Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
4.0 - 5.0 years
6 - 10 Lacs
Bengaluru
Work from Office
Job Title Required Qualifications System Verilog, UVM, C Scripting languages (Python, Tcl, Perl) Understanding of bus protocols (AXI, AHB, APB, etc.) Proven written and verbal technical communication skills Ability to collaborate in a team environment Excellent analytical and problem-solving skills. Preferred Qualifications From-scratch development of IP or SoC testbenches Familiarity with RISC-V architecture, Functional Safety Standards (ISO 26262) Background with power-ware (UPF) and gate-level simulations (GLS) Ownership of complete verification cycle (verification planning -> coverage closure) in a project Use of formal verification, particularly connectivity, to confirm SoC connectivity requirements Knowledge of UVM Register Abstraction Layer (RAL) and integration of 3rd party VIPs Experience 4-5 years
Posted 3 weeks ago
2.0 - 5.0 years
1 - 5 Lacs
Pune
Work from Office
About The Role Job Title - Security Operations Center (SOC) Operator Management Level : CL11 Analyst / CL 10 Senior Analyst Location: Pune, PDC3C, Hinjewadi Must have skills: Excellent verbal and written communication skills Access control alarm monitoring CCTV monitoring Risk monitoring Handling safety / security related calls from employees Good to have skills: Experience in Global Security Operations Center / Regional Security Operations Center Sending mass notification / people advisory to employees / travel advisories Job Summary : The SOC Operator will be responsible for assessing, analyzing, and responding to incidents related to safety and security for the APAC region. The role requires daily use of tools/systems (e.g., access control, video management, risk feeds) to detect the impact to Accentures people, products, property, or brand image and alert the appropriate response stakeholders. Specifically, incidents may range from extreme weather conditions, political instability, crime, terror, civil unrest, and other personnel issues. In addition, the Operator will be responsible for customer service tasks to provide critical information and assistance to travelers, static employees, and potentially third parties. This role will be based in Hinjewadi, Pune, Maharashtra and reports to the SOC Shift Supervisor. Roles & Responsibilities: Monitor and operate security systems including access control and CCTV, along with environmental monitoring and mass notification systems. Respond quickly and initiate action related to alarms, phone calls, and environmental monitoring and alerting systems Notify, assist, and direct external emergency personnel and internal resources as necessary Dispatch security officers or law enforcement personnel for alarm response, calls for service, and emergency situations Execute protocols and communicate at all levels across the APAC region to employees, site security leads, safety & security staff, or contracted officers as needed Manage information flows to and from an incident Maintain operational logs, conduct daily shift checklists, handover reports, and incident reports Ensure all forms of communication, such as e-mails, phone conversations, and client interactions, are conducted in a courteous and professional manner, confidentially, and documented appropriately Coordinate with Accentures Corporate Security regional leads on incident detection and management Coordinate with Accentures Corporate executive protection leads on incident detection and management Ensure that complete and accurate information is entered into the incident management system Utilize and execute protocols and standard operating procedures to effectively manage global incidents. Monitor travel safety and security of the company's staff Maintain situational awareness of current global current events. Monitor and respond to global alerts and events affecting company facilities and employees providing immediate information and assistance as needed Initiate mass communication notifications as required Notify leadership of events affecting business operations and employees Ensure proper handling of highly confidential information. Perform other duties assigned by supervisors related to security and safety Additional Information: Experience with CCTV/video management and access control systems such as Genetec video solutions or CCure 9000 Experience with protective intelligence monitoring tools such as Everbridge and ISOS Tracker Great active listening skills Rapport building skills Patient and empathetic attitude Adaptability and flexibility Ability to analyze threats and envision potential or real time impact to operations Ability to respond quickly and calmly to emergencies and stressful situations by exercising proper judgment and decision-making skills Strong Customer Service skills Strong consensus, team building and negotiating skills Ability to work overtime on short notice Strong cultural sensitivities Be able to type a minimum of 35 words per min Excellent written and verbal communication skills Ability to multitask in a fast-paced, at times stressed work environment Strong team player Comfortable with high-tech work environment, and constant learning of new tools and innovations Proficient in Microsoft Windows and Office Suite About Our Company | Accenture Qualification Experience: Minimum 2 year(s) of experience is required Educational Qualification: Degree in any stream
Posted 3 weeks ago
5.0 - 10.0 years
8 - 12 Lacs
Hosur, Bengaluru
Work from Office
Tasks: Verificationof SoCs, automotive ASICs, subsystems, IPs. Application of Metric-driven Verification (MDV) and/or Formal Verification methodologies Developing and tracking of Verification plans Develop verification environments from scratch Create VIP Integration of VIP ( Verification-IP ) Measure and analyze regression results Continuous improvement of verification methods/tools/flows/processes together with EDA partners Requirement: 5 to 10 years of Experience in Digital RTL verification using System Verilog and UVM. Sound knowledge of constrained random verification, UVM/OVM Sound knowledge in System Verilog. Experience of developing functional coverage code, coverage analysis. Experience of developing verification environments from scratch is desirable. Good hands on experience with cadence/Synopsys/Mentor tools. Exposure to configuration management, bug tracking tool etc. Knowledge of scripting language, Perl TCL etc. Good experience with AMBA protocols Working knowledgeon ARM processor-based subsystem/SoC verification Formal verification experience is a desirable but not must. Must have been a part of one or more ASIC/SoC tape outs. Knowledge of VHDL/VERILOG. SPECMAN knowledge is a desirable but not must.
Posted 3 weeks ago
0.0 - 4.0 years
32 - 40 Lacs
Bengaluru
Work from Office
NVIDIA has been redefining computer graphics, PC gaming, and accelerated computing for more than 25 years. It s a unique legacy of innovation that s fueled by phenomenal technology and amazing people. Today, we re tapping into the unlimited potential of AI to define the next era of computing. An era in which our GPU acts as the brains of computers, robots, and self-driving cars that can understand the world. Doing what s never been done before takes vision, innovation, and the world s best talent. As an NVIDIAN, you ll be immersed in a diverse, inclusive and supportive environment where everyone is inspired to do their lifes best work. The complexity of IOs increased many-fold to support the sophisticated speeds that power our product lines ranging from consumer graphics to self-driving cars and the growing field of artificial intelligence. IODFX Engineering team at NVIDIA works on groundbreaking innovations involving crafting creative solutions for IO and interconnect testing for some of the industrys most complex semiconductor chips. Join the team and see how you can make a lasting impact on the world. What youll be doing: POR to Post Silicon Testing of DFX features for high speed IOs. This includes crafting of test features crucial for manufacturing testability of HighSpeed IOs. Architect, Design & Validate these test features with a robust & scalable testplan development at unit-level and SOC/Full Chip level using verification methodologies like UVM and NVIDIA Internal tools. Pre-Silicon Simulation and Debug of Test functionality using standard Industry tools and sign off on Test coverage for various products using standard coverage metrics. Ability to work on automation, flow development & improvement, coverage metrics, test execution, bug identification/fix and IO-test productization. Solve complex Test problems in the mixed-signal world and develop a scalable test solution that works across platforms. Work with powerful Industry-standard tools for Design and verification methodologies along with SV, UVM, Perl, Python and adapt to NVIDIA custom tools/flows. Partnering closely with our IP teams for design/verification of IOBIST test-logic, Collaborating with Mixed Signal Circuit design teams to understand the analog design components in an IO cell. Collaborate with other DFX teams, coordinate with Post Silicon Test Engineering and Production Engineering teams for productizing quality test at efficient test cost. What we need to see: Btech/BE/BS or Mtech/ME/MS in EE/ECE or equivalent experience Solid Analytical and Problem Solving skills. Good understanding and Exposure to Logic design, Architecture & Verification Strong Coding skills in industry standard scripting languages. 3+ yrs of experience in DFT and/or Industry-standard verification flows like constrained random testing, UVM, coverage metrics, profiling tools, X prop, etc. will be plus. Outstanding written and oral communication skills with the curiosity to learn. With competitive salaries and a generous benefits package, we are widely considered to be one of the technology world s most desirable employers. We have some of the most brilliant and talented people in the world working for us and, due to unprecedented growth, our elite engineering teams are rapidly growing. If youre a creative and autonomous engineer with a real passion for technology, we want to hear from you. #LI-Hybrid
Posted 3 weeks ago
5.0 - 10.0 years
1 - 5 Lacs
Bengaluru
Work from Office
About The Role Project Role : Application Tech Support Practitioner Project Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on deep product knowledge. Must have skills : Splunk Administration Good to have skills : Splunk Enterprise Architecture and DesignMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Tech Support Practitioner, you will act as the ongoing interface between the client and the system or application. You will be dedicated to quality, using exceptional communication skills to keep our world-class systems running. With your deep product knowledge, you will accurately define a client issue and interpret and design a resolution. Your typical day will involve providing ongoing support to clients, troubleshooting issues, and ensuring the smooth functioning of the system or application. Roles & Responsibilities:- Expected to be an SME, collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Ensure effective communication with clients to understand their issues and provide timely resolutions.- Troubleshoot and resolve technical issues related to the system or application.- Collaborate with cross-functional teams to identify and implement improvements to enhance system performance.- Stay updated with the latest industry trends and technologies to provide proactive support and recommendations. Professional & Technical Skills: - Must To Have Skills: Proficiency in Splunk Administration.- Good To Have Skills: Experience with Splunk Enterprise Architecture and Design.- Strong understanding of system and application support principles.- Experience in troubleshooting and resolving technical issues.- Knowledge of ITIL processes and best practices.- Excellent communication and interpersonal skills to effectively interact with clients and cross-functional teams. Additional Information:- The candidate should have a minimum of 5 years of experience in Splunk Administration.- This position is based at our Bengaluru office.- A 15 years full-time education is required. Qualification 15 years full time education
Posted 3 weeks ago
15.0 - 25.0 years
12 - 16 Lacs
Nagpur
Work from Office
About The Role Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : Security Delivery Governance Good to have skills : Identity Access Management (IAM), Security Information and Event Management (SIEM)Minimum 15 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Roles & Responsibilities:- Expected to be a SME with deep knowledge and experience.- Should have Influencing and Advisory skills.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Expected to provide solutions to problems that apply across multiple teams.- Lead and manage the Security Delivery team effectively.- Develop and implement Security Delivery Governance strategies.- Collaborate with cross-functional teams to ensure successful project delivery. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Delivery Governance.- Good To Have Skills: Experience with Identity Access Management (IAM), Security Information and Event Management (SIEM).- Strong understanding of security principles and best practices.- Experience in developing and implementing security policies and procedures.- Knowledge of regulatory compliance requirements related to security.- Excellent communication and leadership skills. Additional Information:- The candidate should have a minimum of 15 years of experience in Security Delivery Governance.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
0.0 - 1.0 years
0 Lacs
Bengaluru
Work from Office
Positions are open for full-time and co-op/internship in the areas of CPU and SOC physical implementation from unit level to chip level, involving all aspects of physical design functions such as P&R, timing, floorplan, clocking, electrical analysis, and power. Responsibilities Own block level design from RTL-to-GDSII and drive synthesis, floor-planning, place & route, timing closure, and signoff. Work extensively with Micro-architects to perform feasibility studies and explore performance, power & area (PPA) tradeoffs for design closure. Develop physical design methodologies and customize recipes across various implementation steps to optimize PPA. Work with a multi-functional engineering team to implement and validate physical design by running all signoff flows such as Timing, Power, EM/IR, PDV. Requirements Knowledge using synthesis, place & route, analysis and verification CAD tools. Familiarity with logic & physical design principles to drive low-power & higher-performance designs. Knowledge of scripting in some of these languages: Unix, Perl, Python, and TCL. Good understanding of device physics and experience in deep sub-micron technologiesKnowledge of Verilog and SystemVerilog. Excellent skills in problem solving, written and verbal communication, excellent organization skills, and highly self-motivated. Ability to work well in a team and be productive under aggressive schedules. Education and Experience PhD, Master s Degree or Bachelor s Degree in technical subject area.
Posted 3 weeks ago
3.0 - 7.0 years
9 - 10 Lacs
Mumbai
Work from Office
Paramatrix Technologies Pvt. Ltd is looking for SOC Analyst L3 to join our dynamic team and embark on a rewarding career journey Monitor and analyze security events and incidents, identifying and investigating potential threats Maintain the security of our network and systems by implementing security controls and best practices Work closely with the rest of the security team to ensure that our systems and networks are secure and compliant with industry standards Maintain accurate documentation and reports on security events and incidents Communicate effectively with team members and other stakeholders to ensure that security issues are addressed in a timely and effective manner Stay up to date with the latest security technologies and threats
Posted 3 weeks ago
1.0 - 3.0 years
6 - 9 Lacs
Ahmedabad
Work from Office
Narnarayan Shastri Institute of Technology IFSCS is looking for Cyber Security Professional to join our dynamic team and embark on a rewarding career journey Threat Detection and Analysis: Monitor network traffic, system logs, and security alerts to detect and analyze potential security threats, such as malware, intrusions, and unauthorized access Incident Response: Develop and execute incident response plans to address and mitigate security incidents and breaches Vulnerability Assessment: Identify vulnerabilities in software, hardware, and network configurations, and recommend patches and security updates Security Monitoring: Continuously monitor and analyze security events, assess system vulnerabilities, and recommend security enhancements Security Policies and Procedures: Develop and enforce security policies, standards, and procedures to ensure a consistent and secure computing environment Access Control: Implement and manage access control systems, including user authentication, authorization, and password policies Security Tools: Utilize a range of security tools, such as intrusion detection systems (IDS), intrusion prevention systems (IPS), firewalls, antivirus software, and data encryption
Posted 3 weeks ago
1.0 - 5.0 years
3 - 7 Lacs
Kochi
Work from Office
You have an opportunity to personally thrive, make a difference and be part of a culture where individuality is noticed and valued every day. Job Track Description: Performs business support or technical work, using data organizing and coordination skills. Performs tasks based on established procedures. In some areas, requires vocational training, certifications, licensures, or equivalent experience. General Profile Expands skills within an analytical or operational process. Maintains appropriate licenses, training, and certifications. Applies experience and skills to complete assigned work. Works within established procedures and practices. Works with a moderate degree of supervision. Functional Knowledge Has developed skillset in a range of processes, procedures, and systems. Business Expertise Supports the achievement of company goals by integrating teams for the best outcome. Impact Impacts a team through quality of services and information provided. Follows standardized procedures and practices and receives moderate supervision and guidance. Leadership Has no supervisory responsibilities. Manages own workload. Problem Solving Ability to problem solve, self-guided. Evaluates issues and solutions to provide the best outcome for the client and end-users. Interpersonal Skills Exchanges information and ideas effectively. Responsibility Statements Reviews current processes and identifies trends. Reviews work produced for errors. Evaluates for performance standards (SLAs) required under contract. Compares various sampling techniques and identifies correct samples for auditing. Evaluates workflow tools to run reports. Coaches Level 1 auditors on sampling techniques and business process knowledge. Reconciles transaction processing for data accuracy. Interacts with external auditors to include (SOC 1) Service and Organizational Control Report. Performs other duties as assigned. Complies with all policies and standards.
Posted 3 weeks ago
1.0 - 5.0 years
3 - 7 Lacs
Visakhapatnam
Work from Office
You have an opportunity to personally thrive, make a difference and be part of a culture where individuality is noticed and valued every day. Performs business support or technical work, using data organizing and coordination skills. Performs tasks based on established procedures. In some areas, requires vocational training, certifications, licensures, or equivalent experience. General Profile Expands skills within an analytical or operational process. Maintains appropriate licenses, training, and certifications. Applies experience and skills to complete assigned work. Works within established procedures and practices. Works with a moderate degree of supervision. Functional Knowledge Has developed skillset in a range of processes, procedures, and systems. Business Expertise Supports the achievement of company goals by integrating teams for the best outcome. Impact Impacts a team through quality of services and information provided. Follows standardized procedures and practices and receives moderate supervision and guidance. Leadership Has no supervisory responsibilities. Manages own workload. Problem Solving Ability to problem solve, self-guided. Evaluates issues and solutions to provide the best outcome for the client and end-users. Interpersonal Skills Exchanges information and ideas effectively. Responsibility Statements Reviews current processes and identifies trends. Reviews work produced for errors. Evaluates for performance standards (SLAs) required under contract. Compares various sampling techniques and identifies correct samples for auditing. Evaluates workflow tools to run reports. Coaches Level 1 auditors on sampling techniques and business process knowledge. Reconciles transaction processing for data accuracy. Interacts with external auditors to include (SOC 1) Service and Organizational Control Report. Performs other duties as assigned. Complies with all policies and standards.
Posted 3 weeks ago
5.0 - 10.0 years
7 - 12 Lacs
Bengaluru
Work from Office
col-tn-12 col-lg-8 padding-0 centered"> About this position About this Position: Analysis, Coordinate the containment and eradication of malicious activities with internal and external parties and investigate, document, and report on any information security (InfoSec) issues What you ll do: Monitor, analyze, prioritize security events & perform remediation by utilizing playbooks Threat and vulnerability analysis by leveraging data from different tools and sources - utilize case management tool Investigate on aggregated security events from SIEM solution Mitigate risks before security events reach critical infrastructure Investigate, document, and report on any information security (InfoSec) issues as well as emerging trends Analysis and response to previously unknown hardware and software vulnerabilities Coordinate the containment and eradication of malicious activities with internal and external parties Notify appropriate business stakeholders about serious security events Implement security improvements by assessing current situation, evaluating market trends, and anticipating requirements What makes you a good fit: Masters degree in computer science or IT/Engineering with focus on IT security 5 years of broad professional experience in a similar role Deep understanding of how a state-of-the-art Security Operation Center operates and common tools used within a SOC Experience in use of The Hive and Elasticsearch are beneficial A certification or qualification in the context of IT security with reference to Red Team/Blue Team would be highly desirable Well-settled experience in IT security management with the ability to deep-dive into technical topics Proven analytical and report writing skills and Fluent in English Start-up mentality and the willingness to develop together in a young team Some perks of joining Henkel: Flexible work scheme with flexible hours, hybrid work model, and work from anywhere policy for up to 30 days per year Diverse national and international growth opportunities Globally wellbeing standards with health and preventive care programs Gender-neutral parental leave for a minimum of 8 weeks Employee Share Plan with voluntary investment and Henkel matching shares Best-in-class Group Medical Insurance policy covering employee, spouse and up to 2 children Competitive accident and term life policies for up to 3 times annual gross salary Progressive OPD policy of INR 30,000 for employee, spouse and up to 2 children
Posted 3 weeks ago
25.0 - 30.0 years
25 - 30 Lacs
Mumbai, New Delhi, Hyderabad
Work from Office
About Certify : At CertifyOS, were building the infrastructure that powers the next generation of provider data products, making healthcare more efficient, accessible, and innovative. Our platform is the ultimate source of truth for provider data, offering unparalleled ease and trust while making data easily accessible and actionable for the entire healthcare ecosystem. What sets us apartOur cutting-edge, API-first, UI-agnostic, end-to-end provider network management platform automates licensing, enrollment, credentialing, and network monitoring like never before. With direct integrations into hundreds of primary sources, we have an unbeatable advantage in enhancing visibility into the entire provider network management process. Plus, our team brings over 25+ years of combined experience building provider data systems at Oscar Health, and were backed by top-tier VC firms who share our bold vision of creating a one-of-a-kind healthcare cloud that eliminates friction surrounding provider data. But its not just about the technology; its about the people behind it. At Certify, we foster a meritocratic environment where every voice is heard, valued, and celebrated. Were founded on the principles of trust, transparency, and accountability, and were not afraid to challenge the status quo at every turn. Were looking for purpose-driven individuals like you to join us on this exhilarating ride as we redefine healthcare data infrastructure. About the role: As a Senior DevOps Engineer, you ll play a key role in helping design and build the infrastructure of the systems that run our products and business. If you want to have a hand in influencing the overall architecture, tools, and services of our platform with a collaborative team then this role is for you. What you ll do: Develop and maintain tools and services that make up our highly available and scalable platform (we use GCP), including resource provisioning and management, access delegation, and costs control Provide technical leadership and mentorship for junior team members Manage access and related permissions to comply with privacy and security standards (SOC 2 Type 2) Manage high availability and disaster recovery systems, procedures, and readiness Contribute to agile team rituals and processes (stand-ups, groomings, planning meetings) Enable teams to deploy, and operate their services in production by building tools and processes that allow self-service management of our production services. What you ll need: A background in cloud Infrastructure Engineering/DevOps, deploying and maintaining multi-tiered application architectures Public cloud platforms GCP-Google Cloud (essential), Azure and/or AWS (advantageous) Experience with Terraform, Docker, Google container environments (Cloud Run, App Engine, GKE) , Understanding and usage of CI/CD pipeline tools (GitHub Actions is preferred, Google Cloud Build is secondary), including integration of other commonly used DevOps tooling such as SonarQube, Google Artifact Repositories, GitHub, and Jira. Experience of scripting languages such as Python, Bash, Groovy, Go. Experience with databases Understanding of common workflows such as Git Workflow. Experience in implementing monitoring, alerting, and logging Build tools such as Maven, NPM or similar 5+ years working in, configuring, and troubleshooting Linux server environments 3+ years building infrastructure with cloud platform services (AWS, GCP, Azure) Embrace a culture of alerting and monitoring Fluency in at least one server configuration management tool, such as Ansible or Terraform Familiarity with deploying applications using containers Strong written and verbal communication skills Willingness to participate in an on-call rotation Strong desire to automate manual processes Bonus points if you: Have experience with a microservices architecture Developed in environments with large amounts of data Experience in healthcare and working with PII Technologies/Tools used - experience with at least some of these is required: Google Cloud Platform Docker Terraform NextJS and NestJS frameworks NodeJS and Typescript Java Python React and Redux Jest and Cypress Auth0 Git and GitHub Sentry Snyk Jira Slack Benefits of working at CertifyOS: 100% of health, dental, and vision insurance premiums covered for employees Unlimited PTO policy with a mandatory minimum of two weeks off No meeting Thursdays so you can stay heads down to get work done Equal opportunity employer: CertifyOS is an equal opportunity employer that is committed to providing all employees with a work environment free of discrimination and harassment. We celebrate diversity and welcome applicants from every background and life experience. Reasonable accommodation: CertifyOS applicants are considered solely based on their qualifications, without regard to applicants disability or need for accommodation. for an accommodation known. Pay transparency policy: CertifyOS ensures that you wont be discharged or discriminated against based on whether youve inquired about, discussed, or disclosed your pay. At Certify, were committed to creating an inclusive workplace where everyone feels valued and supported. As an equal opportunity employer, we celebrate diversity and warmly invite applicants from all backgrounds to join our vibrant community.
Posted 3 weeks ago
25.0 - 30.0 years
25 - 30 Lacs
Mumbai, New Delhi, Hyderabad
Work from Office
About Certify : At CertifyOS, were building the infrastructure that powers the next generation of provider data products, making healthcare more efficient, accessible, and innovative. Our platform is the ultimate source of truth for provider data, offering unparalleled ease and trust while making data easily accessible and actionable for the entire healthcare ecosystem. What sets us apartOur cutting-edge, API-first, UI-agnostic, end-to-end provider network management platform automates licensing, enrollment, credentialing, and network monitoring like never before. With direct integrations into hundreds of primary sources, we have an unbeatable advantage in enhancing visibility into the entire provider network management process. Plus, our team brings over 25+ years of combined experience building provider data systems at Oscar Health, and were backed by top-tier VC firms who share our bold vision of creating a one-of-a-kind healthcare cloud that eliminates friction surrounding provider data. But its not just about the technology; its about the people behind it. At Certify, we foster a meritocratic environment where every voice is heard, valued, and celebrated. Were founded on the principles of trust, transparency, and accountability, and were not afraid to challenge the status quo at every turn. Were looking for purpose-driven individuals like you to join us on this exhilarating ride as we redefine healthcare data infrastructure. About the role: As a Senior DevOps Engineer, you ll play a key role in helping design and build the infrastructure of the systems that run our products and business. If you want to have a hand in influencing the overall architecture, tools, and services of our platform with a collaborative team then this role is for you. What you ll do: Develop and maintain tools and services that make up our highly available and scalable platform (we use GCP), including resource provisioning and management, access delegation, and costs control Provide technical leadership and mentorship for junior team members Manage access and related permissions to comply with privacy and security standards (SOC 2 Type 2) Manage high availability and disaster recovery systems, procedures, and readiness Contribute to agile team rituals and processes (stand-ups, groomings, planning meetings) Enable teams to deploy, and operate their services in production by building tools and processes that allow self-service management of our production services. What you ll need: A background in cloud Infrastructure Engineering/DevOps, deploying and maintaining multi-tiered application architectures Public cloud platforms GCP-Google Cloud (essential), Azure and/or AWS (advantageous) Experience with Terraform, Docker, Google container environments (Cloud Run, App Engine, GKE) , Understanding and usage of CI/CD pipeline tools (GitHub Actions is preferred, Google Cloud Build is secondary), including integration of other commonly used DevOps tooling such as SonarQube, Google Artifact Repositories, GitHub, and Jira. Experience of scripting languages such as Python, Bash, Groovy, Go. Experience with databases Understanding of common workflows such as Git Workflow. Experience in implementing monitoring, alerting, and logging Build tools such as Maven, NPM or similar 5+ years working in, configuring, and troubleshooting Linux server environments 3+ years building infrastructure with cloud platform services (AWS, GCP, Azure) Embrace a culture of alerting and monitoring Fluency in at least one server configuration management tool, such as Ansible or Terraform Familiarity with deploying applications using containers Strong written and verbal communication skills Willingness to participate in an on-call rotation Strong desire to automate manual processes Bonus points if you: Have experience with a microservices architecture Developed in environments with large amounts of data Experience in healthcare and working with PII Technologies/Tools used - experience with at least some of these is required: Google Cloud Platform Docker Terraform NextJS and NestJS frameworks NodeJS and Typescript Java Python React and Redux Jest and Cypress Auth0 Git and GitHub Sentry Snyk Jira Slack Benefits of working at CertifyOS: 100% of health, dental, and vision insurance premiums covered for employees Unlimited PTO policy with a mandatory minimum of two weeks off No meeting Thursdays so you can stay heads down to get work done Equal opportunity employer: CertifyOS is an equal opportunity employer that is committed to providing all employees with a work environment free of discrimination and harassment. We celebrate diversity and welcome applicants from every background and life experience. Reasonable accommodation: CertifyOS applicants are considered solely based on their qualifications, without regard to applicants disability or need for accommodation. for an accommodation known. Pay transparency policy: CertifyOS ensures that you wont be discharged or discriminated against based on whether youve inquired about, discussed, or disclosed your pay. At Certify, were committed to creating an inclusive workplace where everyone feels valued and supported. As an equal opportunity employer, we celebrate diversity and warmly invite applicants from all backgrounds to join our vibrant community.
Posted 3 weeks ago
3.0 - 8.0 years
11 - 15 Lacs
Hyderabad
Work from Office
We are Reckitt Home to the worlds best loved and trusted hygiene, health, and nutrition brands. Our purpose defines why we exist: to protect, heal and nurture in the relentless pursuit of a cleaner, healthier world. We are a global team united by this purpose.Join us in our fight to make access to the highest quality hygiene, wellness, and nourishment a right and not a privilege. Information Technology & Digital In IT and D, youll be a force for good, whether youre championing cyber security, defining how we harness the power of technology to improve our business, or working with data to guide the innovation of consumer loved products. Working globally across functions, youll own your projects and process from start to finish, with the influence and visibility to achieve what needs to be done. And if youre willing to bring your ideas to the table, youll get the support and investment to make them happen. Your potential will never be wasted. Youll get the space and support to take your development to the next level. Every day, there will be opportunities to learn from peers and leaders through working on exciting, varied projects with real impact. And because our work spans so many different businesses, from Research and Product Development to Sales, youll keep learning exciting new approaches. About the role As an IT&D Security Analyst, you will be instrumental in detecting and responding to security incidents, conducting in-depth post-incident technical analysis, and managing security alerts across IT and OT environments. You will collaborate closely with the Cyber Security Team to refine requirements, develop advanced threat detection mechanisms, create robust incident response playbooks, and implement automation strategies. Furthermore, you will actively participate in threat hunting exercises and contribute to the enhancement of our SIEM and EDR platforms. Your responsibilities Key Responsibilities: Respond to, resolve, and escalate security incidents as required. Contribute to the development and refinement of the IT security incident response process and supporting materials. Conduct threat hunting activities to identify threat actor groups and their tactics, techniques, and procedures (TTPs). Capture threat intelligence on actor TTPs and develop appropriate countermeasures. Participate in post-incident reviews and deliver presentations to senior management. Engage in security incident tabletop exercises. Assist in developing processes and procedures to optimize incident response times, incident analysis, and overall, SOC operations. The experience were looking for Minimum of 3 years of experience in responding to cyber incidents. Technical expertise in security-related systems and applications such as EDR, IDS/IPS, Proxy, SIEM, WAF, and SOAR. Proven experience in developing, documenting, and maintaining security procedures. Strong understanding of network infrastructure, including routers, switches, firewalls, and associated network protocols. Proficiency in TCP/IP and network administration/protocols. Understanding of how Operating Systems works (Windows, Linux) Excellent analytical and problem-solving skills for effective security incident resolution. Relevant certifications such as Security+, Network+, GCIA, GCIH, CISP, GMON, etc. Ability to work independently with minimal supervision. Experience with scripting languages (Bash, PowerShell, Python) is advantageous. Solid knowledge of software engineering, information risk, security guidelines, and architecture standards. Excellent verbal and written English language skills. Innovative and experimental approach to problem-solving. Strong communication and interpersonal skills. The skills for success SOC operations, Threat response,EDR, TCP/IP What we offer With inclusion at the heart of everything we do, working alongside our four global Employee Resource Groups, we support our people at every step of their career journey, helping them to succeed in their own individual way.We invest in the wellbeing of our people through parental benefits, an Employee Assistance Program to promote mental health, and life insurance for all employees globally. We have a range of other benefits in line with the local market. Through our global share plans we offer the opportunity to save and share in Reckitts potential future successes. For eligible roles, we also offer short-term incentives to recognise, appreciate and reward your work for delivering outstanding results. You will be rewarded in line with Reckitts pay for performance philosophy. We recognise that in real life, great people dont always tick all the boxes. Thats why we hire for potential as well as experience. Even if you dont meet every point on the job description, if this role and our company feels like a good fit for you, we still want to hear from you.All qualified applicants will receive consideration for employment without regard to age, disability or medical condition; colour, ethnicity, race, citizenship, and national origin; religion, faith; pregnancy, family status and caring responsibilities; sexual orientation; sex, gender identity, gender expression, and transgender identity; protected veteran status; size or any other basis protected by appropriate law.
Posted 3 weeks ago
10.0 - 15.0 years
25 - 30 Lacs
Bengaluru
Work from Office
Job Title: SOC Manager Organization Name: NEC Corporation Reporting Relationship: Head IT Security Role Summary: The SOC Manager is responsible for overseeing the day-to-day operations of the Security Operations Center. This role leads a team of analysts, engineers, and incident responders to monitor, detect, respond to, and mitigate security threats across the organization. The SOC Manager ensures effective threat intelligence, incident response, and compliance with security policies and standards. Responsibilities: Lead and manage the SOC team, including hiring, mentoring, training, and performance evaluations. Oversee the design, implementation, and tuning of security monitoring tools (SIEM, EDR, IDS/IPS, etc.). Manage and coordinate incident response activities, including triage, analysis, containment, eradication, and recovery. Develop, document, and maintain SOC processes, procedures, and runbooks. Monitor security events and trends, providing regular reports and briefings to leadership. Collaborate with IT, legal, compliance, and other departments to ensure effective security operations. Maintain and improve threat detection and response capabilities. Lead root cause analysis for significant incidents and drive continuous improvement. Ensure SOC operations meet internal and external compliance requirements (e.g., ISO 27001, NIST, GDPR, etc.). Participate in security audits and assessments. Prerequisites: Preferred Qualifications: Industry certifications such as CISSP, CISM, GCIA, GCIH, or similar. Experience working in regulated environments (e.g., finance, healthcare). Hands-on experience with cloud security monitoring (AWS, Azure, GCP). Knowledge of scripting (Python, PowerShell) for automation in SOC environments. Qualification -B.Sc / M.SC / B.Tech / BE / BCA / MCA. Ideal candidate should have a minimum of 10+ Years of experience in Security and IT Infrastructure. Base Location: Bangalore, but flexible to travel Specialization Description General IT Applications Development includes analysis, programming, and configuration of end user applications and/or systems software including: Analyzing detailed business/functional/technical requirements and specifications for the application Coding internally developed applications and/or configuring commercial-off-the-shelf (COTS) applications using programming, scripting, and database languages Supporting application testing, deployment, maintenance, and evolution activities by correcting programming errors, responding to scope changes, and coding application enhancements Level Description Senior level professional that applies advanced knowledge of job area typically obtained through advanced education and work experience. Works independently applying an advanced knowledge of a job area typically obtained through advanced education and work experience. Works to achieve results in a job area, overseeing and managing projects/ processes independently with limited supervision. Problems faced are difficult and are sometimes complex, though are routine. Coaching and reviewing the work of lower level professionals. Headquartered in Japan, NEC is a leader in the integration of IT and network technologies. With over 123 years of expertise in providing solutions for empowering people, businesses, and society, NEC stands tall as a champion in enabling change and transformation across the globe. Present in India since 1950, NEC has been instrumental in burgeoning India s digitization journey continually for the past 70 years. NEC India has proved its commitment to orchestrating a bright future through its diverse businesses from Telecommunications to Public Safety, Logistics, Transportation, Retail, Finance, Unified Communication and IT platforms , serving across the public and private sectors. NEC India, through the deployment of cutting-edge technology, has been powering India in seminal ways, making lives easier, safer, and more productive for all. With its Centre of Excellence for verticals like Analytics platform solutions, Big Data, Biometrics, Mobile and Retail , NEC India brings to the table, innovative, seamless solutions for India and across the world. NEC India is headquartered in New Delhi and has its offices panned across the country. It has branches in Ahmedabad, Bengaluru, Chennai, Mumbai, Noida and Surat. Specialties: IT & Networking Solutions, Unified Communication Solutions, Safety and Security Solutions, Integrated Retail Solutions, Data Centre Solutions, Safe and Smart City Solutions, Transportation Solutions, SDN Solutions, Carrier Telecom Solutions, and Solutions for Society. NEC Career Site - LinkedIn
Posted 3 weeks ago
3.0 - 5.0 years
2 - 5 Lacs
Bengaluru
Work from Office
Its fun to work in a company where people truly BELIEVE in what they are doing! Were committed to bringing passion and customer focus to the business. Responsibilities: Perform real time security monitoring and incident response activities across the networks, leveraging a variety of tools and techniques Create and improve Incident Response Playbook Perform post incident reviews to improve and tune Halma s incident response capability Provide support to the team members while investigating alerts escalated by MSSP & work closely with Leads. Provide support in the area of Azure Active directory, Intune (conditional access/MDM), single sign on and Multifactor Authentication, Microsoft Defender for Endpoint, Microsoft Defender for Server, Office 365 email security. Monitor and respond to security incidents for Halma PLC and Subsidiary companies. Interact with end-users and IT Managers of Halma and Subsidiary companies during investigations, to raise awareness and training opportunities. Create and Maintain KB articles & SOPs for all the applications related to SOC to ensure security best practices in the team. Should be able to work on Incident and Security Reports Independently. Experience (exposure): Total experience 3-5 years Exposure to security technologies including Incident Response, Microsoft Defender, Azure Sentinel. Knowledge of network fundamentals TCP/IP, SSL/TLS, DNS, DHCP. Hands on experience to Microsoft technologies like 365 ATP Defender, Endpoint Manager (Intune- conditional access/MDM/MAM) and KQL knowledge. If you like wild growth and working with happy, enthusiastic over-achievers, youll enjoy your career with us! Not the right fit Let us know youre interested in a future opportunity by clicking Introduce Yourself in the top-right corner of the page or create an account to set up email alerts as new job postings become available that meet your interest!
Posted 3 weeks ago
5.0 - 10.0 years
6 - 9 Lacs
Pune, Bengaluru
Work from Office
Job Description Summary We are developing state-of-the-art SoCs from architecture to final product involving automotive centric design methodologies and flows tailored for functional safety. We have a presence across multiple geographies and are currently in search of a Principal level IP/SoC Design Verification Engineer. RESPONSIBILITIES Develop testbenches using System Verilog and UVM for functional and power aware RTL Develop UVM component like agents (active and passive), scoreboards and environment etc., Develop assertions, functional coverage. Develop test plan, UVM based test sequences, layered sequences, virtual sequencers Drive closure of verification metrics to cover verification space. Work with the team to identify and close gaps in functional, power aware and Gate level timing simulation. Develop C testcases for HW-FW simulation and FPGA prototyping Provide regression setup, debug of RTL and gate level netlist Review industry standard spec and augment test plan to improve quality of verification Participate in post silicon bring up, validation and compliance testing and debug Work collaboratively with cross-functional teams like ASIC Architect, ASIC Designers, firmware development team to ensure successful delivery of product MINIMUM QUALIFICATIONS Proven track record of verification, taking several chips from specification to tape out Proven expertise with UVM and/or System Verilog based verification Excellent understanding of ASIC verification methodologies and proven experience of verification Experience working with source control tools, bug management tools and release management tools such as Jenkins, Git, and Jira. Experience with SoC interfaces, embedded processors, networking protocols, security protocols and video formats will be a big plus. Strong written and verbal communication skills and ability to work independently. Bachelors in Electrical Engineering or equivalent and 5+ years of experience
Posted 3 weeks ago
5.0 - 7.0 years
13 - 15 Lacs
Chennai
Work from Office
Primary Skills - SOC, Cybersecurity, Team Lead, one cybersecurity certification (e.g., CEH, CySA+), technical documentation Preferred / Advantageous Skills- Managed Security Services Provider (MSSP), SIEM engineering,Exposure to cloud security incidents Key Responsibilities Act as the primary point of contact for MDR client engagements and ensure smooth project execution. Drive implementation of emerging threat intelligence (IOCs, detection rules, etc.) to identify affected systems and assess attack scope. Develop, document, and maintain SOC processes, standards, and alert triage procedures to ensure effective and timely response. Define and mature playbooks for cyber threat response operations. Autonomously conduct investigations and escalate incidents per defined protocols. Mentor, guide, and lead SOC analysts to foster a high-performance incident response team. Lead SOC operations during active cyber incidents and coordinate with executive leadership. Develop and maintain SOC dashboards and reporting metrics for performance and threat monitoring. Organize and conduct cybersecurity tabletop exercises and attack simulations. What We Look For 7+ years of experience in Security Operations Center (SOC) or a similar role (experience in MSSP environments is a plus). Bachelors degree in Computer Science , Information Technology , or Cybersecurity . Industry certifications such as CySA+ , CEH , CSA , ECIH , or Cloud Security certifications. Proven experience managing SOC daily operations and incident response frameworks. Strong technical writing and documentation skills. Demonstrated leadership in guiding high-performing technical teams. Excellent communication skills, with the ability to collaborate cross-functionally and present to stakeholders. Hands-on experience with cloud security incidents and SIEM engineering is a strong advantage. A commitment to continuous learning and skill development in the cybersecurity field.
Posted 3 weeks ago
10.0 - 15.0 years
8 - 12 Lacs
Bengaluru
Work from Office
Role: BareMetal Test Development Engineer Location : Bangalore Exp : 10+ years to 15 years Port and develop testsfor baremetal environments on mobile SoC platforms. Design, implement, and debug firmwarefor embedded systems, ensuring robust and scalable solutions. Work closely with hardware teamsto define system requirements and validate hardware functionality. Utilize JTAG and other debugging toolsfor low-level troubleshooting and validation. Develop and execute test plansfor various SoC subsystems (CPU, GPU, multimedia, TPU, PCIe, USB). Optimize codefor performance, efficiency, and memory usage in resource-constrained environments. Automate test executionand reporting using Python or Bash scripts. Document test procedures, results, and codebasefor maintainability and knowledge sharing Proficiency in C and Assembly programmingfor embedded systems. Experience with firmware developmentand debugging on baremetal or RTOS environments. Strong understanding of JTAG and other hardware debugging interfaces. Hands-on experience with at least two SoC subsystems:CPU, GPU, multimedia, TPU, PCIe, or USB. Familiarity with SoC architecturesand low-level hardware/software interaction. Experience with test automationusing Python or Bash is a plus. Excellent problem-solving skills and attention to detail. Strong communication and teamwork abilities.
Posted 3 weeks ago
3.0 - 7.0 years
12 - 20 Lacs
Pune
Work from Office
About the Role We are seeking a skilled SIEM Administrator to manage and optimize different SIEM solutions. The ideal candidate will be responsible for system administration, log integration, troubleshooting, Deployment, Implementation and maintaining security posture for the organization. Key Responsibilities SIEM Administration: Install, configure, maintain, and upgrade SIEM components. (IBM Qradar SIEM, DNIF, Splunk & Securonix). Log Management: Onboard, parse, and normalize logs from various data sources (firewalls, servers, databases, applications, etc.) Custom log source integration and parser development. System Monitoring & Troubleshooting: Ensure SIEM tools are functioning optimally. Monitor & regular health check perform for SIEM tools. troubleshoot system errors and resolve performance issues. Conduct regular performance tuning and capacity planning Perform root cause analysis for system failures & performance issues. Optimize system performance and storage management for SIEM Integration & Automation : Integrate third-party security tools (firewalls, EDR, threat intelligence feeds) with SIEM. Compliance & Audits: Ensure log retention policies comply with regulatory standards. Develop & enforce SIEM access controls & user roles/permissions. Documentation & Training: Document system configurations, SOP’s & troubleshooting documents. Prepare monthly/ weekly reports and PPT, onboarding documentation as per business/ client requirement. Dashboard & Report Development: Create & maintain custom dashboards & reports Optimize searches & reports for performance and efficiency. Hands on experience with Linux OS & Windows OS Basic to mediator level knowledge in networking skills Should be familiar with Azure, AWS or GCP products Basic Qualifications B.E./B.Tech in Computers or related field (preferred). 4+ Years of Experience in SOC Administration. Strong knowledge of SIEM architecture, log sources, and event correlation. Preferred Qualifications Proficiency in log management, regular expressions, and network security concepts. Experience integrating SIEM with various security tools (firewalls, IDS/IPS, antivirus, etc.) Scripting knowledge (Python, Bash, or PowerShell) is a plus. Training or Certificate on Splunk or IBM Qradar Preferred. Experience with SIEM tools like IBM QRadar, Splunk, Securonix, LogRhythm, Microsoft Sentinel, DNIF etc. Proficiency in IBM Qradar & Splunk administration. Configuring, maintaining, and troubleshooting SIEM solutions. Strong analytical and problem-solving skills. Excellent communication and documentation abilities.
Posted 3 weeks ago
8.0 - 13.0 years
7 Lacs
Bengaluru
Work from Office
Come join Amazon Devices and work within Amazon Lab126, where top engineers, researchers, and scientists invent, design, and build Amazons new consumer electronics devices and services. Amazon Lab126 has produced the best-selling Kindle devices, the ground breaking Fire tablets and Fire TV, and the revolutionary Echo. We are seeking a seasoned Senior Post-Silicon Product Engineer to lead and execute critical post-silicon validation, characterization, and production ramp activities for our advanced semiconductor products. This role demands a deep understanding of the semiconductor product lifecycle, from initial silicon bring-up to high-volume manufacturing, ensuring product performance, quality, and reliability meet the highest standards. Our final product is a complete consumer electronics system, not just the silicon. As a Post-Silicon Product Engineer, youll go beyond traditional product engineering boundaries to address system-level challenges offering rich opportunities to understand and influence system architecture and end-user performance. Post-Silicon Validation & Characterization: Lead the bring-up and characterization of new silicon, ensuring functionality and performance meet design specifications. Develop and execute detailed validation plans, including defining test methodologies, coverage metrics, and corner conditions. Define and validate silicon and ATE-level test coverage, ensuring comprehensive validation aligned with customer application scenarios. Data Analysis & Yield Improvement: Analyze data from WAT, wafer sort, ATE, and system-level tests to identify trends, anomalies, and systematic issues. Implement automation pipelines for data analysis across the test flow to improve traceability, root-cause identification, and feedback into design and test. Develop and implement strategies that align test environments and methodologies with defined yield, quality, and performance objectives. Apply advanced data analytics including regression, correlation, and predictive modelling to optimize test efficiency and drive yield improvements. Test Development & Optimization: Collaborate with design and test engineering teams to develop and optimize test programs for wafer and package-level testing. Partner with ATE engineers to debug test failures, refine test coverage, and identify limitations in test hardware/software infrastructure. Lead test time reduction and cost optimization initiatives while maintaining required test coverage and quality standards. Cross-Functional Collaboration: Collaborate with Design, SoC, DFT, Reliability, Quality, and Manufacturing teams to resolve silicon issues and support successful product ramp. Lead structured failure analysis and root cause investigations to address quality, reliability, and customer-return issues. Coordinate with cross-functional leaders to ensure alignment on key product KPIs such as yield, DPPM, quality escapes, and production readiness. Documentation & Reporting: Generate comprehensive engineering reports detailing validation results, failure analyses, and recommended actions. Maintain accurate records of test methodologies, data analyses, and process changes. Bachelors or Masters degree in Electrical Engineering or a related field. Minimum 8 years of experience in post-silicon validation, product engineering, or semiconductor development roles. Strong understanding of semiconductor testing methodologies, including ATE, wafer sort, and SLT. Hands-on experience with silicon bring-up, validation, characterization, and debug. Proficiency in data analysis tools such as JMP, Python, and SQL. Familiarity with statistical methods such as SPC, CPK, DOE, and other yield improvement methodologies. Strong problem-solving skills, including root cause analysis across silicon, package, and system levels. Excellent written and verbal communication skills, with the ability to document complex technical findings clearly. Experience working in high-volume manufacturing environments, supporting NPI (New Product Introduction) to mass production transition. Experience with reliability testing standards (e.g., HTOL, HAST, TC) and failure analysis methodologies. Knowledge of wafer fabrication and packaging processes. Familiarity with defining test coverage for critical IP blocks and validating against customer use cases. Experience using AWS cloud tools including Lambda functions, SageMaker, and QuickSight for data analysis and automation. Exposure to system-level validation, including correlation between silicon behavior and system-level performance. Experience collaborating with SoC Design, DFT, Debug Leads, Reliability, and Quality teams. Strong understanding of customer RMA handling and product sustenance strategies. Experience with end-to-end product ownership from early silicon evaluation through to high-volume production.
Posted 3 weeks ago
5.0 - 10.0 years
12 - 20 Lacs
Pune
Work from Office
About the Role We are seeking a highly skilled Security Analyst (Level 2) to join our MSSP SOC team. The ideal candidate will have expertise in SIEM (Splunk, QRadar), XDR/EDR solutions, and security analysis with hands-on experience in investigating and responding to security alerts. This role requires proficiency in reviewing and analyzing Level 1 alerts, providing detailed recommendations, and engaging with customers for incident handling. The candidate should also have basic SIEM administration knowledge and Python scripting skills for troubleshooting and playbook development. Key Responsibilities Threat Detection & Response: Analyze and investigate security alerts, events, and incidents generated by SIEM, XDR, and EDR solutions. Incident Investigation & Handling: Conduct in-depth security incident investigations, assess impact, and take appropriate actions. Incident Escalation & Communication: Escalate critical incidents to Level 3 analysts or senior security teams while maintaining detailed documentation. Content Management: Develop and fine-tune correlation rules, use cases, and alerts in SIEM/XDR platforms to improve detection accuracy. Malware Analysis: Perform basic malware analysis and forensic investigation to assess threats. Customer Request Handling: Collaborate with customers to address security concerns, provide recommendations, and respond to inquiries. SIEM Administration: Assist in the administration and maintenance of SIEM tools like Splunk or QRadar, ensuring smooth operations. Automation & Playbooks: Utilize Python scripting for automation, troubleshooting, and playbook development to enhance SOC efficiency. Reporting & Documentation: Prepare detailed reports on security incidents, trends, and mitigation strategies. Basic Qualifications B.E/B. Tech degree in computer science, Information Technology, Masters in Cybersecurity 3+ years of experience in a SOC or cybersecurity operations role. Strong knowledge of SIEM tools (Splunk, QRadar) and XDR/EDR solutions. Hands-on experience in threat detection, security monitoring, and incident response. Knowledge of network security, intrusion detection, malware analysis, and forensics. Basic experience in SIEM administration (log ingestion, rule creation, dashboard management). Proficiency in Python scripting for automation and playbook development. Good understanding of MITRE ATT&CK framework, security frameworks (NIST, ISO 27001), and threat intelligence. Strong analytical, problem-solving, and communication skills. Ability to work in a 24x7 SOC environment (if applicable) Preferred Qualifications Certified SOC Analyst (CSA) Certified Incident Handler (GCIH, ECIH) Splunk Certified Admin / QRadar Certified Analyst CompTIA Security+ / CEH / CISSP (preferred but not mandatory
Posted 3 weeks ago
0.0 - 1.0 years
0 - 3 Lacs
Hyderabad
Work from Office
Monitor security alerts & events in the SIEM, Assist in the initial triage of alerts, Collect & organize log data during investigations, maintaining incident tracking & report through ticket systems, Follow Standard Operating Procedures (SOPs).
Posted 3 weeks ago
10.0 - 14.0 years
20 - 35 Lacs
Noida
Work from Office
Lead Security Analyst (P4) Must Have skills: SOC, End to end investigation, L4 ticket investigation, IDR ( Incident Response) , Digital Forensics, Public Cloud Experience: 10 to 14 years Shift: Rotational Job Responsibilities: As a Level 4 (L4) Lead Security and Threat Monitoring Analyst, you will be part of UKGs Global Security Operations Center (GSOC) team investigating events of interest and incidents as they are validated, prioritized, and categorized by UKGs 24x7 L1, L2 and L3 analyst teams. You will facilitate and follow UKG’s standard processes to investigate, contain, eradicate, and respond in a continued and unified effort to protect the confidentiality, integrity, and availability of UKG, our partners’ and customers’ data and services. You will be an escalation point for all incidents, either regionally or during shift assignment; analyzing, confirming, re-prioritizing if necessary and/or escalating/remediating those identified threats within the UKG computing environment. Having handson experience into Digital Forensics and Public cloud. You will work closely with UKG’s GSOC teams in the US, Europe, and India to promote an integrated, uniform, and holistic threat detection and response capability to facilitate and enable a robust and proactive security posture. You will leverage your skills, experience, and creativity to perform initial, forensically sound collection and analysis, methodologies to contain, eradicate, and recover from realized threats such as zero-day, ransomware, malware and other APT’s. Additionally, you will be responsible for participating in incident response activities as part of the Cyber Incident Response Team (CIRT) or as the Cyber Incident Response Lead (CIRL), post incident reporting and continuous improvement recommendations to enhance UKG’s security posture through process development, tool rationalization, detection technique and automation enhancement opportunities and enablement/training possibilities. Due to the nature of the work, you are required to have occasional on-call duties on weekends and/or holidays. Additional work hours may also be required during an incident investigation. Primary/Essential Duties and Key Responsibilities: • Review tickets escalated from L1 or L2 analysts to confirm the priority, category and accuracy of the details and conditions. • Pivot to additional security tools to obtain and ascertain context or information and any other pertinent information to inform on the most effective and efficient mitigation/remediation actions. • Escalate tickets as required to GSOC Director for additional scrutiny and incident declaration. • Collaborate with UKG internal and external groups to develop and execute containment, eradication, and recovery strategies for lower priority incidents. • Identify, approve, and implement blocking, listing and other mechanisms to promote a robust security posture. • Participate in the Cyber Incident Response Plan (CIRP) process as part of the Cyber Incident Response Team (CIRT) or as the Cyber Incident Response Lead (CIRL) to lead and/or support mitigating and/or remediating critical incidents. • Participate in post-incident activities including coordinating and providing input within the requisite reports and identifying areas for continuous improvements within the GSOC enablement, processes or technology. • Provide mentoring and enablement of junior analysts globally to expand and extend UKG’s GSOC capabilities and experiential capacities. Qualification (Experience, Education, Certification, License and Training): • Bachelor's degree in computer science or a related discipline • CISSP, CCSP, GIAC or other relevant cyber security certifications • Working professional with 9+ years of relevant Security/SOC experience Required Qualifications: • Knowledge of the common attack vectors on the network layer, different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). • Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored) and cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). • Knowledge of cybersecurity, incident response methodologies, privacy principles, cyber threats, vulnerabilities, and detection methodologies and techniques for detecting intrusions. • Experience with Splunk, Google Chronicle, Elastic Search, EDR solutions, email security tools, and cloud environments (GCP, Azure). • Knowledge and experience in reverse engineering to understand how an information asset works and analyzing system components to identify potential vulnerabilities. • Knowledge and experience in developing automations using scripting languages like Python and PowerShell to automate various tasks and improve accuracy, enhance task consistency, and increase scalability. • Knowledge and experience in Security Information and Event Management (SIEM) use case and content development techniques and objectives. • Knowledge and experience in conducting and participating in security audits and assessments. • Understanding and experience in developing, and delivering relevant and value-add operational metrics to support and provide visibility into the GSOC program. • Communicate in English: write clearly and speak authoritatively to different audiences (business leaders and engineers). Preferred Qualifications: • Knowledge of new and emerging cybersecurity technologies, threats, and threat vectors. • Knowledge and experience in designing, executing, and reporting threat hunting activities. • Knowledge and experience around offensive security (ethical hacking) techniques to identify and mitigate/remediate vulnerabilities in the UKG environment. • Knowledge and experience in cyber forensic procedures and how to extract information and generate reports in support of incident response and other advanced requirements.
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39817 Jobs | Dublin
Wipro
19388 Jobs | Bengaluru
Accenture in India
15458 Jobs | Dublin 2
EY
14907 Jobs | London
Uplers
11185 Jobs | Ahmedabad
Amazon
10459 Jobs | Seattle,WA
IBM
9256 Jobs | Armonk
Oracle
9226 Jobs | Redwood City
Accenture services Pvt Ltd
7971 Jobs |
Capgemini
7704 Jobs | Paris,France