Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
2.0 - 5.0 years
13 - 17 Lacs
Bengaluru
Work from Office
About Marvell . Your Team, Your Impact Marvells data center engineering group is a leading provider of innovative storage technologies, including ultra fast read channels, high performance processors, leading edge transceivers, highly efficient analog designs, and powerful cryptographic engines. These solutions address all segments of the hard disk drive (HDD) and solid state drive (SSD) electronics markets. Many of the same technologies have been utilized in Marvell storage system solutions products, powering PCs, servers, cloud, and enterprise systems. What You Can Expect Development, porting, execution, and debug of bare metal SW on multiple SSD blocks to validate proper functionality. Create, maintain and improve code to support new features and standards. Work with Design, FW, and Validation teams to debug any issues found and find root cause on failure cases. Create and review tests plans and prepare test result documents to be shared internally/externally. Create tests to measure performance, throughput, and power of multiple SoC blocks. What Were Looking For Bachelors degree in Software, Computer or Electrical Engineering, and at least 3-5 years professional experience and/or Masters degree in Software, Computer or Electrical Engineering, and at least 2-3 years professional experience, in following domains - Pre-Si Validation, Post-Si Validation, Stress & PVT testing. Excellent C/C++ SW development skills, a good understanding of embedded SW development, Linux and basic knowledge of ARM/RISC micro-processor or SOC architecture. Working knowledge of DDR, SPI, PCIe, NVMe, is a plus. Experience with embedded SW development and proven debug abilities and skills. Familiar with typical lab tools: Emulators, Oscilloscopes, Logic Analyzers. Able to work across disciplines and manage time across several demands. Excellent written and oral communication skills (English). Additional Compensation and Benefit Elements With competitive compensation and great benefits, you will enjoy our workstyle within an environment of shared collaboration, transparency, and inclusivity. We re dedicated to giving our people the tools and resources they need to succeed in doing work that matters, and to grow and develop with us. For additional information on what it s like to work at Marvell, visit our Careers page. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. #LI-CP1
Posted 2 weeks ago
5.0 - 8.0 years
13 - 20 Lacs
Bengaluru
Hybrid
We seek a professional with 5-7 years of postgraduate experience in IT General Controls, SOX 404, GRC,SOC & ITAC, preferably CISA certified. Apply now at heena@yeslandmark.com or call 7019111984
Posted 2 weeks ago
3.0 - 8.0 years
0 Lacs
Bengaluru
Work from Office
. Bachelors or Masters degree in Electrical Engineering, Computer Engineering, or related field. . 3-10 years of experience in RTL design and Design Verification implementation for VLSI systems.
Posted 2 weeks ago
10.0 - 17.0 years
30 - 32 Lacs
Thane
Work from Office
Role & responsibilities 1. Ensure optimal operation of MDR solution, including software and applications. 2. Ensure effectiveness of security solutions in scope 3. Develop use cases and playbooks for SIEM and SOAR for effective and automated incident detection and handing. 4. Test SIEM SOAR and other solutions in scope to explore the right technical defense/remedy and provide performance statistics and reports. 5. Ensure adequate controls are in place to protect critical assets against any incidents or threats from the internal or external environment. 6. Co-ordinate with vendors/partners & internal teams to manage the lifecycle of security platforms including deployments, maintenance and operations. Develop plans for maintaining the infrastructure in newly implemented security solutions to operational environment. 7. Lead Cybersecurity incident management and manage related process, tools and resources 8. Work with identified partner and govern them for effective execution of organizational requirements for Security operations and incident handling 9. Conduct periodic threat hunting independently and with partners to ensure effective detection of any threats. 10. Ensure preventive maintenance of critical infrastructure, to increase performance and minimize disruption. 11. Manage SLAs for solutions and processes in scope. 12. Record all incidents/events leading to infrastructure downtime, analyze root cause and suggest workarounds. 13. Monitor performance reviews, corrective action, routine equipment checks and preventative maintenance for security systems to reduce the down time of the systems. 14. Perform integration of all tools and services for access, authentication, authorization, data security, vulnerability management, policy management, auditing, and compliance to ensure company's security policy and procedures are applied. 15.Define, gather and report on metric regarding security systems within ASL environments. Prepare status reports and other management metrics as needed. Preferred candidate profile 1. Demonstrable experience within a Security Operations Center, coordinating responses to security incidents. 2. Experience leading the implementation and development of MDR tooling, infrastructure and processes 3. Experience On popular SIEM, SOAR, and threat hunting platforms is mandatory. 4. Experience in security incident handling is mandatory. 5. Exposure to threat hunting is mandatory. 6. Security related professional certifications preferred. Examples of certifications include but are not limited to CISSP, CIH (ec council), CND, infosec institute, etc. 7. Strong analytical & problem-solving skills with ability to translate ideas into practical implementation. 8. Ability to manage stakeholder relationships including team members, vendors and partners. 9. Excellent leadership and communication skills with ability to present and communicate effectively with both technical and non-technical audience. 10. Ability to provide technical and professional leadership, guidance, and training to others.
Posted 2 weeks ago
5.0 - 10.0 years
12 - 19 Lacs
Hyderabad, Pune
Hybrid
Role & responsibilities Identification and crafting of complex custom WAF rules & features to mitigate MVP and security posture gaps Crafting efficacy testing for baseline & custom rules and features and integrating testing in the automation pipelines Providing SME support for other security testing such as WAF PoCs, new features and solutions with a potential cost saving if we use in-house resource instead of 3rd party vendors Providing WAF focused SME support and advice on Web & API based attack methodologies, evasions and mitigation techniques Providing DevSecOps SME & pipeline build support for the automation works Monitor and review all tuning requests. Conduct detailed log analysis to identify false positives and optimize WAF rules for improved accuracy and performance. Create and maintain comprehensive documentation for WAF tuning, tuning procedures, policies, and configurations. Develop, test, and recommend WAF policies and rules tailored to specific applications and environments. Proactively assist with identifying false positives Collaborate with cross-functional teams to ensure seamless integration of WAF solutions into existing security infrastructure. Provide recommendations for WAF configuration based on best practices and security requirements. Perform regular assessments and audits of WAF configurations to ensure optimal security posture and compliance with industry standards. Stay updated with the latest web security threats, vulnerabilities, and trends to continually enhance WAF effectiveness Preferred candidate profile Extensive experience in WAF management, tuning, and engineering, with a strong understanding of web application security principles. Proven track record of proactively identifying and mitigating false positives to optimize WAF performance. Background in SOC or CSIRT and AppSec or Ethical Hacking, demonstrating hands-on experience for the key responsibilities Proficiency in log analysis tools and techniques, with the ability to identify patterns and anomalies in web traffic Experience with tools such as Splunk, Wireshark, or custom scripts to process and analyze logs. Experience with at least three major WAF solutions (e.g., Akamai, F5, AWS, GCP) and an understanding of their unique configurations and capabilities. Strong analytical and problem-solving skills, with a keen attention to detail. Excellent communication skills, capable of articulating complex security concepts to technical and non-technical stakeholders. Ability to develop, test, and recommend WAF policies and rules tailored to specific applications and environments. Experience collaborating with cross-functional teams to integrate WAF solutions into existing security infrastructure. Competence in maintaining comprehensive documentation for WAF tuning procedures, policies, and configurations. Extensive experience in configuring WAF solutions to align with best practices and security requirements. A proactive, detail-oriented individual who thrives in a dynamic, fast-paced environment and stays updated with the latest web security threats and trends.
Posted 2 weeks ago
3.0 - 8.0 years
5 - 10 Lacs
Bengaluru
Work from Office
Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : SailPoint IdentityIQ Good to have skills : Java Enterprise Edition Minimum 3 year(s) of experience is required Educational Qualification : Bachelor or higher degree in related field or equivalent work experience Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. You will provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Be a crucial part of ensuring the security of the organization's digital assets and operations. Roles & Responsibilities: Expected to perform independently and become an SME. Required active participation/contribution in team discussions. Contribute in providing solutions to work-related problems. Implement security measures to protect computer systems, networks, and data. Conduct regular security assessments and audits to identify vulnerabilities and risks. Develop and implement security policies, protocols, and procedures. Stay updated on the latest security trends, threats, and technologies. Collaborate with cross-functional teams to enhance overall security posture. Professional & Technical Skills: Must To Have Skills:Proficiency in SailPoint IdentityIQ. Good To Have Skills:Experience with Java Enterprise Edition. Strong understanding of identity and access management principles. Knowledge of security frameworks and standards such as ISO 27001 and NIST. Experience in implementing and managing security solutions. Ability to analyze and respond to security incidents effectively. Additional Information: The candidate should have a minimum of 3 years of experience in SailPoint IdentityIQ. This position is based at our Bengaluru office. A Bachelor or higher degree in a related field or equivalent work experience is required. Qualifications Bachelor or higher degree in related field or equivalent work experience
Posted 2 weeks ago
4.0 - 5.0 years
6 - 7 Lacs
Mumbai
Work from Office
Manage and troubleshoot Zscaler security infrastructure, ensuring optimal performance of cloud security services. Respond to security incidents and configure Zscaler components.
Posted 3 weeks ago
4.0 - 5.0 years
6 - 7 Lacs
Karnataka
Work from Office
Configures and maintains Checkpoint Firewall for network security.
Posted 3 weeks ago
4.0 - 5.0 years
6 - 7 Lacs
Tamil Nadu
Work from Office
Specializes in Identity and Access Management (IAM) using SailPoint. Implements role-based access controls, identity governance, and authentication protocols.
Posted 3 weeks ago
4.0 - 5.0 years
6 - 7 Lacs
Karnataka
Work from Office
Provide support for Forescout and Skybox Network Access Control (NAC) solutions. Ensure the network security infrastructure is optimized, troubleshoot security incidents, and support risk management strategies.
Posted 3 weeks ago
4.0 - 5.0 years
6 - 7 Lacs
Hyderabad
Work from Office
Provide advanced incident response and threat analysis in a Security Operations Center (SOC). Lead investigations, conduct forensics, and manage escalated security incidents to minimize risks and ensure data protection.
Posted 3 weeks ago
4.0 - 5.0 years
6 - 7 Lacs
Hyderabad
Work from Office
Implement and manage security protocols in Operational Technology (OT) environments, ensuring the protection of industrial control systems, SCADA, and other critical infrastructure from cyber threats.
Posted 3 weeks ago
4.0 - 5.0 years
6 - 7 Lacs
Hyderabad
Work from Office
Oversee and maintain network security infrastructure. Configure firewalls, VPNs, intrusion detection systems, and conduct regular security assessments to protect the network from external and internal threats.
Posted 3 weeks ago
4.0 - 5.0 years
6 - 7 Lacs
Karnataka
Work from Office
Design and implement identity governance and lifecycle management solutions using RSA IGL. Ensure compliance and security for user identities and access controls.
Posted 3 weeks ago
2.0 - 5.0 years
4 - 7 Lacs
Chennai
Work from Office
The Network Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Network Security domain.
Posted 3 weeks ago
2.0 - 4.0 years
4 - 6 Lacs
Chennai
Work from Office
The Cyber Threat Detection and Development role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Threat Detection and Development domain.
Posted 3 weeks ago
2.0 - 5.0 years
4 - 7 Lacs
Hyderabad
Work from Office
The Network Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Network Security domain.
Posted 3 weeks ago
2.0 - 4.0 years
4 - 6 Lacs
Mumbai
Work from Office
The Cyber Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security domain.
Posted 3 weeks ago
2.0 - 5.0 years
4 - 7 Lacs
Mumbai
Work from Office
The Firewall and Proxy role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Firewall and Proxy domain.
Posted 3 weeks ago
2.0 - 5.0 years
4 - 7 Lacs
Mumbai
Work from Office
The Cloud firewall security Analyst role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cloud firewall security Analyst domain.
Posted 3 weeks ago
10.0 - 12.0 years
12 - 14 Lacs
Patna
Work from Office
1 year contract (LPE) Work location: Patna (Work from Office) Work Experience: Minimum 10 years of experience in the field of IT/ITeS Experience of handling large IT /e-governance/GRC/ IT Network / AI /Cyber Security/ Surveillance/ Security Operation Centre Certification : CISA/CISM/CISSP/CEH/OSCP/ ISO 27001/ISO 27701/ISO 20000/ISO 22301 /CCNA /CCNP/ OEM certification like Oracle , Microsoft, Red hat/ equivalent
Posted 3 weeks ago
2.0 - 4.0 years
4 - 6 Lacs
Chennai
Work from Office
The Cyber Security E2 role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security E2 domain.
Posted 3 weeks ago
3.0 - 5.0 years
5 - 7 Lacs
Mumbai
Work from Office
The Firewall,WAF role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Firewall,WAF domain.
Posted 3 weeks ago
2.0 - 4.0 years
4 - 6 Lacs
Hyderabad
Work from Office
The Cyber Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security domain.
Posted 3 weeks ago
10.0 - 14.0 years
27 - 30 Lacs
Gurugram
Work from Office
Top Selection & Auto Elimination Criteria: Rotational Shift, Only Immediate joiners (0-15 days ), Cab facility : Yes only late night pick or drop(1 side only for Gurgaon Employees) Location : Gurgaon Mode : 5 days work from Office only (NO Work from home) Relevant experience range 9+ Position : L3 SOC Analyst Position Description: The SOC Level 3 Analyst is a senior-level cybersecurity professional responsible for leading advanced threat detection, response, and mitigation activities within the Security Operations Center. This role acts as the final escalation point for complex security incidents and plays a crucial role in enhancing security monitoring, incident response procedures, and overall threat defense capabilities. The L3 Analyst collaborates with security engineers, incident response teams, threat intelligence analysts, and IT stakeholders to identify, investigate, and remediate security threats in real-time. Role and responsibilities: 1. Incident Response and Escalation Lead and coordinate end-to-end response for critical and high-severity security incidents. Perform advanced investigation and forensics on compromised systems, including log correlation, packet analysis, and endpoint review. Serve as a primary escalation point for SOC Tier 1 and Tier 2 analysts. Conduct root cause analysis and provide detailed incident reports with lessons learned and mitigation steps. 2. Threat Detection and Analysis Analyze and triage alerts generated by the SIEM and other security tools. Hunt for threats in the environment using threat intelligence and behavioral indicators (proactive threat hunting). Analyze and reverse-engineer malware, if required, to understand behavior and determine mitigation steps. Correlate threat intelligence feeds with internal data to identify indicators of compromise (IOCs) and advanced persistent threats (APTs). 3. Tooling and Automation Optimize and fine-tune detection rules and SIEM use cases to reduce false positives and enhance detection accuracy. Build automation scripts and workflows to improve efficiency in incident triage, correlation, and response. Collaborate with security engineers to integrate new data sources and tools into the SOC ecosystem. 4. Documentation and Reporting Maintain detailed and accurate documentation of incidents, investigations, and actions taken. Develop and update SOC standard operating procedures (SOPs) and playbooks. Prepare and present technical reports, dashboards, and metrics to senior management and stakeholders. 5. Mentorship and Leadership Mentor and guide SOC L1 and L2 analysts on technical skills and investigative processes. Provide training on new threats, tools, and techniques. Assist in evaluating and improving team workflows, processes, and overall SOC maturity. 6. Collaboration and Stakeholder Engagement Work closely with threat intelligence, vulnerability management, and risk teams to stay ahead of emerging threats. Communicate with IT, DevOps, and business units to coordinate responses and ensure secure configurations. Participate in red/blue team exercises and post-mortem reviews to enhance SOC readiness. Required Experience / Skills: Strong expertise with SIEM platforms (e.g., QRadar, Sentinel, LogRhythm , Splunk,). Proficient in EDR and XDR tools (e.g., CrowdStrike, SentinelOne, Carbon Black). Hands-on knowledge of packet capture analysis tools (e.g., Wireshark, tcpdump), forensic tools, and malware analysis tools. Familiarity with scripting or automation languages such as Python, PowerShell, or Bash. Deep understanding of networking protocols, OS internals (Windows/Linux), and security best practices. Familiar with frameworks such as MITRE ATT&CK, NIST, and the Cyber Kill Chain. Minimum of nine (9) years technical experience 7+ years of experience in SOC, security operations, cyber technical analysis, threat hunting, and threat attribution assessment with increasing responsibilities. 3+ years of rule development and tuning experience 2+ years of Incident response Experience supporting 24x7x365 SOC operations and willing to operate in Shifts including but not limited to Alert and notification activities- analysis/triage/response, Review and action on Threat Intel for IOCs and other operationally impactful information, initial review and triage of reported alerts and Incidents. Manage multiple tickets/alerts in parallel, including end-user coordination. Demonstrated ability to evaluate events (through a triage process) and identify appropriate prioritization for response. Solid understanding and experience analyzing security events generated from security tools and devices not limited to QRadar, MS Sentinel, FireEye, Elastic, SourceFire, Malware Bytes, CarbonBlack/Bit9, Splunk, Prisma Cloud/Compute, Cisco IronPort, BlueCoat Experience and solid understanding of Malware analysis Demonstrated proficiencies with one or more toolsets such as QRadar, MS Sentinel, Bit9/CarbonBlack, Endgame, FireEye HX / CM / ETP, Elastic Kibana Experience and ability to use, contribute, develop and follow Standard Operating Procedures (SOPs) In-depth experience with processing and triage of Security Alerts from multiple sources but not limited to: Endpoint security tools, SIEM, email security solutions, CISA, Threat Intel Sources Experience with scripting languages applied to SOC operations; for example, automating investigations with tools, automating IOC reviews, support SOAR development. Experience with bash, python, and Windows PowerShell scripting Demonstrated experience with triage and resolution of SOC tasks, including but not limited to vulnerability announcements, phishing email review, Tier 1 IR support, SIEM/Security Tools - alert analysis. Demonstrated experience and understanding of event timeline analysis and correlation of events between logs sources. Demonstrated experience with the underlying logs generated by operating systems (Linux/Windows), Network Security Devices, and other enterprise tools. Demonstrated proficiencies with an enterprise SIEM or security analytics solution, including the Elastic Stack or Splunk. Solid understanding and experience analyzing security events generated from security tools and devices not limited to: QRadar, MS Sentinel, Carbon Black, FireEye, Palo Alto, Cylance, and OSSEC Expert in security incident response processes Required Certifications: Two of the following certifications are preferred: GIAC-GCIH Global Certified Incident Handler GIAC-GCFE - Global Information Assurance Certification Forensic Examiner GIAC-GCFA - Global Information Assurance Certification Forensic Analyst GIAC-GREM - GIAC Reverse Engineering Malware GIAC-GNFA - GIAC Network Forensic Analyst GIAC-GCTI - GIAC Cyber Threat Intelligence GIAC-GPen GIAC Certified Penetration Tester GIAC-GWAPT GIAC Certified Web Application Penetration Tester CEPT - Certified Expert Penetration Tester (CEPT) CASS - Certified Application Security Specialist (CASS) CWAPT - Certified Penetration Tester (CWAPT) CREA - Certified Reverse Engineering Analyst (CREA) Qualifications : Bachelors degree in computer science, Information Technology, or a related field. Experience of 5 years or 3 years relevant experience. Strong troubleshooting and problem-solving skills. Excellent communication and interpersonal skills. Ability to work independently and as part of a team. Strong organizational and time management skills. Willingness to work after hours and provide on-call support.
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The job market for Security Operations Center (SOC) professionals in India is thriving with the increasing demand for cybersecurity experts. SOC jobs involve monitoring, detecting, and responding to security incidents to protect organizations from cyber threats. If you are considering a career in cybersecurity, exploring SOC roles in India can be a rewarding option.
These cities are known for their strong presence of IT and cybersecurity companies actively seeking SOC professionals.
The average salary range for SOC professionals in India varies based on experience and expertise. Entry-level SOC analysts can expect to earn around INR 4-6 lakhs per annum, while experienced SOC managers or consultants can command salaries ranging from INR 12-20 lakhs per annum.
In the SOC field, a typical career progression may include roles such as SOC Analyst, SOC Engineer, SOC Team Lead, SOC Manager, and eventually Chief Information Security Officer (CISO). Advancing through these roles often involves gaining experience, acquiring relevant certifications, and developing strong analytical and problem-solving skills.
Besides expertise in SOC operations, professionals in this field are expected to have knowledge of network security, incident response, threat intelligence, and cybersecurity tools. Proficiency in programming languages like Python, knowledge of SIEM (Security Information and Event Management) tools, and familiarity with compliance standards such as GDPR and ISO 27001 can also be beneficial.
As you navigate the SOC job market in India, remember to continuously enhance your skills, stay updated with industry trends, and showcase your passion for cybersecurity. With dedication and preparation, you can confidently pursue rewarding opportunities in this dynamic field. Good luck in your job search!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.