Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Skills :- Devops background, SCA, Product security,Stakeholder management Shift Timing :- 2.00 pm - 11.00 pm Location :- Hyderabad Engineer, Product Security Omnicom Global Solutions, Hyderabad IN About Omnicom Global Solutions Omnicom Global Solutions is an integral part of Omnicom Group, a leading global marketing and corporate communications company. Omnicom’s branded networks and numerous specialty firms provide advertising, strategic media planning and buying, digital and interactive marketing, direct and promotional marketing, public relations, and other specialty communications services to over 5,000 clients in more than 70 countries. OGS India plays a critical role for our group companies and global agencies by providing stellar products, solutions, and services across Creative Services, Technology, Marketing Science (Data & Analytics), Advanced Analytics, Market Research, Business Support Services, Media Services, and Project Management. With over 4500 talented colleagues in India, we are growing rapidly and are looking for professionals like you to help build the next chapter of our journey. Let’s build this together! Role Overview We have an exciting opportunity for an Engineer, Product Security at our Hyderabad office. This role supports secure software development, risk mitigation, and product security best practices across automated platforms and infrastructure-as-code environments. The Product Security Engineer will perform vulnerability assessments, provide risk analysis, support incident response, and collaborate with development and DevOps teams to embed security into all stages of the product lifecycle. This role plays a vital part in enabling secure, scalable, and compliant services across Omnicom’s digital ecosystem. Key Responsibilities Assist in implementing secure software development standards and practices. Support integration of security measures into automated service platforms and infrastructure-as-code. Conduct regular security assessments and vulnerability scans for applications and infrastructure. Analyse and report on security risks and vulnerabilities; provide mitigation recommendations. Collaborate with the incident response team on investigations and real-time threat intelligence. Monitor and manage security tools to detect and respond to application and infrastructure threats. Continuously monitor cloud environments and SaaS platforms for emerging security threats. Work closely with development, QA, and IT teams to support secure software delivery. Prepare and present security metrics, reports, and summaries to Product Security Leads and stakeholders. Deliver security awareness training on secure software development and SecDevOps practices. Contribute to the maintenance of security documentation and internal guidelines. Required Qualifications 3-5 years of experience in cybersecurity, software engineering, or DevOps with a focus on product security. Familiarity with security assessment tools (e.g., SAST, DAST scanners) and CI/CD environments. Basic understanding of secure coding, cloud security, and infrastructure-as-code practices. Hands-on experience with tools such as GitHub, AWS, Terraform, Jenkins, Docker, etc. Understanding of IT governance frameworks (e.g., SDLC, ITIL) is a plus. Strong analytical, documentation, and troubleshooting capabilities. Bachelor's degree in Cybersecurity, Computer Science, IT, or related field. Strong technical skills relevant to Information Security such as secure coding standards, ethical hacking techniques, network security, SIEM, and risk analysis Certifications such as Security+ or CEH are a plus. Preferred Qualifications AppSec depth (CSSLP, eWPT), Cloud specialization (AWS Security), Foundational credibility (Security+), and CEH are a plus. Experience with cloud security frameworks and zero trust architecture.
Posted 3 weeks ago
15.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Position Title: Cloud Solutions Practice Head Location: Hyderabad, India (Travel as Needed) Reports To: CEO / Executive Leadership Team Employment Type: Full-Time | Senior Leadership Role Industry: Information Technology & Services | Cloud Solutions | AI & Digital Transformation Join the Future of Enterprise Cloud At BPMLinks , we are building a cloud-first future for enterprise clients across the globe. As our Cloud Solutions Practice Head , you won’t just lead a team, you’ll shape a legacy. Position Overview: BPMLinks LLC is seeking an accomplished and visionary Cloud Solutions Practice Head to establish and lead our newly launched Cloud Solutions Practice , aligning cloud innovation with business value creation. This is a pivotal leadership role that will oversee the full spectrum of cloud consulting, engineering, cost optimization, migration, and AI/ML-enabled services across our global delivery portfolio. The ideal candidate is a cloud thought leader with deep expertise across AWS, Azure, GCP , and modern data platforms (e.g., Snowflake, Databricks, Azure Data Factory, Oracle ). You will play a key role in scaling multi-cloud capabilities, building high-performing teams, and partnering with clients to drive cost efficiency, performance, security, and digital innovation. Key Responsibilities: 🔹 Practice Strategy & Leadership Define and execute the vision, roadmap, and service catalog for the Cloud Solutions Practice. Build a world-class delivery team of cloud architects, engineers, DevOps professionals, and data specialists. Align the practice’s capabilities with BPMLinks’ broader business transformation initiatives. 🔹 Cloud & Data Architecture Oversight Lead the design and deployment of scalable, secure, cost-optimized cloud solutions on AWS, Azure, and GCP. Direct complex cloud and data migration programs , including: Transitioning from legacy systems to Snowflake, Databricks, and BigQuery Data pipeline orchestration using Azure Data Factory, Airflow, Informatica Modernization of Oracle and SQL Server environments Guide hybrid cloud and multi-cloud strategies across IaaS, PaaS, SaaS, and serverless architectures. 🔹 Cloud Cost Optimization & FinOps Leadership Architect and institutionalize cloud cost governance frameworks and FinOps best practices. Leverage tools like AWS Cost Explorer, Azure Cost Management, and third-party FinOps platforms. Drive resource rightsizing, workload scheduling, RIs/SPs adoption, and continuous spend monitoring. 🔹 Client Engagement & Solution Delivery Act as executive sponsor for strategic accounts, engaging CXOs and technology leaders. Lead cloud readiness assessments, transformation workshops, and solution design sessions. Ensure delivery excellence through agile governance, quality frameworks, and continuous improvement. 🔹 Cross-Functional Collaboration & Talent Development Partner with sales, marketing, and pre-sales teams to define go-to-market strategies and win pursuits. Foster a culture of knowledge sharing, upskilling, certification, and technical excellence. Mentor emerging cloud leaders and architects across geographies. Cloud Services Portfolio You Will Lead: Cloud Consulting & Advisory Cloud readiness assessments, cloud strategy and TCO analysis Multi-cloud and hybrid cloud governance, regulatory advisory (HIPAA, PCI, SOC2) Infrastructure, Platform & Application Services Virtual machines, networking, containers, Kubernetes, serverless computing App hosting, API gateways, orchestration, cloud-native replatforming Cloud Migration & Modernization Lift-and-shift, refactoring, legacy app migration Zero-downtime migrations and DR strategies Data Engineering & Modern Data Platforms Snowflake, Databricks, BigQuery, Redshift Azure Data Factory, Oracle Cloud, Informatica, ETL/ELT pipelines DevOps & Automation CI/CD, Infrastructure-as-Code (Terraform, CloudFormation, ARM) Release orchestration and intelligent environment management Cloud Security & Compliance IAM, encryption, CSPM, SIEM/SOAR, compliance audits and policies Cost Optimization & FinOps Reserved instances, spot instances, scheduling automation Multi-cloud FinOps dashboards, showback/chargeback enablement AI/ML & Analytics on Cloud Model hosting (SageMaker, Vertex AI, Azure ML), RAG systems, semantic vector search Real-time analytics with Power BI, Looker, Kinesis Managed Cloud Services 24/7 monitoring (NOC/SOC), SLA-driven support, patching, DR management Training & Enablement Certification workshops, cloud engineering training, CoE development Required Qualifications: 15+ years of experience in enterprise IT and cloud solutions, with 5+ years in senior leadership roles Expertise in AWS, Azure, GCP (certifications preferred) Proven success in scaling cloud practices or large delivery units Hands-on experience with data platforms: Snowflake, Databricks, Azure Data Factory, Oracle In-depth understanding of FinOps principles, cost governance, and cloud performance tuning Excellent executive-level communication, strategic thinking, and client-facing presence Preferred Qualifications: Experience serving clients in regulated industries (healthcare, finance, public sector) Strong commercial acumen with experience in pre-sales, solutioning, and deal structuring MBA or advanced degree in Computer Science, Engineering, or Technology Management What We Offer: Opportunity to define and scale a global Cloud Practice from the ground up Direct influence on innovation, customer impact, and company growth Collaboration with a forward-thinking executive team and top-tier AI engineers Competitive compensation, performance-linked incentives, and potential equity Culture of ownership, agility, and continuous learning
Posted 3 weeks ago
3.0 - 8.0 years
0 Lacs
India
Remote
About Us Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. In addition to MDR and other services, Sophos’ complete portfolio includes industry-leading endpoint, network, email, and cloud security that interoperate and adapt to defend through the Sophos Central platform. Secureworks provides the innovative, market-leading Taegis XDR/MDR, identity threat detection and response (ITDR), next-gen SIEM capabilities, managed risk, and a comprehensive set of advisory services. Sophos sells all these solutions through reseller partners, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) worldwide, defending more than 600,000 organizations worldwide from phishing, ransomware, data theft, other every day and state-sponsored cybercrimes. The solutions are powered by historical and real-time threat intelligence from Sophos X-Ops and the newly added Counter Threat Unit (CTU). Sophos is headquartered in Oxford, U.K. More information is available at www.sophos.com. Role Summary Sophos is seeking a talented, experienced Software Development Engineer in Test to join our Sophos Central team. As a member of the Sophos Central Software Development Engineer in Test team, you will be working directly with Development, UX, PM and other functional groups to ensure highest quality software development and releases for the Central product. We look forward to welcoming another fantastic member onto our team! What You Will Do Design, develop, and maintain scalable and reliable test automation frameworks to ensure thorough coverage of application features Create and execute comprehensive test plans, including unit, integration, functional, and end-to-end tests to ensure high-quality releases Implement and optimize test automation within CI/CD pipelines for faster feedback cycles, leveraging parallel test execution and intelligent test segmentation Continuously improve test coverage and maintain high-quality standards by identifying gaps and addressing flaky tests. Provide detailed reporting and metrics on test results and quality status Work closely with developers, product managers, and other stakeholders to understand requirements and deliver high-quality software with automated tests from the start Incorporate performance and security testing into the automation pipeline, using tools like JMeter and OWASP ZAP to ensure robust and secure applications What Will You Bring 3-8 years of experience in Java automation testing Proficiency in Java coding and experience in writing maintainable, efficient, and scalable Java test scripts Proven experience in test automation framework development (preferably using Selenium) Experience testing RESTful web services Strong knowledge of CI/CD pipelines and experience with automation in environments like Jenkins, GitLab CI, or similar Familiarity with performance testing tools (e.g., JMeter, Gatling) and security testing tools (e.g., OWASP ZAP, Burp Suite) Desired to have experience with version control systems (e.g., Git) and code coverage tools (e.g., JaCoCo, Istanbul) Solid understanding of Agile methodologies and test strategies (unit, integration, regression, E2E, TDD) Expertise in writing clear, maintainable, and scalable test scripts Familiarity with cloud environments (e.g., preferably AWS) and containerization technologies (e.g., Docker) for scalable test execution Strong problem-solving skills and the ability to troubleshoot complex test automation issues Ready to Join Us? At Sophos, we believe in the power of diverse perspectives to fuel innovation. Research shows that candidates sometimes hesitate to apply if they don't check every box in a job description. We challenge that notion. Your unique experiences and skills might be exactly what we need to enhance our team. Don't let a checklist hold you back – we encourage you to apply. What's Great About Sophos? · Sophos operates a remote-first working model, making remote work the primary option for most employees. However, some roles may necessitate a hybrid approach. Please refer to the location details in our job postings for further information. · Our people – we innovate and create, all of which are accompanied by a great sense of fun and team spirit · Employee-led diversity and inclusion networks that build community and provide education and advocacy · Annual charity and fundraising initiatives and volunteer days for employees to support local communities · Global employee sustainability initiatives to reduce our environmental footprint · Global fitness and trivia competitions to keep our bodies and minds sharp · Global wellbeing days for employees to relax and recharge · Monthly wellbeing webinars and training to support employee health and wellbeing Our Commitment To You We’re proud of the diverse and inclusive environment we have at Sophos, and we’re committed to ensuring equality of opportunity. We believe that diversity, combined with excellence, builds a better Sophos, so we encourage applicants who can contribute to the diversity of our team. All applicants will be treated in a fair and equal manner and in accordance with the law regardless of gender, sex, gender reassignment, marital status, race, religion or belief, color, age, military veteran status, disability, pregnancy, maternity or sexual orientation. We want to give you every opportunity to show us your best self, so if there are any adjustments we could make to the recruitment and selection process to support you, please let us know. Data Protection If you choose to explore an opportunity, and subsequently share your CV or other personal details with Sophos, these details will be held by Sophos for 12 months in accordance with our Privacy Policy and used by our recruitment team to contact you regarding this or other relevant opportunities at Sophos. If you would like Sophos to delete or update your details at any time, please follow the steps set out in the Privacy Policy describing your individual rights. For more information on Sophos’ data protection practices, please consult our Privacy Policy Cybersecurity as a Service Delivered | Sophos
Posted 3 weeks ago
3.0 - 5.0 years
0 Lacs
Gujarat, India
On-site
Job Summary: We are seeking a highly experienced “Senior VAPT & Penetration Testing Specialist” to lead and ensure the quality and effectiveness of our vulnerability assessment and penetration testing operations. This role involves findings, validating findings, reviewing technical reports, ensuring compliance with standards (OWASP, PTES, NIST, etc.), and improving methodologies and tools. Key Responsibilities: Conduct in-depth vulnerability assessments and penetration tests on web, mobile, network, API, and cloud infrastructure using manual and automation. Utilize industry-standard tools like SQLMap, Burp Suite, Nessus, Nmap, and custom scripts for advanced exploitation techniques. Simulate various cyber-attacks including DDoS, Brute Force, XSS, SQL Injection, DNS attacks, and Social Engineering to identify system vulnerabilities. Perform peer reviews of technical deliverables and verify accuracy of findings and recommendations. Ensure that all assessments are aligned with industry standards such as OWASP, PTES, MITRE ATT&CK, and NIST. Act as a technical lead and mentor for junior VAPT team and QA team members. Identify gaps in the current testing methodologies and implement process improvements. Prepare detailed documentation and the VA report and ensure clear, actionable, and risk-rated reporting. Collaborate with clients and internal teams to understand scope and provide post-assessment clarifications. Present the client meeting for the future VAPT assignments. Stay updated with emerging threats, tools, techniques, and frameworks. Required Skills & Qualifications: Bachelor's or Master's degree in Computer Science, Cybersecurity, or related field. 3 to 5 years of hands-on experience in VAPT and penetration testing. In-depth knowledge of web, network, mobile, cloud, and API security. Strong understanding of secure coding practices and vulnerability management. Expertise in tools like Burp Suite, Nmap, Nessus, Metasploit, Qualys, Kali Linux, Wireshark, etc. Familiarity with SIEM, IDS/IPS, EDR tools is a plus. Excellent report writing and documentation skills. Strong communication and overseas client-interaction skills. Preferred Certifications: OSCP (Offensive Security Certified Professional) – Highly preferred CEH (Certified Ethical Hacker) CREST / GPEN / GWAPT / CISSP – Optional but desirable ISO 27001 Lead Auditor or Lead Implementer – Added advantage
Posted 3 weeks ago
7.0 years
0 Lacs
Jaipur, Rajasthan, India
On-site
Vaibhav Global Ltd (VGL) Company Overview Listed in 1996-97 on Indian stock exchanges, Vaibhav Global Ltd (VGL) is an end-to-end electronic deep discount retailer of fashion jewelry, gemstones, and lifestyle products, operating in the US, UK, Germany, and Canada. Shopping Experience Today's customers seek convenience, and VGL meets this demand through its proprietary 24/7 TV shopping channels (Shop LC in the US and Germany, and Shop TJC in the UK), as well as through various digital mediums including websites, mobile apps, OTT platforms, social media, and third-party marketplaces. VGL reaches almost 124 million households across the US, UK, and Germany. As digitization progresses and online retail continues to grow, VGL's portfolio and omni-channel strategy will evolve accordingly. Financials And Workforce VGL reported a group turnover of approximately Rs. 3,041 Crore (FY 2023-2024) and employs over 3800 people globally. The company’s head office and main manufacturing facility are in Jaipur, India, employing around 3000 people, including contract workers. Acquisitions Mindful Souls B.V.: In FY23-24, VGL acquired Mindful Souls B.V., a Netherlands-based e-commerce company specializing in subscription-based online sales of fashion jewelry, gemstones, and lifestyle products. This acquisition is expected to leverage VGL's sourcing and manufacturing strengths while enhancing digital business capabilities. Ideal World: VGL, through its subsidiary Shop TJC Ltd (UK), acquired the assets of Ideal World, a well-known teleshopping and digital retail brand in the UK. This acquisition includes IP rights, broadcasting rights, studio equipment, and other intangible assets. Environmental And Social Responsibility VGL is committed to sustainable business practices and renewable energy initiatives. The company's SEZ unit in India received the ‘Excellence Award’ for ‘IGBC Performance Challenge 2021 for Green Built Environment,’ reflecting its dedication to environmental sustainability. VGL's ‘Your Purchase Feeds...’ initiative has provided 87 million meals to school children in India, the US, and the UK. The company encourages employees to donate at least two hours each month to charitable causes, tracked through its performance system. VGL is also a Great Place to Work (GPTW) certified organization. Shop LC Overview Shop LC, a VGL subsidiary, was established in Austin, TX in 2007 and now broadcasts live to 75 million homes in the US. The growing e-commerce presence is supported by the website Shop LC. Shop LC ships approximately 25,000 products daily to US customers and employs around 550 people in various operational roles. The US is VGL’s largest market, contributing 68% to consolidated revenue. TJC Overview TJC, another VGL subsidiary, was established in London, UK in 2006 and broadcasts live to 25 million homes in the UK. The company’s e-commerce presence is supported by the website TJC. TJC ships approximately 12,000 products daily to UK customers and employs around 220 people in London, with extended teams in India. Shop LC Germany Overview Launched in 2021 from Dusseldorf, Germany, Shop LC Germany TV & e-commerce is a new market with significant growth potential. The business currently reaches 27 million households and is expanding. The e-commerce site can be accessed at Shop LC Germany. Our Purpose Delivering joy. Our Vision Be the Value Leader in Electronic Retailing of Jewelry and Lifestyle Products. Our Mission To deliver one million meals per day to children in need by FY40 through our one-for-one meal program: your purchase feeds... Our Core Values Teamwork Honesty Commitment Passion Positive Attitude As a Security Specialist, you will help keep our digital systems safe. This includes setting up firewalls and web protections, monitoring network activity, and responding to security issues quickly. You’ll also support compliance, document security procedures, and work with other teams on technical tools. Key Responsibilities Install and manage firewalls (e.g., Fortinet, Palo Alto) and WAF tools (e.g., Azure WAF, Cloudflare) Set up and maintain Azure networking (routing, private access) Create and enforce security access rules Monitor logs, detect threats, and resolve incidents Implement CNAPP/CSPM tools in Azure cloud environments Collaborate with DevOps to add security to CI/CD pipelines Support audits (like PCI-DSS, ISO 27001, SOC 2) Write SOPs, runbooks, and incident support documentation Evaluate new tools and run tests as needed Required Skills And Experience 4–7 years working in network and cloud security Strong experience with NGFWs, WAFs, Azure cloud security tools Knowledge of SIEM platforms and packet capture tools (e.g., Wireshark) Good understanding of VPNs, TCP/IP, and application security Excellent problem-solving and communication skills
Posted 3 weeks ago
0.0 years
2 - 3 Lacs
Delhi, Delhi
On-site
About the Role As a fresher SOC Analyst in an OEM environment, you'll learn how to operate SIEM platforms that monitor networking devices and hardware logs. This is a hands-on opportunity to develop foundational cybersecurity skills, from basic alert triage to refining detection capabilities. Key Responsibilities 1. SIEM Monitoring & Alert Triage Use SIEM tools to monitor alerts and events from network devices, and endpoints. Perform initial triage: distinguish security incidents from false positives, and escalate them appropriately. Document and log all alert investigations clearly in the SOC ticketing system. 2. Log & Incident Documentation Analyze system and network logs to detect anomalies or IOC patterns. Support incident documentation with root cause analysis and step-by-step actions taken. Maintain detailed incident records to support compliance and escalation. 3. SIEM Configuration Support Assist in onboarding new log sources: collect, normalize, and categorize OEM system logs. Help tune existing correlation rules to reduce alert fatigue and improve accuracy under guidance 4. Learning, Process & Collaboration Collaborate with senior analysts and network engineers to enhance detection coverage and FAQ procedures. Participate in SIEM rule tuning, dashboard creation, and documenting standard operating procedures (SOPs). Engage in continuous learning: attend training, internal sessions, and keep up with emerging threats and best practices. Technical Skills & Qualifications Basic knowledge of networking (OSI model, TCP/IP, DNS, HTTP), security principles, and common cyber threats (malware, phishing, ransomware) . Hands-on experience with home labs or training platforms . Strong problem-solving skills and attention to detail when investigating logs. Exposure to Python, PowerShell, or regex helpful for log parsing or automation. Soft Skills Demonstrable curiosity and eagerness to learn the best entry-level analysts are team players looking to grow and iterate fast . Effective communication , both written and verbal for documenting incidents and collaborating across teams. Attention to detail and discipline in following SOPs and logging investigative steps. Ability to work in shifts (including early or late hours) as part of a SOC 24/7 environment. Job Type: Full-time Pay: ₹240,000.00 - ₹300,000.00 per year Location: Dehli, Delhi (Required) Work Location: In person
Posted 3 weeks ago
0.0 - 3.0 years
0 Lacs
Navi Mumbai, Maharashtra
On-site
Role: Network Security Engineer (WAF F5) - L2 Experience: 3 to 6 years of experience working on Network Security Location: Mumbai Product Certification F5 WAF Certified Professional Required Candidate profile Overall 3-6 years’ experience in network security with at least 3 years in managing WAF solutions Proficiency with management WAF Experience in working with Windows, Linux, Unix environments Hands-on experience in commissioning and Implementation of WAF solutions and integrating with various management and authentication authorization tools (email, AD, IAM, SIEM) Experience in automating processes using scripting, configuration (SOAR) tools Experience in managing policies and exceptions Experience in packet capture, analysis, and troubleshooting tools Product knowledge of WAF solution. Incident, problem, service request management, change management, configuration management & capacity management of WAF Setup Proactively utilize network monitoring tools to isolate events before service degradation occurs Supporting incident monitoring and incident analysis/response initiatives Coordinate with users to ensure timely and satisfactory resolution for any trouble tickets, troubleshooting layers 1, 2, and 3 of the OSI Model. Troubleshooting network, transport, session, presentation and applications layers Conducting daily performance checks on devices, periodic audits and compliance Performing immediate troubleshooting as the situation dictates for any network outages as reported by users, sensors, and/or operational personnel Implement, and maintain network security policy, standards, and procedures. Deploying and maintaining access and security policies for WAF solutions. Maintaining service levels as well as oversight of the day-to-day configuration, administration and monitoring of the network security infrastructure in a 24/7. Co-ordination with OEMs for TAC support, RMA, replacement & and reconfiguration of WAF. Creating technical documentation, as-built network diagrams, inventory control documentation, and security documentation. Co-ordinate helpdesk team, other IT support teams, and application support teams to jointly troubleshoot and fix the high priority/severity incidents. Investigate, isolate, and resolve WAF incidents with RCA. Designing and implementing WAF solutions for DC/DR/Cloud and Branch office environments. Create SOP/Run book and update knowledgebase in ITSM tools. Work to automate and integrate the tools with REST API/SDK with security dashboard, and Infosec tools (AD, IDAM, PAM, SIEM, SOAR, etc.) Closure of compliance and audit points as per the agreed timelines. Patch updates, and upgradation as per the Bank's compliance and audit requirements Should be able to Lead and mentor L1 & L2 engineers team. Must be comfortable in reading packet captures and analysis (Wireshark/Pcap). Excellent verbal and written communication skills Demonstrated success in managing, analyzing, and solving complex issues Ownership of their technology. Ensure Ticket closure in SLA and follow up for escalated tickets SLA reporting for respective technology. Job Type: Full-time Pay: Up to ₹1,000,000.00 per year Schedule: Day shift Supplemental Pay: Performance bonus Application Question(s): Did you worked in the domains like WAF F5? How many years of experience in Network Security? Experience: minimum: 3 years (Required) Location: Navi Mumbai, Maharashtra (Required) Work Location: In person
Posted 3 weeks ago
2.0 years
8 - 12 Lacs
Mumbai Metropolitan Region
On-site
bout the Company : A leading global IT services provider, specializing in consulting, application development, systems integration, and managed services for enterprises and governments worldwide. Note: We have two open positions – SOC Analyst L1 and SOC Analyst L2. Mandatory Requirements: Certification: Active CEH (Certified Ethical Hacker) certification from EC Council is mandatory. Experience: For SOC Analyst – L1: Minimum 2 years of experience in the same role. For SOC Analyst – L2: Minimum 3 years of experience in the same role. Other Details: Academic Qualification: Graduate in a related field. Location: Mumbai (Kurla) Notice Period: Immediate to 30 days only. Job Type: Work from Office. Workdays: 5 days a week, normal day shift. Interview process: Technical → Managerial → HR Job Description: Position 1: SOC Analyst – L1 Must-Have Skills: Minimum 2 years of experience in a SOC L1 role Hands-on experience with EDR, incident response, and threat hunting Proficiency in SIEM tools (preferably Splunk) Active CEH certification from EC-Council is mandatory Key Performance Indicators: Proper configuration and maintenance of the SIEM system Effective incident response procedures Timely identification and reporting of security vulnerabilities Ensuring SIEM helps in meeting regulatory compliance Position 2: SOC Analyst – L2 Must-Have Skills: Minimum 4 years of total SOC experience, with at least 3 years at L2 level Strong expertise in EDR, incident response, threat hunting, and Splunk Active CEH certification from EC-Council is mandatory Good communication skills (preferred) Key Performance Indicators: Configure and maintain SIEM system Develop and document incident response procedures Align SIEM rules with security policies Conduct computer forensic investigations Proactively identify and report system security loopholes Skills: edr tools,security monitoring,ceh certification,threat hunting,splunk,siem,edr,incident response,siem tools,forensic investigations,soc operations,siem (preferably splunk),soc,siem platforms,communication skills,soc operations, including edr, threat hunting, and incident response.,soc analyst – l1/l2,soc analyst,siem tools (splunk),siem (splunk)
Posted 3 weeks ago
0 years
0 Lacs
Mumbai Metropolitan Region
On-site
Advanced Incident Analysis: Utilize advanced tools and techniques to analyze and investigate security incidents detected within the organization's networks and systems. Incident Response: Lead incident response efforts, coordinating with internal and external stakeholders to mitigate and remediate security incidents promptly. Team Leadership: Provide mentorship and guidance to the L1 SOC team, assisting in the development of their skills in incident analysis, parser creation, rule views, and report management. Parser Creation: Develop and maintain parsers to enhance the capability of the SOC's security information and event management (SIEM) system in detecting and correlating security events. Rule View Management: Manage and optimize rule views within the SIEM platform to ensure accurate and timely detection of security threats. Report Management: Oversee the generation and distribution of security reports, including incident reports, trend analysis, and recommendations for improvement. Collaboration: Work closely with other teams within the organization, including IT operations, network engineering, and application development, to improve overall security posture and incident response capabilities. Location: Mumbai - VPTS, Mumbai, Maharashtra, India
Posted 3 weeks ago
0.0 - 7.0 years
0 Lacs
Jaipur, Rajasthan
On-site
Vaibhav Global limited Jaipur, Rajasthan khushboo.rathore@vaibhavglobal.com Posted : 5 hours ago Vaibhav Global Ltd (VGL) Company Overview: Listed in 1996-97 on Indian stock exchanges, Vaibhav Global Ltd (VGL) is an end-to-end electronic deep discount retailer of fashion jewelry, gemstones, and lifestyle products, operating in the US, UK, Germany, and Canada. Shopping Experience: Today's customers seek convenience, and VGL meets this demand through its proprietary 24/7 TV shopping channels (Shop LC in the US and Germany, and Shop TJC in the UK), as well as through various digital mediums including websites, mobile apps, OTT platforms, social media, and third-party marketplaces. VGL reaches almost 124 million households across the US, UK, and Germany. As digitization progresses and online retail continues to grow, VGL's portfolio and omni-channel strategy will evolve accordingly. Financials and Workforce: VGL reported a group turnover of approximately Rs. 3,041 Crore (FY 2023-2024) and employs over 3800 people globally. The company’s head office and main manufacturing facility are in Jaipur, India, employing around 3000 people, including contract workers. Acquisitions: Mindful Souls B.V.: In FY23-24, VGL acquired Mindful Souls B.V., a Netherlands-based e-commerce company specializing in subscription-based online sales of fashion jewelry, gemstones, and lifestyle products. This acquisition is expected to leverage VGL's sourcing and manufacturing strengths while enhancing digital business capabilities. Ideal World: VGL, through its subsidiary Shop TJC Ltd (UK), acquired the assets of Ideal World, a well-known teleshopping and digital retail brand in the UK. This acquisition includes IP rights, broadcasting rights, studio equipment, and other intangible assets. Environmental and Social Responsibility: VGL is committed to sustainable business practices and renewable energy initiatives. The company's SEZ unit in India received the ‘Excellence Award’ for ‘IGBC Performance Challenge 2021 for Green Built Environment,’ reflecting its dedication to environmental sustainability. VGL's ‘Your Purchase Feeds...’ initiative has provided 87 million meals to school children in India, the US, and the UK. The company encourages employees to donate at least two hours each month to charitable causes, tracked through its performance system. VGL is also a Great Place to Work (GPTW) certified organization. Shop LC Overview: Shop LC, a VGL subsidiary, was established in Austin, TX in 2007 and now broadcasts live to 75 million homes in the US. The growing e-commerce presence is supported by the website Shop LC. Shop LC ships approximately 25,000 products daily to US customers and employs around 550 people in various operational roles. The US is VGL’s largest market, contributing 68% to consolidated revenue. TJC Overview: TJC, another VGL subsidiary, was established in London, UK in 2006 and broadcasts live to 25 million homes in the UK. The company’s e-commerce presence is supported by the website TJC. TJC ships approximately 12,000 products daily to UK customers and employs around 220 people in London, with extended teams in India. Shop LC Germany Overview: Launched in 2021 from Dusseldorf, Germany, Shop LC Germany TV & e-commerce is a new market with significant growth potential. The business currently reaches 27 million households and is expanding. The e-commerce site can be accessed at Shop LC Germany. Our Purpose: Delivering joy. Our Vision: Be the Value Leader in Electronic Retailing of Jewelry and Lifestyle Products. Our Mission: To deliver one million meals per day to children in need by FY40 through our one-for-one meal program: your purchase feeds... Our Core Values: Teamwork Honesty Commitment Passion Positive Attitude As a Security Specialist, you will help keep our digital systems safe. This includes setting up firewalls and web protections, monitoring network activity, and responding to security issues quickly. You’ll also support compliance, document security procedures, and work with other teams on technical tools. Key Responsibilities Install and manage firewalls (e.g., Fortinet, Palo Alto) and WAF tools (e.g., Azure WAF, Cloudflare) Set up and maintain Azure networking (routing, private access) Create and enforce security access rules Monitor logs, detect threats, and resolve incidents Implement CNAPP/CSPM tools in Azure cloud environments Collaborate with DevOps to add security to CI/CD pipelines Support audits (like PCI-DSS, ISO 27001, SOC 2) Write SOPs, runbooks, and incident support documentation Evaluate new tools and run tests as needed Required Skills and Experience 4–7 years working in network and cloud security Strong experience with NGFWs, WAFs, Azure cloud security tools Knowledge of SIEM platforms and packet capture tools (e.g., Wireshark) Good understanding of VPNs, TCP/IP, and application security Excellent problem-solving and communication skills Job Overview Compensation ₹ Competitive Salary & Benefits Yearly Level Mid Location Jaipur, Rajasthan Experience 3+ Years Qualification Bachelors Degree Work Mode: Onsite Job Type: Fulltime
Posted 3 weeks ago
0.0 years
0 Lacs
Ahmedabad, Gujarat
On-site
Job Information Work Experience 0-0.6 (Associate Cyber Security Analyst) Industry IT Services Job Type Full time Date Opened 07/24/2025 City Ahmedabad State/Province Gujarat Country India Zip/Postal Code 380015 About Us E2logy is a leading software solutions company dedicated to empowering businesses with innovative technology and exceptional service. We combine our expertise in various domains with cutting-edge development practices to deliver high-quality, custom software solutions that cater to your unique needs and goals. Visit our website: https://e2logy.com/ to learn more about our services and expertise. Job Description We are seeking a Fresher Associate Cyber Security Analyst – VAPT who will play a supportive role in helping protect the organization’s cloud infrastructure, web and mobile applications, and internal systems. This entry-level role is ideal for recent graduates passionate about cybersecurity and eager to begin their career in a hands-on, learning-focused environment. You will work under the guidance of senior team members to identify vulnerabilities, support penetration testing activities, and enhance our overall security posture in alignment with global security standards such as ISO/IEC 27001 . Responsibilities: Assist in conducting vulnerability assessments and penetration testing on Web applications,Mobile applications,Cloud-based environments,Internal systems and network infrastructure Support the use of tools like Burp Suite, Nmap, Wireshark, Nessus, OWASP ZAP, etc., under supervision. Document basic findings, potential risks, and help prepare technical reports for internal teams. Work closely with senior analysts, DevOps, and development teams to understand and remediate security weaknesses. Contribute to maintaining and improving the organization’s compliance with ISO/IEC 27001 security guidelines , including proper documentation, risk identification, and implementation of relevant controls. Stay updated with emerging threats, vulnerabilities, and VAPT methodologies aligned with industry standards like OWASP Top 10 , ISO 27001 etc . Help in maintaining compliance with key standards such as OWASP Top 10, ISO 27001, PCI-DSS, etc. Requirements Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field. Basic understanding of web application security, network protocols, and common attack vectors. Exposure to or academic use of tools such as Burp Suite, Nmap, Wireshark, or Kali Linux. Familiarity with OWASP Top 10, CVEs, and basic cybersecurity concepts. Strong curiosity, analytical mindset, and attention to detail. Good communication skills and a willingness to learn in a team-oriented environment. Preferred Skills : Basic awareness of secure coding practices or code review. Introductory knowledge of cloud security, SIEM, or IDS/IPS tools. knowledge of ISO/IEC 27001 controls , risk assessment, or compliance practices. Certifications Like CompTIA Security+,Certified Ethical Hacker (CEH),eLearnSecurity Junior Penetration Tester (eJPT),ISO/IEC 27001 Foundation or Practitioner(Not Mandatory) Benefits Competitive compensation and performance-linked incentives. Health insurance and employee wellness benefits. Career development support and learning resources. Opportunity to work with modern cybersecurity tools and frameworks. Work Environment: Collaborative and supportive office setting with Alternative Saturday Working Flexibility to extend working hours during high-priority assessments or audits. Application Process: Please submit your resume, cover letter, and optionally a portfolio of academic or personal projects to careers@e2logy.com
Posted 3 weeks ago
5.0 - 9.0 years
0 Lacs
maharashtra
On-site
As a Senior Cyber Security Analyst at Worley, you will have the opportunity to work alongside a collaborative and inclusive team to deliver projects for clients while enhancing your skills and expertise in the field. Worley is a global professional services company specializing in energy, chemicals, and resources, committed to sustainable energy solutions and providing essential resources to society. The ideal candidate for this role will be a Subject Matter Expert (SME) in Cyber Security, particularly focusing on Data Loss Prevention (DLP). You will be responsible for designing, implementing, monitoring, and reporting on information security events within the DLP scope. Your role will involve managing security tools and IT systems with a specific emphasis on DLP enablement. Key responsibilities of the role include: - Designing, implementing, and optimizing DLP policies to prevent unauthorized access and data exfiltration. - Serving as an SME for DLP solutions, technologies, and best practices. - Monitoring, analyzing, and responding to DLP alerts and incidents to enhance detection accuracy. - Ensuring compliance with data protection regulations and collaborating with cross-functional teams. To excel in this role, you should possess the following attributes: - Ability to balance security measures with business needs. - Proactive approach to identifying and mitigating data loss risks. - Proficiency in DLP solutions such as Microsoft Purview, Symantec, Forcepoint, etc. - Strong knowledge of DLP policies, content inspection techniques, and data classification models. - Experience with cloud-based DLP solutions and understanding of network security and encryption techniques. At Worley, we foster a values-inspired culture that encourages belonging, connection, and innovation. We are committed to creating a diverse, inclusive, and respectful workplace where everyone can thrive and contribute to sustainable change. Join us to explore diverse opportunities, broaden your horizons, and drive impactful transformation in the energy sector. Please note that Worley takes data protection seriously and complies with EU and local data protection laws. If you are interested in this role, please apply directly to Worley as applications through recruitment agencies will not be considered.,
Posted 3 weeks ago
4.0 - 10.0 years
0 Lacs
maharashtra
On-site
As a Manager, Information Security Incident Response at NTT DATA, you will be responsible for leading the Information Security Incident Response Management team. Your role will involve ensuring that your team is well-equipped to detect and monitor threats and suspicious activities affecting the organization's technology domain. You will serve as the escalation point for incident workflows and actively participate in delivering security measures through analytics and threat hunting processes. Your primary responsibilities will include managing a team of security professionals while fostering a collaborative and innovative team culture focused on operational excellence. You will be expected to have at least 10 years of experience in SOC, with a minimum of 4 years as a SOC Manager. Additionally, you should have 4+ years of experience in SIEM (Splunk) and hold a CISM/CISSP certification. Your role will also involve troubleshooting technical issues to ensure project success, implementing changes to align with client demands, and providing guidance to the team to achieve specific objectives. You will be responsible for developing and executing a timeline for the team to achieve its goals, monitoring incident detection and closure, and presenting regular metrics and reports. Furthermore, you will be required to conduct periodic DR drills, design SIEM solutions to enhance security value, and conduct root-cause analysis for security incidents. It will be vital for you to ensure that the SIEM system is optimized for efficient performance, align reports SIEM rules and alerts with security policies, and compliance reports requirements. You will also collaborate with SIEM solution vendors for updates, patches, and support to ensure the system's reliability and effectiveness. To qualify for this role, you should have a Bachelor's degree or equivalent in Information Technology, Computer Science, or a related field, along with industry certifications such as CISSP or CISM. You should possess advanced experience in the Technology Information Security industry, prior experience working in a SOC/CSIR, and advanced knowledge of tools, techniques, and processes used by threat actors. Additionally, you should have practical knowledge of indicators of compromise (IOCs), end-point protection, enterprise detention, response software, SIEM, and IPS technologies. This is an on-site working position at NTT DATA, where diversity and inclusion are embraced, and you will have the opportunity to continue growing, belonging, and thriving in a collaborative environment. NTT DATA is an Equal Opportunity Employer, and your career progression here will involve seizing new opportunities, expanding your skills, and preparing for future advancements within the global team.,
Posted 3 weeks ago
15.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NA Educational Qualification : 15 years full time education Summary: As an Application Developer, you will engage in the design, construction, and configuration of applications tailored to fulfill specific business processes and application requirements. Your typical day will involve collaborating with team members to understand project needs, developing innovative solutions, and ensuring that applications are optimized for performance and usability. You will also participate in testing and debugging processes to ensure the applications function as intended, contributing to the overall success of the projects you are involved in. Roles & Responsibilities: - Expected to perform independently and become an SME. - Required active participation/contribution in team discussions. - Contribute in providing solutions to work related problems. - Assist in the documentation of application processes and workflows. - Engage in continuous learning to stay updated with the latest technologies and best practices. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Information and Event Management (SIEM). - Strong understanding of application development methodologies. - Experience with security protocols and compliance standards. - Familiarity with programming languages relevant to application development. - Ability to troubleshoot and resolve application issues effectively. Additional Information: - The candidate should have minimum 2 years of experience in Security Information and Event Management (SIEM). - This position is based at our Chennai office. - A 15 years full time education is required., 15 years full time education
Posted 3 weeks ago
10.0 - 14.0 years
0 Lacs
noida, uttar pradesh
On-site
As a Security leader with a background in AWS and cloud Security, you play a crucial role in defining and enforcing the security policies and procedures of the organization. With excellent written and verbal communication skills, exceptional organizational abilities, and expert-level proficiency in IT and Cloud Security, you will be responsible for architecting and implementing IT Security policies while reporting to the Director of Information Technology. In this full-time role, your essential duties and responsibilities include providing leadership and technology vision to the IT Security team, performing internal and external security audits, documenting, implementing, and monitoring adherence to IT security standards, as well as assessing and improving security metrics. You will work on enhancing security tools and operations, monitor and manage IDS, vulnerability scanning, and assessments, and serve as the Data Privacy Officer (DPO) for the company. Creating awareness within the company regarding Security, Privacy, and compliance requirements, ensuring security and privacy training for staff involved in data processing, conducting security and privacy audits, and serving as the point of contact between the company and clients for privacy controls are key aspects of your role. Additionally, you will be responsible for log aggregation and analysis, managing Anti-Virus software, addressing security and data breach-related incidents, and ensuring customer satisfaction while being accountable for individual product/project success and quality. To qualify for this position, you must hold certifications such as CISSP, Security+, or equivalent, along with having 10+ years of Cyber Security experience, 5+ years of IT management experience, 5+ years of AWS experience, and 3+ years of experience with Identity & Access Management tools. Your extensive experience with Linux & Windows Security administration, managing Cloud and Container Security, Network and Application penetration testing, vulnerability scanners, IDS, IPS deployment and monitoring, SIEM tools, security automation, incident response & management, vulnerability management, and patch management will be essential. Moreover, your role will involve ensuring organization efficiencies through continual improvement programs, representing the organization in inspections and audits, driving action plans to closure, conducting deep dive RCAs and ensuring CAPAs are closed, and maintaining a metrics-driven approach. Additional qualifications such as experience with monitoring tools like Datadog, Change Management, Configuration Management, Infrastructure as Code tools, hardening Operating Systems and Applications, endpoint security management, working in GxP environments, and familiarity with various practices will be beneficial. With no travel expectations, this role requires a dedicated and experienced professional who can effectively lead security operations and teams, prioritize security and privacy, and drive continuous improvement initiatives to enhance organizational security posture.,
Posted 3 weeks ago
10.0 - 14.0 years
0 Lacs
karnataka
On-site
As a Consultant (CSM) at CYFIRMA, you will play a crucial role in customer onboarding, technical support, account escalations, customer renewals, upsell campaigns, and establishing customer support practices. Your primary responsibility will be to ensure new customers are efficiently onboarded to CYFIRMA's products and services, guiding them to realize ROI promptly. In this role, you will need to have a deep understanding of CYFIRMA's product and service offerings to provide technical support and training to customers. Your focus will be on educating customers on the flexibility and capabilities of CYFIRMA's solutions, aligning them with their business needs and plans. Additionally, you will handle account escalations, ensuring timely responses to alerts, red flags, or feedback reported by customers. Moreover, you will be responsible for customer renewals, driving upsell campaigns to increase the lifetime value of CYFIRMA's customers. Periodic health checks of customer accounts will be necessary to ensure customer engagement and satisfaction. You will collaborate with international teams to enhance research, service operations, and platform development. To excel in this role, you should have at least 10 years of experience in managing customers and accounts in the cybersecurity domain. Proficiency in customer service practices, technical aptitude to learn CYFIRMA's offerings, and familiarity with OSINT or security analysis tools are essential. Knowledge of IT networking, internet technologies, firewalls, and cybersecurity tools, along with experience in CRM software like Salesforce, will be beneficial. A bachelor's degree in computer science or a related field is required, along with proficiency in the Microsoft Office Suite. Excellent communication skills in English, both written and verbal, are necessary as this role involves client-facing interactions remotely. Holding security certifications such as GCTI, CHFI, CEH, Security+, etc., will be an additional advantage. Join CYFIRMA's dynamic team as a Consultant (CSM) in Bangalore, and contribute to enhancing customer success through effective onboarding, support, and relationship management in the cybersecurity industry.,
Posted 3 weeks ago
0.0 - 4.0 years
0 Lacs
pune, maharashtra
On-site
The Cybersecurity Intern will be responsible for supporting various aspects of cybersecurity operations including governance, risk, compliance, assessments, and Security Operations Center (SOC) activities. The Intern will have the opportunity to work on different projects across multiple locations such as Thane, Pune, Bengaluru, and Mumbai. This internship will provide hands-on experience in the field of cybersecurity and offers a potential full-time position upon successful completion. In the role of CyberSecurity Intern - GRC, you will assist in developing and implementing information security policies, standards, and procedures. Your responsibilities will include educating employees on best practices, collaborating on security awareness programs, and supporting clients in establishing effective security governance frameworks. Additionally, you will help in compliance programs, conduct security audits, and identify vulnerabilities in clients" IT infrastructure. As a CyberSecurity Intern - Assessment, your key responsibilities will involve conducting Vulnerability Assessment and Penetration Testing (VAPT) for various applications, performing source code and configuration reviews, and preparing detailed security findings and recommendations. You will also guide clients in patching vulnerabilities, stay updated on cybersecurity trends, and contribute to continuous learning and adaptation in the field. In the role of CyberSecurity Intern - SOC, you will monitor security events and alerts, assist in analyzing potential threats, and participate in the investigation and documentation of security incidents. You will research emerging cyber threats, work on improving detection use cases, apply threat intelligence to monitoring activities, and support in creating reports and dashboards. Requirements for this internship include pursuing a degree in Computer Science, Information Security, or a related field, basic understanding of cybersecurity principles and tools, familiarity with Linux/Windows systems and networking concepts, eagerness to learn in a SOC/MDR environment, excellent communication and analytical skills. Certifications like CompTIA Security+ and CEH are preferred but not mandatory.,
Posted 3 weeks ago
7.0 years
0 Lacs
Greater Kolkata Area
On-site
Role We are looking for a Principal Security Content Developer with deep technical expertise in security event data engineering, parsing, and content development across modern SIEM platforms. In this role, you will lead the design and implementation of scalable, high-fidelity security detections, ensuring normalized and enriched data flows into SIEM tools like Microsoft Sentinel, Splunk, and Google Chronicle. This role is ideal for a hands-on security engineer with strong experience in data modeling, parsing, and log source : Architect, develop, and optimize detection content across SIEM platforms such as Microsoft Sentinel, Splunk, and Google Chronicle. Normalize and structure diverse log sources using schemas like Splunk CIM, Microsoft Sentinel, OCSF, and Chronicle UDM to ensure consistent detection across the board. Collaborate with teams, including Threat Labs and Data Engineering, to improve parsing, data transformation, and use case configurations. Perform end-to-end development, customization, and onboarding of supported and custom data sources (EDR, firewall, antivirus, proxies, OS, databases). Repair events with missing or incorrect data, create parser extensions, and manage flow logic for log ingestion pipelines. Conduct log source analysis and maintain robust documentation of data structures, parsing rules, and detection logic. Build and maintain monitoring reports to ensure data pipeline availability and proactively identify performance issues or gaps in data coverage. Continuously evaluate and refine detection content and parsing logic for high fidelity and low false-positive rates. Requirements 7+ years of experience in security engineering, detection content development, or SIEM management. Strong hands-on experience with SIEM platforms, particularly Microsoft Sentinel, Splunk, and Chronicle. Expertise with multiple data models, including Splunk CIM, Sentinel schemas, Chronicle UDM, and OCSF. Experience working with diverse log sources (e. g., EDRs, firewalls, antivirus, proxies, databases, OS logs). Skilled in event parsing, field extraction, normalization, and enrichment for log data. Familiarity with scripting/query languages such as KQL, SPL, and UDM search syntax. Strong understanding of SOC operations, detection engineering workflows, and threat modeling frameworks (MITRE ATT& CK, etc. ). Preferred Qualifications Experience working with cloud-native and hybrid security architectures. Familiarity with data transformation tools and stream processing pipelines. Previous collaboration with threat research or threat intelligence teams. Security certifications such as GCIA, GCTI, or similar are a plus. (ref:hirist.tech)
Posted 3 weeks ago
15.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NA Educational Qualification : 15 years full time education Summary: As an Application Developer, you will engage in the design, construction, and configuration of applications tailored to fulfill specific business processes and application requirements. Your typical day will involve collaborating with team members to understand project needs, developing innovative solutions, and ensuring that applications are optimized for performance and usability. You will also participate in testing and debugging processes to ensure the applications function as intended, contributing to the overall success of the projects you are involved in. Roles & Responsibilities: - Expected to perform independently and become an SME. - Required active participation/contribution in team discussions. - Contribute in providing solutions to work related problems. - Assist in the documentation of application processes and workflows. - Engage in continuous learning to stay updated with the latest technologies and best practices. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Information and Event Management (SIEM). - Strong understanding of application development methodologies. - Experience with security protocols and compliance standards. - Familiarity with programming languages relevant to application development. - Ability to troubleshoot and resolve application issues effectively. Additional Information: - The candidate should have minimum 2 years of experience in Security Information and Event Management (SIEM). - This position is based at our Chennai office. - A 15 years full time education is required., 15 years full time education
Posted 3 weeks ago
3.0 - 7.0 years
0 Lacs
haryana
On-site
Tower Research Capital, a leading quantitative trading firm established in 1998, has earned a stellar reputation for its high-performance platform and independent trading teams. With over 25 years of innovation, the firm is renowned for its ability to identify unique market opportunities. Home to exceptional systematic trading and engineering talent, Tower empowers portfolio managers to develop their teams and strategies independently, while benefiting from the advantages of being part of a large, global organization. Engineers at Tower excel in developing electronic trading infrastructure at a world-class level, tackling complex challenges in low-latency programming, FPGA technology, hardware acceleration, and machine learning. The firm's continuous investment in top engineering talent and cutting-edge technology ensures that its platform remains unparalleled in terms of functionality, scalability, and performance. Every employee at Tower contributes to its success. The Business Support teams play a crucial role in constructing and maintaining the platform that drives the firm's operations, combining market access, data, compute, and research infrastructure with risk management, compliance, and a range of business services. These teams enable the trading and engineering teams to achieve their best performance. At Tower, employees thrive in a stimulating, results-driven environment where highly intelligent and motivated colleagues inspire each other to reach their full potential. As a member of the Global Cybersecurity team, you will work to enhance the security posture and services by monitoring, identifying, and addressing security gaps and countermeasures. Location: Gurgaon, India Team: Global Security Operations Shift Timing: 6:00 AM IST 3:00 PM IST with rotational weekend support as part of 24x7 operations Responsibilities: - Monitoring alerts for potential security incidents and information requests, utilizing real-time channels, tools, dashboards, reports, chat sessions, and tickets. - Following incident-specific procedures to conduct basic triage of potential security incidents, determining their nature, priority, and eliminating false positives. - Investigating and validating alerts to identify scope, impact, and root cause using available telemetry and threat intelligence. - Escalating confirmed incidents with comprehensive evidence, impact assessment, and recommended containment/remediation actions. - Collaborating with stakeholders and third-party security service providers to triage alerts, events, or incidents. - Monitoring and analyzing Security Information and Event Management (SIEM) to identify security issues for remediation. - Developing detection content, correlation rules, and queries in SIEM platforms to enhance threat detection capabilities. - Contributing to incident response playbooks, runbooks, and process enhancements. - Participating in threat hunting activities, adversary emulation exercises, and purple teaming efforts. - Maintaining accurate documentation of investigations, incidents, and actions in ticketing systems. - Staying informed of the current threat landscape, attacker tactics, and vulnerabilities relevant to Tower's environment. - Interacting with customers/users in a professional and positive manner. Requirements: - Bachelor's Degree in Computer Science, Information Security, or Information Technology. - 3+ years of hands-on experience in a Security Operations Center (SOC) or threat detection/incident response role in a mid to large-scale organization. - Proven track record in performing triage of potential security incidents and experience with various technologies including SIEM, EDR/NDR/XDR, web proxies, vulnerability assessment tools, IDS/IPS, firewalls, and data leakage prevention. - Strong understanding of various operating systems, network protocols, malware behavior, attacker techniques, and common attack vectors. - Willingness to work in early shifts and provide round-the-clock support, including weekend shifts. Soft Skills & Work Traits: - Strong analytical, investigative, and troubleshooting skills. - Effective written and verbal communication skills, with the ability to simplify complex security issues. - Organized, detail-oriented, and capable of managing multiple priorities under pressure. - Passion for security, continuous learning, and operational excellence. - Comfortable working in a rotating shift model, including weekend support. - Strong desire to understand security incidents thoroughly. Benefits: - Tower's headquarters are located in the historic Equitable Building in NYC's Financial District, with a global impact and offices worldwide. - The firm fosters a culture where smart, driven individuals thrive in a collaborative environment without egos. - Benefits include generous paid time off, financial wellness tools, hybrid working opportunities, daily meals and snacks, wellness experiences, volunteer opportunities, social events, continuous learning opportunities, and more. At Tower, you will find a welcoming and collaborative culture, a diverse team, and a workplace that values both performance and enjoyment. Join a team of great people doing great work together. Tower Research Capital is an equal opportunity employer.,
Posted 3 weeks ago
3.0 - 7.0 years
0 Lacs
ludhiana, punjab
On-site
You will be responsible for delivering high-quality cybersecurity training sessions to individuals at various skill levels. Your role will involve preparing and presenting training materials, conducting hands-on labs, and providing ongoing support to ensure the success of our cybersecurity training programs. Key Responsibilities: - Develop, design, and deliver engaging cybersecurity training programs on various topics including network security, threat analysis, ethical hacking, risk management, data protection, and compliance. - Conduct theoretical and hands-on sessions using real-world examples and case studies to reinforce key concepts. - Evaluate the effectiveness of training programs and make improvements based on feedback. - Stay updated with the latest trends, threats, and best practices in the cybersecurity field to ensure training content is current. - Provide guidance and mentoring to participants, answering questions and offering solutions to cybersecurity challenges. - Develop training materials such as presentations, manuals, and lab exercises. - Administer exams or certifications to assess participants" understanding of the material. - Customize training solutions based on client or organizational needs. - Assist in creating documentation and resources for post-training reference. Qualifications: - Proven experience as a Cybersecurity professional with hands-on experience. - In-depth knowledge of cybersecurity principles, threat vectors, firewalls, encryption, vulnerability assessments, and incident response. - Relevant cybersecurity certifications such as CISSP, CEH, CISM, CompTIA Security+, or similar. - Prior experience in teaching or training, with the ability to explain complex technical concepts in an accessible manner. - Strong communication and presentation skills, with the ability to engage and motivate participants. - Ability to design and develop comprehensive training curricula. - Familiarity with various cybersecurity tools and technologies such as SIEM, penetration testing tools, firewalls, and antivirus software. - Experience with online learning platforms and delivering virtual training is a plus. - Strong problem-solving abilities and the capability to adapt to new challenges. Preferred Qualifications: - Bachelor's degree in Cybersecurity, Information Technology, or a related field. - Experience in corporate or enterprise-level cybersecurity training. - Knowledge of regulatory frameworks (e.g., GDPR, HIPAA, NIST) and compliance standards. - Experience with security certifications like CompTIA Network+, Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM). This is a full-time, permanent position with a day shift schedule at an in-person work location.,
Posted 3 weeks ago
4.0 - 8.0 years
0 Lacs
punjab
On-site
As a SOC Analyst (Incident Management) with 4+ years of experience, you will be based in Mohali, working strictly from the office with a 5-day work week and a 30-day notice period. Your role will be crucial in resolving cyber security incidents and collaborating with the IT Infrastructure and application teams to support daily SOC operations. Your responsibilities will include acting as a primary incident responder and coordinator, performing incident handling through effective communication and coordination efforts, triaging incidents, escalating security incidents to senior staff when necessary, tracking and analyzing incidents using a ticket management system, and engaging IT teams for remediation. You will also be responsible for planning and managing incident response procedures, documenting security incidents, and assisting in enhancing the operational efficiency of SOC platforms. To excel in this role, you should have familiarity with incident management principles and frameworks, knowledge of SIEM, AV, EDR, Next-Gen Firewalls, Cloud Platforms, and IT networking concepts. You should possess strong skills in monitoring and reporting security remediations, incident response activities, effective documentation, as well as verbal and written communication. Stakeholder management, experience in a complex matrix environment, and the ability to work in an international multicultural team are also essential. If you are looking to utilize your skills as a SOC Analyst in incident management, this role offers the opportunity to contribute to the resolution of cyber security incidents, improve SOC operational efficiency, and collaborate with diverse teams to enhance overall security posture.,
Posted 3 weeks ago
0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Associate Managed Services Information Security Analyst is an entry level subject matter expert, responsible for monitoring, analyzing, interpreting and reporting on the incoming client data for the purpose of delivering security information and recommendations to the clients, enabling the organization to deliver the contracted security services. This role includes performing tasks such as security incident detection and response, security event reporting, threat hunting, content maintenance (tuning) and interacting with clients to ensure their understanding of the information generated, recommending client system changes as well as answering security related queries from the clients. This is an entry level role within the Managed Services Information Security Analyst team and works under guidance of more experienced analysts within the team. Key responsibilities: Works as part of a global Cyber Defense Centre (CDC) team that works 24/7 on rotational shifts. Works with client stakeholders and relevant internal teams to tune the MSSP platform and client SIEM to enable more efficient detection, analysis and reporting. Under guidance, generates continuous improvement ideas for supported security tools/technologies, to enable improvements to the company services, employee experience and client experience. Adheres to SOPs, customer Run Books and standard processes to ensure a globally consistent delivery whilst also proposing changes and improvements to these standards. Utilizes and document best practices and amend existing documentation as required. Support with security incident handling and response from several vectors including End Point Protection and Enterprise Detection and response tools, attack analysis, malware analysis, network forensics, computer forensics. Learns and utilizes a broad range of skills in LAN technologies, Windows and Linux O/S’s, and general security infrastructure. Ensures usage of knowledge articles in incident diagnosis and resolution. Under guidance, perform defined tasks to inform and monitor service delivery against service level agreements and maintain records of relevant information. Cooperates closely with colleagues to share knowledge and build a cohesive and effective team environment, benefiting the individual, the business and the client. Performs any other related task as required. To thrive in this role, you need to have: Knowledge on implementation and monitoring of a company supported SIEM or security tools/technologies/concepts. Knowledge on security architecture, worked across different security technologies. Knowledge and understanding of the operation of modern computer systems and networks and how they can be compromised. Displays excellent customer service orientation and pro-active thinking. Displays problem solving abilities and is highly driven and self-organized. Good attention to detail. Displays analytical and logical thinking. Well spoken and written communication abilities. Ability to remain calm in pressurized situations. Ability to keep current on emerging trends and new technologies in area of specialization. Academic qualifications and certifications: Bachelor's degree or relevant qualification in Information Technology or Computing or a related field. Security certifications such as (but not limited to) AZ-500, SC-200, Security+, CEH, CISSP, CISM or similar Certification in different networking technologies such as CCNA, JNCIA, ACCA, PCNSA, CCSA is advantageous. Required experience: Entry level experience in SOC Analysis Operations. Entry level experience in SIEM usage for investigations. Entry level experience in Security technologies such as (but not limited to) Firewall, IPS, IDS, Proxy. Entry level experience in dealing with technical support to clients. Entry level experience in handling security incidents end to end. Entry level experience in configuring/managing security controls, such as SIEM, Firewall, IDS/IPS, EDR, NDR, UTM, Proxy, SOAR, Honeypots and other security tools. Entry level experience in Security Analysis or Engineering preferably gained within a global services organization. Workplace type: Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
Posted 3 weeks ago
2.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Line of Service Advisory Industry/Sector Not Applicable Specialism Risk Management Level Associate Job Description & Summary In-depth knowledge of application development processes and at least one programming and one scripting language (e.g., Java, Scala, C#, JavaScript, Angular, ReactJs, Ruby, Perl, Python, Shell). •Knowledge on OS security (Windows, Unix/Linux systems, Mac OS, VMware), network security and cloud security. *Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us. At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: We are seeking a professional to join our Cybersecurity and Privacy services team, where you will have the opportunity to help clients implement effective cybersecurity programs that protect against threats. Responsibilities: L1 - Minimum 2 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting. L2 - Minimum 4 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/Vulnerability Management/ SOC platform management/ Automation/ Asset Integration/ Threat Intel Management/Threat Hunting. · Round the clock threat monitoring & detection · Analysis of any suspicious, malicious, and abnormal behavior. · Alert triage, Initial assessment, incident validation, its severity & urgency · Prioritization of security alerts and creating Incidents as per SOPs. · Reporting & escalation to stakeholders · Post-incident Analysis · Consistent incident triage & recommendations using playbooks. · Develop & maintain incident management and incident response policies and procedures. · Preservation of security alerts and security incidents artefacts for forensic purpose. · Adherence to Service Level Agreements (SLA) and KPIs. · Reduction in Mean Time to Detection and Response (MTTD & MTTR). Mandatory skill sets: Certified SOC Analyst (EC-Council), Computer Hacking Forensic Investigator (EC-Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc. Preferred skill sets: SOC - Splunk Years of experience required: 2-5 Years Education qualification: B.Tech/MCA/MBA with IT background/ Bachelor’s degree in Information Technology, Cybersecurity, Computer Science Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Master of Business Administration, Bachelor of Engineering Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills SoCs Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Azure Data Factory, Communication, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture, Security Compliance Management, Security Control, Security Incident Management, Security Monitoring {+ 3 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date
Posted 3 weeks ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
At PwC, our cybersecurity team is dedicated to safeguarding organizations from cyber threats using advanced technologies and strategies. Your role in identity and access management will involve ensuring secure and efficient access to systems and data for employees and clients. This includes designing and implementing strategies to protect sensitive information and manage user identities. You will focus on building strong client relationships, learning to lead and inspire others, and navigating complex situations to deepen your technical expertise. Anticipating the needs of your teams and clients, you will deliver high-quality solutions while embracing ambiguity and using challenges as opportunities for growth. To succeed in this role, you should possess the following skills and experiences: - Ability to respond effectively to diverse perspectives and needs - Proficiency in using various tools and methodologies to generate ideas and solve problems - Strong critical thinking skills to analyze complex concepts - Understanding of project objectives and overall business strategy - Awareness of changing business contexts - Reflective practice to enhance self-awareness and address development areas - Data interpretation for insights and recommendations - Adherence to professional and technical standards, code of conduct, and independence requirements Responsibilities: - Troubleshoot and resolve technical issues related to CyberArk - Lead incident calls with stakeholders - Apply fixes in Non-Prod and Production environments - Document problem solutions in the knowledge base - Provide 24x7 on-call support - Participate in support review meetings and present challenges with mitigation plans - Ensure incidents are resolved within defined SLAs - Contribute to continual improvement efforts - Plan and execute new activities within timelines - Conduct auditing of accounts, work on reports, and resolve login and permission issues Requirements: - 3+ years of hands-on experience with CyberArk components - Certification in CDE/CyberArk Sentry is a plus - Experience with CyberArk solutions and tools like SIEM and 2FA - Proficiency in applying patches and fixes, conducting DR drills, and resolving issues - Knowledge of supporting platforms such as Windows servers, UNIX servers, and Databases - Understanding of Enterprise Change Management processes - Familiarity with CPM and PSM connector customization Additional Details: - Open to working in rotational shifts from 6 PM to 3 AM IST / 9 PM to 6 AM IST Professional and Educational Background: - Bachelor's Degree preferred,
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
40175 Jobs | Dublin
Wipro
19626 Jobs | Bengaluru
Accenture in India
17497 Jobs | Dublin 2
EY
16057 Jobs | London
Uplers
11768 Jobs | Ahmedabad
Amazon
10704 Jobs | Seattle,WA
Oracle
9513 Jobs | Redwood City
IBM
9439 Jobs | Armonk
Bajaj Finserv
9311 Jobs |
Accenture services Pvt Ltd
8745 Jobs |