Home
Jobs

2220 Siem Jobs - Page 32

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

30.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Description ORACLE: As the provider of the world’s most complete, open and integrated business software and hardware systems, Oracle is dedicated to unleashing innovation by simplifying IT. With more than 30 years of information technology innovation, Oracle is the recognized industry leader in enterprise application and technology solutions. ORACLE CLOUD: Oracle Cloud is a Generation 2 enterprise cloud that delivers powerful compute and networking performance, a comprehensive portfolio of infrastructure and platform cloud services, and the world’s only self-driving autonomous database. Built from the ground up to meet the needs of mission-critical applications, Oracle Cloud supports all legacy workloads while delivering modern cloud development tools—so enterprises can bring their past and build their future. The comprehensive nature of Oracle Cloud is a key selection consideration for customers. Oracle has the broadest cloud portfolio in the industry, delivering a complete range of production-level, cross-functional business applications for each part of an organization with information and data shared seamlessly across Oracle Cloud Applications and other systems. Business users have the latest innovations at their fingertips across sales and marketing, customer service, finance and accounting, supply chain management, human capital and talent management—all enriched with social engagement and collaboration tools and an intuitive user interface that works on any mobile device. These applications have been architected on a modern and open cloud platform and infrastructure to simplify integration needs and lower an organization’s total cost of ownership. With such extensive functionality across business processes, customers can solve their business problems with complete solutions that give them end-to-end execution and complete visibility. Oracle IaaS is clearly differentiated, being far more performant, more secure, more reliable and cost efficient as compared to others in the market. Oracle has fundamentally innovated in the IaaS space and continues to gain market share aggressively. Oracle PaaS is anchored by Oracle Autonomous Database (ADB), which offers the most innovative “self-driving” capabilities in the data tier in the marketplace. Combine with ADB, Oracle cloud also offers a complete application development platform that includes app dev, security, integration, identity management, analytics, big data and AI/ML amongst other far broader capabilities. Partners with customers, sales, engineering and product teams to design, demonstrate and deploy Oracle Cloud architectures that address customer business problems. Drives Oracle Cloud customer consumption by accelerating the adoption of Oracle cloud services including discovery, design and deployment. Engages with strategic customers, builds leadership relationships at multiple levels within organizations in order to design and implement solutions. Works directly with customers to gather requirements, develop architectures and translates business needs into solutions. May implement solutions and ensure successful deployments through code development and scripting. Displays product/application understanding through highly customized presentation demonstrations to customers, and at conferences, and events. Supports customer from Proof of Concept (POC) through production deployment of services via resource configuration, planning, and customer education/training. Creates and distributes technical assets (white papers, solution code, blog posts, and video demonstrations). Serves as a leading contributor for customers and sales on technical cloud solutions and customer success. Identifies gaps and enhancements to influence engineering roadmaps for customer driven features. Leading contributor, may provide direction and mentoring to others. Work is non-routine and very complex, involving the application of advanced technical/business skills in area of specialization. May interact with C level. Maintains expertise by staying current on emerging technologies. Minimum qualifications include: 8 years experience with computer applications and tools required. Preferred but not required qualifications include: Bachelor of Science-level university degree in Computer Science, Math, Engineering from accredited university; and/or relevant 8 years technical experience. Advanced degree in relevant field of studies highly desirable. Expertise in and an in depth and thorough knowledge of competitive and industry knowledge in the field of computer applications and tools; System and application design; Implementation of advanced product features; Project management; Solving technical problems with customers in technical environments; Written and verbal communication and interpersonal skills; Needs analysis, positioning, and business justification. 8 years experience and expertise in the clear communication of technical information to others through presentations, demonstrations, written communication and consultative solutioning experience. Career Level - IC4 Responsibilities Come and join us! We are seeking a deeply technical individual to join our team where they will both lead and contribute to delivery of customer focused projects that involve migrating existing workloads to Oracle Cloud and building completely new architectures to support net new workloads in Oracle’s cloud. Project technology stacks we work with include existing legacy / On Premises software, Oracle’s Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) services, and other competitive technologies. While much of the focus of this role will revolve around delivery of identity and related cloud security technologies, a large portion of the work will also involve adjacencies including securing and configuring tenancies, networking, encryption and key or Certificate Management, Web Application Firewalls, SIEM technologies, vulnerability scanning, etc. While also interacting directly with customers the role involves regular work with the development organization to drive product improvements and innovations. This is a senior technical Cloud Delivery role, so the Cloud technical experience is the higher priority. A Cloud Security Engineer in our team is responsible for successful implementation of non-routine and complex business solutions ensuring high quality and timely delivery within budget to the customers’ happiness. Analyze business needs to help ensure Oracle’s solution meets the customers objectives by combining industry standard methodologies and product knowledge. Effectively applies Oracle’s methodologies and policies while adhering to contractual obligations, thereby minimizing Oracle’s risk and exposure. Exercises judgment and business acumen in selecting methods and techniques for effective project delivery on small to medium engagements. Provides direction and mentoring to junior resources on the delivery team. Ensures deliverables are acceptable and works closely with the Project Management Team to understand and manage project expectations. Collaborates with the consulting/delivery sales team by providing domain credibility. Helps with Technical solution scoping of project Comfortable working in a matrix management environment. Good communication skills to deal with internal collaborators, customers, and vendors. This individual should have a solid technical background and excellent problem-solving skills. Qualifications Individual should possess a deep knowledge of: Cloud or mobile security including OAuth, OpenID Connect, SAML federation, Single Sign-On. MFA and strong authentication. Identity management / governance, and provisioning. OR alternatively: Configuration of a secure tenancy in OCI, AWS, Azure, or GCP. Use and configuration of services such as OCI Cloud Guard, AWS Control Tower, Azure Security Center. Use and configuration of SIEM systems such as Splunk, QRadar, or LogRhythm. In addition to the above knowledge of fundamental enabling technologies including: Secure coding practices Network security SSL / TLS Encryption Key Management Certificate Management Intrusion Detection and Prevention Systems Data Loss Prevention Minimum Qualifications Minimum of 10 years of experience in progressively responsible information technology including. 5+ years of experience in developing, implementing, or architecting information systems 3+ years technical architecture experience integrating identity and access management software into cloud infrastructure and applications 2+ years experience in managing the security aspect of cloud deployments in OCI/Azure/AWS/GCP OR deployments of at least one identity and access management product such as: Oracle OAM/OIM/OVD/OID, CA/Netegrity SiteMinder/IdentityMinder/TransactionMinder, IBM Tivoli Identity Manager and/or Access Manager, Sun Identity Manager and/or Access Manager, Ping Access and/or Ping Federate, or similar Experience developing identity management strategies, architectures and implementation plans Experience with at least one of the following development environments/languages: Java / J2EE, Python, JavaScript, C#, c/C++ Preferred Experience And Qualifications Cloud Security Posture Management. Mobile Security. Cloud Security. Single Sign On. Enterprise Directory Architecture and Design including directory schema, namespace and replication topology experience. Resource Provisioning. Role Base Access Control. Experience with BEA WebLogic, IBM WebSphere or Tomcat. Hands on experience: (1) working with Oracle OCI, AWS, Azure or other major cloud providers, and (2) with Python programming and unit testing such as PyTest. Experience with Infrastructure as code concepts and CI/CD pipelines. Experience with DevOps concepts and Agile software development practices. Great documentational skills and approach of design and document first. Experience operating in a Linux/Unix environment. OCI certification highly desirable. Experience with one or more directories such as Active Directory, IBM Directory Server, SunONE Directory Server and Novell e-Directory. Familiarity with major operating systems, such as Microsoft Windows and Unix; mainframe security packages such as TopSecret, ACF2 and RACF; and/or leading packaged application solutions for ERP systems, CRM systems or portals. Solid understanding of virtual directories(e.g. Radiant Logic and OctetString). Familiarity with federated identity concepts (i.e. SAML, OAuth, OpenID Connect, WS-Federation). Familiarity with REST security concepts including OAuth, JSON, JWE, JWS, JWT, as well as others. Familiarity with web services security concepts such as SAML, WS-Security, XML-Sec. Experience leading business requirements gathering and translating those into system requirements. Experience facilitating business process design as it relates to managing identities and access privileges. Experience developing identity management governance plans. Understanding of current regulatory environment and related implications to identity management and security/audit compliance. Comfort with sophisticated, constantly evolving software development environments. Ability to learn new technologies quickly. Experience using distributed source code management systems (e.g. Git). Experience using ticket tracking systems (i.e. JIRA). Experience working with geographically distributed teams. Does this sound like you? If so, we hope to meet you! Qualifications Career Level - IC4 About Us As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s challenges. We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That’s why we’re committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_mb@oracle.com or by calling +1 888 404 2494 in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law. Show more Show less

Posted 1 week ago

Apply

3.0 - 5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. DSS Service Provisioning - Supervising Associate Security Analyst The opportunity The Security Technology Services (STS) group is a division of Information Security that ensures secure access to systems and information for more than 390,000 people in over 150 countries. You will be part of STS DLP Engineering Team specifically to support the Enterprise Data Loss Prevention (DLP) solution. The STS team is responsible for the delivery of DLP Services and the maintenance of the global DLP applications. The team is geographically dispersed and comprises of all disciplines required to deliver Data Security Services for our customers. Your Key Responsibilities The Senior Analyst will be primarily responsible for configuring Data Security Solutions like the enterprise Data Loss Prevention System. The main duties of this role will include helping to translate business requirements to secure data with our technical capabilities, especially overseeing the configuration of the DLP environments in a heterogenous global environment. This role requires strong hands-on experience in leading data security solutions with a strong focus on DLP. It will also participate in Data Access Governance Program development and assist in administering the program. The Senior Analyst will help to supervise and mentor junior analysts on the team. The role will also interface with internal customers, stakeholders and support teams at various levels within the organization including Legal, Data Protection, IT Operations and Engineering. Skills And Attributes For Success Technical knowledge in Data Protection technology (DLP, SIEM, SOAR, Data Access Governance, Networking) Administration of the DLP tools which includes configuring policies, upgrading, and patching, etc Proven effective verbal and written communication skills Ability to independently research and solve technical issues Demonstrated integrity in a professional environment Knowledge of core Information Security concepts related to Governance, Risk & Compliance Excellent teaming skills Ability to work in and adapt to a changing environment Flexibility to adjust to multiple demands, shifting priorities, ambiguity and rapid change Ability to efficiently handle customer concerns and difficult situations with ease and professionalism Essential Functions Of The Job Work with vendors to support the different security technologies Configuration of the Security tools which includes configuring policies, response rules & notifications Work with Monitor & Response team to analyse alerts generating from various systems to tune their configuration Understand and follow the incident response process through event escalations Work with Senior level stakeholders (Risk Management, Compliance & Data Protection) Understand Business requirements and translate into technical controls Ability to work within and alongside diverse, global and virtual teams To qualify for the role you must have Degree in Computer Science, Information Systems, Engineering or a related field. Knowledge of security controls: data classification; data labeling and data loss 3-5 years of experience in one or more of the following: Data Loss Prevention (DLP) Technology support and Event Handling Information Security concepts related to Governance, Risk & Compliance Supporting Information Security Technology English language skills - excellent written and verbal communication Exceptional judgement, tact and decision-making ability Ideally, you’ll also have Demonstrated integrity in a professional environment Ability to work within diverse, global, virtual teams Ability to appropriately balance firm security needs with business impact and benefit What We Look For Good interpersonal, communication and presentation skills Ability to deal with ambiguity and change, and exercise appropriate time management to meet deliverables Prioritization of work items to ensure timelines are achieved Good judgment, tact, and decision-making ability Deep critical thinking skills demonstrating analytical and systematic approach to problem solving Experience working in a global virtual environment Ability to work independently but also within a team environment What We Offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less

Posted 1 week ago

Apply

8.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Your potential, unleashed. India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realise your potential amongst cutting edge leaders, and organisations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks. Work you’ll do Lead client engagements and provide strategic guidance on OT/ICS security initiatives. Participate in OT incident response activities, including investigation, analysis, and mitigation of security incidents in the OT environment. Oversee the monitoring and detection of security threats and incidents in the OT environment, ensuring timely response and resolution. Establish trusted advisor relationships with key client stakeholders, including C-level executives, OT managers, and IT security teams. Lead and mentor a team of OT security professionals, providing guidance, support, and professional development opportunities. Conduct regular assessments and audits of OT security controls, identifying gaps and recommending remediation measures. Conduct Passive Vulnerability testing for OT environment Conduct Risk Assessment and gap assessment in OT environment Foster a culture of collaboration, innovation, and continuous learning within the team. Contribute to the development of the OT/ICS cybersecurity practice within the firm, including thought leadership, methodologies, and service offerings. Identify market trends, emerging technologies, and regulatory developments in the OT/ICS cybersecurity space. Collaborate with firm leadership to develop go-to-market strategies and business development initiatives. Manage complex OT/ICS cybersecurity projects from initiation to closure, ensuring quality, timeliness, and client satisfaction. Develop project plans, budgets, and resource allocations to meet project objectives and deliverables. Monitor project progress, identify risks and issues, and implement mitigation strategies as needed. Provide subject matter expertise on OT/ICS cybersecurity technologies, standards, and best practices. Develop and implement cybersecurity controls and solutions to mitigate risks and protect critical infrastructure. Assist clients in developing and implementing governance frameworks, policies, and procedures to manage OT/ICS cybersecurity risks. Deliver client presentations, workshops, and training sessions on OT/ICS cybersecurity topics. Contribute to thought leadership activities, including whitepapers, articles, and conference presentations. Participate in industry forums, working groups, and conferences to share insights and best practices. Ensure compliance with relevant OT/ICS cybersecurity regulations, standards, and frameworks (e.g., NERC CIP, IEC 62443). Lead pursuit qualification, proposals, response and closing of opportunities. The key skills required are as follows: Lead and manage the OT SOC team, providing guidance, direction, and mentorship to analysts and engineers. Knowledge of advanced persistent threats, malware, emergingthreats as well as experience in a large corporate environment. Strong understanding of malware analysis,threat taxonomy and threat indicators Ability to work with multiple securitytechnologies, platforms includingSIEMs, IDS /IPS, Firewalls, Web application firewalls etc. Hands on experience for configuration and working on tools as Claroty, Tenable, Nazomi Extensive experience in Pre-Sales, Securityoutsourcing, Marketing and Alliances Experience of assessment / implementation of OT Security controls basis various standard such as NIST, ISO 27001, NERC CIP and IEC 62443 etc. Understanding of various OT security architectures and ability to review the same. In-depth knowledge of OT protocols, technologies, and systems, including SCADA, PLCs, DCS, and HMI. Hand-on experience of working on OT Technologies such as SIEMENS, Yokogawa, Honeywell, Rockwell etc. Experience with OT security tools and technologies, such as SIEM, IDS/IPS, firewall, and endpoint protection. Excellent communication and interpersonal skills, with the ability to effectively communicate technical concepts to non-technical audiences. Qualifications B.Tech / BE / M.Tech / MCA /MBA/MS 8+ Years of relevant Exp. Preferred: GISCP and IEC 62443 Desirable: CISSP and CISM Your role as a leader At Deloitte India, we believe in the importance of leadership at all levels. We expect our people to embrace and live our purposely challenging themselves to identify issues that are most important for our clients, our people, and for society and make an impact that matters. How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Show more Show less

Posted 1 week ago

Apply

3.0 - 5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Your potential, unleashed. India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks Your work profile As Assistant Manager in our Cyber Team you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: - We are looking for a skilled Cribl Data Engineer to design, manage, and optimize data pipelines that process and route machine data at scale. The ideal candidate will have hands-on experience with Cribl Stream , Cribl Edge , or Cribl Search , and a strong understanding of telemetry data workflows, observability tools, and data platforms like Splunk, Sentinel, Elastic, or S3. Design and build streaming data pipelines using Cribl Stream for routing, transforming, and enriching logs, metrics, and trace data. Configure data sources (e.g., Syslog, HEC, TCP, S3, Kafka) and destinations (e.g., Splunk, Sentinel, Elasticsearch, Data Lakes). Develop pipelines, routes, packs, and knowledge objects using Cribl’s UI and scripting features. Optimize data ingestion workflows to reduce costs, improve performance, and enhance data usability. Implement filtering, masking, sampling, and transformation logic using Cribl Functions (Regex, Eval, Lookup, JSON, etc.). Work with SIEM and observability teams to ensure clean, enriched, and correctly formatted data flows into tools like Splunk, Sentinel, S3, or OpenSearch. Monitor Cribl infrastructure and debug pipeline issues in real time using Cribl Monitoring and Health Checks. Implement version control, testing, and CI/CD for Cribl pipelines (using GitHub or GitLab). Participate in PoC evaluations, vendor integrations, and best practices documentation.\ Desired qualifications Education: Bachelor’s degree in Information Security, Computer Science, or a related field. A Master’s degree in Cybersecurity or Business Management is preferred. Experience: 3 to 5 Year Hands-on experience with Cribl Stream and knowledge of Cribl Edge or Cribl Search. Strong understanding of log formats (Syslog, JSON, CSV, Windows Event Logs, etc.) Familiarity with SIEM platforms like Splunk, Microsoft Sentinel, Elastic Stack, QRadar, or Exabeam. Proficient in regex, JSON transformations, and scripting logic. Comfortable with cloud platforms (AWS/Azure/GCP) and object storage systems (e.g., S3, Azure Blob). Familiarity with Kafka, Fluentd, Fluent Bit, Logstash, or similar tools is a plus. Location and way of working Base location: Noida/Gurgaon Professional is required to work from office. Your role as a Assistant Manager We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society. In addition to living our purpose, Senior Executive across our organization must strive to be: Inspiring - Leading with integrity to build inclusion and motivation Committed to creating purpose - Creating a sense of vision and purpose Agile - Achieving high-quality results through collaboration and Team unity Skilled at building diverse capability - Developing diverse capabilities for the future Persuasive / Influencing - Persuading and influencing stakeholders Collaborating - Partnering to build new solutions Delivering value - Showing commercial acumen Committed to expanding business - Leveraging new business opportunities Analytical Acumen - Leveraging data to recommend impactful approach and solutions through the power of analysis and visualization Effective communication – Must be well abled to have well-structured and well-articulated conversations to achieve win-win possibilities Engagement Management / Delivery Excellence - Effectively managing engagement(s) to ensure timely and proactive execution as well as course correction for the success of engagement(s) Managing change - Responding to changing environment with resilience Managing Quality & Risk - Delivering high quality results and mitigating risks with utmost integrity and precision Strategic Thinking & Problem Solving - Applying strategic mindset to solve business issues and complex problems Tech Savvy - Leveraging ethical technology practices to deliver high impact for clients and for Deloitte Empathetic leadership and inclusivity - creating a safe and thriving environment where everyone's valued for who they are, use empathy to understand others to adapt our behaviors and attitudes to become more inclusive. How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome… entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals. *Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices. At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution. Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

our potential, unleashed. India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Technology & Transformation is about much more than just the numbers. It’s about attesting to accomplishments and challenges and helping to assure strong foundations for future aspirations. Deloitte exemplifies the what, how, and why of change so you’re always ready to act ahead. Learn more about Technology & Transformation Practice. Your work profile As Deputy Manager in our Defense & Resilience Team you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: - As a part of our Technology & Transformation team, you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations. You’ll: Role Description :- The role requires providing expertise and leadership for Incident Response capabilities including good understanding of cyber incident forensics. It requires providing both subject matter expertise and project management experience to serve as the “point person” of client engagement in domain. The candidate shall pertain efficient incident response and remediation skills to minimise the impact of cyber risks. The individual will oversee and support security monitoring operations team and assist them during security incidents and ensure incidents are managed and responded effectively including and reporting to stakeholders. This role primarily consists of leading team of the Incident responders, Incident managers and stakeholders (including client, vendors, etc.) and to conduct thorough response activities on behalf of a wide variety of clients across sectors. Candidate is required to work in complex security environments and alongside SOC team to design, communicate and execute incident response, containment, and remediation plans. Candidate is required to have hands-on experience of incident management and investigation tools and shall be comfortable leading teams on challenging engagements, communicating with clients, providing hands-on assistance with incident response activities, and creating and presenting high-quality deliverables. Work you’ll do 5+ years of relevant experience in managing all aspects of risk and incident analysis in SOC. Must have experience in managing at least 1 project for large & 1 project for medium, enterprise scale Clients. • Shall be responsible for deployment, maintaining, tuning, monitor and managing all aspects of client SOC. Responsible for coordinating, in a timely manner, all activities necessary for security incident monitoring, analyzing incidents / risks, incident / risk containment, identifying root cause, initiate problem resolution, incident / risk response and communication. • Incident management, change management, problem management and ability to work 24x7 during crisis. Experience in Security products and technologies; Tools like Security Incident Event Management, Firewall, IPS, HIPS, AAA, Anti- APT, Web gateway, DDoS, Security Analytics & Endpoint Security etc. • Deep understanding of network security, protection of networks using controls related to people process and technology, well versed with various tools used for protection of networks and related components from a security perspective. • Use and apply learnings from incident and provide recommendation for standardizing the application, network, DB, server etc. configurations • Is well versed with security aspects of UNIX, Linux and its various flavors and with Microsoft operating systems. • Knowledge of user access, authentications, file permissions, resource controls, boot process, full kernel level privilege etc. • Shall have experience of monitoring the database security logs/alerts and shall take complete ownership for the same. • Well versed with aspects of database security, access control, identity management, encryption of database, data obfuscation techniques. Should have deep security related knowledge of Oracle, DB2, and My SQL and SQL databases etc. How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognize there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome… entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals. To take the next step and join our progressive and motivated team, please contact Shweta Das at shwedas@deloitte.com Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Linkedin logo

Your potential, unleashed. India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realise your potential amongst cutting edge leaders, and organisations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks. Your work profile As Assistant Manager in our Cyber Team you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: - We are looking for a highly skilled QRadar Implementation Engineer to design, deploy, and configure the QRadar SIEM platform across multiple customer environments within our MSSP platform. The ideal candidate will have strong expertise in QRadar implementation and the ability to customize solutions based on individual client requirements while ensuring scalable, efficient, and secure SIEM operations in a multi-tenant environment. Key Responsibilities: • QRadar Deployment & Configuration: Design and implement QRadar SIEM solutions for MSSP clients, including the installation and configuration of QRadar components (Console, Event Processors, Data Nodes, etc.). • Multi-Tenant Environment: Configure and maintain QRadar in a multi-tenant MSSP environment, ensuring proper segmentation and secure data handling for each client. • Log Source Integration: Integrate diverse log sources (network devices, endpoints, applications, cloud services) into QRadar for continuous monitoring and threat detection across different client environments. • Customization for Clients: Develop and customize correlation rules, dashboards, and alerts specific to client needs, including use cases tailored to each customer’s threat landscape. • Use Case Development: Work closely with client SOC teams to develop security use cases, tune rules, and optimize detection capabilities based on emerging threats and business requirements. • Performance Optimization: Ensure the optimal performance of QRadar across all tenants, including EPS management, storage, and event processing in high-volume environments. • Client Onboarding: Collaborate with internal and external teams for seamless onboarding of new clients onto the MSSP platform, ensuring successful integration with existing security tools and services. Security Monitoring and Threat Detection: Assist in the development of effective monitoring strategies, leveraging QRadar to detect and respond to threats for multiple clients. • Compliance and Reporting: Ensure that QRadar deployments align with regulatory requirements (PCI-DSS, GDPR, HIPAA, etc.) and provide detailed reporting and audits for each client as needed. • Troubleshooting & Support: Provide Level 2/3 support for QRadar issues, ensuring timely resolution of problems related to log ingestion, parsing, rule execution, and system performance. • System Upgrades & Maintenance: Plan and execute regular system upgrades, patching, and maintenance activities for QRadar instances across all client environments. Desired qualifications • Bachelor’s degree in Computer Science, Cybersecurity, or related field, or equivalent experience. • 5+ years of experience in deploying and managing QRadar SIEM in large-scale environments, preferably within an MSSP. • In-depth understanding of QRadar architecture, components, and deployment scenarios. • Strong experience in managing and securing multi-tenant SIEM environments. • Expertise in log source integration, event normalization, and tuning for different client environments. • Familiarity with scripting and automation tools (Python, Bash, etc.) for custom integrations and log parsing. • Solid understanding of networking and security technologies (firewalls, IDS/IPS, EDR, etc.). • Hands-on experience with security frameworks such as MITRE ATT&CK, NIST, or ISO 27001. Preferred Certifications: • IBM Certified QRadar SIEM Administrator or Architect. • CISSP, CEH, or other relevant cybersecurity certifications. Location and way of working • Base location: Mumbai/Gurgaon • Professional is required to work from office Your role as a Assistant Manager We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society. In addition to living our purpose, Senior Executive across our organization must strive to be: • Inspiring - Leading with integrity to build inclusion and motivation • Committed to creating purpose - Creating a sense of vision and purpose • Agile - Achieving high-quality results through collaboration and Team unity • Skilled at building diverse capability - Developing diverse capabilities for the future • Persuasive / Influencing - Persuading and influencing stakeholders • Collaborating - Partnering to build new solutions • Delivering value - Showing commercial acumen • Committed to expanding business - Leveraging new business opportunities. Analytical Acumen - Leveraging data to recommend impactful approach and solutions through the power of analysis and visualization • Effective communication – Must be well abled to have well-structured and well-articulated conversations to achieve win-win possibilities • Engagement Management / Delivery Excellence - Effectively managing engagement(s) to ensure timely and proactive execution as well as course correction for the success of engagement(s) • Managing change - Responding to changing environment with resilience • Managing Quality & Risk - Delivering high quality results and mitigating risks with utmost integrity and precision • Strategic Thinking & Problem Solving - Applying strategic mindset to solve business issues and complex problems • Tech Savvy - Leveraging ethical technology practices to deliver high impact for clients and for Deloitte • Empathetic leadership and inclusivity - creating a safe and thriving environment where everyone's valued for who they are, use empathy to understand others to adapt our behaviours and attitudes to become more inclusive. How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Show more Show less

Posted 1 week ago

Apply

4.0 - 6.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

Your potential, unleashed. India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realise your potential amongst cutting edge leaders, and organisations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks Your work profile As Assistant Manager in our Cyber Team you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: - We are seeking a skilled and proactive SIEM Content Management Specialist to join our security operations team. The ideal candidate will be responsible for designing, implementing, and managing custom SIEM content that supports the organization's security monitoring and threat detection capabilities. You will play a key role in ensuring that our SIEM system is optimized to detect, analyze, and respond to potential security threats effectively and efficiently. Desired qualifications Experience required – 4-6 Years Certification’s requirements such as CISSP, CISM,CEH or any other relevant certificate. Location and way of working Base location: Hyderabad Professional is required to work from Client office Your role as a Assistant Manager We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society. In addition to living our purpose, Senior Executive across our organization must strive to be: Develop, test, and implement custom SIEM rules, correlation logic, and use cases to detect security threats. Continuously improve and tune existing detection content to reduce false positives and enhance detection accuracy. Build and maintain complex correlation rules, dashboards, and alerts tailored to organizational needs. Stay current with emerging threats and vulnerability trends, ensuring SIEM content is aligned with the latest threat intelligence. Knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc. Fundamental understanding of network traffic analysis including TCP/IP, routing, switching, protocols, etc. Active analysis on Security Vulnerabilities, Advisories, Incidents, and Attack techniques. Creating SIEM rules to fulfill requirements provided by customers in their security use cases. SIEM Administrator is responsible for maintaining client’s SIEM appliance by making sure all SIEM deployment devices are working properly, efficiently and with desired performance. Inform L3 team of proactive and reactive actions to minimize false positives Identifying the risk for Infrastructure and executing the plan to reduce the risk. Driving End to End Internal and External Audits related to content management. Responsible to Perform detailed investigation on security log data events. Security Analysis using Industry standard tools and technologies. Preparing detailed run book for each Use case for creating the SOAR playbook Active analysis on Security Vulnerabilities, Advisories, Incidents, and Attack techniques. Have knowledge in device integration for log collection and developing custom parser for unsupported log source integration. Creating security Usecases and mapping it line to MITRE ATTACK and Cyber Kill Chain phases. How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome… entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals. *Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices. At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution. In this regard, you may refer to a more detailed advisory given on our website at: https://www2.deloitte.com/in/en/careers/advisory-for-career-aspirants.html?icid=wn_ Show more Show less

Posted 1 week ago

Apply

5.0 - 8.0 years

0 Lacs

Kolkata, West Bengal, India

On-site

Linkedin logo

Introduction In this role, you'll work in one of our IBM Consulting Client Innovation Centers (Delivery Centers), where we deliver deep technical and industry expertise to a wide range of public and private sector clients around the world. Our delivery centers offer our clients locally based skills and technical expertise to drive innovation and adoption of new technology. Your Role And Responsibilities Solution Design: Collaborate with stakeholders to understand business requirements and design SAP GRC Access Control and Security solutions that meet regulatory compliance and risk management objectives. Access Control Implementation: Implement and configure SAP GRC Access Control module, including role management, user provisioning, access request management, and access risk analysis. Segregation of Duties (SoD) Management: Design and implement SoD rules and controls within SAP GRC Access Control. Perform SoD analysis to identify and remediate conflicts in user access and ensure compliance with regulatory requirements. Security Administration: Manage security administration activities, including user account management, role management, and access provisioning within SAP S/4HANA systems. Risk Assessment and Mitigation: Perform risk assessments to identify potential security risks and vulnerabilities within the SAP landscape. Develop and implement mitigation strategies to address identified risks. Compliance and Audit Support: Ensure compliance with relevant regulations, such as GDPR, SOX, and industry-specific requirements. Support internal and external audits by providing necessary documentation and evidence of compliance. Security Monitoring and Incident Response: Implement security monitoring tools and processes to detect and respond to security incidents. Define incident response procedures and coordinate with relevant stakeholders in incident management activities. Training and Awareness: Develop and deliver training programs to educate users and stakeholders about SAP GRC Access Control and Security best practices, policies, and procedures Preferred Education Master's Degree Required Technical And Professional Expertise Qualifications: Bachelor’s degree in engineering, Computer Science, Information Systems, or a related field with 5-8 years rich working experience and strong understanding of SAP S/4HANA GRC (Governance, Risk, and Compliance) Access Control and Security module for overseeing the implementation, configuration, and management of SAP GRC Access Control and Security solutions within the SAP S/4HANA environment. Ensure the organization's access control and security processes align with regulatory requirements and industry best practices SAP S/4HANA GRC Access Control, Security Lead; SAP GRC Access Control: In-depth knowledge and hands-on experience with SAP GRC Access Control module, including role management, user provisioning, access request management, and access risk analysis. Segregation of Duties (SoD): Expertise in SoD concepts, methodologies, and tools. Ability to design and implement SoD rules and controls within SAP GRC Access Control. Regulatory Compliance: Understanding of regulatory requirements and standards, such as GDPR, SOX, and industry-specific regulations. Knowledge of controls and processes to ensure compliance with these requirements. Security Administration: Proficiency in SAP S/4HANA security administration activities, including user account management, role management, and access provisioning Preferred Technical And Professional Experience Risk Management: Experience in conducting risk assessments, identifying security risks, and developing risk mitigation strategies within the SAP landscape. Security Monitoring: Familiarity with security monitoring tools and techniques to detect and respond to security incidents. Knowledge of SAP Security Information and Event Management (SIEM) solutions is beneficial. Problem-Solving and Troubleshooting, communication, analytical and problem-solving skills. Show more Show less

Posted 1 week ago

Apply

7.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

Introduction A career in IBM Consulting is rooted by long-term relationships and close collaboration with clients across the globe. You'll work with visionaries across multiple industries to improve the hybrid cloud and AI journey for the most innovative and valuable companies in the world. Your ability to accelerate impact and make meaningful change for your clients is enabled by our strategic partner ecosystem and our robust technology platforms across the IBM portfolio; including Software and Red Hat. Curiosity and a constant quest for knowledge serve as the foundation to success in IBM Consulting. In your role, you'll be encouraged to challenge the norm, investigate ideas outside of your role, and come up with creative solutions resulting in ground breaking impact for a wide network of clients. Our culture of evolution and empathy centers on long-term career growth and development opportunities in an environment that embraces your unique skills and experience. Your Role And Responsibilities Responsible for implementation partner to see project on track along with providing required reports to management and client Handle the project as well as BAU operations while ensuring high level of systems security compliance Coordinate with and act as an authority to resolve incidents by working with other information security specialists to correlate threat assessment data. Analyse data, such as logs or packets captures, from various sources within the enterprise and draw conclusions regarding past and future security incidents. Ready to support for 24/7 environment. Preferred Education Master's Degree Required Technical And Professional Expertise 7+ years of IT experience in security with at least 4+ Years in Security Operation Centre with SIEMs. B.E./ B. Tech/ MCA/ M.Sc. Maintaining SIEM/UEBA platform hygiene, Scripting, Automation SOAR Playbook Creation with Testing, with Change/Problem/Incident Management, with CP4S platform integration & dashboarding, Recovery Support. Expertise in Security Device Management SIEM, Arcsight, Qradar, incident response, threat hunting, Use case engineering, SOC analyst, device integration with SIEM. Working knowledge of industry standard risk, governance and security standard methodologies Proficient in incident response processes - detection, triage, incident analysis, remediation and reporting. Ability to multitask and work independently with minimal direction and maximum accountability. Preferred Technical And Professional Experience Preferred OEM Certified SOAR specialist + CEH Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work Intuitive individual with an ability to manage change and proven time management Proven interpersonal skills while contributing to team effort by accomplishing related results as needed Up-to-date technical knowledge by attending educational workshops, reviewing publications Show more Show less

Posted 1 week ago

Apply

6.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Information Security Lead at Nurix AI Location: Bangalore, India Experience: 6-10 years About Us At Nurix AI, we envision a world powered by super-intelligent AI agents that transform how businesses engage with customers. Our cutting-edge AI agents do more than just solve problems, they create opportunities. From suggesting next purchases to boosting revenue while maintaining customer satisfaction, to analyzing vast datasets for actionable insights, our technologies shape your business and product strategies. By resolving queries with precision and delivering highly personalized interactions, we redefine the customer experience and drive measurable impact. Nurix.ai is at the forefront of AI innovation, developing cutting-edge AI and LLM solutions to enhance productivity and automation. Backed by $27.5M in seed funding, we are building next-gen AI-driven applications that redefine human-machine collaboration. We are looking for a Technical Lead to spearhead our AI engineering efforts and drive product innovation. We are pioneering the AI revolution as India’s first scaled AI services company. We deliver cutting-edge AI and LLM solutions tailored for the dynamic needs of the modern world. Backed by robust funding we are a vibrant, young team set on redefining technological boundaries. Join us in shaping the future. Join us in building the future, where every interaction is smarter, faster and more impactful. The Opportunity This role involves building and leading the information security function at Nurix AI. The company is experiencing rapid growth and requires a seasoned expert to establish a world-class security posture. The role focuses on addressing the unique security challenges of AI, LLMs, and multi-cloud infrastructure, ensuring innovative solutions are secure by design. Key Responsibilities Security Strategy & Architecture: Design and implement a comprehensive information security strategy, with a focus on AI/ML workloads, LLMs, conversational AI, and multi-cloud infrastructure (AWS, GCP, Azure). Threat Management & Incident Response: Establish threat detection, vulnerability management, and incident response capabilities. AI & LLM Security: Implement security best practices for the AI/ML development lifecycle, including data security, model integrity, and adversarial attack mitigation for LLMs. Cloud Security Governance: Develop and enforce security controls across multi-cloud environments. DevSecOps Leadership: Embed security best practices throughout the SDLC and CI/CD pipelines. Policy, Compliance & Risk Management: Develop and enforce security policies aligned with international standards and data protection laws. Conduct risk assessments on internal systems, vendors, and AI solutions. Security Operations & Tooling: Oversee the use of security tools (SIEM, EDR, vulnerability scanners). Security Awareness & Culture: Drive a culture of security awareness. Customer Trust & Advocacy: Serve as a security subject matter expert. Vendor Management: (Requires significant experience) Understanding of Global Compliances. Required Qualifications Bachelor’s degree in Computer Science, Cybersecurity, or related field. 6-10 years of experience in Information Security, with a focus on cloud environments and complex software systems. Deep expertise in AI/ML security, including risks associated with LLMs, data pipelines, and conversational AI. Proven experience in designing and managing security in multi-cloud environments (AWS, GCP, Azure). Hands-on experience with security tools (SIEM, EDR, vulnerability scanning). Understanding of securing APIs, containers, microservices, and CI/CD pipelines. Knowledge of security frameworks and standards (OWASP, MITRE ATT&CK, ISO 27001, SOC 2). Experience in developing security policies, conducting risk assessments, and managing incident response. Excellent communication, leadership, and project management skills. Preferred Skills (Bonus Points) Master’s degree in Cybersecurity or related field. Security certifications (CISSP, CISM, CCSP, CEH, CompTIA Security+, cloud security certifications). Experience in a rapidly scaling technology startup. Strong knowledge of global and Indian data privacy frameworks (GDPR, HIPAA, DPDP Act). Experience building a security function from the ground up. What We Offer The opportunity to work in a fast-paced, innovative company that is changing the way industries operate. A dynamic work environment with ample opportunities for professional growth and advancement. Attractive salary, equity options, and benefits package. A chance to be at the forefront of the AI and technology revolution with a team of passionate, like-minded professionals. Show more Show less

Posted 1 week ago

Apply

7.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

About Us Yubi stands for ubiquitous. But Yubi will also stand for transparency, collaboration, and the power of possibility. From being a disruptor in India’s debt market to marching towards global corporate markets from one product to one holistic product suite with seven products Yubi is the place to unleash potential. Freedom, not fear. Avenues, not roadblocks. Opportunity, not obstacles. About Us Yubi stands for ubiquitous. But Yubi will also stand for transparency, collaboration, and the power of possibility. From being a disruptor in India’s debt market to marching towards global corporate markets from one product to one holistic product suite with seven products Yubi is the place to unleash potential. Freedom, not fear. Avenues, not roadblocks. Opportunity, not obstacles. About Yubi Yubi, formerly known as CredAvenue, is redefining global debt markets by freeing the flow of finance between borrowers, lenders, and investors. We are the world's possibility platform for the discovery, investment, fulfillment, and collection of any debt solution. At Yubi, opportunities are plenty and we equip you with tools to seize it. In March 2022, we became India's fastest fin-tech and most impactful startup to join the unicorn club with a Series B fundraising round of $137 million. In 2020, we began our journey with a vision of transforming and deepening the global institutional debt market through technology. Our two-sided debt marketplace helps institutional and HNI investors find the widest network of corporate borrowers and debt products on one side and helps corporates to discover investors and access debt capital efficiently on the other side. Switching between platforms is easy, which means investors can lend, invest, and trade bonds - all in one place. All of our platforms shake up the traditional debt ecosystem and offer new ways of digital finance. Yubi Credit Marketplace - With the largest selection of lenders on one platform, our credit marketplace helps enterprises partner with lenders of their choice for any and all capital requirements. Yubi Invest - Fixed-income securities platform for wealth managers & financial advisors to channel client investments in fixed income Financial Services Platform - Designed for financial institutions to manage co-lending partnerships & asset-based securitization Spocto - Debt recovery & risk mitigation platform Accumn- Dedicated SaaS solutions platform powered by Decision-grade data, Analytics, Pattern Identifications, Early Warning Signals and Predictions to Lenders, Investors and Business Enterprises So far, we have on-boarded over 17000+ enterprises, 6200+ investors & lenders, and have facilitated debt volumes of over INR 1,40,000 crore. Backed by marquee investors like Insight Partners, B Capital Group, Dragoneer, Sequoia Capital, LightSpeed, and Lightrock, we are the only-of-its-kind debt platform globally, revolutionizing the segment. At Yubi, People are at the core of the business and our most valuable assets. Yubi is constantly growing, with 1000+ like-minded individuals today, changing how people perceive debt. We are a fun bunch who are highly motivated and driven to create a purposeful impact. Come, join the club to be a part of our epic growth story. Role Description: This role is a senior position equivalent to a Level 3 SOC analyst. In this role, You are expected to manage the Cyber Defence Centre (SOC), which is a 24/7 environment. Handle security incidents and able to provide rapid response with a deep understanding of IT & Network Infrastructure tools and Technologies. Primary Responsibilities: Member of a critical role in our cyber security function to ensure enterprise and client data is secure and private. You will help provide 24x7 monitoring for the organization by acting as the first line of defense against potentially malicious events. Support the Security Operations Centre with enhancing SOC tools including the design/improvement of working practices and incident responses Threat Hunting - Analyses security system logs, security tools, and available data sources on a day-to-day basis to identify attacks against the enterprise and report on any irregularities, issues related to improper access patterns, trending, and event correlations and make suggestions for detection rules and system tuning. Performs research into emerging threat sources and develops threat profiles. Keep updated on the latest cybersecurity threats. Has a sound understanding of SIEM, PAM, CASB, EDR, other threat detection platforms, and Incident Response tools. Develop and execute a crisis communication plan for CXO and other stakeholders. Measures SOC performance metrics and communicates the value of security operations to business leaders. Requirements Requirements: Security Incident Response and Handling techniques Log management and filtering solutions Windows Server-based systems including DNS, DHCP, IIS, NPS, RDS, DFS, Hyper-V Cloud platforms (i.e. Azure / AWS) VMware and similar virtualization technologies Virtualization principles &aTechnologies PKI Networking principles Working knowledge of compliance standards such as ISO27001, PCI-DSS & Cyber Essentials Plus SIEM Tools Nessus or other Vulnerability management tool Security principles and operations Firewall, IDS/IPS configuration Email and Web filtering services and configuration Preferred Qualification Bachelor’s Degree in computer science with a minimum of 7 years related experience. Experience working in or with a Security Operations Centre and managing security issues and incidents. Benefits We are committed to creating a diverse environment and are proud to be an equal-opportunity employer. All qualified applicants receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, or age. Show more Show less

Posted 1 week ago

Apply

6.0 years

0 Lacs

Lakhipur, Assam, India

Remote

Linkedin logo

Req ID: 125185 Remote Position: Yes Region: Americas Country: USA State/Province: New Hampshire City: Remote Employee US Summary The Cybersecurity Manager is critical in protecting enterprise systems, data, and infrastructure by proactively identifying and mitigating security risks. This role requires a deep understanding of cyber threats, risk management, and security technologies to safeguard the organization's digital assets. The individual will provide expert guidance, lead security initiatives, and mentor junior analysts while collaborating with cross-functional teams to strengthen the overall security posture. Key Responsibilities Security Operations & Risk Management Oversee the configuration, administration, and optimization of enterprise-wide security solutions. Monitor an enterprise-wide endpoint security solution with a base of 25,000+ endpoints, ensuring optimal security and performance. Provide expert-level (Tier 3/4) security solution support, responding to and resolving critical incidents within established SLAs. Lead incident response efforts, analyzing security events, conducting root cause analysis, and implementing corrective actions. Utilize advanced threat intelligence methodologies to predict, detect, and respond to sophisticated cyber threats. Develop, refine, and implement advanced SIEM use cases, security monitoring content, and correlation rules for improved threat detection. Forensics & Compliance Conduct digital forensics investigations and support internal audits by providing detailed forensic analysis of security incidents. Ensure compliance with regulatory and industry standards (e.g., ISO 27001, NIST, GDPR, CMMC, ITAR), advising stakeholders on security best practices. Participate in vulnerability management programs, including penetration testing, red/blue team exercises, and security assessments. Security Architecture & Engineering Assist in the deployment and hardening of security solutions such as firewalls, IDS/IPS, EDR, SIEM, IAM, and DLP. Consult on developing zero-trust security frameworks and strategies for endpoint and network security. Leadership & Collaboration Mentor and guide junior analysts and engineers, providing technical leadership and career development support. Partner with IT, DevOps, and business teams to ensure security is integrated into all aspects of IT operations. Act as a security advisor to executives and stakeholders, translating complex security concepts into business-friendly language. Knowledge/Skills/Competencies Technical Expertise Proficiency in cybersecurity frameworks, risk management, and threat modeling. Extensive knowledge of security operations, incident response, and digital forensics. Advanced experience with penetration testing, vulnerability management, and ethical hacking methodologies. Strong proficiency in cloud security, network security, identity and access management (IAM), and endpoint protection. Understanding of encryption standards, PKI, and secure application development. Proficiency in scripting and automation (e.g., Python, PowerShell, Bash) to enhance security operations. Advanced ability to analyze and correlate security data from diverse sources (logs, SIEM, EDR, etc.). Knowledge of database security (MySQL, SQL, Oracle). Business & Soft Skills Strong leadership and mentoring capabilities. Excellent verbal and written communication skills, with the ability to translate technical security risks into business impact. Understanding regulatory requirements such as ISO 27001, ITAR, CMMC, SOX, and GDPR. Proven track record of working with cross-functional teams to drive security initiatives. Physical Demands Duties are primarily performed in an office environment but may require occasional on-call availability and emergency response. Extended periods of sitting, as well as visual concentration on security dashboards, logs, and reports. Typical Experience 6 - 10 years of experience in cybersecurity, IT security operations, or related fields, with a demonstrated history of technical leadership. Experience managing and responding to advanced persistent threats (APT), malware analysis, and insider threats. Typical Education Bachelor's Degree in Computer Science, Information Security, or a related field Preferred Professional certifications: CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) OSCP (Offensive Security Certified Professional) CEH (Certified Ethical Hacker) GIAC Certifications (GSEC, GCIA, GCIH, etc.) Cloud Security Certifications (CCSP, AWS Security Specialty, Azure Security Engineer, GCP Professional Security Engineer) Compensation Data The salary range provided in this posting is an estimate by the company and may change based on various factors. These factors can include, but are not limited to, changes in the job responsibilities, the credentials and experience of the successful candidate, or the geographic location of the candidate. Salary Range: $102,000 to $140,000. Celestica offers a range of benefits to eligible employees (those scheduled to work 30 hours or more per week). These benefits include medical, dental, and vision insurance, short-term and long-term disability insurance, life insurance, voluntary benefits, and a 401(k) plan with a company match. Notes This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time. Celestica is an equal opportunity employer. All qualified applicants will receive consideration for employment and will not be discriminated against on any protected status (including race, religion, national origin, gender, sexual orientation, age, marital status, veteran or disability status or other characteristics protected by law). At Celestica we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported. Special arrangements can be made for candidates who need it throughout the hiring process. Please indicate your needs and we will work with you to meet them. Company Overview Celestica (NYSE, TSX: CLS) enables the world’s best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development – from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers. Celestica would like to thank all applicants, however, only qualified applicants will be contacted. Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services. Show more Show less

Posted 1 week ago

Apply

2.0 - 5.0 years

0 Lacs

India

On-site

GlassDoor logo

Overview: ormation Security Analyst: Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Maintains hardware, software and network firewalls and encryption protocols. Administers security policies to control physical and virtual access to systems. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Job Code Tip: May be internal or external, client-focused, working in conjunction with Professional Services and outsourcing functions. May include company-wide, web-enabled solutions. Individuals whose primary focus is on developing, testing, debugging and deploying code or processing routines that support security protocols for an established system or systems should be matched to the appropriate Programmer or Programmer/Analyst family in the Information Technology/MIS functional area. Responsibilities: Should have process knowledge and technical knowledge on any of the SIEM tools ( like Qradar, LogRhythm, AlienVault, Splunk…etc). L2/L3 level is added advantage. Should have process knowledge and technical knowledge in AV tools like Symantec, McAfee, Trend Micro…etc. L2/L3 level is added advantage. Should have knowledge in managing Vulnerability tools and various remediation efforts. Review security logs generated by applications, devices and other systems, taking action or escalating to appropriate teams as needed. Enforce incident response service level agreement. Work with the global IT Security team to analyze, test and recommend tools to strengthen the security posture of the company Create and maintain operational reports allowing IT management team to understand the current and historical landscape of the IT security risks Vulnerability management assessment and remediation Participate in daily and ad-hoc meetings related to cyber security, controls and compliance, processes and documentation related tasks Research the latest information technology (IT) security trends Help plan and carry out an organization’s way of handling security Develop security standards and best practices for the organization Recommend security enhancements to management or senior IT staff Document security breaches and assess the damage they cause. Performs other duties as assigned Qualifications: B. Tech, B.E or M.C.A 2-5 years’ Experience working in a Security Operations Center 2 years minimum in the computer industry Knowledge working with complex Windows environments Knowledgeable in various security frameworks such as NIST 800-53 / NIST 800-171 / ISO27001 Knowledge in design and administration of security tools Good written and verbal communication skills

Posted 1 week ago

Apply

7.0 years

2 - 5 Lacs

Gurgaon

On-site

GlassDoor logo

Gurgaon 1 7 to 11 years Full Time About the Role We are hiring an experienced IT Security Manager to lead our enterprise-wide security initiatives in the Banking & Financial Services domain. You will be responsible for defining and enforcing security standards across applications, infrastructure, data, and user environments, ensuring compliance with RBI and other regulatory requirements. This is a strategic and hands-on role suited for a security leader who understands the unique challenges of financial systems and enterprise-grade IT infrastructure. Key Responsibilities Define and implement enterprise-level security policies, frameworks, and controls aligned with RBI guidelines, ISO 27001, and other BFSI regulations. Lead end-to-end security operations: vulnerability management, threat detection, incident response, and security monitoring. Work closely with Compliance, DevOps, Cloud, and Infrastructure teams to embed security into all layers of IT. Oversee data protection and privacy efforts, including encryption, data classification, DLP, and secure data sharing. Conduct regular internal/external audits, third-party risk assessments, and compliance checks. Establish and manage Identity & Access Manage enterprise security tools such as SIEM, endpoint protection, firewalls, IDS/IPS, and antivirus. Lead employee security awareness and training programs across the organization. Coordinate with regulators, auditors, and client teams for security reviews and certifications. Stay updated with BFSI-specific cyber threats and regulatory changes. Required Skills & Qualifications Bachelor’s or Master’s degree in Computer Science, Information Security, or related field. 7+ years of experience in IT Security, with 3+ years in a BFSI or regulated enterprise environment. Strong knowledge of RBI cybersecurity guidelines, ISO 27001, NIST, SOC 2, and data privacy laws (DPDP/GDPR). Experience in securing enterprise applications (core banking, lending, payments, etc.) and cloud infrastructure (AWS, Azure). Hands-on experience with tools like SIEM, WAF, EDR, DLP, IAM, vulnerability scanners, and endpoint security platforms. Deep understanding of network security, application security (including mobile/web), and secure SDLC practices. Security certifications preferred: CISSP, CISM, CEH, CRISC, ISO 27001 Lead Implementer/Auditor.

Posted 1 week ago

Apply

5.0 - 8.0 years

0 Lacs

Delhi

On-site

GlassDoor logo

Job requisition ID :: 83720 Date: Jun 6, 2025 Location: Delhi Designation: Deputy Manager Entity: Your potential, unleashed. India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realise your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks Your work profile As Deputy Manager in our Cyber Team you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: - We are seeking a skilled and proactive SIEM Content Management Specialist to join our security operations team. The ideal candidate will be responsible for designing, implementing, and managing custom SIEM content that supports the organization's security monitoring and threat detection capabilities. You will play a key role in ensuring that our SIEM system is optimized to detect, analyze, and respond to potential security threats effectively and efficiently. Desired qualifications Certifications such as CISSP, GSEC, CISM, or certifications specific to SOAR platforms (e.g., Palo Alto Cortex XSOAR Certification) Experience required – 5-8 Years Location and way of working Base location: Mumbai Professional is required to work from Client office Your role as a Assistant Manager We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society. In addition to living our purpose, Senior Executive across our organization must strive to be: Deep understanding of security concepts, including incident response, threat intelligence, network security, and vulnerability management. Utilize SOAR platforms to automate security processes and response activities. Develop, maintain, and enhance automated playbooks in SOAR platforms to streamline and improve incident response workflows. Collaborate with security analysts and incident responders to design playbooks that automate and orchestrate the detection, triage, investigation, and remediation of security incidents. Integrate playbooks with a variety of security tools such as SIEMs, firewalls, threat intelligence platforms, endpoint protection tools, and ticketing systems to improve the efficiency of the security operations center Test playbooks to ensure they are working as expected, troubleshoot issues, and optimize them for performance and scalability. Document playbook logic, workflows, and integrations to ensure that they are understandable and maintainable by other team members. Work closely with security engineers, analysts, and IT teams to align playbook development with security operations needs and organizational goals. Provide technical expertise in the configuration and optimization of SOAR tools. Assist in the evaluation and selection of SOAR technologies based on organizational needs. Document and maintain standard operating procedures for SOAR processes and playbooks. Experience with Cortex XSOAR (preferred) or other security orchestration platforms. Ability to troubleshoot issues, perform root cause analysis, and continuously optimize automation processes. Technical Skills: Strong understanding of security technologies (e.g., SIEM, EDR, firewalls, vulnerability management). Knowledge of scripting and automation (Python, JavaScript, PowerShell, etc.) for building playbooks and integrations. How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome… entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals. *Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices. At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution. In this regard, you may refer to a more detailed advisory given on our website at: https://www2.deloitte.com/in/en/careers/advisory-for-career-aspirants.html?icid=wn_

Posted 1 week ago

Apply

5.0 years

0 Lacs

Thiruvananthapuram

On-site

GlassDoor logo

5 - 7 Years 1 Opening Trivandrum Role description We are seeking a Senior SecDevOps Analyst to lead the integration of security into our DevOps practices and infrastructure. This role is suited for an experienced security professional who can navigate complex, hybrid environments and proactively secure large-scale, customer-facing platforms. You will be instrumental in designing secure systems, embedding security into CI/CD pipelines, and supporting risk and compliance initiatives while collaborating closely with DevOps, product, and IT teams. Key Responsibilities: Security Architecture & Engineering Design and implement secure infrastructure solutions across cloud and on-premise environments. Define, enforce, and promote security standards for Infrastructure as Code (IaC), containers, and microservices. Collaborate with architects and engineering teams to ensure secure application design and deployment. DevSecOps Enablement Integrate security tools (SAST, DAST, SCA) into CI/CD pipelines. Automate security scanning and compliance checks using tools such as Snyk , Checkov , or Prisma Cloud . Drive adoption of DevSecOps practices through training, documentation, and hands-on guidance. Cloud & Container Security Secure cloud-native environments (AWS, Azure, GCP) focusing on identity, access, and data protection. Implement and monitor security for Kubernetes clusters, Docker containers, and serverless applications. Monitoring, Detection & Response Develop and maintain security monitoring and incident response procedures. Collaborate with SOC and IT teams to investigate, remediate, and document security incidents. Conduct root cause analysis and post-incident reviews to enhance system resilience. Compliance & Governance Support regulatory compliance (PCI-DSS, GDPR, ISO 27001) and internal audit initiatives. Maintain up-to-date documentation for security controls, risk assessments, and policies. Participate in vendor risk assessments and third-party security evaluations. Collaboration & Leadership Act as a security advisor to DevOps, product, and infrastructure teams. Mentor junior analysts and promote security best practices. Stay informed on evolving threats, technologies, and security frameworks. Required Qualifications: 8+ years of experience in security engineering, DevOps, or SecDevOps. In-depth knowledge of cloud security (AWS preferred), system hardening, and network security. Hands-on experience with Python, Bash, PowerShell for scripting and automation. Proficient in CI/CD tools ( GitHub Actions , GitLab CI , Jenkins ) and IaC platforms ( Terraform , CloudFormation ). Strong expertise in container security ( Docker , Kubernetes ) and orchestration tools. Familiarity with enterprise security tools (SIEM, EDR, vulnerability management). Sound knowledge of frameworks like NIST , CIS , ISO 27001 , and compliance standards ( PCI-DSS , GDPR ). Preferred Qualifications: Industry-recognized certifications (e.g., CISSP , CKS , AWS Security Specialty , OSCP ). Experience in large-scale retail or e-commerce environments. Understanding of secure payment systems, fraud prevention, and data privacy. Familiarity with Zero Trust Architecture and identity-centric security models. Skills Information Security,Security Monitoring,Infrastructure Security About UST UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to operation. With deep domain expertise and a future-proof philosophy, UST embeds innovation and agility into their clients’ organizations. With over 30,000 employees in 30 countries, UST builds for boundless impact—touching billions of lives in the process.

Posted 1 week ago

Apply

3.0 - 5.0 years

0 Lacs

Thiruvananthapuram

On-site

GlassDoor logo

3 - 5 Years 2 Openings Trivandrum Role description As an Identity and Security Engineer , you will play a pivotal role in safeguarding digital identities across a complex, hybrid enterprise environment. You will be responsible for designing, implementing, and managing scalable IAM solutions that ensure secure and seamless access for users, applications, and services. This hands-on engineering role requires deep expertise in identity protocols, cloud IAM, and security automation. You will collaborate with cross-functional teams including DevOps, infrastructure, application development, and compliance to embed identity as a key component of the security architecture. Key Responsibilities Identity Architecture & Engineering Design and implement scalable IAM solutions, including SSO, MFA, and RBAC. Manage identity lifecycle processes: onboarding, offboarding, access reviews, and recertifications. Integrate IAM systems with enterprise applications, cloud platforms (Azure AD, AWS IAM), and third-party tools. Security Operations & Automation Develop automation scripts for identity provisioning and access governance. Deploy and manage Privileged Access Management (PAM) solutions to secure administrative access. Support Zero Trust Architecture by enforcing least privilege access across all environments. Monitoring, Detection & Incident Response Monitor identity-related events using SIEM and analytics tools. Investigate and respond to access violations and identity-based security incidents. Conduct root cause analysis and implement preventive controls. Compliance & Governance Ensure compliance with standards such as GDPR, PCI-DSS, ISO 27001. Maintain audit trails, access logs, and documentation to support internal/external audits. Contribute to policy development, risk assessments, and awareness programs. Collaboration & Continuous Improvement Work with DevOps and IT teams to embed IAM into CI/CD pipelines and cloud-native environments. Mentor junior engineers and promote IAM best practices across teams. Stay updated on identity trends, technologies, and evolving threat landscapes. Required Qualifications Minimum 5 years of experience in IAM or security engineering roles. Strong understanding of IAM protocols (SAML, OAuth2, OpenID Connect, LDAP, SCIM). Hands-on experience with Azure AD, Active Directory, AWS IAM/GCP IAM. Experience with PAM tools such as CyberArk, BeyondTrust, or HashiCorp Vault. Proficient in scripting languages (PowerShell, Python, or equivalent). Strong grasp of Zero Trust principles and identity governance frameworks. Preferred Qualifications Relevant certifications (Microsoft Identity and Access Administrator, CISSP, Azure Security Engineer, etc.). Experience in enterprise or retail environments at scale. Familiarity with Just-In-Time (JIT) access, identity analytics, and behavioral monitoring. Exposure to DevSecOps and CI/CD pipeline security integration. Skills Identity Access Management,Information Security,Security Monitoring About UST UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to operation. With deep domain expertise and a future-proof philosophy, UST embeds innovation and agility into their clients’ organizations. With over 30,000 employees in 30 countries, UST builds for boundless impact—touching billions of lives in the process.

Posted 1 week ago

Apply

7.0 years

5 - 8 Lacs

Bengaluru

On-site

GlassDoor logo

About Us At SentinelOne, we're redefining cybersecurity by pushing the limits of what's possible—leveraging AI-powered, data-driven innovation to stay ahead of tomorrow's threats. From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do. We're looking for passionate individuals who thrive in collaborative environments and are eager to drive impact. If you're excited about solving complex challenges in bold, innovative ways, we'd love to connect with you. What are we looking for? If you're passionate about enabling customer success through leading and facilitating successful deployments of our highest value accounts, this role is for you. SentinelOne is growing its Customer Success team and looking for a technically skilled project manager. Responsibilities include managing project milestones and timelines in coordination with the customer as well as with internal cross-functional resources in Technical Account Management, Product Management, and Professional Services. The role requires facilitating a partnership between our customers and internal teams to define and implement project KPIs and parameters that will realize optimal 'time to value' and enable long-term success and growth. What will you do? The key responsibility of this role will be to facilitate a partnership between customers and internal teams, creating an engaging and productive deployment experience for customers throughout their solution adoption phase. Additional responsibilities will include regular cadence reporting on key metrics as defined by CS leaders (ex, indicators of feature adoption or deployment progress), pre-sales support on services, and collaboration with service delivery teams to tailor service offerings to client requirements. Onboard key customers through full deployment, with a focus on structured project management combined with white-glove relationship management. Work cross-functionally within SentinelOne with Support, Product Management, Engineering & other teams to provide customers with insight while advocating for their needs Communicate expectations, project timelines, requirements, and potential blockers to key stakeholders, both internal and external Lead the deployment project teams in removing obstacles and addressing technical challenges when necessary, including ensuring issues are escalated and actively managed Expand the client engagement by collaborating with key decision-makers and stakeholders to understand their requirements and continually position our services as the optimal solution for net new, upsell, and renewal opportunities. Strategic Pre-Sales Support on Services: Collaborate with the Sales, Solution Engineering, & Customer Success Management and service leaders to help with the positioning of our Services offerings and meet sales targets while ensuring 'right-fit'. Achieving trusted advisor status by understanding all aspects of the Services portfolio, including MDR, DFIR, Threat Hunting, Strategic Advisory, and Deployment Services. Demonstrate the value of service positions by executing compelling presentations and demonstrations of our services to prospective clients. Articulate the value proposition of our Services and how they address specific client needs and challenges. Collaborate with the service delivery teams and customers to ensure alignment between sales, solution engineering, and service execution, and when relevant, provide initial scoping along with the Services team. What skills and knowledge should you bring? At least 7 years of prior experience at an enterprise software company (preference to those with Endpoint Protection experience) in related roles (Customer Success, Support, Training, etc.) Experience with managing highly complex implementations and technical engagements for a diverse set of customers, including identifying customer requirements Customer-focused with experience in customer-facing roles (Customer Success, Support, Professional Services, Customer Onboarding, etc.) Experience with Salesforce and with project management tools like Asana/Atlassian. Requirement for an existing understanding of customer IT/security architecture and continued learning related to the technical landscape and deployment specifics of SentinelOne product and service offerings Knowledge of security technologies, architecture, and operations and experience in advising customers on best practices Knowledge of Windows, MacOS and Linux operating systems as well as containerized environments Display a talent for building strong relationships and managing customer expectations resulting in high customer satisfaction Cross-functional excellence with a track record of getting teams to work together on accomplishing complex operational goals Ability to lead, support, and drive on-going projects and meet deadlines in a complex and dynamic environment Impeccable written and verbal communication skills Thrives in a multitasking environment and can adjust priorities on-the-fly Strategic and creative thinker with well-developed problem-solving and analytical skills Experience with a structured project management methodology which may include; Agile Methodologies (Including Scrum or Kanban), Lean, Traditional Waterfall, Six Sigma, PMBOK, or a hybrid of these or other methodologies Experience in the IT or Cybersecurity industry, especially Endpoint Security and SIEM, with host base (endpoint agent) security solutions is preferred Why us? You will be joining a cutting-edge company, where you will tackle extraordinary challenges and work with the very best in the industry. Industry leading gender-neutral parental leave Paid Company Holidays Paid Sick Time Employee stock purchase program Disability and life insurance Employee assistance program Gym membership reimbursement Cell phone reimbursement Numerous company-sponsored events including regular happy hours and team building events SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. SentinelOne participates in the E-Verify Program for all U.S. based roles.

Posted 1 week ago

Apply

0 years

4 - 7 Lacs

Bengaluru

Remote

GlassDoor logo

Job Summary Join our dynamic team as a Cyber Security Analyst where you will play a crucial role in safeguarding our digital assets. With a focus on SOC you will monitor and respond to security incidents ensuring the integrity and confidentiality of our systems. This hybrid role offers the opportunity to work both remotely and on-site with occasional travel required. Responsibilities Monitor security alerts and incidents using SOC tools to ensure timely detection and response to threats. Analyze security incidents to determine root causes and implement corrective actions to prevent future occurrences. Collaborate with IT teams to develop and implement security measures that protect the organizations data and systems. Conduct regular security assessments and audits to identify vulnerabilities and recommend improvements. Provide expert guidance on security best practices to enhance the organizations overall security posture. Develop and maintain incident response plans to ensure quick and effective handling of security breaches. Utilize Microsoft Sentinel to enhance threat detection and response capabilities. Prepare detailed reports on security incidents and trends to inform management and stakeholders. Stay updated on the latest cybersecurity threats and trends to proactively address potential risks. Participate in the development and implementation of security policies and procedures. Conduct training sessions to raise awareness of cybersecurity threats and best practices among employees. Coordinate with external partners and vendors to ensure comprehensive security coverage. Support compliance efforts related to SOC1 Type1&2 SAAE18 and SSAE16 standards. Qualifications Possess a strong understanding of SOC and SIEM technologies with hands-on experience in C-SOC Demonstrate expertise in cybersecurity principles and practices with a focus on threat detection and response. Have experience with Microsoft Sentinel for enhanced security monitoring and incident management. Exhibit knowledge of compliance standards such as SOC1 Type1&2 SAAE18 and SSAE16. Show proficiency in conducting security assessments and audits to identify and mitigate risks. Display excellent analytical and problem-solving skills to address complex security challenges. Communicate effectively with technical and non-technical stakeholders to convey security concepts. Certifications Required Certified Information Systems Security Professional (CISSP) Certified SOC Analyst (CSA)

Posted 1 week ago

Apply

4.0 - 6.0 years

4 - 9 Lacs

Bengaluru

On-site

GlassDoor logo

Join Vonage and help us innovate cloud communications for businesses worldwide! Why this role matters: As a member of the IAM Engineering team at Vonage, you will be responsible for the design, implementation, and management of enterprise IAM solutions. This role is critical to ensuring access to systems, applications, and data while maintaining regulatory compliance. This position involves working closely with cross functional teams to develop and enforce a proactive approach to system provisioning, maintenance, security, and compliance, ensuring alignment with company objectives and regulatory standards. A key aspect of this role is developing policies and procedures that ensure system integrity, security, and availability, with a strong focus on Identity Governance, Privileged Access Management (PAM), Identity Verification and Access Controls. Key Responsibilities: Cross-Functional Collaboration : Ability to communicate, problem-solve, and multitask effectively in a team environment across multiple departments. IAM Architecture & Implementation : Design, deploy, and integrate IAM solutions for both on-premises and cloud systems. Authentication & Authorization Frameworks : Implement and manage SSO, MFA, OAuth, OIDC, SAML, SCIM, and adaptive access controls. Access Control Models : Develop and enforce RBAC, PBAC, ABAC, geo-location-based controls, and access certification workflows. Integration & Automation : Integrate IAM with enterprise systems and use APIs, SCIM, and automation frameworks for synchronization and event-triggering. Security & Compliance : Define access policies, configure privilege access management, enforce least privilege, and ensure regulatory compliance (e.g., SOC2, CFIUS). Monitoring & Incident Response : Implement audit logging and monitoring to detect IAM-related threats; support a 24/7 on-call rotation. What you'll bring: Bachelor's degree in Computer Science, IT, or related field; 4–6 years in IAM engineering or security administration. Strong knowledge of IAM domains including IGA, PAM , identity lifecycle, and access control models. Proficient in SSO, SAML, OAuth/OIDC, MFA, Adaptive Authentication, and fine-grained authorization. Experience designing and deploying IAM/IGA solutions in enterprise environments, including tools like Okta , Saviynt, BeyondTrust, PlainID, and EntraID. Skilled in scripting, APIs, and JSON for customization and automation of IAM processes. Familiar with using SIEM tools to track IAM events and enforce security controls. Strong communicator of security concepts; relevant certifications (e.g., Okta, Microsoft, Saviynt) are a plus. How you'll benefit: At Vonage, we offer exciting work, career growth opportunities, and a collaborative hybrid work environment. In addition to competitive pay and benefits, we provide unlimited discretionary time off and tuition reimbursement. Additional benefits and perks will be shared and discussed with you by the recruiter during the interview process.#LI-RE1 There's no perfect candidate. You don't need all the preferred qualifications to make a valuable impact on our team. Our employees and customers come from diverse backgrounds, so if you're passionate about what you could achieve at Vonage, we'd love to hear from you. Who we are: Vonage is a global cloud communications leader. And your talent will further help brands - such as Airbnb, Viber, WhatsApp, and Snapchat - accelerate their digital transformation through our fully programmable-based unified communications, contact center solutions, and communications APIs. Ready to innovate? Then join us today. Note: The purpose of this profile is to provide a general summary of essential responsibilities for the position and is not meant as an exhaustive list. Assignments may differ for individuals within the same role based on business conditions, departmental need or geographic location.

Posted 1 week ago

Apply

0 years

0 Lacs

Chennai

On-site

GlassDoor logo

Job Summary: We are looking for a Cybersecurity Specialist responsible for protecting our systems and data from cyber threats. The ideal candidate will be well-versed in network security, risk assessment, and incident response. Responsibilities: Monitor and defend against cyber threats and vulnerabilities. Implement security measures such as firewalls, encryption, and endpoint protection. Conduct regular security audits and risk assessments. Respond to and manage security breaches or incidents. Stay updated on evolving cyber threats and mitigation strategies. Train internal staff on cybersecurity best practices. Work with IT teams to ensure compliance with security standards. Required Qualifications: Bachelor’s degree in Computer Science, Information Security, or related field. Strong knowledge of firewalls, antivirus, IDS/IPS, and SIEM tools. Familiarity with ISO 27001, NIST, or other security frameworks. Hands-on experience in penetration testing and ethical hacking is a plus. Excellent analytical and troubleshooting skills. Willingness to travel for security audits and on-site assessments. Compensation Structure: Base Salary: ₹15,000/month – ₹25,000/month Incentives: Based on response efficiency, risk mitigation, and audit results. Schedule: Day shift Supplemental Pay: Performance bonus Job Types: Full-time, Fresher, Internship Pay: ₹11,649.25 - ₹64,786.24 per month Schedule: Day shift Work Location: In person

Posted 1 week ago

Apply

3.0 years

0 - 0 Lacs

Noida

On-site

GlassDoor logo

Job Summary: The ideal candidate will be responsible for designing, implementing, and managing network security measures to protect our organization's digital assets from cyber threats. This role requires in-depth knowledge of networking protocols, firewalls, intrusion detection systems (IDS/IPS), VPNs, and security best practices. Key Responsibilities: Design, configure, and maintain secure network infrastructure, including firewalls, routers, switches, and VPNs. Troubleshooting network issues or outages in compliance with ICSP. Identification and implementation of Network/ Application-level security methods. Perform vulnerability assessments and recommend security enhancements. Ensure compliance with security standards and regulatory requirements (e.g., ISO 27001, NIST, GDPR). Manage firewall policies and rulesets, and ensure they are up to date and effective. Implementing and Monitoring patches, permissions, and service deployments. Conduct regular security audits, penetration tests, and risk assessments. Security management for servers like Blade server, RACK Server and HCI. Documenting policies and procedures. Requirements: Graduate BE/ B,Tech in IT / computer Science and Postgraduate- MCA/MTECH with specialization in computers/ electronics/ IT or M.Sc.in CS/ IT 3–6 years of hands-on experience in network security engineering or a similar role. Strong understanding of TCP/IP, DNS, DHCP, VPNs, and routing protocols. Proficiency with firewalls (e.g., Palo Alto, Fortinet, Cisco ASA), IDS/IPS, and SIEM tools. Familiarity with cloud security (AWS, Azure, GCP) is a plus. Knowledge of scripting (Python, Bash, PowerShell) for automation is preferred. Security certifications such as CCNP Security, CEH, CISM, CISSP, or CompTIA Security+ are a plus. Excellent analytical, problem-solving, and communication skills. Work opportunity with Headquarters Integrated Defence Staff Job Types: Part-time, Contractual / Temporary Contract length: 12 months Pay: ₹60,000.00 - ₹65,000.00 per month Expected hours: 54 per week Schedule: Day shift Work Location: In person

Posted 1 week ago

Apply

3.0 - 6.0 years

0 - 0 Lacs

Noida

On-site

GlassDoor logo

Job Summary: The successful candidate will be responsible for safeguarding our company’s information systems by monitoring, assessing, and mitigating security risks. This role is critical in ensuring the confidentiality, integrity, and availability of digital assets. Key Responsibilities: Manage and facilitate information security related projects. Moderate compliance with organization’s information security policies and procedures. Identify and recommend solutions for various risks and security issues. Provide expertise on IT-security polices and guidelines. Assist in the development and enforcement of security policies, procedures, and standards. Practice approaches and solutions for compliance. Validate and track security breach. Conduct IT-security standards/compliance assessments and periodic audits. Work with clients to determine their need for expert support in IT security, including applicability of standards, laws and regulations to existing and future solutions. Identify, triage and document the instances of vulnerability areas and devices. Continues learning and knowledge sharing within ITSG team to maximize security awareness and minimize cyber incidents. Requirements: Graduate BE/ B,Tech in IT/ computer Science and Postgraduate- MCA/MTECH with specialization in computers/ electronics/ IT or M.Sc.in CS/ IT. Certified ethical hacker (CEH) 3-6 years of experience in a cybersecurity or information security role. Solid understanding of security frameworks and risk management principles. Experience with security tools like SIEM, IDS/IPS, vulnerability scanners, and DLP systems. Familiarity with regulatory standards such as ISO, NIST, HIPAA, or PCI-DSS. Strong analytical, problem-solving, and communication skills. Work opportunity with Headquarters Integrated Defence Staff Job Types: Part-time, Contractual / Temporary Contract length: 12 months Pay: ₹40,000.00 - ₹45,000.00 per month Expected hours: 54 per week Schedule: Day shift Work Location: In person

Posted 1 week ago

Apply

140.0 years

0 Lacs

India

On-site

GlassDoor logo

Mitsui O.S.K. Lines (MOL) is one of the world's largest multimodal deep-sea carriers, with a rich maritime legacy spanning over 140 years . Operating across Asia, the Middle East, Europe, Africa, North America, South America, and Oceania , MOL connects global trade routes with a strong presence in international shipping and logistics. MOL Information Technology (MOL-IT) is the dedicated ICT solutions provider for the MOL Group, delivering customized technology solutions across the shipping, logistics, and supply chain domains . Established in 1997 , MOL-IT has expanded significantly, operating from four offices in Kolkata, Hyderabad, Mumbai, and Hong Kong , with a talented team of over 380 software and management professionals . As part of its growth strategy, MOL-IT is enhancing its suite of ICT solutions for existing customers while exploring opportunities to diversify beyond the MOL Group. For further details about organization, please visit www.mol-it.com/ Video - An Introduction to MOL-IT - YouTube Challenge Innovate through insight Honesty Do the right thing Accountability Commit to acting with a sense of ownership Reliability Gain the trust of customers Teamwork Build a strong team Safety Pursue the world’s highest level of safety culture Position Overview : As a Software Analyst, you will contribute to requirement analysis sessions to understand business needs and create comprehensive requirement documents (BRD, etc.). Collaborate with stakeholders to translate business objectives into technical solutions. Contribute to designing software solutions that meet project goals and industry standards, considering scalability and usability SOC Security Analyst (L2) will be responsible for responsible for day-to-day security threat monitoring and analysis. You will manage security incidents and review security alerts. You will work on known or suspected security threats. You will also work on threat intelligence, forensics and incident response adhering to security practices and frameworks. You will be part of 24x7 Security Operations Centre (SOC) team. You will be required to work in shifts. Job Responsibilities Experience of monitoring threats in a 24x7 Security Operation Center (SOC) Responsible for investigating incidents, analyzing attack methods, researching new defense techniques and tools, developing security policy, and documenting procedures for SOC. Correct root cause analysis as well identify suitable corrective steps. Perform deep packet analysis, collection of IOC (Indicator of Compromise). Collection of evidence, malware reverse engineering and write custom scripts whenever required. Threat mitigation and reporting are top priority for this position. Rule base Management, SOC Fine tuning and administer SIEM tools Manage and coordinate with team to accomplish daily operational tasks as per defined standard and Maintaining the SLA’s. Identify vulnerabilities, recommend corrective measures and ensure the adequacy of existing information security controls. Advanced working skills with Microsoft Sentinel, Cortex XDR, Trend Micro Exchange Security, Microsoft Defender for Endpoint, Fortigate etc. Relevant certification is a plus. Good working knowledge with SOAR and EDR tools. Investigate and respond to security incidents. Document and report on information security issues Evaluate and implement SIEM use cases. Document and continuously improve playbooks. Monitor for threats, analyze, and escalate as per process. Analyze functional and technical cases and provide a resolution in accordance with agreed metrics. Knowledge about different type of attacks like XSS, CSRF, LFI, Bruteforce, MITM etc. Basic knowledge of Linux operating system and windows events logs Manage and support the log collection, security scanning, intrusion detection, proxy, mail gateway and other security technologies. Review, triage security alerts, provide analysis, suggest remediation, track remediation. Support in resolving security incidents. Monitor networks and systems for potential threats. Knowledge of network data flows, ports, protocols, and other network and application services/technologies. Respond to incidents by collecting, analyzing and preserving digital evidence to assist with remediation of critical information security incidents. Improve and challenge existing processes and procedures in a very agile and fast-moving information security environment. Ability to write technical documentation and present technical briefings to diverse audiences. Strong understanding of threat landscape in terms of the tools, tactics, and techniques of threats employing both commodity and custom malware. Current knowledge of security threat intelligence and recent attack vectors Strong forensics analysis skills Minimum Qualification & Background: 3-5 years of Information Security experience. Minimum 3 years in a large 24x7 Security Operations Centre (SOC) Relevant security certification CEH, CompTIA Network Security Plus, CHFI, Certified SOC analyst will be a plus. Basic knowledge about SIEM Knowledge of current security threats, techniques, and landscape. Security events, incident review and triage experience with Endpoint Detection and Response (EDR) tools Experience and knowledge related to the configuration and maintenance of security monitoring and reporting platforms. Ability to conduct detailed analysis of various security related events like Phishing, Spoofing, Ransomware and SQL Injections etc. Incident Response experience (identifying, investigating, and responding to complex attacks) Experience with threat hunting.

Posted 1 week ago

Apply

5.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Key Accountabilities JOB DESCRIPTION Perform and provide oversight for day-to-day security SOC operations duties, including the management of security analysts, the development and implementation of security policies and procedures, and the response to security alerts. Develop and maintain KPI reports on SOC team performance and other aggregated performance metrics. Develop reports on Security operations for executive management and regional teams. Manage a team of SOC analysts including rostering / shifts planning, tasks allocation and coordination. Continuously monitor security events and alerts generated by various security monitoring tools, such as SIEM (Security Information and Event Management) systems, IDS/IPS (Intrusion Detection/Prevention Systems), and endpoint protection platforms. Identify and analyze security incidents based on the available information. Classify and prioritize incidents according to their severity and potential impact. Initiate and coordinate the incident response process, following predefined procedures and workflows. Work with different IT teams to troubleshoot and resolve security-related issues and assist in configuring the logs to be forwarded from their respective systems to the centralized logging system. Analyze vulnerability scan results and work with system owners and IT teams to remediate identified vulnerabilities within specified timeframes. Provide recommendation for Security Use-case creation and optimization for any new/existing systems. Conduct Network and Endpoint log analyses including threat hunting activities and present findings. Studying vulnerabilities, identifying relevant threats, corrective actions recommendations and reporting results. Document all incidents, investigations, and analysis activities accurately and thoroughly. Prepare incident reports, including detailed information on the incident timeline, impact, and recommended remediation actions. Other Act as an ambassador for DP World at all times when working; promoting and demonstrating positive behaviours in harmony with DP World’s Principles, values and culture; ensuring the highest level of safety is applied in all activities; understanding and following DP World’s Code of Conduct and Ethics policies. Perform other related duties as assigned. Qualifications, Experience And Skills Knowledge and Experience Bachelor’s Degree in Computer Science or equivalent. Should have 5-7 years of experience in IT Security with at least 4 years’ experience in conducting analysis of log data and security operations center. Technical and hands-on experience across Cyber Security and technology domains. Background in security technologies, network protocols and operations and understanding of TCP/IP protocol and OSI Seven Layer Model. Computer programming and scripting languages. Strong understanding of the Cyber Kill Chain, pervasive threats attack methods and remediation. Industry recognized professional certifications such as GSEC, Security+, CEH, CySA. Good understanding in E-commerce, logistics, supply chain & port operations applications will be added advantage. Soft Skills Sound analytical and intellectual capabilities. Excellent time management and organizational skills. Decision-making abilities. Team player and conflict management skills. Ability to multi-task, prioritize, coordinate, and work well under pressure to meet deadlines. Strong interpersonal and communication skills ability to work in a team environment. Cultural awareness. Must possess Excellent Reporting Skills. Technical Skills Knowledge of Security Orchestration and Automation (SOAR) solutions. Experience with two or more analysis tools used in a CIRT or similar investigative environment. Ability to analyse and triage IoCs. Show more Show less

Posted 1 week ago

Apply

Exploring SIEM Jobs in India

The Security Information and Event Management (SIEM) job market in India is thriving, with a growing demand for professionals who can monitor, analyze, and respond to security incidents in real-time. SIEM jobs offer lucrative career opportunities for individuals with a strong understanding of cybersecurity concepts and technologies.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Delhi/NCR
  5. Mumbai

Average Salary Range

The average salary range for SIEM professionals in India varies based on experience level: - Entry-level: INR 4-6 lakhs per annum - Mid-level: INR 8-12 lakhs per annum - Experienced: INR 15-20 lakhs per annum

Career Path

Career progression in the SIEM field typically follows a path from: - SIEM Analyst - SIEM Engineer - SIEM Consultant - SIEM Architect

Related Skills

In addition to SIEM expertise, professionals in this field are often expected to have knowledge of: - Network Security - Incident Response - Threat Intelligence - Security Operations Center (SOC) operations

Interview Questions

  • What is SIEM and how does it work? (basic)
  • Can you explain the difference between IDS and SIEM? (medium)
  • How would you handle a security incident detected by the SIEM tool? (medium)
  • What are some common challenges faced when implementing a SIEM solution? (advanced)
  • How do you stay updated with the latest cybersecurity threats and trends? (basic)
  • Can you describe a successful SIEM deployment project you were involved in? (medium)
  • What are some key performance indicators (KPIs) used to measure the effectiveness of a SIEM system? (advanced)
  • How do you ensure compliance with industry regulations using a SIEM tool? (medium)
  • Explain the concept of correlation rules in SIEM. (medium)
  • How do you handle false positives in a SIEM system? (advanced)
  • Describe a time when you had to troubleshoot a SIEM-related issue. (medium)
  • What are the benefits of integrating threat intelligence feeds with a SIEM tool? (medium)
  • Can you explain the concept of log aggregation in the context of SIEM? (basic)
  • How do you prioritize security alerts generated by a SIEM tool? (medium)
  • What are the key components of a SIEM architecture? (advanced)
  • How would you assess the effectiveness of a SIEM tool in an organization? (medium)
  • What are some best practices for SIEM tuning and optimization? (advanced)
  • How do you handle data retention and storage requirements in a SIEM system? (medium)
  • Explain the role of machine learning in enhancing SIEM capabilities. (advanced)
  • How do you ensure the confidentiality and integrity of SIEM data? (medium)
  • Can you discuss the importance of user behavior analytics in a SIEM environment? (medium)
  • What are the limitations of a SIEM tool and how can they be overcome? (advanced)
  • How do you collaborate with other teams (e.g., IT, compliance) to enhance SIEM operations? (medium)
  • Describe a time when you had to communicate a complex security incident detected by the SIEM to non-technical stakeholders. (medium)

Closing Remark

As you explore SIEM jobs in India, remember to continuously upgrade your skills, stay informed about the latest cybersecurity trends, and practice answering interview questions to showcase your expertise confidently. With the right preparation and dedication, you can excel in the dynamic field of SIEM and carve out a successful career for yourself. Good luck!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies