Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
3.0 years
0 Lacs
Gurugram, Haryana, India
On-site
Role : Cloud and Observability Engineer Experience : 3-6 Years+ Location : Gurugram To Apply: https://forms.gle/mu8BgX7j5PTKF1Lz5 About the Job Coralogix is a modern, full-stack observability platform transforming how businesses process and understand their data. Our unique architecture powers in-stream analytics without reliance on expensive indexing or hot storage. We specialize in comprehensive monitoring of logs, metrics, trace and security events with features such as APM, RUM, SIEM, Kubernetes monitoring and more, all enhancing operational efficiency and reducing observability spend by up to 70%. Coralogix is rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing. By enabling users to define different data pipelines per use case, we provide deep Observability and Security insights, at an infinite scale, for less than half the cost. We are looking for a Customer Success Engineer to join our highly experienced global team. The Customer Success Engineer role embodies the critical intersection of technical expertise and a focus on customer satisfaction. This role is tasked with helping Coralogix customers with giving answers to technical questions, solution architecture, and ensuring successful adoption of the Coralogix Platform. About The Position: Job Summary: As a Cloud and Observability Engineer you will play a critical role in ensuring a smooth transition of customers’ monitoring and observability infrastructure. Your expertise in various other observability tools, coupled with a strong understanding of DevOps, will be essential in successfully migrating alerts and dashboards through creating extension packages and enhancing the customer's monitoring capabilities. You will collaborate with cross-functional teams, understand their requirements, design migration & extension strategies, execute the migration process, and provide training and support throughout the engagement Responsibilities: Extension Delivery: Build & enhance quality extension packages for alerts, dashboards and parsing rules in Coralogix Platform to improve monitoring experience for key services using our platform. This would entail - Research related to building world class extensions including for container technology, services from cloud service providers, etc. Building related Alerts and Dashboards in Coralogix, validating their accuracy & consistency and creating their detailed overviews and documentation Configuring Parsing rules in Coralogix using regex to structure the data as per requirements Building packages as per Coralogix methodology and standards and automating ongoing process using scripting Support internal stakeholders and customers with respect to queries, issues and feedback with respect to deployed extensions Migration Delivery: Help migrate customer alerts, dashboards and parsing rules from leading competitive observability and security platforms to Coralogix Knowledge Management: Build, maintain and evolve documentation with respect to all aspects of extensions and migration Conduct training sessions for internal stakeholders and customer on all aspects of the platform functionality (alerts, dashboards, parsing, querying, etc.), migrations process & techniques and extensions content Collaborate closely with internal stakeholders and customers to understand their specific monitoring needs, gather requirements, and ensure alignment during the extension building process Professional Experience: Minimum 3+ years of experience as a Systems Engineer, DevOps Engineer, or similar roles, with a focus on monitoring, alerting, and observability solutions. Cloud Technology Experience - 2+ yrs of hands-on experience with and understanding of Cloud and Container technologies (GCP/Azure/AWS + K8/EKS/GKE/AKS). Cloud Service Provider DevOps certifications would be a plus Observability Expertise: Good knowledge and hands-on experience with 2 or more Observability platforms, including alert creation, dashboard creation, and infrastructure monitoring.Researching latest industry trends is part of the scope. Deployments & Automation: Good understanding of CI/CD with at least one deployment and version control tool. Engineers would need to package alerts and dashboards as extension packs on an ongoing basis. Grafana & PromQL Proficiency: Basic understanding and practical experience with PromQL, Prometheus's query language, for querying metrics and creating custom dashboards. Person would also need to learn Dataprime and Lucene syntax on the job. Troubleshooting Skills: Excellent problem-solving and debugging skills to diagnose issues, identify root causes, and propose effective solutions. Communication Skills: Strong English verbal and written communication skills to collaborate with the customer's cross-functional teams, deliver training sessions, and create clear technical documentation. Analytical Thinking: Ability to analyze complex systems, identify inefficiencies or gaps, and propose optimized monitoring solutions. Availability: Ability to also work across US and European timezones This is a work from office role Cultural Fit We’re seeking candidates who are hungry, humble, and smart. Coralogix fosters a culture of innovation and continuous learning, where team members are encouraged to challenge the status quo and contribute to our shared mission. If you thrive in dynamic environments and are eager to shape the future of observability solutions, we’d love to hear from you. Coralogix is an equal opportunity employer and encourages applicants from all backgrounds to apply Show more Show less
Posted 2 weeks ago
2.0 years
0 Lacs
Mumbai Metropolitan Region
On-site
Skills: SIEM Tools, Intrusion Detection Systems, Incident Response, Threat Intelligence Platforms, Endpoint Detection and Response, Network Traffic Analysis, Log Analysis, Vulnerability Assessment Tools, Qualifications BE/ B.Tech/ M.Tech/ MCA with 60%+ throughout the academics. Security certifications like CEH or equivalent preferred. Experience And Skillset Minimum 2 +years hands-on experience with one or more SIEM tools (Log Logic, LogRhythm, Splunk, QRadar, ArcSight etc.). In-depth understanding of security threats (preferably OWASP Top 10 vulnerabilities), threat attack methods and the current threat environment. Proficient in Incident Management and Response. Basic knowledge of Windows and Unix environments. Knowledge of OSI Model, TCP/IP Protocols, network security. Knowledge about other security tools like Packet Analyzers, HIPS/NIPS, Network Monitoring tools, Cloud Security, AV, EDR, WAF etc. Responsibilities Responsible for working in a 24x7 Security Operation center (SOC) environment. Carry out investigation and correlation and work with the stakeholders towards mitigation and closure of security incidents. Monitor various dash boards from different security solutions on shift basis. Work with the engineering team for Sensor and SIEM rules fine-tuning. Prepare various management reports from SIEM and other security solutions. Provide analysis and trending of security log data from a large number of heterogeneous security devices. Provide threat and vulnerability analysis as well as security advisory services. Analyze and respond to previously undisclosed software and hardware vulnerabilities. Investigate, document, and report on information security issues and emerging trends. Seamlessly integrate with the team work culture, ensure proper information flow across shifts, prepare/take part in shift handovers. Communicate effectively by contributing significantly to the development and delivery of a variety of written and visual documents for diverse audiences. Location Navi Mumbai (On-Site) Show more Show less
Posted 2 weeks ago
2.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
Skills: SIEM Tools, Intrusion Detection Systems, Incident Response, Threat Intelligence Platforms, Endpoint Detection and Response, Network Traffic Analysis, Log Analysis, Vulnerability Assessment Tools, Qualifications BE/ B.Tech/ M.Tech/ MCA with 60%+ throughout the academics. Security certifications like CEH or equivalent preferred. Experience And Skillset Minimum 2 +years hands-on experience with one or more SIEM tools (Log Logic, LogRhythm, Splunk, QRadar, ArcSight etc.). In-depth understanding of security threats (preferably OWASP Top 10 vulnerabilities), threat attack methods and the current threat environment. Proficient in Incident Management and Response. Basic knowledge of Windows and Unix environments. Knowledge of OSI Model, TCP/IP Protocols, network security. Knowledge about other security tools like Packet Analyzers, HIPS/NIPS, Network Monitoring tools, Cloud Security, AV, EDR, WAF etc. Responsibilities Responsible for working in a 24x7 Security Operation center (SOC) environment. Carry out investigation and correlation and work with the stakeholders towards mitigation and closure of security incidents. Monitor various dash boards from different security solutions on shift basis. Work with the engineering team for Sensor and SIEM rules fine-tuning. Prepare various management reports from SIEM and other security solutions. Provide analysis and trending of security log data from a large number of heterogeneous security devices. Provide threat and vulnerability analysis as well as security advisory services. Analyze and respond to previously undisclosed software and hardware vulnerabilities. Investigate, document, and report on information security issues and emerging trends. Seamlessly integrate with the team work culture, ensure proper information flow across shifts, prepare/take part in shift handovers. Communicate effectively by contributing significantly to the development and delivery of a variety of written and visual documents for diverse audiences. Location Navi Mumbai (On-Site) Show more Show less
Posted 2 weeks ago
0 years
0 Lacs
Pune, Maharashtra, India
On-site
Join us as a AVP - Cyber Operations at Barclays, responsible for supporting the successful delivery of Location Strategy projects to plan, budget, agreed quality and governance standards. You'll spearhead the evolution of our digital landscape, driving innovation and excellence. You will harness cutting-edge technology to revolutionise our digital offerings, ensuring unparalleled customer experiences. To be successful as a AVP - Cyber Operations you should have experience with: Proficiency in Develop and maintain audit documentation and reports. Proficiency in SIEM technologies & usability in a Large & Complex Computing Environment. Analysis and response of detected security incidents, timely escalation and drive to ensure the closure of incidents. Knowledge of auditing standards and frameworks (e.g., CSF, Mitre Att£ck & Detection Lifecycle Management). Incident Response skills including proficiency in PCAP Capture, Network Analysis, and Traffic Patterns. Identify attacks and malware (Trojans, Ransomware, etc.) analysing event data generated from proxy, endpoints, IDS, MPS, network devices etc. Some Other Highly Valued Skills May Include Perform SIEM Monitoring and Cyber Security alerts creation process Collaborate with audit teams and stakeholders. Support audit planning, fieldwork, and reporting. Support risk assessments and internal control evaluations. Develop and maintain audit documentation and reports. Provide support for audit activities, ensuring effective risk management and compliance. Understanding of risk management principles, including risk assessment, mitigation, and monitoring. Familiarity with regulatory requirements (e.g., SOX ) and industry standards. Knowledge of internal control frameworks and testing procedures. Understanding of traditional ITIL concepts Incident, Change and Problem management; Understanding of Cloud Security Principles (AWS/Google/Azure) Understanding of Open Source network analysis tools, and Open-source intelligence tools (OSINT). In-depth knowledge of the Cyber Kill-Chain, Intelligence-driven defence and security architectures. Ability to help write concise reports based on complex data with accuracy, brevity, and speed. Appreciation of End Point security products including firewalls, Anti-virus and network access control. You may be assessed on the key critical skills relevant for success in role, such as risk and controls, change and transformation, business acumen strategic thinking and digital and technology, as well as job-specific technical skills. This role is based in Pune. Purpose of the role To monitor the performance of operational controls, implement and manage security controls and consider lessons learnt in order to protect the bank from potential cyber-attacks and respond to threats. Accountabilities Management of security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cyber security incidents, and provide a prompt response to restore normal operations with minimised system damage. Identification of emerging cyber security threats, attack techniques and technologies to detect/prevent incidents, and collaborate with networks and conferences to gain industry knowledge and expertise. Management and analysis of security information and event management systems to collect, correlate and analyse security logs, events and alerts/potential threats. Triage of data loss prevention alerts to identify and prevent sensitive data for being exfiltrated from the banks network. Management of cyber security incidents including remediation & driving to closure. Assistant Vice President Expectations To advise and influence decision making, contribute to policy development and take responsibility for operational effectiveness. Collaborate closely with other functions/ business divisions. Lead a team performing complex tasks, using well developed professional knowledge and skills to deliver on work that impacts the whole business function. Set objectives and coach employees in pursuit of those objectives, appraisal of performance relative to objectives and determination of reward outcomes If the position has leadership responsibilities, People Leaders are expected to demonstrate a clear set of leadership behaviours to create an environment for colleagues to thrive and deliver to a consistently excellent standard. The four LEAD behaviours are: L – Listen and be authentic, E – Energise and inspire, A – Align across the enterprise, D – Develop others. OR for an individual contributor, they will lead collaborative assignments and guide team members through structured assignments, identify the need for the inclusion of other areas of specialisation to complete assignments. They will identify new directions for assignments and/ or projects, identifying a combination of cross functional methodologies or practices to meet required outcomes. Consult on complex issues; providing advice to People Leaders to support the resolution of escalated issues. Identify ways to mitigate risk and developing new policies/procedures in support of the control and governance agenda. Take ownership for managing risk and strengthening controls in relation to the work done. Perform work that is closely related to that of other areas, which requires understanding of how areas coordinate and contribute to the achievement of the objectives of the organisation sub-function. Collaborate with other areas of work, for business aligned support areas to keep up to speed with business activity and the business strategy. Engage in complex analysis of data from multiple sources of information, internal and external sources such as procedures and practises (in other areas, teams, companies, etc).to solve problems creatively and effectively. Communicate complex information. 'Complex' information could include sensitive information or information that is difficult to communicate because of its content or its audience. Influence or convince stakeholders to achieve outcomes. All colleagues will be expected to demonstrate the Barclays Values of Respect, Integrity, Service, Excellence and Stewardship – our moral compass, helping us do what we believe is right. They will also be expected to demonstrate the Barclays Mindset – to Empower, Challenge and Drive – the operating manual for how we behave. Back to nav Share job X(Opens in new tab or window) Facebook(Opens in new tab or window) LinkedIn(Opens in new tab or window) Show more Show less
Posted 2 weeks ago
170.0 years
0 Lacs
Greater Hyderabad Area
On-site
Area(s) of responsibility About Us Birlasoft, a global leader at the forefront of Cloud, AI, and Digital technologies, seamlessly blends domain expertise with enterprise solutions. The company’s consultative and design-thinking approach empowers societies worldwide, enhancing the efficiency and productivity of businesses. As part of the multibillion-dollar diversified CKA Birla Group, Birlasoft with its 12,000+ professionals, is committed to continuing the Group’s 170-year heritage of building sustainable communities. Job Title: Advanced Threat Management, Security Design, and Implementation Architect Job Summary: We are seeking a highly experienced Advanced Threat Management, Security Design, and Implementation Architect to lead our efforts in developing and deploying cutting-edge security solutions. The successful candidate will have deep expertise in advanced threat management, security architecture, and the implementation of robust security frameworks to protect an organization's critical assets. Key Responsibilities Design and implement advanced threat management strategies to identify, mitigate, and respond to security threats. Develop and maintain comprehensive security architectures that align with business goals and regulatory requirements. Lead security design initiatives for new and existing systems, ensuring robust protection against cyber threats. Oversee the implementation of security controls, policies, and procedures across the organization. In-depth knowledge of XDR Technology, SIEM, SOAR, SOC Architecture, Infrastructure and Data Security, Advisory and GRC Processes. Outstanding problem-solving skills and a strategic, analytical mindset, and be able to decipher the complex cybersecurity landscapes. Conduct strategies for vulnerability management and lead initiatives around effective VM in the organization. Collaborate with cross-functional teams to integrate security into the software development lifecycle (SDLC). Provide expert guidance on the latest security trends, tools, and technologies to enhance the organization’s security posture. Develop and deliver training programs to educate employees on security best practices and threat management. Ensure compliance with industry standards, regulations, and frameworks (e.g., NIST, ISO 27001). Professionalism, integrity, and a commitment to maintaining the highest ethical standards in conducting professional responsibilities Required Qualifications Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field. 10+ years of experience in advanced threat management, security design, and implementation. Proven expertise in developing and implementing security architectures and frameworks. Strong understanding of security assessment methodologies, vulnerability analysis, and penetration testing. Experience with security tools such as SIEM, SOAR, EDR, VM, Unified VM, ZTNA, IDS/IPS, firewalls, and endpoint protection, EASM, Deep/ Dark Web and Brand Protection. Excellent problem-solving skills and attention to detail. Strong communication and leadership skills. Experience with cloud security and securing hybrid environments. Preferred Qualifications Master’s degree in Information Security or a related field. Preferred certification in multiple SIEM and SOAR solution implementation (MS Sentinel, Splunk, Phantom, Swimlane, QRADAR) Relevant certifications such as CISSP, CISM, CEH, or OSCP. Show more Show less
Posted 2 weeks ago
2.0 - 3.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Company Overview Interactive Brokers Group, Inc. (Nasdaq: IBKR) is a global financial services company headquartered in Greenwich, CT, USA, with offices in over 15 countries. We have been at the forefront of financial innovation for over four decades, known for our cutting-edge technology and client commitment. IBKR affiliates provide global electronic brokerage services around the clock on stocks, options, futures, currencies, bonds, and funds to clients in over 200 countries and territories. We serve individual investors and institutions, including financial advisors, hedge funds and introducing brokers. Our advanced technology, competitive pricing, and global market help our clients to make the most of their investments. Barron's has recognized Interactive Brokers as the #1 online broker for six consecutive years. Join our dynamic, multi-national team and be a part of a company that simplifies and enhances financial opportunities using state-of-the-art technology. Position Overview Seeking a Security Analyst to join our Security Operations Center (SOC), focusing on incident response and threat detection. This role involves working with enterprise SIEM platforms, EDR solutions, and incident management tools to protect IBKR's global trading infrastructure. Key Responsibilities Triage and investigate security alerts using SIEM/EDR tools Execute incident response playbooks Perform malware analysis and IOC identification Create incident tickets and maintain documentation Conduct initial forensic data collection Support security event correlation and analysis Monitor suspicious endpoint activities Participate in 24x7 incident response coverage Required Technical Skills Experience with SIEM (Splunk/QRadar) EDR platforms (CrowdStrike/Carbon Black) Incident ticketing systems (ServiceNow/JIRA) Windows/Linux log analysis Network traffic analysis Malware detection tools IOC collection and analysis Basic forensic tools Required Experience 2-3 years SOC/IR experience L1/L2 alert analysis background Experience with incident playbooks Exposure to MITRE ATT&CK framework Understanding of kill chain methodology Basic threat intelligence usage Technical Environment SIEM platforms EDR solutions TIP platforms Forensic tools Network monitoring tools Vulnerability scanners Incident management systems Work Requirements Rotating shifts (24x7 SOC) Incident response handling Alert triage and escalation Documentation and reporting Team collaboration Growth Path Advanced IR certification support Threat hunting training Digital forensics exposure Technical skill development Senior analyst progression Company Benefits & Perks Competitive salary package. Performance-based annual bonus (cash and stocks). Hybrid working model (3 days office/week). Group Medical & Life Insurance. Modern offices with free amenities & fully stocked cafeterias. Monthly food card & company-paid snacks. Hardship/shift allowance with company-provided pickup & drop facility* Attractive employee referral bonus. Frequent company-sponsored team-building events and outings. Depending upon the shifts. The benefits package is subject to change at the management's discretion. Show more Show less
Posted 2 weeks ago
5.0 years
0 Lacs
Delhi, India
Remote
Our Mission At Palo Alto Networks® everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and we are looking for innovators who are as committed to shaping the future of cybersecurity as we are. Who We Are We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe the unique ideas of every member of our team contributes to our collective success. Our values were crowdsourced by employees and are brought to life through each of us everyday - from disruptive innovation and collaboration, to execution. From showing up for each other with integrity to creating an environment where we all feel included. As a member of our team, you will be shaping the future of cybersecurity. We work fast, value ongoing learning, and we respect each employee as a unique individual. Knowing we all have different needs, our development and personal wellbeing programs are designed to give you choice in how you are supported. This includes our FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees, our mental and financial health resources, and our personalized learning opportunities - just to name a few! Job Description Your Career As a Domain Consultant you will be the expert for our Cortex portfolio, a Next-Gen AI-powered security operations platform. You will play a key role in defining technical solutions that secure a customer’s key business imperatives. You evangelize our industry leading solutions in Security Intelligence and Automation, XDR, Attack Surface Management, SOAR and Incident Response that establish Palo Alto Networks as a customer’s cybersecurity partner of choice Your Impact Collaborate with account teams to recommend and develop customer solutions within your assigned specialization area Present to customers as our expert at all levels in the customer hierarchy, from practitioner to senior leadership Lead and support customer demonstrations that showcase our unique value proposition Scope and Lead Proof of Value (PoV) projects for prospective customers based on best practices to ensure technical win in your assigned opportunities Drive high technical validation and PoV win rates within your assigned specialization area Architect solutions that will help our customers strengthen and simplify their security posture Accelerate technical validation of proposed solutions within your specialization Document High-Level Design and Key Use Cases to ensure proper implementation and value realization of Palo Alto Networks Solutions Help our customers build and develop further their services around Cortex solutions Lead conversations about industry trends and emerging changes to the security landscape Discuss, with credibility, competitive offers in the marketplace and position ours as the best alternative Assist account solutions consultants to respond effectively to RFIs/RFPs while serving as the main technical point of contact for Cortex Position Palo Alto Networks or Partner delivered services as appropriate to ensure proper implementation and value realization of Palo Alto Networks solutions Qualifications Your Experience Deep experience with security incident response, both IR tools and IR workflow process or SOC operational processes Strong technical hands-on experience (At least 5+ years) with EDR/XDR Experience around SOAR and SIEM will be an added advantage Strong practical experiences with threat hunting, malware, exploits and be able to demonstrate simulation of cyber attacks Experience installing, configuring and integrating a complex Security environment Experience with Security Analytics or Threat Intel is a plus Deep understanding of Unix/Linux and Windows operating systems and scripting skill in Python/JavaScript/PowerShell is an advantage Strong problem finding and solving skills, ability to analyze complex multivariate problems and use a systematic approach to gain quick resolution 8+ years of experience in a customer facing role Strong English language skills, both oral and written - Ability to confidently present with impact to an audience in person and remotely A team player - ability to share knowledge openly, interact with integrity, embrace diversity A Self-Starter, self-motivated and a quick learner with the ability to embrace change - the Cortex portfolio is always evolving and as a technical Specialist your expertise must be at the leading edge Additional Information The Team Palo Alto Networks has brought technology to market that is reshaping the cybersecurity threat and protection landscape. Our ability to protect digital transactions is limited only by our ability to establish relationships with our potential customers and help them understand how our products can protect their environments. You won’t find someone at Palo Alto Networks that isn’t committed to your success – with everyone pitching in to assist when it comes to solutions selling, learning, and development. As a member of our systems engineering team, you are motivated by a solutions-focused sales environment and find fulfillment in working with clients to resolve incredible complex cyber threats. Our Commitment We’re problem solvers that take risks and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish our mission without diverse teams innovating, together. We are committed to providing reasonable accommodations for all qualified individuals with a disability. If you require assistance or accommodation due to a disability or special need, please contact us at accommodations@paloaltonetworks.com. Palo Alto Networks is an equal opportunity employer. We celebrate diversity in our workplace, and all qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or other legally protected characteristics. All your information will be kept confidential according to EEO guidelines. Show more Show less
Posted 2 weeks ago
170.0 years
0 Lacs
Mulshi, Maharashtra, India
On-site
Area(s) of responsibility About Us Birlasoft, a global leader at the forefront of Cloud, AI, and Digital technologies, seamlessly blends domain expertise with enterprise solutions. The company’s consultative and design-thinking approach empowers societies worldwide, enhancing the efficiency and productivity of businesses. As part of the multibillion-dollar diversified CKA Birla Group, Birlasoft with its 12,000+ professionals, is committed to continuing the Group’s 170-year heritage of building sustainable communities. Job Title: Advanced Threat Management, Security Design, and Implementation Architect Job Summary: We are seeking a highly experienced Advanced Threat Management, Security Design, and Implementation Architect to lead our efforts in developing and deploying cutting-edge security solutions. The successful candidate will have deep expertise in advanced threat management, security architecture, and the implementation of robust security frameworks to protect an organization's critical assets. Key Responsibilities Design and implement advanced threat management strategies to identify, mitigate, and respond to security threats. Develop and maintain comprehensive security architectures that align with business goals and regulatory requirements. Lead security design initiatives for new and existing systems, ensuring robust protection against cyber threats. Oversee the implementation of security controls, policies, and procedures across the organization. In-depth knowledge of XDR Technology, SIEM, SOAR, SOC Architecture, Infrastructure and Data Security, Advisory and GRC Processes. Outstanding problem-solving skills and a strategic, analytical mindset, and be able to decipher the complex cybersecurity landscapes. Conduct strategies for vulnerability management and lead initiatives around effective VM in the organization. Collaborate with cross-functional teams to integrate security into the software development lifecycle (SDLC). Provide expert guidance on the latest security trends, tools, and technologies to enhance the organization’s security posture. Develop and deliver training programs to educate employees on security best practices and threat management. Ensure compliance with industry standards, regulations, and frameworks (e.g., NIST, ISO 27001). Professionalism, integrity, and a commitment to maintaining the highest ethical standards in conducting professional responsibilities Required Qualifications Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field. 10+ years of experience in advanced threat management, security design, and implementation. Proven expertise in developing and implementing security architectures and frameworks. Strong understanding of security assessment methodologies, vulnerability analysis, and penetration testing. Experience with security tools such as SIEM, SOAR, EDR, VM, Unified VM, ZTNA, IDS/IPS, firewalls, and endpoint protection, EASM, Deep/ Dark Web and Brand Protection. Excellent problem-solving skills and attention to detail. Strong communication and leadership skills. Experience with cloud security and securing hybrid environments. Preferred Qualifications Master’s degree in Information Security or a related field. Preferred certification in multiple SIEM and SOAR solution implementation (MS Sentinel, Splunk, Phantom, Swimlane, QRADAR) Relevant certifications such as CISSP, CISM, CEH, or OSCP. Show more Show less
Posted 2 weeks ago
170.0 years
0 Lacs
Mulshi, Maharashtra, India
On-site
Area(s) of responsibility About Us Birlasoft, a global leader at the forefront of Cloud, AI, and Digital technologies, seamlessly blends domain expertise with enterprise solutions. The company’s consultative and design-thinking approach empowers societies worldwide, enhancing the efficiency and productivity of businesses. As part of the multibillion-dollar diversified CKA Birla Group, Birlasoft with its 12,000+ professionals, is committed to continuing the Group’s 170-year heritage of building sustainable communities. Job Title: Endpoint Security Specialist – Trend Micro Apex One Location: Any Birlasoft Location Department: Cybersecurity – Endpoint Security About the Role- We are looking for a highly skilled Endpoint Security Specialist with deep expertise in Trend Micro Apex One and a strong understanding of endpoint protection strategies. This role involves end-to-end implementation, integration with SOC operations, and client-facing solution design including RFP preparation. The ideal candidate will also be familiar with emerging security tools and industry best practices. Key Responsibilities, Lead the deployment, configuration, and lifecycle management of Trend Micro Apex One across enterprise environments. Integrate Apex One with SIEM, EDR, and XDR platforms for enhanced threat visibility. Manage policy tuning, threat detection, and remediation workflows. Implement and support other Trend Micro offerings such as Deep Security, Cloud App Security, and Vision One. Perform upgrades, patching, and health checks of endpoint security infrastructure. Work closely with SOC teams to analyze alerts, investigate incidents, and provide Tier 2/3 support. Develop and maintain playbooks for endpoint threat response. Generate actionable reports and dashboards for threat intelligence. Evaluate and integrate top-tier endpoint protection tools like CrowdStrike, SentinelOne, Microsoft Defender for Endpoint, etc. Stay updated on threat trends and recommend proactive security measures. Prepare and present RFPs, technical proposals, and solution architectures to clients. Conduct workshops, demos, and PoCs tailored to client environments. Translate complex technical concepts into business-friendly language. Required Skills & Qualifications 5–8 years of experience in endpoint security, with at least 4 years in Trend Micro Apex One. Strong knowledge of malware analysis, threat hunting, and endpoint hardening. Experience with SIEM, EDR/XDR, and incident response. Familiarity with scripting (PowerShell, Python) for automation and reporting. Excellent communication and presentation skills for client-facing roles. Preferred Certifications Trend Micro Certified Professional (TMCP) – Apex One or Vision One CompTIA Security+, CEH, CISSP, or equivalent ITIL Foundation or similar process-oriented certifications Show more Show less
Posted 2 weeks ago
3.0 years
0 Lacs
Gurugram, Haryana, India
On-site
AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. At AHEAD, we prioritize creating a culture of belonging, where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer, and do not discriminate based on an individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, marital status, or any other protected characteristic under applicable law, whether actual or perceived. We embrace all candidates that will contribute to the diversification and enrichment of ideas and perspectives at AHEAD. SOC Analysts at AHEAD monitor customer environments and perform Incident Detection, Validation, and Incident Reporting. SOC Analysts are the frontline of SOC and are customer-facing representatives. SOC Analysts are responsible for triaging events, incidents, and reporting validated incidents to the customer for incident response. Incumbents will possess strong technical and analytical skills while providing accurate analysis of security related problems. They have a well-rounded networking background and are responsible for performing troubleshooting of customer issues. This individual is user focused and works to resolve client needs in a timely manner. These needs may involve resolving hardware/software failures, investigating, and responding to security threats, and making change request to the security policy of company devices. The SOC Analyst is expected to monitor security feeds streaming from client servers, network devices, and end user workstations, operate and maintain network security equipment at client locations. The Analyst is expected to be familiar with a wide range of security tools and understand basic security fundamentals. The Analyst will perform information security event analysis and must possess knowledge of operating systems, TCP/IP networking, network attacks, attack signatures, defense countermeasures, vulnerability management, and log analysis. Roles & Responsibilities Monitor and analyze network traffic and alerts Investigate intrusion attempts and perform in-depth analysis of exploits Provide network intrusion detection expertise to support timely and effective decision making of when to declare an incident Conduct proactive threat research Review security events that are populated in a Security Information and Event Management (SIEM) system Tuning of rules, filters, and policies for detection-related security technologies to improve accuracy and visibility Data mining of log sources to uncover and investigate anomalous activity, along with related items of interest Independently follow procedures to contain, analyze, and eradicate malicious activity Document all activities during an incident and provide leadership with status updates during the life cycle of the incident Incident management, response, and reporting Provide information regarding intrusion events, security incidents, and other threat indications and warning information to the client Track trends, statistics, and key figures for each assigned client Assist with the development of processes and procedures to improve incident response times, analysis of incident, and overall SOC functions Reporting Incident reports Security status reports Client-facing security meetings Position Requirements Incident handling/response experience Working knowledge of common operating systems (Windows, Linux, etc.) and basic endpoint security principles Understanding of and a strong desire to learn common security technologies (IDS, Firewall, SIEM, etc.) The ability to think creatively to find elegant solutions to complex problems Excellent verbal and written communication skills The desire to work both independently and collaboratively with a larger team A willingness to be challenged along with a strong appetite for learning 3-6 years of experience in Information Security, Incident Response, etc. (or related field) Hands-on experience with common security technologies (IDS, Firewall, SIEM, etc.) Knowledge of common security analysis tools & techniques Understanding of common security threats, attack vectors, vulnerabilities and exploits Knowledge of regular expressions Education Bachelors Degree in Computer Science, Information Security or related/equivalent educational or work experience One or more of the following certifications: CISSP, GCIA, Security+, CEH, ACSE Why AHEAD Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between. We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning. USA Employment Benefits Include Medical, Dental, and Vision Insurance 401(k) Paid company holidays Paid time off Paid parental and caregiver leave Plus more! See benefits https://www.aheadbenefits.com/ for additional details. The compensation range indicated in this posting reflects the On-Target Earnings (“OTE”) for this role, which includes a base salary and any applicable target bonus amount. This OTE range may vary based on the candidate’s relevant experience, qualifications, and geographic location. Show more Show less
Posted 2 weeks ago
5.0 - 10.0 years
10 - 19 Lacs
Chennai
Remote
Security Engineer: ( Microsoft Subject Matter Expert) : Fulltime Remote About the Role: Do you want to be on the frontline fighting for safe use within the digital frontier? Does describing your job to your family and friends as being a cyberwarrior or threat hunter sound awesome or awe inspiring? Then join us as part of our Security Operations Center (SOC) Engineering team as a Microsoft Services Subject Matter Expert (SME) supporting our frontline Threat Hunters. In addition, given the rapid changes within the Microsoft ecosystem you will also be working cross-functionally with Product Management and R&D Engineering to drive differentiation within our service as well with our Business Development team to help maintain the relationship with Microsoft. While this role will have business responsibilities that will help you expand your career options, the primary day to day role is as a Security Engineer. As a Security Engineer, you will serve as a critical support system for the SOC. You will create, enhance, and tune alerts and detections so that the SOC can best defend our client's networks. Your goal will be to continually improve the detection and alerting that the SOC receives. In some cases, you will work directly with clients to ensure that they send us the most beneficial and important data. You will leverage our tech stack, elements of Microsoft and provide ongoing support both internally and externally. In short, you will be a critical member of the team using Microsoft Defender, Microsoft Sentinel, Microsoft Suite including Purview, Entra, Intune tools, the Pondurance SIEM and SOAR as well as other products and services to protect our clients in the ever-changing threat landscape. Responsibilities: Stay on the forefront of the Microsoft ecosystem Drive security detection improvements Tune existing alerts and client data in our SIEM tooling for optimal performance. Identify workflow improvements and curate new automations through our SOAR platform Assist in continuous improvement efforts to evaluate detection and response capabilities Develop methods to detect potential threats Maintain the SOAR platform in support of day-to-day SOC activities Work with cross-functional teams to enhance detection capabilities Qualifications: Strong understanding of tuning alerts and pertinent logs to aid in detecting threats Expert knowledge of Microsoft including, but not limited to Defender, Sentinel, Purview, Entra, and Intune Experience building data retrieval from the Microsoft security ecosystem Leveraging detection mechanisms within SIEMs and SOAR A strong understanding of cyber-attacks, MITRE ATT&CK framework, emerging threats and threat modelling as well as security research techniques Intermediate experience with Python, PowerShell, Bash or Go Intermediate experience with IDS/IPS systems Talents: Ability to adjust and adapt in a fast pace and dynamic environment, including changes in responsibilities as the business evolves. Capacity for Synthesis: bring together disparate elements to create a coherent entity or a big-picture overview in order to gain a new perspective Applied Technical Thinking: apply specialized, theoretical knowledge to efficient operational uses Demonstrate strong composure with a balance of urgency and intensity, as well as focus
Posted 2 weeks ago
3.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 weeks ago
3.0 years
0 Lacs
Gurugram, Haryana, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 weeks ago
2.0 - 4.0 years
0 Lacs
Pune, Maharashtra, India
On-site
ASEC Engineers, A Verdantas Company , is looking for a skilled and vigilant SOC Analyst to join our Pune team. You’ll monitor, analyze, and respond to cybersecurity threats and incidents, playing a vital role in safeguarding enterprise systems and data. Your sharp eye for vulnerabilities, quick response to security events, and support for remediation efforts will help keep our digital environment secure and resilient. If you're passionate about cybersecurity and thrive on protecting critical infrastructure, this role is for you. Key Responsibilities: Your duties will include but are not limited to the following: Monitor security alerts and events using SIEM and endpoint detection tools (e.g., Microsoft Defender). Analyze logs, network traffic, and cloud activity to identify potential threats or anomalies. Investigate and respond to security incidents, escalating as appropriate. Collaborate with third-party security vendors (e.g., Critical Start) to coordinate incident response. Maintain and optimize endpoint protection and cloud security configurations. Support after-hours monitoring and incident response with autonomy and accountability. Document incidents, findings, and remediation steps in accordance with compliance standards. Contribute to threat intelligence gathering, vulnerability assessments, and security reporting. Core Competencies: Technical Proficiency: Proficient in using SIEM platforms and endpoint detection tools (e.g., Microsoft Defender) to monitor and respond to threats. Threat Intelligence: Able to interpret threat feeds and apply indicators of compromise (IOCs) to detection strategies. Analytical Thinking: Strong problem-solving skills to assess and respond to complex security events. Communication: Clear and timely communication with internal teams and third-party vendors during incident response. Attention to Detail: Precision in log analysis, documentation, and escalation decisions. Required Qualifications: 2-4 years of experience in the mentioned role Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field. Familiarity with SIEM tools and cybersecurity fundamentals. Understanding of networks, operating systems, and basic incident response. Strong analytical skills, attention to detail, and effective communication abilities. Location and Work Set-up Pune, Maharashtra, India Work Mode: In Office Why Join ASEC Engineers – A Verdantas Company? At our Pune office , you’ll be part of a vibrant, innovative environment that fuses local excellence with global impact. We foster a people-first culture and empower our employees with tools, support, and opportunities to thrive. What We Offer: Be part of a global vision with the agility of a local team. Work on high-impact projects that shape industries and communities. Thrive in a collaborative and dynamic office culture. Access continuous learning and professional development programs. Grow with clear paths for career progression and recognition. An employee-centric approach that values your well-being and ideas. Ready to Build the Future with Us? “ Join us at ASEC Engineers, a Verdantas Company , and make a meaningful impact—professionally and environmentally. Be part of a visionary team driving innovation, sustainability, and transformative solutions that shape the future .” Show more Show less
Posted 2 weeks ago
3.0 years
0 Lacs
Kolkata, West Bengal, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 weeks ago
7.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Smarsh is the leader in communications compliance, archiving, and analytics. We provide compliance across the broadest set of communications channels with insights on what’s being captured. Smarsh customers manage over 500 million daily conversations across 80 channels and growing. Customers include the top 10 U.S., top 8 European, top 5 Canadian, and top 3 Asian banks. The Smarsh advantage is customers stay ahead of compliance and uncover patterns and relationships hidden within their data. At Smarsh , we’ve been helping our customers manage new forms of communication since 1998. We work closely with regulators including the SEC, FINRA, IIROC, and the PRA and FCA, and with our customers, to ensure that they understand the capabilities of today’s technology and that our platform meets their most stringent requirements. Our products include Connected Capture, Connected Archive, Web Archive & Business Solutions. About the team: The Lead Security Operations Analyst - plays a critical role in the Security Operations Center (SOC) by handling escalated incidents from the analysts. This role involves in-depth analysis, incident response coordination, mentoring of analysts, real time security monitoring, threat hunting and ensuring compliance with the Security policies and standards. Skills and Experience: Experience: 10 plus years of experience in cybersecurity, particularly in security operations. Cybersecurity Expertise: Advanced knowledge of cybersecurity threats, vulnerabilities, malware investigation and incident response, evidence collection, communication and documentation Technical Proficiency: Proficiency in operational support, Security Architecture of SIEM, SOAR, EDR, XDR, Firewalls and other security tools. Analytical Skills: Strong analytical, investigative, and problem-solving skills. Forensic Analysis: Experience with forensic analysis and malware analysis. Certifications: Relevant certifications such as CFCE, CISSP, GCIH, or GCIA. Language Skills: Excellent verbal and writing skills in English. On Call Support: Rotational on call support for high severity incidents in a 24x7 environment. Roles and Responsibilities Incident Analysis: Conduct detailed analysis of escalated security incidents. Coordination of end-to-end Security Incident management on escalated incidents, ensuring timely updates to stakeholders and efficient resolution of incidents. Incident Response: Lead the development and implementation of incident response plans. Threat Monitoring and Analysis: Monitor security alerts and events using SIEM and other security tools. Lead and coordinate proactive threat hunting to identify potential risks and vulnerabilities. Analyze and integrate threat intelligence feeds to the platforms and stay updated on emerging threats. Mentorship: Mentor and provide guidance to Security analysts on incident handling. Foster a culture of continuous improvement and learning. Forensic Analysis: Perform forensic analysis and malware analysis of Computers, Cloud, Networks, Mobile devices and other digital medias Architecture Design: Develop and refine architecture of Security Tools and platforms Collaboration: Creatively solve problems collaborating with SecOps, Platform, Delivery, IT and Engineering team members. Qualifications: Education: Bachelor’s degree in computer science, Cybersecurity, or a related field. Certifications: Advanced certifications such as CISSP, OSCP, GCIH, GSOC or GCIA. Incident Response Experience: 7+ years of experience in Cyber Incident response and investigations. Leadership Skills: Strong leadership and communication skills. Why Smarsh? Smarsh hires lifelong learners with a passion for innovating with purpose, humility and humor. Collaboration is at the heart of everything we do. We work closely with the most popular communications platforms and the world’s leading cloud infrastructure platforms. We use the latest in AI/ML technology to help our customers break new ground at scale. We are a global organization that values diversity, and we believe that providing opportunities for everyone to be their authentic self is key to our success. Smarsh leadership, culture, and commitment to developing our people have all garnered Comparably.com Best Places to Work Awards. Come join us and find out what the best work of your career looks like Show more Show less
Posted 2 weeks ago
3.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 weeks ago
3.0 years
0 Lacs
Kochi, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 weeks ago
3.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 weeks ago
0 years
0 Lacs
Pune, Maharashtra, India
On-site
Note: Candidates with proven hands-on experience in L1 and L2 SOC, will be considered for this position. Gamma CAE Technologies Pvt Ltd, is a wholly-owned Indian subsidiary of Gamma Technologies, LLC located in Pune. The Indian subsidiary carries out the support, marketing, and sales operations for the Indian region. The parent company was established in 1994, and is headquartered in Westmont, Illinois (a suburb of Chicago). Position Summary As a SOC Analyst, you will be responsible for driving the incident response lifecycle, monitoring and analyzing security events, and identifying and responding to threats. You will use your deep knowledge of security tactics, incident response, and threat intelligence to help protect the organization. You have a deep understanding of common attack vectors, malware analysis, and threat intelligence. You also have a thorough understanding of security best practices and technologies, as well as experience responding to and investigating security incidents Job Responsibilities Monitor alerts from tools like Microsoft Defender and Security Onion SIEM. Investigate and respond to security incidents, escalating as needed. Maintain and develop incident response plans. Identify and remediate system and network vulnerabilities. Collaborate with teams to improve patch management. Manage security tools (IDS, vulnerability assessments). Ensure adherence to best practices and assist in selecting new security technologies. Analyze security events, investigate threats (malware, etc.), and take remediation actions. Document incidents, prepare reports, and contribute to post-incident reviews. Promote security best practices organization-wide. Education, Experience and Skills Any combination of education and experience that would likely provide the required knowledge and abilities is qualifying. A typical way to obtain the knowledge and abilities would be: Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience) is required. Relevant certifications (e.g., CompTIA Security+, CISSP, CEH) are preferred. ISO standards experience is a plus. Prior hands on experience and thorough knowledge of L1 and L2 SOC is a must. Proficient in Windows and Linux operating systems. Experience with security tools like Microsoft Defender, Security Onion, and SIEM platforms. Strong understanding of network protocols, firewalls, and intrusion detection/prevention systems. Scripting/programming skills (Python, PowerShell) for automation are preferred. Strong written and verbal communication skills in English. Ability to collaborate effectively in a team environment. Comfortable engaging with technical and non-technical stakeholders. We Offer Dynamic and highly talented team of experts. The opportunity to bring in your own ideas, implement them and make them accessible to a large customer base. The opportunity to build a professional network in various branches of industry. The primary work location will be our Pune, India office. We’ve adopted a hybrid work policy asking employees to report to the office 3 days per work week. An attractive salary and additional company benefits. Other Requirements and Notes: Universal acceptance for everyone, everywhere is at the heart of our company. We promote diversity of thought, culture and background, which connects the entire Gamma Technologies community. As such, Gamma Technologies is proud to be an Equal Opportunity Employer. We do not discriminate on the basis of race, color, ancestry, national origin, religion or religious creed, mental or physical disability, medical condition, genetic information, sex (including pregnancy, childbirth, and related medical conditions), sexual orientation, gender identity, gender expression, age, marital status, military or veteran status, citizenship, or other characteristics protected by state or federal law or local ordinance. About Gamma Technologies, LLC GT, a leading multi-physics CAE simulation software provider, develops a suite of integrated solutions that guides and accelerates the engineering transformation of today’s products in the transportation, power generation, and industrial equipment industries. At GT, we are committed to using technology to make a global impact by helping the industry deliver products for a cleaner, sustainable environment! We pride ourselves on our company culture which encourages collaboration between all levels at the company, from entry level to upper management. Within a team, daily interactions and outside social events allow us to form bonds that result in higher productivity and job satisfaction. Show more Show less
Posted 2 weeks ago
3.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 weeks ago
10.0 years
0 Lacs
Mumbai Metropolitan Region
On-site
Job Title: Lead Engineer – Security Operations Department: Engineering and Operations Location: Mumbai Reporting: Manager Security Operations Job Type: Full Time Shift: Rotational Shift PRE-REQUISITES Strong technical and subject matter expertise in at least four or more of the following security specialties: Firewall: Cisco, Palo Alto, Checkpoint, Fortinet, Zscaler, Barracuda VPN - IPSEC, SSL VPN: Ivanti, F5, Cisco, GlobalProtect NAC: Cisco ISE, Aruba ClearPass Unified Thread Management (UTM) SIEM products Qradar, Microsoft Sentinel etc. Load Balancers: F5 BigIP LTM/GTM, Citrix ADC Network Security (multi-vendor) experience. Cloud Infrastructure Mgmt.: Cloud stack, OpenStack, AWS, Azure, Netskope, PaloAlto Prisma Knowledge on scripting language like Python and automation Working knowledge and hands-on experience on Linux/Unix OS is desirable. Customer service experience preferably in a Global Operations Center environment Ticketing system knowledge Ability to workdays, evenings and weekends as required; 24x7 support in rotating shifts Flexibility with the ability to manage stressful situations and adapt to rapidly changing environments and requirements Analytical thinker willing to “think outside the box” to resolve customer impacting situations on first contact; understand customer pain Ability to work with Operations and Engineering on the priority of issues to resolve the urgent customer impacting issues first Aptitude and desire to learn advanced Network Security services. Creative, flexible thinker who is willing to take initiatives and share alternative solutions with peers and management Hands-on experience on Vulnerability Scanning, Penetration Testing Tools (Qualys, Nessus, Rapid7) Exceptional documentation and communication skills Ability to thrive in a fast paced, multi-cultural, customer-oriented environment MS Office proficiency RESPONSIBILITIES Incident Resolution Ticket resolution - work on trouble tickets, support the operation of advanced Network Security Services and take escalations Queue Management - keep a watch on queue and assign tickets Service Request - working on request for changes as per client requirements Perform the minor/major changes as per defined SoC process and work instructions Be a Subject Matter Expert (SME) on a few products Create Standard Operation Procedure Attend client calls and other technical meetings Assist in creation of Root Cause analysis (RCA) Security Performance Tuning Identify areas of Service Improvement Program (SIP) for key clients and reduce incidents Review code upgrade and test implement before rolling on to production Review documentation Recognize successful intrusions and compromises through review and analysis of relevant event detail information Review and update ROE on yearly basis Other Functions Work with hardware/software vendors to resolve problems Coordinate shifts and exchange handoff between various shifts Cross-train and mentor juniors Participate in various network and security related projects Perform other duties as assigned Any additional task given to the incumbent from time-to-time based on business needs TRAINING AND CERTIFICATION REQUIRED CCNA, CCSA, Fortinet NSE-4, PCNSE, CCIE, CEH EXPERIENCE Minimum 10 years of progressive, relevant experience and proven capability to work in a complex network environment EDUCATION Bachelor in Engineering - Computers/Electronics/Communication or related field Graduate/Post Graduate in Science/Maths/IT or related streams with relevant technology experience TECHNICAL AND OTHER SKILLS Knowledge of ITIL, ISO27K, SOC 2 will be beneficial Show more Show less
Posted 2 weeks ago
3.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 weeks ago
3.0 years
0 Lacs
Pune, Maharashtra, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today. Show more Show less
Posted 2 weeks ago
3.0 - 6.0 years
12 - 18 Lacs
Pune
Work from Office
Job Description: Were searching for Senior Security Engineer to assist our 247 managed security operations center. This role is in Integration Department, responsible for the strategic, technical, and operational direction of the Integration Team Responsibilities: • IBM QRadar/ Sentinel / Datadog , Integration and content management, Event Collector deployment/upgradation. • Troubleshooting skills at all layers of OSI Model. • Onboard all standard devices to QRadar, such as Windows Security Events, Firewalls, Antivirus, Proxy etc. • Onboard non-standard devices by researching the product and coordinating with different teams. Such as application onboarding or onboarding new security products. • Developing and Deploying connectors and scripts for log collection for cloud-based solutions. • Detailed validation of parsing and normalization of logs before handing over to SOC team will be day to day Job. • Coordinate between customer and internal teams for issues related to log collection. • The engineer needs to make sure that various team have completed their tasks, such as log validation, Log Source Not Reporting (LSNR Automation), Content Management before the Log Source is in production. • Troubleshooting API based log sources. • Documentation of integrations and versioning Essential Skills: • Prior SIEM administration and integration experience ( QRadar , Splunk , Datadog , Azure Sentinel) • Network and Endpoint Device integration and administration . • Knowledge of Device Integration : Log , Flows collection • Knowledge of Regular Expression and scripting language (ex: Bash , Python , PowerShell ), API implementation and development. • Knowledge of Parser creation and maintenance . • Knowledge of Cloud technologies and implementation . • Excellent in verbal and written communication . • Hands on experience in Networking , Security Solutions and Endpoint Administration and operations. Additional Desired Skills: • Excel, formulation • Documentation and presentation • Quick response on issues and mail with prioritization • Ready to work in 24x7 environment Education Requirements & Experience: • BE/B.Tech, BCA • Experience Level: 3+Year
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The Security Information and Event Management (SIEM) job market in India is thriving, with a growing demand for professionals who can monitor, analyze, and respond to security incidents in real-time. SIEM jobs offer lucrative career opportunities for individuals with a strong understanding of cybersecurity concepts and technologies.
The average salary range for SIEM professionals in India varies based on experience level: - Entry-level: INR 4-6 lakhs per annum - Mid-level: INR 8-12 lakhs per annum - Experienced: INR 15-20 lakhs per annum
Career progression in the SIEM field typically follows a path from: - SIEM Analyst - SIEM Engineer - SIEM Consultant - SIEM Architect
In addition to SIEM expertise, professionals in this field are often expected to have knowledge of: - Network Security - Incident Response - Threat Intelligence - Security Operations Center (SOC) operations
As you explore SIEM jobs in India, remember to continuously upgrade your skills, stay informed about the latest cybersecurity trends, and practice answering interview questions to showcase your expertise confidently. With the right preparation and dedication, you can excel in the dynamic field of SIEM and carve out a successful career for yourself. Good luck!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.