Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 7.0 years
0 Lacs
pune, maharashtra
On-site
As a Web Application Firewall Engineer at our Pune, India location, you will utilize your technical expertise to address business challenges on intricate projects. Your responsibilities will include evaluating technology effectiveness by gathering requirements, conducting testing and research, and providing recommendations for enhancements to improve quality and efficiency. Additionally, you will be tasked with understanding customer requirements to deliver high-quality solutions that meet their expectations. In this role, you will need to have proven experience with Akamai solutions such as CDN, WAF, and performance optimization tools, as well as a strong understanding of HTTP/HTTPS protocols, DNS, and web architecture. Proficiency in Akamai/F5 CDN configuration and administration, along with a grasp of core networking concepts, will be crucial. You will be responsible for monitoring Akamai and F5 services for performance and availability using Control Center and other tools, troubleshooting and resolving configuration and performance-related issues. You will need to have experience with Splunk or other SIEM monitoring tools, integrating websites, and implementing CDN technologies for performance, security, reliability, and scalability. Collaboration skills will be essential for working with the security team to implement and maintain security policies. Managing Akamai Property Manager, troubleshooting Akamai-related issues, ensuring compliance with security standards, staying updated on Akamai's new features, and supporting migrations to Akamai-enabled architectures will also be part of your responsibilities. To be successful in this role, a Bachelor's degree in computer science, Computer Information Systems, Cybersecurity, or a related field is preferred. Experience with Akamai or F5 WAF solutions, CSP platforms, and Splunk for log analysis and threat detection is required. Strong communication skills are essential for conveying complex risks to engineers and leadership. We offer a supportive environment that includes training, development opportunities, coaching from experts, and a culture of continuous learning. Additionally, you can benefit from a range of flexible benefits tailored to your needs. If you are ready to excel in your career and contribute to a culture of empowerment, collaboration, responsibility, and commercial thinking, join us at Deutsche Bank Group. Visit our company website for more information: https://www.db.com/company/company.htm. We welcome applications from all individuals and foster a positive, fair, and inclusive work environment.,
Posted 2 weeks ago
6.0 - 10.0 years
6 - 10 Lacs
Delhi, India
On-site
We are seeking a highly experienced and technically profound Lead to join our team at Inspira Enterprise India Pvt. Ltd. This role demands an individual with extensive expertise in information security, particularly within SOC operations. You will be responsible for leveraging your deep knowledge of network and security components, conducting advanced analysis, and leading efforts in vulnerability assessment, penetration testing, and incident mitigation to ensure a robust security posture for our clients. Roles and Responsibilities: Serve as a lead expert in information security, with a strong preference for experience in SOC operations. Apply excellent knowledge of OSI layers, security concepts, firewalls, and encryption concepts . Utilize excellent knowledge of network and security anomalies exhibited by IT network environments and SAP systems. Apply excellent knowledge of the TCP/IP stack and network protocols . Leverage excellent knowledge of SAP operations and security . Conduct hands-on vulnerability assessment and penetration testing using specialized tools. Utilize excellent knowledge of malware analysis (static and behavioral). Possess hands-on experience with IT security risk assessment and mitigation . Demonstrate understanding and experience of offensive security techniques. Apply excellent knowledge of different network attacks and countermeasures . Possess excellent knowledge of web servers and database servers (Windows / SQL / Linux / Oracle / Apache). Apply strong knowledge/experience in log analysis and event correlation . Gain experience in event log monitoring of security devices . Leverage excellent knowledge of industry best practices on Information security standards such as ISO 27001, PCI-DSS, COBIT etc., and security policies/procedures. Maintain good market awareness and experience in a wide range of security tools, including but not limited to spyware removal tools and network-based appliances. Apply excellent knowledge on security and network components from multiple vendors . Skills Requirement: Proficient in SIEM monitoring, log analysis, and event correlation . Expertise in network and security anomalies detection, particularly within IT network and SAP environments. Hands-on experience with vulnerability assessment and penetration testing tools . Strong knowledge of malware analysis (static and behavioral). Practical experience in IT security risk assessment and mitigation . Understanding and experience in offensive security methodologies . Comprehensive knowledge of network attacks and countermeasures . Familiarity with web server and database server security (Windows, SQL, Linux, Oracle, Apache). Excellent understanding of information security standards (ISO 27001, PCI-DSS, COBIT) and security policies/procedures. Broad awareness of the security tools market and experience with various security technologies. QUALIFICATION: Post-Graduate, M.Tech/MCA/MSC (Computer Science) or equivalent qualification.
Posted 1 month ago
2.0 - 8.0 years
2 - 8 Lacs
Delhi, India
On-site
We are seeking a highly skilled and experienced Senior Security Analyst to join our Security Operations Center (SOC) team at Inspira Enterprise India Pvt. Ltd. In this role, you will be responsible for SIEM monitoring, log analysis, event correlation, and managing security incidents. You will leverage your expertise in various security technologies, including DLP, HIPS, and EDR, to ensure the integrity of our information security systems and actively contribute to identifying and mitigating threats. Roles and Responsibilities: Perform SIEM monitoring and actively handle security incidents. Conduct log analysis and event correlation to identify security threats and anomalies. Monitor event logs from various security devices. Leverage strong knowledge of security and network components from multiple vendors . Utilize expertise in DLP (Data Loss Prevention) for monitoring and incident handling. Apply knowledge of HIPS (Host Intrusion Prevention System) for endpoint security. Utilize expertise in EDR (Endpoint Detection and Response) for advanced threat detection and response. Apply good knowledge of OSI layers and TCP/IP suite , including security concepts, firewall operations, and encryption. Identify and analyze network and security anomalies exhibited by IT network environments and SAP systems. Apply good knowledge of TCP/IP stack and network protocols . Utilize good knowledge of SAP operations and security . Conduct hands-on vulnerability assessment and penetration testing using specialized tools. Perform malware analysis (static and behavioral). Possess good knowledge of different network attacks and countermeasures . Apply good knowledge of web servers and database servers (Windows / SQL / Linux / Oracle / Apache). Skills Requirement: Proficient in SIEM monitoring, log analysis, and event correlation. Strong understanding of security devices from multiple vendors. Expertise in DLP, HIPS, and EDR. Solid grasp of network protocols, security concepts, and various attack types. Hands-on experience with vulnerability assessment and penetration testing. Knowledge of malware analysis techniques. Familiarity with web server and database security. Certifications: CEH (Certified Ethical Hacker) Any OEM certification like Checkpoint/Arcon/TrendMicro/Trellix QUALIFICATION: B.Tech/M.Tech/MCA/MSC (Computer Science) or equivalent qualification.
Posted 1 month ago
2.0 - 6.0 years
0 Lacs
maharashtra
On-site
As an L2 SOC Analyst specializing in LogRhythm SIEM, your role will involve strengthening the Security Operations Center in Mumbai. With 2 to 5 years of hands-on experience in security monitoring and incident analysis, particularly focusing on LogRhythm SIEM, you will play a crucial part in the in-depth analysis, incident investigation, escalation, and coordination with response teams. Your key responsibilities will include monitoring, analyzing, and triaging security alerts from LogRhythm SIEM and other security platforms. You will be responsible for investigating and validating security incidents with detailed analysis and impact assessment, conducting threat hunting, and advanced log correlation as per SOC playbooks. Additionally, you will respond to incidents following defined escalation matrices, perform root cause analysis, recommend containment and mitigation actions, and provide guidance and mentorship to L1 SOC Analysts for escalated incidents. Moreover, you will prepare incident reports, analysis summaries, and dashboards for management, monitor and report SIEM health, log source integration issues, and tuning requirements. Your role will also involve participating in the continuous improvement of detection rules and SOC processes. Being ready to work in 24x7 rotational shifts with a constant readiness for critical incident handling is essential for this position. To excel in this role, you should possess 2 to 5 years of SOC operations experience, with a specific focus on SIEM monitoring and incident handling. Strong hands-on experience with LogRhythm SIEM is mandatory, in addition to a good understanding of security threats, attack vectors, malware behavior, and common vulnerabilities. Practical experience in analyzing logs from firewalls, IDS/IPS, endpoint security, and cloud platforms is required, along with familiarity with the MITRE ATT&CK framework and the usage of threat intelligence. Furthermore, you should exhibit strong analytical thinking, incident response capabilities, and problem-solving skills. Effective communication skills for incident reporting and escalation are essential for this role. Preferred certifications include LogRhythm Certified Deployment Engineer (LCDE) or LogRhythm Certified SOC Analyst (LCSA), while certifications such as CompTIA Security+, CEH, CySA+, or equivalent security certifications are optional. Any threat hunting or incident response certification would be considered a plus. This is a full-time role based at the Mumbai SOC facility, requiring you to work in 24x7 rotational shifts, including nights and weekends.,
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
71627 Jobs | Dublin
Wipro
26798 Jobs | Bengaluru
Accenture in India
22262 Jobs | Dublin 2
EY
20323 Jobs | London
Uplers
14624 Jobs | Ahmedabad
IBM
13848 Jobs | Armonk
Bajaj Finserv
13848 Jobs |
Accenture services Pvt Ltd
13066 Jobs |
Amazon
12516 Jobs | Seattle,WA
Capgemini
12337 Jobs | Paris,France