Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 9.0 years
8 - 14 Lacs
chennai
Work from Office
Key Responsibilities: Splunk ITSI Implementation: Develop and configure IT Service Intelligence (ITSI) modules, including KPI creation, service trees, and notable event aggregation. SIEM Development: Design, implement, and optimize Splunk SIEM solutions for threat detection, security monitoring, and log analysis. Dashboard & Visualization: Create advanced dashboards, reports, and visualizations using Splunk SPL (Search Processing Language). Data Ingestion & Parsing: Develop data onboarding, parsing, and field extractions from various log sources, including cloud and on-prem infrastructure. Mandatory Key SkillsSplunk ITSI Implementation,SIEM Development,data onboarding,Visualization,Splunk*
Posted 1 day ago
5.0 - 9.0 years
8 - 14 Lacs
mumbai
Work from Office
Key Responsibilities: Splunk ITSI Implementation: Develop and configure IT Service Intelligence (ITSI) modules, including KPI creation, service trees, and notable event aggregation. SIEM Development: Design, implement, and optimize Splunk SIEM solutions for threat detection, security monitoring, and log analysis. Dashboard & Visualization: Create advanced dashboards, reports, and visualizations using Splunk SPL (Search Processing Language). Data Ingestion & Parsing: Develop data onboarding, parsing, and field extractions from various log sources, including cloud and on-prem infrastructure.KeywordsITSI,SIEM,SIEM Development,Splunk SPL,Splunk ITSI Implementation,Splunk*Mandatory Key SkillsITSI,SIEM,SIEM Development,Splunk SPL,Splunk ITSI Implementation,Splunk*
Posted 4 days ago
5.0 - 9.0 years
8 - 14 Lacs
jaipur
Work from Office
Key Responsibilities:Splunk ITSI Implementation: Develop and configure IT Service Intelligence (ITSI) modules, including KPI creation, service trees, and notable event aggregation.SIEM Development: Design, implement, and optimize Splunk SIEM solutions for threat detection, security monitoring, and log analysis.Dashboard & Visualization: Create advanced dashboards, reports, and visualizations using Splunk SPL (Search Processing Language).Data Ingestion & Parsing: Develop data onboarding, parsing, and field extractions from various log sources, including cloud and on-prem infrastructure.KeywordsDashboard,Data Visualization,Splunk SPL,Data Ingestion,Splunk SIEM solutions,IT Service Intelligence,Splunk ITSI Implementation*Mandatory Key SkillsDashboard,Data Visualization,Splunk SPL,Data Ingestion,Splunk SIEM solutions,IT Service Intelligence,Splunk ITSI Implementation*
Posted 4 days ago
5.0 - 9.0 years
8 - 14 Lacs
bengaluru
Work from Office
Key Responsibilities: Splunk ITSI Implementation: Develop and configure IT Service Intelligence (ITSI) modules, including KPI creation, service trees, and notable event aggregation. SIEM Development: Design, implement, and optimize Splunk SIEM solutions for threat detection, security monitoring, and log analysis. Dashboard & Visualization: Create advanced dashboards, reports, and visualizations using Splunk SPL (Search Processing Language). Data Ingestion & Parsing: Develop data onboarding, parsing, and field extractions from various log sources, including cloud and on-prem infrastructure. Mandatory Key Skills IT Service Intelligence,Data Ingestion,Splunk SPL,Splunk SIEM,SIEM Development,Splunk*
Posted 4 days ago
5.0 - 9.0 years
8 - 14 Lacs
lucknow
Work from Office
Key Responsibilities: Splunk ITSI Implementation: Develop and configure IT Service Intelligence (ITSI) modules, including KPI creation, service trees, and notable event aggregation. SIEM Development: Design, implement, and optimize Splunk SIEM solutions for threat detection, security monitoring, and log analysis. Dashboard & Visualization: Create advanced dashboards, reports, and visualizations using Splunk SPL (Search Processing Language). Data Ingestion & Parsing: Develop data onboarding, parsing, and field extractions from various log sources, including cloud and on-prem infrastructure. Mandatory Key SkillsIT Service Intelligence,Data Ingestion,Splunk SPL,Splunk SIEM,SIEM Development,Splunk*
Posted 4 days ago
5.0 - 9.0 years
8 - 14 Lacs
ahmedabad
Work from Office
Key Responsibilities: Splunk ITSI Implementation: Develop and configure IT Service Intelligence (ITSI) modules, including KPI creation, service trees, and notable event aggregation. SIEM Development: Design, implement, and optimize Splunk SIEM solutions for threat detection, security monitoring, and log analysis. Dashboard & Visualization: Create advanced dashboards, reports, and visualizations using Splunk SPL (Search Processing Language). Data Ingestion & Parsing: Develop data onboarding, parsing, and field extractions from various log sources, including cloud and on-prem infrastructure. Mandatory Key SkillsITSI,SIEM,SIEM Development,Splunk SPL,Splunk ITSI Implementation,Splunk*
Posted 4 days ago
5.0 - 9.0 years
8 - 14 Lacs
coimbatore
Work from Office
Key Responsibilities: Splunk ITSI Implementation: Develop and configure IT Service Intelligence (ITSI) modules, including KPI creation, service trees, and notable event aggregation. SIEM Development: Design, implement, and optimize Splunk SIEM solutions for threat detection, security monitoring, and log analysis. Dashboard & Visualization: Create advanced dashboards, reports, and visualizations using Splunk SPL (Search Processing Language). Data Ingestion & Parsing: Develop data onboarding, parsing, and field extractions from various log sources, including cloud and on-prem infrastructure. Mandatory Key SkillsSplunk ITSI Implementation,IT Service Intelligence,SIEM Development,Search Processing Language,Data Ingestion,Splunk*
Posted 4 days ago
3.0 - 8.0 years
0 - 1 Lacs
hyderabad
Hybrid
Job Description: Splunk SIEM Specialist Position Overview We are seeking an experienced Splunk SIEM Specialist to lead and support end-to-end SIEM solution activities, including migrations, implementations, onboarding, normalization, content development, troubleshooting, platform management, and optimization. The ideal candidate will have deep expertise in Splunk administration and a strong background in security operations, log management, and use case development. Key Responsibilities SIEM Migration & Implementation Lead and execute SIEM solution migrations, including planning, data transfer, and validation. Implement and configure Splunk SIEM solutions tailored to organizational security requirements. Log Onboarding & Normalization Onboard diverse log sources into Splunk, ensuring data is parsed and normalized according to the Common Information Model (CIM). Develop and maintain data models, field extractions, and event parsing logic. Content Development & Tuning Design, develop, and tune detection rules, correlation searches, dashboards, and alerts. Continuously optimize content to reduce false positives and improve detection accuracy. Troubleshooting & Platform Management Diagnose and resolve issues related to log ingestion, parsing, and platform performance. Monitor and maintain the health, availability, and scalability of the Splunk environment. SIEM Optimization & Administration Perform regular platform optimization, including indexing, storage management, and search performance tuning. Administer Splunk components (indexers, search heads, forwarders, etc.) and manage upgrades/patches. Deployment & Solution Delivery Deploy and configure Splunk SIEM solutions in both on-premises and cloud environments. Collaborate with stakeholders to ensure successful delivery of security monitoring capabilities. Gap Analysis & Use Case Development Conduct log source and use case gap analysis to identify coverage gaps and recommend enhancements. Work with security teams to develop new use cases aligned with evolving threat landscapes. Required Skills & Qualifications 3+ years of hands-on experience with Splunk SIEM (Enterprise Security preferred). Strong understanding of SIEM concepts, log management, and security operations. Proficiency in log source onboarding, parsing, and CIM compliance. Experience in content development (correlation rules, dashboards, alerts) and tuning. Solid troubleshooting skills for both Splunk platform and security content. Experience with Splunk administration, deployment, and health monitoring. Familiarity with SIEM optimization techniques and best practices. Ability to conduct gap analysis and develop actionable recommendations. Excellent communication and documentation skills. Relevant certifications (e.g., Splunk Certified Admin, Splunk Enterprise Admin, Splunk Certified Architect) are a plus. Preferred Experience Strong Knowledge in Security concepts Experience with cloud-based SIEM deployments (AWS, Azure, GCP). Knowledge of scripting languages (Python, Bash) for automation. Exposure to other SIEM platforms (QRadar, Sentinel, SecOps, XSIAM, etc.) is advantageous.
Posted 4 days ago
8.0 - 13.0 years
13 - 17 Lacs
gurugram
Work from Office
About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and transitioning to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud security challenges. Roles & Responsibilities:1. Must have experience in Splunk Cluster deployment2. Must have experience in managing Splunk configuration files3. Must have experience with Splunk Enterprise Security knowledge with respect to Use case development/correlation search4. Good to have knowledge on Splunk Cloud5. Must have experience with Splunk knowledge objects like - Lookups, pivot, macro etc.6. Expert in SPL commands7. Troubleshooting knowledge related Splunk platform and application issues8. Have Good understanding about Linux commands 9. Should be familiar with regular expressions10. Good to have scripting knowledge on shell, Powershell, python11. Overall IT infrastructure knowledge is must to support this role12. Good to have knowledge of any Cloud platform, ansible, Jenkins.13. Should have People Management Skills14. Must be Well-versed with-it Service Management Process15. Must have experience in configuring and manage data ingestion from various sources.16. Design and develop custom dashboards, reports, and visualizations, to provide insights and analytics. 17. Optimize Splunk platform performance, scalability and reliability.18. Good to have knowledge on custom App Development19. Manage Splunk environment upgrades, patches and maintenance. Professional & Technical Skills: - Must To Have Skills: Proficiency in Splunk SIEM. Tool Proficiency- Splunk- Strong understanding of cloud security principles and practices.- Experience with security compliance frameworks such as ISO 27001 or NIST.- Familiarity with incident response and threat management processes.- Knowledge of network security protocols and technologies. Additional Information:- The candidate should have minimum 5 years of experience in Security Information and Event Management (SIEM).- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 week ago
8.0 - 13.0 years
13 - 17 Lacs
gurugram
Work from Office
About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting the implementation of cloud security controls, and transitioning to cloud security-managed operations. You will engage in discussions to refine security strategies and ensure compliance with industry standards, all while adapting to the evolving landscape of cloud security challenges. Roles & Responsibilities:1. Must have experience in Splunk Cluster deployment2. Must have experience in managing Splunk configuration files3. Must have experience with Splunk Enterprise Security knowledge with respect to Use case development/correlation search4. Good to have knowledge on Splunk Cloud5. Must have experience with Splunk knowledge objects like - Lookups, pivot, macro etc.6. Expert in SPL commands7. Troubleshooting knowledge related Splunk platform and application issues8. Have Good understanding about Linux commands 9. Should be familiar with regular expressions10. Good to have scripting knowledge on shell, Powershell, python11. Overall IT infrastructure knowledge is must to support this role12. Good to have knowledge of any Cloud platform, ansible, Jenkins.13. Should have People Management Skills14. Must be Well-versed with-it Service Management Process15. Must have experience in configuring and manage data ingestion from various sources.16. Design and develop custom dashboards, reports, and visualizations, to provide insights and analytics. 17. Optimize Splunk platform performance, scalability and reliability.18. Good to have knowledge on custom App Development19. Manage Splunk environment upgrades, patches and maintenance. Professional & Technical Skills: - Must To Have Skills: Proficiency in Splunk SIEM. Tool Proficiency - Splunk- Strong understanding of cloud security principles and practices.- Experience with security compliance frameworks such as ISO 27001 or NIST.- Familiarity with incident response and threat management processes.- Knowledge of network security protocols and technologies. Additional Information:- The candidate should have minimum 5 years of experience in Security Information and Event Management (SIEM).- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 week ago
15.0 - 20.0 years
13 - 17 Lacs
bengaluru
Work from Office
About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Level 2 SOC Analyst, your role involves deeper investigation of security alerts and confirmed incidents. You will validate escalated events using Sentinal One and Splunk SIEM, enrich them with context, and work closely with L3 analysts to assist in containment and timely remediation. You will also assist in improving detection fidelity and supporting SOAR automation. This role requires deep expertise in detection, investigation, containment, and remediation, as well as collaboration with multiple teams across security, IT, and compliance. Roles & Responsibilities:- Investigate alerts escalated by L1 to determine scope, impact, and root cause- Perform in-depth endpoint and network triage using Sentinel One- Use Sentinel One to perform endpoint analysis and threat validation- Correlate multiple log sources in Splunk to trace attacker activity- Execute or verify SOAR playbooks for containment actions (isolate host, disable user)- Enrich events with asset, identity, and threat intelligence context- Document investigation workflows, evidence, and final conclusions- Support L3 during major incidents by performing log or memory triage- Suggest improvements in alert logic or SOAR workflow to reduce false positives- Conduct threat research aligned to alert patterns and business context- Enhance alert fidelity with threat intel and historical context- Document investigation findings and communicate with stakeholders Professional & Technical Skills: - Sentinal One:Custom detections, forensic triage, threat graphs- Splunk SIEM (core + ES module):Searching Logs, Monitoring and investigating alerts.- Alert Triage & Investigation:Experience investigating escalated alerts using SIEM or EDR- Incident Response and Containment:Take necessary actions to contain, eradicate and recover from security incidents.- Identify opportunities for automation and work with SIEM Platform Support team for implementing it.- EDR Deep Dive:Using Real Time Response (RTR), Threat Graph, custom IOA rules- Proficiency in writing SPL queries, dashboards and providing fine tuning opportunities- Threat Hunting:Behavior-based detection using TTPs- Good understanding of malware, lateral movement, privilege escalation, and exfiltration patterns- Threat Intel Integration:Automation of IOC lookups and enrichment flows- Forensic Skills: Live host forensics, log correlation, malware behavioral analysis- Good experience in advanced threat detection and incident response- Proficiency in Sentinal One forensic and incident response capabilities- Playbook Development/Updation:Able to define, update, and optimize IR playbooks and workflows- Forensic analysis (memory, file systems, logs)- Cloud incident handling (AWS, Azure)- Dashboarding:Advanced visualizations and business-focused metrics in Splunk- Certifications:Splunk Certified Admin/ES Admin, SC-200, Sentinal One EDR vendor training - Incident Response and SIEM Additional Information:- The candidate should have minimum 4+ years in SOC/IR including 2+ in IR L2 role. Experience in 24x7 environments, shift-based operations, or critical infrastructure response- This position is based at our Bengaluru office.- A 15 years full time education is required.- Bachelors in IT/Cybersecurity + advanced certifications (CISSP), Splunk Certified Admin/ES admin, EDR Certification (like Sentinal One) etc. Qualification 15 years full time education
Posted 1 week ago
8.0 - 13.0 years
9 - 21 Lacs
hyderabad
Work from Office
Responsibilities: * Monitor network activity using SIEM tools like Splunk and QRadar. * Collaborate with incident response team on threat hunting initiatives. * Conduct regular security assessments and risk analysis.
Posted 2 weeks ago
7.0 - 11.0 years
0 Lacs
vadodara, gujarat
On-site
The L3 Network Security Operations Engineer plays a vital role within the Cybersecurity team at Wipro Limited. This position involves a blend of operational excellence and driving forward-looking engineering improvements. It is tailored for individuals with a solid background in network security operational experience and a proven history of engineering delivery. Key Responsibilities: - Offer L3 Operational Support for intricate operational issues, troubleshoot, and resolve them promptly. - Design, configure, and manage advanced network security solutions, such as Firewalls, Zero Trust Network Access (ZTNA), Secure Web Gateways (SWGs), and Cloud Network Security capabilities. - Continuously enhance support methodologies, standardize operational practices, and develop detailed documentation. - Utilize infrastructure-as-code (IaC) and automation techniques, particularly Terraform, to streamline the provisioning, configuration, and management of network security tools and environments. - Conduct thorough analyses of network traffic patterns and security logs using SIEM tools like Splunk. - Support Network Security Infrastructure with a focus on patch and lifecycle management. Qualifications: - Minimum of 7 years of hands-on experience in Network Security Operations with a significant emphasis on engineering enhancements. - Proficiency with Zscaler ZIA & ZPA, Palo Alto Firewalls. - Preferred exposure to Cloudgenix (SD-WAN), Cloudflare (WAF), Forescout (NAC), and Tufin/Algosec (Firewall Orchestration). - Hands-on experience with public cloud providers (preferably AWS) and cloud infrastructure management. - Familiarity with infrastructure-as-code frameworks like Terraform Cloud. - Ability to write automation scripts and web services (Python, Bash). - Strong understanding of network protocols and information security best practices. - Experience with git source control and CI/CD systems like GitLab CI/CD. - Good grasp of enterprise architecture encompassing endpoint, network, and cloud-based systems. Soft Skills: - Excellent communication skills, capable of explaining technical concepts to non-technical stakeholders and collaborating effectively with cross-functional teams. - Strong analytical, problem-solving, documentation, and organizational skills. - Ability to self-organize, prioritize activities independently, and manage uncertainty efficiently. - Proficiency in managing stakeholder expectations during project deliveries. - Adaptability and continuous learning with a proactive attitude towards self-education and flexibility to adjust strategies based on new information or changing environments. - Attention to detail, adept at reviewing configurations and policies to identify gaps in solution designs before implementation. Performance Parameters: 1. Customer Centricity: Ensuring timely security breach solutions to end-users, internal stakeholders & external customers" experience, CSAT, educating customers on the right controls. 2. Supporting sales team to create wins: Percentage of proposals with Quality Index >7, timely support of proposals, identifying opportunities/leads to sell services within/outside the account, number of proposals led. Join Wipro, a business driven by purpose and reinvention, and realize your ambitions in a forward-thinking environment. Applications from individuals with disabilities are warmly welcomed.,
Posted 2 weeks ago
5.0 - 8.0 years
15 - 22 Lacs
jaipur, bengaluru
Work from Office
Monitor security events, logs, and alerts in real-time. • Perform initial investigation, triage, and assessment of alerts to detect suspicious activities by accessing security solutions consoles. • Log and track cybersecurity incidents
Posted 3 weeks ago
4.0 - 8.0 years
0 Lacs
haryana
On-site
You will provide tier two operational support, leading team efforts in resolution of incidents and outages for information security technology and its dependencies on Public and Private Cloud computing environments, shared platforms, and operating systems for more than three of the following technologies: Malware Analysis, SIEM (Splunk), Software-defined (Cloud) Network Security, Endpoint Security Protection, and Data Loss Prevention. You will ensure the team's adherence to SOPs, training, and performance monitoring for team members, and continuous process improvement for efficiency, including automation, wherever applicable. You will conduct recurring assessments of all the key SOC workflows to highlight process deficiencies as well as improvement opportunities for staff. Additionally, you will partner with other technology teams in handling and responding to internal customer issues, conducting problem analysis, providing solutions for service level improvements, and ensuring timely remediation of security issues in accordance with corporate policies and standards. You will execute daily security technology administration functions, perform Root Cause Analysis (RCA) on applicable technology, validate the quality of dashboards and alerts, and suggest updates to reflect new threats and changes in the monitored environment. Furthermore, you will support the Security Operations team in its efforts on various technology projects and operational initiatives, work as a part of a team to ensure that Guardian customers" data, technology platforms, and infrastructure are available and safeguarded from cyber threats. You will follow ITIL practices regarding incident, problem, and change management, stay up to date with emerging cyber threats, industry best practices, and applicable regulatory requirements. Required Qualifications: - Being curious and having a desire to analyze anomalies - Desire and passion to learn and grow in Cybersecurity - Customer-focused demeanor - Minimum 4-6 years of proven experience in building and operating security controls in at least two of the following domains: Network/Perimeter Security, Enterprise Endpoint Security, DLP and Secure Data Transmission, Storage, and Access, Identity and Access Management / User Behavior Analytics - Understanding of security architecture, operating, and troubleshooting principles of Microsoft Windows and Linux operating systems - Strong experience in SIEM management, Endpoint security, Security incident handling, Data Loss Prevention, Threat intelligence, Team management, Documentation, Collaboration, and Continuous improvement - Bachelor's degree in computer science or a related field, along with relevant certifications such as CISSP, CISM, or CEH - Strong leadership skills, analytical skills, attention to detail, and the ability to work well under pressure - Ability to effectively work in a team and as an independent contributor on select projects Preferred Qualifications: - Recognized Security Industry and Public Cloud IaaS certifications - Familiarity with security industry standards and best practices - Familiarity with ITIL; experience with incident, problem, change, and risk management Location: This position can be based in Gurgaon.,
Posted 2 months ago
10.0 - 12.0 years
15 - 20 Lacs
Pune, Bengaluru
Work from Office
Experience: 10+ years Summary :We are seeking a highly skilled and proactive SOC Lead to manage and mature our 24x7 Security Operations Center. This role involves leading a team of 15 analysts (L1L3), supporting multiple customer environments, and driving operational excellence in threat detection, incident response, and SOC process improvement. The ideal candidate will have deep technical expertise in SIEM and EDR tools, strong leadership capabilities, and excellent communication skills. Key Responsibilities: Lead and manage a team of 15-20 SOC analysts (L1, L2, L3) across multiple customer environments.Act as the primary Incident Responder for critical security incidents.Conduct Root Cause Analysis (RCA) and develop Corrective and Preventive Actions (CAPA).Mentor and train junior/fresher SOC analysts to prepare them for advanced roles.Support and co-lead SIEM migration projects in collaboration with SIEM Engineers.Configure and fine-tune SIEM rules and use cases for enhanced threat detection.Integrate and troubleshoot log sources across diverse platforms and environments.Generate and present SOC KPIs and metrics to internal stakeholders and customers.Lead technical tabletop exercises with internal teams and customer stakeholders.Support SOC maturity assessments and contribute to continuous improvement initiatives.Maintain and enhance SOC documentation, playbooks, and standard operating procedures.Collaborate with threat intelligence, vulnerability management, and engineering teams. Required Skills Experience: 10+ years of experience in cybersecurity, with at least 4 years in a SOC leadership role.Proven experience managing multi-tenant or MSSP environments. Hands-on expertise with: SIEMs: QRoC, Sumo Logic, Splunk, Palo Alto SIEMEDR Tools: CrowdStrike, SentinelOneStrong knowledge of: SIEM rule creation and use case developmentLog source onboarding, integration, and troubleshootingIncident response lifecycle and threat detection methodologiesExcellent communication and writing skills; ability to present to customers and executives.Experience in producing and interpreting SOC metrics and dashboards.Familiarity with frameworks such as MITRE ATTCK, NIST, and SANS. Preferred Qualifications:Bachelors degree in computer science, Information Security, or related field.Industry certifications such as CISSP, CISM, GCIA, GCIH, CEH, or equivalent. Experience with scripting (Python, PowerShell) for automation and enrichment. Exposure to cloud security monitoring (AWS, Azure, GCP). Work Environment: Require on-call availability and rotational shifts.
Posted 2 months ago
3.0 - 7.0 years
0 Lacs
haryana
On-site
You will be providing tier two operational support and leading team efforts in resolving incidents and outages for information security technology and its dependencies on Public and Private Cloud computing environments, shared platforms, and operating systems for more than three of the following technologies: Malware Analysis, SIEM (Splunk), Software-defined (Cloud) Network Security, Endpoint Security Protection, and Data Loss Prevention. Your responsibilities will include ensuring the team's adherence to SOPs, providing training and performance monitoring for team members, and focusing on continuous process improvement for efficiency, including automation wherever applicable. You will also be conducting recurring assessments of all key SOC workflows to identify process deficiencies and improvement opportunities for staff. Additionally, you will be partnering with other technology teams to handle and respond to internal customer issues, conducting problem analysis, providing solutions for service level improvements, and ensuring timely remediation of security issues in accordance with corporate policies and standards. You will execute daily security technology administration functions, perform Root Cause Analysis (RCA) on applicable technology, and validate the quality of dashboards and alerts to suggest updates reflecting new threats and changes in the monitored environment. Furthermore, you will be supporting the Security Operations team in various technology projects and operational initiatives, working as part of a team to ensure that Guardian customers" data, technology platforms, and infrastructure are available and safeguarded from cyber threats. You will follow ITIL practices regarding incident, problem, and change management and stay up to date with emerging cyber threats, industry best practices, and applicable regulatory requirements. Required qualifications for this role include being curious and having a desire to analyze anomalies, a passion for learning and growing in Cybersecurity, a customer-focused demeanor, and a minimum of 3 years of proven experience in building and operating security controls in at least two of the specified domains. You should also have an understanding of security architecture, operating and troubleshooting principles of Microsoft Windows and Linux operating systems, as well as experience in SIEM management, endpoint security, security incident handling, data loss prevention, and threat intelligence. Preferred qualifications include recognized Security Industry and Public Cloud IaaS certifications, familiarity with security industry standards and best practices, and experience with ITIL and incident, problem, change, and risk management. This position can be based in Chennai or Gurgaon.,
Posted 2 months ago
2.0 - 7.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Diverse Lynx is looking for Splunk Developer to join our dynamic team and embark on a rewarding career journey A Splunk Developer is responsible for designing, implementing, and maintaining Splunk-based solutions to collect, analyze, and visualize machine-generated data for various operational and security purposes They work closely with stakeholders to understand data requirements, develop data ingestion processes, create dashboards and reports, and automate data analysis workflows Splunk Developers also collaborate with cross-functional teams to ensure optimal performance, scalability, and security of Splunk deployments Key Responsibilities:Collaborate with stakeholders to understand data requirements, use cases, and objectives for Splunk deployments Design and implement data ingestion processes, including data collection, parsing, normalization, and indexing in Splunk Develop custom Splunk queries, search strings, and data models to extract meaningful insights from machine-generated data Create interactive dashboards, reports, and visualizations using Splunk's search processing language (SPL) and visualization tools Implement and maintain Splunk apps, add-ons, and configurations to support specific use cases or data sources Automate data analysis workflows and alerting mechanisms to identify and respond to critical events and anomalies Optimize Splunk deployments for performance, scalability, and search efficiency Monitor and troubleshoot Splunk infrastructure and resolve issues related to data ingestion, search performance, and system availability Collaborate with security and operations teams to develop and implement Splunk-based security monitoring, log analysis, and incident response solutions Ensure data privacy and security by implementing access controls, data encryption, and compliance with relevant regulations Stay updated with Splunk product releases, new features, and best practices to recommend and implement improvements in Splunk deployments Provide training and support to end-users on utilizing Splunk for data analysis and visualization
Posted 2 months ago
8.0 - 13.0 years
3 - 7 Lacs
Pune
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Splunk Security Information and Event Management (SIEM), Splunk Administration, Splunk Enterprise Security, Splunk Phantom Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Splunk Engineer, you will be working within the Security Engineering & Technology Services team, responsible for understanding, researching, designing, developing, operating, and enhancing security solutions with the products client has acquired for consumption as a service offering across all of client. You will collaborate with Security Operations (mainly Cyber) teams to support in implementation of new technical solutions, on-board new data into Splunk and develop use cases to meet the business requirements Roles & Responsibilities:Building, maintaining, and operating Splunk Enterprise and Splunk Enterprise Security SaaS SolutionBuilding Co-relation searches for Cyber Operation requirementsEvaluating and analysing business requirements and designing suitable solutions, challenging requirements where necessary Managing, co-ordinating and implementing technical project activities and enhancements to services Conducting Incident/ Problem/ Recovery activities Supporting the Joint Operations Centre and incident response teams for detected security events. Creating and maintaining accurate and high-quality documentation Supporting Operational effectiveness auditStructure phased deliverables to link long term vision with time-boxed activities.Support the project delivery phase including testing and training, to ensure the agreed business solutions are delivered successfully.Work closely with developers and testers, to ensure delivery of the functionality on time and with quality. Professional & Technical Skills: Knowledge of Splunk Enterprise architecture, distributed components (indexer clusters, forwarders, search head clusters, deployment servers) , knowledge of Splunk Cloud & SOARKnowledge of Splunk Enterprise Security at administration and use case level Knowledge on on-boarding new data into Splunk, Splunk Forwarders - data ingestion, extraction.Knowledge of the Common Information Model, data models, enrichment, and automationGood experience on Splunk add-Ons installation / configuration to bring security logs into Splunk.Good understanding of the Security Domain.Documentation skills in order to provide high quality documentation for internal customers and technical teams. Additional Information:- The candidate should have a minimum of 8+ years of experience in Security Information and Event Management (SIEM) with 5+ yrs experience on Splunk SIEM.- The ideal candidate will possess a strong educational background in computer science, information technology, or a related field, along with a proven track record of delivering impactful security solutions.- This position is based at our Pune office with flexible locations as banglore and Chennai. Qualification 15 years full time education
Posted 3 months ago
5.0 - 10.0 years
7 - 12 Lacs
Coimbatore
Work from Office
Project Role :Application Tech Support Practitioner Project Role Description :Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills :Splunk Administration Good to have skills :NA Minimum 5 year(s) of experience is required Educational Qualification :a 15 years of full time education Summary:As an Application Tech Support Practitioner, you will be responsible for providing ongoing support to clients and ensuring the smooth functioning of systems and applications. Your typical day will involve interfacing with clients, accurately defining and resolving issues, and utilizing your expertise in Splunk Administration and UNIX Shell Scripting. Roles & Responsibilities: Act as the primary point of contact for clients, providing ongoing support and ensuring the smooth functioning of systems and applications. Accurately define client issues and interpret and design resolutions based on deep product knowledge. Utilize your expertise in Splunk Administration and UNIX Shell Scripting to troubleshoot and resolve technical issues. Collaborate with cross-functional teams to identify and resolve complex technical issues, utilizing exceptional communication skills to keep systems running smoothly. Stay updated with the latest advancements in technology and apply innovative approaches for sustained competitive advantage. Professional & Technical Skills: Must To Have Skills:Expertise in Splunk Administration. Good To Have Skills:UNIX Shell Scripting. Strong understanding of system and application support, with a proven track record of delivering impactful solutions. Exceptional communication skills, with the ability to accurately define and interpret client issues. Solid grasp of troubleshooting and problem-solving techniques. Ability to collaborate effectively with cross-functional teams. Must have Skills :Splunk AdministrationGood to Have Skills :UNIX Shell ScriptingKey Responsibilities :a:Standardized Splunk agent deployment, configuration and maintenance across a variety of UNIX and Windows platforms b:Experience with Splunk Searching and Reporting, Knowledge Objects administration, Clustering and Forwarder Management c:Support Splunk on Unix, Linux and Windows-based platforms Technical Experience :a:At least 5 years of experience in IT with minimum 3 years in Splunk b:Skills in technical areas which support the deployment and integration of Splunk based solutions, Splunk Apps and Add-ons for monitoring and data integrations- including Infrastructure, Network, OS, DB, Middleware, Storage; Virtualization, Cloud Architectures etc, c:Good to have knowledge on Java scripting, Python, shell scripting-based development Professional Attributes :a:Excellent customer facing skills b:Experience working with a global team c:Strong analytical and problem-solving skills Educational Qualification:a:15 years of full time educationAdditional Info :a:Good verbal and written communication skill Qualifications a 15 years of full time education
Posted 3 months ago
5.0 - 10.0 years
7 - 12 Lacs
Bengaluru
Work from Office
Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Splunk Administration Good to have skills : Splunk Enterprise Architecture and Design Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Tech Support Practitioner, you will act as the ongoing interface between the client and the system or application. You will be dedicated to quality, using exceptional communication skills to keep our world-class systems running. With your deep product knowledge, you will accurately define a client issue and interpret and design a resolution. Your typical day will involve providing ongoing support to clients, troubleshooting issues, and ensuring the smooth functioning of the system or application. Roles & Responsibilities: Expected to be an SME, collaborate and manage the team to perform. Responsible for team decisions. Engage with multiple teams and contribute on key decisions. Provide solutions to problems for their immediate team and across multiple teams. Ensure effective communication with clients to understand their issues and provide timely resolutions. Troubleshoot and resolve technical issues related to the system or application. Collaborate with cross-functional teams to identify and implement improvements to enhance system performance. Stay updated with the latest industry trends and technologies to provide proactive support and recommendations. Professional & Technical Skills: Must To Have Skills:Proficiency in Splunk Administration. Good To Have Skills:Experience with Splunk Enterprise Architecture and Design. Strong understanding of system and application support principles. Experience in troubleshooting and resolving technical issues. Knowledge of ITIL processes and best practices. Excellent communication and interpersonal skills to effectively interact with clients and cross-functional teams. Additional Information: The candidate should have a minimum of 5 years of experience in Splunk Administration. This position is based at our Bengaluru office. A 15 years full-time education is required. Qualifications 15 years full time education
Posted 3 months ago
5.0 - 10.0 years
7 - 12 Lacs
Coimbatore
Work from Office
Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Splunk Administration Good to have skills : UNIX Shell Scripting Minimum 5 year(s) of experience is required Educational Qualification : a 15 years of full time education Summary :As an Application Tech Support Practitioner, you will be responsible for providing ongoing support to clients and ensuring the smooth functioning of systems and applications. Your typical day will involve interfacing with clients, accurately defining and resolving issues, and utilizing your expertise in Splunk Administration and UNIX Shell Scripting. Roles & Responsibilities: Act as the primary point of contact for clients, providing ongoing support and ensuring the smooth functioning of systems and applications. Accurately define client issues and interpret and design resolutions based on deep product knowledge. Utilize your expertise in Splunk Administration and UNIX Shell Scripting to troubleshoot and resolve technical issues. Collaborate with cross-functional teams to identify and resolve complex technical issues, utilizing exceptional communication skills to keep systems running smoothly. Stay updated with the latest advancements in technology and apply innovative approaches for sustained competitive advantage. Professional & Technical Skills: Must To Have Skills:Expertise in Splunk Administration. Good To Have Skills:UNIX Shell Scripting. Strong understanding of system and application support, with a proven track record of delivering impactful solutions. Exceptional communication skills, with the ability to accurately define and interpret client issues. Solid grasp of troubleshooting and problem-solving techniques. Ability to collaborate effectively with cross-functional teams. Must have Skills :Splunk AdministrationGood to Have Skills :UNIX Shell ScriptingKey Responsibilities :a:Standardized Splunk agent deployment, configuration and maintenance across a variety of UNIX and Windows platforms b:Experience with Splunk Searching and Reporting, Knowledge Objects administration, Clustering and Forwarder Management c:Support Splunk on Unix, Linux and Windows-based platforms Technical Experience :a:At least 5 years of experience in IT with minimum 3 years in Splunk b:Skills in technical areas which support the deployment and integration of Splunk based solutions, Splunk Apps and Add-ons for monitoring and data integrations- including Infrastructure, Network, OS, DB, Middleware, Storage; Virtualization, Cloud Architectures etc, c:Good to have knowledge on Java scripting, Python, shell scripting-based development Professional Attributes :a:Excellent customer facing skills b:Experience working with a global team c:Strong analytical and problem-solving skills Educational Qualification:a:15 years of full time educationAdditional Info :a:Good verbal and written communication skill Qualifications a 15 years of full time education
Posted 3 months ago
4.0 - 5.0 years
6 - 7 Lacs
Karnataka
Work from Office
Implement and manage Splunk for monitoring and analyzing machine data to ensure system performance and security.
Posted 3 months ago
2.0 - 5.0 years
4 - 7 Lacs
Bengaluru
Work from Office
The Splunk Developer role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Splunk Developer domain.
Posted 3 months ago
2.0 - 5.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : Splunk Good to have skills : Splunk AdministrationMinimum 12 year(s) of experience is required Educational Qualification : BE Summary :As an Application Developer, you will design, build, and configure applications to meet business process and application requirements. Your typical day will involve collaborating with teams to develop innovative solutions and contribute to key decisions. Roles & Responsibilities:- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Engage with multiple teams and contribute on key decisions- Expected to provide solutions to problems that apply across multiple teams- Lead the application development process- Implement best practices for application design and development- Conduct code reviews and ensure code quality Professional & Technical Skills: - Must To Have Skills: Proficiency in Splunk- Strong understanding of Splunk Administration- Experience in designing and implementing Splunk solutions- Knowledge of data analytics and visualization tools- Familiarity with IT infrastructure and application development processes Additional Information:- The candidate should have a minimum of 12 years of experience in Splunk- This position is based at our Bengaluru office- A BE degree is required Qualification BE
Posted 3 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |