implement enterprise-grade network and cybersecurity solutions as per customer requirements. Configure and deploy firewalls, routers, switches, wireless controllers, and security appliances (Fortinet, Cisco, Arista, Palo Alto, etc.). Integrate security tools such as endpoint protection, DLP, SIEM, email security, and MFA solutions. Work on Layer 2/3 switching, routing protocols (OSPF, BGP), VLANs, VPNs, and load balancers. Customer Support & Project Execution: Deliver end-to-end project execution including installation, configuration, UAT, documentation, and handover. Provide L2/L3 technical support for troubleshooting and incident resolution in customer environments. Work in coordination with OEMs for escalations and TAC support. Pre-sales & Technical Consultation: Assist the sales team with solution design, BOM preparation, and proposal documentation. Participate in customer meetings, technical presentations, and POCs (Proof of Concept). Conduct site surveys and assessments for solution sizing and planning. Documentation & Compliance: Prepare high-quality implementation and configuration documentation. Ensure adherence to best practices and customer-specific compliance requirements (ISO, PCI-DSS, etc.). Required Skills & Experience: Bachelor's degree in IT, Computer Science, or related field. 4–6 years of relevant experience in system integration, networking, and cybersecurity. Hands-on experience with OEM solutions like Cisco, Fortinet, Sophos, Palo Alto, Check Point, Aruba, etc. Strong grasp of IP networking, firewalls, NAT, ACLs, IDS/IPS, VLANs, and VPNs. Experience with cloud networking/security (Azure, AWS, GCP) is an added advantage. Certification preferred: CCNA, CCNP, Fortinet NSE (4 or above), Sophos, PCNSE, etc.

Posted 2 weeks ago

Apply

2.0 - 3.0 years

11 - 16 Lacs

Pune

Work from Office

Application Security Risk Classification Analyst Project description Do you have the know-how to apply business analysis techniques to deliver process and control execution in Application Security area? Are you a committed and collaborative team player with an analytical and logical mind-set? Are you motivated to work in a complex, diverse and global environment? ASCA (Application Security Risk Classification (ASCA) is part of a global organization within Technology Information Security Office (TISO). Our services focus on Cyber Hygiene for applications and infrastructure, detecting/remediating/governing measures for cyber threats. . You'll be working as part of our global Application Security team. As an ASCA Analyst, you'll play an important role in ensuring the on-going cyber-security of our client. We offer flexibility in the workplace and equal opportunities to all our team members. Our team is global, diverse and collaborative as we work across organizations to keep our technology, applications and the businesses they support secure. Responsibilities We're looking for a ASCA business analyst to: On-board applications to Application Security Framework (ASF) in cooperation with the Software Component Manager (SWCM) Management of applications in scope of control processes and execution Management of the pipeline of the applications to be onboarded Coordinating entries to Application Security Management System Compliance reporting to stakeholders, including risk and compliance teams. Production Tollgate verification for releasing applications into Production environment. Skills Must have Your expertise Ideally 2-3 years of experience in applying cyber security analysis or administration, preferably in IT Security or Risk Management projects (Application Security area preferred). Experience with data analysis proficiency with Excel is a must. Ability to work independently on assigned tasks and driving them from start to completion. Ability to challenge and propose possible improvements (in various areas, e.g. process, reporting) Ability to explain complex concepts in a clear and concise manner Use to work with stakeholders on different levels of the organization Use to work in a demanding and variable environment Excellent written and verbal communication skills Fluent in English Nice to have Experience within Application Security area preferred

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies