Posted:14 hours ago| Platform: GlassDoor logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

Job Description

Monitor security events from Seceon AI-SIEM, firewalls, IDS/IPS, and endpoint tools in a 24x7 SOC setup.

  • Analyze correlated alerts and validate false positives, ensuring high-fidelity alert triage and escalation.
  • Perform incident investigation and containment, carrying out malware or network forensics as needed.
  • Conduct proactive threat hunting using Seceon SOC automation and AI-driven analytics modules.
  • Manage playbooks for incident response workflows and maintain documentation for SOC processes.
  • Collaborate with IT infrastructure and application teams to implement mitigation actions after security incidents.
  • Recommend Seceon policy fine-tuning including alert rules, threshold calibration, and automated response integration with SOAR.
  • Monitor and analyse machine-generated data to detect threats, troubleshoot issues, and improve performance.
  • Key responsibilities include creating dashboards and reports, writing search queries (including using SPL), parsing logs, and optimizing data ingestion

Manual VAPT (Vulnerability Assessment & Penetration Testing)

  • Conduct manual and automated VAPT on web, network, mobile, and infrastructure layers using tools like Burp Suite, Nmap, Nessus, and Metasploit combined with manual testing.
  • Perform threat modeling and post-exploitation testing to validate exploitable weaknesses.
  • Document vulnerabilities with CVE mapping, impact analysis, and actionable remediation strategies.
  • Execute VAPT reporting with both technical and executive summaries tailored for stakeholders.
  • Apply OWASP, NIST, and ISO 27001 standards during assessment and mitigation phases.

Skills and Competencies

  • Hands-on experience with Seceon (AI-powered cybersecurity platform) AI-SIEM, SOAR tools, and integrations involving threat intelligence feeds.
  • Proficiency in manual vulnerability discovery, exploit development, and risk analysis.
  • Scripting knowledge in Python, or PowerShell for analysis and automation tasks.
  • Deep understanding of network security protocols, incident response, and digital forensics.
  • Familiarity with incident lifecycle management, MITRE ATT&CK mapping, and IOC correlation.

Qualification and Certifications

  • Bachelor’s degree in Cybersecurity, Information Technology, or Computer Science.
  • 2–3 years of SOC experience, preferably with Seceon, Q -radar, or similar SIEMs.
  • Certifications preferred: CEH, OSCP, CompTIA Security+, or Seceon-certified SOC training.

Job Type: Full-time

Pay: ₹400,000.00 - ₹600,000.00 per year

Application Question(s):

  • Experience in Seceon AI-SIEM? (min 2 year)
  • Conduct manual and automated VAPT? ?
  • Experience in Scripting language in Python, or PowerShell? ?
  • Ready for F2F interview and 6 days working? ?
  • Do you have CEH, OSCP, CompTIA Security+, or Seceon-certified SOC training certification?

Work Location: In person

Mock Interview

Practice Video Interview with JobPe AI

Start Python Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Python Skills

Practice Python coding challenges to boost your skills

Start Practicing Python Now

RecommendedJobs for You

pune, maharashtra, india

pune, maharashtra

bengaluru, karnataka, india

bengaluru, karnataka, india