Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 10.0 years
0 Lacs
maharashtra
On-site
As a Senior SOC Architect, you will play a crucial role in leading the design and evolution of our Security Operations Center (SOC) infrastructure and strategy. Your extensive expertise in security architecture, incident response frameworks, threat intelligence integration, and enterprise-grade SOC solutions will be essential for the success of this high-impact position. Your responsibilities will include designing and continually enhancing SOC architecture, processes, and automation frameworks. You will be responsible for evaluating and implementing various security technologies such as SIEM, SOAR, EDR, IDS/IPS, among others. Additionally, you will lead the integration of threat intelligence feeds, analytics, and response capabilities while ensuring alignment with business and compliance requirements such as ISO 27001 and NIST. In this role, you will provide strategic direction and architectural governance for SOC operations, mentoring SOC teams to ensure technology alignment with best practices. Collaboration with stakeholders, IT, and security leaders to define threat models and use cases will be a key aspect of your responsibilities. To be successful in this role, you should possess at least 10 years of experience in cybersecurity, with a minimum of 3 years in SOC architecture or design-focused leadership roles. Your proven experience in deploying and scaling SOC tools and platforms like Splunk, QRadar, Sentinel, Palo Alto XSOAR, and CrowdStrike will be valuable. A deep understanding of threat detection, incident response, security automation, network security, endpoint security, cloud security, and log management is essential. Familiarity with security frameworks and standards such as MITRE ATT&CK, NIST, and ISO is also required. Your exceptional leadership, communication, and documentation skills will be crucial for effectively fulfilling this role. This is a full-time on-site position located in Andheri East, Mumbai. The client interview process will consist of 5 rounds, with the first round being on-site and subsequent rounds conducted virtually. Join us as a Senior SOC Architect and be at the forefront of building a resilient and modern SOC capable of staying ahead of today's advanced threats.,
Posted 2 weeks ago
15.0 - 20.0 years
13 - 17 Lacs
gurugram
Work from Office
About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an L1 SOC Analyst you are the first line of defense in monitoring and triaging security alerts. You will work primarily with Sumo Logic SIEM and SOAR tools to identify potential security incidents, validate alerts, and escalate them according to the defined SOPs. You will ensure real-time visibility and log health while flagging suspicious activity promptly. This role is essential to ensuring timely detection and reducing noise from false positives Roles & Responsibilities:--Basic Security Knowledge:Understanding of key concepts (malware, phishing, brute force, etc.-SIEM Familiarity:Exposure to Sumo Logic UI and understanding how to read/query logs-Exposure to CrowdStrike Falcon Console:Ability to view and interpret endpoint alerts-Alert Triage:Ability to differentiate between false positives and real threats-Communication Skills: Clear written documentation and verbal escalation-Ticketing Systems:Familiarity with platforms like JIRA, ServiceNow, or similar-Basic understanding of cybersecurity fundamentals-Basic Scripting:Awareness of PowerShell or Python for log parsing-SOAR Exposure:Familiarity with automated triage workflows-Security Certifications:Security+, Microsoft SC-900, or similar certification-Operating System Basics:Windows and Linux process and file system awareness Professional & Technical Skills: -Monitor real-time alerts and dashboards in Sumo Logic SIEM-Perform initial triage on alerts and determine severity/priority-Escalate validated security incidents to L2 analysts per defined SOPs-Follow pre-defined SOAR playbooks to document or assist in response-Ensure alert enrichment fields are populated like host info, user details, etc.-Conduct basic log searches to support alert analysis-Perform daily health checks on log sources and ingestion pipelines-Maintain accurate ticket documentation for each alert handled-Participate in shift handovers and team sync-ups for awareness-SIEM:Basic log searching, correlation rule awareness-SOAR:Familiarity with playbook execution-Security Concepts:Basic understanding of malware, phishing, brute force-Tools:CrowdStrike EDR, Sumo Logic Additional Information:- The candidate should have minimum 2 years of experience in Security Information and Event Management (SIEM) Operations.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
10.0 - 15.0 years
30 - 45 Lacs
pune
Work from Office
About Role- The Presales Manager – Cybersecurity will play a strategic role in leading the presales function, supporting the sales team by providing deep technical expertise and driving solution positioning during the pre-sales process. This role requires advanced knowledge of security technologies, MSSP offerings, and services, combined with strong leadership skills to manage client engagements and mentor presales consultants. You will engage with clients to assess their security requirements, design tailored cybersecurity solutions and services, and articulate the value of the company’s offerings. As a manager, you will also be responsible for guiding the presales team, building frameworks for technical solutioning, and collaborating with leadership to drive successful business outcomes. Key Roles & Responsibilities Leadership & Management: Lead and mentor a team of presales consultants, ensuring consistent delivery quality across client engagements. Define presales processes, frameworks, and best practices to improve efficiency and impact. Collaborate with leadership to align presales strategy with business goals. Support hiring, training, and upskilling of presales resources. Technical Presales Support: Collaborate with sales leadership to identify client security needs and map them to appropriate solutions. Lead high-impact technical presentations, demos, and workshops on cybersecurity solutions including: Cisco Security Solutions : SSE, Firewall, Secure Workload, SNA, ESA, MCD, etc. Palo Alto Security Solutions : Prisma Access, Cortex XDR, XSIAM, CNAPP, etc. Gruve Professional and Managed Services : Next-Gen SOC, Device Management, VAPT, Network Security Assessments, Threat Hunting, Dark Web Monitoring, EASM Solutions. Oversee the design of customized architectures that align with client business goals. Review and validate technical proposals, SOWs, LLDs, and PoCs. Customer Engagement & Advisory: Act as a trusted advisor for C-level executives and senior client stakeholders. Drive executive-level conversations on cybersecurity strategy, compliance, and risk management. Ensure strong customer relationships are built and maintained throughout the sales lifecycle. Solution Design and Architecture: Provide oversight and guidance on end-to-end cybersecurity solutions and managed services. Ensure solutions are scalable, feasible, and aligned with organizational capabilities. Review solution documentation, architecture diagrams, compliance frameworks, and marketing collaterals. Proposal Development and RFP/RFI Response: Lead and manage the presales team’s participation in proposals, RFPs, and RFIs. Ensure submissions are technically accurate, competitive, and aligned with client requirements. Market & Technology Expertise: Stay ahead of technology trends, emerging threats, and competitive landscape. Position company solutions effectively by identifying differentiators against competitors. Regularly update the sales team and leadership on technology trends and opportunities. Basic Qualifications: Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or related field. 8 - 15 years of overall experience with 7 + years in cybersecurity presales, consulting, or technical advisory roles. Relevant certifications (CCIE, CISSP, CISM, CEH, or vendor-specific certifications) are highly desirable. Strong knowledge of firewalls, SSE, SIEM, SOAR, NDR, workload protection, networking (routing, switching, wireless) and cloud security (AWS, Azure, GCP). Experience in preparing and presenting proposals to CXOs and senior client stakeholders. Techno-commercial mindset with proven ability to influence business outcomes. Preferred Qualifications: Strong understanding of security architecture and risk assessment methodologies. Hands-on exposure to vendors/products like Cisco, Palo Alto, Fortinet, Zscaler/Netskope, CrowdStrike, Splunk, etc. Knowledge of compliance standards (ISO 27001, NIST, GDPR, HIPAA). Proven experience leading presales teams and managing large enterprise client engagements. Exceptional communication, presentation, and stakeholder management skills.
Posted 2 weeks ago
5.0 - 10.0 years
15 - 19 Lacs
mumbai
Work from Office
Your Career As a Domain Consultant you will be the expert for our Cortex portfolio, a Next-Gen AI-powered security operations platform. You will play a key role in defining technical solutions that secure a customers key business imperatives. You evangelize our industry leading solutions in Security Intelligence and Automation, XDR, Attack Surface Management, SOAR and Incident Response that establish Palo Alto Networks as a customers cybersecurity partner of choice Your Impact Collaborate with account teams to recommend and develop customer solutions within your assigned specialization area Present to customers as our expert at all levels in the customer hierarchy, from practitioner to senior leadership Lead and support customer demonstrations that showcase our unique value proposition Scope and Lead Proof of Value (PoV) projects for prospective customers based on best practices to ensure technical win in your assigned opportunities Drive high technical validation and PoV win rates within your assigned specialization area Architect solutions that will help our customers strengthen and simplify their security posture Accelerate technical validation of proposed solutions within your specialization Document High-Level Design and Key Use Cases to ensure proper implementation and value realization of Palo Alto Networks Solutions Help our customers build and develop further their services around Cortex solutions Lead conversations about industry trends and emerging changes to the security landscape Discuss, with credibility, competitive offers in the marketplace and position ours as the best alternative Assist account solutions consultants to respond effectively to RFIs/RFPs while serving as the main technical point of contact for Cortex Position Palo Alto Networks or Partner delivered services as appropriate to ensure proper implementation and value realization of Palo Alto Networks solutions Qualifications Your Experience Deep experience with security incident response, both IR tools and IR workflow process or SOC operational processes Strong technical hands-on experience (At least 5+ years) with EDR/XDR Experience around SOAR and SIEM will be an added advantage Strong practical experiences with threat hunting, malware, exploits and be able to demonstrate simulation of cyber attacks Experience installing, configuring and integrating a complex Security environment Experience with Security Analytics or Threat Intel is a plus Deep understanding of Unix/Linux and Windows operating systems and scripting skill in Python/JavaScript/PowerShell is an advantage Strong problem finding and solving skills, ability to analyze complex multivariate problems and use a systematic approach to gain quick resolution 8+ years of experience in a customer facing role Strong English language skills, both oral and written - Ability to confidently present with impact to an audience in person and remotely A team player - ability to share knowledge openly, interact with integrity, embrace diversity A Self-Starter, self-motivated and a quick learner with the ability to embrace change - the Cortex portfolio is always evolving and as a technical Specialist your expertise must be at the leading edge Additional Information The Team Palo Alto Networks has brought technology to market that is reshaping the cybersecurity threat and protection landscape. Our ability to protect digital transactions is limited only by our ability to establish relationships with our potential customers and help them understand how our products can protect their environments. You wont find someone at Palo Alto Networks that isnt committed to your success with everyone pitching in to assist when it comes to solutions selling, learning, and development. As a member of our systems engineering team, you are motivated by a solutions-focused sales environment and find fulfillment in working with clients to resolve incredible complex cyber threats.
Posted 2 weeks ago
3.0 - 8.0 years
10 - 14 Lacs
bengaluru
Work from Office
Your Career We are seeking a driven problem solver to join our Unit 42 MDR team. Our team is responsible for customers internal security monitoring, threat hunting and incident response. As a MDR Analyst, we will rely on you to detect and respond to cyber incidents facing customers internal business. The ideal candidate is a quick learner and good communicator who will be able to follow established processes for analyzing threat alerts that fire from our Cortex XDR. The candidate should be a creative thinker who takes pride in solving tough problems. Your Impact Join a new emerging team who is going to be part of Palo Altos Unit 42, Working closely with global customers providing the best security in the market Own an incident lifecycle from outbreak to full remediation Provide critical feedback to the different product, research and engineering and threat hunting teams to help improve the products for the entire Palo Alto Networks customer base Work closely with Security Research, Threat Intelligence and Threat Hunting teams to remediate and detect new emerging threats This position requires flexibility to work primarily during morning and afternoon hours however, occasional night shifts may be required depending on business demands Qualifications Your Experience 3+ years of experience in a multi tiered SOC/IR is a must Experienced with Technologies such as EDR, SIEM, SOAR, FW A well established familiarity with attack trends and vectors Excellent written and oral communication skills in English Some degree of Malware Analysis or equivalent military experience - An advantage CEH / CompTIA CYSA+ certifications - An advantage Hands-on experience with Cortex XSOAR or Cortex XDR - An advantage Additional Information The Team The team youll lead helps protect customers by identifying the most sophisticated & stealthy attacks in their environment. The team does so by leveraging the Cortex product suite as well as unique tools, methodologies and techniques. Cortex provides enterprise-scale detection and response that runs on integrated endpoint, network and cloud data reduce the noise and focus on real threats. This team works closely with the different product teams and helps improve each and every product by providing first-hand insights into how the product is used and how it can perform even better.
Posted 2 weeks ago
3.0 - 8.0 years
10 - 20 Lacs
gurugram
Work from Office
Your potential, unleashed. Indias impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilientnot only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks. Your work profile As an Assistant Manager in our Cyber Team, you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations:- Preferred Knowledge The role requires efficient incident response and digital forensics skills to minimize the impact of cyber risks. The individual will oversee Security monitoring, Security tools Operations, Security incidents, ensure incidents are managed effectively and reported to stakeholders. This role primarily consists of first responder activities and to conducting thorough response activities on behalf of a wide variety of clients across every sector. The role requires efficient incident response and digital forensics skills to minimize the impact of cyber risks. The individual will oversee Security monitoring, Security tools Operations, Security incidents, ensure incidents are managed effectively and reported to stakeholders. This role primarily consists of first responder activities and to conducting thorough response activities on behalf of a wide variety of clients across every sector. Demonstrates proven expertise and success in incident handling, triage of events, network analysis and threat detection, trend analysis. Should have the following skills: Deep understanding of computer intrusion activities, incident response techniques, tools, and procedures Knowledge of Windows, Active Directory, DNS & Linux operating systems, Good Experience in SIEM monitoring (QRadar, Sentinel) Knowledge of SOAR technologies, working with playbooks (Cortex, Phantom, Demisto) Working experience and knowledge of ITSM tools for incident management. Must be action oriented and have a proactive approach to solving issues. Knowledge of security logs, log quality review. Knowledge on IT (Operating systems, networking, databases) and IT security knowledge (system and network security) including IT security tools. Good knowledge of office collaboration tools Roles & Responsibilities Detect, Analyse, Investigate, and report qualified security incidents to the Client as per the defined SLA Provide recommendations to the security incidents reported as per SLA Investigates incidents using various security event sources (FW, IDS, PROXY, AD, EDR, DLP etc.). Investigations into non-standard incidents and execution of standard scenarios. Provide dashboard and data related to Incidents/Offenses for governance reports. Escalates to L3 if investigations uncover unusual or atypical situations. Monitoring unhealthy log source/data source and escalate to engineering team to fix them. Participate in incident response (IR) efforts; detect, identify, respond, contain and remediate all information security incidents. Rapidly and accurately determine the source of a security incident and moving quickly to identify and apply containment, mitigation, and remediation steps. Contribute to the execution of Cyber Security operations, incident response, and investigations spanning across all functions of the Corporate Security organization. Track, monitor incident actions while applying intelligence, situational awareness to prioritise incident actions based on risk Responsible for Incident and Breach communications, assessments, and reports and customer facing, to include leadership and executive management for the purpose of enabling Senior Management to make decisions in a crisis Develop and document processes to ensure consistent and scalable response operations Deliver tabletop IR assessments and real-life IR simulations at a technical and executive level. Conduct in-depth root cause analysis on complex malware and user/system behaviour event Gather and analyse forensic evidence for cyber security incidents and investigations. Develop and document enhanced event analysis and incident response processes and procedures. Required Knowledge Overall experience of at least 4+ years in SIEM monitoring and Cyber security Incident response and Management Hands-on experience with security tools and devices, operating systems, and/or networking devices desired. Proven skills and experience in log analysis, incident investigations Experience working across diverse teams to facilitate solutions Experience working with Security practitioners Willingness to working 24/7 environment in rotating shifts. Ability to work in time-sensitive and stressful situations with ease and professionalism, possess an efficient and versatile communication style Evidence handling Data acquisition (Disk, Memory, Mobile, Cloud, Enterprise Wide) Digital forensics (Windows, Mac OS, Linux/Unix) Thorough understanding of Cyber kill chain and MITRE ATT&CK framework. Experience with one or more of SIEM tools such as QRadar, Sentinel, etc... is required Experience on EDR tools for Incident response and threat hunting (Crowdstrike, MS Defender, Sentinel One) Strong knowledge and experience with commonly used forensic toolsets, including EnCase, FTK. Experience reviewing raw logs and performing advanced data correlation and analysis (i.e., firewall, network flow, IPS, endpoint protection, web application, host OS, database, AAA, etc) Experience of network & host-based forensic analysis and techniques Experience of malware analysis and understanding attack techniques. Industry certifications such as along with experience will be a bonus. Experience in lieu of certification will be taken into consideration Required Qualification Bachelor’s/Master’s Degree (Full-Time) Certifications Certifications like ECIH v2, CHFI, GCIH or GCIA is preferred. Abilities Strong English verbal, written communication, report writing and presentations skills. Ability to multitask and prioritize work effectively. Responsive to challenging tasking. Highly motivated self-starter giving attention to detail. Strong analytical skills and efficient problem solving. Capable to operate in a challenging and fast-paced environment. How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterized by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognize there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organization and the business area you’re applying to. Check out recruiting tips from Deloitte professionals.
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
maharashtra
On-site
Protect Threat is a trusted provider of advanced cybersecurity and IT services, empowering businesses to navigate today's evolving cyber landscape with confidence. Our mission is to protect organizations from threats, ensure compliance, and enable growth by delivering tailored cybersecurity strategies. We offer a comprehensive suite of services, including penetration testing, cloud security, threat intelligence, SOC-as-a-Service, and incident response, to safeguard digital assets and strengthen security posture. Protect Threat is seeking an experienced Security Operations Center (SOC) Architect / Consultant to help design, implement, and operationalize the SOC-as-a-Service offering. This is a contract consulting role with the potential for extension or transition into a long-term engagement based on project outcomes. The consultant will be responsible for setting up the SOC framework, tools, and processes to enable Protect Threat to deliver a scalable, multi-client SOC-as-a-Service. The role entails providing strategic guidance, hands-on technical execution, training internal teams, and guiding the evolution of managed SOC services. Key Responsibilities: - Assess organizational requirements and design a scalable SOC-as-a-Service architecture. - Recommend, deploy, and configure SIEM/SOAR solutions such as Wazuh, ELK, Splunk, QRadar, etc. - Define and implement incident response playbooks, escalation processes, and reporting frameworks. - Integrate log sources, threat intelligence feeds, and security automation workflows. - Ensure SOC operations align with industry standards and compliance frameworks like ISO 27001, PCI DSS, NIST, MITRE ATT&CK. - Provide knowledge transfer and training to internal teams for long-term SOC management. - Act as a trusted advisor, shaping Protect Threat's SOC-as-a-Service model and delivery capabilities. Qualifications: - Proven experience in SOC design, architecture, and consulting. - Strong expertise in SIEM, SOAR, log management, and security automation. - Knowledge of cybersecurity frameworks and compliance requirements. - Ability to work independently and deliver within contract timelines. - Excellent communication skills to engage with technical and business stakeholders. - Relevant certifications preferred (e.g., CISSP, CISM, CCSP, OSCP, SIEM-specific certifications). - Bachelor's or Master's degree in Cybersecurity, Information Technology, Computer Science, or related field. Engagement Details: - Engagement Type: Contract (initial consulting role) - Location: Remote / Hybrid (as per project needs) - Duration: Project-based (with possible extension) This role presents an excellent opportunity for a seasoned SOC professional who enjoys building security services from the ground up and wants to play a pivotal role in shaping Protect Threat's SOC-as-a-Service model. Interested consultants can apply directly here or share their profile at inquiries@protectthreat.com.,
Posted 2 weeks ago
8.0 - 12.0 years
0 Lacs
hyderabad, telangana
On-site
About the Company Cloud4C Services is a visionary Cloud Managed Services Provider (MSP) recognized in Gartner's Magic Quadrant (2021). With expertise in multi-cloud migration, management, and disaster recovery, we offer zero data loss guarantees and military-grade security under a single SLA. Operating in 25 countries, we cater to 4000+ global enterprises, including 60 Fortune 500 firms. As certified partners with Azure, AWS, GCP, and Oracle Cloud, we drive seamless digital transformation through our award-winning Hybrid Managed Services model. About the Role We are in search of a Lead Network & Security Engineer proficient in Cloud Hyperscalers (OCI/GCP) to oversee the design, implementation, and maintenance of secure, scalable, and resilient network architectures. The ideal candidate will possess a track record of leading technical teams, spearheading network and security projects, and ensuring adherence to enterprise standards and cloud best practices. Responsibilities Lead the development, deployment, and maintenance of enterprise-grade network & security solutions across OCI/GCP and hybrid environments. Design and oversee firewalls, VPNs, load balancers, IDS/IPS, routing, switching, and cloud-native security tools. Establish and enforce network security policies, compliance standards, and best practices. Collaborate with cloud architects, DevOps, and application teams to ensure secure and optimized connectivity. Take charge of incident response, troubleshooting, and root-cause analysis for network/security incidents. Mentor and provide guidance to junior engineers, promoting knowledge sharing and technical advancement. Assess and integrate new network and security technologies to bolster the organization's cloud security posture. Qualifications Possess 8+ years of IT Infrastructure experience with a focus on network & security engineering. Demonstrate expertise in Hyperscalers (OCI/GCP), encompassing VCN/VPC, subnets, routing, peering, cloud firewalls, and cloud-native security services. Show proficiency in Cisco, Juniper, Checkpoint, Palo Alto, and Fortinet technologies. Hands-on experience with SD-WAN, Zero Trust Network Access (ZTNA), and cloud security tools. Expertise in TCP/IP, DNS, DHCP, VPN, MPLS, BGP, OSPF, SSL/TLS, IPSec. Familiarity with IAM, SIEM, SOAR, endpoint security, and compliance frameworks (ISO 27001, PCI-DSS, GDPR, etc.). Possess exceptional troubleshooting skills to address complex incidents. Previous experience in team leadership or technical lead roles. Required Skills 8+ years of IT Infrastructure experience focusing on network & security engineering. Proven expertise in Hyperscalers (OCI/GCP), covering VCN/VPC, subnets, routing, peering, cloud firewalls, and cloud-native security services. Strong knowledge of Cisco, Juniper, Checkpoint, Palo Alto, and Fortinet technologies. Hands-on experience with SD-WAN, Zero Trust Network Access (ZTNA), and cloud security tools. Expertise in TCP/IP, DNS, DHCP, VPN, MPLS, BGP, OSPF, SSL/TLS, IPSec. Familiarity with IAM, SIEM, SOAR, endpoint security, and compliance frameworks (ISO 27001, PCI-DSS, GDPR, etc.). Exceptional troubleshooting skills with the ability to resolve intricate incidents. Previous involvement in team leadership or technical lead positions. Preferred Skills Hold certifications such as OCI Architect, Google Professional Cloud Network Engineer, CCNP Security, CISSP, or equivalent. Experience in multi-cloud networking and hybrid cloud security. Knowledge of automation/scripting (Python, Terraform, Ansible) for network operations.,
Posted 2 weeks ago
15.0 - 20.0 years
3 - 7 Lacs
chennai
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Accenture MxDR Ops Security Threat Analysis Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. You will provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Be a crucial part of ensuring the security of the organization's digital assets and operations. Roles & Responsibilities:Perform security monitoring by analyzing logs, traffic and alerts generated by variety of device technologiesTimely response to customer requests like detection capabilities, tuning.Research new threats and provide recommendations to enhance detection capabilitiesStrong desire for continuous learning on vulnerabilities, attacks and countermeasures Identify opportunities for process improvement Professional & Technical Skills: Experience in SOC operations with customer-facing responsibilitiesDeep understanding on cyber security fundamentals, security devices, network defense concepts and threat landscapeHands-on experience in SIEM and threat hunting tools Added advantage in working with any SOAR platformDesirable knowledge in any scripting language and EDR productsPreferable GCIA, GCFA, CISSPStrong customer service and interpersonal skillsStrong problem-solving skillsAbility to communicate clearly at all levels, demonstrating strong verbal and written communication skills.Adaptability to accept change Additional Information:Work as part of analysis team that works 24x7 on a rotational shift The candidate should have minimum 2 years of experience This position is based at our Chennai office.A 15 year full time education is required. Qualification 15 years full time education
Posted 2 weeks ago
3.0 - 7.0 years
12 - 16 Lacs
bengaluru
Work from Office
Your Career You will work firsthand with our valued customers to address their complex post-sales concerns where analysis of situations or data requires an in-depth evaluation of many factors. Youre a critical thinker in understanding the methods, techniques, and evaluation criteria for obtaining results. Youll enjoy networking with key contacts outside your own area of expertise, with a strong capability of detailing difficult technical issues to both non-technical and technical professionals. You will regularly participate in technical discussions with multi-functional teams, creating an environment of transparency that ultimately leads to better products, better working environments, and better cybersecurity. Your quick thinking and support to our clients provides the fast assistance they need to keep their environments secure which means youll need to move quickly, thoughtfully, and provide technical assistance as needed (often, in high pressure situations). We are looking for a highly motivated and customer-focused professional. As part of the global Cortex XDR support team, you will serve our customer base by providing technical support, by answering incoming support inquiries, and managing escalations, phone calls, and emails in an effective, efficient, and friendly manner within defined service level agreements. Your Impact Respond to user-reported issues in adherence to established Service Level Agreements Triage customer reported issues and respond to them via ticketing system, phone or remote sessions Perform advanced troubleshooting at the application level and OS level, using your knowledge and relevant expertise Identify the area of fault (code, environment, or configuration) and work with the appropriate team(s) to implement the fix Provide timely feedback on the development process on customer-reported product problems Document actions to effectively communicate information internally and to customers Facilitate root cause investigations and manage the implementation of corrective and preventative measures Qualifications Your Experience BE/B.Tech engineering, equivalent technical degree or equivalent military experience required 5 to 10 years of relevant experience with strong communication and customer service skills Required experience with Windows OS, Linux OS and macOS based applications (Installation, troubleshooting, Debugging) Endpoint security technologies experience (XDR, SOAR, SIEM, etc.) Experience understanding malware, exploits, operating system structure, and behavior Experience with Android OS based applications (Installation, troubleshooting, Debugging) Strong experience with MS environment (SCCM, GPO, AD, MSSQL, IIS) Experience with EndPoint security software is a plus (Antivirus, DLP, IPS, NAC) Knowledge of SIEM, vulnerability management tools, and firewalls Good to have skills: Experience with bash scripting OR Python is a plus Strong ability to independently troubleshoot, reproduce issues and identify possible workarounds in broad, complex, and unique environments with mixed applications and protocols required Knowledge of Cloud infrastructure is a plus Knowledge of VDI (VMWare Horizon, Citrix XenApp, and XenDesktop) is a plus Additional Information The Team Our Global Customer Support team is critical to our success and mission. As part of this team, you enable customer success by providing support to clients after they have purchased our products. Our dedication to our customers doesnt stop once they sign it evolves. As threats and technology change, we stay in step to accomplish our mission.
Posted 2 weeks ago
6.0 - 11.0 years
25 - 30 Lacs
mumbai
Work from Office
Your Career As a Pre-Sales Systems Engineer, you are an important member of our technical sales team, identifying complex security challenges in your customers networks and driving solutions with our market-leading security products and services. You are the technical sales representative of the company and focus on customer satisfaction with all that you do. You and your sales partner own the customer relationship and your goal is to help them detect and prevent advanced cyberattacks and breaches while safely enabling applications by deploying the full Palo Alto Networks platform so that they can confidently pursue network, cloud, and mobile technology initiatives. Your Impact Understand and effectively present our security platform and solutions Work closely with Enterprise customers in West India Create and deliver compelling demonstrations of Palo Alto Networks products and solutions Educate customers and partners on the modern network security landscape Identify and qualify new opportunities and support technical pre-sales activities to opportunity closure Expand the Palo Alto Networks install base within existing accounts Enable and leverage channel partners and work successfully in a channel-driven sales model Create evaluation test plans with customers and lead the evaluation process to a successful conclusion Differentiate from industry technologies and solution Assist customers through the support escalation process Continuous self-improvement and learning to maintain current technical knowledge and participate in technical communities of interest Identify problems in customer environments - effectively engages customers at the technical field and technical management levels Effective in customer-facing engagement, in writing, presentation, and creative problem-solving skills Qualifications Your Experience BSCS or equivalent or equivalent military experience required and 6+ years of experience as a Pre-Sales Systems Engineer or Solution Consultant or Sales Engineer or Systems Integrator Techno-Commercial Pre-sales experience handling solutions around Network Security (NGFW, IPS/IDS, WAF, DNS security etc), Cloud Security (CNAP, CWPP, WAAS etc), Secops (EDR/XDR, SOAR, SIEM, Threat Management, SOC etc) Pre-sales experience handling Enterprise customers in Indonesia Demonstrable experience with systems installation, configuration, and administration of routers/switches, UNIX/Linux and Windows-based systems (prior Active Directory/LDAP experience desirable) Experience emphasizing L2-L4 Networking (L2 Switching architectures including Spanning Tree, IP routing including OSPF and BGP, L4 Load-balancing) Industry knowledge of security and network product and technology trends Experience selling, demonstrating, installing and/or solving network infrastructure security products Extensive domestic travel within the territory is often required, and international travel may be required as necessary Experience selling network infrastructure based security appliances including, but not limited to - Firewalls, SSL/IPSec VPNs, Security Proxies and Caches Practical experience working with routing and switching products that will be installed adjacent to our appliances Strong communication and presentation skills, both written and verbal Strong analytical skills, ability to analyze complex multivariate problems and use a systematic approach to gain quick resolution Additional Information The Team As part of our Systems Engineering team, youll support the sales team with technical expertise and guidance when establishing trust with key clients. You wont find someone at Palo Alto Networks that isnt committed to your success with everyone pitching in to assist when it comes to solutions selling, learning, and development. As a member of our systems engineering team, you are motivated by a solutions-focused sales environment and find fulfillment in working with clients to resolve incredible complex cyberthreats.
Posted 2 weeks ago
8.0 - 12.0 years
10 - 15 Lacs
bengaluru
Work from Office
Your Career We are seeking a seasoned Channel Systems Engineer for the dynamic India South Region. This critical role enhances the technical proficiency and market penetration of our channel partners. You will empower partners to present, demonstrate, and implement state-of-the-art cybersecurity platforms, serving as a trusted advisor to expand their customer base and deliver unparalleled value. As the go-to technical expert, you will help partners redefine their approach to cybersecurity, establishing mindshare for our solutions. You will be the trusted technical advisor for all aspects of modern cybersecurity, covering SASE, Security Operations, and cloud security across CSPs. Your Impact Drive Partner Technical Empowerment: Collaborate with Alliance Managers to foster business growth. Equip partners with technical acumen for effective value articulation, demonstrations, deployments, and ongoing solution support Ensure Continuous Development: Facilitate continuous professional development for partner resources on our technology platforms and competitive landscape. Guide partners toward technical autonomy using partner portal, evaluation tools and resources, NFRs, and POC/POV methodologies. Achieve Technical Excellence: Mentor partners to attain technical accreditation and certification. Provide expert guidance for developing novel solutions and managed service offerings Align Go-to-Market Strategies: Assist partners in aligning GTM strategies to maximize collaborative opportunities Cultivate Sales Opportunities: Ensure partners identify, qualify, and lead joint opportunities, providing essential technical guidance. Facilitate value proposition communication between internal and partner teams Proactively Drive Engagements: Drive strategic and high-value opportunities with partners along with internal account teams Lead Events & Workshops: Actively participate in partner-hosted customer workshops to lead product demonstrations and interactive sessions Serve as Key Liaison: Act as a crucial liaison between partners and our Sales/Solution Consultants teams to mitigate challenges, streamline deal cycles, and identify avenues for partner value addition Qualifications Your Experience 8-12 years demonstrated success in a technical capacity (Solutions Engineer, Sales Engineer, Channel/Partner Systems Engineer), with strong experience generating new business through Channel Partners and Managed Service Providers Technical Expertise: Mandatory expertise in at least one of the following critical technology domains: SASE (Secure Access Service Edge): Deep understanding of SSE, CSPM, CASB, DLP, SWG, FWaaS, ZTNA, and SD-WAN technologies Security Operations (SecOps): Extensive experience with EDR, XDR (endpoint, network, cloud, identity), SIEM & SOAR platforms, Threat Intelligence platforms, Threat Hunting, and Vulnerability Management Personal Attributes: Highly self-motivated, meticulously organized, and comfortable operating autonomously across multiple engagements in a dynamic environment, demonstrating the ability to prioritize effectively with minimal oversight Robust problem-solving skills, employing a methodical approach to analyze intricate scenarios and achieve rapid resolutions Education & Professional Certifications: A Bachelor/Masters of Engineering degree or an equivalent qualification is a prerequisite Relevant industry certifications such as CEH, CISSP, OSCP, SANS, or similar credentials are highly valued Additional Information The Team Our Sales team members work hand in hand with large organizations around the world to keep their digital environments protected. We educate, inspire, and empower our potential clients in their journey to security. As part of our Sales team, you are empowered with unmatched systems and tools, constantly updated research and sales libraries, and a team built on joint success. You wont find someone at Palo Alto Networks who isnt committed to your success everyone pitches in to assist when it comes to solutions selling, learning, and development. As a member of our Sales team, you are motivated by a solutions-focused sales environment and find fulfillment in working with clients to resolve incredibly complex cyberthreats.
Posted 2 weeks ago
3.0 - 8.0 years
10 - 14 Lacs
bengaluru
Work from Office
Your Career We are seeking a driven problem solver to join our Unit 42 MDR team. Our team is responsible for customers internal security monitoring, threat hunting and incident response. As a MDR Analyst, we will rely on you to detect and respond to cyber incidents facing customers internal business. The ideal candidate is a quick learner and good communicator who will be able to follow established processes for analyzing threat alerts that fire from our Cortex XDR. The candidate should be a creative thinker who takes pride in solving tough problems. Your Impact Join a new emerging team who is going to be part of Palo Altos Unit 42, Working closely with global customers providing the best security in the market Own an incident lifecycle from outbreak to full remediation Provide critical feedback to the different product, research and engineering and threat hunting teams to help improve the products for the entire Palo Alto Networks customer base Work closely with Security Research, Threat Intelligence and Threat Hunting teams to remediate and detect new emerging threats This position requires flexibility to work primarily during morning and afternoon hours however, occasional night shifts may be required depending on business demands Qualifications Your Experience 3+ years of experience in a multi tiered SOC/IR is a must Experienced with Technologies such as EDR, SIEM, SOAR, FW A well established familiarity with attack trends and vectors Excellent written and oral communication skills in English Some degree of Malware Analysis or equivalent military experience - An advantage CEH / CompTIA CYSA+ certifications - An advantage Hands-on experience with Cortex XSOAR or Cortex XDR - An advantage Additional Information The Team The team youll lead helps protect customers by identifying the most sophisticated & stealthy attacks in their environment. The team does so by leveraging the Cortex product suite as well as unique tools, methodologies and techniques.
Posted 2 weeks ago
5.0 - 10.0 years
7 - 14 Lacs
bengaluru
Work from Office
Your Career You will work firsthand with our valued customers to address their complex post-sales concerns where analysis of situations or data requires an in-depth evaluation of many factors. Youre a critical thinker in understanding the methods, techniques, and evaluation criteria for obtaining results. Youll enjoy networking with key contacts outside your own area of expertise, with a strong capability of detailing difficult technical issues to both non-technical and technical professionals. You will regularly participate in technical discussions with multi-functional teams, creating an environment of transparency that ultimately leads to better products, better working environments, and better cybersecurity. Your quick thinking and support to our clients provides the fast assistance they need to keep their environments secure which means youll need to move quickly, thoughtfully, and provide technical assistance as needed (often, in high pressure situations). We are looking for a highly motivated and customer-focused professional. As part of the global Cortex XDR support team, you will serve our customer base by providing technical support, by answering incoming support inquiries, and managing escalations, phone calls, and emails in an effective, efficient, and friendly manner within defined service level agreements. Your Impact Respond to user-reported issues in adherence to established Service Level Agreements Triage customer reported issues and respond to them via ticketing system, phone or remote sessions Perform advanced troubleshooting at the application level and OS level, using your knowledge and relevant expertise Identify the area of fault (code, environment, or configuration) and work with the appropriate team(s) to implement the fix Provide timely feedback on the development process on customer-reported product problems Document actions to effectively communicate information internally and to customers Facilitate root cause investigations and manage the implementation of corrective and preventative measures Qualifications Your Experience BE/B.Tech engineering, equivalent technical degree or equivalent military experience required 5 to 10 years of relevant experience with strong communication and customer service skills Required experience with Windows OS, Linux OS and macOS based applications (Installation, troubleshooting, Debugging) Endpoint security technologies experience (XDR, SOAR, SIEM, etc.) Experience understanding malware, exploits, operating system structure, and behavior Experience with Android OS based applications (Installation, troubleshooting, Debugging) Strong experience with MS environment (SCCM, GPO, AD, MSSQL, IIS) Experience with EndPoint security software is a plus (Antivirus, DLP, IPS, NAC) Knowledge of SIEM, vulnerability management tools, and firewalls Good to have skills: Experience with bash scripting OR Python is a plus Strong ability to independently troubleshoot, reproduce issues and identify possible workarounds in broad, complex, and unique environments with mixed applications and protocols required Knowledge of Cloud infrastructure is a plus Knowledge of VDI (VMWare Horizon, Citrix XenApp, and XenDesktop) is a plus
Posted 2 weeks ago
6.0 - 10.0 years
5 - 9 Lacs
bengaluru
Work from Office
At Sogeti, we believe the best is inside every one of us. Whether you are early in your career or at the top of your game, well encourage you to fulfill your potentialto be better. Through our shared passion for technology, our entrepreneurial culture , and our focus on continuous learning, well provide everything you need to doyour best work and become the best you can be. Your Role Lead deployment, configuration, and management of endpoint protection platforms across multiple operating systems. Troubleshoot and resolve endpoint security issues including incident investigation, log analysis, and vulnerability remediation. Develop and enforce endpoint security policies, procedures, and best practices. Collaborate with SOC and threat detection teams to enhance incident response and threat mitigation. Coordinate with infrastructure and IT teams for lifecycle operations and seamless integration of security tools. Participate in security audits and support compliance initiatives aligned with standards like NIST, ISO 27001, and GDPR. Provide mentorship and training to junior team members on endpoint security tools and practices. Monitor health and performance of endpoint agents and sensors to ensure optimal operation. Automate manual processes using scripting languages and build dashboards for analytics and reporting. Manage endpoint protection project milestones and deliverables, ensuring timely execution. Handle operational tasks and lead ITIL-based incident, problem, and change management processes. Maintain detailed documentation including SOPs, technical guides, incident reports, and audit logs. Works in the area of Software Engineering, which encompasses the development, maintenance and optimization of software solutions/applications.1. Applies scientific methods to analyse and solve software engineering problems.2. He/she is responsible for the development and application of software engineering practice and knowledge, in research, design, development and maintenance.3. His/her work requires the exercise of original thought and judgement and the ability to supervise the technical and administrative work of other software engineers.4. The software engineer builds skills and expertise of his/her software engineering discipline to reach standard software engineer skills expectations for the applicable role, as defined in Professional Communities.5. The software engineer collaborates and acts as team player with other software engineers and stakeholders. Your profile Hands-on experience with Trellix ePO, Microsoft Defender, and other EDR platforms. Deep knowledge of securing Windows, Linux, macOS, and iOS environments. Strong grasp of GPO, Intune, and regulatory standards like GDPR and ISO 27001. Proficiency in PowerShell/Python for automation and troubleshooting. Skilled in log analysis, threat detection, and use of KQL and SIEM/SOAR tools. What you will love about working here We recognize the significance of flexible work arrangements to provide support. Be it remote work, or flexible work hours, you will get an environment to maintain healthy work life balance. At the heart of our mission is your career growth. Our array of career growth programs and diverse professions are crafted to support you in exploring a world of opportunities. Equip yourself with valuable certifications in the latest technologies such as Generative AI. Part of the Capgemini Group, Sogeti makes business value through technology for organizations that need to implement innovation at speed and want a localpartner with global scale. With a hands-on culture and close proximity to its clients, Sogeti implements solutions that will help organizations work faster, better, andsmarter. By combining its agility and speed of implementation through a DevOps approach, Sogeti delivers innovative solutions in quality engineering, cloud andapplication development, all driven by AI, data and automation.
Posted 2 weeks ago
2.0 - 7.0 years
0 Lacs
mumbai, maharashtra, india
On-site
Location: Mumbai Are you passionate about cybersecurity and ready to make an impact Join our team at QOS Technology Pvt Ltd, where innovation and security go hand in hand. We are looking for a Senior Implementation Engineer to lead the design, implementation, and optimization of security solutions for our clients. In this role, youll work alongside a talented team to protect sensitive information and systems while staying ahead of emerging threats. Key Responsibilities: - Lead the implementation of cutting-edge security technologies and solutions. - Work with cross-functional teams to ensure secure architecture for IT systems. - Troubleshoot and resolve security-related issues in a timely manner. - Stay up-to-date with industry trends, emerging threats, and regulatory changes. What Were Looking For: - 2 to 7 years of experience in security engineering or IT security implementation of Firewall/SIEM/SOAR. - Expertise in Technologies like Firewall(Check Point/Palo Alto/Fortinet), SIEM(Splunk/RSA Netwitness) & SOAR. - Experience with security frameworks (NIST, ISO 27001, etc.) and regulatory standards. - Excellent problem-solving skills and a proactive approach to threat mitigation. - Certifications such as CISSP, CISM, CEH, or similar are highly desirable. Mandatory Skills: - Strong knowledge on Networking basics. - Strong knowledge on SIEM & SOAR. - Strong knowledge on security implementations. - Excellent presentation/verbal/written skills. Why Join Us - Team of motivated, fun and creative minds - Collaborative and dynamic environment. - Opportunities for growth and professional development. If youre ready to take your career to the next level and help safeguard the future of security, apply today or by sending your resume to [HIDDEN TEXT] Show more Show less
Posted 3 weeks ago
10.0 - 15.0 years
3 - 7 Lacs
bengaluru
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Managed Cloud Security Services Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for an experienced and detail-oriented Security Delivery Associate Manager to support the planning, implementation, and delivery of cybersecurity services across Microsoft security technologies. will play a key role in delivering secure, scalable, and compliant security solutions for internal stakeholders or clients. Roles & responsibilities:The ideal candidate will have practical expertise in Microsoft Sentinel, Cribl, Logstash, Devops, Terraform, Logsource onboarding, ASIM Parsing Deliver security solutions using Microsofts security stack, with a focus on Microsoft Sentinel Platform Management.Translate business and technical requirements into well-architected security solutions and support delivery from design to deployment.Managing Cluster with multiple clients Lead and manage cross-functional teams, ensuring effective collaboration, communication, and alignment with business objectives. Responsible for team decisions.Engage with multiple teams and contribute on key decisions.Develop and implement security strategies.Conduct security assessments and audits.Stay updated on the latest security trends and technologies.Configure and fine-tune Microsoft Sentinel, develop analytics rules, workbooks, playbooks, and maintain alerting mechanisms.Coordinate with engineering, operations, and risk teams to ensure consistent and secure delivery of services.Create technical documentation, deployment guides, and knowledge transfer materials for clients or internal teams.Collaborate with project managers and stakeholders to ensure timely and successful delivery of security services.Contribute to continuous improvement initiatives and automation of delivery processes. Professional & Technical Skills: Strong client-facing and stakeholder engagement capabilities.Excellent organizational and project coordination skills.Ability to clearly communicate technical information to both technical and non-technical audiences.Proactive mindset with a focus on security service quality and consistency.Experience working in delivery frameworks such as Agile, ITIL. Microsoft Sentinel:Hands-on experience with SIEM/SOAR, including KQL query development, alert tuning, and automation with Logic Apps.Configure and fine-tune Microsoft Sentinel, develop analytics rules, workbooks, playbooks, and maintain alerting mechanisms.Able to manage key vault and secret rotation Required knowledge Entra ID management.Required knowledge in Log source optimizationASIM parsing and normalizationManaging Cribl and Logstash pipeline for log source onboarding.Strong understanding of incident response and threat management.Familiarity with scripting (PowerShell, KQL), infrastructure-as-code, and automation tools is a plus.Able to manage requests, incidents, and changes on ServiceNow as per service management process.Required active participation/contribution in team discussionsTo be a part of audits and service improvement activities within the teamSentinel data modelling experienceExperience in designing and implementing security solutions. Deliver security solutions using Microsofts security stack, with a focus on Microsoft Defender for Cloud, Endpoint, Identity, Azure Firewall, and Microsoft Sentinel.Implement and operationalize MDC for cloud security posture management and workload protection.Support deployment and ongoing management of MDE for endpoint threat detection and response.Integrate MDI into customer environments to monitor identity-related threats and provide remediation recommendations.Knowledge of network security protocols and best practices.Hands-on experience with security tools and technologies. Additional Information:The candidate should have a minimum of 10+ years of experience in Managed Cloud Security Services.This position will be operated from Bengaluru location.A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
15.0 - 20.0 years
13 - 17 Lacs
bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Managed Cloud Security Services Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Senior Security Engineer your typical day will involve security platform related activities on Microsoft Sentinel, providing end to end investigation on health monitoring and platform monitoring. You will also engage in proactive monitoring of security systems to analyze and respond to incidents effectively and normalize the log source and use case finetuning activities. Roles & Responsibilities:- Develop and deploy use case -New log source onboarding to SIEM-Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular security assessments and audits to identify gaps in the configuration and detections of false positives.- Develop and implement security policies and procedures to safeguard information, inclusive of optimization of analytic rules. Professional & Technical Skills- Microsoft Sentinel:Hands-on experience with SIEM/SOAR, including KQL query development, alert tuning, and automation with Logic Apps.- Expertise in Devops and Terraform to mange pipeline and infrastructure deployment.-Platform and Healthmonitorng incident investigation and deployment. -Required knowledge Entra ID management.-Managing Cribl and Logstash pipeline for log source onboarding.-Strong understanding of incident response and threat management.-Experience with security monitoring tools and technologies.-Able to manage requests, incidents, and changes on ServiceNow as per service management process.-Familiarity with scripting (PowerShell, KQL), infrastructure-as-code, and automation tools is a plus.-Required active participation/contribution in team discussions-To be a part of audits and service improvement activities within the team- threat hunting, MDE and use case engineering experience- Knowledge of security frameworks like MITRE.- Deliver security solutions using Microsofts security stack, with a focus on Microsoft Defender for Cloud, Endpoint, Identity, Azure Firewall, and Microsoft Sentinel.-Implement and operationalize MDC for cloud security posture management and workload protection.-Support deployment and ongoing management of MDE for endpoint threat detection and response.-Integrate MDI into customer environments to monitor identity-related threats and provide remediation recommendations.- Ability to analyze security incidents from L2/L3 perspective as well as developing effective response strategies.-Knowledge of network security protocols and best practices. Additional Information:- The candidate should have minimum 6 years of experience in Microsoft Azure Security suite.- This position will be operated from Bengaluru location.-A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
7.0 - 12.0 years
5 - 9 Lacs
bengaluru
Work from Office
Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : Managed Cloud Security Services Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for an experienced and detail-oriented Security Delivery Specialist to support the planning, implementation, and delivery of cybersecurity services across Microsoft security technologies. The ideal candidate will have practical expertise in Microsoft Sentinel, Cribl, Logstash, Devops, Terraform will play a key role in delivering secure, scalable, and compliant security solutions for internal stakeholders or clients. Roles & responsibilities:Deliver security solutions using Microsofts security stack, with a focus on Microsoft Sentinel Platform Management.Translate business and technical requirements into well-architected security solutions and support delivery from design to deployment.Configure and fine-tune Microsoft Sentinel, develop analytics rules, workbooks, playbooks, and maintain alerting mechanisms.Coordinate with engineering, operations, and risk teams to ensure consistent and secure delivery of services.Create technical documentation, deployment guides, and knowledge transfer materials for clients or internal teams.Collaborate with project managers and stakeholders to ensure timely and successful delivery of security services.Contribute to continuous improvement initiatives and automation of delivery processes. Professional & Technical Skills: Strong client-facing and stakeholder engagement capabilities.Excellent organizational and project coordination skills.Ability to clearly communicate technical information to both technical and non-technical audiences.Proactive mindset with a focus on security service quality and consistency.Experience working in delivery frameworks such as Agile, ITIL.Microsoft Sentinel:Hands-on experience with SIEM/SOAR, including KQL query development, alert tuning, and automation with Logic Apps.Able to manage key vault and secret rotation Azure Devops, Github, CICD, Terraform.Required knowledge Entra ID management.Managing Cribl and Logstash pipeline for log source onboarding.Strong understanding of incident response and threat management.Experience with security monitoring tools and technologies.Able to manage requests, incidents and changes on ServiceNow as per service management process.Familiarity with scripting (PowerShell, KQL), infrastructure-as-code, and automation tools is a plus.Required active participation/contribution in team discussionsTo be a part of audits and service improvement activities within the teamthreat hunting, MDE and use case engineering experienceKnowledge of network security protocols and best practices.Experience in designing and implementing security solutions. Deliver security solutions using Microsofts security stack, with a focus on Microsoft Defender for Cloud, Endpoint, Identity, Azure Firewall, and Microsoft Sentinel.Implement and operationalize MDC for cloud security posture management and workload protection.Support deployment and ongoing management of MDE for endpoint threat detection and response.Integrate MDI into customer environments to monitor identity-related threats and provide remediation recommendations.Knowledge of network security protocols and best practices. Additional Information:The candidate should have a minimum of 7+ years of experience in Managed Cloud Security Services.This position will be operated from Bengaluru location.A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
10.0 - 15.0 years
3 - 7 Lacs
bengaluru
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Managed Cloud Security Services Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for an experienced and detail-oriented Security Delivery Associate Manager to support the planning, implementation, and delivery of cybersecurity services across Microsoft security technologies. will play a key role in delivering secure, scalable, and compliant security solutions for internal stakeholders or clients. Roles & responsibilities:The ideal candidate will have practical expertise in Microsoft Sentinel, Cribl, Logstash, Devops, Terraform, Logsource onboarding, ASIM Parsing Deliver security solutions using Microsofts security stack, with a focus on Microsoft Sentinel Platform Management.Translate business and technical requirements into well-architected security solutions and support delivery from design to deployment.Managing Cluster with multiple clients Lead and manage cross-functional teams, ensuring effective collaboration, communication, and alignment with business objectives. Responsible for team decisions.Engage with multiple teams and contribute on key decisions.Develop and implement security strategies.Conduct security assessments and audits.Stay updated on the latest security trends and technologies.Configure and fine-tune Microsoft Sentinel, develop analytics rules, workbooks, playbooks, and maintain alerting mechanisms.Coordinate with engineering, operations, and risk teams to ensure consistent and secure delivery of services.Create technical documentation, deployment guides, and knowledge transfer materials for clients or internal teams.Collaborate with project managers and stakeholders to ensure timely and successful delivery of security services.Contribute to continuous improvement initiatives and automation of delivery processes. Professional & Technical Skills: Strong client-facing and stakeholder engagement capabilities.Excellent organizational and project coordination skills.Ability to clearly communicate technical information to both technical and non-technical audiences.Proactive mindset with a focus on security service quality and consistency.Experience working in delivery frameworks such as Agile, ITIL. Microsoft Sentinel:Hands-on experience with SIEM/SOAR, including KQL query development, alert tuning, and automation with Logic Apps.Configure and fine-tune Microsoft Sentinel, develop analytics rules, workbooks, playbooks, and maintain alerting mechanisms.Able to manage key vault and secret rotation Required knowledge Entra ID management.Required knowledge in Log source optimizationASIM parsing and normalizationManaging Cribl and Logstash pipeline for log source onboarding.Strong understanding of incident response and threat management.Familiarity with scripting (PowerShell, KQL), infrastructure-as-code, and automation tools is a plus.Able to manage requests, incidents, and changes on ServiceNow as per service management process.Required active participation/contribution in team discussionsTo be a part of audits and service improvement activities within the teamthreat hunting, MDE and use case engineering experienceExperience in designing and implementing security solutions. Deliver security solutions using Microsofts security stack, with a focus on Microsoft Defender for Cloud, Endpoint, Identity, Azure Firewall, and Microsoft Sentinel.Implement and operationalize MDC for cloud security posture management and workload protection.Support deployment and ongoing management of MDE for endpoint threat detection and response.Integrate MDI into customer environments to monitor identity-related threats and provide remediation recommendations.Knowledge of network security protocols and best practices.Hands-on experience with security tools and technologies. Additional Information:The candidate should have a minimum of 10+ years of experience in Managed Cloud Security Services.This position will be operated from Bengaluru location.A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
15.0 - 20.0 years
13 - 17 Lacs
bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Managed Cloud Security Services Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Platform engineering lead you will design, implement, and manage Microsoft Sentinel security solutions including analytics rules and automation workflows. Collaborate across teams to align threat detection and response with compliance, while ensuring integration with Microsoft and third-party security tools. Roles & Responsibilities:-Design and implement Microsoft Sentinel solutions including workspace configuration, data ingestion, and role-based access control.-Develop and tune analytics rules, workbooks, and hunting queries using KQL (Kusto Query Language).-Integrate various log sources (Azure, Microsoft 365, on-premise systems, third-party security tools) using built-in and custom connectors.-Create custom workbooks and dashboards for security visibility, KPIs, and executive reporting.-Build and maintain automation workflows using Logic Apps for incident enrichment, notification, and response.-Collaborate with SOC teams, cloud architects, and compliance teams to align monitoring with threat models and regulatory requirements.-Participate in incident response by investigating and analyzing alerts and security events within Sentinel.-Ensure integration with Microsoft Defender Suite (MDE, MDI, MDC, O365) and third-party SIEM/SOAR tools as needed.-Provide documentation, knowledge transfer, and ongoing Sentinel tuning and support. Professional & Technical Skills: - Must Have Skills: Proficiency in Microsoft Azure Security, including Microsoft sentinel, Microsoft Defender XDR and KQL and have a good understanding of Microsoft Defender solution platform for MDE, MDI, XDR, MDA and MDO. Must have capability to develop sentinel bases solutions with KQL queries.- Good to have Skills: Google SecOps MxDR solution.- Strong understanding of cloud security principles and best practices.- Experience with security tools and technologies on Microsoft Azure. Multi-Cloud experience will be additional.- Knowledge of security frameworks like MITRE.- Ability to analyze and develop use cases L3 perspective as well as developing effective response strategies. Additional Information:- The candidate should have minimum 5 years of experience in Microsoft Azure Security suite.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
15.0 - 20.0 years
3 - 7 Lacs
chennai
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Accenture MxDR Ops Security Threat Analysis Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply your security skills to design, build, and protect enterprise systems, applications, data, assets, and people. Your typical day will involve collaborating with various teams to implement security measures, conducting assessments to identify vulnerabilities, and ensuring that the organization's information and infrastructure are safeguarded against potential cyber threats. You will also engage in continuous learning to stay updated on the latest security trends and technologies, contributing to a secure environment for all stakeholders. Roles & Responsibilities:Perform security monitoring by analyzing logs, traffic and alerts generated by variety of device technologiesTimely response to customer requests like detection capabilities, tuning.Research new threats and provide recommendations to enhance detection capabilitiesStrong desire for continuous learning on vulnerabilities, attacks and countermeasures Identify opportunities for process improvement Professional & Technical Skills: Experience in SOC operations with customer-facing responsibilitiesDeep understanding on cyber security fundamentals, security devices, network defense concepts and threat landscapeHands-on experience in SIEM and threat hunting tools Added advantage in working with any SOAR platformDesirable knowledge in any scripting language and EDR productsPreferable GCIA, GCFA, CISSPStrong customer service and interpersonal skillsStrong problem-solving skillsAbility to communicate clearly at all levels, demonstrating strong verbal and written communication skills.Adaptability to accept change Additional Information:Work as part of analysis team that works 24x7 on a rotational shift Minimum a bachelors or a masters degree in addition to regular 15- year full time educationThe candidate should have minimum 2 years of experience This position is based at our Chennai office. Qualification 15 years full time education
Posted 3 weeks ago
7.0 - 12.0 years
11 - 16 Lacs
mumbai
Work from Office
SUMMARY Our client is IT MNC part of one of the major insurance groups based out of Germany and Europe. The Group is represented in around 30 countries worldwide, with Over 40,000 people worldwide, focusing mainly on Europe and Asia. Our client offers a comprehensive range of insurances, pensions, investments and services by focusing on all cutting edge technologies majorly on Could, Digital, Robotics Automation, IoT, Voice Recognition, Big Data science, advanced mobile solutions and much more to accommodate the customers future needs around the globe thru supporting millions of internal and external customers with state of-the-art IT solutions to everyday problems & dedicated to bringing digital innovations to every aspect of the landscape of insurance. Job Location: Hiranandani Gardens, Powai, Mumbai Mode: Work from Office Requirements Key Responsibilities: : Business-Cybersecurity Alignment: o Work closely with business stakeholders, IT security teams, and cross-functional teams to ensure cybersecurity initiatives align with the organization’s broader business goals. o Translate business needs into technical security requirements that can be effectively executed by the security and IT teams. Risk Analysis & Security Assessments: o Conduct risk assessments in the context of hybrid IT environments (cloud, on-premises, and edge) to identify security gaps and vulnerabilities. o Collaborate with security teams to evaluate existing security controls and recommend solutions to mitigate identified risks, balancing business needs with security requirements. Cybersecurity Frameworks & Compliance: o Ensure that all business and technical security requirements comply with relevant regulatory compliance frameworks (e.g., NIST CSF, ISO 27001, GDPR, HIPAA). o Support audits and compliance assessments, identifying any gaps between current practices and regulatory standards. (must have) Security Process Improvement: o Identify opportunities for process improvements within the cybersecurity function, including streamlining security incident response, access management processes, and threat detection workflows. o Develop business cases for proposed security improvements, including cost-benefit analyses and risk assessments. The Business Analyst will have comprehensive responsibilities spanning multiple cybersecurity domains, and should have expertise in at least 5 of the following areas o SIEM Sentinel & Security Operations: Manage and optimize SIEM solutions, particularly Sentinel, for effective monitoring, incident detection, and security event correlation across hybrid environments. Collaborate with security operations teams to ensure proper configuration, tuning, and reporting within SIEM platforms to support proactive threat management. o Security Tools & Technology Integration: Work with security teams to implement and optimize security tools such as SIEM (e.g., Splunk, Microsoft Sentinel), EDR (e.g., CrowdStrike, MS Purview/Defender), SOAR platforms, CASB (Cloud Access Security Broker), and Threat Intelligence systems. Help define and document requirements for the integration of cybersecurity tools into the broader security ecosystem. o User Access Management (UAM) & RBAC: Work closely with identity and access management teams to ensure the implementation of UAM and RBACsystems that align with the organization's security policy and business requirements. Support the development of processes for managing user roles, privileges, and access rights across enterprise systems. o Cloud & Encryption Security: Ensure that security policies and controls are applied across both on-premises and cloud environments(AWS, Azure, Google Cloud), addressing challenges related to cloud security, data encryption, and access management. Collaborate with technical teams to implement strong encryption methods for data - in - transit, data-at-rest, and data-in-use in line with organizational security policies. o AI & ML in Cybersecurity: (Good to have) Contribute to the use of AI/ML technologies to enhance threat detection, anomaly identification, and predictive analytics within the organization’s security operations. Collaborate with data scientists and security teams to define requirements for AI/ML-based security models and incident response automation. o SOAR Integration & Incident Response: Assist with the integration of Security Orchestration, Automation, and Response (SOAR) solutions into the incident response lifecycle to streamline response times and automate repetitive tasks. Support the continuous improvement of incident response procedures and playbooks, ensuring a consistent, rapid, and efficient approach to security incidents. Benefits
Posted 3 weeks ago
15.0 - 20.0 years
13 - 17 Lacs
bengaluru
Work from Office
About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are looking for a detail-oriented and security-savvy SOAR Automation Engineer to join our Security Operations Center (SOC). In this role, you will be responsible for designing, building, and maintaining automated security workflows using the SOAR platform. Your mission will be to enhance the efficiency, scalability, and response times of our SOC operations through strategic automation. Support the deployment, configuration, and ongoing maintenance of the SOAR platform in support of our Cyber Defense and Security Operations.We are seeking a highly skilled and motivated SOAR Automation Engineer to join our Security Operations Center (SOC). This role focuses on automating and orchestrating SOC processes using SOAR platforms to improve the efficiency, speed, and accuracy of our incident response capabilities. The ideal candidate has a strong background in cybersecurity operations, scripting, and experience with SOAR tools like Tines, Splunk SOAR, Palo Alto XSOAR, IBM Resilient, or similar Roles & Responsibilities:-Design, develop, and maintain playbooks and automated workflows within the SOAR platform.-Work with SOC analysts to identify repetitive, manual processes that can be automated.-Integrate SOAR with other security tools and platforms (SIEM, EDR, firewalls, threat intel platforms, ticketing systems, etc.).-Continuously improve SOAR playbooks based on feedback, threat intelligence, and incident analysis.-Collaborate with incident response and threat hunting teams to automate detection and response use cases.-Provide technical documentation and training for SOC personnel on SOAR usage and playbook functionality.-Monitor and troubleshoot SOAR platform performance and reliability.-Ensure security automation aligns with organizational policies and compliance requirements Professional & Technical Skills: -Experience in a SOC security engineering & cybersecurity automation role.-Hands-on experience with one or more SOAR platforms (e.g., Tines, Palo Alto XSOAR, Splunk SOAR, IBM Resilient).-Strong scripting skills in Python (required), Bash, or PowerShell.-Familiarity with REST APIs and integration development.-Understanding of security operations, incident response, and common security tools (SIEMs, EDRs, IDS/IPS, etc.).-Knowledge of cybersecurity frameworks such as MITRE ATT&CK, NIST, or ISO 27001.-Experience with Splunk, Sentinel, or other SIEM platforms.-Knowledge of cloud security (AWS, Azure, or GCP).-Experience with ticketing and case management systems (e.g., ServiceNow, Jira).-Security certifications such as:Palo Alto Networks Certified SOAR Engineer (PCSAE),GIAC Security Automation Engineer (GSAE),Certified SOC Analyst (CSA),CompTIA Security+-key Skills-Automation & Scripting,API Integration,Incident Response,Security Tools Integration,Workflow Design,Communication & Documentation,Analytical Thinking Additional Information:- The candidate should have minimum 5 years of experience in Security Information and Event Management (SIEM).- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
15.0 - 20.0 years
13 - 17 Lacs
bengaluru
Work from Office
About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitating the transition to cloud security-managed operations, ensuring that all security measures align with organizational objectives and compliance standards. You will engage in discussions to refine security strategies and provide guidance on best practices, contributing to a secure cloud environment that supports the organization's growth and innovation. Roles & Responsibilities:- Design, develop, and maintain advanced playbooks and integrations in Cortex XSOAR.- Automate incident response workflows and repetitive SOC tasks.- Integrate XSOAR with SIEMs, EDRs, threat intelligence platforms, and ticketing systems.- Collaborate with SOC teams to identify automation opportunities and improve operational efficiency.- Troubleshoot and optimize playbook performance and platform stability.- Maintain documentation for playbooks, integrations, and automation processes.- Stay current with threat trends and SOAR capabilities to drive innovation.- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Develop and maintain comprehensive documentation of security architecture and controls.- Conduct regular assessments of cloud security measures to ensure compliance with industry standards. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Information and Event Management (SIEM).- Strong understanding of cloud security principles and practices.- Experience with security frameworks such as NIST, ISO 27001, or CIS.- Knowledge of incident response and threat detection methodologies.- Familiarity with regulatory requirements related to cloud security. Additional Information:- The candidate should have minimum 5 years of experience in Security Information and Event Management (SIEM).- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |