Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
7.0 - 12.0 years
15 - 30 Lacs
Mumbai
Work from Office
1. SIEM Administration and Engineering Oversee the installation, configuration, and maintenance of IBM Qradar. Develop and implement SIEM architecture and engineering strategies. 2. Rule & Use Case Development Design, implement, and optimize custom rules, searches and dashboards. Develop and maintain advanced use cases for threat detection and incident response 3 . Incident Response and Forensics Lead the investigation of complex security incidents escalated by L1 & L2 analyst. Perform deep-dive analysis of security events and conduct forensic investigations 4. Performance and Optimization Monitor and manage the performance QRadar environment. Conduct regular health checks and audits to ensure optimal SIEM Performance. 5. Collaboration and Mentoring Work closely with SOC analysts, IT, and security teams to enhance detection capabilities. Providing training and mentorship to L1 & L2 analysts on QRadar functionalities and best practices. 6. Documentation and Reporting Develop and maintain comprehensive documentation for SIEM configurations, procedures, and incident responses. Generate detailed reports and metrics on SIEM performance and security incidents. 7. Continuous Improvement Stay updated with the latest security trends, vulnerabilities, and technologies. Contribute to the development of security policies, standards, and guidelines. Preferred Mumbai/Pune based candidates ONLY.
Posted 1 day ago
5.0 - 10.0 years
5 - 10 Lacs
Bengaluru / Bangalore, Karnataka, India
On-site
We are looking for a skilled SOAR (Security Orchestration, Automation, and Response) Automation Professional to help automate and improve security operations. You will build workflows and playbooks that respond to security threats quickly and effectively. This role is perfect for someone with a strong background in cybersecurity, scripting, and security tools integration. Key Responsibilities: Design, build, and maintain SOAR playbooks and workflows to automate incident response processes. Work closely with SOC analysts and security teams to understand their needs and automate repetitive tasks. Integrate various security tools (SIEM, firewalls, antivirus, threat intel platforms, etc.) with the SOAR platform. Troubleshoot and improve existing automation scripts and integrations. Monitor automation performance and suggest improvements for speed and accuracy. Document workflows, technical steps, and troubleshooting guides. Stay up to date with new security threats and technologies that can be automated. Required Skills: Hands-on experience with SOAR platforms (e.g., Splunk Phantom, Palo Alto Cortex XSOAR, IBM Resilient, Swimlane). Strong skills in Python, JavaScript, or other scripting languages. Good understanding of security operations, incident response, and threat detection. Experience in integrating security tools/APIs with SOAR platforms. Knowledge of c like MITRE ATT&CK, NIST, etc.
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.