Jobs
Interviews

2 Siem Utilization Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 6.0 years

0 Lacs

pune, maharashtra

On-site

As a Security Operations Analyst, your primary responsibility will be to triage security events for suspicious behavior, determine event severity, and document findings. You will also be conducting threat hunting exercises based on user behavior analytics and suspicious data movement. It will be your duty to prepare preliminary investigation reports and escalate security events to L2 security based on event criticality. Additionally, you will be expected to deliver daily verbal briefs on all critical and high severity incidents to IT engineering. Your tasks will include reviewing all alerts for VIPs and high-risk users, screening outbound emails for any company data, reviewing download/upload logs from sensitive data sources to identify potentially malicious behavior, and monitoring file transfers of abnormal size. To excel in this role, you should have experience in Cyber Security, the ability to work with a sense of urgency, a good understanding of cybersecurity and privacy principles, hands-on experience with SIEM utilization, familiarity with Platform and Endpoint DLP Tooling, and proficiency in eDiscovery tools. Join us at [Company Name] and be part of our dynamic team dedicated to ensuring the security and integrity of our systems.,

Posted 1 month ago

Apply

2.0 - 6.0 years

0 Lacs

pune, maharashtra

On-site

As a Security Analyst, you will be responsible for triaging security events to identify suspicious behavior, determining event severity, and documenting findings. You will also conduct threat hunting exercises utilizing user behavior analytics and monitoring data transfers. It will be your duty to prepare initial investigation reports and escalate security events to L2 security based on their criticality. Additionally, you will be delivering daily verbal briefs on critical and high severity incidents to the IT engineering team. Your role will involve reviewing alerts for VIPs and high-risk users, screening outbound emails for company data, examining download/upload logs from sensitive data sources for potentially malicious activities, as well as monitoring file transfers of abnormal size. To excel in this position, you should have experience in Cyber Security, possess a sense of urgency in your work, be well-versed in cybersecurity and privacy principles, have expertise in SIEM utilization, be familiar with Platform and Endpoint DLP Tooling, and have hands-on experience with eDiscovery tools. If you are passionate about cybersecurity, enjoy investigating security incidents, and have a strong background in threat detection and analysis, this role offers a challenging and rewarding opportunity to contribute to the organization's overall security posture.,

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies