Jobs
Interviews

3 Soar Integration Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 7.0 years

0 Lacs

chennai, tamil nadu

On-site

You will be responsible for performing deep-dive investigations on security incidents using Securonix SIEM. Your role will involve correlating alerts and utilizing UEBA to detect anomalies and insider threats. Additionally, you will be expected to fine-tune detection rules to reduce false positives in Securonix and conduct threat hunting to identify unknown threats using behavioral analytics. Moreover, you will investigate security events such as ransomware, APTs, data exfiltration, and privilege escalations. Collaborating with L3 analysts, you will help develop playbooks and automation through SOAR integration. You will also provide guidance to L1 analysts and support security awareness training initiatives. Furthermore, your responsibilities will include generating reports on security trends and SOC performance to ensure effective monitoring and response to potential threats.,

Posted 1 month ago

Apply

7.0 - 12.0 years

9 - 14 Lacs

Chennai, Bengaluru

Work from Office

We are seeking an experienced Security Consultant with 710 years of deep technical expertise across AWS security practices, posture assessment, incident response, and automation in security environments. The ideal candidate will play a key role in advising on cloud security design, conducting risk assessments, and strengthening compliance and data protection mechanisms in cloud-native environments. #KeyResponsibilities Lead cloud security strategy and implementation for AWS-based applications Conduct Security Posture Assessments, identify gaps, and define risk prioritization plans Implement and manage AWS security controls: IAM (Identity & Access Management) Network Security & Logging Data Encryption & Secrets Management Ensure adherence to compliance frameworks (ISO 27001, NIST, CIS, etc.) Implement Data Loss Prevention (DLP), Data Masking/Obfuscation solutions Drive SIEM/SOAR integration for intelligent threat detection and response Develop and maintain Incident Response plans and coordinate response activities Conduct automated security scanning and integrate into DevSecOps pipelines Provide consultation and innovation around Agentic AI applications in security #Qualifications 7+ years of hands-on experience in cloud security, with a focus on AWS Deep knowledge of IAM, encryption, secrets management, and compliance frameworks Experience with SIEM/SOAR platforms, automated scanning tools, and AI-driven security solutions Strong documentation, communication, and stakeholder collaboration skills Ability to work independently in a remote team structure Location: Delhi NCR,Bangalore,Chennai,Pune,Kolkata,Ahmedabad,Mumbai,Hyderabad

Posted 1 month ago

Apply

4.0 - 7.0 years

12 - 22 Lacs

bengaluru, delhi / ncr, mumbai (all areas)

Work from Office

About the Role: We are seeking a highly skilled Detection Engineering Specialist to lead the migration and optimization of our detection logic and alerting infrastructure to a new SIEM platform. This role is critical to ensuring the integrity, performance, and effectiveness of our security monitoring capabilities during and after the transition. Key Responsibilities: Audit and document existing detection rules, use cases, and alert logic from the legacy SIEM. Rebuild or refactor detection rules using the native query language and capabilities of the new SIEM platform. Validate detection efficacy through rigorous testing and tuning. Ensure alert workflows, playbooks, and escalation paths are preserved or enhanced in the new environment. Collaborate with Incident Response (IR) teams to test and refine end-to-end alert triage and response processes. Integrate SOAR tools or automation pipelines to streamline detection and response. Map legacy SIEM data sources and detection logic to the new platforms architecture. Coordinate phased migration of log sources and detection content with minimal disruption. Monitor for gaps or failures in detection coverage during and after migration. Work closely with SOC, IR, and platform engineering teams to align detection strategies with operational needs. Maintain clear and comprehensive documentation of detection logic, migration steps, and validation results. Qualifications: Proven experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar, Elastic, etc.). Strong proficiency in detection engineering, including rule development and tuning. Familiarity with SOAR platforms and automation workflows. Experience in security operations, incident response, or threat detection. Excellent collaboration and communication skills. Strong documentation and process-tracking abilities. Preferred: Experience with large-scale SIEM migrations. Knowledge of MITRE ATT&CK framework and threat modeling. Scripting or automation experience (e.g., Python, PowerShell).

Posted Date not available

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies