Jobs
Interviews

482 Soar Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 13.0 years

13 - 17 Lacs

bengaluru

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals. Must have skills : Operational Technology (OT) Security Good to have skills : Network Security Implementation Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Senior IT/ OT Endpoint Security engineer, you will be focused to lead the design, implementation, and management of endpoint security controls across enterprise environments. You will play a crucial role in protecting critical assets such as Server Work stations, and ICS equipments. Roles & Responsibilities:-Lead the deployment, management, and optimization of endpoint security tools. (e.g., CrowdStrike, SentinelOne, Microsoft Defender for Endpoint, Trellix)-Monitor, detect, and respond to endpoint-related security incidents and vulnerabilities.-Using MITRE ATT&CK framework improve threat hunting.-Integrate EDR telemetry with SIEM/SOAR platforms and tune detection rules, policies, and behavioral indicators.-Perform real-time threat hunting and investigation using EDR consoles, log data, and forensic artifacts.-Implement host-based control policies, and privilege management solutions.-Monitor and analyze endpoint alerts, triage suspicious activity, and escalate incidents based on impact and severity.Professional & Technical Skills: -experience in endpoint security engineering or cybersecurity operations, with experience in OT/ICS environments will be added advantage. -Experience with endpoint security scripting and automation using Python, Powershell Or API.-Familiarity with industrial protocols and vendor protocols (Modbus, DNP3, OPC, etc.) is added advantage.-Working experience with Patch and Vulnerability Management of end point device with coordination with IT team. Additional Information:- The candidate should have minimum 5 years of experience in Operational Technology (OT) Security.- This position is based at our Pune office.- A 15 years full time education is required. Qualification 15 years full time education

Posted -1 days ago

Apply

0.0 - 3.0 years

6 - 10 Lacs

gurugram

Work from Office

This position on Third party and 1 year contract base. Role & responsibilities Experience Required : 0 to 3 years. Skills Needed: Basic understanding of IT/Network Security Good understanding of SIEM - Elastic, Palo Alto Cortex SOAR Intrusion Preventions Cyber Attack Vectors Linux/Windows OS DDoS, Malware, MDE Preferred Certifications: CEH, Security+, C|SA, CCNA Roles & Responsibilities: Security monitoring of Network/nodes/Services. Provides 1st level response & investigation. Investigate abnormal events, qualify potential security breaches, raise security incidents alerts, perform technical & management escalations. Implement mitigation actions in response to confirmed security incidents. Perform assigned CM activities. Incident Management. Perform vulnerability assessments. Liaison with other support groups. Palo Alto Networks Certified Network Security Engineer Contact: Interested candidates send resume on nitanalawadeoasis@gmail.com

Posted -1 days ago

Apply

15.0 - 20.0 years

20 - 32 Lacs

pune

Hybrid

Job Summary We are seeking a highly skilled Senior Manager - Security Operations and Identity Management is responsible for 24x7 security monitoring and the administration of identity management processes. This role includes overseeing the architectural design, deployment, execution, and optimization of solutions in alignment with risk requirements and compliance obligations. Responsibilities Ensure that SIEM and SOAR environments are fit for purpose and continually enhanced to cover known and emerging MITRE ATT&CK techniques Manage the global SOC team responsible for 24x7 alerting, triage, investigation and Incident Response. Monitor and improve Key Performance Indicators (KPIs) Track SOC Maturity and partner with CISO to establish road map for growing SOC capabilities and automation Manage the Cyber Threat Intelligence program Oversee forensics, litigation support, and e-discovery capabilities in support of requests from Legal Lead the team responsible for identity lifecycle functions, identifying and implementing best practices to automate repetitive processes Oversee IAM architecture design, deployment and delivery of capabilities to achieve target levels of cyber maturity and efficiency, working with vendors, partners and other 3rd parties Ensure compliance with required regulations and frameworks across all divisions and markets, driving timely remediation of any IAM deficiencies Other duties as assigned Qualifications Bachelor’s degree in information technology, engineering, business management, operations management, or related field or discipline 15+ years’ experience in cyber security with 3+ years in a management role Solid understanding of IAM principles, design and engineering, including Single sign-on (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM) Working knowledge of multiple IAM systems (traditional and cloud) Experience implementing Zero Trust capabilities in complex operating environments Security certifications (CISSP, CISM, GCIH, GSEC, etc) Experience with modern cloud detection and response tools and processes Operational Technology (OT) experience

Posted -1 days ago

Apply

5.0 - 7.0 years

4 - 9 Lacs

thane, navi mumbai, mumbai (all areas)

Work from Office

Position - MS Defender - Endpoint (MDE) Specialist Job location :- Ghansoli Shift:- Rotational shift We are seeking a highly skilled and experienced L3 for handling EDR operations to our dynamic security team. The Ideal candidate will play a key role in advance threat detection, Incident response and responding to critical security incident and enhancing our endpoint security capabilities with EDR tools. Roles & Responsibilities Investigate and analyse sophisticated security alerts and events to determine root cause, scope and impact of security incidents. Provide technical expertise and guidance to junior analysts (L1, L2s), assisting with incident investigations, analysis and resolution. Develop and implement advanced detection and response strategies using Carbon Black EDR to enhance our overall security posture. Lead incident response efforts, including coordination with cross-functional teams and external stakeholders. Conduct in-depth analysis of endpoint data and logs to identify indicators of compromise (IOCs) and advanced attack techniques. Collaborate with threat intelligence teams to stay updated on emerging threats and tactics used by threat actors. Develop and maintain security playbooks, procedures and response plans for incident response and threat hunting. Assist in the tuning and optimization of Carbon Black EDR policies, SIEM rules and custom queries to improve detection efficacy. Stay abreast of industry best practices, emerging technologies and trends in endpoint security and threat detection. Provide regular reports and updates on security incident trends, analysis findings and mitigation efforts to stakeholders. Personal & TECH Skills: Good Team player. Possess Positive and learning attitude. Good Verbal and Written communication skills. Sense of Ownership, Priorities and Autonomous. At least one technical certification required (CEH, CompTIA Security+, CBCA, CSA etc.) Should have at least one cyber security certification (CISM, CCIR, ECSA, GCIH etc) Knowledge of banking business and information technology practices and trends in banking sector. Understanding of technology-related issues and how they might impact business; Ability to communicate effectively, both orally and in writing. Knowledge of banking business and information technology practices and trends in banking sector. Qualifications Graduation/Post graduation in, Computers, Information Systems, Computer Science, or Information. technology systems Experience:- Relavant 5 - 7 years of work experience of MS Defender in cyber security /Information security project, with skills including SIEM,SOAR, Endpoint Detection work experience with security posture. Assessment. Interested candidate can share our updated cv in mgs.rec@mizuho-cb.com if above details are matching to your current role. Preferred Candidates From Mumbai under 20 Kilometers Mizuho Global Services India Pvt. Ltd. 11th Floor, Q2 Building Aurum Q Park,Gen 4/1, Ttc,Thane Belapur Road ,MIDC Industrial Area, Ghansoli, Navi Mumbai- 400710.

Posted 1 day ago

Apply

8.0 - 10.0 years

7 - 11 Lacs

pune

Work from Office

analyse, design, engineer, deploy and maintain global Cyber Security systems work closely with Project Managers, Technical Architects, 2nd level support, and IT Business Analysts provide technical consultancy to the project team maintain technical documentation relevant to operations (operational manual, installation guide, etc.) Job Requirement Excellent knowledge of Red Hat Linux environments in a large enterprise BASH scripting and Python programming skills (or equivalent programming experience) Skills to design, plan and deliver solutions in a large-scale enterprise environment Experience with change control using Git Fluency in English Technical communication and documentation skills Experience with Microsoft Azure system development Experience working in a large organization a plus Experience with a SOAR, SIEM and/or incident management systems a plus

Posted 2 days ago

Apply

2.0 - 4.0 years

2 - 4 Lacs

mumbai

Work from Office

About The Role Minimum 2-4 years of experience in Security Operations Centre Experience across SOC domains use case creation, incident management, threat hunting, threat intelligence etc. Solid understanding of cyber security, network security, end point security concepts Good understanding of recent cyber threats, latest attack vectors Must have experience in any one SIEM (Splunk), EDR and SOAR solution Must have experience in leading/managing SOC shifts Experience in shift roster creation, resource management etc. Will be responsible for critical incident investigation, use case review, mentoring Shift Leads, SLA management etc.

Posted 2 days ago

Apply

2.0 - 4.0 years

2 - 4 Lacs

mumbai

Work from Office

About The Role Minimum 2-4 years of experience in Security Operations Centre Experience across SOC domains use case creation, incident management, threat hunting, threat intelligence etc. Solid understanding of cyber security, network security, end point security concepts Good understanding of recent cyber threats, latest attack vectors Must have experience in any one SIEM (Splunk), EDR and SOAR solution Must have experience in leading/managing SOC shifts Experience in shift roster creation, resource management etc. Will be responsible for critical incident investigation, use case review, mentoring Shift Leads, SLA management etc.

Posted 2 days ago

Apply

4.0 - 9.0 years

5 - 15 Lacs

chennai

Work from Office

Job Description: Configure, deploy, and maintain the organization's SIEM platform to ensure optimal performance and functionality. Develop and customize SIEM rules, filters, and alerts to meet specific security monitoring and compliance requirements. Collaborate with IT teams to onboard new data sources and integrate logs into the SIEM platform for comprehensive threat detection. Generate and present regular and ad-hoc reports on SIEM performance, security incidents, and compliance status to stakeholders and management. Stay updated on emerging cybersecurity threats, vulnerabilities, and industry best practices to enhance SIEM capabilities and proactive defense strategies. Participate in incident response activities, including incident simulations, tabletop exercises, and post-incident reviews. Provide guidance and training to junior team members and stakeholders on SIEM platform usage, capabilities, and best practices.

Posted 2 days ago

Apply

2.0 - 7.0 years

13 - 17 Lacs

pune

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Operational Technology (OT) Security Good to have skills : Endpoint Protection Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Senior IT/ OT Endpoint Security consultant, you will focus to lead the design, implementation, and management of endpoint security controls across enterprise /OT environments, will play a crucial role in protecting critical assets such as Server, Workstations, and ICS equipment. Roles and Responsibilities:-Lead the deployment, management, and optimization of endpoint security tools. (e.g., CrowdStrike, Sentinel One, Microsoft Defender for Endpoint, Trellix, Carbon Black, Symantec Endpoint Protection)-End to end platform management activities such as upgradation of servers and clients, signature updates and compliance, groups management, Access management etc. -Monitor, detect, and respond to endpoint-related security incidents and vulnerabilities.-Using MITRE ATT4CK framework improve threat hunting.-Integrate EDR telemetry with SIEM/SOAR platforms and tune detection rules, policies, and behavioral indicators.-Perform real-time threat hunting and investigation using EDR consoles, log data, and forensic artifacts.-Implement host-based control policies, and privilege management solutions.-Monitor and analyze endpoint alerts, triage suspicious activity, and escalate incidents based on impact and severity.Professional and Technical Skills: - Over 8 years of experience in deploying or managing large-scale endpoint security, with at least 2+ years in OT/ICS environment. -Experience in multi-vendor Endpoint Protection tools - CrowdStrike, Microsoft Defender for Endpoint, Carbon Black etc.- Certifications on the vendor products will be added advantage -Experience with endpoint security scripting and automation using Python, PowerShell or API.-Familiarity with OT security and industrial protocols and vendor protocols (Modbus, DNP3, OPC, etc.) is added advantage.-Working experience with Patch and Vulnerability Management of end point device with coordination with IT team. Additional Information:- The candidate should have minimum 2 years of experience in Operational Technology (OT) Security.- This position is based at our Bengaluru office.- A 15-year full time education is required. Qualification 15 years full time education

Posted 2 days ago

Apply

8.0 - 13.0 years

3 - 7 Lacs

mumbai

Work from Office

About The Role Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Product Security Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :Client accelerates organizations ability to digitally transform their business with the best infrastructure, platform, industry solutions and expertise. We deliver enterprise-grade solutions that leverage cutting-edge technology all on the cleanest cloud in the industry. Role & Responsibilities:As a SOAR Engineer, you will be responsible for strategic delivery helping our customers securely adopt Google SecOps. You will provide best practices on secure build of Google SecOps platform, foundational cloud implementation for Google SecOps, tackle difficult problems that businesses are facing when building Google SecOps, and more. Candidates will provide prescriptive guidance in ensuring customers receive the best of what Google SecOps can offer and you will ensure that customers have the best experience in migrating, building, modernizing, and maintaining Google SecOps. Additionally, you will work closely with Product Management and Product Engineering to drive excellence of Google SecOps and features.Lead the design and implementation of Google SecOps SOAR playbooks for security use cases, such as phishing incident response, vulnerability triage, or threat hunting on Google SecOps based on specific threat models.Integration of Google SecOps SOAR with other security capabilities and tools such as SIEM, EDR, NDR threat intelligence platform, and ticketing systems.Design testing and conduct validation of SOAR playbooks before deployment to live environment.Write custom actions, scripts and/or integrations to extend SOAR platform functionality.Monitor performance and perform timely actions to scale SOAR deployment, especially in a high-volume security environment.Migration of existing assets from existing customers SIEM SOAR to SecOps and assisting in implementing the SIEM SOAR phase-out, phase-in approach.Develop SOAR playbooks to provide case handling and Incident response as per triage needsCreation of SOAR assets such as reports etc.Guide on building or maturing cloud security programs and the implementation of tools and approaches used for improving cloud security.Professional & Technical Skills: Google SecOps SOAR experience in the areas of responsibility for at least 1 yearCoding experience in one or more general purpose languages.Experience managing customer projects to completion, working with engineering teams, sales and partners.Experience architecting, developing, or maintaining secure Cloud solutions.Strong verbal and written communication skills and the ability to develop high-qualityExperience in Prevention, Detection and response to cyber threatsGoogle SecOps SIEM experience of 1 year in integration of log sources, extension of pre-built UDMs and creation of custom parsers, creation of dashboards, creation of custom rules using YARA-L 2.0 etc.Knowledge and experience in SOAR platformsKnowledge in GCP, including Google Cloud Professional Certifications Security, Architect and other industry certifications CISSP, CCSPExperience in security governance, security risk management, security operations, security architecture, and/or cyber incident response programs for cloud.Experience working with cloud architecture across a broad set of enterprise use cases and creating end-to-end solution architectures.Excellent organizational, problem-solving, articulating and influencing skills.Experience with industry compliance frameworks e.g., PCI-DSS, ISO 27017/27018, GDPR, SOC.Demonstrated experience on consulting or ownership of Security during high-speedenvironment migration for large-scale businesses with regulatory requirementsStrong verbal and written communication skills (English), and the ability to develop high-quality technical documentation and presentation materials. Additional Information:Bachelors degree in Computer Science, Engineering or related technical field or equivalent practical experience. 15 years of education is required.8+ years experience in leading projects and delivering technical solutions related to securityAbility to be located in Mumbai, India for at least 1 year Qualification 15 years full time education

Posted 2 days ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

mumbai

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Product Security Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :Client accelerates organizations ability to digitally transform their business with the best infrastructure, platform, industry solutions and expertise. We deliver enterprise-grade solutions that leverage cutting-edge technology all on the cleanest cloud in the industry. Role & Responsibilities:As a Google SecOps Platform Engineer, you will be responsible for strategic delivery helping our customers securely adopt Google SecOps. You will provide best practices on secure build of Google SecOps platform, foundational cloud implementation for Google SecOps, tackle difficult problems that businesses are facing when building Google SecOps, and more. Candidates will provide prescriptive guidance in ensuring customers receive the best of what Google SecOps can offer and you will ensure that customers have the best experience in migrating, building, modernizing, and maintaining Google SecOps. Additionally, you will work closely with Product Management and Product Engineering to drive excellence of Google SecOps and features.Spearhead the architecture and implementation of Google SecOps environment on GoogleCloud Platform for large scale deployments and migration.Strategic design and implementation of data pipelines & effective data storage mechanisms to meet functional and nonfunctional requirements of Google SecOps customers.Design, plan and implement data migrations from existing SIEM SOAR platforms of customers to Google SecOps.Hardening of critical infrastructures and platform services leveraged by Google SecOps.Integration of Google SecOps with other security capabilities and tools such as SOAR, EDR, NDR, threat intelligence platform, and ticketing systems.Write custom actions, scripts and/or integrations to extend Google SecOps platform functionality.Monitor performance and perform timely actions to scale Google SecOps deployment, especially in a very high-volume security environment.Guide on building or maturing cloud security programs and the implementation of tools and approaches used for improving cloud security.Professional & Technical Skills: Bachelors degree in computer science, Engineering or related technical field or equivalent practical experience.Implementation experience of YARA-L 2.0 and at least one more general-purpose language.Experience managing customer projects to completion, working with engineering teams, sales and partners.Experience in architecting, developing, or maintaining secure Cloud solutions.Strong verbal and written communication skills and the ability to develop high-qualityDemonstrated experience on consulting or ownership of Security during high-speed environment migration for large-scale businesses with regulatory requirementsStrong verbal and written communication skills English, and the ability to develop high-quality technical documentation and presentation materials.Google SecOps experience in the areas of responsibility for at least 1 year.Ability to be located in Mumbai, India for at least 1 year.Hands on and deep knowledge of security principles.Demonstrated experience in Cloud Security delivered within the context of customer facing roles. Experience in security governance, security risk management, security operations, security architecture, and/or cyber incident response programs for cloud.Experience working with cloud architecture across a broad set of enterprise use cases and creating end-to-end solution architectures.Excellent organizational, problem-solving, articulating and influencing skills.Experience with industry compliance frameworks e.g., PCI-DSS, ISO 27017/27018, GDPR, SOC. Google Cloud Professional Certifications Security, Architect and other industry certifications CISSP, CCSP. Additional Information:Bachelors degree in Computer Science, Engineering or related technical field or equivalent practical experience. 15 year's of education is required.10+ years' experience in leading projects and delivering technical solutions related to securityAbility to be located in Mumbai, India for at least 1 year Qualification 15 years full time education

Posted 2 days ago

Apply

8.0 - 13.0 years

3 - 7 Lacs

mumbai

Work from Office

About The Role Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Product Security Good to have skills : Security Information and Event Management (SIEM) Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :Client accelerates organizations ability to digitally transform their business with the best infrastructure, platform, industry solutions and expertise. We deliver enterprise-grade solutions that leverage cutting-edge technology all on the cleanest cloud in the industry. Role & Responsibilities:As a SIEM Engineer, you will be responsible for strategic delivery helping our customers securely adopt Google SecOps. You will provide best practices on secure build of Google SecOps platform, foundational cloud implementation for Google SecOps, tackle difficult problems that businesses are facing when building Google SecOps, and more. Candidates provide prescriptive guidance in ensuring customers receive the best of what Google SecOps can offer and you will ensure that customers have the best experience in migrating, building, modernizing, and maintaining Google SecOps. Additionally, you will work closely with Product Management and Product Engineering to drive excellence of Google SecOps and features.Lead the design and implementation of Google SecOps data ingestion from diverse sources, various mechanisms for integration and normalization of logs.Extension of pre-built UDMs in Google SecOps and creation of custom parsers were required for log sources.Integration of Google SecOps SIEM with other security capabilities and tools such as SOAR, EDR, NDR, threat intelligence platform, and ticketing systems.Write custom actions, scripts and/or integrations to extend SIEM platform functionality.Monitor performance and perform timely actions to scale SIEM deployment, especially in a very high-volume security environment.Creation of SIEM assets such as detection rules using YARA-L, dashboards, parsers etc.Migration of existing assets from existing customers SIEM SOAR to SecOps and assisting in implementing the SIEM SOAR phase-out, phase-in approach.Testing and deployment of newly created and migrated assets such as rules, playbooks, alerts, dashboards.Design and implement solutions to handle alert fatigue encountered in SIEM correlation.Creation of custom SIEM dashboards to meet customer requirements.Guide on building or maturing cloud security programs and the implementation of tools and approaches used for improving cloud security.Debug and solve customer issues in ingestion, parsing, normalization of data.Develop SOAR playbooks to provide case handling and Incident response as per triage needs.Professional & Technical Skills: SIEM experience in the areas of responsibility for at least 1 year.Implementation experience of YARA-L 2.0 and at least one more general-purpose language.Experience managing customer projects to completion, working with engineering teams, sales and partners.Experience architecting, developing, or maintaining SIEM and SOAR platforms & secure Cloud solutions.Strong verbal and written communication skills and the ability to develop high-qualityExperience in Prevention, Detection and response to cyber threatsGoogle SecOps SOAR experience of 1 year in creation of playbooks, testing and validation of playbooks, integration with custom actions using bespoke scripts, or other SOAR platformsKnowledge and experience in SIEM platformsDemonstrated experience on consulting or ownership of Security during high-speedenvironment migration for large-scale businesses with regulatory requirementsStrong verbal and written communication skills English and the ability to develop high-qualitytechnical documentation and presentation materials.Knowledge in GCP, including Google Cloud Professional Certifications Security, Architect and other industry certifications CISSP, CCSP.Experience in security governance, security risk management, security operations, security architecture, and/or cyber incident response programs for cloud.Experience working with cloud architecture across a broad set of enterprise use cases and creating end-to-end solution architectures.Excellent organizational, problem-solving, articulating and influencing skills.Experience with industry compliance frameworks e.g., PCI-DSS, ISO 27017/27018, GDPR, SOC. Additional Information:Bachelors degree in Computer Science, Engineering or related technical field or equivalent practical experience. 15 year's of education is required.8+ years experience in leading projects and delivering technical solutions related to securityAbility to be located in Mumbai, India for at least 1 year Qualification 15 years full time education

Posted 2 days ago

Apply

1.0 - 6.0 years

13 - 17 Lacs

bengaluru

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Operational Technology (OT) Security Good to have skills : Network Security Implementation Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Senior IT/ OT Endpoint Security consultant, you will focus to lead the design, implementation, and management of endpoint security controls across enterprise /OT environments, will play a crucial role in protecting critical assets such as Server, Workstations, and ICS equipment. Roles and Responsibilities:-Lead the deployment, management, and optimization of endpoint security tools. (e.g., CrowdStrike, Sentinel One, Microsoft Defender for Endpoint, Trellix, Carbon Black, Symantec Endpoint Protection)-End to end platform management activities such as upgradation of servers and clients, signature updates and compliance, groups management, Access management etc. -Monitor, detect, and respond to endpoint-related security incidents and vulnerabilities.-Using MITRE ATT4CK framework improve threat hunting.-Integrate EDR telemetry with SIEM/SOAR platforms and tune detection rules, policies, and behavioral indicators.-Perform real-time threat hunting and investigation using EDR consoles, log data, and forensic artifacts.-Implement host-based control policies, and privilege management solutions.-Monitor and analyze endpoint alerts, triage suspicious activity, and escalate incidents based on impact and severity.Professional and Technical Skills: - Over 5 years of experience in deploying or managing large-scale endpoint security, with at least 1+ years in OT/ICS environment. -Experience in multi-vendor Endpoint Protection tools - CrowdStrike, Microsoft Defender for Endpoint, Carbon Black etc.- Certifications on the vendor products will be added advantage -Experience with endpoint security scripting and automation using Python, PowerShell or API.-Familiarity with OT security and industrial protocols and vendor protocols (Modbus, DNP3, OPC, etc.) is added advantage.-Working experience with Patch and Vulnerability Management of end point device with coordination with IT team. Additional Information:- The candidate should have 1 minimum years of experience in Operational Technology (OT) Security.- This position is based at our Bengaluru office.- A 15-year full time education is required. Qualification 15 years full time education

Posted 2 days ago

Apply

7.0 - 12.0 years

3 - 7 Lacs

bengaluru

Work from Office

About The Role Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Threat Intelligence Operations Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for an experienced and detail-oriented Security Delivery Specialist to support the planning, implementation, and delivery of cybersecurity services across Microsoft security technologies. The ideal candidate will have practical expertise in Microsoft Sentinel, Cribl, Logstash, DevOps, Terraform, Log source onboarding, and ASIM Parsing, and will play a key role in delivering secure, scalable, and compliant security solutions for internal stakeholders or clients.Roles & Responsibilities:Deliver security solutions using Microsoft security stack, with a focus on Microsoft Sentinel Platform Management.Translate business and technical requirements into well-architected security solutions and support delivery from design to deployment.Manage clusters with multiple clients.Lead and manage cross-functional teams, ensuring effective collaboration, communication, and alignment with business objectives. Responsible for team decisions.Engage with multiple teams and contribute on key decisions.Develop and implement security strategies.Conduct security assessments and audits.Stay updated on the latest security trends and technologies.Configure and fine-tune Microsoft Sentinel, develop analytics rules, workbooks, playbooks, and maintain alerting mechanisms.Coordinate with engineering, operations, and risk teams to ensure consistent and secure delivery of services.Create technical documentation, deployment guides, and knowledge transfer materials for clients or internal teams.Collaborate with project managers and stakeholders to ensure timely and successful delivery of security services.Contribute to continuous improvement initiatives and automation of delivery processes.Professional & Technical Skills: Strong client-facing and stakeholder engagement capabilities.Excellent organizational and project coordination skills.Ability to clearly communicate technical information to both technical and non-technical audiences.Proactive mindset with a focus on security service quality and consistency.Experience working in delivery frameworks such as Agile, ITIL.Microsoft Sentinel:Hands-on experience with SIEM/SOAR, including KQL query development, alert tuning, and automation with Logic Apps.Configure and fine-tune Microsoft Sentinel, develop analytics rules, workbooks, playbooks, and maintain alerting mechanisms.KQL (Kusto Query Language) Proficiency:Ability to create analytics rules, hunting queries, workbooks, and detections in Sentinel.Ability to create and tune analytics rules using behavioral detection techniques, building watchlists, and custom rule logic.Knowledge of MITRE ATT&CK & Threat Modeling:Developing detection coverage across ATT&CK techniques, identifying detection gaps, and prioritizing use cases based on threat relevance.Log Source and Data Schema Familiarity (ASIM):Mapping raw logs to the ASIM model, understanding normalized data schemas (e.g., DeviceEvents, NetworkSession), and validating data quality.Able to manage Key Vault and secret rotation.Required knowledge of Entra ID management.Required knowledge in log source optimization.SIM parsing and normalization.Managing Cribl and Logstash pipeline for log source onboarding.Strong understanding of incident response and threat management.Familiarity with scripting (PowerShell, KQL), infrastructure-as-code, and automation tools is a plus.Able to manage requests, incidents, and changes on ServiceNow as per service management process.Required active participation/contribution in team discussions.To be a part of audits and service improvement activities within the team.Experience in designing and implementing security solutions.Deliver security solutions using Microsoft security stack, with a focus on Microsoft Defender for Cloud, Endpoint, Identity, Azure Firewall, and Microsoft Sentinel.Implement and operationalize Microsoft Defender for Cloud (MDC) for cloud security posture management and workload protection.Support deployment and ongoing management of Microsoft Defender for Endpoint (MDE) for endpoint threat detection and response.Integrate Microsoft Defender for Identity (MDI) into customer environments to monitor identity- related threats and provide remediation recommendations.Knowledge of network security protocols and best practices.Hands-on experience with security tools and technologies. Additional Information:-The candidate should have a minimum of 7+ years of experience in Managed Cloud Security Services.-This position will be operated from Bengaluru location.-A 15 years full time education is required. Qualification 15 years full time education

Posted 2 days ago

Apply

2.0 - 7.0 years

13 - 17 Lacs

bengaluru

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Operational Technology (OT) Security Good to have skills : Endpoint Protection Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Senior IT/ OT Endpoint Security consultant, you will focus to lead the design, implementation, and management of endpoint security controls across enterprise /OT environments, will play a crucial role in protecting critical assets such as Server, Workstations, and ICS equipment. Roles and Responsibilities:-Lead the deployment, management, and optimization of endpoint security tools. (e.g., CrowdStrike, Sentinel One, Microsoft Defender for Endpoint, Trellix, Carbon Black, Symantec Endpoint Protection)-End to end platform management activities such as upgradation of servers and clients, signature updates and compliance, groups management, Access management etc. -Monitor, detect, and respond to endpoint-related security incidents and vulnerabilities.-Using MITRE ATT4CK framework improve threat hunting.-Integrate EDR telemetry with SIEM/SOAR platforms and tune detection rules, policies, and behavioral indicators.-Perform real-time threat hunting and investigation using EDR consoles, log data, and forensic artifacts.-Implement host-based control policies, and privilege management solutions.-Monitor and analyze endpoint alerts, triage suspicious activity, and escalate incidents based on impact and severity.Professional and Technical Skills: - Over 8 years of experience in deploying or managing large-scale endpoint security, with at least 2+ years in OT/ICS environment. -Experience in multi-vendor Endpoint Protection tools - CrowdStrike, Microsoft Defender for Endpoint, Carbon Black etc.- Certifications on the vendor products will be added advantage -Experience with endpoint security scripting and automation using Python, PowerShell or API.-Familiarity with OT security and industrial protocols and vendor protocols (Modbus, DNP3, OPC, etc.) is added advantage.-Working experience with Patch and Vulnerability Management of end point device with coordination with IT team. Additional Information:- The candidate should have minimum years of experience in Operational Technology (OT) Security.- This position is based at our Bengaluru office.- A 15-year full time education is required. Qualification 15 years full time education

Posted 2 days ago

Apply

7.0 - 12.0 years

3 - 7 Lacs

bengaluru

Work from Office

About The Role Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Threat Intelligence Operations Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for an experienced and detail-oriented Security Delivery Specialist to support the delivery of cybersecurity services focused on Microsoft Sentinel. The ideal candidate will have hands-on expertise in Sentinel configuration, log source onboarding (Cribl, Logstash), KQL analytics, and threat modeling. The candidate will also collaborate closely with VM teams to develop PC10-aligned threat models during application onboarding.Roles & Responsibilities:Deliver and support security solutions using Microsoft Sentinel.Configure and optimize Sentinel:develop analytics rules, hunting queries, workbooks, playbooks, and alert mechanisms.Develop threat models aligned to PC10 standards for critical applications.Work with VM teams to define threat scenarios, attack paths, and relevant detections for newly onboarded applications.Perform gap analysis of detection coverage based on MITRE ATT&CK or other frameworks.Identify and prioritize high-risk use cases and translate them into Sentinel detection rulesIdentify critical assets, data flows, and entry points in applications or infrastructure.Categorize assets based on business impact and risk exposureDevelop and maintain threat models aligned to PC10 controls (such as those from MAS TRM, RBI, or internal regulatory frameworks)Create and maintain threat modeling documentation, including threat matrices, risk ratings, and mitigation strategies.Support periodic reviews and updates of threat models as applications evolve.Coordinate with engineering and SOC teams to operationalize detection logic derived from threat models.Professional & Technical Skills: Microsoft Sentinel:Strong hands-on experience with SIEM/SOAR, KQL query development, alert tuning, hunting, and automation. Log Source Onboarding:Experience managing pipelines and ensuring enriched logs are captured and with normalized ingestion. ASIM Parsing:Proficiency in mapping raw logs to schemas such as DeviceEvents, NetworkSession, etc. Threat Modeling (PC10):Ability to identify assets, threats, and mitigations; develop risk-driven detection use cases; and maintain structured models. Collaboration with VM and Application Security teams for onboarding and modeling real-world attack scenarios. Familiarity with MITRE ATT&CK, STRIDE, or similar frameworks for structured analysis. Update threat models as applications evolve, new threats emerge, or infrastructure changes. Experience using tools such as Threat Modeling Tool (TMT) or Visio for visual representation of threat flows. Strong understanding of incident detection, investigation, and response. Maintain a central repository of threat models for all onboarded applications. Link threat modeling outcomes directly to SOC playbooks and automation. Scripting knowledge in PowerShell, KQL, or other scripting languages is an advantage. Additional Information:-Minimum 7+ years of experience in cybersecurity, security operations, or cloud security services.-Role based in Bengaluru.-Requires 15 years of full-time education. Qualification 15 years full time education

Posted 2 days ago

Apply

12.0 - 15.0 years

32 - 35 Lacs

mumbai

Work from Office

Level - L4 Reports to: SOC Head Position Summary: The SOC Lead will lead the operations of the Security Operations Centre (SOC). The candidate should have deep expertise in security monitoring, incident response, threat intelligence and security technologies. This role is critical in safeguarding digital assets and ensuring rapid detection, response and mitigation of security incidents. Key Responsibilities: Lead and manage the day-to-day operations of the Security Operations Centre (SOC) team. Oversee monitoring, detection, analysis, and response to security incidents using SIEM tools and other security technologies. Oversee tuning and optimization of SIEM platforms (e.g. Azure sentinel, LogRhythm, Splunk, QRadar, Wazuh etc.) Develop, implement, and maintain SOC processes, procedures, and playbooks to ensure effective incident response. Perform threat hunting and proactive analysis to identify emerging threats. Manage and mentor SOC analysts, providing training and professional development. Conduct root cause analysis and prepare detailed incident reports and recommendations. Drive continuous improvement in SOC capabilities through adoption of new tools and technologies. Participate in security audits, assessments, and vulnerability management initiatives. Stay up-to-date with the latest threat trends, vulnerabilities and regulatory requirements. Required Qualifications: Minimum 12 years of professional experience in cybersecurity, with at least 8 years in a SOC environment. Deep understanding of networking, system administration, cloud environments (AWS/Azure/GCP) and security architecture. Experience with EDR, SIEM, SOAR, IDS/IPS, firewalls and forensic tools. Strong knowledge of malware analysis, log correlation, threat hunting and vulnerability management. Strong analytical and problem-solving skills with an investigative mindset. Excellent communication skills for technical and executive-level reporting. Preferred Certifications: CISSP, GCIA, GCIH, CEH, OSCP, Security+, CySA+ or similar. SIEM-specific certifications (e.g. Azure Sentinel, LogRhythm, Splunk etc). Education: BE CSE/IT or a related field, MCA with 60%+ throughout the academics.

Posted 2 days ago

Apply

8.0 - 10.0 years

25 - 27 Lacs

mumbai

Work from Office

Level - L3 Reports to: SOC Lead Position Summary: The Senior SOC Specialist will be the subject matter expert (SME) and support the Security Operations Centre (SOC) operations. The candidate should have deep expertise in security monitoring, incident response, threat intelligence and security technologies. This role is critical for ensuring rapid detection, response and mitigation of security incidents. Key Responsibilities: Manage advanced threat detection, incident triage, investigation and response activities. Serve as a subject matter expert (SME) for SOC tools and processes. Perform in-depth analysis of complex security events and indicators of compromise (IOCs). Develop and maintain playbooks, runbooks, and incident response procedures. Mentor and train junior SOC analysts and foster a collaborative team environment. Collaborate with IT, risk management, compliance and business units during investigations and threat assessments. Tuning and optimization of SIEM platforms (e.g. Azure sentinel, LogRhythm, Splunk, QRadar, Wazuh etc.) and threat detection rules. Integrate threat intelligence feeds and contextual analysis to enrich SOC capabilities. Support red team/blue team exercises and vulnerability assessments. Ensure timely and accurate incident reporting and documentation. Required Qualifications: Minimum 8 years of professional experience in cybersecurity, with at least 5 years in a SOC environment. Deep understanding of networking, system administration, cloud environments (AWS/Azure/GCP) and security architecture. Experience with EDR, SIEM, SOAR, IDS/IPS, firewalls and forensic tools. Strong knowledge of malware analysis, log correlation, threat hunting and vulnerability management. Experience in handling security incidents, ransomware, phishing campaigns and zero-day exploits. Strong analytical and problem-solving skills with an investigative mindset. Excellent communication skills for technical and executive-level reporting. Preferred Certifications: CISSP, GCIA, GCIH, CEH, OSCP, Security+, CySA+ or similar. SIEM-specific certifications (e.g. Azure Sentinel, LogRhythm, Splunk etc). Education: BE CSE/IT or a related field, MCA with 60%+ throughout the academics.

Posted 2 days ago

Apply

2.0 - 5.0 years

3 - 6 Lacs

lucknow

Work from Office

Responsibilities: 1) Monitoring Security Alerts: Continuous monitoring using SIEM tools to identify alerts and anomalies 2) Incident Response: 3) Threat Analysis: 4) Log Analysis: 5) Vulnerability Management: 6) Reporting: Health insurance

Posted 2 days ago

Apply

3.0 - 8.0 years

18 - 20 Lacs

gurugram

Hybrid

As a Security Engineer specializing in Threat Correlation and Tool Optimization, you will serve as the technical subject matter expert for improving the fidelity, prioritization, and integration of vulnerability data across a multi-cloud and hybrid enterprise environment. This role is focused on optimizing inputs from a wide range of scanning and detection tools including endpoint, network, and cloud-native platformsand enriching them with contextual data such as threat intelligence, asset criticality, and exploitability indicators. You will work across industry standard tools and technologies, and external threat/risk platforms (e.g., BitSight, Recorded Future), as well as integrate findings into broader SIEM, SOAR, and asset inventory systems. Your work will directly impact how the organization correlates vulnerability data with emerging threats and prioritizes remediation to reduce enterprise risk.

Posted 3 days ago

Apply

2.0 - 6.0 years

0 Lacs

kolkata, west bengal

On-site

Role Overview: As an Associate Specialist - Cybersecurity Analyst at Linde Global Support Services Pvt. Ltd, you will play a crucial role in performing operations related to Linde plc Cybersecurity services, including SOAR, SIEM SOC, ITDR, and VAPT. You will be part of the Linde Corporate IT Security Operations team, contributing to the monitoring, analysis, and enhancement of cybersecurity systems to ensure the security of Linde plc applications, systems, and networks. Additionally, you will collaborate with internal and external cybersecurity experts to identify and mitigate security risks effectively. Key Responsibilities: - Monitor alarms and events from Linde plc cybersecurity systems, ensuring appropriate response, coordination, and closure of incidents, including incident cause analysis. - Build effective detection use cases using tools like SIEM, ITDR, and SOAR to enhance cybersecurity systems" efficiency. - Perform regular pen-testing tasks to identify security control gaps and ensure timely mitigation. - Ensure proper architecture and configuration of tools used by the IT Security Operations team to identify threats and respond accordingly. - Collaborate with regional IT teams to understand cybersecurity risks, create mitigation plans, and provide status reports. - Work with vendors providing security operational services to ensure services meet Linde plc's requirements and SLAs. - Support the creation of SOP documentation for Security Operations within Linde plc. - Ensure process consistency and harmonization with Cybersecurity analysts across all segments. Qualifications Required: - 2+ years of experience in infrastructure, service, and cybersecurity. - Broad understanding of Linde's business activities. - Significant exposure to Linde IT infrastructure. About the Company: Linde Global Support Services Pvt. Ltd. is a subsidiary of Linde, dedicated to providing IT Enabled Services to Linde group companies worldwide. With a commitment to delivering high-quality solutions and services, Linde aims to make the world more productive while ensuring sustainability and protection of the planet. As part of Linde's core Global IT Team, the company offers diverse career opportunities in leading technologies within a global work environment. If you are inspired by our mission and vision, we invite you to apply for the Associate Specialist - Cybersecurity Analyst position at Linde Global Support Services Pvt. Ltd through our online job market. Join us in making a positive impact on the world while advancing your career in cybersecurity.,

Posted 3 days ago

Apply

5.0 - 7.0 years

3 - 8 Lacs

thane, navi mumbai, mumbai (all areas)

Work from Office

Position - MS Defender - Endpoint (MDE) Specialist Job location :- Ghansoli Shift:- Rotational shift WALKIN DRIVE:- 12th September 12pm to 5pm 13th September 9am to 12.30pm HR Spoc:- Ruchika HR We are seeking a highly skilled and experienced L3 for handling EDR operations to our dynamic security team. The Ideal candidate will play a key role in advance threat detection, Incident response and responding to critical security incident and enhancing our endpoint security capabilities with EDR tools. Roles & Responsibilities Investigate and analyse sophisticated security alerts and events to determine root cause, scope and impact of security incidents. Provide technical expertise and guidance to junior analysts (L1, L2s), assisting with incident investigations, analysis and resolution. Develop and implement advanced detection and response strategies using Carbon Black EDR to enhance our overall security posture. Lead incident response efforts, including coordination with cross-functional teams and external stakeholders. Conduct in-depth analysis of endpoint data and logs to identify indicators of compromise (IOCs) and advanced attack techniques. Collaborate with threat intelligence teams to stay updated on emerging threats and tactics used by threat actors. Develop and maintain security playbooks, procedures and response plans for incident response and threat hunting. Assist in the tuning and optimization of Carbon Black EDR policies, SIEM rules and custom queries to improve detection efficacy. Stay abreast of industry best practices, emerging technologies and trends in endpoint security and threat detection. Provide regular reports and updates on security incident trends, analysis findings and mitigation efforts to stakeholders. Personal & TECH Skills: Good Team player. Possess Positive and learning attitude. Good Verbal and Written communication skills. Sense of Ownership, Priorities and Autonomous. At least one technical certification required (CEH, CompTIA Security+, CBCA, CSA etc.) Should have at least one cyber security certification (CISM, CCIR, ECSA, GCIH etc) Knowledge of banking business and information technology practices and trends in banking sector. Understanding of technology-related issues and how they might impact business; Ability to communicate effectively, both orally and in writing. Knowledge of banking business and information technology practices and trends in banking sector. Qualifications Graduation/Post graduation in, Computers, Information Systems, Computer Science, or Information. technology systems Experience:- Relavant 5 - 7 years of work experience of MS Defender in cyber security /Information security project, with skills including SIEM,SOAR, Endpoint Detection work experience with security posture. Assessment. Interested candidate can share our updated cv in mgs.rec@mizuho-cb.com or can directly Walkin if above details are matching to your current role. Preferred Candidates From Mumbai under 20 Kilometers Mizuho Global Services India Pvt. Ltd. 11th Floor, Q2 Building Aurum Q Park,Gen 4/1, Ttc,Thane Belapur Road ,MIDC Industrial Area, Ghansoli, Navi Mumbai- 400710.

Posted 3 days ago

Apply

10.0 - 15.0 years

5 - 12 Lacs

thane, navi mumbai, mumbai (all areas)

Work from Office

Position- Cyber Security Project Manager Job Description The Cybersecurity Project Manager is responsible for assisting in the design, implementation and management of Banks Cybersecurity projects. The position guides complex projects from inception through delivery and support, working in close partnership with engineering and business leaders, including project, program, and executive sponsors, as well as other leaders within the bank. This role is also in charge of defining objectives, creating plans to achieve objectives, tracking progress against objectives and budgets, driving execution of key projects and programs, and improving project management processes. This individual provides overall coordination, status reporting, risk assessment, risk monitoring and stability of project oriented work efforts. The Project Manager establishes project management processes and methodologies for the Cybersecurity organization to ensure projects are delivered on time, within budget, adheres to high quality standards, and meet stakeholder expectations. Roles & Responsibilities Develop and implement project plans that support business objectives, timelines, budgets, milestones, deliverables and success criteria Drive day to day execution of the project task to ensure activity plans remain relevant and are being executed effectively, for all deliverables on defined schedule Prepare project status reports and conduct meetings regularly on progress, risks, issues, and recommended solutions Responsible for the identification of project measurements in order to measure, track and report on the progress of migrations against established targets as well as the overall effectiveness of the migration project. Defines the project requirements, ensuring that the requirements catalogue traceability matrix is complete, follow up with stakeholders for their task status Manages business and project risks, producing an effective plan and risk assessment, so that timescales and project costs are understood and underwritten by all by the appropriate parties Accountable for managing and tracking the project costs and supporting Business Units in meeting payment milestones Provide planning and review of system designs to ensure compliance with banks security policies and security best practices. Work with sensitive, confidential and/or proprietary information while maintaining the highest level of confidentiality, professionalism, and ethics. Resource and task monitoring for all deliverables. Scheduling, daily weekly, monthly call with stakeholder Creating HLD/LLD documents with support of Technical SMe. Creating Knowledge transfer documents Conduct knowledge transfer sessions with Mizuho Branches after completion of projects Generate sign off request for Project Closure Skills Required - Technical Skills: Splunk Security : Execute Splunk application upgrades to maintain system robustness. Security and Monitoring (SIEM): Proactively address missing data sources to improve overall system integrity and response quality. Application and Infrastructure Security Hardening: Document security hardening processes comprehensively to ensure clarity and repeatability. Collaborate with application and infrastructure teams to implement security configurations based on identified hardening requirements SOAR (XSOAR): Ensure seamless integration of SOAR workflows with existing security systems. Project Management Skills: Strong understanding of critical PM concepts such as activity plans, milestones, task dependencies, risk and issue tracking, status reporting. Ability to effectively lead an engagement team, making effective and efficient use of project resources, identifying and resolving complex problems/issues related to people, processes, and technology and strategy, both internally (organizational) and externally (client/engagement/project). Strong understanding of, and ability to execute project management methodologies and tools The ability to function in a fast moving and rapidly changing environment, make quick sense of it all and add value beyond just a task-oriented doer or project manager; display strong oral and written communication skills from the top down; demonstrate problem solving and analytical skills. The ability to work on multiple projects simultaneously and balance conflicting demands The Ability to manage projects and teams that do not always report through the same department Personal skills: Good Team player Possess Positive and learning attitude Good Verbal and Written communication skills Sense of Ownership, Priorities and Autonomous Ability to travel up to 50% of the time What we offer: Working on international projects Wide range of possibilities to gain both technical and soft skills as well as professional certifications Qualifications Graduation/Post graduation in, Computers, Information Systems, Computer Science, or Information technology systems Experience:- 10+ years of work experience in cyber security /Information security project, with progressive work experience in cybersecurity and technical project management, three years of which shall have been in a technology project oversight capacity. At least one technical certification (CCNA/MCSE/RHCE/Etc) Have a PMP or equivalent project management certification At Least one cyber security certification (CISSP/CISM/CEH/COBIT/CompTia/etc.) Experience with Network Security design and Active Directory management and architecture . Experience with NIST Cybersecurity Framework and Risk Management Framework is strongly preferred. Knowledge of banking business and information technology practices and trends in banking sector Understanding of technology-related issues and how they might impact business . Awareness of appropriate local laws and regulations dealing with technology. Ability to communicate effectively, both orally and in writing. Strong analytic skills and business judgment with ability to independently assess and resolve complex program/project issues Experience in managing complex migration project involving End-User environment, Server and Storage Infrastructure and Network Infrastructure. Interested can share updated cv in mgs.rec@mizuho-cb.com for cv evaluation Subject line- Cyber Security Project Manager - Navi Mumbai Address: Mizuho Global Services India Pvt. Ltd, 11th Floor, Q2 Building Aurum Q Park, Gen 4/1, Ttc, Thane Belapur Road, MIDC Industrial Area, Ghansoli, Navi Mumbai- 400710.

Posted 3 days ago

Apply

4.0 - 9.0 years

4 - 9 Lacs

thane, navi mumbai, mumbai (all areas)

Work from Office

WALKIN DRIVE - 11th, 12th Sept : between 2 pm to 5 pm only. 13th Sept, Saturday : between 9 am to 12 pm only. Mizuho Global Services Pvt Ltd (MGS) is a subsidiary company of Mizuho Bank, Ltd, which is one of the largest banks or so called Mega Banks of Japan. MGS was established in the year 2020 as part of Mizuhos long-term strategy of creating a captive global processing center for remotely handling banking and IT related operations of Mizuho Banks domestic and overseas offices and Mizuhos group companies across the globe. At Mizuho we are committed to a culture that is driven by ethical values and supports diversity in all its forms for its talent pool. Direction of MGSs development is paved by its three key pillars, which are Mutual Respect, Discipline and Transparency, which are set as the baseline of every process and operation carried out at MGS. Whats in it for you? Immense exposure and learning Excellent career growth Company of highly passionate leaders and mentors Ability to build things from scratch Company website : - https://www.mizuhogroup.com/asia-pacific/mizuho-global-services 1) VAPT SME About the Role: We are seeking a highly skilled and experienced Vulnerability Assessment SME to join our dynamic team. You will play a critical role in safeguarding our organization's information assets by identifying, assessing, and mitigating vulnerabilities. Roles and Responsibilities: Conduct vulnerability assessments using industry-leading tools (e.g., Nessus, Tenable, Qualys). Analyze vulnerability assessment results to identify and prioritize risks. Develop and maintain vulnerability management processes and procedures. Coordinate vulnerability remediation activities with relevant stakeholders. Perform penetration testing to assess the effectiveness of security controls. Stay up-to-date on the latest security threats and vulnerabilities. Relevant Skills and Experience: 5-10 years of experience in vulnerability assessment, penetration testing, or a related field. Strong understanding of vulnerability management concepts, principles, and best practices. Proficiency in using vulnerability assessment tools (e.g., Nessus, Tenable, Qualys). Experience in conducting penetration testing using various methodologies (e.g., black box, gray box, white box). Knowledge of common security threats, vulnerabilities, and attack vectors. Experience with network and system security tools (e.g., firewalls, intrusion detection systems, antivirus). Experience with scripting languages (e.g., Python, PowerShell). Experience with cloud security (e.g., AWS, Azure, GCP). Qualifications: Bachelor's degree in computer science, information technology, or a related field. Security certifications (e.g., CISSP, CISM, CEH, OSCP). Strong problem-solving and analytical skills. Excellent communication and interpersonal skills. Ability to work independently and as part of a team. Additional Skills (Preferred): Experience with source code analysis tools. Experience with web application security testing. Experience with mobile application security testing. Experience with security incident response. 1) Engineering JO About the Role: We are seeking three skilled and dedicated professionals to join our team focused on advanced security solutions. This expanding team will include Junior Engineers who will collaborate on security tools management, programming tasks, and detection engineering. These positions aim to fortify our organizations security infrastructure with comprehensive expertise in Splunk Enterprise Security, SOAR solutions, Linux administration, and SIEM capabilities. Roles and Responsibilities: Splunk Enterprise Security Develop and fine-tune SPL queries for alerts, reports, and dashboards. Execute Splunk application upgrades to maintain system robustness. Onboard data sources efficiently, ensuring data completeness for security applications. Configure and validate Splunk Use Cases aligned with organizational security requirements. Security and Monitoring (SIEM): Perform Detection Engineering tasks to identify potential security configuration blind spots. Proactively address missing data sources to improve overall system integrity and response quality. SOAR (XSOAR): Develop and modify SOAR playbooks to optimize workflows or create new ones as needed. Ensure seamless integration of SOAR workflows with existing security systems. Linux Administration: Implement syslog configurations and manage log rotation to maintain system performance and reliability. Deploy and configure virtual appliances for integrating security tools into IT infrastructure. Additional Scope: Stand up and configure security servers and appliances for improved data monitoring environments. Efficient onboarding of logs from diverse systems to create a robust repository for analytics and validation. Configure XSOAR environments while tailoring workflows to suit specific operational needs. Develop and modify SOAR playbooks to optimize workflows or create new ones as needed. Ensure seamless integration of SOAR workflows with existing security systems. Relevant Skills and Experience: For Junior Engineering Resources: 24 years of experience supporting security-based system configurations. Understanding of Splunk features like dashboards and data onboarding. Familiarity with basic Linux configurations and SOAR playbook scripting techniques. Qualifications: Bachelors degree in Computer Science, Cybersecurity, Information Systems, or a related field. Relevant certifications in Splunk Enterprise Security or SOAR tools are a strong advantage. Excellent troubleshooting capabilities and a proactive approach to system fortification. Additional Skills (Preferred): Detection of advanced security threats through specialized SIEM analysis techniques. High adaptability in handling virtual appliance setups and large-scale log configurations. Strong interpersonal skills to collaborate across teams while ensuring adherence to best practices aligned with the organizations security framework. 2) Architecture About the Role: We are looking for professionals a Senior Architect to join our team focused on application and infrastructure security hardening. These individuals will play a crucial role in enhancing the security posture of the organization's platforms by providing actionable hardening guidance, assisting with remediation efforts, and collaborating with teams to ensure compliance with security standards. Roles and Responsibilities: Application and Infrastructure Security Hardening: Deliver clear and practical security hardening guidance for various platforms, including Web Servers, Databases, Operating Systems, and Infrastructure components. Document security hardening processes comprehensively to ensure clarity and repeatability. Provide remediation support to address vulnerabilities identified during hardening audits. Collaborate with application and infrastructure teams to implement security configurations based on identified hardening requirements. Conduct periodic reviews of platforms to detect deviations from the hardening benchmarks and facilitate immediate rectifications. Scope of Work: Coordinate efforts with offshore teams to research optimal security configurations tailored to the organizations needs. Partner with infrastructure and application teams to apply updated system configurations and monitor adherence to security guidance. Assist in periodic assessments of system platforms, ensuring that deviations from security standards are promptly addressed. Recommend and implement best practices to maintain a secure environment across multiple system layers. Relevant Skills and Experience: For Senior Architecture Resource: 57 years of experience in application and infrastructure security domains. Expertise in documenting and guiding application/system hardening processes. Proven track record of implementing security configurations across complex platforms. Strong ability to coordinate remediation tasks with diverse teams. Qualifications: Bachelors degree in Computer Science, Cybersecurity, Information Systems, or a related field. Relevant certifications in security hardening or infrastructure hardening are preferred. Proven experience in identifying vulnerabilities and collaborating on remediation efforts. Additional Skills (Preferred): Familiarity with automated tools and frameworks for ensuring compliance with hardening standards. Strong communication skills to simplify security configurations for diverse teams while maintaining technical accuracy. Adaptable research capabilities to align hardening recommendations with industry best practices. Address: - Mizuho Global Services India Pvt. 11th Floor, Q2 Building Aurum Q Park, Gen 4/1, Ttc, Thane Belapur Road, MIDC Industrial Area, Ghansoli, Navi Mumbai- 400710. Please Note : Candidates residing within 20KMs radius from the office location will ONLY be considered. WALKIN DRIVE - 11th, 12th Sept : between 2 pm to 5 pm only. 13th Sept, Saturday : between 9 am to 12 pm only.

Posted 3 days ago

Apply

2.0 - 6.0 years

12 - 16 Lacs

gurugram

Work from Office

Job Description for Technical Sales Support Professional for Cybersecurity Business Job Title: Technical Sales Support Professional for Cybersecurity business (OT & IT) Location: Gurgaon Business Unit: Electrification and Automation Customer Services Experience Level: 510 Years Job Type: Full-Time PL Level: PL 9 Industry: Energy / Power / Industrial Automation Business Unit: Smart Infrastructure Electrification & Automation, Customer Services We are seeking a highly skilled and experienced Cybersecurity professional to join our Customer Services team in the Electrification and Automation (EA) Business Unit. The ideal candidate needs to have a strong background in cyber security, with focus on operational technology environments. The primary role involves generating leads in the market & working as a Cyber Security Proposal Engineer, responsible for scaling cybersecurity business exponentially. The job demands comprehensive preparation from Opportunity development to Order Acquisition in line with business processes for the aforementioned solutions: Cybersecurity Audit Vulnerability Assessment & Penetration Testing and recommending mitigation measures Secure migration of protection & automation systems Intrusion Detection System (IDS) & Intrusion Prevention System (IPS) Security Information & Event Management (SIEM) Security Orchestration, Automation, and Response (SOAR) User and Entity Behavior Analytics (UEBA) Network Detection and Response (NDR) Security Operation Center (SOC) Role Base Access Control (RBAC) & Active Directory (AD) Antivirus and Whitelisting System Hardening Required Qualification & Experience Successfully completed degree in B-Tech/B.E. in Electrical & Electronics / Electronics & Communication/ Computer Science or comparable training with relevant professional experience of minimum 5 years in the field of Cyber Security. The Candidate must have knowledge on ISO 27001, IEC 62443 and implementation of the same, the certified candidate shall be having the preference. The candidate has hands-on experience in cyber security solutions SIEM, SOAR, UEBA, NDR, SOC, IPS/IDS, RBAC, AD, Hardening, Antivirus deployment. The Candidate must have knowledge on handling Ethernet Switches, Firewalls and Routers. The Candidate must have knowledge of OT systems and communication protocols. The candidate must have Knowledge of topics such as patch management, Vulnerability Assessment, network analysis and automation. The candidate having relevant cyber security certifications such as NNCE, IEC62443, CISSP, CISM, CEH, or GICSP shall be having the preference. The Candidate must have knowledge on different other Cyber Security aspects such as Secure Architecture, Secure Remote Access and Methodologies to protect endpoints. The candidate must have good communication and presentation skills. Soft Skills & Attributes Strong customer orientation with problem-solving and advisory mindset. Excellent communication and presentation skills. Ability to work independently and in cross-functional teams across global environments. Willingness to travel (national and occasionally international) as per project requirements. WEVE GOT QUITE A LOT TO OFFER, HOW ABOUT YOU?

Posted 3 days ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies