Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
7.0 - 12.0 years
8 - 12 Lacs
Mumbai
Work from Office
Your Role and Responsibilities* * Responsible for implementation partner to see project on track along with providing required reports to management and client * Handle the project as well as BAU operations while ensuring high level of systems security compliance * Coordinate with and act as an authority to resolve incidents by working with other information security specialists to correlate threat assessment data. * Analyse data, such as logs or packets captures, from various sources within the enterprise and draw conclusions regarding past and future security incidents. * Ready to support for 24/7 environment. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Required Professional and Technical Expertise* * 7+ years of IT experience in security with at least 4+ Years in Security Operation Centre with SIEMs. * B.E./ B. Tech/ MCA/ M.Sc. * Maintaining SIEM/UEBA platform hygiene, Scripting, Automation SOAR Playbook Creation with Testing, with Change/Problem/Incident Management, with CP4S platform integration & dashboarding, Recovery Support. * Expertise in Security Device Management SIEM, Arcsight, Qradar, incident response, threat hunting, Use case engineering, SOC analyst, device integration with SIEM. * Working knowledge of industry standard risk, governance and security standard methodologies * Proficient in incident response processes - detection, triage, incident analysis, remediation and reporting. * Ability to multitask and work independently with minimal direction and maximum accountability. Preferred technical and professional experience Preferred Professional and Technical Expertise * Preferred OEM Certified SOAR specialist + CEH * Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work * Intuitive individual with an ability to manage change and proven time management * Proven interpersonal skills while contributing to team effort by accomplishing related results as needed * Up-to-date technical knowledge by attending educational workshops, reviewing publications
Posted 3 weeks ago
3.0 - 5.0 years
3 - 8 Lacs
Bengaluru
Work from Office
Roles & Responsibilities: 1.Handling alerts and incident on XDR platform 2.Alert & incident triage and analysis 3.Proactively investigating suspicious activities 4.Log all findings, actions taken, and escalations clearly in the XDR and ITSM platform 5.Execute predefined actions such as isolating blocking IPs or disabling user accounts, based on set protocols. 6.Adhere to established policies, procedures, and security practices. 7.Follow-up with tech team for incident closure 8.Participating in daily standup and review meeting 9.L2 Analyst has responsibility to closely track the incidents and support for closure. 10.Working with logsource and usecase management in integrating log sources and developing & testing usecase 11.Work & support on multiple cybersecurity tool (DLP, GRC, Cloudsec tool, DAM) 12.Developing SOP / instruction manual for L1 team 13.Guiding L1 team for triage/analysis and assist in clousure of cybersecurity alert and incidents 14.Handle XDR alerts and followup with customer team for agent updates 15.Escalate more complex incidents to L3 SME for deeper analysis. Key Responsibilities: Security Monitoring & Incident Response Governance Define and maintain security monitoring, threat detection, and incident response policies and procedures.Establish and mature a threat intelligence program, incorporating tactical and strategic threat feeds.Align SOC operations with evolving business risk priorities and regulatory frameworks.Platform & Toolset Management Evaluate, implement, and enhance SIEM platforms, ensuring optimal log ingestion, correlation, and rule effectiveness.Assess and manage deployment of EDR, XDR, SOAR, and Threat Intelligence solutions.Maintain and update incident response playbooks and automation workflows.Ensure consistent platform hygiene and technology stack effectiveness across SOC tooling.SOC Operations & Threat Detection Oversee 24x7 monitoring of security events and alerts across enterprise assets.Lead and coordinate proactive threat hunting across networks, endpoints, and cloud.Manage and support forensic investigations to identify root cause and recovery paths.Govern use case development, log source onboarding, and alert/event triage processes.Regulatory Compliance & Incident Management Ensure timely and accurate incident reporting in compliance with RBI, CERT-In, and other authorities.Retain logs in accordance with regulatory data retention mandates.Enforce and monitor security baselines for endpoints, in line with internal and regulatory standards.Advanced Threat Management & Reporting Plan, conduct, and report on Red Teaming and Purple Teaming exercises to test detection and response capabilities.Participate in and contribute to the Risk Operations Committee (ROC) meetings and initiatives.Review and track SOC effectiveness through KPIs, metrics, and regular reporting dashboards. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Required Qualifications: Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or related field.3-5 years of experience in SOC management, incident response, or cyber threat detection roles.Hands-on expertise with SIEM (e.g., Splunk, QRadar, Sentinel), EDR/XDR tools, and SOAR platforms.Proven experience in playbook development, forensics, and threat hunting methodologies.Strong understanding of RBI/CERT-In incident reporting guidelines and log retention requirements.Familiarity with MITRE ATT&CK, threat modeling, and adversary emulation techniques. Preferred technical and professional experience Preferred Certifications: GCIA, GCIH, GCFA, CISSP, OSCP, CEH, CHFI, or similar certifications
Posted 3 weeks ago
2.0 - 7.0 years
9 - 13 Lacs
Mumbai
Work from Office
As SIEM Analyst, you will be responsible for handling the daily monitoring of Information security events on the SIEM tools. Come join our team of IBM experts, who are leaders with vision, distinguished engineers and IT architects who have worked with thousands of clients to transform enterprise IT, migrate to cloud, apply automation and ensure business continuity. We help client run their IT better, accelerate innovation and deliver unmatched performance with the power automation. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to explore new opportunities every single day. And if you relish the freedom to bring creative, thoughtful solutions to the table, there's no limit to what you can accomplish here. * Responsible for security researcher to provide insight and understanding of new and existing information security threats * Responsible to participate in recommending improvements to SOC security process, procedures, policies, security incident management and vulnerability management processes * You will be involved in evaluating, recommending, implementing, and solving problems related to security solutions and evaluating IT security of the new IT Infrastructure systems * Keep yourself up-to-date with emerging security threats including applicable regulatory security requirements * Work in a 24x7 Security Operation Centre (SOC) environment Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise * Minimum 2+ years’ experience in SIEM. * Proven expertise in handling the daily monitoring of Information Security events on the QRadar / ArcSight / Splunk console platform * Proficient in monitoring security events from various SOC channels (SIEM, Tickets, Email and Phone), based on the security event severity to handle the service support teams, tier2 information security specialists * Expertise in threat modelling and Use case development and ability to review policies of security monitoring tools based on security concepts and logical approach. Preferred technical and professional experience * Preferred OEM Certified SOAR specialist + CEH * Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work * Intuitive individual with an ability to manage change and proven time management * Proven interpersonal skills while contributing to team effort by accomplishing related results as needed * Up-to-date technical knowledge by attending educational workshops, reviewing publications
Posted 3 weeks ago
5.0 - 8.0 years
12 - 16 Lacs
Kolkata
Work from Office
& Summary . Why PWC & Summary We are looking for an experienced Cloud Security Lead with deep technical expertise in Zscaler (ZIA/ZPA) and Fortinet security solutions. The ideal candidate will play a key role in architecting, implementing, and managing secure cloud onprem and internet access strategies, supporting enterprisewide digital transformation and security posture enhancement. s Zscaler Security Operations Design, implement, and manage Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) solutions. Configure SIPA (Secure Internet & Private Access) policies for optimized secure remote and internet access. Perform regular reviews, audits, and optimization of Zscaler configurations to align with industry best practices. Provide technical support and guidance to L1 and L2 teams for Zscalerrelated issues. Stay up to date on Zscaler enhancements, threat intelligence, and security features to ensure proactive defense. Fortinet and Network Security Implement and manage Fortinet firewall and security solutions for perimeter and cloudbased infrastructure. Configure Fortinet firewalls to support SDWAN, secure edge, and hybrid cloud environments. Work closely with networking teams to design secure network topologies integrating Fortinet technologies. Cloud Security and Compliance Design and assess cloudnative security architectures for AWS, Azure, or GCP environments. Conduct cloud security assessments, vulnerability scans, and risk remediation. . Assist in external security audits and privacy assessments related to cloud workloads. Collaboration and Strategy Collaborate with crossfunctional teams (Security, IT, DevOps, Engineering) to embed security into cloud and network initiatives. Act as a Subject Matter Expert (SME) for Zscaler and Fortinet technologies in solution design and customer engagements. Maintain documentation on security controls, configurations, SOPs, and incident response playbooks. Required Skills and Qualifications Experience in network and cloud security domains. Proven handson experience with Zscaler ZIA/ZPA design, implementation, and operations. Strong working knowledge of Fortinet firewalls and FortiManager, FortiAnalyzer. Experience with SDWAN, SDN, VPNs, and secure web gateway technologies. Strong understanding of network security principles, SIEM, threat intelligence, and incident response. Knowledge of cloud compliance standards and risk frameworks (NIST, CIS, ISO). Excellent communication skills and ability to work in crossfunctional environments. Strong documentation, presentation, and stakeholder management skills. Experience in SOC environment will be a plus Mandatory skill sets Zscaler ZIA / ZPA / SIPA Fortinet FortiGate / FortiManager / FortiAnalyzer SIEM platforms (Splunk, QRadar, etc.) Firewall platforms Fortinet, Palo Alto, Check Point, Juniper Security Frameworks ISO 27001, NIST, CIS Controls, HIPAA, GDPR Preferred skill sets Zscaler Certified Professional ZIA/ZPA Fortinet Certified Professional (FCP) CISSP / CCSP / CISM Cloud Security certifications (AWS/Azure/GCP Security Specialty) Years of experience required 58 Years of experience Education qualification Graduate Engineer or Management Graduate Education Degrees/Field of Study required Master Degree, Bachelor Degree Degrees/Field of Study preferred Required Skills Splunk Administration Accepting Feedback, Accepting Feedback, Active Listening, Analytical Reasoning, Analytical Thinking, Application Software, Business Data Analytics, Business Management, Business Technology, Business Transformation, Communication, Creativity, Documentation Development, Embracing Change, Emotional Regulation, Empathy, Implementation Research, Implementation Support, Implementing Technology, Inclusion, Intellectual Curiosity, Learning Agility, Optimism, Performance Assessment, Performance Management Software {+ 16 more} Travel Requirements Available for Work Visa Sponsorship
Posted 3 weeks ago
3.0 - 5.0 years
8 - 12 Lacs
Bengaluru
Work from Office
: The Architecture and Technology Group (ATG) at ARM develops technologies and products for ARM s future architecture roadmap. As part of the evolution of new architecture specifications, modeling is an integral and essential element that enables evaluation of the key architecture features in terms of performance and functionality. The modelling team works alongside the leading architects in their field to develop new models and design performance studies to evaluate and craft new architecture features. Responsibilities: The successful candidate will be a key member of the modeling team and responsible for evaluating modeling technologies, building models for architecture feature evaluation, and carry out architecture investigations. You will be working closely with senior architects across geographical locations to develop functional and performance models and conduct performance studies to define next-generation architecture features. Working in a tight loop in an evolving environment is a challenge which will stretch and extend your knowledge and abilities. You will have a significant impact in crafting future Arm CPU and system architecture. We are looking for a dedicated, communicative and hardworking individual who has experience with model development and/or performance analysis. Good fundamentals in computer architecture and modeling is critical for this role. Required Skills and Experience : 3-5 years of hands-on experience in CPU/system IP/SoC modeling and/or performance analysis Strong programming skills in C/C++ Reasonable knowledge and experience in computer architecture Ability to work with geographically distributed collaborators Ability to learn new areas quickly Nice To Have Skills and Experience : knowledge and experience in computer architecture In Return: Accommodations at Arm At Arm, we want to build extraordinary teams. . To note, by sending us the requested information, you consent to its use by Arm to arrange for appropriate accommodations. All accommodation or adjustment requests will be treated with confidentiality, and information concerning these requests will only be disclosed as necessary to provide the accommodation. Although this is not an exhaustive list, examples of support include breaks between interviews, having documents read aloud, or office accessibility. Please email us about anything we can do to accommodate you during the recruitment process. Equal Opportunities at Arm
Posted 3 weeks ago
4.0 - 8.0 years
10 - 14 Lacs
Bengaluru
Work from Office
: The Architecture and Technology Group (ATG) at ARM develops technologies and products for ARM s future architecture roadmap. As part of the evolution of new architecture specifications, modeling is an integral and essential element that enables evaluation of the key architecture features in terms of performance and functionality. The modelling team works alongside the leading architects in their field to develop new models and design performance studies to evaluate and craft new architecture features. Responsibilities: The successful candidate will be a key member of the modeling team and responsible for evaluating modeling technologies, building models for architecture feature evaluation, and carry out architecture investigations. You will be working closely with senior architects across geographical locations to develop functional and performance models and conduct performance studies to define next-generation architecture features. Working in a tight loop in an evolving environment is a challenge which will stretch and extend your knowledge and abilities. You will have a significant impact in crafting future Arm CPU and system architecture. We are looking for a dedicated, communicative and hardworking individual who has experience with model development and/or performance analysis. Good fundamentals in computer architecture and modeling is critical for this role. Required Skills and Experience : 4-8 years of hands-on experience in CPU/system IP/SoC modeling and/or performance analysis Strong programming skills in C/C++ Reasonable knowledge and experience in computer architecture Ability to work with geographically distributed collaborators Ability to learn new areas quickly Nice To Have Skills and Experience : knowledge and experience in computer architecture In Return: Arm is an equal opportunity employer, committed to providing an environment of mutual respect, where equal opportunities are available to all applicants and colleagues. Arm prohibits discrimination or harassment of any kind based on race/ethnicity, religion, national origin, age, sex, sexual orientation, gender, gender identity and expression, disability, neuro-diversity, pregnancy, medical condition, marital status, citizenship status, military/veteran status, as well as those characteristics protected by applicable laws, Accommodations at Arm At Arm, we want to build extraordinary teams. . To note, by sending us the requested information, you consent to its use by Arm to arrange for appropriate accommodations. All accommodation or adjustment requests will be treated with confidentiality, and information concerning these requests will only be disclosed as necessary to provide the accommodation. Although this is not an exhaustive list, examples of support include breaks between interviews, having documents read aloud, or office accessibility. Please email us about anything we can do to accommodate you during the recruitment process. Hybrid Working at Arm Arm s approach to hybrid working is designed to create a working environment that supports both high performance and personal wellbeing. We believe in bringing people together face to face to enable us to work at pace, whilst recognizing the value of flexibility. Within that framework, we empower groups/teams to determine their own hybrid working patterns, depending on the work and the team s needs. Details of what this means for each role will be shared upon application. In some cases, the flexibility we can offer is limited by local legal, regulatory, tax, or other considerations, and where this is the case, we will collaborate with you to find the best solution. Please talk to us to find out more about what this could look like for you. Equal Opportunities at Arm
Posted 3 weeks ago
0.0 - 1.0 years
0 Lacs
Ahmedabad
Work from Office
Job Title: Business Analyst Intern Company: Techdefence Labs Solutions Ltd. Location: Ahmedabad Department: Enterprise Business Job Type: Internship, Onsite About Techdefence: Techdefence is a leading cybersecurity solutions provider specializing in offensive and defensive security, AI-powered threat intelligence, and enterprise security frameworks. Our comprehensive services and product portfolio cater to global enterprises, government agencies, and critical infrastructure, ensuring proactive protection against cyber threats. With a strong R&D focus, Techdefence delivers cutting-edge security solutions in the areas of cloud security, network security, application security, penetration testing, SOC solutions, and managed security services. Our expertise in cyber resilience, risk management, and compliance frameworks (ISO 27001, NIST, GDPR, PCI-DSS, etc.) positions us as a trusted partner for organizations worldwide. Role Overview: Techdefence Labs is looking for a detail-oriented and analytical Business Analyst Intern to evaluate business operations, analyze data, and provide actionable insights to improve efficiency. The ideal candidate will have a basic understanding of cybersecurity and related technologies. Key Responsibilities: Develop project plans and ensure timely completion Analyze large data sets to provide actionable insights Conduct budgeting and financial analysis Recommend process improvements to increase business efficiency Build and prepare data sheets and work on analytics Understand existing processes and identify areas for improvement Qualifications & Skills: Basic understanding of cybersecurity and related technologies Strong analytical and problem-solving skills Good English skills (written and spoken) Presentable and professional demeanor Quick learner with the ability to adapt to new changes Excellent communication and project management skills Ability to learn and evolve with market requirements Nice to Have: Experience with data analysis tools and software Knowledge of project management methodologies What We Offer: Opportunity to work on real-world projects Hands-on experience in business analysis and process improvement Collaborative and dynamic work environment
Posted 3 weeks ago
0.0 - 1.0 years
0 Lacs
Ernakulam
Work from Office
Job description We are seeking a motivated and detail-oriented Cybersecurity Intern to join our security team. You will assist in monitoring, analyzing, and improving the security posture of our systems and networks. This internship is an excellent opportunity to gain real-world experience in threat detection, security tools, and incident response in a professional environment. Qualification Any Degree/Diploma/+2 Key Responsibilities Assist in monitoring network activity for suspicious behavior or unauthorized access.
Posted 3 weeks ago
5.0 - 10.0 years
19 - 20 Lacs
Hyderabad, Chennai
Work from Office
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. 6+ years of experience in a Security Operations Center (SOC) or similar security role. Relevant certifications preferred such as: Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) Certified Information Security Manager (CISM) CompTIA Security+ Strong understanding of networking protocols and technologies, vulnerability assessment, and incident response procedures. Experience with SIEM tools (e.g., Splunk, ArcSight, or similar). Familiarity with compliance frameworks (e.g., ISO 27001, NIST, GDPR). Strong analytical and problem-solving skills. Excellent verbal and written communication skills.
Posted 3 weeks ago
6.0 - 10.0 years
17 - 20 Lacs
Hyderabad, Chennai
Work from Office
The Impact you will have in this role: Qualifications: Minimum of 6 years of related experience Bachelor's degree preferred or equivalent experience Talents Needed for Success:
Posted 3 weeks ago
6.0 - 10.0 years
17 - 20 Lacs
Hyderabad, Chennai
Work from Office
DTCC offers a flexible/hybrid model of 3 days onsite and 2 days remote (Onsite Tuesdays, Wednesdays and a third day of your choosing) The impact you will have in this role: We are seeking a dedicated and skilled Lead IT Security Engineer to join our team. The ideal candidate will have a strong background in network security, cloud technologies, and hands-on experience with Zscaler products. As a Lead Zscaler Security Engineer, you will be responsible for providing technical support and ensuring the smooth operation of Zscaler solutions. Your Primary Responsibilities: Provide technical support for Zscaler products (ZIA, ZPA, ZDX), including troubleshooting and resolving issues. Monitor and maintain the health and performance of Zscaler solutions. Collaborate with support teams to understand their technical needs and provide effective solutions. Assist in the deployment and configuration of Zscaler products. Conduct root cause analysis for recurring issues and implement preventive measures. Document technical issues and solutions for knowledge sharing and future reference. Stay up to date with the latest Zscaler features, updates, and industry trends. Work closely with the engineering and product teams to escalate and resolve complex issues. **NOTE: The Responsibilities of this role are not limited to the details above. ** Qualifications: Bachelor's degree and/or equivalent experience Minimum 5 years of Cybersecurity related experience Talents Needed for Success: Hands-on experience with Zscaler products (ZIA, ZPA, ZDX). Strong understanding of networking protocols and security best practices. Strong communication and interpersonal skills, including the ability to build relationships with key stakeholders. Strong critical thinking and problem-solving skills to resolve problems effectively and creatively while maintaining a high level of flexibility, professionalism, and integrity. Ability to work independently and manage multiple tasks simultaneously. Experience in managing Data Protection Technologies: Endpoint & Web DLP, CASB Network Security: Secure Web Gateways, Secure Access Secure Edge (SASE), Firewalls, IDS/IPS technologies
Posted 3 weeks ago
3.0 - 8.0 years
3 - 7 Lacs
Chennai
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Accenture MxDR Ops Security Threat Analysis Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply your security skills to design, build, and protect enterprise systems, applications, data, assets, and people. A typical day involves collaborating with various teams to implement security measures, conducting assessments to identify vulnerabilities, and ensuring that all systems are fortified against potential cyber threats. You will also engage in continuous learning to stay updated on the latest security trends and technologies, contributing to a safer digital environment for the organization. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular security assessments and audits to identify vulnerabilities.- Develop and implement security policies and procedures to safeguard information and assets. Professional & Technical Skills: - Must To Have Skills: Proficiency in Accenture MxDR Ops Security Threat Analysis.- Strong understanding of security frameworks and compliance standards.- Experience with incident response and threat hunting methodologies.- Familiarity with security information and event management tools.- Knowledge of network security protocols and best practices. Additional Information:- The candidate should have minimum 3 years of experience in Accenture MxDR Ops Security Threat Analysis.- This position is based at our Chennai office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
12.0 - 15.0 years
2 - 4 Lacs
Pune
Work from Office
Job Role: Owns the budget for the region ( P&L owner) Has a self-goal sheet to Lead by Example and have adequate SOC Networks continuously with competition, to on-board extra ordinary branch managers as AMP/LMP and good MPs. Also, works on bringing-in good full-time-APs from market Ensure LMPs and MPs incentive incomes in the region are satisfactory and exceed benchmarks Coach LMPs and MPs on management/sales skills and career growth Works to maintain the zonal and national mandates on all parameters within the region Works closely with the zonal cross-functional teams to strategically plan and implement actions so that the targets are achieved Strategically plans out the new locations for branches and partner development, to expand the footprint of the channel Propagates the career option amongst the MPs and APs within the region Owns the new MP induction and development program Arrange/attend outdoor promotional events and seminars on recruitment, awareness, customer events, HNI priority etc Grow the representation of advisors and APs from ones region on Conventions, MDRT, R&R etc Ensure the desired product mix at all branches within the Region Deal with and escalate compliance issues
Posted 3 weeks ago
10.0 - 15.0 years
22 - 37 Lacs
Bengaluru
Work from Office
Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role Kyndryl’s Security & Resiliency is one of our most critical practices, ensuring enterprises, regardless of their size and complexity, remain secure, available, reliable, and resilient. We take Cybersecurity seriously. We're not just invested; we're committed. We're not just protecting data; we're empowering. Kyndryl is committed to making the world safer, not only by investing in state-of-the-art services and technologies but also by empowering underserved communities with essential cyber skills. When you walk through our doors, you're not only joining a team but you're also becoming part of a legacy. Welcome to Kyndryl, where Cybersecurity isn't just a job – it’s a passion; a commitment to designing, running, and managing the most modern and reliable technology infrastructure that the world depends on every day. As a Cybersecurity Defense professional at Kyndryl, you will encompass cybersecurity, incident response, security operations, vulnerability management, and the world of cyber threat hunting and security intelligence analysis all to protect the very heartbeat of organizations – their infrastructure. In this role, you won't just monitor; you'll actively engage in the relentless hunt for cyber adversaries. In a world where every click and keystroke could be a potential gateway for attackers, your role will be nothing short of critical as you seek out advanced threats, attackers, and Indicators of Compromise (IOCs). Your expertise in endpoint detection and response (EDR) will be the shield that safeguards individual workstations, laptops, servers, and other devices from cybercrime. Your responsibilities go beyond vigilance. When it comes to network security, you'll utilize Network Detection and Response (NDR) to monitor the ever-flowing currents of network traffic. The incident management process will be used as you respond and manage to cybersecurity incidents. Cybersecurity Defense is all about information. You'll gather, analyze, and interpret data applying your own and external threat intelligence to uncover potential security threats and risks. These insights and your ability to analyze complex attack scenarios will be the foundation of our security strategy – helping Kyndryl stay one step ahead of security breaches. In Cybersecurity Defense at Kyndryl, you’re not just protecting the present – you’re shaping the future of digital security. Join us on this cybersecurity venture where your expertise and creativity will have a lasting impact in the world of digital defense. Your Future at Kyndryl When you join Kyndryl, you're not just joining a company – you're entering a space of opportunities. Our partnerships with industry alliances and vendors mean you'll have access to skilling and certification programs needed to excel in Security & Resiliency, while simultaneously supporting your personal growth. Whether you envision your career path as a technical leader within cybersecurity or transition into other technical, consulting, or go-to-market roles – we’re invested in your journey. Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Skills and Experience 7 to 10 years of security analyst experience, preferably in a managed services environment Integrity Protection and central management solutions for protection of client workstations and servers against unauthorized changes (i. e. malicious code, viruses, worms, Trojans, exploits) and blocking of unauthorized programs including change control. Protection against unauthorized changes (i.e. malicious code, viruses, worms, trojans, exploits) and blocking of unauthorized programs including control of allowed changes Protection of Memory against unauthorized code Prevention of infection with known & unknown malware Patch-Process for emergency patches rated by CSO to be relevant for IC protected systems Protection Management: Malware Protection Management and central management solutions for protection of client workstations and servers against malicious code (viruses, worms, trojan horses, exploits ) and blocking of unwanted programs defined by CSO/APM. CrowdStrike cloud services for system process monitoring, behavioral analysis, machine learning and automated prevention of detected malicious actions of known and unknown threats. Operated by CrowdStrike Falcon Complete (SaaS). CrowdStrike Agent support of installation, maintenance and troubleshooting. Provide following support activities with ePO administrators Preferred Skills and Experience Bachelor’s degree in computer science, Cybersecurity, Information Technology, or other related fields Preferred Certifications in Cyber Security: ECTHP (Certified Threat Hunting Professional) orECMAP (Malware Analysis Professional); other specialized security analyst certifications Experience in Cloud Security monitoring and in advanced analytics (UEBA) vide following support activities with ePO administrators Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.
Posted 3 weeks ago
5.0 - 10.0 years
19 - 20 Lacs
Hyderabad, Chennai
Work from Office
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. 6+ years of experience in a Security Operations Center (SOC) or similar security role. Relevant certifications preferred such as: Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) Certified Information Security Manager (CISM) CompTIA Security+ Strong understanding of networking protocols and technologies, vulnerability assessment, and incident response procedures. Experience with SIEM tools (e.g., Splunk, ArcSight, or similar). Familiarity with compliance frameworks (e.g., ISO 27001, NIST, GDPR). Strong analytical and problem-solving skills. Excellent verbal and written communication skills.
Posted 3 weeks ago
3.0 - 4.0 years
5 - 8 Lacs
Ahmedabad
Work from Office
Overview We are looking for a results-driven Firmware Engineer who is passionate about working on designing the firmware of the Embedded Product and can understand the product requirements and its functionality and is skilled in following the logical design and coding methods during development to design a stable product. Following are the requirements and the Job Description for the role: Perform technical feasibility study and firmware architecture design and integration Follow Agile methodologies in development. Model, simulate, and analyze the sub-systems to evaluate product and design concepts Follow logical design and coding methods during development to design a stable product Make documents capturing all critical design details. Troubleshoot issues that come from Validation, Production and service teams Self-motivated to work both unsupervised and as part of an agile team. Collaborate to develop self and others within the group. Unit test the system for its requirements. Hands-on working experience with ARM-based MCU/SOC architectures, memories, and different communication protocols USB, I2C, SPI, UART, Bluetooth, WiFi Requirements/Skills: Expert in Embedded firmware design on various controller platforms Experience in FW designs with C/C++ language and on Real-Time Operating Systems (RTOS) Knowledge of hardware peripherals Understanding of networking concepts Hands-on experience with testing tools: Digital oscilloscope, Multi-meter, LCR meter Openness to do research and go to the depths of every task Educational Qualification: B.Tech/BE/M.Tech/ME in Electronics and Communication or equivalent Experience: Minimum 3-4 years of experience working as a Firmware Engineer Tagged as: embedded firmware, firmare Before applying for this position you need to submit your online resume . Click the button below to continue.
Posted 3 weeks ago
0.0 - 3.0 years
0 Lacs
Coimbatore
Work from Office
Overview We need fresher, want to make their carrier path as Networking Engineer we provided 3 month paid training with placement guarantee. Tagged as: ccna, cyber security, networking Before applying for this position you need to submit your online resume . Click the button below to continue. Related Jobs Home Automation Installer Smart1 Solution Delhi & NCR Full Time 2023-12-17 SOC Lead Cynosure Corporate Solutions Chennai Full Time 2023-10-13 Field Sales Representative Aishani Creations Barasat, Kolkata Full Time 2023-04-03
Posted 3 weeks ago
3.0 - 8.0 years
19 - 30 Lacs
Hyderabad, Pune, Bengaluru
Work from Office
Job Description As a member of the Design Verification [Pre-Silicon DV] Team for NXP WCS/SCE BU. You will be responsible for verification of various IPs and/or SoC. Candidate must be self-motivated and capable of working independently or as part of a team. You will implement simulation testbenches, low power simulation setup, assembly/C language diagnostics, assertion checkers or coverage monitors to meet target verification goals. You will also assist with developing test-plans, debugging failures and analyzing coverage information. Must have excellent knowledge of computer architecture and design verification fundamentals Must have experience with Verilog and popular EDA simulation, System Verilog assertions and testbench methodologies Must have experience in developing complex test bench in System Verilog using OVM/UVM methodology Hands-on experience in AMBA protocol, PCIe MAC, USB MAC, Bluetooth MAC, Wifi 802.11 MAC layer protocol Experience in Low Power Simulation/UPF setup, debug low power simulation failures. Exposure to scripting languages like Perl, Unix shell or similar languages Good to have some experience with assembly language programming required Excellent written and oral communication skills necessary.
Posted 3 weeks ago
3.0 - 6.0 years
4 - 7 Lacs
Kochi
Work from Office
Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Main Responsibilities Tier 1 SOC analysts are incident responders, remediating serious attacks escalated, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments (CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone), based on the security event severity and suspicious activities, escalate to managed service support teams, tier 2 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when new threats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Other responsibilities and additional duties as assigned by the security management team or service delivery manager Requirements: Min 1 Years Experience as SOC Analyst (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows. Excellent written and verbal communication skills Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting
Posted 3 weeks ago
3.0 - 6.0 years
4 - 6 Lacs
Kochi
Work from Office
Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Main Responsibilities Tier 2 SOC analysts are incident responders, remediating serious attacks escalated from Tier 1, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments (CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone), based on the security event severity and suspicious activities, escalate to managed service support teams, tier 3 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when new threats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Other responsibilities and additional duties as assigned by the security management team or service delivery manager Requirements: Min 3 Years Experience as SOC Analyst (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows. Excellent written and verbal communication skills Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting
Posted 3 weeks ago
1.0 - 2.0 years
15 - 19 Lacs
Chennai
Work from Office
Key Responsibilities: Cybersecurity & SOC Operations: Monitor security alerts and events across IT and cloud infrastructure using SIEM tools. Investigate and respond to security incidents including phishing, malware, unauthorized access, etc. Develop and maintain incident response procedures and escalation protocols. Conduct threat intelligence and vulnerability assessments on-prem and in the cloud. Cloud Security: Implement and monitor cloud security best practices (AWS, Azure, GCP). Manage IAM (Identity and Access Management), encryption, security groups, and cloud firewall rules. Perform security assessments on cloud applications and infrastructure. Ensure compliance with shared responsibility models across different cloud service providers. GRC & Compliance: Develop, implement, and audit security policies based on frameworks like ISO 27001, NIST, SOC 2, and GDPR. Conduct risk assessments and internal audits to identify and address security gaps. Ensure cloud and on-prem infrastructure aligns with regulatory and client compliance requirements. IT Audits & Reporting: Prepare for and support external audits such as ISO 27001, SOC 2, and client-specific reviews. Document processes, create audit trails, and present risk mitigation plans. Maintain detailed records of audit findings and remediation actions. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. 2-5 years of experience in cybersecurity, cloud security, GRC, or IT audits. Working knowledge of major cloud platforms: AWS, Azure, or GCP. Experience with SIEM tools (e.g., Splunk, QRadar, Microsoft Sentinel) and endpoint security solutions. Understanding of cloud compliance standards: ISO 27017, CSA, CIS Benchmarks. Familiar with GRC platforms such as RSA Archer, ServiceNow GRC, etc. Strong documentation, reporting, and communication skills.
Posted 3 weeks ago
3.0 - 6.0 years
4 - 6 Lacs
Kochi
Work from Office
Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Main Responsibilities Tier 2 SOC analysts are incident responders, remediating serious attacks escalated from Tier 1, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments (CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone), based on the security event severity and suspicious activities, escalate to managed service support teams, tier 3 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when new threats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Other responsibilities and additional duties as assigned by the security management team or service delivery manager Requirements: Min 3 Years Experience as SOC Analyst (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows. Excellent written and verbal communication skills Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting.
Posted 3 weeks ago
2.0 - 7.0 years
1 - 5 Lacs
Kolkata, Hyderabad, Pune
Work from Office
Security Trust Analyst1 Job Title: Security Trust Analyst Location: Bangalore, India Work Mode: Hybrid (Minimum 2 days/week from office) About the Role We are seeking a Security Trust Analyst to join our Global Trust Office as an individual contributor. In this hands-on role, you will work closely with sales teams and internal security functions to demonstrate that our security and compliance controls meet industry-leading standards. You will also engage with cross-functional stakeholders across Compliance, Legal, Privacy, Product, and Engineering teams. The ideal candidate is detail-oriented, collaborative, and passionate about cybersecurity and compliance, with a strong understanding of industry frameworks such as ISO 27001, PCI DSS, and AICPA SOC . Key Responsibilities Perform first-line review of incoming Trust Office cases in Salesforce, validate case accuracy, and assign for further action. Respond to requests from internal sales teams regarding security and compliance inquiries from customers and prospects. Prepare and distribute weekly reports from Salesforce. Manage distribution of Security and Trust Assurance Packets (STAP) to customers and prospects. Collaborate with internal teams (Security, Product, Engineering, etc.) to communicate and support DocuSigns compliance posture. Contribute to continuous improvement initiatives within the Global Trust Office. Perform additional tasks and responsibilities as assigned. Support after-hours requests on an as-needed basis. What Youll Bring Basic Qualifications: Bachelors degree or equivalent work experience in Computer Science, Cybersecurity, GRC (Governance, Risk & Compliance), or related field. Minimum 2 years of relevant experience in cybersecurity or compliance-related roles. Familiarity with security and compliance frameworks such as:SSAE16, ISO 27001, NIST, PCI DSS, SOC, SIG, CSA, HIPAA, HITRUST, FedRAMP. Experience working in a SaaS or cloud solutions environment. Proficiency with Salesforce and Google Workspace tools. Strong analytical, communication, and presentation skills. Detail-oriented with excellent organizational and time management skills. Comfortable working across cross-functional teams and stakeholders. Strong passion for continuous learning and improvement. Understanding of the role of supply chain security in customer assurance. Work Environment Hybrid Work Model: This is a hybrid position requiring a presence in the Bangalore office a minimum of 2 days per week , with flexibility for remote work based on team and business needs. Location - Pune,Hyderabad,Kolkata,Jaipur,Chandigarh
Posted 3 weeks ago
5.0 - 10.0 years
13 Lacs
Mumbai, Chennai
Work from Office
Job Responsibilities : Candidate must have 7-10 years of experience in security operations, incident response, or a related field. Strong understanding of security concepts, principles, and best practices. Proficiency in using SIEM tools (e.g., Splunk, Q Radar, ArcSight). Experience in developing and maintaining SOC rules, playbooks, and procedures. Knowledge of common security threats, vulnerabilities, and attack vectors. Experience with network and system security tools (e.g., firewalls, intrusion detection systems, antivirus). Experience with scripting languages (e.g., Python, PowerShell). Experience with cloud security (e.g., AWS, Azure, GCP). Contact Person - Supraja Email - supraja@gojobs.biz
Posted 3 weeks ago
2.0 - 4.0 years
2 - 4 Lacs
Mumbai
Work from Office
Minimum 2-4 years of experience in Security Operations Centre Experience across SOC domains use case creation, incident management, threat hunting, threat intelligence etc. Solid understanding of cyber security, network security, end point security concepts Good understanding of recent cyber threats, latest attack vectors Must have experience in any one SIEM (Splunk), EDR and SOAR solution Must have experience in leading/managing SOC shifts Experience in shift roster creation, resource management etc. Will be responsible for critical incident investigation, use case review, mentoring Shift Leads, SLA management etc.
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39817 Jobs | Dublin
Wipro
19388 Jobs | Bengaluru
Accenture in India
15458 Jobs | Dublin 2
EY
14907 Jobs | London
Uplers
11185 Jobs | Ahmedabad
Amazon
10459 Jobs | Seattle,WA
IBM
9256 Jobs | Armonk
Oracle
9226 Jobs | Redwood City
Accenture services Pvt Ltd
7971 Jobs |
Capgemini
7704 Jobs | Paris,France