Home
Jobs

2220 Siem Jobs - Page 35

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

7.0 years

3 - 6 Lacs

Thiruvananthapuram

On-site

GlassDoor logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Supervising Security Analyst - Cyber Triage and Forensics Today’s world is fueled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity The Senior Security Analyst in Cyber Defense CTF (Cyber Triage and Forensics) plays a pivotal role in enhancing EY’s security posture by vigilantly monitoring, assessing, and managing incidents effectively. In collaboration with the team and leadership, to ensure strong security oversight and contribute to joint security monitoring and incident response initiatives. Key duties include triage, detailed investigations, clear communication, and comprehensive reporting, all contributing to the integrity and resilience of the EY’s cyber defenses. Essential Functions of the Job : Perform forensic and malware analysis to detect, investigate, and resolve security incidents, including artifact classification and payload extraction Engage in proactive threat hunting and provide expert security assessments, utilizing EDR, SIEM, and other tools to understand and counteract the cybercrime landscape Communicate with IT stakeholders during incident response activities, ensuring effective containment, remediation, and accurate identification of compromise indicators Report on incident metrics, analyse findings, and develop reports to ensure comprehensive resolution and understanding of security events Act as an escalation point for incident response, shift lead, mentor junior team members, and contribute to team skill enhancement Analyse security events, provide feedback on security controls, and drive process improvements to strengthen the organization's security posture Maintain and improve security incident processes, protocols, and standard operating procedures to reflect best practices in security incident response Skills and attributes for success Proficient in digital forensics, including evidence management in line with best practices and using advanced tools for threat detection and incident management including advanced querying with KQL Skilled in analyzing diverse data, identifying malware, and employing reverse engineering to reveal hidden threats Proficient in conducting detailed forensic investigations across various operating systems, with a keen eye for obfuscation and the ability to clearly communicate findings In-depth understanding of Active Directory security, with strong scripting abilities to automate response measures and improve operational effectiveness To qualify for the role, you must have Undergraduate or Postgraduate Degree in Computer Science, Engineering, or a related field (MCA/MTech/BTech/BCA/BSc CS or BSc IT) At least 7 years of overall experience with a minimum of 5 years specialized in incident response, computer forensics, and malware reverse engineering Proficiency in operating within a Security Monitoring/Security Operations Center (SOC) environment, including experience with CSIRT and CERT operations Demonstrated experience in investigating security events, threats, and vulnerabilities Strong understanding of electronic investigation and forensic methodologies, including log correlation, electronic data handling, investigative processes, and malware analysis In-depth knowledge of Windows and Unix/Linux operating systems, and experience with EDR solutions for threat detection and response Ideally, you’ll also Possession of or willingness to obtain professional certifications like GREM, GCFE, GCFA, or GCIH Experience with security incident response in cloud environments, including Azure. Knowledge of legal considerations in electronic discovery and analysis Proficiency in scripting or programming (e.g., Shell scripting, PowerShell, C, C#, Python) Solid understanding of security best practices for network architecture and server configuration What we look for Demonstrates integrity in a professional environment Strong ethical behavior Ability to work independently Possesses a global mindset for working with diverse cultures and backgrounds Knowledgeable in industry-standard security incident response processes, procedures, and lifecycle Positive attitude and Excellent teaming skills Excellent social, communication, and writing skills Good presentation skills Excellent investigative, analytical, and problem-solving skills Supervising Responsibilities: Coordinate escalations and collaborate with internal technology teams to ensure timely resolution of issues Provide mentoring and training to other team members as required, supporting their development and ensuring consistent team performance Other Requirements: Should be willing to work in shifts What we offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 week ago

Apply

1.0 years

0 - 0 Lacs

Cochin

On-site

GlassDoor logo

Key Responsibilities: Deliver engaging and practical cybersecurity training sessions to students, covering key topics such as network security, ethical hacking, threat analysis, risk management, and security best practices. Create and update training materials, presentations, and lab exercises to ensure high-quality, up-to-date content. Provide hands-on guidance to students, including troubleshooting technical issues and clarifying cybersecurity concepts. Assess student performance through assignments, quizzes, and evaluations, and provide constructive feedback. Stay current with the latest trends, tools, and certifications in cybersecurity. Collaborate with the curriculum development team to enhance training programs. Participate in internal meetings and contribute to continuous improvement of the training process. Requirements: Bachelor’s degree in Computer Science, Information Technology, or a related field. 1–2 years of experience in cybersecurity roles or cybersecurity training. Strong understanding of cybersecurity fundamentals, tools, and methodologies. Experience with common cybersecurity tools, such as firewalls, antivirus solutions, vulnerability scanners, and SIEM tools. Excellent communication and presentation skills. Ability to simplify complex technical concepts for beginners. Relevant certifications (such as CEH, CompTIA Security+, or similar) are a plus. Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹40,000.00 per month Benefits: Health insurance Schedule: Day shift Monday to Friday Weekend availability Supplemental Pay: Overtime pay Experience: Cybersecurity: 1 year (Required) Language: English (Preferred) Work Location: In person Expected Start Date: 09/06/2025

Posted 1 week ago

Apply

3.0 - 5.0 years

4 - 6 Lacs

Cochin

On-site

GlassDoor logo

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. DSS Service Provisioning - Supervising Associate Security Analyst The opportunity The Security Technology Services (STS) group is a division of Information Security that ensures secure access to systems and information for more than 390,000 people in over 150 countries. You will be part of STS DLP Engineering Team specifically to support the Enterprise Data Loss Prevention (DLP) solution. The STS team is responsible for the delivery of DLP Services and the maintenance of the global DLP applications. The team is geographically dispersed and comprises of all disciplines required to deliver Data Security Services for our customers. Your key responsibilities The Senior Analyst will be primarily responsible for configuring Data Security Solutions like the enterprise Data Loss Prevention System. The main duties of this role will include helping to translate business requirements to secure data with our technical capabilities, especially overseeing the configuration of the DLP environments in a heterogenous global environment. This role requires strong hands-on experience in leading data security solutions with a strong focus on DLP. It will also participate in Data Access Governance Program development and assist in administering the program. The Senior Analyst will help to supervise and mentor junior analysts on the team. The role will also interface with internal customers, stakeholders and support teams at various levels within the organization including Legal, Data Protection, IT Operations and Engineering. Skills and attributes for success Technical knowledge in Data Protection technology (DLP, SIEM, SOAR, Data Access Governance, Networking) Administration of the DLP tools which includes configuring policies, upgrading, and patching, etc. Proven effective verbal and written communication skills Ability to independently research and solve technical issues Demonstrated integrity in a professional environment Knowledge of core Information Security concepts related to Governance, Risk & Compliance Excellent teaming skills Ability to work in and adapt to a changing environment Flexibility to adjust to multiple demands, shifting priorities, ambiguity and rapid change Ability to efficiently handle customer concerns and difficult situations with ease and professionalism Essential Functions of the Job Work with vendors to support the different security technologies Configuration of the Security tools which includes configuring policies, response rules & notifications Work with Monitor & Response team to analyse alerts generating from various systems to tune their configuration Understand and follow the incident response process through event escalations Work with Senior level stakeholders (Risk Management, Compliance & Data Protection) Understand Business requirements and translate into technical controls Ability to work within and alongside diverse, global and virtual teams To qualify for the role you must have Degree in Computer Science, Information Systems, Engineering or a related field. Knowledge of security controls: data classification; data labeling and data loss 3-5 years of experience in one or more of the following: Data Loss Prevention (DLP) Technology support and Event Handling Information Security concepts related to Governance, Risk & Compliance Supporting Information Security Technology English language skills - excellent written and verbal communication Exceptional judgement, tact and decision-making ability Ideally, you’ll also have Demonstrated integrity in a professional environment Ability to work within diverse, global, virtual teams Ability to appropriately balance firm security needs with business impact and benefit What we look for Good interpersonal, communication and presentation skills Ability to deal with ambiguity and change, and exercise appropriate time management to meet deliverables Prioritization of work items to ensure timelines are achieved Good judgment, tact, and decision-making ability Deep critical thinking skills demonstrating analytical and systematic approach to problem solving Experience working in a global virtual environment Ability to work independently but also within a team environment What we offer As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer: Continuous learning: You will develop the mindset and skills to navigate whatever comes next. Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way. Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs. Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 1 week ago

Apply

5.0 years

7 - 9 Lacs

Gurgaon

On-site

GlassDoor logo

Overview: Keysight is on the forefront of technology innovation, delivering breakthroughs and trusted insights in electronic design, simulation, prototyping, test, manufacturing, and optimization. Our ~15,000 employees create world-class solutions in communications, 5G, automotive, energy, quantum, aerospace, defense, and semiconductor markets for customers in over 100 countries. Learn more about what we do. Our award-winning culture embraces a bold vision of where technology can take us and a passion for tackling challenging problems with industry-first solutions. We believe that when people feel a sense of belonging, they can be more creative, innovative, and thrive at all points in their careers. Responsibilities: Cybersecurity SOC Analyst – Tier1 (SOC-Security Operation Center) The Cybersecurity Analyst will be responsible for the handling, and escalation of, alerts which require technical triage and analysis. This may include web attacks, malware infections, and phishing campaigns, which have been identified by the Information Risk & Security team’s technology stack. Functional Responsibilities Experience Monitoring SIEM solutions and a variety of other security devices found in a SOC environment (e.g. Behavioral Analytics tools, IDS/IPS, log management tools, and security analytics platforms. • Creating and maintaining documentation for security event processing. • Acknowledge and handle the incoming security alerts. Use the internal ticketing system and dashboards to update the tickets/alerts accordingly and escalating them to the appropriate teams if necessary. Assist the Incident Response team on alerts escalated to them by the SOC team. • Develop/Update and follow Standard Operating Procedures (SOPs) and Playbooks to handle standard and out-of-band alerts. Report to the Incident Response Team quickly and efficiently regarding urgent matters. • Ensure ticket queues are always within satisfactory limits and all tickets are updated. • Provide On-Call Support for emergency or high severity issues. Liaise with partner teams and end-users for security related tickets and activities. Qualifications: Bachelor's degree in Conputer Science / Electrical & Electronics / IT Engineering ; MCA Excellent verbal and written communication skills. Excellent analytical and problem-solving skills required. Minimum of 5+ years of experience in a SOC or Cybersecurity. Equivalent Certifications (Network+, Security+, CySA+, GSEC, GMON, etc.) Experience working with SIEMs and evaluating SIEM alerts, EDR , NDR Experience leveraging core security and infrastructure technologies during investigations (e.g. firewall logs, network security tools, malware detonation devices, proxies, IPS/IDS) Key Competencies Ability to think with a security mindset. The successful candidate has a good IT background with good level knowledge of multiple relevant security practice areas (anti-malware solutions, patch and vulnerability management, network security; monitoring; endpoint, etc.) • Knowledge of TCP/IP Protocols, network analysis, and network/security applications. • Good knowledge of various security tools and monitoring devices; e.g. able to read and understand IDS/IPS/Firewall/Proxy logs and determine the current state of play. Experience in correlating malware infections with attack vectors to determine the extent of security and data compromise. Ability to work in a time-sensitive environment; must be detail oriented and able to multitask to meet deadlines and company objectives. Experience in large, geographically diverse enterprise networks. Ability to build lasting relationships with partner teams and stakeholders. Strong written and oral communication skills, including the ability to interact directly with customers that do not have an IT background. Documentation; experience in writing reports and documenting tickets efficiently and accurately. Careers Privacy Statement***Keysight is an Equal Opportunity Employer.***

Posted 1 week ago

Apply

15.0 years

0 Lacs

Gurgaon

On-site

GlassDoor logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : CyberArk Privileged Access Management Good to have skills : NA Minimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary: We are looking for an experienced CyberArk PAM Specialist to design, implement, and support CyberArk Privileged Access Management (PAM) solution. Roles and Responsibilities: 1. Define, design, and implement CyberArk Privilege Cloud (SaaS). 2. Install and configure cloud connectors. 3. Configure MFA, SAML, LDAP, SIEM integration 4. Troubleshoot and resolve CyberArk related technical issues. 5. Work closely with application teams to onboard different types to systems to CyberArk 6. Generate custom CPM,PSM plugins if required 7. Support application onboarding, including access policies, group assignments, and role management. 8. Communicate effectively with business teams, external clients, and solution providers. 9. Document technical designs, solutions, and implementation plans. 10. Work independently and take ownership of technical deliverables. Professional & Technical Skills: 1. Strong experience in CyberArk P-cloud, Conjur Secrets Management, CyberArk PAM (Vault, CPM, PVWA, AAM) 2. Solid understanding of security standards and protocols including SSO, MFA, SAML, OAuth, OIDC, LDAP, RADIUS, and Kerberos. 3. Proficient in CyberArk and related technologies. Experience in system administration, scripting (UNIX, Linux scripting), Rest API, LDAP directories, Active Directory 4. Experience in providing guidance in CyberArk strategy; must have PAM deep-dive experience. 5. Strong understanding of PAM Architecture, deployment methodologies and best practices. 6. Effective at presenting information to different audiences at the correct level of detail (e.g., from engineering teams to executive management). 7. Be a product and domain expert in PAM domain experienced in conducting environment assessments and health checks in line with best practices. 8. Strong troubleshooting and problem-solving skills. 9. Experience in EPM is desirable but not mandatory 10. Excellent verbal and written communication skills. 11. Ability to work independently on technical tasks and client engagements. 12. Candidate must be an independent self-starter able to perform all deployment activities with oversight and as a member of a project team. 13. Candidate must have Defender Certification. Nice to have CyberArk CDE 14. Good to Have Skills : Thycotic (Delinea), Beyond Trust, HashiCorp Vault Additional Information: 1. 4+ years’ experience related to designing, deploying, and configuring PAM solutions, or 2+ years direct PAM consulting experience. 2. Candidate must have completed 16 years of full-time education. 3. This position is open to all Accenture locations." 15 years full time education

Posted 1 week ago

Apply

4.0 years

0 - 1 Lacs

India

On-site

GlassDoor logo

Experience- 4+ Years Job description - we are looking for consultants with below skillsets: - Candidate should have good understanding of cloud integration (Mandatory) - Any SIEM tool experience is preferred (They have Securonix SIEM PS support available so candidate is not expected to work on Securonix side configuration but should understand how the integration works with any SIEM solution) - candidate should have good understanding of cloud integration methods available (Cloud-native connectors, API-based ingestion, agent-based) - Should have an understanding of the cloud models ( IaaS, PaaS, SaaS – security responsibilities in each) - Should have an understanding of the Logging Services : AWS CloudWatch and Azure Monitor - Scripting & Automation knowledge is preferred: Python, PowerShell, Bash – for automation and log parsing, Lambda functions, Azure Logic Apps, Amazon EventBridge Job Types: Full-time, Permanent Pay: ₹90,000.00 - ₹150,000.00 per month Schedule: Day shift Morning shift Work Location: In person

Posted 1 week ago

Apply

8.0 years

4 - 4 Lacs

Bengaluru

On-site

GlassDoor logo

Join our Team About this opportunity: We are now looking for a Senior Security Engineer professional for our Managed Security team. This job role has accountability for researching, designing, engineering, implementing, and supporting security solutions in partnership with the respective stakeholders within Ericsson and / or customer organization and / or 3rd Party Providers. The professional will work alongside a highly skilled, diverse team, making sure that the information assets, that we are responsible to protect, are secured. What you will do: Design, implement, manage, monitor, and troubleshoot cybersecurity defenses, including configuration management, network security, systems security, and monitoring systems / tools. Participate in planning and audit scope development as well as project execution as a critical team member on complex technology related assessments. Play an active role in the design and execution of infrastructure initiatives to ensure an evolving adherence to industry best practices for information security. Lead the execution of the assessment of specific technical areas of a project, supervising other team members and providing coaching where needed. Perform Security Incident Management, including but not limited to: supporting SIEM tools, integrating logs into the tool, creating and modifying rules, investigating and resolving alerts, automating tasks. Research new and emerging threats to gain insight into the evolving threat landscape, and share knowledge with the team. Promote new ideas and new ways of executing projects and internal infrastructure enhancements. Innovate and automate repetitive activities and corrective actions, including broader automation initiatives. Analyzes and recommends security controls and procedures in business processes related to use of information systems and assets, and monitors for compliance Responds to information security incidents, including investigation of countermeasures to and recovery from computer-based attacks, unauthorized access, and policy breaches; interacts and coordinates with third-party incident responders, including law enforcement The skills you bring: Strong knowledge of information security Strong knowledge of SIEM tools (such as McAfee ESM, QRadar, ArcSight, Splunk, etc.), scanning tools (Nessus, Qualys, IBM AppScan, etc.) and PAM tools (BeyondTrust, CyberArk, etc.) Strong knowledge of both Linux-based and MS Windows-based system platforms with a strong technical understanding and aptitude for analytical problem-solving Strong understanding of enterprise, network, system and application level security issues Strong understanding of enterprise computing environments, distributed applications, and a strong understanding of TCP/IP networks along with available security controls (technical & process controls) for respective layers Good understanding of the system hardening processes, tools, guidelines and benchmarks Fundamental understanding of encryption technologies Participate in the out-of-hours on call rotation, providing technical support to the business for incidents Strong knowledge sharing and collaboration skills Deliver results and meet customer expectations Excellent communication skills; English is a must Key Qualifications: Education: BE/ B.Tech (Telecommunication/ Computer Science) Minimum years of relevant experience: 8 to 15 years experience with at least 8 years in IT and 7 years in Security ITIL certification, CCSP, OSCP, Security +, CISSP or similar will be an advantage Basic knowledge of telecommunications networks will be an added advantage Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Bangalore Req ID: 768176

Posted 1 week ago

Apply

15.0 years

0 Lacs

Chennai

On-site

GlassDoor logo

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Accenture MxDR Ops Security Engineering Good to have skills : NA Minimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary: As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. Your typical day will involve collaborating with various teams to implement security measures, conducting assessments to identify vulnerabilities, and ensuring that the organization's information and infrastructure are safeguarded against potential cyber threats. You will also engage in continuous learning to stay updated on the latest security trends and technologies, contributing to a secure environment for all stakeholders. Roles & Responsibilities: • Work as part of Security Engineering handling tunings, customer requests, escalations, reporting, trainings. • Administration of the Accenture proprietary SIEM to gather security logs from customer environment. • Life cycle management of the SIEM • Adhering to SOPs and notify customers on log flow/log format issues • Document best practices and writing KB articles • Identify opportunities for process improvements Professional & Technical Skills: • Experience in SOC Operations • Knowledge on networking, Linux and security concepts • Experience in configuring/managing security controls such as Firewall, DS/IPS, EDR, UTM, Proxy • Knowledge on log collection mechanism such as Syslog, Log file, DB & API and build collector • Knowledge in device onboarding and integration • Passion for cyber security, learning, and knowledge sharing • Strong Verbal & written communication skills • Proven customer service skills, problem solving and interpersonal skills • Ability to handle high pressure situations • Consistently exhibit high levels of teamwork Additional Information: • Work as part of a global technical services team that works 24/7 on rotational shift • The candidate should have minimum 2 years of experience in Accenture MxDR Ops Security Engineering. • This position is based at our Chennai office. • A 15 years full time education is required. 15 years full time education

Posted 1 week ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

Remote

Linkedin logo

About Madison Logic: Our team is reshaping B2B marketing and having fun in the process! When joining Madison Logic, you are committing to giving 100% and always striving for more. As a truly global company, we take pride in a diverse culture free from gender, racial, and other forms of bias. Our Vision: We empower B2B organizations globally to convert their best accounts faster Our Values: URGENCY Lead with Action. Prioritize Follow-up. ACCOUNTABILITY Don't Point Fingers. Take Responsibility. INNOVATION Think Big. Innovate. RESPECT Respect Customers. Respect Each Other. INTEGRITY Act Ethically. Lead by Example. At ML you will work with & learn from an incredible group of people who care about your success as much as they care about their own. Our team is at the heart of what we do and our success starts with you! About the Role: The Compliance Manager will support our information security and compliance programs. This role maintains, monitors, and improves our SOC 2 controls, helping drive security and privacy initiatives, and supports audits and customer compliance inquiries. The ideal candidate has hands-on experience in compliance frameworks, strong organizational skills, and a collaborative mindset to work cross-functionally with IT, Legal, and Sales teams. This is an Individual Contributor (non-management) position. Responsibilities: Coordinate and maintain activities to support SOC 2 compliance across the organization Manage day-to-day compliance operations, including monitoring control effectiveness, collecting evidence, and documenting processes Support responses to customer security questionnaires and due diligence requests Assist with internal audits and external assessments related to SOC 2 and related frameworks (e.g., GDPR, CCPA) Track and help remediate compliance and security risks Collaborate with Sales and Legal to review security-related contract terms and data processing agreements Assist in vendor risk assessments and third-party security reviews Maintain internal documentation for security practices, policies, and compliance initiatives Contribute to security awareness efforts and training initiatives across the organization Basic Qualifications: On-site working at the ML physical office, 5-days per week is required through the end of probation (6 months), transitioning to 2-day WFH post-probation. B.S. Degree in Computer Science or Computer Information Systems desired 5+ years of experience with the implementation and support of an IT Security program Prior experience developing IT Security and Data Governance policies 5+ years auditing experience in any of the following certification standards: GDPR / CCPA, SOC 2, ISO 27001, PCI, COBIT, NIST, CIS, HIPPA. Working knowledge of penetration testing tools, AWS network security and IAM, perimeter security, application firewalls, single sign-on, active directory policy, SIEM, anti-malware, VPN, email security, key management, incident management, risk assessment, log management, change management, backup, and disaster recovery, highly available and distributed infrastructures Working knowledge of data subject privacy rights, PII data handling, data protection and cookie laws, data transmission and encryption requirements, data access controls, data retention and destruction, vendor assessment questionnaires, data privacy impact assessments, data breach, and other cyber incident response Other Characteristics: Strong analytical skills Excellent organizational and time management skills, possessing the ability to prioritize work under pressure of time constraints Superior written and verbal communication skills Excellent presentation skills with prior experience presenting to executives to achieve buy-in Highly productive and resourceful with a “Can do” attitude Strong technical skills Team members are encouraged to work collaboratively with an emphasis on results, not on hierarchy or titles Expected Compensation: (Dependent upon Experience) Fixed CTC: 17 LPA - 20 LPA Work Environment: We offer a mix of in-office and hybrid working. Hybrid remote work arrangements are not available for all positions. Please refer to the job posting detail to determine what in-office requirements apply. Where applicable , hybrid WFH days work must be conducted from your home office located in a jurisdiction in which Madison Logic has the legal right to operate. WFH requires availability and responsiveness on a full-time basis from a distraction free environment with access to high-speed internet. Please inquire for more details. Pay Transparency/Equity: We are committed to paying our team equitably for their work, commensurate with their individual skills and experience . Salary Range and additional compensation, including discretionary bonuses and incentive pay, are determined by a rigorous review process taking into account the experience, education, certifications and skills required for the specific role, equity with similarly situated team members, as well as employer-verified region-specific market data provided by an independent 3rd party partner. We will provide more information about our perks & benefits upon request. Our Commitment to Diversity & Inclusion: Madison Logic is proud to be an equal opportunity employer. We are committed to equal employment opportunity regardless of sex, race, color, religion, national origin, sexual orientation, age, marital status, disability, gender identity or Veteran status. Privacy Disclosure: All of the information collected in this form and/or by your application by submission of your online profile is necessary and relevant to the performance of the job applied for. We will process the information provided by you in this form, your CV (including physical and online resume profiles), by the referees you have noted, and by the educational institutions with whom we may undertake to verify your qualifications with, in accordance with our privacy policy and for recruitment purposes only. For more information on how we process the information you have provided including relevant lawful bases (where relevant) please see our privacy policy which is available on our website ( https://www.madisonlogic.com/privacy/ ). Show more Show less

Posted 1 week ago

Apply

3.0 years

18 Lacs

India

On-site

GlassDoor logo

Job Summary: We are seeking a highly experienced “Senior VAPT & Penetration Testing Specialist” to lead and ensure the quality and effectiveness of our vulnerability assessment and penetration testing operations. This role involves findings, validating findings, reviewing technical reports, ensuring compliance with standards (OWASP, PTES, NIST, etc.), and improving methodologies and tools. Key Responsibilities: Conduct in-depth vulnerability assessments and penetration tests on web, mobile, network, API, and cloud infrastructure using manual and automation. Utilize industry-standard tools like SQLMap, Burp Suite, Nessus, Nmap, and custom scripts for advanced exploitation techniques. Simulate various cyber-attacks including DDoS, Brute Force, XSS, SQL Injection, DNS attacks, and Social Engineering to identify system vulnerabilities. Perform peer reviews of technical deliverables and verify accuracy of findings and recommendations. Ensure that all assessments are aligned with industry standards such as OWASP, PTES, MITRE ATT&CK, and NIST. Act as a technical lead and mentor for junior VAPT team and QA team members. Identify gaps in the current testing methodologies and implement process improvements. Prepare detailed documentation and the VA report and ensure clear, actionable, and risk-rated reporting. Collaborate with clients and internal teams to understand scope and provide post-assessment clarifications. Present the client meeting for the future VAPT assignments. Stay updated with emerging threats, tools, techniques, and frameworks. Required Skills & Qualifications: Bachelor's or Master's degree in Computer Science, Cybersecurity, or related field. 3 to 5 years of hands-on experience in VAPT and penetration testing. In-depth knowledge of web, network, mobile, cloud, and API security. Strong understanding of secure coding practices and vulnerability management. Expertise in tools like Burp Suite, Nmap, Nessus, Metasploit, Qualys, Kali Linux, Wireshark, etc. Familiarity with SIEM, IDS/IPS, EDR tools is a plus. Excellent report writing and documentation skills. Strong communication and overseas client-interaction skills. Preferred Certifications: OSCP (Offensive Security Certified Professional) – Highly preferred CEH (Certified Ethical Hacker) CREST / GPEN / GWAPT / CISSP – Optional but desirable ISO 27001 Lead Auditor or Lead Implementer – Added advantage Job Type: Full-time Pay: Up to ₹1,800,000.00 per year Schedule: Monday to Friday UK shift Work Location: In person Speak with the employer +91 9429521724

Posted 1 week ago

Apply

8.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

Role Description We are seeking a Senior SecDevOps Analyst to lead the integration of security into our DevOps practices and infrastructure. This role is suited for an experienced security professional who can navigate complex, hybrid environments and proactively secure large-scale, customer-facing platforms. You will be instrumental in designing secure systems, embedding security into CI/CD pipelines, and supporting risk and compliance initiatives while collaborating closely with DevOps, product, and IT teams. Key Responsibilities Security Architecture & Engineering Design and implement secure infrastructure solutions across cloud and on-premise environments. Define, enforce, and promote security standards for Infrastructure as Code (IaC), containers, and microservices. Collaborate with architects and engineering teams to ensure secure application design and deployment. DevSecOps Enablement Integrate security tools (SAST, DAST, SCA) into CI/CD pipelines. Automate security scanning and compliance checks using tools such as Snyk, Checkov, or Prisma Cloud. Drive adoption of DevSecOps practices through training, documentation, and hands-on guidance. Cloud & Container Security Secure cloud-native environments (AWS, Azure, GCP) focusing on identity, access, and data protection. Implement and monitor security for Kubernetes clusters, Docker containers, and serverless applications. Monitoring, Detection & Response Develop and maintain security monitoring and incident response procedures. Collaborate with SOC and IT teams to investigate, remediate, and document security incidents. Conduct root cause analysis and post-incident reviews to enhance system resilience. Compliance & Governance Support regulatory compliance (PCI-DSS, GDPR, ISO 27001) and internal audit initiatives. Maintain up-to-date documentation for security controls, risk assessments, and policies. Participate in vendor risk assessments and third-party security evaluations. Collaboration & Leadership Act as a security advisor to DevOps, product, and infrastructure teams. Mentor junior analysts and promote security best practices. Stay informed on evolving threats, technologies, and security frameworks. Required Qualifications 8+ years of experience in security engineering, DevOps, or SecDevOps. In-depth knowledge of cloud security (AWS preferred), system hardening, and network security. Hands-on experience with Python, Bash, PowerShell for scripting and automation. Proficient in CI/CD tools (GitHub Actions, GitLab CI, Jenkins) and IaC platforms (Terraform, CloudFormation). Strong expertise in container security (Docker, Kubernetes) and orchestration tools. Familiarity with enterprise security tools (SIEM, EDR, vulnerability management). Sound knowledge of frameworks like NIST, CIS, ISO 27001, and compliance standards (PCI-DSS, GDPR). Preferred Qualifications Industry-recognized certifications (e.g., CISSP, CKS, AWS Security Specialty, OSCP). Experience in large-scale retail or e-commerce environments. Understanding of secure payment systems, fraud prevention, and data privacy. Familiarity with Zero Trust Architecture and identity-centric security models. Skills Information Security,Security Monitoring,Infrastructure Security Show more Show less

Posted 1 week ago

Apply

8.0 - 13.0 years

25 - 35 Lacs

Bengaluru

Work from Office

Naukri logo

Endpoint & Network Security: Leverage CrowdStrike, XDR, and Zscaler for endpoint and network protection. Email & API Security: Manage and secure email platforms using Proofpoint and safeguard API security with WAF solutions.

Posted 1 week ago

Apply

5.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Linkedin logo

Role Description As an Identity and Security Engineer , you will play a pivotal role in safeguarding digital identities across a complex, hybrid enterprise environment. You will be responsible for designing, implementing, and managing scalable IAM solutions that ensure secure and seamless access for users, applications, and services. This hands-on engineering role requires deep expertise in identity protocols, cloud IAM, and security automation. You will collaborate with cross-functional teams including DevOps, infrastructure, application development, and compliance to embed identity as a key component of the security architecture. Key Responsibilities Identity Architecture & Engineering Design and implement scalable IAM solutions, including SSO, MFA, and RBAC. Manage identity lifecycle processes: onboarding, offboarding, access reviews, and recertifications. Integrate IAM systems with enterprise applications, cloud platforms (Azure AD, AWS IAM), and third-party tools. Security Operations & Automation Develop automation scripts for identity provisioning and access governance. Deploy and manage Privileged Access Management (PAM) solutions to secure administrative access. Support Zero Trust Architecture by enforcing least privilege access across all environments. Monitoring, Detection & Incident Response Monitor identity-related events using SIEM and analytics tools. Investigate and respond to access violations and identity-based security incidents. Conduct root cause analysis and implement preventive controls. Compliance & Governance Ensure compliance with standards such as GDPR, PCI-DSS, ISO 27001. Maintain audit trails, access logs, and documentation to support internal/external audits. Contribute to policy development, risk assessments, and awareness programs. Collaboration & Continuous Improvement Work with DevOps and IT teams to embed IAM into CI/CD pipelines and cloud-native environments. Mentor junior engineers and promote IAM best practices across teams. Stay updated on identity trends, technologies, and evolving threat landscapes. Required Qualifications Minimum 5 years of experience in IAM or security engineering roles. Strong understanding of IAM protocols (SAML, OAuth2, OpenID Connect, LDAP, SCIM). Hands-on experience with Azure AD, Active Directory, AWS IAM/GCP IAM. Experience with PAM tools such as CyberArk, BeyondTrust, or HashiCorp Vault. Proficient in scripting languages (PowerShell, Python, or equivalent). Strong grasp of Zero Trust principles and identity governance frameworks. Preferred Qualifications Relevant certifications (Microsoft Identity and Access Administrator, CISSP, Azure Security Engineer, etc.). Experience in enterprise or retail environments at scale. Familiarity with Just-In-Time (JIT) access, identity analytics, and behavioral monitoring. Exposure to DevSecOps and CI/CD pipeline security integration. Skills Identity Access Management,Information Security,Security Monitoring Show more Show less

Posted 1 week ago

Apply

10.0 - 15.0 years

10 - 20 Lacs

Hubli, Pune, Bengaluru

Hybrid

Naukri logo

Job Description: At least 10 years of experience in Information Security operations & management with hand on experience in large security operations center using IBM QRadar/Splunk/ArcSight or similar SIEM tool. Manage network, endpoints and forensics initiatives, malware triage and cyber security incident response Managing Cyber Security Services engagements and engagement teams Recognizing common attacker tools, tactics, and procedures Providing oversight for on-site examinations and collections and technology advisory services to enhance forensic client engagements Researching and developing new digital forensics scripts, tools, and methodologies Assessing and troubleshooting a variety of technical issues and support a cyber response lab on our clients SIEM tool and UEBA platform Assist in conducting peer reviews and providing quality assurance reviews for junior personnel and will support the mentoring of junior incident managers and provide guidance to others on incident management prioritization, triage and report writing in support of onsite engagements. Guiding the team to Monitor, identify and investigate the security alerts and perform incident response activities related to cybersecurity incidents Creates new trouble tickets for alerts that signal an incident and require Tier 2 / Incident Response review Respond to cybersecurity incidents, conduct threat analysis as directed and address detected incidents for resolution Should be able do multitasking to coordinate incident with Sr analyst and escalation manager Recommend enhancements to SOC security process, Operations efficiencies. Create Incident response (IR) plan, IR play books, manage all incidents and crisis situations. Log Analysis, handle, resolve security incidents. Collaborate with respective tracks/technical team for remediation of the incident. Periodical review of incident response plan and procedures. Recommend and document specific countermeasures and mitigating controls Develop comprehensive and accurate reports and presentations for both technical and executive audiences Preferred Skills: Strong knowledge of cyber-attacks and techniques, Cyber Kill chain, incident management best practices. A high-level understanding of multi-tiered applications and various network and security devices/protocols Knowledge of various operating system flavour including but not limited to Windows, Linux, Unix Proficient in preparation of reports and documentation. Knowledge of Cyber-criminal techniques, Compliance, and regulatory standards. Excellent verbal and written communication skills.

Posted 1 week ago

Apply

21.0 years

0 Lacs

Vadodara, Gujarat, India

On-site

Linkedin logo

Civica develops software for local and national government, education, health and care. Over 5,000 public bodies across the globe use our software to help deliver critical services to over 100 million citizens. Our aspiration is to be a GovTech champion everywhere we work around the globe, supporting the needs of citizens and those that serve them every day. Building on 21 years of continuous growth and success, we're at a pivotal point on our journey to realise that aspiration. As a company, we're passionate about what we do and the citizens we help to serve. If you too would like to help champion the use of technology in public services, to improve outcomes for citizens and public sector organisations, then Civica is the right place for you. We will help you unlock the best version of yourself, achieve growth in your career whilst making a real difference to people and communities. Why will you love this opportunity as Security Operations Centre (SOC) at Civica? As a vital member of our dynamic Security Operations Centre (SOC) team, comprising Analysts, Engineers, and a SOC Manager, you'll take the lead in monitoring our SIEM and various security systems to safeguard both CIVICA Group and our valued customers. Your keen eye will assess real-time and historical logs across multiple technologies, helping to uncover potential attack patterns, instances of compromise, and security vulnerabilities. Working closely with your team, you'll swiftly determine the most effective response to security events and incidents, while meticulously documenting every step taken to contain and resolve the issues. You'll also manage internal customer requests, particularly in relation to phishing, spam, and Anti-virus challenges. Additionally, you'll evaluate risks using a Surface Attack Tool, develop and utilize OSINT tools to gather open-source intelligence from various published sources, and collaborate with different business units to inform, mitigate, or remediate any issues. In this role, you'll be in charge of supervising Microsoft Sentinel and Microsoft Defender systems, while also managing other technologies as needed, including IPS, Email Gateways, Web Filtering services, and Antivirus solutions. You'll be on the lookout for patterns of misuse or recurring issues, working together with the team to contain, control, and resolve any incidents. Plus, you'll have the chance to identify opportunities for improvement in our personnel, processes, or technology to enhance the team's overall effectiveness. Requirements A deep understanding of security principles Use of Microsoft Sentinel and/or Defender Minimum 3 years' experience working in IT, with at least 1 year in a security-based role. Any recognised certifications in security or evidence that you are studying for an exam Excellent problem-solving skills and the ability to "think outside the box" under pressure. Security Incident Response and Handling techniques An expert knowledge of enterprise and cloud security infrastructure and systems, Ability to identify Email, IPS and Anti-Virus events and take appropriate action. Ability to research and develop new practices for self-development, but also to enhance the teams' capabilities. Excellent communication skills Knowledge of threat intelligence platforms or scripting (e.g., PowerShell) Understanding of Vulnerability management tools and/or Surface Attack Tools. Be able to work in rotating shift patterns (changing monthly) to help secure offices in different time zones Benefits We know that when our people are happy, they will work better and have greater work satisfaction. Here's what you can expect: We provide an inclusive, safe, and welcoming environment to all staff Training - CIVICA offers training to help learn about our changing technical environment and also help you develop new skills. Mentoring - Within the wider security team (Blue team, red team strategic security) there are opportunities to learn from others. Giving culture - we encourage you to "give back" with benefits such as our Days of Difference leave where you can volunteer for a charity of your choice. Apply for this job - If you have a diverse background in IT, enjoy solving problems with your teammates, have organisational skills to pull complex findings together and are a critical thinker, who can think about the impact of events and/or actions you might take, this role is perfect for you. Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Managed Services Information Security Analyst is a seasoned subject matter expert, responsible for working with security tools and other security teams to monitor, analyze, interpret and report on the incoming client data for the purpose of delivering security information and recommendations to the clients, enabling the organization to deliver the contracted security services. This role includes performing tasks such as security incident detection and response, security event reporting, threat hunting, content maintenance (tuning) and interacting with clients to ensure their understanding of the information generated, recommending client system changes as well as answering security related queries from the clients. What You'll Be Doing Key Responsibilities: Works as part of a global Cyber Defense Centre (CDC) team that works 24/7 on rotational shifts. Works with client stakeholders and relevant internal teams to tune the MSSP platform and client SIEM to enable more efficient detection, analysis and reporting. Monitors security tools to review and analyze security logs from client environments. Generates continuous improvement ideas for supported security tools/technologies, to enable improvements to the company services, employee experience and client experience. Adheres to SOPs, customer Run Books and standard processes to ensure a globally consistent delivery whilst also proposing changes and improvements to these standards. Utilizes and documents best practices and amends existing documentation as required. Identifies opportunities to make automations which will help the clients and security delivery teams. Performs security incident handling and response from several vectors including End Point Protection and Enterprise Detection and response tools, attack analysis, malware analysis, network forensics, computer forensics., Utilizes a broad range of skills in LAN technologies, Windows and Linux O/S’s, and general security infrastructure. Ensures usage of knowledge articles in incident diagnosis and resolution and assists with updating as and when required. Performs defined tasks to inform and monitor service delivery against service level agreements and maintain records of relevant information. Undertakes threat hunting activities across both individual client estates, as well as cross client hunting. Manages unresolved incidents and follows up until incidents are resolved. Works closely with client delivery teams to support their activities related to client delivery. Cooperates closely with colleagues to share knowledge and build a cohesive and effective team environment, benefiting the individual, the business and the client. Performs any other related task as required. Customer interactions and attending bridge calls to work with customers and relative technical teams. Understanding of threat hunt methodologies and perform threat hunting. Knowledge and Attributes: Seasoned knowledge on implementation and monitoring of a company supported SIEM or security tools/technologies/concepts. Seasoned knowledge on security architecture, worked across different security technologies. Seasoned knowledge and understanding of the operation of modern computer systems and networks and how they can be compromised. Displays excellent customer service orientation and pro-active thinking. Displays problem solving abilities and is highly driven and self-organized. Excellent attention to detail. Excellent analytical and logical thinking. Excellent spoken and written communication abilities. Team player with the ability to work well with others and in group with colleagues and stakeholders. Ability to remain calm in pressurized situations. Ability to keep current on emerging trends and new technologies in area of specialization. Academic Qualifications and Certifications: Bachelor's degree or relevant qualification in Information Technology or Computing or a related field. Security certifications such as (but not limited to) AZ-500, SC-200, Security+, CEH, CISSP, CISM or similar Certification in different networking technologies such as CCNA, JNCIA, ACCA, PCNSA, CCSA is advantageous. Required Experience: Seasoned experience in SOC Analysis Operations. Seasoned experience in SIEM usage for investigations. Seasoned experience in Security technologies such as (but not limited to) Firewall, IPS, IDS, Proxy. Seasoned experience in dealing with technical support to clients. Seasoned experience in handling security incidents end to end. Seasoned experience in configuring/managing security controls, such as SIEM, Firewall, IDS/IPS, EDR, NDR, UTM, Proxy, SOAR, Honeypots and other security tools. Seasoned experience in Security Analysis or Engineering preferably gained within a global services organization. Workplace type: Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today. Show more Show less

Posted 1 week ago

Apply

3.0 - 5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. Position Summary We are seeking a highly skilled Security Consultant to join our Cisco Secure Access Helpdesk team. The ideal candidate should have a strong foundation in network security, with hands-on experience in deploying and managing security solutions to ensure secure network access and data protection. This role requires expertise in any or all of the following technologies - SASE solutions such as Zscaler and Prisma Access, Cisco Umbrella, VPN deployments such as Cisco AnyConnect, and Next generation firewall configurations. Key Roles & Responsibilities Cisco Secure Access Implementation & Migration: Deploy and manage Cisco Secure Access SSE solution for assigned customer. Migrate from existing SSE/VPN solution to Cisco Secure Access. Provide support and knowledge transfer to customer after deployment/migration. Proficiency In ZScaler SASE solutions deployment and management. Cisco Umbrella implementation and policy enforcement. VPN solutions (SSL/IPSec) design, deployment, and troubleshooting. Cisco AnyConnect configuration and management Cisco routing and firewall deployment (Cisco ASA, Firepower, or similar). Basic Qualifications Strong understanding of network protocols & services: TCP/IP, DNS, DHCP, HTTP/HTTPS, VPN tunnelling protocols, etc. Familiarity With Security Monitoring & Threat Prevention SIEM solutions, IDS/IPS, endpoint security, and cloud security principles. Experience with network management & monitoring tools to ensure network security and performance. Preferred Qualifications 3-5 years of experience in security, network security, IT infrastructure. Hands-on experience in deploying and managing network security solutions in enterprise environments. CCNA Security, CCNP Security, or equivalent industry certifications. Strong analytical and troubleshooting abilities to diagnose and resolve security issues effectively. Excellent verbal and written communication skills, with the ability to explain technical concepts to non-technical stakeholders. Ability to collaborate effectively with cross-functional teams and work in a fast-paced environment. Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted. Show more Show less

Posted 1 week ago

Apply

14.0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Linkedin logo

Our Mission At Palo Alto Networks® everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we’re looking for innovators who are as committed to shaping the future of cybersecurity as we are. Who We Are We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe that the unique ideas of every member of our team contributes to our collective success. Our values were crowdsourced by employees and are brought to life through each of us everyday - from disruptive innovation and collaboration, to execution. From showing up for each other with integrity to creating an environment where we all feel included. As a member of our team, you will be shaping the future of cybersecurity. We work fast, value ongoing learning, and we respect each employee as a unique individual. Knowing we all have different needs, our development and personal wellbeing programs are designed to give you choice in how you are supported. This includes our FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees, our mental and financial health resources, and our personalized learning opportunities - just to name a few! Job Description Your Career We are seeking a dynamic and experienced Sales Specialist to drive the growth of our Cortex and Cloud business across the region. The ideal candidate will operate in a high-growth environment at scale, thrive in driving innovation, have a solid background in cybersecurity sales, and a deep understanding of security solutions. They will have a proven track record of developing strong customer relationships and executing strategies that support rapid expansion and success. This role requires a strategic thinker who excels in collaboration with internal teams, engages effectively with customers, and drives revenue growth through the sale of complex solutions. Your Impact Join the fastest growing team where experience meets cutting-edge solutions Build and cultivate strong customer relationships, driving business growth within the region. Partner with the core sales team to align customer strategies and engagements with Cortex and Cloud business objectives. Take full ownership of leading strategic sales campaigns, sales forecasting, utilizing in-depth knowledge of sales cycles from initial contact through procurement. Engage in deep technical discussions beyond standard sales presentations and pitches; while translating complex technical cybersecurity solutions into clear business value propositions for customers. Collaborate closely with cross-functional teams, including sales engineers, to provide tailored customer-centric solutions. Partner with Alliances to develop joint strategies, enhance customer engagement and deliver innovative solutions for existing and prospective clients. Travel domestically as needed to meet with customers and attend key business events. Qualifications Your Experience 14+ years of field sales experience focusing on key customer accounts and delivering value to Enterprise or Major-level accounts in the cybersecurity industry. Extensive platform selling experience in complex sales with multiple buying centers. Experience selling SecOps SIEM, EDR or CNAPP (DevSecOps, CloudOps) solutions is highly preferred. Established trusted relationships with CIOs and CISOs with the ability to influence and drive strategic conversations Expertise in applying complex solution sales methodologies to drive results. Experience working with channel partners and a deep understanding of a channel-centric go-to-market strategy. Demonstrated ability to thrive in a fast-paced, high-growth startup environment while collaborating effectively with sales engineers and cross-functional teams. Experience operating in a continuous adoption, expansion, and upsell sales motion within a matrixed sales organization is preferred Willingness to travel domestically as necessary to meet business needs. Additional Information Our Commitment We’re problem solvers that take risks and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together. We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com. Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics. All your information will be kept confidential according to EEO guidelines. Covid-19 Vaccination Information for Palo Alto Networks Jobs Vaccine requirements and disclosure obligations vary by country. Unless applicable law requires otherwise, you must be vaccinated for COVID or qualify for a reasonable accommodation if: The job requires accessing a company worksite The job requires in-person customer contact and the customer has implemented such requirements You choose to access a Palo Alto Networks worksite If you have questions about the vaccine requirements of this particular position based on your location or job requirements, please inquire with the recruiter. Our Commitment We’re problem solvers that take risks and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together. We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com. Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics. All your information will be kept confidential according to EEO guidelines. Show more Show less

Posted 1 week ago

Apply

5.0 years

0 Lacs

Gurgaon, Haryana, India

On-site

Linkedin logo

Overview Keysight is on the forefront of technology innovation, delivering breakthroughs and trusted insights in electronic design, simulation, prototyping, test, manufacturing, and optimization. Our ~15,000 employees create world-class solutions in communications, 5G, automotive, energy, quantum, aerospace, defense, and semiconductor markets for customers in over 100 countries. Learn more about what we do. Our award-winning culture embraces a bold vision of where technology can take us and a passion for tackling challenging problems with industry-first solutions. We believe that when people feel a sense of belonging, they can be more creative, innovative, and thrive at all points in their careers. Responsibilities Cybersecurity SOC Analyst – Tier1 (SOC-Security Operation Center) The Cybersecurity Analyst will be responsible for the handling, and escalation of, alerts which require technical triage and analysis. This may include web attacks, malware infections, and phishing campaigns, which have been identified by the Information Risk & Security team’s technology stack. Functional Responsibilities Experience Monitoring SIEM solutions and a variety of other security devices found in a SOC environment (e.g. Behavioral Analytics tools, IDS/IPS, log management tools, and security analytics platforms. Creating and maintaining documentation for security event processing. Acknowledge and handle the incoming security alerts. Use the internal ticketing system and dashboards to update the tickets/alerts accordingly and escalating them to the appropriate teams if necessary. Assist the Incident Response team on alerts escalated to them by the SOC team. Develop/Update and follow Standard Operating Procedures (SOPs) and Playbooks to handle standard and out-of-band alerts. Report to the Incident Response Team quickly and efficiently regarding urgent matters. Ensure ticket queues are always within satisfactory limits and all tickets are updated. Provide On-Call Support for emergency or high severity issues. Liaise with partner teams and end-users for security related tickets and activities. Qualifications Bachelor's degree in Conputer Science / Electrical & Electronics / IT Engineering ; MCA Excellent verbal and written communication skills. Excellent analytical and problem-solving skills required. Minimum of 5+ years of experience in a SOC or Cybersecurity. Equivalent Certifications (Network+, Security+, CySA+, GSEC, GMON, etc.) Experience working with SIEMs and evaluating SIEM alerts, EDR , NDR Experience leveraging core security and infrastructure technologies during investigations (e.g. firewall logs, network security tools, malware detonation devices, proxies, IPS/IDS) Key Competencies Ability to think with a security mindset. The successful candidate has a good IT background with good level knowledge of multiple relevant security practice areas (anti-malware solutions, patch and vulnerability management, network security; monitoring; endpoint, etc.) Knowledge of TCP/IP Protocols, network analysis, and network/security applications. Good knowledge of various security tools and monitoring devices; e.g. able to read and understand IDS/IPS/Firewall/Proxy logs and determine the current state of play. Experience in correlating malware infections with attack vectors to determine the extent of security and data compromise. Ability to work in a time-sensitive environment; must be detail oriented and able to multitask to meet deadlines and company objectives. Experience in large, geographically diverse enterprise networks. Ability to build lasting relationships with partner teams and stakeholders. Strong written and oral communication skills, including the ability to interact directly with customers that do not have an IT background. Documentation; experience in writing reports and documenting tickets efficiently and accurately. Careers Privacy Statement***Keysight is an Equal Opportunity Employer.*** Show more Show less

Posted 1 week ago

Apply

0 years

0 Lacs

Kota, Rajasthan, India

On-site

Linkedin logo

Job description Job Description: SOC Trainer – ASD Academy Position: SOC Trainer (Security Operations Center Trainer) Course Duration: 15 Days Class Schedule: Monday to Friday (1.5 Hours per Day) Course Level: Beginner to Advanced Payout: ₹600 per Class Role Overview: ASD Academy is seeking an experienced SOC Trainer to deliver structured training sessions on Security Operations Center (SOC) practices. The trainer will be responsible for guiding students from beginner to advanced levels, ensuring they gain a comprehensive understanding of SOC principles, tools, and real-world applications. Key Responsibilities: ✔ Conduct engaging and interactive online/offline SOC training sessions (1.5 hours per day, Monday to Friday). ✔ Cover essential SOC topics, including SIEM, log analysis, threat detection, incident response, and security monitoring. ✔ Develop practical exercises, case studies, and hands-on labs to enhance student learning. ✔ Provide real-world insights and best practices to help students gain industry-ready skills. ✔ Assess student performance through assignments, quizzes, and live troubleshooting scenarios. ✔ Address student queries and mentor them throughout the course. Requirements: ✔ Strong knowledge of SOC operations, cybersecurity frameworks, and threat intelligence. ✔ Hands-on experience with SIEM tools (Splunk, QRadar, ArcSight, etc.) and security monitoring technologies. ✔ Prior experience in training, mentoring, or teaching cybersecurity concepts is a plus. ✔ Excellent communication skills and the ability to simplify complex cybersecurity concepts. ✔ Passion for cybersecurity education and a commitment to student success. Why Join Us? 🚀 Opportunity to mentor aspiring cybersecurity professionals. 🚀 Flexible training structure with well-defined curriculum support. 🚀 Work with an industry-leading cybersecurity training academy. If you’re passionate about cybersecurity education and have expertise in SOC operations, we’d love to have you on board! 📩 Apply Now: Send your CV and relevant experience details to hr@asdcybersecurity.in. Show more Show less

Posted 1 week ago

Apply

7.0 - 12.0 years

15 - 30 Lacs

Noida

Work from Office

Naukri logo

Job Title: Security Operation Manager Location: Noida Job Tyoe : Full-Time Experience: 7+ Years Department: Operation/ Security Reports To: Operation Director Job Summary: The Security Operational Manager is responsible for overseeing the day-to-day operations of the organization's security infrastructure. This role involves managing the security operations center (SOC), leading incident response efforts, and ensuring the effectiveness of security policies, procedures, and protocols. The Security Operational Manager will collaborate with various departments to safeguard the company's information assets and maintain a robust security posture. Key Responsibilities: Manage Security Operations: Oversee the daily activities and operations of the security operations center (SOC), ensuring continuous monitoring, detection, and response to security incidents. Incident Response: Lead the incident response team in identifying, managing, and resolving security breaches and vulnerabilities. Conduct post-incident analysis and reporting to prevent future occurrences. Security Monitoring: Implement and maintain security monitoring tools and technologies to detect and respond to threats in real-time. Penetration Testing and Vulnerability Scanning: Conduct regular penetration testing and vulnerability scanning to identify and mitigate security weaknesses within the organization's systems and applications. Policy and Compliance: Develop, enforce, and update security policies, procedures, and protocols in alignment with industry standards and regulatory requirements. Ensure compliance with relevant laws and regulations. Team Leadership: Tain, and mentor the security operations team, fostering a culture of continuous improvement and professional development. Risk Management: Conduct regular security risk assessments and implement mitigation strategies to reduce identified risks. Collaboration: Work closely with IT, legal, and other departments to ensure comprehensive security measures are integrated into all business processes. Reporting: Prepare and present regular reports on security operations, incidents, and compliance status to the Customers. Emergency Response: Develop and maintain emergency response plans for security incidents, ensuring the organization is prepared for potential crises. Qualifications: Education: Bachelors degree in Computer Science, Information Security, or a related field.. Experience: Minimum of 7 years of experience in information security, with at least 3 years in a managerial role overseeing security operations. Certifications: Relevant certifications such as CISSP, CISM, CEH, or similar are highly desirable. Technical Skills: Proficient in security technologies such as SIEM, IDS/IPS, firewalls, antivirus software, and endpoint protection. Expertise in conducting penetration testing and vulnerability scanning. AWS Expertise: In-depth knowledge and experience with Amazon Web Services (AWS) security practices and tools. Knowledge: In-depth understanding of security frameworks (e.g., NIST, ISO 27001), compliance requirements (e.g., GDPR, HIPAA), and incident response best practices. Leadership: Strong leadership and team management skills with the ability to motivate and guide a diverse team. Communication: Strong verbal and written communication skills, with the ability to convey complex security issues to non-technical stakeholders. Working Conditions: The role may require occasional on-call work to address security incidents. Must be able to work in a high-pressure environment and handle multiple tasks simultaneously.

Posted 1 week ago

Apply

5.0 - 10.0 years

20 - 30 Lacs

Jaipur

Work from Office

Naukri logo

PURPOSE OF THE POSITION: We are looking for a highly skilled Information Security Manager to lead and implement ISO 27001 compliance, cybersecurity strategies, and risk management within our organization. The ideal candidate will establish and maintain security policies, manage information security risks, and ensure compliance with regulatory standards like SOC2, GDPR, and NIST frameworks. ROLES & RESPONSIBILITIES: ISO 27001 Implementation & Compliance : - Develop, implement, and maintain an Information Security Management System (ISMS) aligned with ISO 27001 standards. - Conduct ISO 27001 gap analysis, risk assessments, and audits to ensure compliance. - Define and enforce information security policies, procedures, and controls to safeguard data integrity, confidentiality, and availability. - Drive ISO 27001 certification efforts, ensuring successful audits and continuous improvements. - Lead security awareness training programs for employees to enhance the organization's security posture. Cybersecurity Strategy & Risk Management : - Develop and implement a cybersecurity strategy to protect against threats, vulnerabilities, and attacks. - Conduct regular penetration testing, vulnerability assessments, and security audits to identify and mitigate risks. - Implement Zero Trust architecture, access control mechanisms, and security best practices across IT infrastructure. - Monitor threat intelligence, security incidents, and cyber threats, responding with effective mitigation strategies. - Ensure security of cloud infrastructure (AWS, Azure, GCP) by enforcing IAM policies, encryption, and secure configurations. - Establish and manage a Security Incident Response Plan (SIRP) for rapid threat detection and mitigation. Regulatory Compliance & Governance : - Ensure compliance with ISO 27001, SOC2, GDPR, NIST, PCI-DSS, and other industry security frameworks. - Collaborate with internal teams to align security policies with business operations and regulatory requirements. - Work with external auditors and security consultants to maintain compliance certifications and regulatory audits. - Develop and maintain security metrics, dashboards, and reports for leadership and regulatory bodies. Security Operations & Monitoring : - Oversee SIEM (Security Information and Event Management) solutions for real-time threat detection. - Implement and manage Intrusion Detection & Prevention Systems (IDS/IPS), firewalls, and endpoint security solutions. - Develop and enforce incident response, disaster recovery, and business continuity plans. - Ensure data protection, encryption, and secure backup strategies are in place for all critical systems. EDUCATIONAL QUALIFICATION: Any Technical Degree BTech., B.E. BCA, MCA will be preferred. REQUIRED SKILLS & QUALIFICATIONS: - 5+ years of experience in information security, cybersecurity, or compliance roles. - Strong expertise in ISO 27001 implementation, auditing, and certification. - Hands-on experience with security risk assessments, vulnerability management, and threat modeling. - Deep understanding of cybersecurity frameworks (SOC2, NIST, CIS, GDPR, PCI-DSS). - Experience with SIEM solutions (Splunk, ELK, QRadar, or similar) for security monitoring. - Knowledge of firewalls, IDS/IPS, endpoint protection, and cloud security best practices. - Strong understanding of IAM, network security, encryption, and access control policies. - Certifications like CISM, CISSP, CISA, CEH, ISO 27001 Lead Auditor/Implementer are highly preferred. - Strong problem-solving, communication, and stakeholder management skills. PROFESSIONAL ATTRIBUTES: - Strong interpersonal and communication skills, being an effective team player, being able to work with individuals at all levels within the organization and building remote relationships. - Excellent English skills and experience working within a multi-location team. - Excellent prioritization skills, the ability to work well under pressure, and the ability to multi- task. - Ability to work independently with minimal supervision and to resolve problems on non-routine matters. WHY JOIN US? - Opportunity to be part of a rapidly growing, innovative product-based company. - Collaborate with a talented, driven team focused on building high-quality software solutions. - Competitive compensation and benefits package.

Posted 1 week ago

Apply

3.0 - 6.0 years

0 Lacs

Pune, Maharashtra, India

Remote

Linkedin logo

We are seeking a talented and motivated Security Engineer to join our team. The ideal candidate will possess a solid foundation in security practices and a proactive approach to safeguarding our digital ecosystem. This role requires a balance of technical expertise, strategic thinking, and an understanding of regulatory requirements. Key Responsibilities Cloud Security Design, implement, and maintain robust security measures in AWS cloud environments. Manage IAM roles and enforce least-privilege principles across cloud resources. Penetration Testing Conduct comprehensive penetration tests for web applications, APIs, and mobile applications. Identify vulnerabilities and recommend actionable mitigations. Security Architecture Create and implement scalable security architectures to meet organizational needs. Ensure security designs align with industry best practices and compliance requirements. Compliance and Policies Develop, implement, and maintain compliance frameworks (preferably ISO 27001). Formulate and review organization-wide security policies, processes, and procedures. Assist in audits and evidence collection for compliance requirements. Regulatory Awareness Have basic knowledge of SEBI guidelines and/or the DPDP Act for security compliance. Ensure organizational security measures adhere to applicable regulations. Organizational Security Controls Deploy and manage security controls like WAF, MDM, SIEM, API Gateway, and SSO solutions. Monitor and improve the performance and effectiveness of these controls. Administrative Tasks Handle security-related administrative activities efficiently. Maintain updated documentation of security tools, processes, and incident reports. Security Training and Assessments Conduct security awareness training sessions for employees. Perform periodic security assessments to evaluate organizational preparedness. Qualifications and Skills Experience: 3-6 years in cybersecurity, with proven hands-on expertise in the above responsibilities. Expertise in penetration testing methodologies and tools. Proficiency in designing security architectures and implementing security controls. Familiarity with compliance frameworks like ISO 27001. Understanding of regulatory guidelines such as SEBI and DPDP Act is a plus. Experience with organization-wide policy development and process implementation. Strong interpersonal skills to effectively conduct training and awareness programs. Preferred Skills Strong knowledge of AWS Cloud Security and associated tools. Familiarity with deploying and managing WAFs, SIEM solutions, MDM tools, API gateways, and SSO systems. Knowledge of incident response and vulnerability management tools. Basic scripting and automation skills to streamline security processes. What you can expect in return: ESOPs based on performance Health insurance Statutory benefits like PF & Gratuity Remote work options Professional development opportunities Collaborative and inclusive work culture Who we are EduFund is an early-stage platform that helps Indian parents plan for their child's higher education in advance. Our product allows families to invest for education, take education loans, and receive competitive scholarships! We were founded in 2020 by Eela Dubey (NYU 13’) and Arindam Sengupta (Princeton 12’). EduFund team is filled with chai lovers, problem solvers, ridiculous jokes, and immeasurable passion towards our work. Our founding team has had the privilege of working at companies like Reliance, Goldman Sachs, CRISIL, GradRight, LeverageEdu, HDFC, and many others. We have raised over $5M in funding from notable investors such as MassMutual Ventures, Kunal Shah, and DSP Investment Managers. We are headquartered in Ahmedabad, with teams in Mumbai and Pune. Website - https://www.edufund.in/ Show more Show less

Posted 1 week ago

Apply

2.0 - 5.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Overview ormation Security Analyst: Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. Researches attempted or successful efforts to compromise systems security and designs countermeasures. Maintains hardware, software and network firewalls and encryption protocols. Administers security policies to control physical and virtual access to systems. Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems. Job Code Tip: May be internal or external, client-focused, working in conjunction with Professional Services and outsourcing functions. May include company-wide, web-enabled solutions. Individuals whose primary focus is on developing, testing, debugging and deploying code or processing routines that support security protocols for an established system or systems should be matched to the appropriate Programmer or Programmer/Analyst family in the Information Technology/MIS functional area. Responsibilities Should have process knowledge and technical knowledge on any of the SIEM tools ( like Qradar, LogRhythm, AlienVault, Splunk…etc). L2/L3 level is added advantage. Should have process knowledge and technical knowledge in AV tools like Symantec, McAfee, Trend Micro…etc. L2/L3 level is added advantage. Should have knowledge in managing Vulnerability tools and various remediation efforts. Review security logs generated by applications, devices and other systems, taking action or escalating to appropriate teams as needed. Enforce incident response service level agreement. Work with the global IT Security team to analyze, test and recommend tools to strengthen the security posture of the company Create and maintain operational reports allowing IT management team to understand the current and historical landscape of the IT security risks Vulnerability management assessment and remediation Participate in daily and ad-hoc meetings related to cyber security, controls and compliance, processes and documentation related tasks Research the latest information technology (IT) security trends Help plan and carry out an organization’s way of handling security Develop security standards and best practices for the organization Recommend security enhancements to management or senior IT staff Document security breaches and assess the damage they cause. Performs other duties as assigned Qualifications B. Tech, B.E or M.C.A 2-5 years’ Experience working in a Security Operations Center 2 years minimum in the computer industry Knowledge working with complex Windows environments Knowledgeable in various security frameworks such as NIST 800-53 / NIST 800-171 / ISO27001 Knowledge in design and administration of security tools Good written and verbal communication skills Show more Show less

Posted 1 week ago

Apply

4.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Role: SOC Analyst Location: Kharadi, Pune Life Unlimited. At Smith+Nephew, we design and manufacture technology that takes the limits off living! The Security Analyst works on the detection and response for potential security incidents on the Smith & Nephew network, systems, and applications. This includes technical analysis and incident management, communications, and reporting. The role works with the Global SOC Manager. The work includes partnering closely with other functions within Information Security, with outsourced tier 1 SOC functions, with the wider IT team including Service Desk, as well as with HR, Legal, Procurement, and other functions. The role interacts with end users and technical resolver teams within Smith & Nephew as well as outsourced suppliers. The working hours are Monday to Friday (11AM - 8PM IST). What will you be doing? Complete alert and incident response activities following standard runbooks and processes, with work to include the initial triage and analysis, recording of the incident with all relevant details to high standards, and documenting all containment and response actions. Uses Smith+Nephew technology platforms and security tools to conduct investigations such as threat hunting or other proactive investigations outside the incident process. Write comprehensive reports including assessment-based findings, outcomes, and propositions for enhancements such as new detection plays, new runbooks or playbooks, process improvements, or tuning detection rules. Mentoring and coaching other team members, sharing skills and experience to enable higher levels of performance. Provide technical domain expertise to projects and initiatives aimed at improving the capability and maturity of Smith & Nephew information security practices. What will you need to be successful? Bachelor´s degree in Computer Science or a related subject preferred or equivalent experience. Licenses/Certifications: Relevant entry- or mid-level security certifications are advantageous but not required. Job-specific training will be provided. Experience: At least 4 years of experience in a relevant Information Security role. Experience working hands-on with SIEM and EDR/XDR technologies for the identification and response to existing and emerging threats. Familiar with MITRE ATT&CK for the identification and mapping of attacker tactics, techniques, and procedures (TTPs). Familiarity with network models (OSI and TCP/IP), common network terminology and concepts, and network equipment. Must be able to correctly interpret logs for firewalls (including WAF and IDS/IPS), Windows and Linux operating system logs, AWS and Azure cloud logs. Familiarity with web-related technologies (Web applications, Web Services, Service Oriented Architectures) and network/web-related protocols. Competences: Understanding of industry frameworks such as MITRE ATT&CK, MITRE D3FEND, NIST CSFv2, and NIST SP800-61r2. Using SIEM (including scripted query languages) and EDR/XDR technologies, threat intelligence tools, and ITSM tools. Familiarity with AWS and Azure cloud technologies and cloud security standards (CSA or equivalent). Understanding of API security and familiarity with AI security concepts (such as NIST AI RMF). Familiarity with ITIL methodology and terminology. Excellent written and oral communication skills, service attitude, and analytical approach to problem solving. Ability to work independently without daily direction, balancing conflicting priorities, and effectively tracking and managing task completion to committed deadlines. You. Unlimited. We believe in crafting the greatest good for society. Our strongest investments are in our people and the patients we serve. Inclusion, Diversity and Equity- Committed to Welcoming, Celebrating and Thriving on Diversity, Learn more about Employee Inclusion Groups on our website (https://www.smith-nephew.com/ ). Other reasons why you will love it here! Your Future: Major medical coverage + policy exclusions and insurance non-medical limit. Educational Assistance. Work/Life Balance: Flexible Personal/Vacation Time Off, Privilege Leave, Floater Leave. Your Wellbeing: Parents/Parents in Law’s Insurance (Employer Contribution of 7,000/- annually), Employee Assistance Program, Parental Leave. Flexibility: Hybrid Work Model (For most professional roles) Training: Hands-On, Team-Customized, Mentorship Extra Perks: Free Cab Transport Facility for all employees; One-Time Meal provided to all employees as per shift. Night shift allowances. Stay connected and receive alerts for jobs like this by joining our talent community. We're more than just a company - we're a community! Follow us on LinkedIn to see how we support and empower our employees and patients every day. Check our Glassdoor page for a glimpse behind the scenes and a sneak peek into You. Unlimited. , life, culture, and benefits at S+N. Explore our new website and learn more about our mission, our team, and the opportunities we offer. Show more Show less

Posted 1 week ago

Apply

Exploring SIEM Jobs in India

The Security Information and Event Management (SIEM) job market in India is thriving, with a growing demand for professionals who can monitor, analyze, and respond to security incidents in real-time. SIEM jobs offer lucrative career opportunities for individuals with a strong understanding of cybersecurity concepts and technologies.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Delhi/NCR
  5. Mumbai

Average Salary Range

The average salary range for SIEM professionals in India varies based on experience level: - Entry-level: INR 4-6 lakhs per annum - Mid-level: INR 8-12 lakhs per annum - Experienced: INR 15-20 lakhs per annum

Career Path

Career progression in the SIEM field typically follows a path from: - SIEM Analyst - SIEM Engineer - SIEM Consultant - SIEM Architect

Related Skills

In addition to SIEM expertise, professionals in this field are often expected to have knowledge of: - Network Security - Incident Response - Threat Intelligence - Security Operations Center (SOC) operations

Interview Questions

  • What is SIEM and how does it work? (basic)
  • Can you explain the difference between IDS and SIEM? (medium)
  • How would you handle a security incident detected by the SIEM tool? (medium)
  • What are some common challenges faced when implementing a SIEM solution? (advanced)
  • How do you stay updated with the latest cybersecurity threats and trends? (basic)
  • Can you describe a successful SIEM deployment project you were involved in? (medium)
  • What are some key performance indicators (KPIs) used to measure the effectiveness of a SIEM system? (advanced)
  • How do you ensure compliance with industry regulations using a SIEM tool? (medium)
  • Explain the concept of correlation rules in SIEM. (medium)
  • How do you handle false positives in a SIEM system? (advanced)
  • Describe a time when you had to troubleshoot a SIEM-related issue. (medium)
  • What are the benefits of integrating threat intelligence feeds with a SIEM tool? (medium)
  • Can you explain the concept of log aggregation in the context of SIEM? (basic)
  • How do you prioritize security alerts generated by a SIEM tool? (medium)
  • What are the key components of a SIEM architecture? (advanced)
  • How would you assess the effectiveness of a SIEM tool in an organization? (medium)
  • What are some best practices for SIEM tuning and optimization? (advanced)
  • How do you handle data retention and storage requirements in a SIEM system? (medium)
  • Explain the role of machine learning in enhancing SIEM capabilities. (advanced)
  • How do you ensure the confidentiality and integrity of SIEM data? (medium)
  • Can you discuss the importance of user behavior analytics in a SIEM environment? (medium)
  • What are the limitations of a SIEM tool and how can they be overcome? (advanced)
  • How do you collaborate with other teams (e.g., IT, compliance) to enhance SIEM operations? (medium)
  • Describe a time when you had to communicate a complex security incident detected by the SIEM to non-technical stakeholders. (medium)

Closing Remark

As you explore SIEM jobs in India, remember to continuously upgrade your skills, stay informed about the latest cybersecurity trends, and practice answering interview questions to showcase your expertise confidently. With the right preparation and dedication, you can excel in the dynamic field of SIEM and carve out a successful career for yourself. Good luck!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies