Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
4.0 - 7.0 years
0 Lacs
Delhi, India
On-site
Your tasks Implementation of monitoring use cases and alarm / detection rules Adaptation and expansion of the toolset to include all necessary information (e.g. logs, context data and threat Intel enrichment) for our analysts Support in continuous improvement processes our SOC/Cyber Detection & Response Center (e.g. handling false positives, automation, maturation) Strengthening cybersecurity analysts in the analysis and triage of security events Close collaboration with the globally established infrastructure operations teams (e.g. malware defense) or vulnerability management) Creation of internal team documentation (e.g. SOPs, reference standards, architecture (diagrams) Consulting function in projects and initiatives related to existing solutions and integration of new solutions Possibility of working in a shift model in the future Your Qualifications Engineering degree in Computer Science, Information Security from reputed college/ University 4-7 years of professional experience in the cybersecurity in a multinational company Experience with security tools and technologies such as SIEM systems, SOAR, firewalls, intrusion detection systems and anti-virus software Proficient working knowledge of Python is must Good knowledge of various common log formats, application interfaces (e.g. REST API) as well as knowledge of GIT CI/CD Knowledge of security frameworks and standards such as MITRE ATT&CK, NIST, ISO 27001 Experience with Windows and Linux operating systems Certifications such as SANS GSOC, Certified SOC Analyst, CISSP or similar are added advantage Experience in IT service management (e.g. ITIL) is preferred Initial experiences with machine learning and cybersecurity algorithms Ideally, experience has already been gained in creating technical architectures in the area of SOC/CDRC Experience with cloud security and technologies such as AWS and Azure is helpful, as well as knowledge of DevOps and tools like Jenkins and Docker Excellent communication skills with fluency in speaking & writing English; German is added advantage Interested? We are looking forward to receiving your application! Ideally, you should apply online with the reference number. If you have any questions, please feel free to contact your recruiting contact via LinkedIn or XING. We promote equal opportunities and welcome applications from people with and without disabilities. We offer an inclusive work environment where all individuals can develop their skills and talents regardless of gender, nationality, ethnic and social background, religion, worldview, age, sexual orientation, identity, and other characteristics. reference number Recruiting Contact Rohde & Schwarz is a global technology company with approximately 14,000 employees and three divisions Test & Measurement, Technology Systems and Networks & Cybersecurity. For 90 years, the company has been developing cutting-edge technology, pushing the boundaries of what is technically possible and enabling customers from various sectors such as business, government and public authorities to maintain their technological sovereignty. Rohde & Schwarz is a leading supplier of solutions in the fields of Test and Measurement, Broadcasting, Radio monitoring and Radiolocation as well as Mission-critical Radio communications. For more than 80 years, company has been developing, producing and marketing a wide range of electronic products. Headquarters in Munich with subsidiaries and representatives active in over 70 countries around the world, Rohde & Schwarz has achieved its global presence greatly. In India the company is present as Rohde & Schwarz India Pvt. Ltd (RSINDIA) which is 100% owned subsidiary of Rohde & Schwarz GmbH KG & Co, Germany, whose head office is located in New Delhi and branch offices in Bangalore, Hyderabad, Mumbai and Field presence at Ahmedabad, Chennai and Pune. With more than 10 channel partners situated at key industrial locations we serve across the country. Our emphasis is to provide outstanding sales, service and support to our customers. The company has invested sustainably to increase the local support capability as well as to provide a fully automated Calibration facility for most of the products sold. Rohde & Schwarz India has ISO 9001 2015 certified Quality Management Systems and ISO 17025 NABL Accreditation. The company continuously invests in training its service and sales personnel regularly to maintain a high level of technical competence in pre- and post-sales support and outstanding quality in services viz. Repairs, Calibration, Product support & Project management. Rohde & Schwarz India is a financially stable company rated by CRSIL as SME 1 for more than 5 years now. This rating is the highest in its category. Rohde & Schwarz India is committed to 100% customer satisfaction through innovative product offerings and outstanding support and services. Our comprehensive and continuously growing range of services are designed to provide customers with the highest level of quality and value throughout the life cycle of our products. Show more Show less
Posted 2 weeks ago
2.0 - 5.0 years
0 Lacs
Delhi, India
On-site
Your tasks Real-time monitoring, analysis, triage of security events and alarms based on relevant security threats and risks Perform in-depth analyzes of security incidents to understand root cause as well as impact to derive recommendations for handling and elimination Support of our cybersecurity engineers for continuous improvement in the CDRC (e.g. through creation or optimization of monitoring or alarm rules) Timely addressing of security incidents in cooperation with the whole team Monitoring of the current threat level and starting of accompanying proactive analyzes / threat hunting Creating and expanding documentation for the global CDRC team (such as SOPs, reference standards, architecture charts) Conducting training courses on security incidents and best practices for our employees Possibility of working in a shift model in the future Your Qualifications Engineering degree in Computer Science, Information Security from reputed college/ University Min. 2-5 years of professional experience in the cybersecurity in a multinational company Experience in using security tools and technologies such as SIEM systems, SOAR, firewalls, intrusion detection systems and anti-virus software Good analysis knowledge of various common logs formats Experience with cloud security and technologies such as AWS, Azure, M365 Knowledge of security frameworks and standards such as MITRE ATT&CK, NIST, ISO 27001 Experience in the following fields is desirable vulnerability analysis, threat intelligence, threat hunting or incident response Ideally you have an interest in the topics of machine learning and algorithms Experience in IT service management (e.g. ITIL) and existing security certifications are an advantage Capabilities to analyze and eliminate complex issues Experience with Windows and Linux operating systems Team Player, Excellent communication skills with fluency in speaking & writing English; German is added advantage Interested? We are looking forward to receiving your application! Ideally, you should apply online with the reference number. If you have any questions, please feel free to contact your recruiting contact via LinkedIn or XING. We promote equal opportunities and welcome applications from people with and without disabilities. We offer an inclusive work environment where all individuals can develop their skills and talents regardless of gender, nationality, ethnic and social background, religion, worldview, age, sexual orientation, identity, and other characteristics. reference number Recruiting Contact Rohde & Schwarz is a global technology company with approximately 14,000 employees and three divisions Test & Measurement, Technology Systems and Networks & Cybersecurity. For 90 years, the company has been developing cutting-edge technology, pushing the boundaries of what is technically possible and enabling customers from various sectors such as business, government and public authorities to maintain their technological sovereignty. Rohde & Schwarz is a leading supplier of solutions in the fields of Test and Measurement, Broadcasting, Radio monitoring and Radiolocation as well as Mission-critical Radio communications. For more than 80 years, company has been developing, producing and marketing a wide range of electronic products. Headquarters in Munich with subsidiaries and representatives active in over 70 countries around the world, Rohde & Schwarz has achieved its global presence greatly. In India the company is present as Rohde & Schwarz India Pvt. Ltd (RSINDIA) which is 100% owned subsidiary of Rohde & Schwarz GmbH KG & Co, Germany, whose head office is located in New Delhi and branch offices in Bangalore, Hyderabad, Mumbai and Field presence at Ahmedabad, Chennai and Pune. With more than 10 channel partners situated at key industrial locations we serve across the country. Our emphasis is to provide outstanding sales, service and support to our customers. The company has invested sustainably to increase the local support capability as well as to provide a fully automated Calibration facility for most of the products sold. Rohde & Schwarz India has ISO 9001 2015 certified Quality Management Systems and ISO 17025 NABL Accreditation. The company continuously invests in training its service and sales personnel regularly to maintain a high level of technical competence in pre- and post-sales support and outstanding quality in services viz. Repairs, Calibration, Product support & Project management. Rohde & Schwarz India is a financially stable company rated by CRSIL as SME 1 for more than 5 years now. This rating is the highest in its category. Rohde & Schwarz India is committed to 100% customer satisfaction through innovative product offerings and outstanding support and services. Our comprehensive and continuously growing range of services are designed to provide customers with the highest level of quality and value throughout the life cycle of our products. Show more Show less
Posted 2 weeks ago
4.0 - 8.0 years
3 - 7 Lacs
Mumbai
Work from Office
Daily assessment of vulnerabilities identified by infrastructure scan Evaluate rate and perform risk assessments on assets Prioritizing vulnerabilities discovered along with remediation timeline s Work with associated teams to explain vulnerabilities and remediation steps as required Maintain knowledge of the threat landscape Create reports and provide analysis on vulnerabilities for technical teams and leadership Skill Required Knowledge of application network and operating system security Experience with vulnerability and patch assessment Linux and windows experience Good understanding of Windows and Linux patching Knowledge of vulnerability scoring systems CVSS CMSS Experience on vulnerability scanning tools Excellent writing and presentation skills are required in order to communicate findings and status Primary Skills VMDR Policy Compliance Qualys Tenable Nessus Rapid7 Secondary Skills Excellent writing and presentation skills are required in order to communicate findings and statusCleary communicate priorities and escalation points procedures to other team members Detail oriented organized methodical follow up skills with an analytical thought process Experience performing dynamic scans static scans and penetration testing Development experienceProject management experience Innovative and efficiency focused Track trends and configure systems as required to reduce false positives from true events
Posted 2 weeks ago
4.0 - 7.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Provide L3 support for applications written in GoLang, ensuring high availability and reliability. Analyze application behavior, parse system/application logs, and troubleshoot issues to identify and resolve root causes. Collaborate with development teams to resolve bugs and implement fixes or workarounds where needed. Enhance support scripts to automate and streamline log analysis and issue detection. Maintain knowledge base articles and documentation for known issues, fixes, and standard operating procedures. Support deployment and release activities, ensuring smooth transition of code to production environments. Engage with stakeholders to gather issue details, communicate resolutions, and set proper expectations. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Strong hands-on experience in GoLang, particularly in understanding and debugging Go applications. Solid understanding of log structures, log parsing, and log management tools. Strong debugging and problem-solving abilities in complex environments. Familiarity with microservices, REST APIs Ability to work in a fast-paced environment and handle critical production issues with urgency. Excellent communication and collaboration skills
Posted 2 weeks ago
3.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
We are the leading provider of professional services to the middle market globally, our purpose is to instill confidence in a world of change, empowering our clients and people to realize their full potential. Our exceptional people are the key to our unrivaled, inclusive culture and talent experience and our ability to be compelling to our clients. You’ll find an environment that inspires and empowers you to thrive both personally and professionally. There’s no one like you and that’s why there’s nowhere like RSM. We are seeking analyst level individuals with experience working in the field of cybersecurity and a desire to help organizations improve their operations to join our team and help run the ongoing security operations for RSM clients in a variety of industries and geographic locations. Successful candidates will have working knowledge in some or all these areas – IT operations, security monitoring, active directory, IP networking and various cloud technologies. Position And Key Responsibilities At RSM, analysts work with large and small companies in variety of industries. They develop strong working relationships with their peers within the security operations center (SOC) while learning their clients’ businesses and challenges facing their organizations. Analysts work as part of a broader team under the direction of more senior analysts, threat hunters, shift leads, intelligence analysts and SOC managers in support of multiple clients. Working in a mutually respectful team environment helps our analysts perform at their best and integrate their career with their personal life. You will have the opportunity to: Role Responsibilities: Investigate security incidents using SIEM tools, automation, and other cybersecurity technologies (i.e. ServiceNow, Stellar Cyber, Hyas Insight and DNS Protect, sentinel One, ELK Stack, Virus total, Shodan, NetFlow, Passive DNS, Silobreaker, Tenable.io, Hatching Triage Sandbox) Analyze, escalate, and assist in remediation of critical security incidents. Improve and challenge existing processes and procedures in a very agile and fast-paced information security environment serving multiple clients Process IDS alerts and identifying incidents and events in customer data. Setup and execution and analysis of vulnerability scans Perform advanced analysis and investigation into alerts as they are identified Performing initial basic malware analysis utilizing automated means (static and dynamic sandbox analysis or other available tools) Incident intake, ticket updates and reporting of cyber events and threat intelligence Understanding, identifying, and researching indicators of compromise (IOCs) from a variety of sources such as threat intelligence reports and feeds Writing incident reports, process documentation, and interact with clients as required Transcribe and implement atomic indicators into a monitoring environment. Consume policy documentation and determine applicability in a network. Work with protocols at layers 2 and higher in the OSI model, to include ARP TCP, UDP, ICMP, DNS, Telnet, SSH, HTTP, SSL, SNMP, SMTP, and other common protocols that use well-known ports. Develops the playbooks to respond and recovery from various attacks/incidents. Drives the automation efforts focused on the closing cases, responding to Cyber events and analyzing data required to enable efficient response activities. Processing of Cyber Threat Intel that is used across RSM detection platforms to understand and prepare for potential threats. Threat intel is heavily used across RSM platforms drive issue prioritization. Open to working shifts in a 24x7 operations environment. Qualifications and Experience: Minimum B.A. or B.S. degree or equivalent from an accredited university by the time employment commences or prior relevant military / law enforcement experience. Computer science, information technology, information systems management, or other similar degrees preferably with a focus on information security 3-5 years’ experience working in a security operations center, networking operations center or threat intelligence capacity. Possess at least one security industry certification such as CYSA+, Security+, CISSP, SANS GIAC (GSOC, GCIA, GMON, CGCDA) Knowledge of security standards and information security and compliance frameworks, controls, and best practices, including SSAE 16, SOC 2 and SOC3, OWASP Top 10, SANS, NIST Must have a naturally curious mindset and approach to solving problems. Basic understanding of cloud technologies and their operations Experience supporting various operating systems such as Windows/Linux Understanding of IP network protocols At RSM, we offer a competitive benefits and compensation package for all our people. We offer flexibility in your schedule, empowering you to balance life’s demands, while also maintaining your ability to serve clients. Learn more about our total rewards at https://rsmus.com/careers/india.html. RSM does not tolerate discrimination and/or harassment based on race; colour; creed; sincerely held religious beliefs, practices or observances; sex (including pregnancy or disabilities related to nursing); gender (including gender identity and/or gender expression); sexual orientation; HIV Status; national origin; ancestry; familial or marital status; age; physical or mental disability; citizenship; political affiliation; medical condition (including family and medical leave); domestic violence victim status; past, current or prospective service in the Indian Armed Forces; Indian Armed Forces Veterans, and Indian Armed Forces Personnel status; pre-disposing genetic characteristics or any other characteristic protected under applicable provincial employment legislation. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process and/or employment/partnership. RSM is committed to providing equal opportunity and reasonable accommodation for people with disabilities. If you require a reasonable accommodation to complete an application, interview, or otherwise participate in the recruiting process, please send us an email at careers@rsmus.com. Show more Show less
Posted 2 weeks ago
3.0 - 6.0 years
0 Lacs
Kanayannur, Kerala, India
Remote
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Senior (CTM – Threat Detection & Response) KEY Capabilities: Experience in working with Splunk Enterprise, Splunk Enterprise Security & Splunk UEBA Minimum of Splunk Power User Certification Good knowledge in programming or Scripting languages such as Python (preferred), JavaScript (preferred), Bash, PowerShell, Bash, etc. Perform remote and on-site gap assessment of the SIEM solution. Define evaluation criteria & approach based on the Client requirement & scope factoring industry best practices & regulations Conduct interview with stakeholders, review documents (SOPs, Architecture diagrams etc.) Evaluate SIEM based on the defined criteria and prepare audit reports Good experience in providing consulting to customers during the testing, evaluation, pilot, production and training phases to ensure a successful deployment. Understand customer requirements and recommend best practices for SIEM solutions. Offer consultative advice in security principles and best practices related to SIEM operations Design and document a SIEM solution to meet the customer needs Experience in onboarding data into Splunk from various sources including unsupported (in-house built) by creating custom parsers Verification of data of log sources in the SIEM, following the Common Information Model (CIM) Experience in parsing and masking of data prior to ingestion in SIEM Provide support for the data collection, processing, analysis and operational reporting systems including planning, installation, configuration, testing, troubleshooting and problem resolution Assist clients to fully optimize the SIEM system capabilities as well as the audit and logging features of the event log sources Assist client with technical guidance to configure end log sources (in-scope) to be integrated to the SIEM Experience in handling big data integration via Splunk Expertise in SIEM content development which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Hands-on experience in development and customization of Splunk Apps & Add-Ons Builds advanced visualizations (Interactive Drilldown, Glass tables etc.) Build and integrate contextual data into notable events Experience in creating use cases under Cyber kill chain and MITRE attack framework Capability in developing advanced dashboards (with CSS, JavaScript, HTML, XML) and reports that can provide near real time visibility into the performance of client applications. Experience in installation, configuration and usage of premium Splunk Apps and Add-ons such as ES App, UEBA, ITSI etc Sound knowledge in configuration of Alerts and Reports. Good exposure in automatic lookup, data models and creating complex SPL queries. Create, modify and tune the SIEM rules to adjust the specifications of alerts and incidents to meet client requirement Work with the client SPOC to for correlation rule tuning (as per use case management life cycle), incident classification and prioritization recommendations Experience in creating custom commands, custom alert action, adaptive response actions etc. Qualification & experience: Minimum of 3 to 6 years’ experience with a depth of network architecture knowledge that will translate over to deploying and integrating a complicated security intelligence solution into global enterprise environments. Strong oral, written and listening skills are an essential component to effective consulting. Strong background in network administration. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary. Must have knowledge of Vulnerability Management, Windows and Linux basics including installations, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting. Good to have below mentioned experience with designing and implementation of Splunk with a focus on IT Operations, Application Analytics, User Experience, Application Performance and Security Management Multiple cluster deployments & management experience as per Vendor guidelines and industry best practices Troubleshoot Splunk platform and application issues, escalate the issue and work with Splunk support to resolve issues Certification in any one of the SIEM Solution such as IBM QRadar, Exabeam, Securonix will be an added advantage Certifications in a core security related discipline will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 weeks ago
3.0 - 6.0 years
0 Lacs
Trivandrum, Kerala, India
Remote
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Senior (CTM – Threat Detection & Response) KEY Capabilities: Experience in working with Splunk Enterprise, Splunk Enterprise Security & Splunk UEBA Minimum of Splunk Power User Certification Good knowledge in programming or Scripting languages such as Python (preferred), JavaScript (preferred), Bash, PowerShell, Bash, etc. Perform remote and on-site gap assessment of the SIEM solution. Define evaluation criteria & approach based on the Client requirement & scope factoring industry best practices & regulations Conduct interview with stakeholders, review documents (SOPs, Architecture diagrams etc.) Evaluate SIEM based on the defined criteria and prepare audit reports Good experience in providing consulting to customers during the testing, evaluation, pilot, production and training phases to ensure a successful deployment. Understand customer requirements and recommend best practices for SIEM solutions. Offer consultative advice in security principles and best practices related to SIEM operations Design and document a SIEM solution to meet the customer needs Experience in onboarding data into Splunk from various sources including unsupported (in-house built) by creating custom parsers Verification of data of log sources in the SIEM, following the Common Information Model (CIM) Experience in parsing and masking of data prior to ingestion in SIEM Provide support for the data collection, processing, analysis and operational reporting systems including planning, installation, configuration, testing, troubleshooting and problem resolution Assist clients to fully optimize the SIEM system capabilities as well as the audit and logging features of the event log sources Assist client with technical guidance to configure end log sources (in-scope) to be integrated to the SIEM Experience in handling big data integration via Splunk Expertise in SIEM content development which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Hands-on experience in development and customization of Splunk Apps & Add-Ons Builds advanced visualizations (Interactive Drilldown, Glass tables etc.) Build and integrate contextual data into notable events Experience in creating use cases under Cyber kill chain and MITRE attack framework Capability in developing advanced dashboards (with CSS, JavaScript, HTML, XML) and reports that can provide near real time visibility into the performance of client applications. Experience in installation, configuration and usage of premium Splunk Apps and Add-ons such as ES App, UEBA, ITSI etc Sound knowledge in configuration of Alerts and Reports. Good exposure in automatic lookup, data models and creating complex SPL queries. Create, modify and tune the SIEM rules to adjust the specifications of alerts and incidents to meet client requirement Work with the client SPOC to for correlation rule tuning (as per use case management life cycle), incident classification and prioritization recommendations Experience in creating custom commands, custom alert action, adaptive response actions etc. Qualification & experience: Minimum of 3 to 6 years’ experience with a depth of network architecture knowledge that will translate over to deploying and integrating a complicated security intelligence solution into global enterprise environments. Strong oral, written and listening skills are an essential component to effective consulting. Strong background in network administration. Ability to work at all layers of the OSI models, including being able to explain communication at any level is necessary. Must have knowledge of Vulnerability Management, Windows and Linux basics including installations, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting. Good to have below mentioned experience with designing and implementation of Splunk with a focus on IT Operations, Application Analytics, User Experience, Application Performance and Security Management Multiple cluster deployments & management experience as per Vendor guidelines and industry best practices Troubleshoot Splunk platform and application issues, escalate the issue and work with Splunk support to resolve issues Certification in any one of the SIEM Solution such as IBM QRadar, Exabeam, Securonix will be an added advantage Certifications in a core security related discipline will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 weeks ago
2.0 years
0 Lacs
Pune, Maharashtra, India
On-site
Introduction We believe that every candidate brings something special to the table, including you! So, even if you feel that you’re close but not an exact match, we encourage you to apply. We’d be thrilled to receive applications from exceptional individuals like yourself. Gallagher, a global industry leader in insurance, risk management, and consulting services, boasts a team of over 50,000 professionals worldwide. Our culture, known as "The Gallagher Way," is driven by shared values and a passion for excellence. At the heart of our global operations, the Gallagher Center of Excellence (GCoE) in India, founded in 2006, upholds the values of quality, innovation, and teamwork. With 10,000+ professionals across five India locations, GCoE is where knowledge-driven individuals make a significant impact and build rewarding, long-term careers. Overview Gallagher operates Data Loss Prevention (DLP) technologies and processes to seek to protect data in transit and to prevent and/or detect the unauthorized egress (leakage) of Gallagher information, whether related to current, past or prospective employees, customers, insurance market participants or suppliers. Responsible for leading and managing Gallagher’s approach to data loss prevention to ensure that we implement appropriate preventative and monitoring controls across our global operations to manage the risk to Gallagher information. This role is responsible for the triage, investigation, escalation and closure of DLP incidents, the recommendation, implementation and maintenance of effective DLP policies and the production of monthly and ad-hoc DLP reports to minimize Gallagher’s risk of data leakage, identify data leakage and to monitor compliance with company information security and privacy policies for in scope entities. The individual is expected to have experience of DLP and working with DLP console, good knowledge of data leakage methods and understanding of the different data types processed across entities and to keep that knowledge up to date. This is an essential role within the DLP team to support them along with the Global Chief Information Security Officer and Global Chief Privacy Officer in the delivery of their data protection strategy. The role will provide hands on advice, guidance and support, the businesses and central services functions to assist in the identification, management and monitoring of Gallagher’s privacy and security risks in line with our risk appetite. How You'll Make An Impact Responsible for triage and investigation of DLP events and the escalation of instances of non-compliance with company policy and potential/actual instances of data leakage (either personal data or commercial data) using DLP Solutions on a day to day basis. Validating white listed user activity. Advising on required rulesets and ruleset optimization and tuning to reduce false positives based on patterns observed during event analysis. Performing control checks at regular intervals. Preparation of monthly DLP reports and dashboards including trend and root cause analysis as well as achievement against SLAs and KPIs. Providing detailed DLP analysis support for stakeholders. Contribution to the overall DLP process improvement and documentation. Supporting the incident management framework. Building and maintaining good stakeholder relationships. About You Min 2+ years experience in DLP McAfee/Microsoft/SkyHigh Security DLP certified beneficial but not essential DLP solution capabilities Knowledge of DLP capabilities Proven track record of incident investigation and escalation Knowledge of McAfee/Microsoft/SkyHigh Security DLP an advantage Knowledge of SIEM tool an advantage but not essential Knowledge of Incident ticket tool an advantage but not essential Knowledge of the insurance broking or insurance sector an advantage but not essential Hand on experience with DLP tool - Preferred McAfee/Microsoft/SkyHigh Security DLP Incident Management - Triage, investigation and escalation Assessing risk Report production Supporting the maintenance of standard operating procedures Working effectively in a shared mailbox Skills/other Familiarity with sensitive data types/identifiers, classifications, etc. Ability to understand drivers and priorities with regard to business and regulatory requirements Excellent spoken and written English communication skills Analytical and investigative skills Report writing MS Office Confidence to challenge views and opinions and make recommendations for improvements to policies and processes Fine attention to detail Additional Information We value inclusion and diversity Inclusion and diversity (I&D) is a core part of our business, and it’s embedded into the fabric of our organization. For more than 95 years, Gallagher has led with a commitment to sustainability and to support the communities where we live and work. Gallagher embraces our employees’ diverse identities, experiences and talents, allowing us to better serve our clients and communities. We see inclusion as a conscious commitment and diversity as a vital strength. By embracing diversity in all its forms, we live out The Gallagher Way to its fullest. Gallagher believes that all persons are entitled to equal employment opportunity and prohibits any form of discrimination by its managers, employees, vendors or customers based on race, color, religion, creed, gender (including pregnancy status), sexual orientation, gender identity (which includes transgender and other gender non-conforming individuals), gender expression, hair expression, marital status, parental status, age, national origin, ancestry, disability, medical condition, genetic information, veteran or military status, citizenship status, or any other characteristic protected (herein referred to as “protected characteristics”) by applicable federal, state, or local laws. Equal employment opportunity will be extended in all aspects of the employer-employee relationship, including, but not limited to, recruitment, hiring, training, promotion, transfer, demotion, compensation, benefits, layoff, and termination. In addition, Gallagher will make reasonable accommodations to known physical or mental limitations of an otherwise qualified person with a disability, unless the accommodation would impose an undue hardship on the operation of our business. Show more Show less
Posted 2 weeks ago
2.5 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Job Description: AML RightSource is a leading provider of anti-money laundering (AML) and financial crimes compliance solutions. Our team of experts provides our clients with the highest quality of service, while ensuring compliance with regulatory requirements. We are currently seeking a Senior SOC Analyst to join our team. Responsibilities: Monitor and analyze security events from multiple sources, including security information and event management (SIEM) systems, network and host-based intrusion detection/prevention systems, and other security technologies. Conduct investigations into security incidents, analyze evidence, and report findings to management. Provide technical guidance and support to junior SOC analysts. Develop and maintain standard operating procedures for the SOC. Participate in security assessments and penetration testing activities. Conduct threat hunting activities to identify and respond to advanced persistent threats (APTs). Participate in incident response activities and coordinate with other teams to contain and remediate security incidents. Maintain awareness of new and emerging security threats, vulnerabilities, and mitigation techniques. Collaborate with other teams, including the IT team, to ensure the security of the organization's infrastructure and systems. Provide regular reports to management on the SOC's performance and effectiveness. Requirements: Bachelor's degree in Computer Science, Information Systems, or related field. Minimum of 2.5 years of experience in a SOC or security operations role. Strong knowledge of security technologies, including SIEM systems, intrusion detection/prevention systems, and other security tools. Familiarity with security standards and frameworks, such as NIST, ISO, and SOC 2. Experience with security incident response, including investigation, containment, and remediation. Excellent analytical and problem-solving skills. Ability to work well in a team environment. Strong verbal and written communication skills. Relevant security certifications, such as CISSP, CISM, or GSEC, are highly desirable. AML RightSource is committed to fostering a diverse work environment and is proud to be an equal opportunity employer. We provide equal employment opportunities to all qualified applicants without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Show more Show less
Posted 2 weeks ago
0 years
0 Lacs
Gurugram, Haryana, India
On-site
We are looking for a motivated fresher to join our Pre-Sales and Proposal team. This role offers hands-on experience in supporting the sales process through product demonstrations, RFP documentation, compliance checks, and bid proposal preparation. It’s ideal for someone who wants to build a career at the intersection of technology, communication, and business. The role involves conducting face-to-face and virtual meetings, delivering tailored demos, assisting with compliance and technical fit assessments, and collaborating on proposal development. Key Responsibilities: Assist senior team members in preparing product presentations and client demos. Support in analyzing RFPs, tenders, and compliance documents. Help draft and format bid responses, technical proposals, and supporting documents. Maintain organized documentation of past proposals, templates, and case studies. Learn to coordinate with product, technical, and sales teams for inputs. Participate in demo rehearsals and assist with follow-up documentation. Required Qualifications: Interest in cybersecurity products and technical sales. Basic skills in MS Office (Word, Excel, PowerPoint). Willingness to learn about compliance, tenders, and government procurement. Preferred (Good to Have): Internship or project exposure in cybersecurity or related technologies. Understanding of basic cybersecurity concepts (e.g., firewalls, SIEM, threat detection). Familiarity with GeM, CPPP, or eProcurement portals (if applicable). What You’ll Gain: Hands-on experience with enterprise/government cybersecurity sales processes. Exposure to real-world pre-sales and bid support activities. Guided learning from experienced pre-sales engineers and solution architects. Career development path into Pre-Sales, Technical Marketing, Cybersecurity Consulting, or Bid Management. Show more Show less
Posted 2 weeks ago
130.0 years
0 Lacs
Greater Chennai Area
On-site
Company Profile Lennox (NYSE: LII) Driven by 130 years of legacy, HVAC and refrigeration success, Lennox provides our residential and commercial customers with industry-leading climate-control solutions. At Lennox, we win as a team, aiming for excellence and delivering innovative, sustainable products and services. Our culture guides us and creates a workplace where all employees feel heard and welcomed. Lennox is a global community that values each team member’s contributions and offers a supportive environment for career development. Come, stay, and grow with us. Job Description Monitor all the endpoint , Network , Cloud and application security incidents. As SOC team member , perform the basic investigation and all the security incidents and document the evidence. Performing Security controls health & Compliance check. Adhere to shift timings and provide uninterrupted 24/7 monitoring . Properly share shift handovers, updating the next shift on ongoing incidents and activities. Respond to all security incidents within a SLA period Resolve incidents assigned to the shift promptly and escalate to the Senior team when necessary. Work across all categories of incidents without limiting to specific types. Follow the incident handling as per the docum ented SOP . Complete and close all assigned task requests within SLA timelines. Attend weekly and monthly team meetings as mandatory. Qualifications OSINT : knowledge about open-source platforms for analyzing URL, IP Addresses , suspicious files. Email Analysis : Operating Systems: Basics of Linux and Windows, kernel concepts, and system differences. Networking: OSI model, TCP/IP, firewalls, VPNs, proxies, IP addressing, and subnetting. SIEM Tools: Basics of SIEM operations, alerts, and dashboards (e.g., Splunk). Authentication & Access Control: MFA, SSO, and password management best practices. Malware Protection: Antivirus strategies, malware analysis, phishing email analysis, and IOC gathering. Trending Cyber Attacks : update knowledge about the trending cyber-attacks & its attack patterns . Show more Show less
Posted 2 weeks ago
8.0 years
6 - 9 Lacs
Hyderābād
On-site
Date: Jun 2, 2025 Job Requisition Id: 61334 Location: Hyderabad, TG, IN Hyderabad, IN YASH Technologies is a leading technology integrator specializing in helping clients reimagine operating models, enhance competitiveness, optimize costs, foster exceptional stakeholder experiences, and drive business transformation. At YASH, we’re a cluster of the brightest stars working with cutting-edge technologies. Our purpose is anchored in a single truth – bringing real positive changes in an increasingly virtual world and it drives us beyond generational gaps and disruptions of the future. We are looking forward to hire NIST Professionals in the following areas : Position Name: Lead Consultant - OT/ IOT Description YASH is a Digital services enabler organization delivering vast portfolio of digital services to customers across the globe. Our topline services include Cybersecurity services. This role will be part of vibrant YASH’s Cybersecurity – Security Operations Team. We are looking for candidates who will embrace our Security strategy in the design, implementation and operations of Azure Sentinel with a focus on Azure. As an Azure Sentinel Administrator, you should have experience in all aspects of SIEM tools including estimating, designing, fine tuning, log source integration, threat hunting and automation. Attributes we will look for in our candidates include excellent technical and analytical skills, communication and flexibility, innovative thinking and problem solving. In addition, this position is responsible for analyzing security vulnerabilities and determining if there is an attack surface and impact. The ideal candidate understands the complete implementation of a SIEM tool. Position – Lead Consultant - OT/ IOT Security Number – 1 Location – Bangalore/ Pune / Indore Total Experience – 8 -10 Years How do you grow and be successful: At YASH, we will offer all support to grow in your career. At the very beginning you will receive a deep knowledge on the current SOPs once you are fully onboarded into our Security Operations team. You will be measured on the positive contribution in delivering the SIEM services to our customers. Fluency will be measured on the goals such as improvement of cyber posture of customers through our Manage detect and respond services. Our employees will have global exposure from day-1. We offer to learn multiple security domains through our mentored on-the-job training program. Aspiring candidates will reach to highest positions and make a global career. Preferred Skills: Minimum 8+ years of experience in developing use cases customized to the environment. Work on Cloud SIEM project implementations for various customers in different locations, starting with estimating the SIEM configuration to successful deployment and fine tuning of the solution Configure data digestion types and connectors. Create incident categorization and threat management plan. End to end operational knowledge of Azure Incident Management Process/SLAs. Configure Sentinel Incidents, Workbooks, Hunt queries, Notebooks. Support on-going development and troubleshooting of Azure Sentinel. Advise and develop Azure Sentinel adoption migration roadmap for clients. Analytic design and configuration of the events and logs being digested. Preferred with experience on SOAR tools like IBM SOAR(Resilient), Splunk SOAR(Phantom) , Microsoft Sentinel SOAR, knowledge in Jupyter and logicApps or any other SOAR Tool. In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc Use Case Fine tuning and New Use case creation. Hands-on experience with Azure Sentinel/Kusto Query language preferred). Azure Security Services for Vulnerability Assessment and Compliance practices analysis, Develop, automate, and orchestrate tasks(playbooks) with logic apps based on certain events. Tuning threat detection to minimize noise and amplify a signal. Experience in SIEM/ SOAR & Playbook creation technologies understanding the log source integration. Responsible for integration review of standard and non-standard logs in SIEM Provide support to the Security Operations Center (SOC) during incident response, event monitoring, and threat hunting activities. Proficient in one or more of the following computer languages PowerShell, Bash ,Python & KQL to support cyber threat detection or reporting. Security API implementations can be considered as well. Deep understanding of either MITRE Attack framework (MITRE preferred) or the Cyber Kill Chain Experience in threat management. Knowledge of various operating system flavors including but not limited to Windows, Linux, Unix. Knowledge of applications, databases, middleware to address security threats against the same. Proficient in preparation of reports, dashboards and documentation. Working knowledge Passion for Cyber Security, being the basic ingredient of success. Ensure compliance to SLA, process adherence and process improvisation to achieve operational objectives Necessary soft-skills set to successfully understand, challenge and translate the business needs and communicate to the relevant parties with a structured and methodical approach to problem solving You are a team player with good communication skills, proactive and highly motivated individual with a serious hands-on work ethic Qualifications: A bachelor's or master's degree in computer science, information technology Preferred Certifications: Azure Security Certifications, SIEM certifications At YASH, you are empowered to create a career that will take you to where you want to go while working in an inclusive team environment. We leverage career-oriented skilling models and optimize our collective intelligence aided with technology for continuous learning, unlearning, and relearning at a rapid pace and scale. Our Hyperlearning workplace is grounded upon four principles Flexible work arrangements, Free spirit, and emotional positivity Agile self-determination, trust, transparency, and open collaboration All Support needed for the realization of business goals, Stable employment with a great atmosphere and ethical corporate culture
Posted 2 weeks ago
0 years
0 Lacs
Hyderābād
On-site
Hyderabad, Telangana, India Category: Information Technology Hire Type: Employee Job ID 4808 Date posted 02/24/2025 We Are: At Synopsys, we drive the innovations that shape the way we live and connect. Our technology is central to the Era of Pervasive Intelligence, from self-driving cars to learning machines. We lead in chip design, verification, and IP integration, empowering the creation of high-performance silicon chips and software content. Join us to transform the future through continuous technological innovation. You Are: You are a seasoned network engineering professional with a robust background in designing and implementing enterprise network architectures. You thrive in dynamic environments and excel in providing strategic direction and innovative solutions. With your extensive experience in network and security operations, you are adept at collaborating with executive management and cross-functional teams. You possess a proactive approach, identifying opportunities for improvement and automation while maintaining a keen eye on security and performance. Your technical expertise is complemented by your ability to communicate complex concepts clearly and effectively. What You’ll Be Doing: Create architectural approaches for Enterprise Network design and implementation. Provide architectural governance and oversight over MSP supplied solutions. Explore, investigate, recommend, benchmark, and implement technologies for SDN and service orchestration. Offer in-depth Network & Security Operations subject matter expertise and guidance to executive management and other stakeholders. Collaborate with cross-functional teams to resolve complex technical issues, ensuring minimal disruption to business operations. Liaise with various vendors and suppliers to optimize existing Network Services. Provide technological vision and strategy for Network transformation, leading architecture discussions to address risk, security, capacity, and performance concerns. Maintain vulnerability management processes and policies using a risk-based priority methodology. Identify and implement opportunities for process automation and improvement. Aid with change management processes, including impact analysis, risk assessment, change plan, test plan, monitoring, and user communications. The Impact You Will Have: Drive significant productivity, robustness, agility, and time-to-market advantage in the creation of Synopsys products and solutions. Lead corporate infrastructure transformation, enhancing IT operations leadership. Improve and optimize Network Services, contributing to the overall efficiency and performance of the enterprise network. Enhance security measures and risk management, safeguarding the organization’s critical assets. Facilitate seamless collaboration across teams, ensuring timely resolution of technical issues. Contribute to the continuous improvement of network services and user experience. What You’ll Need: Demonstrated experience with risk assessments and vulnerability assessments, using tools like Qualys, Rapid7, Tenable, Wiz, etc. Expertise in Enterprise Network Architecture Designs and Security Implementations. Knowledge of Internet/DMZ/Internal Firewalls, Identity Access Management (IAM), Risk Management, Security Information Event Management (SIEM), and Web Proxy Services. Hands-on experience with network security areas such as NGFWs, IDS/IPS, SSE/SASE, SWG, ZTNA. Management and patching experience with DataCenter network technologies (e.g., Cisco ACI, Whitebox Switching with SONiC OS, BeyondEdge orchestrator, Cisco Nexus Platforms). Administration of campus infrastructure: Cisco Catalyst and Aruba OS Switching, Aruba Wireless Controllers, APs, Versa Networks SD-WAN appliances. Understanding of cloud architectures (AWS, Azure, GCP, IBM Cloud) and cloud connectivity solutions. Strong knowledge of routing protocols and failover scenarios, including BGP and OSPF. Network device configuration and infrastructure automation skills using tools such as Python and Ansible. Who You Are: Proactive and self-motivated, able to drive results with minimal supervision. Excellent communicator, capable of conveying complex technical concepts to diverse audiences. Strategic thinker with a focus on continuous improvement and innovation. Collaborative team player, adept at working with cross-functional teams. Detail-oriented and highly organized, with strong problem-solving skills. The Team You’ll Be A Part Of: The Engineering Excellence Group drives innovation velocity and enterprise infrastructure automation, which are critical elements of our growth and scaling strategy. This team is chartered to drive significant productivity, robustness, agility, and time-to-market advantage in the creation of Synopsys products and solutions. The group also leads corporate infrastructure transformation as we continue to drive IT operations leadership and invest in the next wave of disruptive technologies. Rewards and Benefits: We offer a comprehensive range of health, wellness, and financial benefits to cater to your needs. Our total rewards include both monetary and non-monetary offerings. Your recruiter will provide more details about the salary range and benefits during the hiring process. At Synopsys, we want talented people of every background to feel valued and supported to do their best work. Synopsys considers all applicants for employment without regard to race, color, religion, national origin, gender, sexual orientation, age, military veteran status, or disability.
Posted 2 weeks ago
0 years
1 - 1 Lacs
Hyderābād
Remote
ABOUT TIDE At Tide, we are building a business management platform designed to save small businesses time and money. We provide our members with business accounts and related banking services, but also a comprehensive set of connected administrative solutions from invoicing to accounting. Launched in 2017, Tide is now used by over 1 million small businesses across the world and is available to UK, Indian and German SMEs. Headquartered in central London, with offices in Sofia, Hyderabad, Delhi, Berlin and Belgrade, Tide employs over 2,000 employees. Tide is rapidly growing, expanding into new products and markets and always looking for passionate and driven people. Join us in our mission to empower small businesses and help them save time and money. ABOUT THE TEAM: The Threat Detection & Response team in Tide focuses on protecting the company by building a robust detection and automation platform. We're proactive in our defense, constantly hacking ourselves to improve our security posture and staying ahead of emerging threats. Our goal is to make Tide resilient against the ever-evolving threat landscape. ABOUT THE ROLE: As a Threat Detection Engineer, you'll be: Implementing the strategic vision for threat detection, taking ownership of the detection and response life cycle. Hands-on with the SIEM; from creating log parsers for in-house web apps to visualizing data Looker dashboards. Creating security automations and playbooks to automate mundane tasks; from data enrichment to automatically removing phishing emails from employee mailboxes. We want you to run with the "anything is possible" mantra. Continuously hunting for sophisticated threats across our infrastructure, leveraging threat intelligence and innovative detection techniques to stay ahead of attackers. You'll monitor and respond to threats across AWS, GCP, internal applications, and employee endpoints (Windows, macOS). Responsible for ensuring good quality detections which align with our standards and best practices . Identifying opportunities to build or enhance internal tools that streamline threat detection processes, improve data visibility, and increase response efficiency. WHAT WE ARE LOOKING FOR: Strong knowledge with one of the following: Splunk, Chronicle, Panther. Strong understanding of modern attack and defense techniques which apply to Cloud (AWS, GCP), SaaS (such as Google Workspace and Okta) and desktop (Windows and macOS) environments. Passion for passing on knowledge to fellow colleagues. Hands-on attitude and the ability to drive solutions to completion. Strong experience in security automation, from writing scripts to creating end-to-end automated workflows. Familiarity with SOAR platforms and automating threat detection and response tasks. Excellent spoken and written communication skills. Experience with writing automation and scripts; bonus points if you have a repository to show-case your work. WHAT YOU'LL GET IN RETURN: Competitive salary Self & Family Health Insurance Term & Life Insurance OPD Benefits Mental wellbeing through Plumm Learning & Development Budget WFH Setup allowance 15 days of Privilege leaves 12 days of Casual leaves 12 days of Sick leaves 3 paid days off for volunteering or L&D activities Stock Options TIDEAN WAYS OF WORKING: At Tide, we champion a flexible workplace model that supports both in-person and remote work to cater to the specific needs of our different teams. While remote work is supported, we believe in the power of face-to-face interactions to foster team spirit and collaboration. Our offices are designed as hubs for innovation and team-building, where we encourage regular in-person gatherings to foster a strong sense of community. #LI-NN1 TIDE IS A PLACE FOR EVERYONE At Tide, we believe that we can only succeed if we let our differences enrich our culture. Our Tideans come from a variety of backgrounds and experience levels. We consider everyone irrespective of their ethnicity, religion, sexual orientation, gender identity, family or parental status, national origin, veteran, neurodiversity or differently-abled status. We celebrate diversity in our workforce as a cornerstone of our success. Our commitment to a broad spectrum of ideas and backgrounds is what enables us to build products that resonate with our members' diverse needs and lives. We are One Team and foster a transparent and inclusive environment, where everyone's voice is heard. At Tide, we thrive on diversity, embracing various backgrounds and experiences. We welcome all individuals regardless of ethnicity, religion, sexual orientation, gender identity, or disability. Our inclusive culture is key to our success, helping us build products that meet our members' diverse needs. We are One Team, committed to transparency and ensuring everyone's voice is heard. You personal data will be processed by Tide for recruitment purposes and in accordance with Tide's Recruitment Privacy Notice .
Posted 2 weeks ago
6.0 years
3 - 10 Lacs
Hyderābād
On-site
Job Description: About Us At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities, and shareholders every day. One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We’re devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being. Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization. Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us!\ Global Business Services Global Business Services delivers Technology and Operations capabilities to Lines of Business and Staff Support Functions of Bank of America through a centrally managed, globally integrated delivery model and globally resilient operations. Global Business Services is recognized for flawless execution, sound risk management, operational resiliency, operational excellence, and innovation. In India, we are present in five locations and operate as BA Continuum India Private Limited (BACI), a non-banking subsidiary of Bank of America Corporation and the operating company for India operations of Global Business Services Process Overview* The Cyber Threat Defense team has a global footprint and operates 24x7 leveraging follow-the-sun model. This is a global role and candidate is expected to closely collaborate with other Cyber Defense teams based in different parts of the world on day-to-day basis. Job Description* The role is in the Cyber Threat Defense (CTD) team of the bank. Key responsibilities of the role include detecting and responding to cyber-attacks against bank’s applications as per established processes and procedures to ensure security, integrity, and confidentiality of the information, contribute to enhancing detection and preventive controls, and continually improve incident response capabilities. Responsibilities* Prevent, Detect, and respond to cyber-attacks against bank’s applications by leveraging advanced tools, processes & procedures, and your technical experience & skills. Perform analysis to determine timelines, TTPs used by Threat Actors and impact of the incidents and report them to Cyber Incident Management team as per the process. Briefs management and control SMEs on above analysis and collaborate to drive proactive control enhancements. Create and update detection rules to detect emerging threats by leveraging logs from various systems and applications. Create and update threat prevention and detection rules on Web Application to detect and block malicious activities. Collaborate with vendors and internal teams to fix any bugs, control issues or control upgrades. Apply a proactive understanding of cyber security threats to prevent incidents, enhance controls, and drive enterprise change Requirements* Education* - BE/B.Tech/MCA Experience Range* - 6+ Years Foundational skills* Hands-on experience of 6+ years of preventing, detecting, and responding to application layer attacks in a large enterprise environment. Strong understanding of common exploits, web application attacks (OWAS top 10 security risk and beyond), network protocols and infrastructure/application logs (eg weblogs, AD logs, security logs) for an efficient intrusion analysis Advanced log analysis skills leveraging tools such as Splunk or other SIEM solutions and scripting/regular expressions to find targeted attacks and hunting exercises. Good verbal and written communication skills for effective collaboration and incident reporting in a global environment Broader understanding Cyber threat environment, common TTPs used by Threat Actors and Defensive controls to defend against such threats Desired skills* Hands-on experience of managing rules on IPS/IDS on leading vendors is desirable Hands-on experience of creating and updating Web Application Firewall rules is strongly desirable. Work Timings* - 6:30 AM - 10:30 PM Job Location* - Hyderabad, Mumbai
Posted 2 weeks ago
6.0 years
3 - 5 Lacs
Hyderābād
On-site
ROLES & RESPONSIBILITIES Reviews alerts generated by SentinelOne and implements appropriate containment and mitigation measures Proficient in SIEM, with a focus on QRadar SIEM, as well as threat monitoring and hunting within SIEM environments. Analyzes payloads using JoeSandbox and escalates to the appropriate team as necessary Collaborates with the Forensics team to conduct threat hunting using identified Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) Assists the Tiger Team in targeted collections of systems based on identified malicious activities in the client's environment Conducts historical log reviews to support threat hunting efforts and ensures all malicious artifacts are mitigated in the SentinelOne console Examines client-provided documents and files to supplement the SOC investigation and mitigation strategy Conducts perimeter scans of client infrastructure and reports any identified vulnerabilities to the Tiger Team for appropriate escalation Manages client-related tasks within the ConnectWise Manage ticketing system as part of the Client Handling Lifecycle Creates user accounts in SentinelOne console for the client Generates Threat Reports showcasing activity observed within the SentinelOne product Executes passphrase exports as needed for client offboarding Submits legacy installer requests to ensure the team is properly equipped for deployment Provides timely alert notifications to the IR team of any malicious activity impacting our clients Assists with uninstalling/migrating SentinelOne Generates Ranger reports to provide needed visibility into client environments Manages and organizes client assets (multi-site and multi-group accounts) Applies appropriate interoperability exclusions relating to SentinelOne and client applications Performs SentinelOne installation / interoperability troubleshooting as needed Contributes to the overall documentation of SOC processes and procedures Participates in “Handler on Duty (HOD) shifts as assigned to support the TT client matters Internally escalates support ticket / alerts to Tier II-IV Analysts as needed May perform other duties as assigned by management SKILLS AND KNOWLEDGE Demonstrated knowledge of Windows and Unix operating systems Thorough understanding of Digital Forensics and Incident Response practices Proficiency in advanced analysis techniques for processing and reviewing large datasets in various formats Familiarity with TCP/IP and OSI Model concepts at a basic level Expertise in the Incident Response Life Cycle stages (Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned) Working knowledge of the MITRE ATT&CK framework at an intermediate level Proven ability to work independently and solve complex problems with little direction from management Highly detail-oriented and committed to producing quality work JOB REQUIREMENTS Associate’s degree and 6+ years of IT related experience or Bachelor’s Degree and 2-5 years related experience Current or previous knowledge of, or previous experience with, Endpoint Detection and Response (EDR) toolsets General knowledge of the Incident Handling Lifecycle Ability to communicate in both technical and non-technical terms both oral and written DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. PHYSICAL DEMANDS No physical exertion required Travel within or outside of the state Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. FLSA OVERTIME CATEGORY Job is exempt from the overtime provisions of the Fair Labor Standards Act. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. #LI Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete… You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. About Us Arete Incident Response is an elite team of the world’s leading cybersecurity and digital forensics experts who combat today’s sophisticated cyberattacks. We work tirelessly to provide unparalleled capabilities and solutions throughout the entire cyber incident life cycle. These include incident response readiness assessments and penetration tests as well as post-incident response, remediation, containment, and eradication services. We work in close collaboration with industry leaders and government agencies along with leading cybersecurity technology platforms to deliver an innovative, intelligence-based approach to solving our client’s toughest challenges. If you want to work with the most talented and experienced people in the industry with the desire to be a cyber hunter and industry expert, we want you to be a part of our team.
Posted 2 weeks ago
3.0 years
4 - 8 Lacs
Gurgaon
On-site
AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. At AHEAD, we prioritize creating a culture of belonging, where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer, and do not discriminate based on an individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, marital status, or any other protected characteristic under applicable law, whether actual or perceived. We embrace all candidates that will contribute to the diversification and enrichment of ideas and perspectives at AHEAD. SOC Analysts at AHEAD monitor customer environments and perform Incident Detection, Validation, and Incident Reporting. SOC Analysts are the frontline of SOC and are customer-facing representatives. SOC Analysts are responsible for triaging events, incidents, and reporting validated incidents to the customer for incident response. Incumbents will possess strong technical and analytical skills while providing accurate analysis of security related problems. They have a well-rounded networking background and are responsible for performing troubleshooting of customer issues. This individual is user focused and works to resolve client needs in a timely manner. These needs may involve resolving hardware/software failures, investigating, and responding to security threats, and making change request to the security policy of company devices. The SOC Analyst is expected to monitor security feeds streaming from client servers, network devices, and end user workstations, operate and maintain network security equipment at client locations. The Analyst is expected to be familiar with a wide range of security tools and understand basic security fundamentals. The Analyst will perform information security event analysis and must possess knowledge of operating systems, TCP/IP networking, network attacks, attack signatures, defense countermeasures, vulnerability management, and log analysis. Roles & Responsibilities: Monitor and analyze network traffic and alerts Investigate intrusion attempts and perform in-depth analysis of exploits Provide network intrusion detection expertise to support timely and effective decision making of when to declare an incident Conduct proactive threat research Review security events that are populated in a Security Information and Event Management (SIEM) system Tuning of rules, filters, and policies for detection-related security technologies to improve accuracy and visibility Data mining of log sources to uncover and investigate anomalous activity, along with related items of interest Independently follow procedures to contain, analyze, and eradicate malicious activity Document all activities during an incident and provide leadership with status updates during the life cycle of the incident Incident management, response, and reporting Provide information regarding intrusion events, security incidents, and other threat indications and warning information to the client Track trends, statistics, and key figures for each assigned client Assist with the development of processes and procedures to improve incident response times, analysis of incident, and overall SOC functions Reporting Incident reports Security status reports Client-facing security meetings Position Requirements: Incident handling/response experience Working knowledge of common operating systems (Windows, Linux, etc.) and basic endpoint security principles Understanding of and a strong desire to learn common security technologies (IDS, Firewall, SIEM, etc.) The ability to think creatively to find elegant solutions to complex problems Excellent verbal and written communication skills The desire to work both independently and collaboratively with a larger team A willingness to be challenged along with a strong appetite for learning 3-6 years of experience in Information Security, Incident Response, etc. (or related field) Hands-on experience with common security technologies (IDS, Firewall, SIEM, etc.) Knowledge of common security analysis tools & techniques Understanding of common security threats, attack vectors, vulnerabilities and exploits Knowledge of regular expressions Education: Bachelors Degree in Computer Science, Information Security or related/equivalent educational or work experience One or more of the following certifications: CISSP, GCIA, Security+, CEH, ACSE Why AHEAD: Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between. We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning. USA Employment Benefits include: Medical, Dental, and Vision Insurance 401(k) Paid company holidays Paid time off Paid parental and caregiver leave Plus more! See benefits https://www.aheadbenefits.com/ for additional details. The compensation range indicated in this posting reflects the On-Target Earnings (“OTE”) for this role, which includes a base salary and any applicable target bonus amount. This OTE range may vary based on the candidate’s relevant experience, qualifications, and geographic location.
Posted 2 weeks ago
170.0 years
1 - 7 Lacs
Noida
On-site
Country/Region: IN Requisition ID: 26012 Work Model: Position Type: Salary Range: Location: INDIA - NOIDA- BIRLASOFT OFFICE Title: Architect Description: Area(s) of responsibility About Us: Birlasoft, a global leader at the forefront of Cloud, AI, and Digital technologies, seamlessly blends domain expertise with enterprise solutions. The company’s consultative and design-thinking approach empowers societies worldwide, enhancing the efficiency and productivity of businesses. As part of the multibillion-dollar diversified CKA Birla Group, Birlasoft with its 12,000+ professionals, is committed to continuing the Group’s 170-year heritage of building sustainable communities. Job Title: Advanced Threat Management, Security Design, and Implementation Architect Job Summary: We are seeking a highly experienced Advanced Threat Management, Security Design, and Implementation Architect to lead our efforts in developing and deploying cutting-edge security solutions. The successful candidate will have deep expertise in advanced threat management, security architecture, and the implementation of robust security frameworks to protect an organization's critical assets. Key Responsibilities: Design and implement advanced threat management strategies to identify, mitigate, and respond to security threats. Develop and maintain comprehensive security architectures that align with business goals and regulatory requirements. Lead security design initiatives for new and existing systems, ensuring robust protection against cyber threats. Oversee the implementation of security controls, policies, and procedures across the organization. In-depth knowledge of XDR Technology, SIEM, SOAR, SOC Architecture, Infrastructure and Data Security, Advisory and GRC Processes. Outstanding problem-solving skills and a strategic, analytical mindset, and be able to decipher the complex cybersecurity landscapes. Conduct strategies for vulnerability management and lead initiatives around effective VM in the organization. Collaborate with cross-functional teams to integrate security into the software development lifecycle (SDLC). Provide expert guidance on the latest security trends, tools, and technologies to enhance the organization’s security posture. Develop and deliver training programs to educate employees on security best practices and threat management. Ensure compliance with industry standards, regulations, and frameworks (e.g., NIST, ISO 27001). Professionalism, integrity, and a commitment to maintaining the highest ethical standards in conducting professional responsibilities Required Qualifications: Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field. 10+ years of experience in advanced threat management, security design, and implementation. Proven expertise in developing and implementing security architectures and frameworks. Strong understanding of security assessment methodologies, vulnerability analysis, and penetration testing. Experience with security tools such as SIEM, SOAR, EDR, VM, Unified VM, ZTNA, IDS/IPS, firewalls, and endpoint protection, EASM, Deep/ Dark Web and Brand Protection. Excellent problem-solving skills and attention to detail. Strong communication and leadership skills. Experience with cloud security and securing hybrid environments. Preferred Qualifications: Master’s degree in Information Security or a related field. Preferred certification in multiple SIEM and SOAR solution implementation (MS Sentinel, Splunk, Phantom, Swimlane, QRADAR) Relevant certifications such as CISSP, CISM, CEH, or OSCP.
Posted 2 weeks ago
2.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Wrike is the most powerful work management platform. Built for teams and organizations looking to collaborate, create, and exceed every day, Wrike brings everyone and all work into a single place to remove complexity, increase productivity, and free people up to focus on their most purposeful work. Our vision: A world where everyone is free to focus on their most purposeful work, together. Ready to become a Wriker? Wrike is looking for a security operations center (SOC) analyst. This team protects Wrike’s valuable assets and data against cyber threats and attacks 24/7. More about your team: As a SOC Analyst, you will collaborate with a multidisciplinary security team comprising Infrastructure Security Engineers, Security Engineers, Application Security Engineers, and Compliance specialists. You’ll find yourself among a group of passionate and approachable professionals, dedicated to continuous improvement and teamwork in keeping our organization secure. Key Responsibilities: Monitor, analyze and triage security alerts and events Assess risk, impact of potential incidents, and take appropriate remediation steps and actions Employ various security tools and technologies to detect and investigate cyber threats Work collaboratively with other teams, including incident responders, to ensure proper escalation and resolution of cases Document and report security incidents Participate in further development and improvement of security monitoring and detection capabilities Stay up to date with the latest security trends, vulnerabilities, and best practices. You will achieve your best if you have: At least 2+ years of experience in a Security Operation Centre (SOC) or similar role Knowledge of network fundamentals and common security threats Well-developed logical thinking capabilities and problem-solving skills Strong communication skills, both written and verbal You will stand out with: Experience with security information event management (SIEM) and extended detection and response (e.g. Rapid7, Splunk, Wazuh, Microsoft Defender for Endpoint, Crowdstrike) Industry certificates is an advantage Experience with log analysis and correlation Perks of working with Wrike 10 days of National and Festival Holidays per year (eight fixed, two flexible) 18 days of paid vacation per year 14 days of sick leave with a medical certificate per year 5 uncertified sick days per year Group Medical Plan: Coverage for employees, spouse, children, and parents/in-laws for Rs 5,00,000. Free health checkup for employees Personal Accident Insurance: Rs 50,00,000 Term Life Insurance: Rs 50,00,000 Up to 26 weeks of paid maternity leave for the first two children 4 weeks of paid parental leave 2 days off for volunteering with nonprofit charities Broadband/Internet Reimbursement: INR 1500 per month Full-stocked pantry and complimentary lunch Hybrid work model Your recruitment buddy will be Saran Krishnamoorthy, Senior Recruiter. Who Is Wrike And Our Culture We’re a team of innovators and creators who solve the complex work problems of today and tomorrow. Hybrid work mode Wrike promotes a hybrid work mode for those that live near an office hub, we meet in the office 2-3 times a week. This work mode supports our culture of collaboration and solving problems fast to deliver business outcomes and win together. Our persona 💡 Smart: We love what we do, and we’re great at it because this is our domain. Our combined knowledge in this space is unmatched. 💚 Dedicated: We get up every day focused on helping our customers win. We’re committed to helping our teammates win, too! 🤗 Approachable: We're friendly, easy to get along with, considerate, and helpful. Our culture and Values 🤩 Customer-Focused We care about our customers. We understand the customer journey, experience, and value derived from Wrike. Decision-making and action-taking are done with the customer in mind. 🤝 Collaborative We work as one and win together, each bringing unique strengths that contribute to diversity of thought for better outcomes. Leveraging our own work management platform, we foster an environment of creative collaboration and shared achievement. 🎨 Creative We strive to succeed through continuous innovation. It’s our pursuit of novel concepts that helped us create a market category. We continue to cultivate a workplace that fosters creative thinking as a means of transcending conventional boundaries and empowers us to break new ground to deliver extraordinary work management solutions. 💪 Committed We believe in ownership at all levels of the organization, by owning workflows from start to finish. Each member of our team is an integral part of this commitment, establishing work as a platform for personal growth and transformation, as well as collective success and growth. Check out our LinkedIn Life Page, Company culture page, Instagram, Wrike Engineering Team, Medium, Meetup.com, Youtube for a feel for what life is like at Wrike. Show more Show less
Posted 2 weeks ago
8.0 years
0 Lacs
Pune, Maharashtra, India
On-site
About TripleLift We're TripleLift, an advertising platform on a mission to elevate digital advertising through beautiful creative, quality publishers, actionable data and smart targeting. Through over 1 trillion monthly ad transactions, we help publishers and platforms monetize their businesses. Our technology is where the world's leading brands find audiences across online video, connected television, display and native ads. Brand and enterprise customers choose us because of our innovative solutions, premium formats, and supportive experts dedicated to maximizing their performance. As part of the Vista Equity Partners portfolio, we are NMSDC certified, qualify for diverse spending goals and are committed to economic inclusion. Find out how TripleLift raises up the programmatic ecosystem at triplelift.com. The Role TripleLift is seeking a Lead Security Engineer to join our team full time. We are an established company in the advertising technology sector, trying to tackle some of the most challenging problems facing the industry. You will be joining a rapidly growing and complex environment and will work as part of a small team that will be responsible for developing, evangelizing, and executing our security roadmap. You’ll help drive improvements in our security operations capability and support critical projects enhancing our detect-and-respond capabilities. Responsibilities Cloud Infrastructure Management: Oversee and manage cloud infrastructure components, ensuring proper configuration, resource provisioning, and adherence to security best practices for AWS. Collaborate with development teams to define infrastructure requirements and implement scalable and secure cloud architectures. DevOps Integration and Automation: Collaborate with engineering teams to integrate security into CI/CD pipelines, version control systems, and infrastructure as code practices. Develop automation scripts and tools to streamline security controls and ensure consistent deployment of secure cloud resources. Network and Infrastructure Security: Design and implement secure network architectures aligned with a zero-trust model. Implement and manage Web Application Firewalls (WAFs), VPNs, and relevant network access controls. Collaborate with cloud engineers and developers to ensure secure configurations and protocols across services. Support the deployment and management of zero-trust security tooling to enforce least privilege and continuous authentication. Identity and Access Management (IAM): Develop and maintain robust IAM policies, roles, and permissions, implementing least privilege access controls, multi-factor authentication, and identity federation across cloud platforms. Endpoint Security and Privilege Management: Architect, implement, and maintain an endpoint privilege management strategy to enforce least privilege principles across all user workstations and servers. This includes defining and managing user roles, application control policies, and elevation rules to prevent unauthorized software execution and limit the impact of potential security breaches. Collaborate with the IT department to deploy and manage endpoint security controls, ensuring seamless integration with existing systems and minimal disruption to user productivity while significantly enhancing the organization's security posture against malware and insider threats. Security Monitoring and Incident Response: Establish and manage security monitoring tools, SIEM systems, and incident response processes to detect, respond, and mitigate security incidents in cloud environments. Develop and enhance incident response playbooks and implement automated incident response and alerting mechanisms. Compliance and Governance: Implement and maintain compliance controls, ensuring adherence to industry regulations and cloud-specific compliance requirements. Conduct regular audits, prepare reports, and actively manage governance processes. Problem Solving and Risk Analysis: Assess security risks, identify vulnerabilities, and propose effective solutions to mitigate risks within cloud environments. Cloud Security Best Practices: Stay up-to-date with cloud security best practices, emerging trends, and technologies. Communication and Collaboration: Collaborate effectively with cross-functional teams and stakeholders to communicate security requirements, provide guidance on secure cloud practices, and ensure alignment with organizational objectives. Work closely with developers to promote a culture of security awareness and knowledge sharing. Desired Skills And Attributes 8+ years of experience in security engineering or cloud security roles, with proven expertise in securing cloud-native, highly distributed environments. Proven ability to lead technical projects independently with minimal oversight, from design to deployment. Track record of mentoring junior engineers and influencing secure design across multiple teams. Strong communication skills with the ability to translate technical concepts for engineering, product, and compliance stakeholders. Comfortable engaging cross-functionally (engineering, DevOps, legal, compliance) to drive security improvements and cultural change. Strong programming proficiency in Java, Javascript, GoLang and/or Python with a focus on secure coding, automation, and infrastructure tooling. Experience integrating security controls in CI/CD pipelines, including GitHub Actions or similar. Deep hands-on experience with AWS services such as IAM, Security Hub, GuardDuty, VPC, S3, CloudTrail, CloudWatch, Config, and Lambda. Proficient in the use of SIEM systems, IDS/IPS, vulnerability scanning, and penetration testing tools. Strong understanding of cloud networking concepts including VPC peering, security groups, NACLs, private link, and hybrid connectivity (VPN/direct connect). Proven ability to analyze and effectively address security issues and incidents. Understanding of security fundamentals with relation to various cybersecurity and compliance frameworks, particularly NIST CSF, but any of: PCI, SOC2, HITRUST, ISO 27001/2, or similar is a plus Experience supporting internal audits, user access reviews, and policy exception workflows using tools like Jira or GRC platforms. Openness to adapt in response to emerging cloud technologies and security threats. Receptive to feedback and open to constructive criticism for continuous improvement. Holds a Cybersecurity certification, e.g. CISSP, CISA, Security+, or AWS Certified Security Specialty Life at TripleLift At TripleLift, we’re a team of great people who like who they work with and want to make everyone around them better. This means being positive, collaborative, and compassionate. We hustle harder than the competition and are continuously innovating. Learn more about TripleLift and our culture by visiting our LinkedIn Life page. Establishing People, Culture and Community Initiatives At TripleLift, we are committed to building a culture where people feel connected, supported, and empowered to do their best work. We invest in our people and foster a workplace that encourages curiosity, celebrates shared values, and promotes meaningful connections across teams and communities. We want to ensure the best talent of every background, viewpoint, and experience has an opportunity to be hired, belong, and develop at TripleLift. Through our People, Culture, and Community initiatives, we aim to create an environment where everyone can thrive and feel a true sense of belonging. Privacy Policy Please see our Privacy Policies on our TripleLift and 1plusX websites. TripleLift does not accept unsolicited resumes from any type of recruitment search firm. Any resume submitted in the absence of a signed agreement will become the property of TripleLift and no fee shall be due. Show more Show less
Posted 2 weeks ago
7.0 years
0 Lacs
Gurgaon, Haryana, India
Remote
Company Description Miratech helps visionaries change the world. We are a global IT services and consulting company that brings together enterprise and start-up innovation. Today, we support digital transformation for some of the world's largest enterprises. By partnering with both large and small players, we stay at the leading edge of technology, remain nimble even as a global leader, and create technology that helps our clients further enhance their business. We are a values-driven organization and our culture of Relentless Performance has enabled over 99% of Miratech's engagements to succeed by meeting or exceeding our scope, schedule, and/or budget objectives since our inception in 1989. Miratech has coverage across 5 continents and operates in over 25 countries around the world. Miratech retains nearly 1000 full-time professionals, and our annual growth rate exceeds 25%. Job Description We are looking for a Senior Identity Access Management Engineer (PAM Architecture) to lead the design of our PAM architecture strategy. This role will also involve contributing to the design and implementation of the PAM platform and its associated tools. Responsibilities: Develop a comprehensive PAM architecture strategy that aligns with organizational objectives and regulatory requirements. Lead the design contribute to the development and deployment of PAM solutions, focusing on workload access controls and secrets management. Contribute to the implementation and management of secrets management solutions ensuring secure storage, access and rotation of privileged credentials. Leverage PAM tools such as CyberArk, HashiCorp Vault, and Microsoft Entra ID to enhance security measures and streamline access management processes. Design PAM policies, standards, and procedures to ensure consistent and secure management of privileged accounts. Ensure PAM practices comply with organizational policies and regulatory requirements. Assess the effectiveness of PAM controls, making data-driven decisions to reduce risk and enhance security posture. Collaborate with technology and business partners to identify and mitigate risks associated with privileged access. Stay current with emerging trends and technologies in PAM and cybersecurity and driving enhancements to existing solutions. Qualifications 7+years of experience in Privileged Access Management using PAM Solutions like CyberArk/StrongDMas an Architect/SME. Strong industry experience in architecting and designing PAM solutions and deployment across the enterprise. Deep technical understanding of PAM capabilities, controls and security technologies in areas related to identity and access management to address privilege-based risk. Familiarity with regulatory requirements related to PAM, such as PCI DSS, HIPAA, or GDPR. Expertise with build vs. buy solution options. Good understanding of security concepts and technologies in the wider Identity and Access Management space: Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, and SIEM solutions. Proficient in Privileged Access Management (PAM) concepts and standard processes, covering privileged account discovery and vaulting, session management, DevOps secret management, and endpoint privilege management. Nice to have: Experience with Python, PowerShell, and Bash. We offer: Culture of Relentless Performance: join an unstoppable technology development team with a 99% project success rate and more than 30% year-over-year revenue growth. Competitive Pay and Benefits: enjoy a comprehensive compensation and benefits package, including health insurance,and a relocation program. Work From Anywhere Culture: make the most of the flexibility that comes with remote work. Growth Mindset: reap the benefits of a range of professional development opportunities, including certification programs, mentorship and talent investment programs, internal mobility and internship opportunities. Global Impact: collaborate on impactful projects for top global clients and shape the future of industries. Welcoming Multicultural Environment: be a part of a dynamic, global team and thrive in an inclusive and supportive work environment with open communication and regular team-building company social events. Social Sustainability Values: join oursustainable business practicesfocused on five pillars, including IT education, community empowerment, fair operating practices, environmental sustainability, and gender equality. Miratech is an equal opportunity employer and does not discriminate against any employee or applicant for employment based on race, color, religion, sex, national origin, age, disability, veteran status, sexual orientation, gender identity, or any other protected status under applicable law. Show more Show less
Posted 2 weeks ago
5.0 years
0 Lacs
Patel Nagar, Delhi, India
Remote
The remote work revolution is here to stay, especially in the tech industry. With Hyderabad fast becoming a major technology hub in India, there’s a massive surge in demand for high-paying work-from-home jobs for tech professionals. Whether you’re a software engineer, cloud architect, data analyst, or cybersecurity expert, companies are actively seeking skilled professionals who can work remotely. In this article, we’ll explore the top-paying WFH jobs for tech professionals in Hyderabad , the skills you need , companies hiring in 2025 , and answers to your most asked questions. 🌐 Why Tech Professionals Prefer Remote Work Work-from-home jobs offer more than just comfort and convenience. Here’s why tech professionals in Hyderabad are choosing remote roles: Higher salaries from international and pan-India companies Flexible schedules to balance work-life Opportunity to freelance or consult multiple clients No relocation or commute costs Access to global projects without leaving home 🧑💻 Top High-Paying Work from Home Jobs for Tech Professionals in Hyderabad Below are the most in-demand and well-paying remote jobs in Hyderabad for experienced and skilled techies. Full Stack Developer Overview: Tech companies are always hiring skilled full stack developers who can work on both frontend and backend development. Skills Required: HTML, CSS, JavaScript Node.js, React, Angular MongoDB, MySQL Git, RESTful APIs Top Employers: TCS Accenture Infosys Zoho Average Salary (Remote): ₹10–20 LPA Cloud Solutions Architect Overview: Cloud computing roles are in high demand with companies moving infrastructure to the cloud. Skills Required: AWS, Microsoft Azure, Google Cloud DevOps & Infrastructure as Code (IaC) Kubernetes, Docker Load balancing and cloud security Companies Hiring: Amazon Web Services (AWS) Tech Mahindra Microsoft Startups using microservices architecture Average Salary: ₹15–30 LPA Also Read: Best Work from Home Jobs in Hyderabad for Freshers and College Students Data Scientist / ML Engineer Overview: Data is the new oil, and Hyderabad companies are investing in predictive analytics, AI, and machine learning. Skills Required: Python, R TensorFlow, PyTorch SQL, Hadoop Data visualization tools (Tableau, Power BI) Top Recruiters: Deloitte Invesco Fractal Analytics Startups in fintech & healthtech Average Salary: ₹12–25 LPA Cybersecurity Analyst Overview: With remote work growing, cybersecurity experts are essential for data protection and risk management. Skills Required: Network security Firewalls, IDS/IPS Ethical hacking, penetration testing SIEM tools like Splunk, IBM QRadar Top Hiring Companies: HCL Technologies PwC Cognizant Global MNCs with security ops centers (SOCs) Average Salary: ₹10–22 LPA DevOps Engineer Overview: DevOps experts bridge the gap between development and operations, automating the deployment process. Skills Required: Jenkins, Docker, Kubernetes Terraform, Ansible CI/CD pipelines Git, scripting (Shell/Python) Hiring Companies: Accenture IBM Zensar SaaS startups Average Salary: ₹12–24 LPA Blockchain Developer Overview: With increased focus on Web3 and fintech in Hyderabad, blockchain is now a lucrative remote field. Skills Required: Solidity, Ethereum Smart contract development Web3.js, IPFS Crypto wallets and dApps Companies Hiring: CoinDCX WazirX Emerging fintech & Web3 startups Average Salary: ₹15–28 LPA AI / NLP Engineer Overview: Natural Language Processing is being used across chatbots, voice assistants, and automation tools. Skills Required: Python, spaCy, NLTK Transformers, HuggingFace Deep learning, BERT, GPT Top Employers: Google Hyderabad AI startups EdTech platforms Average Salary: ₹14–30 LPA Remote QA Automation Engineer Overview: Automation testers are crucial in agile development to ensure faster delivery and minimal bugs. Skills Required: Selenium, Cypress JMeter, Postman Jenkins, Maven Java, Python scripting Companies Hiring: Infosys Cognizant Product-based startups Average Salary: ₹8–18 LPA Remote Product Manager (Tech) Overview: For those with both technical and managerial acumen, PM roles are rewarding and fully remote in many firms. Skills Required: Agile methodologies JIRA, Asana UI/UX understanding Communication & leadership Companies Hiring: SaaS startups Healthtech firms Remote-first companies Average Salary: ₹20–35 LPA Freelance Tech Consultant Overview: Senior-level professionals often choose freelancing for better flexibility and pay per project. Services Offered: Software architecture Cloud migration Technical training & mentorship Best Platforms: Toptal Upwork Freelancer Earning Potential: ₹50,000 – ₹3 lakhs/month depending on projects Also Read: Genuine Work from Home Jobs in Kolkata Without Investment 💼 Top Companies Offering Remote Tech Jobs in Hyderabad (2025) Here’s a look at companies actively hiring tech professionals remotely: Company Roles Available Remotely TCS Full stack, Cloud, Testing, DevOps Cognizant Cybersecurity, Automation, Data Analytics Microsoft Azure, AI/ML, Product, QA Amazon India Cloud, NLP, Product Management Tech Mahindra DevOps, Security, Full Stack Accenture Data science, QA, Agile management Zoho Frontend, Backend, Cloud Invesco BI, Analytics, Cybersecurity Infosys Java, Python, QA Automation Technical Skills: 📚 Skills Needed for High-Paying Remote Tech Jobs Proficiency in modern programming languages Cloud technologies (AWS, Azure, GCP) CI/CD tools and automation platforms Machine learning and data analysis Cybersecurity frameworks Soft Skills: Communication and collaboration Remote work discipline Problem-solving abilities Time management Self-motivation and adaptability 🛠 Tools That Tech Professionals Should Master for Remote Work Tool / Platform Purpose GitHub / GitLab Version control and collaboration Slack / Microsoft Teams Team communication Zoom / Google Meet Video conferencing JIRA / Trello Project management Docker / Kubernetes Containerization and orchestration AWS / Azure Cloud services 📍 How to Find High-Paying Remote Tech Jobs in Hyderabad LinkedIn Use filters like “Remote” + “Hyderabad” in job search Connect with hiring managers and recruiters Naukri.com Create alerts for WFH roles Search roles by skill + remote (e.g., “AWS Developer remote”) AngelList (Wellfound) Great for startup jobs with high pay and equity options Toptal & Upwork For freelancers & consultants looking for global clients Company Career Pages Visit tech companies’ job portals and apply for remote listings 🚀 Tips to Land High-Paying Remote Tech Jobs Build a Strong GitHub Portfolio showcasing real projects Get Certified in AWS, Azure, Data Science, or Cybersecurity Update your LinkedIn with remote-ready skills Learn Communication Tools used by remote teams (Slack, Teams) Attend Virtual Tech Conferences to network with remote-first companies Highlight Remote Work Skills on your resume Prepare for Virtual Interviews with good camera setup and environment 🏁 Conclusion – High-Paying Work from Home Jobs in Hyderabad Remote work has become a reality — and Hyderabad, being a major tech city, is offering a goldmine of opportunities for tech professionals who prefer working from home. Whether you’re a developer, data analyst, cybersecurity expert, or DevOps engineer, there’s a high-paying work-from-home job waiting for you . By sharpening your skills, leveraging online platforms, and aligning with the needs of remote-first companies, you can build a successful tech career from the comfort of your home in Hyderabad. ❓ FAQs – High-Paying Work from Home Jobs in Hyderabad What are the best high-paying WFH jobs for techies in Hyderabad? Full stack developers, cloud architects, ML engineers, and DevOps engineers are some of the top-paying remote roles. Can I work remotely for international companies from Hyderabad? Yes. Platforms like Toptal, Upwork, and GitHub Jobs allow Indian professionals to work for global clients. What’s the minimum experience needed for high-paying remote jobs? Most roles require 2–5 years of experience, though startups often hire based on skills and projects. How do I verify if a remote tech job offer is genuine? Check company credentials, look for official email domains, and avoid paying any registration fees. Are cybersecurity roles available remotely? Absolutely. Many companies hire remote security analysts, penetration testers, and SOC professionals. How much can a cloud architect earn working from home? In Hyderabad, cloud architects working remotely can earn ₹15–30 LPA or more depending on skills and certifications. Which certifications help in getting high-paying WFH tech jobs? AWS Certified Solutions Architect, Azure Fundamentals, Google Cloud Engineer, Certified Ethical Hacker, and PMP. Is freelancing a good option for experienced tech professionals? Yes. Freelancing offers flexibility and competitive international pay, especially for experienced consultants. Are remote roles full-time or contract-based? Both. Many companies offer full-time remote roles with benefits, while others hire on a contract basis. What are the challenges of remote work in tech? Time zone differences, communication gaps, and the need for self-discipline. These can be managed with proper planning. Related Posts: Top Work from Home Jobs in Hyderabad Hiring Now Top 10 Remote Customer Service Jobs You Can Start Today The Pros and Cons of Working Remote Data Entry Jobs How to Land Your First Remote Entry-Level Job: Tips and Tricks How to Thrive in Remote Customer Service Jobs: Tips for Success Best Remote Customer Success Jobs You Can Work From Anywhere Top Remote Front End Developer Jobs Hiring in 2025 Top 10 Work from Home Jobs in Delhi Hiring Now Show more Show less
Posted 2 weeks ago
150.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
About BNP Paribas India Solutions Established in 2005, BNP Paribas India Solutions is a wholly owned subsidiary of BNP Paribas SA, European Union’s leading bank with an international reach. With delivery centers located in Bengaluru, Chennai and Mumbai, we are a 24x7 global delivery center. India Solutions services three business lines: Corporate and Institutional Banking, Investment Solutions and Retail Banking for BNP Paribas across the Group. Driving innovation and growth, we are harnessing the potential of over 10000 employees, to provide support and develop best-in-class solutions. About BNP Paribas Group BNP Paribas is the European Union’s leading bank and key player in international banking. It operates in 65 countries and has nearly 185,000 employees, including more than 145,000 in Europe. The Group has key positions in its three main fields of activity: Commercial, Personal Banking & Services for the Group’s commercial & personal banking and several specialised businesses including BNP Paribas Personal Finance and Arval; Investment & Protection Services for savings, investment, and protection solutions; and Corporate & Institutional Banking, focused on corporate and institutional clients. Based on its strong diversified and integrated model, the Group helps all its clients (individuals, community associations, entrepreneurs, SMEs, corporates and institutional clients) to realize their projects through solutions spanning financing, investment, savings and protection insurance. In Europe, BNP Paribas has four domestic markets: Belgium, France, Italy, and Luxembourg. The Group is rolling out its integrated commercial & personal banking model across several Mediterranean countries, Turkey, and Eastern Europe. As a key player in international banking, the Group has leading platforms and business lines in Europe, a strong presence in the Americas as well as a solid and fast-growing business in Asia-Pacific. BNP Paribas has implemented a Corporate Social Responsibility approach in all its activities, enabling it to contribute to the construction of a sustainable future, while ensuring the Group's performance and stability Commitment to Diversity and Inclusion At BNP Paribas, we passionately embrace diversity and are committed to fostering an inclusive workplace where all employees are valued, respected and can bring their authentic selves to work. We prohibit Discrimination and Harassment of any kind and our policies promote equal employment opportunity for all employees and applicants, irrespective of, but not limited to their gender, gender identity, sex, sexual orientation, ethnicity, race, colour, national origin, age, religion, social status, mental or physical disabilities, veteran status etc. As a global Bank, we truly believe that inclusion and diversity of our teams is key to our success in serving our clients and the communities we operate in. About Business Line/Function For 150 years, BNP Paribas Wealth Management has been committed to protecting clients’ wealth, developing it, and eventually passing it on to their loved ones. We deliver tailor-made experience, with outstanding attention to detail and expertise from precise local knowledge to the global know-how that we access from the Group. Our goal is to create a new wealth management experience fit for a world where digital interactions have come to enhance human ones. Wealth Management Investment Solution Hub (WMIS Hub) provides a global IT solution for BNP Paribas Wealth Management where we develop, maintain and evolve IT applications which fits to the specific needs of BNP Paribas Wealth Management business users. Job Title Cybersecurity Manager Date Department: Wealth Management Location: Chennai Business Line / Function ITRCS Reports To (Direct) Grade (if applicable) (Functional) Number Of Direct Reports 16 Directorship / Registration NA Position Purpose Provide a brief description of the overall purpose of the position, why this position exists and how it will contribute in achieving the team’s goal. Main Scope Role of Wealth Management India IT Risk and Information Systems Security Manager, being understood this role includes delegations from APAC WM CISO for the team located in India territory and fully participates in overall WMIS Cybersecurity and IT Risk objectives. Participate to IT project security reviews conducted both on a global and APAC basis across all platforms. Participate in the Security Operation meetings in APAC, EMEA & CH regions. This requires the incumbent to foster close working relationships with other business areas and IT Development/Production/CSIRT/Production Security teams. The incumbent will work hand in hand with the IT Dev, Prod teams and the business, as an enabler and a facilitator. Responsibilities Direct Responsibilities WM IT Risk and Security Manager Manage the WM IT Risk and Security local team in India by managing the recruitment, performances review as well as training and career-path development. Coordinate with APAC WM security actors, including India-based resources. Coordinate with APAC WM IT teams on risk and security topics, while promoting a secure development and deployment culture Assist for a Risk Treatment for any APAC WM issue, based on the WM GAIM generic process. Periodic reporting of security status to WM CISO APAC and WM Global CISO Contribute to the IT Risk and Cybersecurity Governance including procedural framework, Cybersecurity awareness and communication. Ensure the regular reporting for management follow-up IT Security Compliance (delegation on WM APAC scope) Ensure the alignment with the Group and WM GAIM security policies, for both project and production assets. Ensure the protection of WM business data with an adequate security level of WM assets, based on project assessment and production review processes. Ensure the compliance with regulatory bodies requirements, including for APAC (HKMA, MAS), EU (GDPR), Switzerland (FINMA) Leveraging on a deep knowledge of Security standards such as NIST, CIS,ISO2700x , ensure the compliance with the IT security requirements Ensure the compliance with the Third-party Technology risks and Cloud security. Identify the process gaps and provide solutions. Application Security Ensure the effective implementation of Secure SDL including the DevSecOps and Threat modelling practices. Identify and implement the latest security standards for internet facing and internal assets. Improve the Vulnerability Management at the application level in terms of efficiency as well as effectiveness (including Static Acceptance Security Testing – SAST, Dynamic Acceptance Security Testing – DAST and Software Composition Analysis – SCA). Perform Security risk assessments and reviews to be presented to respective committees. Ensure the adequate security level for all WM GAIM applications, whatever the IT project manager’s location and hosting provider. Production Security Oversight (delegation on WM APAC scope) Identify the production security requirements and ensure a smooth integration of WM assets within APAC IT Production, including network flow opening and Application Zoning compliance. Identify the compliance level of the production environment and contribute to remediation actions definition while keeping the oversight on actions progress. Keep an overview and ensure the adequate Vulnerability Management at the server and middleware level leveraging on production scans and liaising with relevant production stakeholders. Contribute to the management of Cybersecurity incidents. CyberSecurity Program (delegation on WM APAC scope) Contribute to the steering and driving of the security initiatives on the APAC scope expected by the WM Cybersecurity Program. Contributing Responsibilities Coordination with IT Security actors Reporting line to the WM GAIM Global CISO: alignment on the objectives and means, contribution to the different global reporting (WM Cybersecurity Committee, Wholesale Application Security Dashboard…) Coordination and control of security activities performed by APAC CIB Business Information Security and Production Security teams, including project assessment from production point of view, production security review, user security awareness for the WM scope. Coordination with the Swiss Security team concerning integration of WM assets within Swiss IT production. Keeping abreast of initiatives by the IT Security community within the Group and other IT Security stakeholders within the Group. Technical & Behavioral Competencies Cybersecurity / Technical Value-added Competencies ü Cybersecurity Governance: framework (NIST / CIS framework), Security incident management, Logging & Detection (SIEM – ELK products) ü DevSecOps: CI/CD toolchain knowledge of various tools Source code management: sonarQuabe, bibucket, github/gitlab Security application scanning (e.g. Sonatype/NexusIQ, Fortify, AppSpider, Qualys, DTR scan…) Automation/orchestration: Ansible tower, Jenkins ü Application Security: Threat modeling, Security architecture key concepts, exposure to various development framework and applicative landscape (Java/Web, Mobile applications, containerization/docker, kubernetes, API management, Cloud security) ü Vulnerability Management Nexpose, Nessus ü Ethical Hacking Knowledge Kali Linux knowledge (metasploit, nmap) Specific Qualifications (if Required) Qualifications and Experience ü 10 years' experience in information security evaluation and design of technical architectures ü Functional as well as technical knowledge of the applications used within BNP Paribas ü Knowledge of the Norms and Standards of the BNP Paribas Group, in particular with respect to ITRM & Wholesale IT Security Norms and Policies ü Team management experience is a must ü Preferred Master level in Computer science and Information Security Skills Referential Behavioural Skills: (Please select up to 4 skills) Communication skills - oral & written Ability to collaborate / Teamwork Decision Making Ability to deliver / Results driven Transversal Skills: (Please select up to 5 skills) Ability to set up relevant performance indicators Ability to develop and adapt a process Ability to manage a project Ability To Develop Others & Improve Their Skills Ability to manage / facilitate a meeting, seminar, committee, training… Education Level Master Degree or equivalent Experience Level At least 10 years Other/Specific Qualifications (if Required) Other Value-added Competencies ü Advanced IT security certifications may be advantageous (such as CISM, CCSP, CSK, CEH, CISSP…). ü Operational Risk and Permanent Control ü Data Analytics solutions (Tableau, PowerBI) and strong expertise in Dashboard/reporting Show more Show less
Posted 2 weeks ago
2.0 years
0 Lacs
Kanpur, Uttar Pradesh, India
On-site
Description Design, implement, and manage deception strategies and technologies within the organisation's cybersecurity infrastructure. Responsibilities Hands-on experience in working with Deception Technology and SIEM Tools Design and development of scalable, reliable, and fault-tolerant systems. Integrate/Modify existing open-source software according to the requirements. Prepare presentations and reports. Authoring research papers. Hands-on experience in virtualisation, cloud deployments, and networking. Ability to debug code and overcome fundamental challenges while coding. Hands-on experience in Python. Knowledge of tools like -- nmap, Metasploit, Wireshark, Burp suite, etc. Comfortable in using Linux OS. Good writing and communication skills to assist the group in technical writing. Eligibility A Bachelor's degree in computer science or a similar subject is required. 2 years of experience in the same domain as mentioned under the category of responsibilities. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph. Show more Show less
Posted 2 weeks ago
5.0 - 7.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Design and maintain the application, data and cybersecurity architecture to support security, scalability resilience, and risk management requirements of AIR Global’s data, applications, IT systems, on-premises and in cloud infrastructure. Review and support the security design for new IT projects, ensuring alignment with organizational security policies and standards. Collaborate with project teams to identify security requirements and integrate security controls into the project lifecycle. Design and implement secure architecture for Azure environments, leveraging Azure security services and best practices. Ensure compliance with Azure security standards and manage security configurations for Azure resources. Develop and enforce security measures for APIs, including authentication, authorization, and threat protection. Implement API security best practices and manage API gateways to ensure secure data exchange. On-Premises Network Security: Design secure network architectures for on-premises environments, including segmentation, firewalls, and intrusion detection systems. Architect and oversee the implementation of security measures for eCommerce platforms, particularly Magento, ensuring compliance with industry standards and best practices. Architect DevsecOPS, CI/CD pipeline. Design and support microservice architectures to enhance system scalability, flexibility, Security and maintainability. Collaborate with cross-functional teams IT and security team to understand technical, IT security and business requirements and translate them into well-architect solutions. Support risk assessments and develop mitigation strategies to ensure the security and integrity of data and IT systems. Stay updated with the latest trends and technologies in data management, security architecture, and eCommerce platforms. Provide technical leadership and guidance to development teams, ensuring best practices in coding, design, and architecture. Prepare detailed documentation of architectural designs, security protocols, and implementation plans. Participate in the evaluation and selection of new technologies and tools to enhance the organization's capabilities. Experience & Qualification: Minimum of 5-7 years of experience in solution architecture, with a focus on data management and cybersecurity. Demonstrated experience in architecture and design solutions using Azure Data Lake and other data analysis tools. Hands-on experience with security architecture for eCommerce platforms, particularly Magento. Experience in developing and implementing microservice architectures. Familiarity with cloud security, application, database and api architecture best practices. Computer Science or Relevant Degree Any of the three-certification listed below: Microsoft Certified: Cybersecurity Architect Expert Microsoft Certified: Azure Security Engineer Associate Trend Micro Certifications Microsoft Certified: Identity and Access Certified Data Management Professional (CDMP) AWS Certified Solutions Architect: Validates ex Skills and Competencies: Understanding of cybersecurity frameworks (e.g., NIST, ISO 27001) and compliance requirements (e.g., GDPR, HIPAA). Knowledge of designing secure networks, applications, and cloud Architecture, including understanding firewalls, VPNs, and micro service architecture. Understanding of IAM principles, including user provisioning, authentication, and authorization techniques. Familiarity with security tools, such as SIEM (Security Information and Event Management), IDS/IPS (Intrusion Detection/Prevention Systems), and endpoint protection. Strong design knowledge and experience working with Trend Micro Vision One, XDR platform, email security, EDR, email security, PAM, IPS, WAF and DLP technologies. Strong design and supporft on experience working with Azure/AWS security controls such as Defender, Purview, IAM, Entra ID etc.. The ability to verify solutions and gain assurance that they are fit for purpose through demonstrable evidence of controls and testing Strong understanding of the changing threat landscape and how this may affect our systems The ability to challenge concerns and report through appropriate channels Self-drive, motivation and the ability to work independently to deliver expected outcomes Strong analytical and report writing skills API Security Understanding of API Protocols: Knowledge of REST, SOAP, and GraphQL. Authentication and Authorization: Familiarity with OAuth, JWT, and API keys. Threat Protection: Implementing rate limiting, IP whitelisting, and DDoS protection. Data Encryption: Ensuring data is encrypted in transit and at rest. API Gateway Management: Experience with tools like Azure API Management, Kong, or Apigee. Azure Architecture Azure Services: Proficiency with Azure services such as Azure Virtual Machines, Azure Kubernetes Service (AKS), Azure Functions, and Azure Storage. Networking: Understanding of Azure Virtual Networks, Subnets, and Network Security Groups. Security Best Practices: Implementing Azure Security Center recommendations and Azure Policy. Infrastructure as Code (IaC): Experience with ARM templates, Bicep, or Terraform for deploying Azure resources. Monitoring and Logging: Using Azure Monitor, Log Analytics, and Application Insights for tracking and diagnosing issues. Identity and Access Management (IAM) Azure Active Directory (AAD): Deep knowledge of AAD, including user and group management, conditional access policies, and identity protection. Role-Based Access Control (RBAC): Implementing and managing RBAC in Azure to control access to resources. Single Sign-On (SSO): Configuring SSO for applications using AAD. Multi-Factor Authentication (MFA): Enforcing MFA for enhanced security. Show more Show less
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The Security Information and Event Management (SIEM) job market in India is thriving, with a growing demand for professionals who can monitor, analyze, and respond to security incidents in real-time. SIEM jobs offer lucrative career opportunities for individuals with a strong understanding of cybersecurity concepts and technologies.
The average salary range for SIEM professionals in India varies based on experience level: - Entry-level: INR 4-6 lakhs per annum - Mid-level: INR 8-12 lakhs per annum - Experienced: INR 15-20 lakhs per annum
Career progression in the SIEM field typically follows a path from: - SIEM Analyst - SIEM Engineer - SIEM Consultant - SIEM Architect
In addition to SIEM expertise, professionals in this field are often expected to have knowledge of: - Network Security - Incident Response - Threat Intelligence - Security Operations Center (SOC) operations
As you explore SIEM jobs in India, remember to continuously upgrade your skills, stay informed about the latest cybersecurity trends, and practice answering interview questions to showcase your expertise confidently. With the right preparation and dedication, you can excel in the dynamic field of SIEM and carve out a successful career for yourself. Good luck!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.