Get alerts for new jobs matching your selected skills, preferred locations, and experience range.
5.0 - 10.0 years
10 - 18 Lacs
Bengaluru
Work from Office
Job Description: We are seeking a skilled and proactive OT SOC Analyst to join our cybersecurity operations team. This role is focused on protecting industrial control systems (ICS) and operational technology (OT) environments through continuous monitoring, incident response, and development of OT-specific detection and response strategies. Key Responsibilities: OT Incident Response: Detect, investigate, and respond to cybersecurity incidents affecting OT systems. Coordinate with plant operations and engineering teams during security events. Conduct root cause analysis and document incident findings. OT Security Protocols & Compliance: Implement and enforce OT security best practices and standards (e.g., ISA/IEC 62443, NIST 800-82). Assist in designing secure OT network architectures based on the Purdue Model. Monitor adherence to OT-specific access controls, patching, and asset hardening. Use Case & Playbook Development: Design and implement detection use cases tailored to ICS/SCADA environments. Create and maintain incident response playbooks for OT scenarios (e.g., unauthorized PLC changes, protocol abuse). Continuously improve detection coverage and response efficiency. Hands-On Tool Usage: Monitor and analyze alerts using IDS (e.g., Snort, Zeek, Nozomi Networks, Claroty). Utilize SIEM tools (e.g., Splunk, QRadar) for log correlation, rule creation, and threat detection. Support OT endpoint monitoring using EDR solutions (e.g., CrowdStrike, Defender for Endpoint). Perform traffic analysis using tools like Wireshark for protocol inspection and anomaly detection.
Posted 2 weeks ago
10.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Job Description Join our team as a Domain Solution Architect in the Autonomous Network Security domain, where you will drive the design and implementation of complex security solutions. You will work with cutting-edge security technologies, assess vulnerabilities, and strengthen cybersecurity frameworks. This role offers an opportunity to work with global teams, provide technical guidance, and drive innovation in security architecture. How You Will Contribute And What You Will Learn Drive end-to-end security architecture design and implementation for complex security solutions. Deliver NetGuard Security Products & Solutions, including NIAM (NetGuard Identity Access Manager), FW (Firewall), and DNS (Domain Name System). Conduct security assessments, penetration testing, and audits to identify vulnerabilities. Develop high-level and low-level security designs, test plans, and validation strategies. Provide expert guidance on cybersecurity frameworks, compliance, and risk assessment. Work with cross-functional teams to ensure security integration across platforms. Support pre-sales efforts, solution feasibility analysis, and cost estimation. Oversee security infrastructure, ensuring resilience against cyber threats. Offer technical mentorship and guidance to global security teams. Key Skills And Experience You have: Bachelor's degree or equivalent with 10+ years of experience in security architecture. Practical experience in cybersecurity frameworks (NIST, ISO 27001) and compliance (GDPR). Hands-on experience with cloud security (AWS, GCP), IAM, SIEM, DevSecOps, and API security. Comfort to travel as required (up to 50%) to address business needs. It would be nice if you also had: Experience in Java, Kubernetes, Docker, OpenStack, microservices, and automation tools. Strong problem-solving, troubleshooting, and partnering skills for effective stakeholder engagement. About Us Come create the technology that helps the world act together Nokia is committed to innovation and technology leadership across mobile, fixed and cloud networks. Your career here will have a positive impact on people’s lives and will help us build the capabilities needed for a more productive, sustainable, and inclusive world. We challenge ourselves to create an inclusive way of working where we are open to new ideas, empowered to take risks and fearless to bring our authentic selves to work What we offer Nokia offers continuous learning opportunities, well-being programs to support you mentally and physically, opportunities to join and get supported by employee resource groups, mentoring programs and highly diverse teams with an inclusive culture where people thrive and are empowered. Nokia is committed to inclusion and is an equal opportunity employer Nokia has received the following recognitions for its commitment to inclusion & equality: One of the World’s Most Ethical Companies by Ethisphere Gender-Equality Index by Bloomberg Workplace Pride Global Benchmark At Nokia, we act inclusively and respect the uniqueness of people. Nokia’s employment decisions are made regardless of race, color, national or ethnic origin, religion, gender, sexual orientation, gender identity or expression, age, marital status, disability, protected veteran status or other characteristics protected by law. We are committed to a culture of inclusion built upon our core value of respect. Join us and be part of a company where you will feel included and empowered to succeed. About The Team As Nokia's growth engine, we create value for communication service providers and enterprise customers by leading the transition to cloud-native software and as-a-service delivery models. Our inclusive team of dreamers, doers and disruptors push the limits from impossible to possible. Show more Show less
Posted 2 weeks ago
1.0 - 3.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
ECI is the leading global provider of managed services, cybersecurity, and business transformation for mid-market financial services organizations across the globe. From its unmatched range of services, ECI provides stability, security and improved business performance, freeing clients from technology concerns and enabling them to focus on running their businesses. More than 1,000 customers worldwide with over $3 trillion of assets under management put their trust in ECI. At ECI, we believe success is driven by passion and purpose. Our passion for technology is only surpassed by our commitment to empowering our employees around the world . The Opportunity: ECI has an exciting opportunity for a Security Ops Center Analyst , who is responsible for analyzing and responding to network security events. In this role, you will be responsible for threat actor based investigations, directing new detection methodology and providing 1st level support to incident response and monitoring functions. Also, responsible for proactive monitoring and response of known and or emerging threats against the network. This is an onsite role. What you will do: Proactive monitoring and response to known and or emerging threats against the network. Responsible for threat actor-based investigations using SIEM, EDR, Email gateway, directing new detection methodology and providing 1st level support to incident response and monitoring functions. Perform investigation and triage of events and escalate as appropriate. Recognize and investigate intrusion attempts differentiate false positives from true intrusion attempts. Document and present findings on security incidents and investigations. Collaborate with the team to mitigate and counteract threats. Perform email analysis and be able to categorize email with its verdict. Remain informed about the latest security trends and best practices Communicate effectively with representatives of the Lines of Business, technology specialists, customers, and vendor. To continuously improve on their knowledge around information security as it relates to their job and identifying and preventing phishing attempts. Who you are: Minimum 1 - 3 years of experience in the IT industry, preferably working in a SOC environment. Bachelors in Computer science/IT/Electronics Engineering, M.C.A. or equivalent University degree. Certifications: CCNA, CEH, CHFI. Knowledge on SIEM, IDS/IPS, Firewall, VPN, EDR, AV and other security products. Knowledge on TCP/IP network traffic and event log analysis. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Willingness to work in a job that involves 24/7 operations. Remain vigilant while continuing to maintain and enhance the overall security of our client service portfolio. Maintain awareness about the potential risks based on the environment they are operating in and the clients they are working on. Strong verbal and written communication skills, with ability to communicate technical information to non-technical stakeholders Displays an analytical and problem-solving mindset Bonus points if you have: Ability to work well under pressure – particularly during a security incident or regulatory audit Strong interpersonal and presentation skills. ECI’s culture is all about connection - connection with our clients, our technology and most importantly with each other. In addition to working with an amazing team around the world, ECI also offers a competitive compensation package and so much more! If you believe you would be a great fit and are ready for your best job ever, we would like to hear from you! Love Your Job, Share Your Technology Passion, Create Your Future Here! Show more Show less
Posted 2 weeks ago
1.0 - 3.0 years
0 Lacs
Indore, Madhya Pradesh, India
On-site
ECI is the leading global provider of managed services, cybersecurity, and business transformation for mid-market financial services organizations across the globe. From its unmatched range of services, ECI provides stability, security and improved business performance, freeing clients from technology concerns and enabling them to focus on running their businesses. More than 1,000 customers worldwide with over $3 trillion of assets under management put their trust in ECI. At ECI, we believe success is driven by passion and purpose. Our passion for technology is only surpassed by our commitment to empowering our employees around the world . The Opportunity: ECI has an exciting opportunity for a Security Ops Center Analyst , who is responsible for analyzing and responding to network security events. In this role, you will be responsible for threat actor based investigations, directing new detection methodology and providing 1st level support to incident response and monitoring functions. Also, responsible for proactive monitoring and response of known and or emerging threats against the network. This is an onsite role. What you will do: Proactive monitoring and response to known and or emerging threats against the network. Responsible for threat actor-based investigations using SIEM, EDR, Email gateway, directing new detection methodology and providing 1st level support to incident response and monitoring functions. Perform investigation and triage of events and escalate as appropriate. Recognize and investigate intrusion attempts differentiate false positives from true intrusion attempts. Document and present findings on security incidents and investigations. Collaborate with the team to mitigate and counteract threats. Perform email analysis and be able to categorize email with its verdict. Remain informed about the latest security trends and best practices Communicate effectively with representatives of the Lines of Business, technology specialists, customers, and vendor. To continuously improve on their knowledge around information security as it relates to their job and identifying and preventing phishing attempts. Who you are: Minimum 1 - 3 years of experience in the IT industry, preferably working in a SOC environment. Bachelors in Computer science/IT/Electronics Engineering, M.C.A. or equivalent University degree. Certifications: CCNA, CEH, CHFI. Knowledge on SIEM, IDS/IPS, Firewall, VPN, EDR, AV and other security products. Knowledge on TCP/IP network traffic and event log analysis. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Willingness to work in a job that involves 24/7 operations. Remain vigilant while continuing to maintain and enhance the overall security of our client service portfolio. Maintain awareness about the potential risks based on the environment they are operating in and the clients they are working on. Strong verbal and written communication skills, with ability to communicate technical information to non-technical stakeholders Displays an analytical and problem-solving mindset Bonus points if you have: Ability to work well under pressure – particularly during a security incident or regulatory audit Strong interpersonal and presentation skills. ECI’s culture is all about connection - connection with our clients, our technology and most importantly with each other. In addition to working with an amazing team around the world, ECI also offers a competitive compensation package and so much more! If you believe you would be a great fit and are ready for your best job ever, we would like to hear from you! Love Your Job, Share Your Technology Passion, Create Your Future Here! Show more Show less
Posted 2 weeks ago
8.0 - 10.0 years
0 Lacs
Pune, Maharashtra, India
On-site
About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. Position Summary We are seeking an experienced and highly skilled Technical Lead with a strong background in Java/Python, SaaS architectures, firewalls and cybersecurity products, including SIEM and SOAR platforms. The ideal candidate will lead technical initiatives, design and implement scalable systems, and drive best practices across the engineering team. This role requires deep technical expertise, leadership abilities, and a passion for building secure and high-performing security solutions. Key Responsibilities Lead the design and development of scalable and secure software solutions using Java/Python. Architect and build SaaS-based cybersecurity applications, ensuring high availability, performance, and reliability. Provide technical leadership, mentoring, and guidance to the development team. Ensure best practices in secure coding, threat modeling, and compliance with industry standards. Collaborate with cross-functional teams including Product Management, Security, and DevOps to deliver high-quality security solutions. Design and implement security analytics, automation workflows and ITSM integrations. Drive continuous improvements in engineering processes, tools, and technologies. Basic Qualifications A bachelor’s or master’s degree in computer science, electronics engineering or a related field 8-10 years of software development experience, with expertise in Java and/or Python. Strong background in building SaaS applications with cloud-native architectures (AWS, GCP, or Azure). In-depth understanding of microservices architecture, APIs, and distributed systems. Experience with containerization and orchestration tools like Docker and Kubernetes. Knowledge of DevSecOps principles, CI/CD pipelines, and infrastructure as code (Terraform, Ansible, etc.). Strong problem-solving skills and ability to work in an agile, fast-paced environment. Excellent communication and leadership skills, with a track record of mentoring engineers. Preferred Qualifications Experience with cybersecurity solutions, including SIEM (e.g., Splunk, ELK, IBM QRadar) and SOAR (e.g., Palo Alto XSOAR, Swimlane). Knowledge of zero-trust security models and secure API development. Hands-on experience with machine learning or AI-driven security analytics. Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted. Show more Show less
Posted 2 weeks ago
10.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Note: By applying to this position you will have an opportunity to share your preferred working location from the following: Bengaluru, Karnataka, India; Mumbai, Maharashtra, India . Minimum qualifications: Bachelor's degree or equivalent practical experience. 10 years of experience with cloud native architecture in a customer-facing or support role. 7 years of experience in vendor pre-sales cybersecurity (e.g., threat detection, malware intelligence, cloud security posture management, SIEM, or SOAR). Experience with a wide variety of IT technologies and security solutions (e.g., SIEM, NGFW, Proxy, IDS/IPS, DLP, EDR, A/V, WAF, SOAR). Ability to travel up to 50% of the time as required. Preferred qualifications: Master's degree in Computer Science, Engineering, Mathematics, or a related field. Experience implementing security solutions for enterprises (e.g., threat detection and hunting, malware intelligence, cloud security posture management, SIEM or SOAR). Knowledge of product and solution market trends in the cybersecurity industry (e.g., ransomware, attack frameworks, zero trust, etc.). Knowledge of industry frameworks (e.g., MITRE, NIST, FAIR, CMMC, etc.). Knowledge of various hacking and exploitation tools and methodologies, common malware families, and Anti-Virus/IDS/IPS evasion techniques. Ability to deliver technical presentations with excellent problem-solving, communication, and presentation skills. About The Job The Google Cloud Platform team helps customers transform and build what's next for their business — all with technology built in the cloud. Our products are developed for security, reliability and scalability, running the full stack from infrastructure to applications to devices and hardware. Our teams are dedicated to helping our customers — developers, small and large businesses, educational institutions and government agencies — see the benefits of our technology come to life. As part of an entrepreneurial team in this rapidly growing business, you will play a key role in understanding the needs of our customers and help shape the future of businesses of all sizes use technology to connect with customers, employees and partners. As a Customer Engineer, you will help us grow our cybersecurity business by building and expanding relationships with customers. You will serve as an advisor to customers and an advocate for our security solutions, providing support to executive level, security leaders, architects, and analysts to lead projects forward. You will accompany customers in discovering the technology/solution and consult around the best way to secure and ensure compliance. You will optimize for results when in production, leading with empathy, while identifying innovative ways to multiply your impact and the impact of the team as a whole Google Cloud accelerates every organization’s ability to digitally transform its business and industry. We deliver enterprise-grade solutions that leverage Google’s cutting-edge technology, and tools that help developers build more sustainably. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems. Responsibilities Work with Security Sales and Google Cloud teams to identify and qualify business opportunities, understand customer technical and compliance objections, and develop strategies to resolve technical blockers. Work with all Google Cloud Security products to demonstrate and validate solution benefits in customer and partner environments. Support Google Cloud Security opportunities and relationships, own technical aspects of solutions, and deliver technical presentations, product and solution briefings, proofs-of-concepts, and demos to customers, partners, and stakeholders. Prepare and deliver product messaging in an effort to highlight our solutions value proposition using techniques including presentations, product demonstrations, white papers, trial management, and response documents. Travel to customer sites, conferences, and other related events, where applicable. Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also Google's EEO Policy and EEO is the Law. If you have a disability or special need that requires accommodation, please let us know by completing our Accommodations for Applicants form . Show more Show less
Posted 2 weeks ago
10.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
Note: By applying to this position you will have an opportunity to share your preferred working location from the following: Bengaluru, Karnataka, India; Mumbai, Maharashtra, India . Minimum qualifications: Bachelor's degree or equivalent practical experience. 10 years of experience with cloud native architecture in a customer-facing or support role. 7 years of experience in vendor pre-sales cybersecurity (e.g., threat detection, malware intelligence, cloud security posture management, SIEM, or SOAR). Experience with a wide variety of IT technologies and security solutions (e.g., SIEM, NGFW, Proxy, IDS/IPS, DLP, EDR, A/V, WAF, SOAR). Ability to travel up to 50% of the time as required. Preferred qualifications: Master's degree in Computer Science, Engineering, Mathematics, or a related field. Experience implementing security solutions for enterprises (e.g., threat detection and hunting, malware intelligence, cloud security posture management, SIEM or SOAR). Knowledge of product and solution market trends in the cybersecurity industry (e.g., ransomware, attack frameworks, zero trust, etc.). Knowledge of industry frameworks (e.g., MITRE, NIST, FAIR, CMMC, etc.). Knowledge of various hacking and exploitation tools and methodologies, common malware families, and Anti-Virus/IDS/IPS evasion techniques. Ability to deliver technical presentations with excellent problem-solving, communication, and presentation skills. About The Job The Google Cloud Platform team helps customers transform and build what's next for their business — all with technology built in the cloud. Our products are developed for security, reliability and scalability, running the full stack from infrastructure to applications to devices and hardware. Our teams are dedicated to helping our customers — developers, small and large businesses, educational institutions and government agencies — see the benefits of our technology come to life. As part of an entrepreneurial team in this rapidly growing business, you will play a key role in understanding the needs of our customers and help shape the future of businesses of all sizes use technology to connect with customers, employees and partners. As a Customer Engineer, you will help us grow our cybersecurity business by building and expanding relationships with customers. You will serve as an advisor to customers and an advocate for our security solutions, providing support to executive level, security leaders, architects, and analysts to lead projects forward. You will accompany customers in discovering the technology/solution and consult around the best way to secure and ensure compliance. You will optimize for results when in production, leading with empathy, while identifying innovative ways to multiply your impact and the impact of the team as a whole Google Cloud accelerates every organization’s ability to digitally transform its business and industry. We deliver enterprise-grade solutions that leverage Google’s cutting-edge technology, and tools that help developers build more sustainably. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems. Responsibilities Work with Security Sales and Google Cloud teams to identify and qualify business opportunities, understand customer technical and compliance objections, and develop strategies to resolve technical blockers. Work with all Google Cloud Security products to demonstrate and validate solution benefits in customer and partner environments. Support Google Cloud Security opportunities and relationships, own technical aspects of solutions, and deliver technical presentations, product and solution briefings, proofs-of-concepts, and demos to customers, partners, and stakeholders. Prepare and deliver product messaging in an effort to highlight our solutions value proposition using techniques including presentations, product demonstrations, white papers, trial management, and response documents. Travel to customer sites, conferences, and other related events, where applicable. Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also Google's EEO Policy and EEO is the Law. If you have a disability or special need that requires accommodation, please let us know by completing our Accommodations for Applicants form . Show more Show less
Posted 2 weeks ago
2.0 - 3.0 years
0 Lacs
Ahmedabad, Gujarat, India
On-site
Job Description: BugFoe Private Limited is a fast-growing cybersecurity startup, and we are looking for a highly motivated and results-driven Cybersecurity Sales Executive to join our dynamic team. As a key player in our sales and business development efforts, you will be responsible for driving new business and securing cybersecurity projects, and other cutting-edge cybersecurity solutions. This role offers the opportunity to work independently, manage your pipeline, and have a significant impact on the company's growth and success. If you are passionate about cybersecurity, enjoy building relationships with potential clients, and have a strong background in sales, we would love to hear from you! Key Responsibilities: Business Development: Identify, prospect, and develop new business opportunities with organizations in need of cybersecurity services. Sales Execution: Lead the end-to-end sales process from lead generation to closing deals in cybersecurity services (PenTest/Red Team, security operation Center (SOC), SIEM, Network Operations Center (NOC), etc.). Client Relationships: Build and maintain long-lasting relationships with clients, acting as their trusted advisor for cybersecurity solutions. Solution Selling: Understand clients' cybersecurity needs and tailor the right solutions to address their challenges, including vulnerability assessments, threat monitoring, incident response, and more. Collaboration: Work closely with internal teams, including cybersecurity experts and technical consultants, to ensure smooth delivery of services. Market Research: Keep up to date with industry trends, competitor offerings, and emerging technologies to provide insights to the company and clients. Reporting & Forecasting: Manage the sales pipeline, track progress, and provide accurate sales forecasts to the management team. Key Deliverables: Achieve monthly and quarterly sales targets. Develop and execute strategic outreach plans to attract and retain clients. Effectively present and communicate BugFoe’s services and value proposition. Required Skills & Qualifications: Experience: Minimum of 2-3 years of experience in B2B sales, with at least 2 years in the cybersecurity industry. Sales Expertise: Proven track record in sales and business development, ideally in a technical or cybersecurity field. Cybersecurity Knowledge: Understanding of cybersecurity solutions, including Penetration Testing, Security Operations, Threat Intelligence, Incident Response, and Managed Security Services. Strong Communication: Excellent verbal and written communication skills with the ability to present complex technical concepts in a clear and compelling manner. Negotiation Skills: Strong negotiation and closing skills with a focus on building long-term client relationships. Self-Motivated: Strong initiative and ability to work independently, managing multiple accounts and projects simultaneously. Networking: Ability to establish and maintain relationships with key decision-makers in organizations of all sizes. Show more Show less
Posted 2 weeks ago
3.0 - 1.0 years
0 Lacs
Noida, Uttar Pradesh
On-site
Job Title: DLP Operations and Trellix Security Analyst Location: Noida, India Job Type: Full-time Experience: 1+ years Job Summary: We are seeking a skilled and detail-oriented DLP (Data Loss Prevention) Operations and Trellix Security Analyst to manage and enhance data protection mechanisms using Trellix (formerly McAfee) and other DLP tools. The role requires hands-on experience in managing DLP incidents, policies, and responding to data security breaches. Key Responsibilities: Monitor, triage, and respond to DLP alerts triggered by endpoint, network, and cloud data movement using Trellix DLP platform. Analyze and investigate DLP incidents to identify root causes and recommend mitigation actions. Administer and maintain Trellix DLP solutions including policy creation, updates, and exception handling. Coordinate with IT, Legal, and HR teams on DLP incident response and investigations. Generate periodic reports and dashboards for DLP events, trends, and policy violations. Perform periodic DLP rule tuning and false positive reduction. Ensure DLP systems are updated, patched, and compliant with security policies. Collaborate with the Information Security team to improve overall data protection strategy. Participate in internal and external audits related to data protection. Required Skills: Strong hands-on experience with Trellix DLP (formerly McAfee DLP) or similar platforms (Forcepoint, Symantec, Microsoft Purview). Knowledge of data classification , content inspection , regex patterns , incident workflows . Understanding of security frameworks such as ISO 27001, NIST, GDPR, and other data privacy regulations. Experience with SIEM tools (Splunk, QRadar) is a plus. Familiarity with endpoint security, email/web gateways, and data exfiltration methods. Excellent analytical, communication, and documentation skills. Qualifications: Bachelor’s degree in Computer Science, Information Security, or related field. Relevant certifications like CEH, CISA, Trellix/McAfee Certified Product Specialist , or DLP-specific certifications preferred. Minimum 3 years of experience in DLP operations or information security roles. Preferred Attributes: Proactive attitude and ability to work independently. Strong ethical standards and attention to data privacy. Ability to manage and prioritize multiple tasks in a fast-paced environment. Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹50,000.00 per month Benefits: Internet reimbursement Supplemental Pay: Performance bonus Application Question(s): Do you have experience in DLP Operation and Trellix? Experience: minimum: 1 year (Required) Language: English (Required) Location: Noida, Uttar Pradesh (Required) Work Location: In person
Posted 2 weeks ago
10.0 years
0 Lacs
India
Remote
📜 Project Summary We’re hiring a senior Network & Security Architect (contractor, not employee) to design a resilient, regulator-compliant banking enterprise network that spans dual data-centres, disaster-recovery sites, regional branches/ATMs, and hybrid-cloud workloads. Your HLD/LLD and playbooks will serve as the blueprint for our deployment team. 📡 Network Topology Requirements Data-Centre & DR Dual active-active DCs with spine-leaf fabric, MACsec on inter-DC links, isolated OOB network Campus / HQ Redundant core & distribution, Wi-Fi 6/6E access, NAC-enforced segmentation Branches & ATMs SD-WAN overlays (MPLS + LTE/5G) with local Internet break-out, zero-touch provisioning Cloud Edge Direct Connect / ExpressRoute / IPsec VPN-GW, micro-segmented VNET/VPCs Internet DMZ Reverse proxies, WAF, DDoS scrubber, SWIFT-CSP-isolated zone 🌐 Services to Be Supported Core Banking & Treasury (ISO 8583, MQ, micro-services APIs) Digital & Mobile Banking (Open-Banking APIs, web/mobile channels) Payments – RTGS/NEFT/IMPS/UPI, SWIFT, card-switch, POS Unified Comms – VoIP/SBC, contact-centre SIP, VC Enterprise IT – AD/Azure AD, M365, SaaS & SOC/SIEM feeds 🔐 Security-First Architecture Zero-Trust segmentation (macro + micro, user/device-aware) Next-Gen Firewalls & virtual NGFWs at every trust boundary Inline IPS / sandboxing for east-west and north-south traffic Layer-7 WAF & API GW in DMZ; TLS 1.3 everywhere Compliance: PCI-DSS 4.0, RBI/IRDA cyber controls, SWIFT CSP, ISO 27001 HA everywhere – clustered firewalls, ECMP, BGP GR, IPsec FVRF 🧠 Technical Requirements Routing/Switching: OSPF v2/v3, IS-IS, eBGP/iBGP, MP-BGP EVPN/VXLAN, MPLS L2/L3 VPN, Segment Routing (SR-MPLS/SRv6) Overlay & SD-WAN: DMVPN, SD-WAN (Viptela/Versa/Fortinet or similar) Automation: GitOps source-of-truth, Ansible/Terraform-ready design hooks Observability: gRPC telemetry, NetFlow/IPFIX, Syslog/SIEM pipelines Future-proof: IPv6-first; QoS placeholders (no policy config in scope) 📦 Deliverables HLD – logical & topological views, security zones, resiliency model LLD – device roles, interface matrices, VRF maps, protocol timers IPv4/IPv6 Address Plan – summarised, dual-stack, hierarchically allocated Security Architecture Guide – segmentation tables, object-based FW rules, crypto standards Routing & Service Flow Docs – Core Banking, SWIFT, Digital channels, UC, Branch/ATM paths Procedure Playbooks – onboarding branches/cloud VPCs, DR fail-over, patch-window checklist ❌ CLI configurations and QoS policies are out-of-scope (architecture only). 🧪 Mandatory Qualification Round Submit all required artefacts via this form: 👉 https://forms.office.com/r/4cCw88zP4c 🖼️ Digital Topology Diagram – DC, campus, branch, cloud edges & security zones 📝 One paragraph per major service – rationale, resiliency & security approach 📋 Routing, Overlay & Security Controls List – protocols, segmentation, crypto, automation hooks ✅ Service Checklist – confirm every item in the RFP is covered ⚠️ Only complete form submissions are reviewed. ❗ Important Eligibility Notice – Read Before Applying This contract demands proven senior-level expertise in banking/financial-sector network & security architecture . If you do not meet all Ideal Candidate criteria—hands-on banking designs and the certifications listed below— please do not apply . Junior or incomplete submissions will be disqualified without review. ✅ Ideal Candidate 10 + years designing regulated financial networks & security Certifications: CCIE (Enterprise or Security) / JNCIE-SP and CISSP or CISM ; PCNSE or NSE 7 is a plus Demonstrable PCI-DSS 4.0 and SWIFT CSP project history Comfortable with NetDevOps tooling and hybrid-cloud fabrics 💰 Remuneration 💵💵 USD $$$$ + — premium project rate, fully commensurate with senior-level experience ⏳ Timeline 4 weeks (possible 1-week extension if agreed at kick-off) Note: This is a short-term, deliverable-based engagement. It is not a full-time role or permanent position. 📍 Work Mode Remote; overlap with IST business hours preferred 📬 How to Apply Complete the qualification form → https://forms.office.com/r/4cCw88zP4c . Short-listed candidates will be contacted for a technical interview and SOW alignment. Show more Show less
Posted 2 weeks ago
0.0 - 5.0 years
0 Lacs
Hyderabad, Telangana
On-site
Job Summary The Security Analyst is responsible for ensuring the security and integrity of the organization's information systems and data. This role involves identifying and mitigating security risks, reviewing project security requirements, and maintaining compliance with security standards. The Security Analyst will also focus on detection engineering by designing systems to detect malicious activities and implementing automation technologies to streamline security operations, including vulnerability management and incident response. General Duties and Responsibilities Information Security Analyst duties and responsibilities include: Identify and ensure mitigation of information security risks within the organization. standards, procedures, and practices across various types of projects. Review requests for adherence to security policies, assuring requests are executed correctly. Identify security incidents and respond to ensure threats and risks are contained. Maintain integrity of security controls, toolsets, and other security-relevant services. Develop and analyze security reports, and build presentations as required. Facilitate status reports and other relevant information to compliance staff and department leadership. Monitor and audit systems for security violations, vulnerabilities, and abnormalities. Develop, implement, and maintain alignment with security control frameworks. Make updates to security policies, standards, procedures, practices, and operating procedures, as required. Assist with incident handling and other incident response activities, as required. Complete and monitor the status of corrective action plans, resolve audit findings and security issues, ensuring problems are resolved in an effective and timely manner. Implement and evaluate the effectiveness of data loss prevention (DLP) policies and detections. Design, build, and fine-tune systems and processes to detect malicious activities or unauthorized behaviors. Implement tools, processes, and procedures to identify unusual or suspicious behavior that may indicate a breach. Create actionable alerts based on detected threats to prompt immediate response from concerned teams. Implement automation technologies to streamline security operations such as vulnerability management, threat detection, and incident response. Use automation to reduce incident response time by enabling swift threat remediation through predefined actions. Educational and Certification Requirements A degree in Cybersecurity, Information Technology, Computer Science, or related field is desirable. Industry recognized certifications are a plus. Certifications may include: CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), CEH (Certified Ethical Hacker), CompTIA Security+, certifications issued by the SANS Institute, etc. Certifications issued by public cloud providers (AWS, Azure, Google, Oracle, etc.) is a plus. General Knowledge, Skills, and Abilities As well as formal qualifications, an Information Security Analyst should possess: A working level understanding of controls (e.g., access control, auditing, authentication, encryption, and system integrity). Versed in operating systems such as Linux (various distributions) and Microsoft Windows. Experience with Microsoft Active Directory, encryption and algorithms, authorization and authentication mechanisms/software, network monitoring, TCP/IP networks, DNS, next generation firewalls, and intrusion detection/prevention systems. General knowledge of network design and common network protocols, and infrastructure systems. Ability to create scripts to automate processes in PowerShell, Python or Bash is a plus. Ability to recognize and analyze malware. Ability to analyze large data sets and identify patterns and anomalies. Ability to quickly create and deploy countermeasures or mitigations under pressure. Build effective relationships. Develop and use collaborative relationships to facilitate the accomplishment of work goals. Experience with the PCI-DSS, ISO-27001, and/or SOC II compliance frameworks is a plus. Experience implementing and measuring security controls aligned with NIST 800-53 and the Center for Internet Security (CIS) is a plus. Project Management skills is a plus. Experience with the following technologies is a plus: SentinelOne Singularity Platform, Tanium, Google Chronicle SIEM, Cloudflare L3-L7 security technologies, Tenable.io, Lacework, Recorded Future, KnowBe4, ServiceNow, Jira, Microsoft Defender for Endpoints, Microsoft Security and Compliance, Microsoft Azure Key Vault. Experience with the native security service solutions for public cloud service providers (AWS, Google, Azure, Oracle) is a plus. Job Type: Contractual / Temporary Contract length: 6-12 months Pay: From ₹322,415.01 per year Schedule: Day shift Monday to Friday Morning shift Night shift Rotational shift Application Question(s): This is a 6 month contractual position are you comfortable Experience: total: 5 years (Required) SOC: 5 years (Required) Location: Hyderabad, Telangana (Preferred) Work Location: In person
Posted 2 weeks ago
1.0 - 3.0 years
0 Lacs
Gujarat, India
On-site
JOB DESCRIPTION Section 1 : Purpose of the position The incumbent shall be responsible for the maintenance of Information Security policies & Procedures and related Implementation & Compliance adherence thereof. Execution of daily security controls /regular periodic processes (such as system/application log monitoring, user access reviews, data collation /analysis & reporting etc) would be a primary responsibility for this role. Section 3 : Job Responsibilities He /She shall be responsible for execution of various Information Security controls and processes, daily security monitoring tasks and various weekly /monthly security controls & reporting activities (such as monitoring access logs and security violations, analyzing user access requests and conducting periodic access reviews, data collation /analysis & reporting, managing various security control books and procedural documentations etc.). He /She shall be responsible for execution of controls related to Regulatory & Head Office guidelines and ensuring compliance to those, conducting investigations and reporting of security incidents. He/ She shall be involved in imparting security training and awareness sessions. He /She shall be responsible for execution of various Security controls for the organization, and should be able to execute and improve the IT Security KRIs and appropriate reporting thereof. He /She shall be responsible to perform IT Security Risk assessments of new & existing processes, projects and applications / infrastructure. The incumbent shall be able to continuously analyse bank’s information security program, implementation & execution of defined controls, and work towards sustained compliance to those and improvement of the same. . Knowledge & Skills: Detailed understanding of IT Security and Infrastructure practices, operations, standards and frameworks. Good working knowledge of performing IT Security risk assessments Good working knowledge of Identity & Access Mgmt (IAM) – user access reviews, related controls, system access matrix, RBAC etc. Good working knowledge of Data Protection & Security, DLP, data encryption etc. Good working knowledge of handling information security incidents. Good working knowledge in Vulnerability Assessments (VA /PT) and/or System Security Hardening and appropriate remediations. Good working knowledge of SIEM tools and /or other Security Monitoring Tools, and handling Security Incidents. Fair understanding / Experience of working on Audits – data collation for Audits etc – would be preferred, but not mandatory. Good working knowledge on MS Office tools like Excel, Powerpoint would be essential. Should be well versed with various functions and data handling techniques in Excel. Ability to execute / implement Information Security Operations processes, and perform daily / weekly /monthly security controls and tasks. Ability to work on routine security activities as well complex technical security projects and initiatives. Proven track record in IS processes execution and enhancements. Experience: 1-3 years of progressive experience in the field of Information & Cyber Security, including experience in either Data security, Access & Identity Management or IT / Cyber Security, Security Operations in a global environment. Experience in BFSI or Banking environment would be preferred, but not mandatory. Qualifications: Must have completed a Bachelor’s degree (preferably BE / B.Tech.). A Master’s degree in Information Systems will certainly be preferred. Show more Show less
Posted 2 weeks ago
0.0 years
0 Lacs
Delhi
On-site
Job requisition ID :: 82284 Date: May 31, 2025 Location: Delhi Designation: Deputy Manager Entity: You will be responsible for managing and maintaining the IBM QRadar Security Information and Event Management (SIEM) platform. Your primary role will involve deploying, configuring, and optimizing the QRadar system to ensure effective security monitoring, event correlation, and threat detection within the organization's infrastructure. You will collaborate with security analysts, network engineers, and other IT teams to implement and maintain a robust security infrastructure.
Posted 2 weeks ago
0.0 years
0 Lacs
Delhi
On-site
Job requisition ID :: 82922 Date: May 31, 2025 Location: Delhi Designation: Assistant Manager Entity: SOC - DM
Posted 2 weeks ago
0 years
0 Lacs
Pune, Maharashtra, India
On-site
Role & Responsibilities Security Architecture & Engineering : Design and deploy secure network, infrastructure, and Azure cloud architectures using Defender for Cloud, Sentinel, Entra ID, and Purview. Select, integrate, and optimize security tools (SIEM/SOAR, firewalls, EDR, DLP). Embed security into DevOps/CI-CD pipelines via automation (Logic Apps, PowerShell, KQL). Security Operations & Incident Response Configure and tune detection rules and workbooks in Sentinel; build automated playbooks for common incidents. Lead triage, investigation, and root-cause analysis of alerts from Defender and Sentinel. Conduct proactive threat hunting, log review, and vulnerability assessments. Identity & Access Management Implement and manage Conditional Access, MFA, Privileged Identity Management, and RBAC in Entra ID. Enforce least-privilege principles and lifecycle policies across users, groups, and service identities. Governance, Risk & Compliance Maintain alignment with ISO 27001, NIST, CIS, PCI-DSS, and GDPR using Secure Score and Compliance Manager. Develop and enforce security policies, standards, and audit controls. Team Leadership & Collaboration Mentor SOC analysts and engineers, driving continuous improvement and knowledge sharing. Collaborate closely with IT, DevOps, and business units to integrate security into all projects. (ref:hirist.tech) Show more Show less
Posted 2 weeks ago
3.0 - 31.0 years
0 - 0 Lacs
Nehru Place, New Delhi
Remote
Network Security Engineer – Job Description Overview: A Network Security Engineer is responsible for designing, implementing, and maintaining secure network systems to protect an organization’s data, systems, and infrastructure from internal and external cyber threats. This role involves proactive monitoring, risk assessment, incident response, and continual security improvement. ⸻ Key Responsibilities: • Design and implement secure network architectures, including firewalls, VPNs, intrusion detection/prevention systems (IDS/IPS), and endpoint protection. • Monitor network traffic for suspicious behavior, investigate anomalies, and respond to security incidents. • Conduct regular vulnerability assessments, penetration testing, and risk analysis. • Maintain and enforce network security policies, protocols, and procedures. • Configure, manage, and troubleshoot network security tools and appliances (e.g., firewalls, proxies, SIEM, NAC). • Ensure compliance with relevant security standards and regulations (e.g., ISO 27001, NIST, GDPR). • Collaborate with IT and DevOps teams to integrate security into network and system operations. • Stay up to date with the latest cybersecurity threats, technologies, and best practices. Required Skills & Qualifications: • Bachelor’s degree in Computer Science, Information Security, or a related field. • Proven experience in network administration and security engineering. • Strong knowledge of TCP/IP, DNS, routing, switching, and common networking protocols. • Expertise with firewalls (e.g., Palo Alto, Fortinet, Cisco ASA), IDS/IPS, SIEM solutions, and VPN technologies. • Familiarity with scripting and automation (e.g., Python, Bash, PowerShell) for security operations. • Certifications such as CISSP, CEH, CCNP Security, or CompTIA Security+ are highly desirable. ⸻ Soft Skills: • Strong analytical and problem-solving skills. • Excellent communication and documentation abilities. • Ability to work independently and as part of a security or infrastructure team. • Proactive mindset with attention to detail and a strong sense of responsibility. ⸻ Let me know if you’d like to customize this for a junior, mid-level, or senior role, or tailor it for specific industries (e.g., finance, healthcare, government).
Posted 2 weeks ago
3.0 - 31.0 years
0 - 0 Lacs
Nehru Place, New Delhi
Remote
# IT System Administrator Overview As an IT System Administrator, you're responsible for maintaining the reliable operation of an organization's computer systems and servers. Here's a comprehensive look at your role: ## Core Responsibilities ### Infrastructure Management - Install, configure, and maintain servers (Windows/Linux) and network equipment - Manage virtualization platforms (VMware, Hyper-V) - Oversee storage systems (SAN/NAS) and backup solutions - Maintain directory services (Active Directory, LDAP) ### User Support & Access Control - Create and manage user accounts, groups, and permissions - Provide technical support and troubleshoot system issues - Implement and enforce security policies - Manage email systems and collaboration tools ### System Maintenance - Perform regular system updates and patches - Monitor system performance and optimize resources - Plan and execute disaster recovery procedures - Maintain system documentation and inventory ## Technical Skills Required ### Operating Systems - Windows Server (2016/2019/2022) - Linux distributions (RHEL, Ubuntu, CentOS) - macOS enterprise management ### Networking - TCP/IP, DNS, DHCP, VPN, VLANs - Firewall and switch configuration - Network monitoring tools (Wireshark, Nagios) ### Cloud & Virtualization - Azure/AWS/Google Cloud administration - VMware vSphere or Microsoft Hyper-V - Containerization (Docker, Kubernetes) ### Security - Antivirus/endpoint protection - SIEM tools - Security hardening and compliance ## Common Daily Tasks 1. Monitoring system alerts and responding to incidents 2. Performing routine maintenance during off-hours 3. Reviewing security logs and investigating anomalies 4. Assisting help desk with escalated tickets 5. Testing and implementing system upgrades 6. Documenting configurations and procedures ## Emerging Trends - Hybrid cloud infrastructure management - Infrastructure as Code (IaC) using tools like Terraform - Increased focus on cybersecurity measures - Automation of routine tasks via scripting - Zero Trust security model implementation - AI-powered monitoring and troubleshooting tools Would you like more detailed information about any specific aspect of system administration? I can provide deeper insights into particular technologies, certifications, or best practices.
Posted 2 weeks ago
0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
The SOC L3 Analyst is a senior member of the Security Operations Center team, responsible for advanced threat analysis, incident response, and security operations. This role involves leading investigations, developing detection capabilities, and mentoring junior analysts. The ideal candidate should possess deep technical expertise in cybersecurity, excellent problem-solving skills, and the ability to make critical decisions in high-pressure situations. Key Responsibilities Lead advanced investigations of security incidents and perform root cause analysis. Develop and fine-tune detection rules and security use cases for SIEM and other security tools. Collaborate with threat intelligence teams to correlate data and identify emerging threats. Conduct threat hunting activities to proactively identify suspicious behavior and vulnerabilities. Design and implement incident response processes and playbooks. Serve as an escalation point for L1 and L2 analysts for complex security issues. Ensure timely and accurate documentation of incidents, findings, and remediation steps. Collaborate with engineering and IT teams to improve security posture and harden systems. Provide mentorship and training to junior SOC team members. Required Skills/Technologies/Tools Extensive experience with Security Information and Event Management (SIEM) tools like Splunk, Sentinel or ELK. In-depth knowledge of cybersecurity frameworks like MITRE ATT&CK and the cyber kill chain. Advanced understanding of networking protocols, firewalls, and intrusion detection systems. Strong expertise in incident response, digital forensics, and malware analysis. Hands-on experience with endpoint detection and response (EDR) and threat intelligence platforms. Proficiency in scripting languages (Python, PowerShell, or Bash) for automation and analysis. Excellent analytical, troubleshooting, and problem-solving skills. Ability to communicate complex technical issues clearly to both technical and non-technical stakeholders. Good to have Technologies/Tools Knowledge of security orchestration, automation, and response (SOAR) platforms. Experience with reverse engineering and advanced malware analysis techniques. Hands-on experience with data loss prevention (DLP) and endpoint protection platforms. Familiarity with case management tools and digital forensic tools. Hands-on experience with vulnerability management and threat intelligence platforms. Relevant any cybersecurity certifications. Show more Show less
Posted 2 weeks ago
2.0 - 5.0 years
2 - 6 Lacs
Hyderabad
Work from Office
Join Amgen’s Mission of Serving Patients At Amgen, if you feel like you’re part of something bigger, it’s because you are. Our shared mission—to serve patients living with serious illnesses—drives all that we do. Since 1980, we’ve helped pioneer the world of biotech in our fight against the world’s toughest diseases. With our focus on four therapeutic areas –Oncology, Inflammation, General Medicine, and Rare Disease– we reach millions of patients each year. As a member of the Amgen team, you’ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you’ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. What you will do Let’s do this. Let’s change the world. In this vital role you will be responsible for the initial response to security events and incidents within a 24/7 Cybersecurity Operations Center (CSOC). This role involves following established procedures to investigate security events, providing feedback to improve processes, and assisting in the incident response lifecycle. Additionally, the associate will participate in knowledge-sharing sessions and correlate security alerts across platforms. Roles & Responsibilities: Follow established procedures to triage, investigate and respond to security events and incidents. Provide feedback to senior analysts to improve, review, and optimize existing procedures and documentation. Correlate security alerts from various platforms based on common elements. Participate in and lead CSOC Tier 1 knowledge-sharing and learning sessions. Assist incident responders in coordinating the response, containment, eradication, recovery, and lessons learned phases of the incident response lifecycle. Basic Qualifications: Bachelor’s degree and 0 to 3 years of Security Operations experience OR related field experience Diploma and 4 to 7 years of Security Operations or related field experience Professional Certifications: CompTIA Security+ (preferred) CEH (preferred) GSEC (preferred) MTA Security Fundamentals (preferred) Must-Have Skills: Solid understanding of security technologies and their core functionality Experience in analyzing cybersecurity threats with up-to-date knowledge of attack vectors and the cyber threat landscape. Ability to prioritize tasks effectively and solve problems efficiently in a diverse, distributed team environment. Good knowledge of Windows and/or Linux systems. Familiarity with CSOC operations and incident response procedures. Experience with security alert correlation across different platforms. Preferred Qualifications: Good communication and collaboration skills, especially when working with global teams. Ability to prioritize and manage tasks in high-pressure situations. Critical thinking and problem-solving abilities in cybersecurity contexts. A commitment to continuous learning and knowledge sharing. Work Hours This position requires you to work a later shift and may be assigned a second or third shift schedule. Candidates must be willing and able to work during evening or night shifts, as required. Potential Shifts (subject to change based on business requirements)Second Shift2:00 pm – 10:00 pm IST; Third Shift10:00 pm – 7:00 am IST. What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we’ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now for a career that defies imagination Objects in your future are closer than they appear. Join us. careers.amgen.com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation.
Posted 2 weeks ago
10.0 years
0 Lacs
Manesar, Haryana, India
On-site
🔐 Hiring Now: Senior SOC Analyst (SIEM | Threat Hunting | Incident Response) 📍 Location: Manesar, Haryana (Onsite | Government Sector Client) 📅 Join by: Immediate to Max 1 Month 🏢 Company: VVNT SEQUOR LLP, Noida 🛡️ About the Role VVNT SEQUOR is urgently hiring a Senior SOC Analyst with 8 –10 years of hands-on experience in SIEM, threat hunting, incident response , and L3/L4 security operations . This is a critical individual contributor role supporting a Government sector client at Manesar, where your cybersecurity expertise will help defend against real-world threats in a high-stakes environment. You’ll work with leading SIEM/EDR/SOAR platforms, conduct forensic investigations, and take the lead on proactive threat detection, containment, and post-incident analysis. 🧰 Key Responsibilities 🔍 Threat Monitoring & SIEM Operations Lead 24x7 SOC operations, monitoring alerts via ArcSight, Splunk, ELK Create and optimize correlation rules , use cases, and detection dashboards Leverage MITRE ATT&CK framework and threat intel feeds for advanced threat hunting 🚨 Incident Response & Forensics Coordinate incident lifecycle management and forensic investigations using CHFI techniques Analyze logs, memory dumps, and endpoint telemetry (EDRs like CrowdStrike, SentinelOne ) Conduct Root Cause Analysis (RCA) and post-incident reviews 🛡️ Vulnerability & Infrastructure Security Perform VAPT using Nessus, Qualys, OpenVAS, Metasploit, Burp Suite Manage security appliances – Firewalls (Palo Alto, FortiGate), WAF, IDS/IPS, Anti-DDoS Support compliance activities for ISO 27001, NIST CSF 🧠 Automation & Knowledge Sharing Integrate SOAR platforms and automate response playbooks (Python, PowerShell scripting) Lead security awareness programs (e.g., KnowBe4) and mentor junior SOC analysts 🧩 Who We’re Looking For 8–10 years in SOC & Security Operations with L3/L4 experience Deep working knowledge of SIEM, EDR, SOAR, forensic tools, threat modeling Strong skills in incident detection, investigation, containment, and RCA documentation Ability to handle escalations independently , acting as a technical leader on shift 🏆 Bonus Skills (Nice to Have) Certifications: CEH, CHFI, GCFA, GCIA, Security+, Splunk Certified Analyst Experience with Tripwire SCM, AWS GuardDuty, Azure Sentinel, TIPs Exposure to OT/ICS security , Red/Blue teaming, Purple teaming drills 📚 Tech Stack & Keywords (for AI & Job Portal Optimization) SOC Analyst | Threat Hunting | Incident Response | SIEM ArcSight Splunk | CHFI | CrowdStrike SentinelOne | SOAR | EDR | MITRE ATT&CK | L3/L4 Security Support | VAPT | Nessus Qualys | Firewall FortiGate PaloAlto | Burp Suite | RCA | ISO 27001 | NIST CSF | Python PowerShell Scripting | Government Sector Cybersecurity 🎯 Why Join VVNT SEQUOR? ✅ Lead mission-critical SOC operations for a Government Sector client ✅ Exposure to real-world threats and next-gen cyber tools ✅ Subsidized Cab + Lunch at client site ✅ Work in a fast-paced, hands-on, innovation-driven environment 📬 Apply Now 📩 Email: chaitali@vvntsequor.in parveen.arora@vvntsequor.in 📱 WhatsApp: +91-9891810196 +91-8802801739 📌 Please include : Updated Resume Last Drawn Salary Expected CTC Notice Period (Only Immediate or ≤1 Month) 📌 #SeniorSOCAnalyst #CybersecurityJobs #SIEM #ThreatHunting #IncidentResponse #L3L4Support #GovernmentCybersecurity #EDR #SplunkJobs #ArcSight #HiringNow #SecurityOperations Show more Show less
Posted 2 weeks ago
5.0 - 7.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
Required Skills And Qualifications 5-7 year experience Bachelor’s degree in Computer Science, Information Technology, or a related field (or equivalent experience). The candidate should be willing to relocate to Noida. Good knowledge of Windows /Linux system and networking fundamentals. Experience with cloud security and technologies like AWS, Azure, or Google Cloud Knowledge in operating and configuring SIEM tools (e.g., Sentinel , Splunk, MS defender). Knowledge of firewalls, IDS/IPS, DLP, and endpoint protection systems. Familiar with scripting and automation tools (e.g., Python, PowerShell). Experience with monitoring and logging platforms like ELK Stack, Splunk, Prometheus, Grafana, New Relic , Solarwinds Knowledge in CI/CD tools and processes (e.g., Jenkins, GitLab CI/CD). Knowledge containerization and orchestration tools (e.g., Docker, Kubernetes). Key Responsibilities Hands-on experience in Security incident response and threat intelligence analysis Knowledge of networking concepts, firewalls, and security protocols. Experience with SIEM tools, IDS/IPS systems, and endpoint security tools. Investigate security incidents and recommend remediation measures. Analyze security alerts from various monitoring tools and respond appropriately. Manage SIEM (Security Information and Event Management) tools and ensure logs are analyzed. Respond to incidents, perform initial troubleshooting, and escalate complex issues to L2/L3 engineers. Perform routine maintenance of servers, virtual machines, and cloud resources. Assist in provisioning, configuring, and decommissioning infrastructure as required. Support and maintain CI/CD pipelines for various projects. Execute existing automation scripts for routine tasks. Contribute to the improvement of automation scripts and processes. Maintain accurate and up-to-date documentation for configurations, incidents, and procedures. Coordinate with L2/L3 engineers, development, and QA teams for issue resolution. Show more Show less
Posted 2 weeks ago
5.0 years
0 Lacs
Vadodara, Gujarat, India
Remote
We are seeking an accomplished Lead Technical Recruiter to spearhead high-volume and niche recruiting efforts across complex technology domains. This leadership role demands a strategic thinker with hands-on sourcing expertise, full lifecycle recruiting experience, and the ability to mentor a team of recruiters while directly engaging with stakeholders and clients. You will be instrumental in driving talent acquisition for mission-critical roles in software engineering, cloud, cybersecurity, data science, and IT infrastructure. Core Responsibilities: Strategic Sourcing & Full-Cycle Recruitment Lead full-cycle recruitment for complex technical roles, including: Software Engineers (Java, .NET, React, Python, Node.js) Cloud & DevOps Engineers (AWS, Azure, GCP, Kubernetes, Terraform) Cybersecurity Analysts/Engineers (SOC, IAM, SIEM, CISSP, NIST) Data Engineers / Scientists (SQL, Spark, Snowflake, ML, AI, Python, R) Infrastructure Specialists (VMware, Cisco, Active Directory, Windows/Linux) Use advanced Boolean, X-ray, and GitHub sourcing techniques to identify top-tier active and passive candidates. Develop proactive talent pipelines. Team Leadership & Mentoring Supervise and mentor a team of junior and senior technical recruiters. Conduct regular training on technical screening , market trends, and sourcing best practices. Monitor recruiter KPIs: Submittal-to-Interview Ratio, Time-to-Fill, Interview-to-Offer Ratio. Stakeholder & Client Engagement Partner with hiring managers, delivery teams, and clients to align on job qualifications, tech stack, and project scope . Conduct intake meetings , define search strategy, and provide market insights and salary benchmarking. Present qualified talent to internal stakeholders or clients with technical rationale and compensation analysis. Required Qualifications: Bachelor’s degree in Computer Science, Information Systems, Business, or related field (preferred). 5+ years of technical recruiting experience in IT, Engineering, or Technology verticals. 2+ years of experience mentoring or leading recruiting teams. Experience with U.S. work authorization types: USC, GC, H1B, OPT, EAD, TN. Strong understanding of technical concepts (e.g., microservices, CI/CD, REST APIs, Agile, containers, machine learning). Excellent communication, interpersonal, and negotiation skills. What We Offer: Retention Bonus Competitive salary with aggressive commission/bonus plans. Access to premium sourcing tools and L&D programs. Flexible remote work policy and supportive team culture. Exposure to top-tier clients in IT, Cloud, Healthcare, Financial Services, and Government. Show more Show less
Posted 2 weeks ago
18.0 - 22.0 years
25 - 30 Lacs
Mumbai
Work from Office
Job Title - Security Account Lead + Associate Director + IMU Management Level:5 Associate Director Location:Mumbai/ New Delhi Must have skills: Cyber Security with P&L responsibility and good networking and relationship building ability Good to have skills: Cyber Strategy, Cyber Protection, Cyber Resilience Job Summary : As a Security Account Lead (SAL), you will be a trusted advisor who builds and executes Accenture vision by combining the best of Accenture Security and the power of One Accenture to meet our clients needs and help them become cyber resilient business. This is a critical role on the client account leadership team. Roles & Responsibilities: - Drive Growth for Security Oversee the growth and management of account(s) Accountable for Security P&L for the account(s) Identify new opportunities for business development and expansion within the account(s) Create Value for Clients Truly understand client needs and partner quickly to respond and support client Act as C-Suite advisor, partner with the client across the breadth of security offerings and create connection to other service areas across Accenture Maintain strong brand reputation through exceptional delivery and value for clients Bring the best of Accenture and Security Leverage the best of Accenture and Security, including service offerings, innovations, solution tablets, industry perspectives and proof of value (PoV), to deliver value to our clients Bring in experts from across Accenture from other offerings in support of client needs Build Exceptional Relationships Build and nurture relationships as an integral part of the Accenture team Cultivate relationships across One Accenture and Ecosystems partners Inspire teams and act with a Growth Mindset Create an engaging project environment for people to learn and grow Demonstrate a positive, growth mindset with openness to new ideas, innovations, and opportunities that keep the team challenged Professional & Technical Skills: - Must Have Skills: Proficiency in the Cyber Security environment - Strong networking and relationship building skills in the Financial Services and Products domain i.e. Consumer goods, Life Sciences, Utilities, Resources, Manufacturing etc. Additional Information: - The ideal candidate will possess a strong background in cyber security field, along with a proven track record of delivering impactful solutions to clients. This position is based at either Mumbai or New Delhi location. About Our Company | AccentureQualification Experience: Minimum 18-22 years of progressive functional and consulting experience. Educational Qualification: Masters degree in business administration (MBA) or post graduate degree in management (PGDM) from premier institutes preferred
Posted 2 weeks ago
3.0 - 6.0 years
2 - 6 Lacs
Pune
Work from Office
Template Job Title - Security Operations Center (SOC) Operator Management Level : CL11 Analyst / CL 10 Senior Analyst Location: Pune, PDC3C, Hinjewadi Must have skills: Excellent verbal and written communication skills Access control alarm monitoring CCTV monitoring Risk monitoring Handling safety / security related calls from employees Good to have skills: Experience in Global Security Operations Center / Regional Security Operations Center Sending mass notification / people advisory to employees / travel advisories Job Summary : The SOC Operator will be responsible for assessing, analyzing, and responding to incidents related to safety and security for the APAC region. The role requires daily use of tools/systems (e.g., access control, video management, risk feeds) to detect the impact to Accentures people, products, property, or brand image and alert the appropriate response stakeholders. Specifically, incidents may range from extreme weather conditions, political instability, crime, terror, civil unrest, and other personnel issues. In addition, the Operator will be responsible for customer service tasks to provide critical information and assistance to travelers, static employees, and potentially third parties. This role will be based in Hinjewadi, Pune, Maharashtra and reports to the SOC Shift Supervisor. Roles & Responsibilities: Monitor and operate security systems including access control and CCTV, along with environmental monitoring and mass notification systems. Respond quickly and initiate action related to alarms, phone calls, and environmental monitoring and alerting systems Notify, assist, and direct external emergency personnel and internal resources as necessary Dispatch security officers or law enforcement personnel for alarm response, calls for service, and emergency situations Execute protocols and communicate at all levels across the APAC region to employees, site security leads, safety & security staff, or contracted officers as needed Manage information flows to and from an incident Maintain operational logs, conduct daily shift checklists, handover reports, and incident reports Ensure all forms of communication, such as e-mails, phone conversations, and client interactions, are conducted in a courteous and professional manner, confidentially, and documented appropriately Coordinate with Accentures Corporate Security regional leads on incident detection and management Coordinate with Accentures Corporate executive protection leads on incident detection and management Ensure that complete and accurate information is entered into the incident management system Utilize and execute protocols and standard operating procedures to effectively manage global incidents. Monitor travel safety and security of the company's staff Maintain situational awareness of current global current events. Monitor and respond to global alerts and events affecting company facilities and employees providing immediate information and assistance as needed Initiate mass communication notifications as required Notify leadership of events affecting business operations and employees Ensure proper handling of highly confidential information. Perform other duties assigned by supervisors related to security and safety Additional Information: Experience with CCTV/video management and access control systems such as Genetec video solutions or CCure 9000 Experience with protective intelligence monitoring tools such as Everbridge and ISOS Tracker Great active listening skills Rapport building skills Patient and empathetic attitude Adaptability and flexibility Ability to analyze threats and envision potential or real time impact to operations Ability to respond quickly and calmly to emergencies and stressful situations by exercising proper judgment and decision-making skills Strong Customer Service skills Strong consensus, team building and negotiating skills Ability to work overtime on short notice Strong cultural sensitivities Be able to type a minimum of 35 words per min Excellent written and verbal communication skills Ability to multitask in a fast-paced, at times stressed work environment Strong team player Comfortable with high-tech work environment, and constant learning of new tools and innovations Proficient in Microsoft Windows and Office Suite About Our Company | Accenture (do not remove the hyperlink) Qualification Experience: Minimum 2 year(s) of experience is required Educational Qualification: Degree in any stream
Posted 2 weeks ago
2.0 - 6.0 years
4 - 8 Lacs
Mumbai, Nagpur, Thane
Work from Office
Knowledge of Cybersecurity and Infra Solutions - Familiarity with products like Switches, Routers, firewalls, SIEM, antivirus, and endpoint security. Customer Relationship Management - Ability to engage with clients, address concerns, and build trust. Negotiation & Sales Skills - Expertise in handling objections and driving contract renewals. CRM & Renewal Tools. Analytical & Problem-Solving Skills - Ability to assess customer needs and propose tailored security solutions.
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The Security Information and Event Management (SIEM) job market in India is thriving, with a growing demand for professionals who can monitor, analyze, and respond to security incidents in real-time. SIEM jobs offer lucrative career opportunities for individuals with a strong understanding of cybersecurity concepts and technologies.
The average salary range for SIEM professionals in India varies based on experience level: - Entry-level: INR 4-6 lakhs per annum - Mid-level: INR 8-12 lakhs per annum - Experienced: INR 15-20 lakhs per annum
Career progression in the SIEM field typically follows a path from: - SIEM Analyst - SIEM Engineer - SIEM Consultant - SIEM Architect
In addition to SIEM expertise, professionals in this field are often expected to have knowledge of: - Network Security - Incident Response - Threat Intelligence - Security Operations Center (SOC) operations
As you explore SIEM jobs in India, remember to continuously upgrade your skills, stay informed about the latest cybersecurity trends, and practice answering interview questions to showcase your expertise confidently. With the right preparation and dedication, you can excel in the dynamic field of SIEM and carve out a successful career for yourself. Good luck!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
36723 Jobs | Dublin
Wipro
11788 Jobs | Bengaluru
EY
8277 Jobs | London
IBM
6362 Jobs | Armonk
Amazon
6322 Jobs | Seattle,WA
Oracle
5543 Jobs | Redwood City
Capgemini
5131 Jobs | Paris,France
Uplers
4724 Jobs | Ahmedabad
Infosys
4329 Jobs | Bangalore,Karnataka
Accenture in India
4290 Jobs | Dublin 2