Jobs
Interviews

14 Siem Platforms Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

10.0 - 14.0 years

0 Lacs

maharashtra

On-site

Protect Threat is a leading provider of advanced cybersecurity and IT services based in Mumbai. Our certified experts deliver tailored cybersecurity strategies to safeguard digital assets and strengthen security postures. We offer a comprehensive suite of services, including penetration testing, cloud security, threat intelligence, compliance, and incident response. We are currently hiring for our client, a leading private sector bank, to strengthen their Security Operations Center (SOC) capabilities. This is a full-time on-site role for a SOC Manager, who will lead a 20-member SOC team and oversee security operations for our clients banking environment. The SOC Manager will report directly to the CISO and collaborate closely with incident response teams to manage SIEM platforms, monitor security events, and ensure rapid incident detection and response. Key responsibilities include leading SOC operations and managing day-to-day security monitoring, overseeing incident detection, triage, and response activities, managing SIEM platforms (Securonix preferred; QRadar/Splunk/Arcsight acceptable), coordinating with incident response teams in a large-scale enterprise environment, mentoring SOC analysts, and ensuring adherence to security processes. Qualifications required for this role include 10+ years of experience in Cybersecurity and SOC Management, proven experience with SIEM platforms (Securonix, QRadar, Splunk, or Arcsight), a strong background in cybersecurity operations, vulnerability management, and network security, excellent leadership, communication, and analytical skills, experience managing SOC teams (L1, L2, L3 mix) in enterprise/banking environments, relevant certifications such as CISSP, CISM or CISA (preferred), and a Bachelors degree in Cybersecurity, Information Technology, or related field. As a SOC Manager, you will work on-site in Mumbai (Kanjurmarg & Airoli) from Monday to Friday. You will lead SOC operations for our client, a large private sector bank, manage a high-performing SOC team, and collaborate with advanced IR teams. There is a projection for 10-12 additional security roles through November. To apply for the SOC Manager Role with 10 years of experience, please send your resume to inquiries@protectthreat.com with the subject line: "Application for SOC Manager Role - 10 Years Experience".,

Posted 1 day ago

Apply

3.0 - 7.0 years

0 Lacs

haryana

On-site

You will be joining a leading Indian telecom company operating in 18 countries and serving over 300 million customers and 1 million+ businesses. The company values a customer-first mindset and a user-centric approach. Your role will require you to be experienced in SIEM platforms such as QRadar, Splunk, and ArcSight, with knowledge of UEBA, NBAD, and SOAR. You should be skilled in incident management, network troubleshooting, and comfortable working in 24x7 SOC environments. Your responsibilities will include having a technical understanding and working knowledge of SIEM platforms, along with exposure to UEBA, NBA, NBAD, and SOAR. It is essential to have experience with industry-standard SIEM platforms like QRadar, Splunk, RSA, Seceon, Arcsight, etc. You will need to adhere to processes and procedures, possess general network knowledge, and be proficient in TCP/IP troubleshooting. Additionally, you should be able to trace down an endpoint on the network based on ticket information. Good customer communication skills are essential, along with working knowledge of SIEM incident management and providing customer updates. Experience in Managed SOC Services is a must, and you should be prepared to work across 24x7 shifts. Hands-on experience in SIEM platforms and the mentioned technologies is required for this role. It would be beneficial to have industry certifications on SIEM Platform, CCNA, CEH, MCSE, and others as preferred skills.,

Posted 3 days ago

Apply

5.0 - 9.0 years

0 Lacs

jaipur, rajasthan

On-site

Vaibhav Global Ltd (VGL) is a well-established electronic deep discount retailer of fashion jewelry, gemstones, and lifestyle products, with operations in the US, UK, Germany, and Canada. The company, listed on Indian stock exchanges since 1996-97, has a wide reach across 124 million households in key markets. As the digital retail landscape evolves, VGL continues to innovate its portfolio and omni-channel strategy to meet customer demands for convenience. With a group turnover of approximately Rs. 3,041 Crore (FY 2023-2024) and a global workforce of over 3800 employees, VGL is dedicated to sustainable business practices and social responsibility. The company's commitment to environmental sustainability is reflected in its renewable energy initiatives and accolades such as the Excellence Award for IGBC Performance Challenge 2021. Through initiatives like "Your Purchase Feeds.", VGL has provided millions of meals to school children, showcasing its dedication to giving back to the community. VGL is also recognized as a Great Place to Work (GPTW) certified organization. Shop LC and TJC are key subsidiaries of VGL, operating in the US and UK markets respectively. Shop LC, established in 2007 in Austin, TX, broadcasts live to millions of homes in the US and ships thousands of products daily. TJC, founded in London in 2006, is a prominent teleshopping and digital retail brand in the UK. The acquisitions of Mindful Souls B.V. and Ideal World have further strengthened VGL's digital business capabilities and product offerings. As a Security Specialist at VGL, your role is crucial in maintaining the security of the company's digital systems. Responsibilities include setting up and managing firewalls, monitoring network activity, responding to security incidents promptly, and collaborating with other teams on technical tools. You will also support compliance efforts, document security procedures, and evaluate and implement new security tools as needed. Key Responsibilities: - Install and manage firewalls and WAF tools - Set up and maintain Azure networking - Monitor logs, detect threats, and resolve incidents - Implement security tools in Azure cloud environments - Collaborate with DevOps on security for CI/CD pipelines - Support audits and compliance requirements - Write SOPs, runbooks, and incident support documentation Required Skills And Experience: - 4-7 years of experience in network and cloud security - Strong knowledge of NGFWs, WAFs, and Azure cloud security tools - Familiarity with SIEM platforms and packet capture tools - Understanding of VPNs, TCP/IP, and application security - Excellent problem-solving and communication skills At VGL, our purpose is to deliver joy, our vision is to be the Value Leader in Electronic Retailing of Jewelry and Lifestyle Products, and our core values include teamwork, honesty, commitment, passion, and a positive attitude. Join us in our mission to deliver one million meals per day to children in need by FY40 through our one-for-one meal program, "Your Purchase Feeds.".,

Posted 1 week ago

Apply

12.0 - 16.0 years

0 Lacs

karnataka

On-site

About Rippling Rippling, based in San Francisco, CA, has secured over $1.4B from renowned investors such as Kleiner Perkins, Founders Fund, Sequoia, Greenoaks, and Bedrock. The company has been recognized as one of America's best startup employers by Forbes. Rippling prioritizes candidate safety, ensuring that all official communications are exclusively sent from @Rippling.com addresses. About The Role Rippling is seeking an experienced Security Engineer to join the Detection and Response Team (DART). As a member of the team, you will play a crucial role in establishing a top-notch incident response function that effectively handles challenging security incidents. Your responsibilities will include driving process enhancements, fostering an open culture of learning from mistakes, and constructing the necessary tools and detection infrastructure to scale our threat response capabilities across both Production and Corporate environments. What You Will Do - Respond promptly to security events, conduct triage, investigations, and incident analysis, and communicate findings effectively to stakeholders. - Contribute to the enhancement of processes, procedures, and technologies for detection and response to ensure continual improvement post-incident. - Develop and manage tools for collecting security telemetry data from cloud-based production systems. - Automate workflows to streamline identification and response times for security events. - Create and refine detection rules to focus efforts on critical alerts. - Establish runbooks and incident playbooks for new and existing detections. - Lead Threat hunting practices, recommend signals for detecting attacks in product and infrastructure, and incorporate discoveries into security controls. What You Will Need - Minimum of 12 years of full-time experience as a security engineer, encompassing security monitoring, incident response, and threat hunting in a cloud environment. - Possess a defensive mindset while understanding offensive security and the scenarios leading to compromise. - Proven experience in managing complex investigations involving numerous stakeholders. - Excellent communication skills with a track record of effectively engaging with internal and external stakeholders of all levels. - Expertise in AWS security controls and services. - Proficiency in coding for automation, alert enrichment, and detections. - Familiarity with adversary tactics, techniques, and procedures (TTPs) and MITRE ATT&CK principles. - Hands-on experience in data analysis, modeling, and correlation at scale. - Strong background in operating systems internals and forensics for macOS, Windows, and Linux. - Domain expertise in handling current SIEM and SOAR platforms. - Experience in developing tools and automation using common DevOps toolsets and programming languages. - Understanding of malware functionality and persistence mechanisms. - Ability to analyze endpoint, network, and application logs for unusual events. Additional Information Rippling places significant value on having in-office employees to promote a collaborative work environment and company culture. For office-based employees residing within a specified radius of a Rippling office, working in the office for at least three days a week is considered an essential function of their role under the current policy.,

Posted 1 week ago

Apply

2.0 - 6.0 years

0 Lacs

karnataka

On-site

A career in our Advisory Acceleration Centre is the natural extension of PwC's leading class global delivery capabilities. We provide premium, cost-effective, high-quality services that support process,

Posted 1 week ago

Apply

8.0 - 12.0 years

8 - 12 Lacs

Pune, Maharashtra, India

On-site

Configure, manage, and optimize Microsoft Sentinel for efficient threat detection and response. Ensure SIEM infrastructure is running optimally, including performance monitoring and issue resolution. Regularly update and optimize SIEM policies, rules and configurations based on evolving threats. Onboard, configure, and manage data connectors from various log sources, including cloud, on-premises, and hybrid environments. Ensure log ingestion health and troubleshoot data collection issues. Develop, implement, and fine-tune analytics rules, detection logic, and playbooks in Sentinel. Assist SOC and incident response teams with log analysis, threat correlation, and incident investigation. Reduce false positives by refining detection rules and optimizing event filtering. Implement and enhance automation using Kusto Query Language (KQL), Logic Apps , and Microsoft Defender XDR integrations. Maintain SIEM compliance with security policies, industry regulations (e.g., GDPR, NIST, ISO 27001), and best practices. Generate reports and dashboards to provide visibility into security posture and SIEM performance. Work with SOC, IT, and Cloud Security teams to enhance Sentinel capabilities. Document SIEM configurations, detection use cases, and operational procedures. Incident & Problem Management, Change & Release Management, Vendor Management, Capacity Management functions for the platform. Maintain up-to-date knowledge of technology standards, industry trends, emerging technologies, and cyber security best practices. Ensure technical issues are quickly resolved and help implement strategies and solutions to reduce the likelihood of recurrence. Passionate about data to drive information-based security analytics. Value add - Person in having experience in Cloud Management, Splunk and Chronicle. Your skills and experience The candidate must have Engineering Background in Computer Science, Information Technology, Cybersecurity or related field and a minimum of 8+ years of experience with recent experience in Security engineering, system administration, network engineering, software engineering/development with a focus on Cybersecurity. 8+ years of IT engineering experience with recent experience in building and managing infrastructure and security platforms. 3+ years of Experience implementing, architecting and administering SIEM platforms like Sentinel, Chronicle, Splunk for a large global organization. Knowledge of Azure services and data ingestion from those services into SIEM. Familiarity with MITRE ATT&CK, cyber threat intelligence and SOC Workflows Understanding of SOAR Principles Hands on Experience with Microsoft Azure platform, managing various configurations to enable & manage Sentinel. Experience developing in XML, Bash,Python, and PowerShell scripts. DevOps Engineering experience.(Terraform, SDLC, Actions) Independent, self-motivated, proactive approach to problem solving and prevention. Excellent written and verbal communication skills. Passionate about cyber security and the aptitude to identify and solve security problems.

Posted 1 week ago

Apply

5.0 - 9.0 years

0 Lacs

haryana

On-site

As the exclusive recruiting partner to our client, Aimhire.io is urgently seeking a highly skilled and experienced Network Engineer with specialization in Fortinet security and networking products (e.g., FortiGate, FortiManager, FortiAnalyzer). In this role, you will be responsible for designing, implementing, managing, and troubleshooting secure and scalable network infrastructures within enterprise environments. Key Responsibilities: - Design, deploy, and maintain secure network solutions utilizing Fortinet products. - Configure and manage FortiGate firewalls, VPNs (IPSec/SSL), and UTM features. - Monitor network performance, troubleshoot issues, and ensure high availability and security. - Implement and maintain FortiManager and FortiAnalyzer for centralized management and logging. - Collaborate with security teams to enforce policies and respond to incidents. - Conduct network assessments and provide recommendations for improvements. - Document network configurations, diagrams, and standard operating procedures. - Provide mentorship and technical guidance to junior engineers. - Participate in on-call rotation and provide support during critical incidents. Required Qualifications: - Bachelor's degree in computer science, Information Technology, or a related field (or equivalent experience). - 5+ years of experience in network engineering with an emphasis on security. - Strong hands-on experience with Fortinet products such as FortiGate, FortiManager, FortiAnalyzer, FortiAP, and FortiSwitch. - Deep understanding of networking protocols including TCP/IP, BGP, OSPF, VLANs, NAT, etc. - Experience with VPN technologies, firewall policies, and intrusion prevention systems. - Familiarity with network monitoring tools and SIEM platforms. - Fortinet NSE 4 certification or higher (NSE 5/6/7 preferred). Preferred Skills: - Experience with SD-WAN, cloud networking (AWS/Azure), and automation tools (Ansible, Python). - Knowledge of other security platforms such as Palo Alto, Cisco ASA, and Check Point is a plus. - Excellent problem-solving, communication, and documentation skills.,

Posted 2 weeks ago

Apply

2.0 - 6.0 years

0 Lacs

karnataka

On-site

A career in our Advisory Acceleration Centre is the natural extension of PwC's leading-class global delivery capabilities. We provide premium, cost-effective, high-quality services that support process,

Posted 2 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

haryana

On-site

At Aimhire.io, we are the exclusive recruiting partner to our client and are currently seeking a highly skilled and experienced Network Engineer with specialized knowledge in Fortinet security and networking products, such as FortiGate, FortiManager, and FortiAnalyzer. As the ideal candidate, you will be responsible for designing, implementing, managing, and troubleshooting secure and scalable network infrastructures within enterprise environments. Key Responsibilities: - Design, deploy, and maintain secure network solutions utilizing Fortinet products. - Configure and manage FortiGate firewalls, VPNs (IPSec/SSL), and UTM features. - Monitor network performance, troubleshoot issues, and ensure high availability and security. - Implement and maintain FortiManager and FortiAnalyzer for centralized management and logging. - Collaborate with security teams to enforce policies and respond to incidents. - Conduct network assessments and provide recommendations for improvements. - Document network configurations, diagrams, and standard operating procedures. - Provide mentorship and technical guidance to junior engineers. - Participate in on-call rotation and support critical incidents as needed. Required Qualifications: - Bachelor's degree in computer science, Information Technology, or a related field (or equivalent experience). - 5+ years of experience in network engineering with a focus on security. - Strong hands-on experience with Fortinet products (FortiGate, FortiManager, FortiAnalyzer, FortiAP, FortiSwitch). - Deep understanding of networking protocols (TCP/IP, BGP, OSPF, VLANs, NAT, etc.). - Experience with VPN technologies, firewall policies, and intrusion prevention systems. - Familiarity with network monitoring tools and SIEM platforms. - Fortinet NSE 4 certification or higher (NSE 5/6/7 preferred). Preferred Skills: - Experience with SD-WAN, cloud networking (AWS/Azure), and automation tools (Ansible, Python). - Knowledge of other security platforms (Palo Alto, Cisco ASA, Check Point) is a plus. - Excellent problem-solving, communication, and documentation skills.,

Posted 2 weeks ago

Apply

3.0 - 7.0 years

6 - 10 Lacs

Mohali

Work from Office

About ASB ASB is committed to empowering students with expertise in emerging technologies. We are looking for an enthusiastic and passionate Cybersecurity Training Expert to lead and mentor students, equipping them with industry-relevant skills in cybersecurity. This role requires a deep understanding of cybersecurity principles, hands-on technical expertise, and a passion for teaching. The ideal candidate will have solid experience in network security, penetration testing, ethical hacking, compliance, and security frameworks. They should be an excellent communicator who can break down complex cybersecurity concepts into easy-to-understand modules. Key Responsibilities 1. Training Delivery Design, develop, and deliver high-quality cybersecurity training through courses, workshops, boot camps, and webinars. Cover a broad range of cybersecurity topics, including but not limited to: Network Security & Firewalls Penetration Testing & Ethical Hacking Cloud Security & DevSecOps Security Compliance & Auditing (ISO 27001, NIST, GDPR, etc.) Threat Intelligence & Incident Response SIEM, SOC & Security Tools (Burp Suite, Wireshark, Metasploit, AWS Security Hub, etc.) 2. Curriculum Development Develop and continuously update cybersecurity training materials, including hands-on labs, case studies, quizzes, and real-world projects. Ensure training content is aligned with industry best practices, compliance frameworks, and emerging security trends. 3. Training Management Organize and manage cybersecurity training sessions, ensuring smooth content delivery, engagement, and assessments. Track learner progress and provide additional support, including one-on-one guidance and mentorship. 4. Technical Support & Mentorship Assist students with technical queries and troubleshoot cybersecurity-related challenges. Provide career guidance and mentorship, helping students navigate certifications (CEH, CISSP, OSCP, CISM, etc.) and job opportunities in cybersecurity. 5. Industry Engagement Stay updated with the latest cybersecurity threats, vulnerabilities, and defense mechanisms. Represent ASB at cybersecurity conferences, webinars, and industry events. 6. Assessment & Evaluation Develop hands-on challenges, CTFs (Capture The Flag), and practical assessments to evaluate student proficiency. Provide constructive feedback to enhance their technical skills. Required Qualifications & Skills Educational Background Bachelor's or Masters degree in Computer Science, Cybersecurity, Information Security, or a related field. Hands-on Cybersecurity Experience 3+ years of experience in cybersecurity roles such as Penetration Tester, Security Analyst, SOC Analyst, Cybersecurity Engineer, or Security Auditor. Expertise in ethical hacking, threat analysis, cloud security, risk assessment, and compliance. Strong knowledge of Linux, Windows Security, Networking, and Cryptography. Teaching & Communication Skills 2+ years of experience in training, mentoring, or delivering cybersecurity education. Ability to explain complex security concepts in a clear and engaging way. Cybersecurity Tools & Platforms Experience with security tools such as Kali Linux, Metasploit, Burp Suite, Wireshark, Nessus, Nmap, Snort, Splunk, SIEM platforms, and AWS Security Hub. Knowledge of SOC operations, incident response, and security automation tools. Passion for Education A genuine enthusiasm for training the next generation of cybersecurity professionals. Preferred Qualifications Industry Certifications CEH, OSCP, CISSP, CISM, CCSP, AWS Security Certification, or equivalent. Experience in Online Teaching Prior experience in online training platforms (Udemy, Coursera, etc.) or learning management systems (LMS). Knowledge of Security Frameworks & Compliance Familiarity with ISO 27001, NIST, GDPR, SOC 2, and PCI-DSS. Experience in Blue Team & Red Team Operations Understanding of ethical hacking (offensive security) and defensive security (SOC, SIEM, endpoint protection, etc.).

Posted 1 month ago

Apply

3.0 - 5.0 years

4 - 8 Lacs

Hyderabad, Bengaluru

Work from Office

Position: Senior Systems Engineer Experience: 3-5 yrs Category: IT Infrastructure Main location: Bangalore, Hyderabad Primary skill- SIEM tools, Incident response, Network Security. Qualification: Bachelor's degree in Computer Science or related field or higher. Position Description Key Responsibilities: Monitor and analyze security events using SIEM tools (e.g., Splunk, QRadar, Azure Sentinel). Detect, investigate, and respond to real-time security incidents and alerts. Triage incidents based on severity and impact; escalate to L3/IR team as required. Perform root cause analysis and document findings in incident tracking tools. Create and update use cases, detection rules, and dashboards within SIEM. Analyze endpoint, firewall, and proxy logs for malicious activity. Conduct log correlation across multiple data sources to identify patterns and anomalies. Collaborate with threat intelligence and vulnerability management teams. Prepare detailed incident reports and threat intelligence summaries. Assist in playbook development and improve response workflows. Participate in regular threat hunting and tabletop exercises. Ensure security controls and monitoring are in place for cloud environments (AWS/Azure). Support compliance and audit requests with log and incident data. Provide mentorship and guidance to junior SOC analysts. Required Skills & Qualifications: Bachelors degree in Computer Science, Information Security, or related field. 35 years of hands-on experience in a SOC or cybersecurity role. Proficiency in SIEM platforms (e.g., Splunk, QRadar, Sentinel, ArcSight). Strong understanding of TCP/IP, DNS, HTTP, VPN, firewall rules, and IDS/IPS. Experience handling phishing, malware, lateral movement, and brute-force attacks. Familiarity with the MITRE ATT&CK framework and cyber kill chain. Knowledge of endpoint detection tools (e.g., CrowdStrike, Defender ATP). Working experience with ticketing tools like ServiceNow or Jira. Good communication skills and ability to work in a high-pressure environment. Flexible to work in 24/7 rotational shifts, including weekends (if required). Preferred / Good-to-Have: Scripting skills (Python, PowerShell, Bash) for automating SOC tasks. Cloud security experience (AWS, Azure, GCP). Certifications: SC-200, CompTIA CySA+, CEH, GSEC, or equivalent. Exposure to SOAR platforms and automated response tools. Skills: English Security Operations Center Security Architecture Security Assessment Security Monitoring AI

Posted 2 months ago

Apply

5.0 - 7.0 years

4 - 7 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Key Responsibilities Design, develop, and deploy SIEM workflows that automate and streamline the detection, analysis, and response to security events Customize workflows to meet specific SIEM requirements and improve operational efficiency Develop and maintain SIEM connectors to integrate various data sources, including network devices, servers, applications, and cloud environments Ensure reliable data ingestion and normalization across diverse sources to provide comprehensive security monitoring Work with ELT (Extract, Load, Transform) frameworks to integrate and process security data from multiple sources Leverage technologies such as Kafka, AWS Data Catalog, AWS Glue, and Athena to manage and query large datasets efficiently Utilize scripting languages like Python, Bash, JavaScript, or PowerShell to automate tasks, develop custom connectors, and enhance SIEM functionality Contribute to the design and architecture of secure, scalable SIEM solutions aligned with the organization's security strategy Identify and recommend improvements to system design to enhance performance, reliability, and scalability Provide strategic recommendations for optimizing security operations, improving system design, and adopting new technologies that align with long-term security goals Job Qualifications Technical Expertise Strong experience with SIEM platforms and best practices in security operations, threat detection, and incident response Proficiency in scripting languages (Python, Bash, JavaScript, PowerShell) for automation and custom development Experience with data management tools such as ELT frameworks, Kafka, AWS Data Catalog, AWS Glue, and Athena Solid understanding of cloud services, particularly AWS, and experience automating tasks with Boto3 Experience in building FedRAMP-compliant systems is a plus Strategic and Analytical Skills Ability to think strategically and recommend system design improvements to enhance security operations Strong analytical skills to assess security threats and optimize SIEM configurations and workflows Communication and Collaboration Excellent communication skills with the ability to work closely with cross-functional teams

Posted 2 months ago

Apply

2.0 - 7.0 years

4 - 7 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Job Qualifications Technical Expertise Strong experience with SIEM platforms and best practices in security operations, threat detection, and incident response Proficiency in scripting languages (Python, Bash, JavaScript, PowerShell) for automation and custom development Experience with data management tools such as ELT frameworks, Kafka, AWS Data Catalog, AWS Glue, and Athena Solid understanding of cloud services, particularly AWS, and experience automating tasks with Boto3 Experience in building FedRAMP-compliant systems is a plus Strategic and Analytical Skills Ability to think strategically and recommend system design improvements to enhance security operations Strong analytical skills to assess security threats and optimize SIEM configurations and workflows Communication and Collaboration Excellent communication skills with the ability to work closely with cross-functional teams

Posted 2 months ago

Apply

5.0 - 7.0 years

0 Lacs

Bengaluru / Bangalore, Karnataka, India

On-site

Job Requisition ID # 25WD88680 Position Overview In the role of Triage Manager, you will be responsible for overseeing the full spectrum of security alert triage across Autodesk's global infrastructure. Your primary objective is to ensure that all Tier 1 alerts are promptly actioned and resolved while efficiently routing more complex issues to seasoned security analysts. You will manage a team that includes both internal staff and vendor personnel, and you'll work collaboratively with our Detections and Monitoring groups to fine-tune alert configurations and drive automation initiatives. Your expertise in managing alerts across on-premises systems and cloud platforms (Azure, AWS, and GCP) will be vital in maintaining a robust, responsive security posture. Key Responsibilities Alert Management & Triage: Oversee and streamline the alert triage process, ensuring all Tier 1 alerts are promptly acknowledged, investigated, and resolved. Ensure that higher complexity alerts are escalated to more seasoned analysts for in-depth investigation Team Coordination: Lead a mixed team of full-time employees and vendor staff, ensuring optimal coverage and efficient operations within the alert queues Provide mentorship, operational guidance, and continuous training to team members Process Optimization: Collaborate with Detections and Monitoring teams to tune alert thresholds, reduce false positives, and eliminate noise. Identify which alerts are suitable for automation and partner with engineering teams to develop and deploy automated solutions Multi-Cloud Alert Management: Manage and maintain situational awareness of alerts coming from diverse environments including on-premises, Azure, AWS, and GCP infrastructures. Ensure consistent triage standards are applied across all platforms Operational Reporting & Improvement: Develop and maintain metrics to evaluate alert handling performance. Produce regular status reports to drive continuous improvement in triage processes Collaboration & Communication: Serve as a critical communication bridge between frontline security operations and higher-level incident response teams. Ensure clear, timely, and accurate documentation and communication of triage activities and incident escalations Minimum Qualifications Experience: Minimum of 5+ years in security operations or incident response, with at least 2 years in a supervisory or management role overseeing alert triage or a similar SOC function Technical Skills: Strong command of SIEM platforms, especially Splunk, with proven experience in configuring and optimizing alerting mechanisms Solid understanding of telemetry integration and alert correlation across varied data sources in both on-prem and cloud environments Operational Expertise: Demonstrated experience managing high-volume security alert environments, with the ability to make swift, informed decisions under pressure Expertise in developing and refining alert triage processes, reducing noise, and automating routine tasks Soft Skills: Exceptional leadership and communication skills capable of effectively managing a mixed team of internal and vendor staff Strong analytical and problem-solving abilities to quickly assess and escalate security incidents Cloud Agnostic: Proven knowledge of and experience with managing security alerts across multiple cloud platforms, including Azure, AWS, and GCP #LI-PJ1 Learn More About Autodesk Welcome to Autodesk! Amazing things are created every day with our software - from the greenest buildings and cleanest cars to the smartest factories and biggest hit movies. We help innovators turn their ideas into reality, transforming not only how things are made, but what can be made. We take great pride in our culture here at Autodesk - our Culture Code is at the core of everything we do. Our values and ways of working help our people thrive and realize their potential, which leads to even better outcomes for our customers. When you're an Autodesker, you can be your whole, authentic self and do meaningful work that helps build a better future for all. Ready to shape the world and your future Join us! Salary transparency Salary is one part of Autodesk's competitive compensation package. Offers are based on the candidate's experience and geographic location. In addition to base salaries, we also have a significant emphasis on discretionary annual cash bonuses, commissions for sales roles, stock or long-term incentive cash grants, and a comprehensive benefits package. Diversity & Belonging We take pride in cultivating a culture of belonging and an equitable workplace where everyone can thrive. Learn more here: Are you an existing contractor or consultant with Autodesk Please search for open jobs and apply internally (not on this external site).

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies