Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 7.0 years
5 - 9 Lacs
Bengaluru
Work from Office
Job Description: Value Preposition Efficiently identifies and investigates sophisticated threats, ensuring faster incident containment. Shape the Future of Security: Contribute to the continuous improvement of our security processes and mentor the next generation of SOC analysts. Job Details Position Title: Information Security Engineer I Career Level: P1 Job Category: Associate Role Type: Hybrid Job Location: Bangalore About the Team: The Security Operations Center (SOC) team is a community of dedicated professionals committed to safeguarding our organizations information security. Our values inclusivity, transparency, and excellence drive everything we do. Join us and make a meaningful impact on our security posture Impact (Job Summary/Why this Role Matters) The Security Operations Center (SOC) team is a community of dedicated professionals committed to safeguarding our organizations information security. Our values inclusivity, transparency, and excellence drive everything we do. Join us and make a meaningful impact on our security posture Key Deliverables (Duties and Responsibilities) 24/7 Rotational Shifts: Ensure round-the-clock security coverage by working on a rotational schedule. Perform triage and analysis of alerts to determine the severity and impact. Must have worked on incidents related to Phishing, EDR, Antivirus, , IDS/IPS, DNS, Email & AD etc. Follow standard operating procedures for incident handling and reporting. Document finding and escalate incidents to L2/Le analysts when required. Collect, analyze, and disseminate threat intelligence to relevant stakeholders. Support continuous improvement of SOC process and detection capabilities. Identify any technology gaps and contribute to designing solutions to address them. Support the automation effort to streamline and accelerate triage response. Monitor, analyze, prioritize Cyber Security events, initiate response, and remediation actions. Ensure to meet the SLA for all the tickets. Ensure defined process and procedures are followed. Act as a team player supporting peers, and department management. Skills and Qualification (Functional and Technical Skills) Functional Skills: Bachelor s degree in computer science, IT, Cyber Security, or related field. 2 years experience in cyber security. SOC Experience preferred. Good verbal, written, and interpersonal communication skills. An ability to quickly gain a thorough knowledge of operations and products. Team Player: Support peers and department management Excellent attention to detail and ability to identify and analyze complex patterns. Technical/Business Skills: Deep understanding of attack vectors, tactics, techniques, and procedures (TTPs) Familiarity with security tools such as SIEM, Antivirus, EDR, Email gateway etc. Security certifications such as CompTIA Security+, CEH or similar. Experience with platforms like Splunk, IBM QRadar or Microsoft Sentinel Familiarity with incident response frameworks - NIST, MITRE ATT&CK Relationships & Collaboration Reports to: Sr. Manager SOC Partners: SOC Analysts Accessibility Needs We are committed to providing an inclusive and accessible hiring process. If you require accommodations at any stage (e.g. application, interviews, onboarding) please let us know, and we will work with you to ensure a seamless experience
Posted 2 weeks ago
3.0 - 8.0 years
15 - 20 Lacs
Bengaluru
Work from Office
Our team of 250 colleagues is at the heart of The Economist Group s digital-first agenda. Together, we are delivering user-friendly, high-quality digital products that bring data, intelligence and analysis to our growing global audiences across all our four businesses. Our team develops cutting-edge products that provide valuable insights and analysis to business and government leaders worldwide. Whether it involves creating new products for the Economist Intelligence Unit, conceptualising mobile applications that deliver personalised content, or enhancing our flagship website, economist.com , the Technology team plays a crucial role in shaping how we attract, convert, engage, and retain our 1.2 million subscribers. The Technology team collaborates closely with other teams to engineer innovative solutions that cater to the evolving needs of our subscribers. This includes leveraging advanced technologies and methodologies to enhance the acquisition of new subscribers, optimize conversion rates, deliver engaging user experiences, and ensure long-term subscriber loyalty. The role: We are recruiting an experienced Staff Site Reliability Engineer to join our newly established TechOps division within the Technology department. We maintain the systems that keep our products running smoothly around the world, 24x7 - supporting everything from cloud infrastructure and CI/CD pipelines to observability and incident response. How you will contribute in this role: Define and implement best practices for system reliability, observability, monitoring, and alerting. Build and manage automation for our AWS cloud based services, and SaaS stack. Continuously reduce operational toil. Drive end-to-end observability across our web and mobile applications, cloud infrastructure, firewalls and CDNs. Diagnose infrastructure failures, performance bottlenecks, and production issues through strong debugging skills. Work closely with Service Delivery Managers to drive incident management processes, including postmortems and root cause analysis, and with application teams, and platform engineers to improve reliability and performance. Participate in on-call rotations, ensuring rapid incident response across our stack. Take ownership of SLAs/SLOs/SLIs and commit to continuous improvement of service levels across all platforms. Improve system resilience and minimize MTTR (mean time to recovery) through incident response automation. What we re looking for: 10 years of professional experience as a Site Reliability Engineer or in a Cloud Operations/DevOps role. 5+ years in a production environment supporting large-scale, mission-critical applications - including web, mobile, and e-commerce/payment applications. Proficient in one or more programming/scripting languages (e.g., Python, Golang, Typescript). In-depth knowledge of observability tools (e.g., New Relic, Prometheus, Grafana ). Professional experience in cloud platforms (AWS strongly preferred), such as serverless functions, API gateway, relational and NoSQL databases, and caching. Strong experience with container orchestration ( ECS, Kubernetes), CI/CD pipelines, and infrastructure-as-code (AWS CDK, Terraform, Pulumi, etc.). An advanced degree in software / data engineering, computer / information science, or a related quantitative field or equivalent work experience. Strong verbal and written communication skills and ability to work well with a wide range of stakeholders. Strong ownership, scrappy and biased for action. Preferred Qualifications: Experience with chaos engineering and game days. Background in security and compliance (SOC 2, ISO 27001, etc.). Contributions to open-source SRE tools or community involvement. Benefits We offer excellent benefits including an incentive scheme, generous annual and parental leave policies, volunteering days and well-being support throughout the year, as well as free access to all Economist content. Country specific benefits are also offered. Our Values Our values are a collective set of beliefs and behaviours that strengthen The Economist Groups purpose and demonstrate where we want to be as an organisation. They reflect on our mission to pursue progress for individuals, organisations and the world. Independence We are not bound to any party or interest and encourage exploration and free-thinking. We champion freedom, both within our organisation and around the world. Integrity We are bold in our efforts to uncover the truth and stand up for what we believe in. We inspire trust through our rigour, fact-checking and transparency. Excellence We aspire to the highest standards in all we do. We are ambitious and inquisitive in our pursuit of continuous progress and innovation. Inclusivity We value diversity in thought and background and encourage healthy debate with a breadth of perspectives. We treat our colleagues and customers fairly and respectfully. Openness The Economist Group values diversity. We are committed to equal opportunities and creating an inclusive environment for all our colleagues and potential colleagues regardless of ethnic origin, national origin, gender, gender identity, race, colour, religious beliefs, disability, sexual orientation, age, marital status or any other status. #LI-Hybrid What we offer Benefits We offer excellent benefits including an incentive programme, generous annual and parental leave policies, volunteering days and well-being support throughout the year, as well as free access to all Economist content. Country specific benefits are also offered. Our Values Our values are a collective set of beliefs and behaviours that strengthen The Economist Groups purpose and demonstrate where we want to be as an organisation. They reflect on our mission to pursue progress for individuals, organisations and the world. Independence We are not bound to any party or interest and encourage exploration and free-thinking. We champion freedom, both within our organisation and around the world. Integrity We are bold in our efforts to uncover the truth and stand up for what we believe in. We inspire trust through our rigour, fact-checking and transparency. Excellence We aspire to the highest standards in all we do. We are ambitious and inquisitive in our pursuit of continuous progress and innovation. Inclusivity We value diversity in thought and background and encourage healthy debate with a breadth of perspectives. We treat our colleagues and customers fairly and respectfully. Openness
Posted 2 weeks ago
2.0 - 5.0 years
18 - 19 Lacs
Hyderabad
Work from Office
ROLES & RESPONSIBILITIES Reviews alerts generated by SentinelOne and implements appropriate containment and mitigation measures Proficient in SIEM, with a focus on QRadar SIEM, as well as threat monitoring and hunting within SIEM environments. Analyzes payloads using JoeSandbox and escalates to the appropriate team as necessary Collaborates with the Forensics team to conduct threat hunting using identified Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs) Assists the Tiger Team in targeted collections of systems based on identified malicious activities in the clients environment Conducts historical log reviews to support threat hunting efforts and ensures all malicious artifacts are mitigated in the SentinelOne console Examines client-provided documents and files to supplement the SOC investigation and mitigation strategy Conducts perimeter scans of client infrastructure and reports any identified vulnerabilities to the Tiger Team for appropriate escalation Manages client-related tasks within the ConnectWise Manage ticketing system as part of the Client Handling Lifecycle Creates user accounts in SentinelOne console for the client Generates Threat Reports showcasing activity observed within the SentinelOne product Executes passphrase exports as needed for client offboarding Submits legacy installer requests to ensure the team is properly equipped for deployment Provides timely alert notifications to the IR team of any malicious activity impacting our clients Assists with uninstalling/migrating SentinelOne Generates Ranger reports to provide needed visibility into client environments Manages and organizes client assets (multi-site and multi-group accounts) Applies appropriate interoperability exclusions relating to SentinelOne and client applications Performs SentinelOne installation / interoperability troubleshooting as needed Contributes to the overall documentation of SOC processes and procedures Participates in Handler on Duty (HOD) shifts as assigned to support the TT client matters Internally escalates support ticket / alerts to Tier II-IV Analysts as needed May perform other duties as assigned by management SKILLS AND KNOWLEDGE Demonstrated knowledge of Windows and Unix operating systems Thorough understanding of Digital Forensics and Incident Response practices Proficiency in advanced analysis techniques for processing and reviewing large datasets in various formats Familiarity with TCP/IP and OSI Model concepts at a basic level Expertise in the Incident Response Life Cycle stages (Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned) Working knowledge of the MITRE ATT&CK framework at an intermediate level Proven ability to work independently and solve complex problems with little direction from management Highly detail-oriented and committed to producing quality work JOB REQUIREMENTS Associate s degree and 6+ years of IT related experience or Bachelor s Degree and 2-5 years related experience Current or previous knowledge of, or previous experience with, Endpoint Detection and Response (EDR) toolsets General knowledge of the Incident Handling Lifecycle Ability to communicate in both technical and non-technical terms both oral and written DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. PHYSICAL DEMANDS No physical exertion required Travel within or outside of the state Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. FLSA OVERTIME CATEGORY Job is exempt from the overtime provisions of the Fair Labor Standards Act. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description. EQUAL EMPLOYMENT OPPORTUNITY We re proud to be an equal opportunity employer- and celebrate our employees differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. #LI Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry. When you join Arete You ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters. Equal Employment Opportunity We re proud to be an equal opportunity employer- and celebrate our employees differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better.
Posted 2 weeks ago
6.0 - 8.0 years
3 - 7 Lacs
Hyderabad
Work from Office
SUMMARY The Security Engineer GSOC is responsible for all aspects of onboarding and troubleshooting for SentinelOne and AlienVault for all MDR engagements. The Security Engineer GSOC provides onboarding support, SentinelOne agent installation, troubleshooting the issues if any, sensor deployments in AlienVault and deployment of other components in SIEM solutions, log source onboarding in SIEM, and related activities for all active engagements. The Security Engineer GSOC supports overall implementation by providing necessary support for current matters. The Security Engineer GSOC role takes direction on what is needed regarding all aspects of SentinelOne and AlienVault for the engagements. The Security Engineer GSOC works with the MDR team to support SentinelOne installations, interoperability issues, exclusions, whitelisting, and overall troubleshooting. The Security Engineer GSOC ensures that SentinelOne is deployed to a client s environment they are fully protected by it and clients opting for SIEM solutions are aptly covered from security standpoint. ROLES & RESPONSIBILITIES Communicates with the client to initiate the onboarding. Prepares and shares the network prerequisites and SentinelOne packages Ensures all required details are in place before an activity is started Handles all SentinelOne-related inquiries and tasks for their assigned projects Documents SOP and procedures related to common client inquiries related to SentinelOne deployment, support, and troubleshooting Provides resolution for onboarding/performance-related issues to MDR team or engages directly with the client with guidance Provides daily reports on SentinelOne deployment status Provides technical training and acclimation for clients to familiarize themselves with the S1 interface and functionalities Drives all AlienVault deployments with customers Understands the architecture, deploys the sensors, and prepares the log baseline for assets in scope for log collection Ensures ingested logs are parsed properly and alarms are getting triggered as expected Develops custom parsers for applications to onboard them to SIEM solutions May perform other duties as assigned by management SKILLS AND KNOWLEDGE Working understanding of API queries Working understanding of scripting Working understanding of developing PowerShell scripts and writing batch files for ad hoc requirements General understanding of Windows and Unix Intervals Working understanding of information security. Thorough understanding of analysis techniques for reviewing large datasets Working understanding of TCP/IP and OSI Model Thorough understanding of the Incident Response Life Cycle (Preparation, Identification, Containment, Eradication, Recovery, Lesson Learned) Working understanding of the MITRE ATT&CK framework Ability to communicate in both technical and non-technical terms both oral and written General understanding of: o Network Security Monitoring (NSM), network traffic analysis, and log analysis o Penetration Testing / Vulnerability Scanning Thorough understanding of enterprise security controls in Active Directory / Windows environments Experience with hands-on penetration testing against Windows, Unix, or web application targets JOB REQUIREMENTS Associates degree and 6-8 years of IT security-related experience or Bachelors degree and 2-5 years related experience Current or previous experience with Endpoint Detection and Response (EDR) toolsets SOC/CIRT team experience Applied knowledge in at least one scripting or development language (such as Python), preferred DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. PHYSICAL DEMANDS No physical exertion required Travel within or outside of the state Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. FLSA OVERTIME CATEGORY Job is exempt from the overtime provisions of the Fair Labor Standards Act. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description.
Posted 2 weeks ago
1.0 - 4.0 years
4 - 8 Lacs
Chennai
Work from Office
Responsibilities: Monitor and analyze security alerts generated by Securonix SIEM . Perform initial triage of security incidents based on risk scores and behavioral analytics. Escalate security incidents to L2 for deeper investigation. Assist in fine-tuning Securonix correlation rules to reduce false positives. Document incidents, investigation steps, and outcomes in the incident management system. Support phishing investigations and basic threat analysis. Follow standard operating procedures (SOPs) for incident response. Requirements: Bachelors degree in Cybersecurity, IT, or related field. Basic knowledge of SIEM and User Entity Behavior Analytics (UEBA) . Understanding of security frameworks (NIST, SOC 2, MITRE ATT&CK). Strong analytical skills and attention to detail. Certificationslike Securonix Security Analyst, Security+, or Microsoft SC-900 (preferred).
Posted 2 weeks ago
11.0 - 18.0 years
20 - 32 Lacs
Bengaluru
Work from Office
Job Title Senior Manager - Cybersecurity and Cyber Defense Center Direct Supervisor VP - Cybersecurity and Cyber Defense Center Job Purpose To develop, manage, and execute cyber security project across Mashreq to Lead and oversee the strategic operations of the Cyber Defense Center (CDC) to ensure effective monitoring, detection, analysis, and response to advanced cybersecurity threats. Develop and implement security strategies, policies, and procedures to manage and mitigate risks across the organization. Guide and mentor the team in using SIEM platforms (Azure Sentinel & ArcSight preferred) and other security solutions to address complex and critical security events. Coordinate with senior leadership and external stakeholders to enhance the organization's security posture and ensure compliance with regulatory requirements. Dimensions Key Result Areas Strategic Security Management: Develop and implement strategies for monitoring and responding to security events from SIEM systems (Azure Sentinel & ArcSight preferred). Analyze and respond to security events from diverse data sources such as firewalls, IDS/IPS, antivirus solutions, DAM systems, web servers, proxies, and banking applications. Advanced Threat and Incident Management: Create and refine alert rules and logic in SIEM to detect significant events and threats. Perform precise, real-time analysis and correlation of logs/alerts from multiple sources. Utilize established policies, standards, and procedures to classify security alerts as incidents and guide incident response efforts. Leadership and Improvement: Improve incident response times and reduce false positives by refining detection capabilities and processes. Assist in the design, implementation, and execution of security awareness programs and risk-based security controls analysis. Update and enhance processes and policies (SOPs, playbooks, runbooks) with a deep understanding of cybersecurity best practices. Cross-Functional Collaboration: Collaborate with compliance, audit, and regulatory teams to provide necessary information, data, and evidence. Keep up-to-date with industry knowledge and trends to maintain a high level of security proficiency. Key Principles Strategic Leadership: Provide strategic direction and leadership to the Cyber Defense Center, ensuring alignment with organizational goals and cybersecurity best practices. Enhanced Threat Detection and Response: Drive improvements in threat detection and response capabilities, ensuring accurate identification and swift remediation of security incidents. Continuous Process Improvement: Continuously evaluate and enhance security processes and policies to adapt to evolving threats and improve operational efficiency. Effective Communication and Collaboration: Maintain strong communication with internal teams, senior management, and external stakeholders to ensure effective security management and compliance. Ethical and Professional Standards: Uphold high ethical standards in all security practices, ensuring compliance with regulations and protecting sensitive information. Operating Environment, Framework and Boundaries, Working Relationships Information Security / Cyber Security Regulations and Industry best practices. HO (Head Office) and International Regulators and Supervisors across the bank is operating. All business units including LOD 1-3 including LOD1 – Business, Tech GRC, Technology, LOD-2 Group Compliance, Fraud Prevention, Risk Management and LOD-3 Internal Audit. Problem Solving Proactive and Strategic Problem Solving: Lead proactive monitoring and root cause analysis of security incidents to address underlying issues effectively. Provide strategic guidance during incident response activities for complex security incidents. Log Source Management and Optimization: Oversee the onboarding and integration of new log sources, optimizing data accuracy and enhancing threat detection capabilities. Decision Making Authority & Responsibility Evaluation and Innovation: Lead evaluations and Proof of Concept (PoC) for new security solutions and technologies, driving innovation in security practices. Security Metrics and Architecture: Monitor and analyze key security metrics to ensure alignment with security standards and contribute to the development of Security Reference Architecture. Policy and Strategy Development: Guide the creation and refinement of security policies, including scope and control decisions, ensuring alignment with organizational and regulatory requirements. High-Level Collaboration: Collaborate with senior management, vendor personnel, and other teams to achieve security objectives with minimal supervision. Knowledge, Skills, and Experience Educational Background: Graduate/Postgraduate degree in Science, Engineering, or IT. Certifications: Minimum of 2 professional certifications from CISSP, CISM, CRISC, CISA, or equivalent. Experience: Extensive experience in SIEM design and implementation, with a strong background in Cyber Defense Center or Security Operations Center roles. Over 12 years of experience in SOC & CDC, with proven leadership skills and expertise in managing complex security operations. Skills: Proficiency in managing SIEM policies and enhancing security operations. Strong analytical skills for evaluating security requirements and implementing appropriate controls. Excellent documentation and report writing skills. Knowledge of the banking environment is advantageous.
Posted 2 weeks ago
10.0 - 20.0 years
60 - 85 Lacs
Bengaluru
Work from Office
DESIRED PROFILE : Expertise in working with large teams working on ASIC verification or digital verification Expertise in Digital Verification / Formal Verification flow Expertise in working on system Verilog assertions & test benches Expertise in working on UVM based verification flow Expertise in working on ARM processor Expertise in working on AMBA bus protocols (AXI, AHB, APB) Expertise in CXL or PCIe Protocol Verification Expertise in simulation tools (VCS, ModelSim, Questa) Expertise in driving Verification Strategy, writing Test Plan, developing Test Bench, Test cases. Expertise in analysing Code Coverage, Functional Coverage and Assertions. Expertise in verification of complex SoCs. Expertise in Test Plan creation and Verification technologies like Code Coverage, Functional coverage, assertion based verification. Expertise in Verification of complex datapath, DSP based ASICs Good knowledge in gate-level simulation, and Scripting languages like Python, TCL JOB SPECS : Responsible to perform Digital Verification / Formal Verification flow Responsible for meeting delivery, revenue, operational, customer satisfaction targets and team management Hire, build technical teams from scratch and manage high caliber technical teams across GCC, ODC and onsite. Must be willing to work at customer sites as per customer needs Must be willing to travel worldwide at short notice as per customer needs Develop, Drive high quality business / technology strategy and oversee the translation of this strategy into tactical action Uphold the organization's culture and long term missions Liaise and negotiate with various partners around the world to bring in new partnership. Synergize all company's resources and talents for the growth of company's business Oversee all sectors and fields of the business to ensure the company's competitiveness Provide leadership, direction, major decision making and resolution support to operations, projects and staff. Build strategic business partnerships and execute these opportunities through collaboration with external partners.
Posted 2 weeks ago
5.0 - 10.0 years
10 - 20 Lacs
Visakhapatnam, Hyderabad
Work from Office
Good Day! I hope this message finds you well.We are pleased to share the detailed job description for SDR Team Leader @ AVANTEL LIMITED, Hyderabad. Job Title: SDR Team Leader Company: AVANTEL LIMITED Location: Hyderabad, Telangana, India Experience Required: 5-12+ years (Minimum) About Avantel Limited: AVANTEL LIMITED is a technology-driven public limited company focused on developing innovative wireless communication products and solutions for defense, railways, and telecom sectors. The organization is certified against AS 9100D and ISO 9001:2015 standards for Quality Management System. For more details, visit www.avantel.in. Job Description: Avantel Limited is seeking an experienced and highly motivated Software Defined Radio (SDR) Team Leader to join our dynamic R&D team in Hyderabad. The successful candidate will lead a team of talented SDR developers, driving the design, development, and implementation of cutting-edge wireless communication products and solutions for our critical defense, railways, and telecom clients. Key Responsibilities: Technical Leadership: Provide technical leadership and guidance to a team of SDR developers, ensuring adherence to best practices and high-quality deliverables. Oversee the design, development, and testing of SDR components and systems, from concept to deployment. Architect and implement complex digital signal processing (DSP) algorithms for SDR applications. Drive innovation in SDR technology, exploring new techniques and methodologies to enhance product capabilities. Lead the integration of SDR solutions with other hardware and software components. Team Management & Mentorship: Mentor and coach team members, fostering their technical growth and professional development. Allocate tasks and manage project timelines, ensuring efficient execution and on-time delivery. Conduct code reviews and provide constructive feedback to team members. Collaborate with project managers to define project scope, objectives, and deliverables. Participate in the recruitment and onboarding of new team members. SDR Development Expertise: Lead the implementation of various channel encoding/decoding techniques in digital communication systems. Expertise in designing and implementing advanced Digital Modulation schemes (BPSK/QPSK/8PSK, QAM, etc.). Lead the design, simulation, and implementation of Digital Filters (FIR/IIR) for real-time applications. Extensive hands-on experience with Xilinx Zynq UltraScale/Kria SoM platforms, including application porting and development on PetaLinux. Deep understanding and hands-on experience with FPGA, DSP, and ARM Processor architectures for SDR implementations. Strong knowledge and practical application of SCA (Software Communications Architecture) Standards. Collaboration & Communication: Collaborate effectively with cross-functional teams including hardware engineers, RF engineers, and system architects. Communicate technical concepts and project status clearly to both technical and non-technical stakeholders. Participate in customer discussions and technical presentations as required. Quality Assurance: Ensure compliance with AS 9100D and ISO 9001:2015 Quality Management System standards throughout the SDR development lifecycle. Implement robust testing and validation procedures for SDR solutions. Bachelor's or Master's degree in Electronics and Communication Engineering, Electrical Engineering, Computer Science, or a related field. Minimum 8-12+ years of progressive experience in Software Defined Radio (SDR) development. Proven experience in leading and managing a team of SDR developers. In-depth knowledge and hands-on experience with: Channel encoding/decoding techniques (e.g., Convolutional Codes, Turbo Codes, LDPC). Digital Modulation schemes (BPSK, QPSK, 8PSK, QAM, OFDM). Digital Filter design and simulation (FIR, IIR). Xilinx Zynq UltraScale/Kria SoM, PetaLinux development and application porting. FPGA development (VHDL/Verilog), DSP implementation, and ARM processor programming for SDR. SCA Standards. Proficiency in programming languages such as C, C++, Python, MATLAB, Simulink. Experience with version control systems (e.g., Git). Strong problem-solving abilities and analytical skills. Excellent communication, interpersonal, and leadership skills. Desired Skills (Bonus Points): Experience with RF systems and wireless communication protocols. Familiarity with industry-specific defense or railway communication standards. Experience with Model-Based Design (MBD) tools. Knowledge of network protocols (TCP/IP, UDP). Why Join Avantel? Opportunity to work on cutting-edge technology in critical sectors (defense, railways, telecom). Be part of a company committed to quality and innovation (AS 9100D and ISO 9001:2015 certified). Collaborative and supportive work environment. Challenging and rewarding projects with significant impact. Opportunities for professional growth and development. Please review the attached detailed job description for more information. We look forward to your interest and are happy to discuss any questions you may have. To proceed further in the recruitment process for the SDR Team Leader @ AVANTEL LIMITED, Hyderabad , kindly share your most recent updated resume at your earliest convenience. Please ensure that the resume highlights your relevant experience, skills, and accomplishments related to the role. Thank you and Best regards, Ramakrishna Koganti Senior Manager Talent Acquisition Avantel Limited Ramakrishna.K@avantel.in
Posted 2 weeks ago
1.0 - 2.0 years
1 - 5 Lacs
Pune
Hybrid
So, what’s t he r ole all about? As a member of the Cloud Security team, a successful Cloud Security Analyst will need to be self-sufficient to collaborate effectively with multiple teams, such as Application Support, Infrastructure Operations, DevOps, Product R&D, Security teams, customers and 3 rd party auditors. This role will hold the responsibility of understanding the Cloud security policies, procedures, practices and technologies and documenting them appropriately as well as demonstrating to auditors and customers the excellent Cloud Security at NICE. A successful candidate in this role will be able to work in production cloud environments to collect and curate evidence and explain it to anyone who asks for it. Experience with Governance, Risk and Compliance (GRC) is a big plus! How will you make an impact? You will directly impact the success of the NICE cloud business by ensuring all customer and auditory security requirements are met and demonstrated. A diverse, merit-driven work environment which rewards a growth mindset and encourages innovation and continued professional development; The opportunity to work in a global, highly skilled, passionate workforce to deliver world-class service and products to market. Competitive pay and excellent benefits. Generous PTO policies. A highly focused security & compliance team which is collaborative, supportive, experienced, and driven to help everyone from the individual to enterprise to our customers realize the success for which they aim. Have you got what it takes? 1-2 years of experience with Information Security & Compliance or GRC University-level degree in InfoSec, Computer Science or other related field. knowledge with major compliance frameworks such as PCI, ISO 27001/17, SOC 2, HITRUST, GDPR. A burning curiosity to learn as much as you can about the NICE cloud environment and the services and products we offer our customers as well as the existing security infrastructure we have in place today; Excellent communications skills along to work collaboratively with security team members and operations and development teams or independently to achieve tactical and strategic security goals; Strong organization and prioritization skills; Education, training or experience with security and compliance fundamentals; Experience working with work tracking tools such as JIRA, Service Now or others. What’s in it for you? Join an ever-growing, market disrupting, global company where the teams – comprised of the best of the best – work in a fast-paced, collaborative, and creative environment! As the market leader, every day at NICE is a chance to learn and grow, and there are endless internal career opportunities across multiple roles, disciplines, domains, and locations. If you are passionate, innovative, and excited to constantly raise the bar, you may just be our next NICEr! Enjoy NICE-FLEX! At NICE, we work according to the NICE-FLEX hybrid model, which enables maximum flexibility: 2 days working from the office and 3 days of remote work, each week. Naturally, office days focus on face-to-face meetings, where teamwork and collaborative thinking generate innovation, new ideas, and a vibrant, interactive atmosphere. Requisition ID: 7117 Reporting into: Technical Manager Role Type: Individual Contributor
Posted 2 weeks ago
3.0 - 6.0 years
4 - 9 Lacs
Hyderabad, Pune, Bengaluru
Hybrid
Your key responsibilities Administration and management support of CrowdStrike Next-Gen SIEM/EDR Perform as the subject matter expert on any of the above solutions for the customer, use the capabilities of the solution in the daily operational work for the end customer. Advise customers on best practices and use cases on how to use this solution to achieve customer end state requirements. Content development (Use case development) which includes developing process for automated security event monitoring and alerting along with corresponding event response plans for systems Skills and attributes for success Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities. Experience in managing and administering security solution CrowdStrike Next-Gen SIEM/EDR Hands-on expertise in Security use case development and log source integration Good knowledge of SIEM technologies such as Splunk, Azure Sentinel from a Security Analysts point of view Exposure to IOT/OT monitoring (Claroty, Nozomi Networks etc.) is a plus Good knowledge and experience in Security Monitoring Good knowledge and experience in Cyber Incident Response Knowledge in ELK Stack Knowledge in Network monitoring technology platforms such as Fidelis XPS or others Knowledge in endpoint protection tools, techniques, and platforms such as Carbon Black, Tanium, CrowdStrike, Defender ATP or others To qualify for the role, you must have B. Tech./ B.E. with sound technical skills Strong command on verbal and written English language. Demonstrate both technical acumen and critical thinking abilities. Strong interpersonal and presentation skills. Minimum 4 years of Hands-on experience of operating/implementing the above security tools. Certification in any of the SIEM platforms is a plus Knowledge of RegEx, Perl scripting and SQL query language. Certification - CCSA, CEH, CISSP, GCIH, GIAC.
Posted 2 weeks ago
8.0 - 13.0 years
20 - 35 Lacs
Bengaluru
Work from Office
Job Title: Senior Security Analyst Threat Hunting & Incident Response Location: Bangalore (Rotational Shifts) Mode of work- 5 days WFO Experience: 8+ Years Job Type: Full-time Job Description: We are looking for a highly skilled and experienced Senior Security Analyst to join our client's Cybersecurity team. This role involves leading incident response activities, performing proactive threat hunting, and enhancing our overall security posture through innovative detection strategies and forensic investigations. Key Responsibilities: Lead end-to-end security incident response, including analysis, containment, mitigation, and reporting. Design and implement detective controls for emerging threats and vulnerabilities. Perform proactive threat hunting across multiple platforms and environments. Continuously enhance SIEM/SOAR/XDR alert use cases and threat detection capabilities. Research emerging threats, vulnerabilities, and attack techniques to improve defenses. Participate in a 24/7 on-call rotation to support incident response and critical investigations. Document incident response activities and produce detailed reports for stakeholders. Conduct post-incident reviews to drive improvements in tools, processes, and readiness. Collaborate across teams to improve the organization’s threat detection and response maturity. Required Qualifications: Bachelor’s degree in Computer Science, Cybersecurity, or related field. Minimum 8 years of experience in Security Operations, Incident Response, or Threat Detection. Strong experience with threat hunting methodologies and frameworks. Hands-on expertise with tools such as SIEM, SOAR, XDR (e.g., Cortex XSIAM, Torq). Working knowledge of MITRE ATT&CK , NIST frameworks, and cyber kill chain concepts. Preferred Skills & Experience: Strong understanding of network and endpoint security, defense-in-depth, and current threat trends. Experience with cloud security (AWS, Azure, GCP) and public cloud defense techniques . Exposure to Endpoint Detection & Response (EDR) tools, forensic analysis, and log correlation. Proficiency in scripting languages (e.g., Python, PowerShell ) for automation and analysis. Relevant certifications such as CISSP, GIAC (GCIA, GCIH, GCFA), CEH are a plus. Strong analytical mindset with the ability to assess risk and prioritize response. Excellent written and verbal communication skills.
Posted 2 weeks ago
10.0 - 15.0 years
30 - 36 Lacs
Pune
Work from Office
* Design, implement & maintain automated security solutions. * Ensure compliance with industry standards & best practices. * Monitor SIEM data & SOC alerts.
Posted 2 weeks ago
9.0 - 12.0 years
10 - 20 Lacs
Bengaluru
Hybrid
Role & responsibilities Primary Skills: SIEM: Platform Engineering, Log Integration, SIEM Reporting, Production Management. Secondary Skills: Identification of various security tools and technologies to enhance the effectiveness of security operations. SOC Lead/L3 Responsibilities: Lead and manage all high-priority and critical security incidents, including end-to-end incident management. Provide support, assistance, and guidance to L1/L2 teams in handling complex issues and incidents. Lead and participate in the study and proof of concept (POC) of tools and technologies that align with the security roadmap. Serve as an expert in one or two key security technologies/tools globally and be part of the global SOC L3/Experts team. Example areas include Threat Hunting, Forensic Analysis, IPS, EDR, DLP, etc. Contribute to the risk detection management approach, consistent with the SG MITRE Matrix and other relevant industry standards. Provide analysis support for complex investigations and improve reaction procedures, run book definitions, and enhancements. Support analyses on cybersecurity technical plans, analysis approaches, and incident management. Identify various security tools and technologies to enhance the effectiveness of security operations. Identify security gaps, develop mitigation strategies, implement solutions, and track progress until closure. Collaborate with various regional SOC and CERT teams on security aspects and incidents as required.
Posted 2 weeks ago
2.0 - 4.0 years
6 - 10 Lacs
Hyderabad
Work from Office
We are seeking a talented and highly motivated Microsoft Sentinel SIEM Engineer to join our Dedicated Defense group. As a key member of our team, you will be responsible for deploying and maintaining Microsoft Security technologies to enhance threat detection, response, and overall security posture. This is an exciting opportunity for an individual with expertise in major SIEM technologies, aiming to help safeguard critical systems and data from evolving cyber threats. Responsibilities: Architect, deploy, and maintain Microsoft Sentinel for SIEM use cases including log ingestion, data normalization, and incident correlation. Manage and optimize Microsoft Defender for Endpoint, Identity, Cloud, Office 365, and other Defender tools to maximize protection and visibility. Develop custom queries,detection rules, workbooks, and automation playbooks to improve threat detection and response efficiency. Lead the design and implementation of security monitoring, including data connectors, analytics rules, and incident automation. Collaborate with threat analysts and incident response teams to triage, investigate, and respond to security alerts and incidents. Provide technical guidance in security best practices, incident response procedures, and threat hunting using Microsoft security tools. Continuously assess the security landscape and recommend improvements to policies, tools, and configurations. In addition to strong technical acumen, the ideal candidate will bring excellent communication and client-facing skills to collaborate directly with customers, understand their security needs, and deliver tailored solutions that align with their risk posture and compliance requirements. Outcomes: Integration & Optimization: Integrate and optimize Microsoft Sentinel to improve visibility and automate threat detection workflows Threat Detection: Utilize Microsoft Sentinel AI-powered analytics to dashboard reports and automate critical reporting functions Automation & Playbook Development: Develop automated detection and response playbooks based on Microsoft data feeds, streamlining incident management and reducing time to resolution. Collaboration & Knowledge Sharing: Work closely with other security and IT teams to share threat intelligence, optimize SIEM use, and contribute to security strategy development. Reporting & Documentation: Develop and maintain dashboards, reports, and documentation related to Microsoft Sentinel deployment, performance, and incident metrics. Continuous Improvement: Continuously evaluate Microsoft Sentinel capabilities and other relevant security tools to recommend improvements and refine detection capabilities. Required Qualifications: 5 years of SIEM experience in Splunk, Qradar, Microsoft, and comparable SIEMS Hands-on experience with other SIEM platforms (Splunk, IBM QRadar, Microsoft Sentinel, etc.) and integrating them with endpoint security tools. Strong understanding of cybersecurity principles, threat detection, and SIEM management. Experience working with Sentinel One Core EDR technology Proficiency in scripting and automation (Python, PowerShell, etc.). Experience with cloud security (AWS, Azure, GCP) and cloud-native SIEM solutions is a plus. Bachelor’s degree in computer science, Information Security, or a related field (or equivalent experience). Preferred Qualifications: 5 years of experience in cybersecurity in a SOC or security engineering capacity. Proven hands-on expertise with Microsoft Sentinel and Microsoft Defender suite. Deep knowledge of Kusto Query Language (KQL) and building custom analytics rules and workbooks in Sentinel. Strong experience in customer-facing roles. Experience with incident response, threat detection, and threat hunting techniques. Strong understanding of cloud security, especially in Azure environments. Familiarity with MITRE ATT&CK, NIST, and other security frameworks. Experience integrating Sentinel with third-party solutions (e.g., threat intel feeds, ticketing systems).
Posted 2 weeks ago
8.0 - 13.0 years
12 - 20 Lacs
Gurugram
Work from Office
Controlling & Accounts - Aftermarket auto parts accounting, compliances, financial planning, reporting, GL, AR, AP, Reco., credit control, MIRO, Audits, Closings, GAAP, GST, Income tax, customer F&F, SOC, MIS, TB closures, SAP, Inventory, revenue ac
Posted 2 weeks ago
2.0 - 7.0 years
11 - 21 Lacs
Hyderabad
Work from Office
Job Title: Linux Power & Thermal Validation Engineer Location: Hyderabad Experience Level: 1 to 7 years Job Type: Full-Time Notice Period: Immediate to 15days Key Responsibilities: Validate and optimize Linux-based power and thermal management features for embedded or consumer-grade systems. Test and verify power states (e.g., CPUIdle, CPUFreq, suspend/resume, SoC low-power modes). Analyze power consumption and thermal behavior under various workloads using tools like powertop , thermal_zone , perf , and trace-cmd . Validate drivers for power domains, regulators, clocks, and thermal sensors. Work closely with SoC and kernel teams to ensure proper implementation of power and thermal policies. Perform regression testing for new kernel drops and patches related to power/thermal subsystems. Identify and debug power anomalies or overheating issues by analyzing kernel logs and hardware signals. Generate technical reports on power consumption, thermal profiles, and system behavior across test conditions. Required Skills: Strong understanding of Linux power management subsystems (suspend/resume, DVFS, PM QoS). Deep knowledge of Linux thermal framework , thermal governors, and sensor calibration/validation. Experience in driver testing and validation , particularly for PMICs, thermal sensors, and regulator frameworks. Proficient in kernel debugging tools and interpreting dmesg/logcat outputs. Hands-on experience with performance and thermal profiling tools (e.g., powertop, turbostat, iostat, sar). Scripting skills for automation using Shell , Python , or similar languages. Solid understanding of hardware-software interaction in power and thermal domains. Note - Exclude Saturdays and Sundays for Walk-in
Posted 2 weeks ago
3.0 - 5.0 years
6 - 15 Lacs
Hyderabad, Bengaluru
Work from Office
Job Description Qualification: B.Tech/M.Tech in Electronics/Computers/Electricals Job function: Will be working on SOC Infra SW driver development and embedded Core driver development. Skills/experience: Around 3-5yrs of experience. Adept programming skills and proficiency in C programming. Exposure to Embedded systems & Real Time Operating systems concepts. Exposure on processor architecture, ARM preferred. Experience in using debugging tools like Lauterbach and Trace tools. Problem solving & analysis skills; Good communication and enthusiasm to learn. Embedded Core driver working experience if possible. Ability to learn and work together in a team. Must be a Team player
Posted 2 weeks ago
3.0 - 6.0 years
7 - 11 Lacs
Gurugram
Work from Office
Job Summary: The Security consultant will be responsible for end-to-end Incident Response which includes detecting, analyzing, and responding to security incidents to protect an organizations IT infrastructure and products. The role involves working with product teams, leveraging tools, and following structured incident response policies and process. Key Responsibilities: 1. Incident Detection Analysis - Monitor security alerts from SIEM, IDS/IPS, and endpoint detection tools. - Investigate security events to determine impact, scope, and root cause. - Analyze network traffic, logs, and forensic artifacts to detect malicious activity. - Utilize frameworks like MITRE ATTCK, NIST 800-61, and Cyber Kill Chain for attack analysis. 2. Incident Response Mitigation - Respond to security incidents and perform containment, eradication, and recovery. - Document incident response actions and maintain playbooks for future reference. - Collaborate with IT, Security, and DevOps teams to implement security fixes. - Conduct malware analysis and reverse engineering when required. 3. Threat Intelligence Hunting - Stay updated on emerging threats and vulnerabilities. - Perform proactive threat hunting to detect potential attacks before they escalate. - Work with Threat Intelligence teams to assess indicators of compromise (IoCs). 4. Security Automation SOAR - Automate security incident response tasks using SOAR platforms. - Develop and optimize playbooks for automated threat containment. 5. Compliance Reporting - Ensure compliance with regulatory standards such as ISO 27001, NIST, PCI-DSS, SOC 2. - Prepare detailed incident reports and post-incident reviews (PIRs). - Assist in security audits and tabletop exercises for incident preparedness. Required Qualifications Skills Technical Skills: - SIEM Platforms - Endpoint Security - Forensics Malware Analysis - Threat Intelligence Tools - Programming/Scripting: Python, PowerShell - Cloud Security: AWS, Azure security best practices Soft Skills: - Strong problem-solving and analytical thinking. - Effective communication skills for technical and non-technical audiences. - Ability to work in high-pressure situations and make quick decisions. - Strong collaboration skills to work with cross-functional teams. Preferred Certifications: - Certified Incident Handler (GCIH) GIAC - Certified Cyber Incident Responder (ECIH) EC-Council - Certified Information Systems Security Professional (CISSP) (Nice to have) - Microsoft Certified: Security Operations Analyst Associate (Nice to have) - AI/ML Knowledge (Nice to have)
Posted 2 weeks ago
6.0 - 11.0 years
11 - 14 Lacs
Bengaluru
Work from Office
System Architect (Cybersecurity) The Cybersecurity System Architect isresponsible for the security concept definition, the execution of cybersecurityanalysis, the analysis of key cybersecurity technologies and trends, the customerand supplier facing activities. As part of theOffer Team he/she contributes to the early definition of the product and theCybersecurity Concept during the Offer Phase in order to make proper evaluationof the cybersecurity impacts on the HW and SW perimeter and related developmenteffort and costs. As part of the Systemand HW Platform/System Team he/she supports the design of the cybersecurityconcept, including requirements and architecture modeling for HW and SWcomponents, and architecture analysis. Mainactivities/responsibilities Responsible to create securedesign for Android embedded Product based on customer requirements. M onitor technology trends on HW and SW cybersecurity relevant functionalitiesalso comparing proposals from different vendors. Specify and select the basic HWand SW technologies needed to achieve the target performances and to ensure thebest cost/performance compromise. Define the cybersecurityconcept and document the functional repartition between HW and SW incooperation with HW and SW System Architects. Elaborate internal SystemRequirements related to cybersecurity in cooperation with the SystemRequirement Engineer, HW and SW System Architects Model the System at functionaland HW and SW level, also allocating System Requirements to the HW and SWSystem Blocks Provide governance in the HWand SW teams about different implementation proposals Ensure project execution andrelated work products are aligned with Cybersecurity processes andrequirements. Participate when requested tothe meetings with the customer supporting the Technical Project Leader (TPL)and SW Project Leader on technical discussions Deploy the Asset Analysis,Attack Surface and TARA. Estimate System performancesalso defining and using suitable models, in order to define the optimal HW andSW resources budget Responsible to analyzepotential security vulnerabilities. Key Skills Requirements management toolsknowledge (e.g. DOORS) System Architecture design Architecture modelingmethodologies and tools (SysML, UML, Enterprise Architect) Understanding of Cybersecuritystandards for automotive (ISO 21434, UNECE R155) Analytic tools andmethodologies (e.g. Asset Analysis, Attack Surface, TARA) Capability to effectivelydesign and use multiprocessor architectures Knowledge of Operating Systems(e.g.: Linux kernel-based OS) and real-time OS (e.g.: AUTOSAR) Silicon devices, processors,micro-controller Cybersecurity analysis and mechanisms (e.g.: Secure Boot,Trust Zone, HSM, Secure Updates FOTA, etc.) Product Development StandardProcesses Quality System knowledge Atlassian Suite (Jira,Confluence tools) knowledge Shall have experience withSecure Boot (controller specific secure boot and Android verified boot) Shall have conceptualunderstanding of securing user data and its confidentiality ( FBE andfs-verity). Shall have knowledge on workingprinciple of TLS and mTLS. Knowledge of DM-verity,FS-verity, Integrity measurement architecture (IMA), SE linux, OS Hardening andKernel Hardening is required. Shall have experience with OSand Kernal Hardening. Shall have experience withfirewall configuration. Shall have Knowledge of SElinux. Shall have knowledge workingprinciple of Trusted execution environment and Trusted Application (Keymasterand Gatekeeper) Shall have knowledge on Androidsecure storage. Working experience withQualcomm SOC is advantage. Experience with Vehicleinfotainment is added advantage. Knowledge of Virtualizationconcept using Containerization or hypervisor is added advantage. Language Skills Advanced written and spokenEnglish Education Former Experience Electronic Engineering Degree,Information Science Degree. Experience on HW and SW productdevelopment for the overall life cycle (from RFQ phase to Production followup). More than 6 years-experience ofembedded real time electronic product development with high level of SWcontents. The above competences have tobe maturated in automotive area or other large-scale markets. Experienced in planning, monitoring and control activities (ProjectManagement Tools)
Posted 2 weeks ago
5.0 - 10.0 years
35 - 40 Lacs
Bengaluru
Work from Office
An RTL Design Verification Engineer role in our Security IP (SECIP) development team, where a large number of individual embedded micro-processor (MP) subsystems and associated hardware accelerators vital to improve subsystems performance and functionality are designed and verified. These subsystem IPs provide high performance functions to System on Chip (SoC) products across all AMD business units such as client computers, servers, discrete graphics, and gaming. Our verification engineers will work on block level functional verification and its closure, and/or on subsystem level integration and verification for a variety of embedded MP subsystems. Your expertise will impact security policy management, cryptography, data compression, high throughput DMA, power management, and many other subsystem applications. The person: A talented hardware/firmware co-design/verification engineer with strong records of technical ownership and execution to drive block level IP and/or MP subsystem design and verification assignments to completion. A forward-thinking engineer who tends to optimize/improve the workflow, anticipate/analyze/resolve technical issues, enjoy a competitive pace while empowering and mentoring team members. A strong written and verbal communicator with strong problem solving and attention to detail skills along with professional interpersonal communication capability. Key responsibilities: Develop and maintain block level IP and MP subsystem verification architecture, testbenches, test methodology and infrastructure Develop and debug test plans using SystemVerilog/UVM constrained-random test methodology, C-DPI directed test methodology, formal proof verification methodology, and using object-oriented programming (OOP) techniques to implement/maintain testbenches and tests Triage regressions, debug simulations, analyze coverage, work/resolve technical issues with design, verification and other teams to achieve verification closure Participate in MP subsystem specification, influence IP micro-architecture development (design for verification aspect), design and execute reusable test methodology across individual MP subsystems Debug and solve integration issues with SoC Integration and SoC DV teams Provide technical leadership in verification methodology development and critical problem resolution if as advanced level team members Provide project execution leadership in term of technical assignment ownership, technical mentorship, task planning through divide and conquer, task progress reporting and forecasting if as advanced level team members Preferred experience: BSc with a minimum of equivalent 5 years relevant experience; or MSc with a minimum of equivalent 3 years; or PhD in a directly related research area and a minimum of 1 year A minimum of equivalent 10 years relevant experience if as advanced level team members Proven understanding of MP subsystem and/or common hardware datapath accelerator architectures as well as deep knowledge of applicable state-of-art verification methodology and best practices, if as advanced level team members Proficient in System Verilog, object oriented programming, and scripting (using Ruby, Perl, Python and Makefile) Proven skills in creating UVC and other UVM components. Experience with C-DPI and Formal Verification techniques are valuable assets. Excellent understanding of standard bus/interface protocols (i.e. AXI, AHB, AMBA) Proven experience with ASIC verification tools: simulation, debugging, linting, power aware simulation, etc. Relevant design domain specific knowledge and technical leadership capability required for advanced level candidates Academic credentials: Bachelors Degree or Masters Degree in Electrical Engineering, Computer Engineering, or Computer Science, or possibly a related field Masters Degree preferred
Posted 2 weeks ago
4.0 - 9.0 years
13 - 18 Lacs
Bengaluru
Work from Office
You are a passionate and skilled Analog Layout Design Engineer with a keen eye for detail and a deep understanding of advanced semiconductor technologies. You thrive in dynamic environments and possess a strong problem-solving aptitude. With a profound expertise in developing high-quality layouts and physical verification techniques, you are ready to contribute to cutting-edge DDR/HBM/UCIe IP development. You excel in collaboration, fostering accountability and ownership within teams, and have excellent written, verbal communication, and interpersonal skills. Your commitment to diversity and inclusion aligns with Synopsys values, and you are eager to work in an environment that welcomes all perspectives. What You ll Be Doing: Hands-on development of layout for next-generation DDR/HBM/UCIe IPs. Solving complex problems and debugging issues effectively. Executing layout floor planning, routing, and physical verifications to meet stringent quality requirements. Ensuring compliance with DRC, LVS, ERC, and antenna rules. Applying deep submicron effects, floorplan techniques in CMOS, FinFET, and GAA process technologies (7nm and below). Implementing layout matching techniques, ESD, latch-up, EMIR, DFM, and LEF generation. The Impact You Will Have: Enhancing the performance and reliability of Synopsys DDR/HBM/UCIe IPs. Accelerating the integration of advanced capabilities into SoCs. Reducing risk and improving time-to-market for differentiated products. Driving innovation in semiconductor technology and design. Contributing to the success of Synopsys Silicon IP business. Fostering a collaborative and inclusive work environment. What You ll Need: BTech/MTech degree in a relevant field. 4+ years of experience in analog layout design. Proven track record in developing high-quality layouts and meeting verification timelines. Strong understanding of deep submicron effects and floorplan techniques. Exposure to layout matching, ESD, latch-up, EMIR, DFM, and LEF generation. Who You Are: Detail-oriented with excellent problem-solving skills. Collaborative and able to foster accountability and ownership. Strong written, verbal communication, and interpersonal skills. Committed to diversity and inclusion.
Posted 2 weeks ago
4.0 - 6.0 years
6 - 10 Lacs
Bengaluru
Work from Office
Understanding of network defence principles, common attack vectors, and attacker techniques. Technical baseline skills and the ability to acquire in-depth knowledge of network and host security technologies Basic Linux/Windows OS knowledge, firewall rules and policy fundamentals. Excellent analytical and problem-solving skills. Strong work ethic and commitment to accomplish assigned tasks with a sense of urgency. Windows, Linux, Network Security, Phishing, Splunk, Malware
Posted 2 weeks ago
8.0 - 10.0 years
8 - 12 Lacs
Hyderabad
Work from Office
We are looking forward to hire NIST Professionals in the following areas : Position Name: Lead Consultant - OT/ IOT Description YASH is a Digital services enabler organization delivering vast portfolio of digital services to customers across the globe. Our topline services include Cybersecurity services. This role will be part of vibrant YASH s Cybersecurity - Security Operations Team. We are looking for candidates who will embrace our Security strategy in the design, implementation and operations of Azure Sentinel with a focus on Azure. As an Azure Sentinel Administrator, you should have experience in all aspects of SIEM tools including estimating, designing, fine tuning, log source integration, threat hunting and automation. Attributes we will look for in our candidates include excellent technical and analytical skills, communication and flexibility, innovative thinking and problem solving. In addition, this position is responsible for analyzing security vulnerabilities and determining if there is an attack surface and impact. The ideal candidate understands the complete implementation of a SIEM tool. Position - Lead Consultant - OT/ IOT Security Number - 1 Location - Bangalore/ Pune / Indore Total Experience - 8 -10 Years How do you grow and be successful: At YASH, we will offer all support to grow in your career. At the very beginning you will receive a deep knowledge on the current SOPs once you are fully onboarded into our Security Operations team. You will be measured on the positive contribution in delivering the SIEM services to our customers. Fluency will be measured on the goals such as improvement of cyber posture of customers through our Manage detect and respond services. Our employees will have global exposure from day-1. We offer to learn multiple security domains through our mentored on-the-job training program. Aspiring candidates will reach to highest positions and make a global career. Preferred Skills: Minimum 8+ years of experience in developing use cases customized to the environment. Work on Cloud SIEM project implementations for various customers in different locations, starting with estimating the SIEM configuration to successful deployment and fine tuning of the solution Configure data digestion types and connectors. Create incident categorization and threat management plan. End to end operational knowledge of Azure Incident Management Process/SLAs. Configure Sentinel Incidents, Workbooks, Hunt queries, Notebooks. Support on-going development and troubleshooting of Azure Sentinel. Advise and develop Azure Sentinel adoption migration roadmap for clients. Analytic design and configuration of the events and logs being digested. Preferred with experience on SOAR tools like IBM SOAR(Resilient), Splunk SOAR(Phantom) , Microsoft Sentinel SOAR, knowledge in Jupyter and logicApps or any other SOAR Tool. In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc Use Case Fine tuning and New Use case creation. Hands-on experience with Azure Sentinel/Kusto Query language preferred). Azure Security Services for Vulnerability Assessment and Compliance practices analysis, Develop, automate, and orchestrate tasks(playbooks) with logic apps based on certain events. Tuning threat detection to minimize noise and amplify a signal. Experience in SIEM/ SOAR Playbook creation technologies understanding the log source integration. Responsible for integration review of standard and non-standard logs in SIEM Provide support to the Security Operations Center (SOC) during incident response, event monitoring, and threat hunting activities. Proficient in one or more of the following computer languages PowerShell, Bash ,Python KQL to support cyber threat detection or reporting. Security API implementations can be considered as well. Deep understanding of either MITRE Attack framework (MITRE preferred) or the Cyber Kill Chain Experience in threat management. Knowledge of various operating system flavors including but not limited to Windows, Linux, Unix. Knowledge of applications, databases, middleware to address security threats against the same. Proficient in preparation of reports, dashboards and documentation. Working knowledge Passion for Cyber Security, being the basic ingredient of success. Ensure compliance to SLA, process adherence and process improvisation to achieve operational objectives Necessary soft-skills set to successfully understand, challenge and translate the business needs and communicate to the relevant parties with a structured and methodical approach to problem solving You are a team player with good communication skills, proactive and highly motivated individual with a serious hands-on work ethic Qualifications: A bachelors or masters degree in computer science, information technology Preferred Certifications: Azure Security Certifications, SIEM certifications Our Hyperlearning workplace is grounded upon four principles Flexible work arrangements, Free spirit, and emotional positivity Agile self-determination, trust, transparency, and open collaboration All Support needed for the realization of business goals, Stable employment with a great atmosphere and ethical corporate culture
Posted 2 weeks ago
2.0 - 3.0 years
1 - 5 Lacs
Surat
Work from Office
Quality Analyst (QA) is responsible for assessing the quality of the performanceof our call center associates who deal with our existing and potentialcustomer. The QA will monitor inbound and outbound call ,emails and chatbotresponses to assess associates demeanor, technical accuracy, customer serviceperformance, and conformity to company policies and procedures. This individualwill assist in developing, creating and implementing call center qualityprocesses and procedures; as we'll as would be responsible to train theassociates as needed to enhance the over Waaree customer's experience Roles& Responsibilities: 1. Participatesin design of call monitoring formats and quality standards. 2. Performscall monitoring and provides trend data to site management team. 3. Usesquality monitoring data management system to compile and track performance atteam and individuallevel. 4. Performsmonitors of customer care email responses and chat bot conversation withcustomer. 5 Participatesin customer and client listening programs to identify customer needs andexpectations. 6 Providesactionable data to various internal support groups as needed. 7. Coordinatesand facilitates call calibration sessions for call center staff. Requirements: Excellent verbal, written andinterpersonal communication skills; Outstanding customer serviceskills and dedication to providing exceptional customer care; Must be self-motivator andself-starter; Focus on quality and customerservice; Exceptional listening andanalytical skills; Must be able to effectively dealwith people at all levels inside and outside of the Company; Creative ability & writingproficiency; Must be proficient withMicrosoft Office (intermediate Word, basic Excel); Education& Experience: Bachelors Degree 2-3 years Call Center Experience
Posted 2 weeks ago
1.0 - 5.0 years
17 - 18 Lacs
Bengaluru
Work from Office
As a Full-Chip Floor Planning Engineer, you will play a crucial role in the physical design and implementation of advanced semiconductor chips. Working closely with RTL designers, physical design teams, and other cross-functional groups, you will be responsible for full-chip floor planning, enabling efficient design layouts, and optimizing the placement of major functional blocks. This position requires a solid understanding of physical design and chip architecture, as we'll as experience in floor planning tools and methodologies for high-performance and low-power design. Technical Requirements Proven experience in top level floor planning/block partition which includes physical partition, pin/feedthrough placements and repeaters assignments. Experience in SOC floorplan aspects like FullChip clock spine distribution, analog integration, push down macros, GPIOs. Proficiency in EDA tools such as Cadence, Synopsys ICC, Calibre, etc Strong scripting skills in Tcl, Perl, or Python for automation In-depth knowledge of upf, floor planning concepts, including chip partitioning, placement, and routing methodologies. Experience with power, timing, and area optimization techniques Familiarity with design rule check (DRC) requirements. Responsibilities Lead the floor planning process from RTL to GDSII, optimizing block placement, chip partitioning, and routing feasibility to ensure timing, power, and area constraints are met. Collaborate with RTL, block-level, and physical design teams to integrate IPs, macros, and other design components efficiently at the top level Work on area and power optimization techniques to achieve a highly efficient chip layout. Perform what-if analyses to evaluate trade-offs and optimize design parameters. Interface with architecture, package, and timing teams to align on chip-level requirements and ensure the physical design meets performance and design intent. Identify potential design issues early in the floor planning process and collaborate with stakeholders to develop and implement mitigation strategies Develop, enhance, and maintain custom scripts to automate repetitive tasks within the floor planning flow, ensuring efficiency and accuracy.
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The job market for Security Operations Center (SOC) professionals in India is thriving with the increasing demand for cybersecurity experts. SOC jobs involve monitoring, detecting, and responding to security incidents to protect organizations from cyber threats. If you are considering a career in cybersecurity, exploring SOC roles in India can be a rewarding option.
These cities are known for their strong presence of IT and cybersecurity companies actively seeking SOC professionals.
The average salary range for SOC professionals in India varies based on experience and expertise. Entry-level SOC analysts can expect to earn around INR 4-6 lakhs per annum, while experienced SOC managers or consultants can command salaries ranging from INR 12-20 lakhs per annum.
In the SOC field, a typical career progression may include roles such as SOC Analyst, SOC Engineer, SOC Team Lead, SOC Manager, and eventually Chief Information Security Officer (CISO). Advancing through these roles often involves gaining experience, acquiring relevant certifications, and developing strong analytical and problem-solving skills.
Besides expertise in SOC operations, professionals in this field are expected to have knowledge of network security, incident response, threat intelligence, and cybersecurity tools. Proficiency in programming languages like Python, knowledge of SIEM (Security Information and Event Management) tools, and familiarity with compliance standards such as GDPR and ISO 27001 can also be beneficial.
As you navigate the SOC job market in India, remember to continuously enhance your skills, stay updated with industry trends, and showcase your passion for cybersecurity. With dedication and preparation, you can confidently pursue rewarding opportunities in this dynamic field. Good luck in your job search!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.