Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
7.0 - 12.0 years
10 - 15 Lacs
Jaipur
Work from Office
Network Security Specialist Firewall, WAF & Cloud Security Network Security Specialist Firewall, WAF & Cloud Security Vaibhav Global Ltd (VGL) Company Overview: . . Mindful Souls B. V. : In FY23-24, VGL acquired Mindful Souls B. V. , a Netherlands-based e-commerce company specializing in subscription-based online sales of fashion jewelry, gemstones, and lifestyle products. This acquisition is expected to leverage VGLs sourcing and manufacturing strengths while enhancing digital business capabilities. . Environmental and Social Responsibility: VGL is committed to sustainable business practices and renewable energy initiatives. The companys SEZ unit in India received the Excellence Award for IGBC Performance Challenge 2021 for Green Built Environment, reflecting its dedication to environmental sustainability. VGLs Your Purchase Feeds. . . initiative has provided 87 million meals to school children in India, the US, and the UK. The company encourages employees to donate at least two hours each month to charitable causes, tracked through its performance system. VGL is also a Great Place to Work (GPTW) certified organization. Shop LC Overview: Shop LC Germany Overview: Be the Value Leader in Electronic Retailing of Jewelry and Lifestyle Products. To deliver one million meals per day to children in need by FY40 through our one-for-one meal program: your purchase feeds. . . Our Core Values: As a Security Specialist, you will help keep our digital systems safe. This includes setting up firewalls and web protections, monitoring network activity, and responding to security issues quickly. You ll also support compliance, document security procedures, and work with other teams on technical tools. Key Responsibilities Install and manage firewalls (e. g. , Fortinet, Palo Alto) and WAF tools (e. g. , Azure WAF, Cloudflare) Set up and maintain Azure networking (routing, private access) Create and enforce security access rules Monitor logs, detect threats, and resolve incidents Implement CNAPP/CSPM tools in Azure cloud environments Collaborate with DevOps to add security to CI/CD pipelines Support audits (like PCI-DSS, ISO 27001, SOC 2) Write SOPs, runbooks, and incident support documentation Evaluate new tools and run tests as needed Required Skills and Experience 4 7 years working in network and cloud security Strong experience with NGFWs, WAFs, Azure cloud security tools Knowledge of SIEM platforms and packet capture tools (e. g. , Wireshark) Good understanding of VPNs, TCP/IP, and application security Excellent problem-solving and communication skills Competitive Salary & Benefits Yearly Thank You for Subscribing! Thank You for Applying! You have already applied in this position!!
Posted 1 week ago
8.0 - 15.0 years
15 - 19 Lacs
Mumbai
Work from Office
If you are a risk-taker, innovator, and fearlessproblem solver who loves solving challenges of data security, then this is theplace for you! A sneak peek intothe role: TheCloud Operations Manager is responsible for leading the CloudOps team andensuring 24x7 operational stability, security, and scalability of the AWS cloudinfrastructure. This role combines hands-on technical expertise with strongleadership to ensure efficient service delivery, cost optimization, operationalimprovements, and cross-functional collaboration across cloud-based platforms.The incumbent will drive process automation, continuous improvement, andeffective incident management while mentoring the team to achieve operationalexcellence. Here's what youwill get to explore: Lead the CloudOps team to manage the 24/7 service delivery operations, as well as plan and execute improvement projects. Own and evolve the AWS cloud infrastructureincluding provisioning, configuration management, cost optimization, security and scaling. Staff scheduling and planning to ensure 24x7x365 on-call coverage for cloud operations. Lead and develop/mentoring team members. Ensuring all business-as-usual activities happen with as little friction as possible, without harming platform's overall availability and stability. Develop and implement processes, systems, and technology to support and enhance the cloud support function, including workflow and incident management. Work closely with Support and Engineering teams to resolve production and POC environment issues. Facilitate the resolution of issues and escalate to relevant teams as needed. Promote a hands-on and automation-first culture, actively identifying opportunities to reduce toil through scripting, IaC and DevOps tools. Take ownership of complex incidents, perform deep AWS-level troubleshooting, and drive root cause analysis (RCA) and remediation. We can see thenext Entrepreneur At Seclore if you Are tech agnostic,think innovatively and take calculated risk A technical degree (Engineering, MCA) from a reputed institute with a minimum of 8 years of relevant experience. At least 3 years of service delivery / operation and management experience. Experience with a software professional service or product-based company (SaaS preferred), including proven ability to effectively interact with both technical and non-technical people. Ability to delegate, monitor and coach team members. Infrastructure experience and knowledge including a deep understanding of AWS Cloud infrastructure/services and delivery models, storage concepts, networking basics, etc. Excellent communication and team leadership skills with a collaborative mindset. Experience with Cloud Security compliance and audits a plus. Experience with SOC2 and ISO 270001 is a plus. Customer service orientation. A mindset focused on continuous improvement involves constantly seeking ways to enhance operational processes and outcomes. Why do we callSeclorites Entrepreneurs not Employees We value and support those who take the initiative andcalculate risks. We have an attitude of a problem solver and anaptitude that is tech agnostic. You get to work with the smartest minds in thebusiness.
Posted 1 week ago
4.0 - 7.0 years
3 - 8 Lacs
Pune, Chennai, Bengaluru
Hybrid
Interested Candidate can apply using below link: Link: https://www.jobs.global.fujitsu.com/job/Cyber-Security-Technical-Service-Engineer-1915/1915-en_US/ Or Please mail your updated resume and details to priya.jagadale@fujitsu.com Name :: Contact No:: Mail id :: Total Exp :: Rel Exo :: Cur ctc :: exp ctc :: Notice period Immediate only :: Cur location :: Pref location chennai/bangalore :: ok for 24/7 Shift :: ok for hybrid :: Skill ::Soc,Siem,cybersecurity Exp must :: Role & responsibilities :: Job Description: 4-9 years of L2 Relevant Cybersecurity/SOC L2 experience, preferably in Infrastructure protection, Network Security, Endpoint protection, DLP etc. Extensive experience with SIEM systems and security event correlation. Excellent troubleshooting skills, self-motivated, results-driven, and well organized. Ability to multi-task and solve complex technical issues. Experience in working on Azure or other cloud platforms is a plus. Mandatory 24X7 work and willing to opt for SOC location. Excellent communication skills (written and verbal). Should be able to prepare and present reports to management. Skills SOC Specialist Regards, Priya.jagadale@fujitsu.com
Posted 1 week ago
5.0 - 10.0 years
2 - 6 Lacs
Bengaluru
Work from Office
We are seeking an experienced and highly skilled Senior SOC Design for Test Engineer with aminimum of 5 years of hands-on experience in SOC Design for Test. As a key member of our team, you will play a pivotal role in ensuring the testability, manufacturability, and quality of our cutting-edge System on Chip designs Key Responsibilities Lead and manage SOC Design for Test efforts for complex projects, ensuring the successful execution coverage, manufacturability, and quality plans. Develop full chip and block level DFT implementation from the DFx Specifications and product coverage, quality, and manufacturability goals. Define and implement Test controllers at top level and block level, fuse controllers, test clocking strategy, chip I/O test strategy and HSIO test strategy. Define JTAG TAP, boundary scan, I/O Test JTAG access, IEEE1687 iJTAG network and instrument design and implementation. Define the Test Interface for each of the P&R IP blocks for Scan, MBIST and other test interfaces. Define hierarchical block isolation, Test clocking and On Chip Clock controllers and reset methodology. Define scan and MBIST timing at the top level and block level timing. Analyse block level RTL or gates to ensure that scalability and coverage is satisfied as per the design goals. Ensure that DFT is provided to fix the DFT violations to ensure that the design goals are meet. Analyse compression requirements for each of the blocks, define Intest and Extest compression requirements and define the requirements for compression engines. Synthesize compression engines for each of the blocks. Create the collaterals for compression for the IPs. Block level scan insertion as well as development of the scan wrappers for the blocks. Do scan insertion on the blocks, analyse scan DRC, implement DFT fixes. Create scan protocol files for designs, create scan inserted netlist, create scan definitions as well as scan definition files for PD. Perform ATPG on the scan inserted netlist, analyse DRC and coverage violations. Deep knowledge of different scan models Stuck-at, transition test, path-delay, bridging, cell aware, small-delay transition, IDDQ test etc. Ability to analyse coverage for each of the model types. Running GLS with or without timing for the scan vectors. Ability to debug the failures and working with timing and PD teams to fix the timing issues. Understanding of pattern delivery to the post-silicon test engineering teams. Delivering to the Test engineering the Test pin muxing and other full chip requirements for the Test Engineering Team. Understanding tester requirements and delivering the patterns in the formats that the tester teams needs. Implement pattern retargeting. Create grey box models for blocks. Coverage analysis of full chip consolidating Intest and Extest patterns. Knowledge of Top level scan architecture and creating flow to create pattern retargeting. Knowledge of Streaming Scan Network and other Top level scan pin sharing and implementing the block to top level pattern generation for this flow. Implementing Memory Testing and MBIST. Knowledge of Memory defect models and test algorithms. Knowledge of memory bit mapping and redundancy analysis. Implementing memory repair and fuse sharing among various memory. Knowledge of LogicBIST with Test point insertion, X-blocking. Full chip DFT delivery for tapeout including but not limited to DFT netlist verification, pattern delivery, Tester requirements. Debug DFT patterns post silicon, ability to analyse chain test patterns for failures, scan pattern failures. Analyse MBIST pattern failures, yield and repair debug. Ability to perform volume diagnostics on the parts to isolate and improve the patterns. Requirements Bachelors degree in computer science, Electrical/Electronics Engineering, or related field. OR masters degree in computer science, Electrical/Electronics Engineering, or related field. OR PhD in Computer Science, Electrical/Electronics Engineering, or related field. 5+ years of hands-on experience in SOC Design for Test. Expertise in DFT tools and flows in scan intertion, ATPG, GLS simulation, diagnosis flows. Prior experience working on IP level and SOC level DFT projects. Proficient in DFT tools from Siemens (Tessent), Synopsys DFTmax, Tetramax, Spyglass DFT advisor, Genius DFT, Modus, VCS, Xcelium etc. Worked in full chip design or complex IP delivery in the area of DFT. Experience in post silicon debug, diagnosis and yield enhancements is a plus.
Posted 1 week ago
5.0 - 8.0 years
3 - 7 Lacs
Jaipur
Work from Office
Shift : 9x5 Job Description for Threat Hunter/TIP admin Skillset Must : Network forensic (Packet Capture andRe-Construction Capability), Knowledge on Threat Intelligence Platform (TIP)/Anti APT/ EDR Certified with any threat hunting certification,or equivalent . Responsible for conducting all threat-huntingactivities necessary for identifying the threats including zero day. Hunt for security threats, identify threat actorgroups and their techniques, tools and processes. Strong knowledge of APT lifecycle, tactics,techniques, and procedures (TTPs). Familiarity with MITRE ATT&CK framework andmapping threats to techniques. Provide expert analytic investigative support toL1 and L2 analysts for complex security incidents. Proficiency in malware behavior analysis andsandboxing. Perform analysis of security incidents forfurther enhancement of rules, reports, AI/ML models. Perform analysis of network packet captures,DNS, proxy, NetFlow, malware, host-based security and application logs, as wellas logs from various types of security sensors uncovering the unknown aboutinternet threats and threat actors. Analyse logs, alerts, suspicious malwaressamples from all the SOC tools, other security tools deployed such asAnti-Virus, Anti APT solutions, EDR, IPS/IDS, Firewalls, Proxies, ActiveDirectory, Vulnerability assessment tools etc. Using knowledge of the current threat landscape,threat actor techniques, and the internal network, analyze log data to detectactive threats within the network. Build, document and maintain a comprehensivemodel of relevant threats to customer. Proactively identify potential threat vectorsand work with team to improve prevention and detection methods. Identify and propose automated alerts for newand previously unknown threats. Incident Response for identified threats. Strong knowledgeof APT lifecycle, tactics, techniques, and procedures (TTPs). Hands-onexperience with Trellix (formerly McAfee) APT solutions, EDR, and ThreatIntelligence. Proficiency inmalware behavior analysis and sandboxing. Familiarity withMITRE ATT&CK framework and mapping threats to techniques. Experience withsecurity monitoring tools such as SIEM, SOAR, EDR, and Threat IntelligencePlatforms (TIPs). Solidunderstanding of network protocols, endpoint protection, and intrusiondetection systems. Required Qualifications: Education: B.E./B.Tech/MCA/M.Sc. in Computer Science or Information Technology. Experience: Minimum 6+ years of relevant experience in Security Operations, Threat Detection, or Incident Response. Certification : CSA/CEH
Posted 1 week ago
4.0 - 7.0 years
3 - 7 Lacs
Jaipur
Work from Office
Experience Required: 4+ years in Cybersecurity, with 2+years hands-on any threat intelligence platform Reports To: Security Operations Lead / SOC Manager Location: Jaipur Job Type: Full-time, Customer locations Job Summary: We are seeking a skilled Threat IntelligenceEngineer/Analyst with hands-on experience in managing and operating a UnifiedThreat Intelligence Platform (UIP). The ideal candidate will be responsible forintegrating, enriching, analyzing, and disseminating threat intelligence acrosssecurity systems (SIEM, SOAR, EDR) to enhance threat detection, hunting, andresponse efforts. Key Responsibilities: Administer and maintain the Unified Threat Intelligence Platform (e.g., MISP, Anomali, ThreatConnect, EclecticIQ, TIP from commercial vendors). Should have worked on any of the TI platform. Experience in Recorded future preferred. Aggregate, normalize, and enrich threat intel feeds from internal, commercial, and open-source sources (OSINT). Map Indicators of Compromise (IOCs), TTPs, and threat actor profiles using frameworks such as MITRE ATT&CK and STIX/TAXII. Integrate UIP with SIEM, SOAR, and EDR platforms to enable automated threat correlation and alert enrichment. Analyze and prioritize threat intelligence based on relevance, risk level, and business impact. Coordinate with threat-hunting and SOC teams to enable actionable use of threat intelligence. Create and manage threat intelligence dashboards, reports, and alerts. Continuously improve threat ingestion, enrichment pipelines, and integration workflows. Required Skills and Qualifications: Solid understanding of Threat Intelligence lifecycle: collection, processing, analysis, dissemination. Experience with commercial or open-source TIP/UIP tools (e.g., MISP, ThreatConnect, Anomali, EclecticIQ). Strong knowledge of STIX/TAXII, OpenIOC, YARA, Sigma rules. Experience integrating threat intel into SIEM (e.g., Splunk, QRadar, Sentinel) and SOAR platforms. Familiarity with threat actor behavior, campaigns, malware families, and IOC tracking. Working knowledge of scripting (Python preferred) for automation and data transformation. Ability to analyze complex data and present threat intelligence in clear, actionable formats. Education Requirements : BE, B.Tech in IT/CS/ECE, BCA, BSc CS and MCA Certification : CEH/CSA/ NBAD certification
Posted 1 week ago
5.0 - 10.0 years
9 - 14 Lacs
Chennai
Work from Office
Major Responsibilities: Manage the Perimeter Security technologies deployed by Tata Communication on client infrastructure including Firewall, Proxy, 2FA, etc. Handle change and support requests from customers Perform initial troubleshooting on issues and escalate to shared SOC team as needed via portal, email or phone. Follow up requests and incidents for resolution and ensure client is communicated regularly Establish good working relationship with the stakeholders on the client side Send regular reports on the tasks performed to the TCL Manager Provide hands and feet support for the remote team inside the client infrastructure for troubleshooting and other activities. Work with vendors to resolve internal and customer issues in a timely manner Support client on their regular office days. Candidate would also be expected to be flexible with timings to support issues and major activities like upgrades or maintenance. Experience and qualification Bachelors degree in Engineering or equivalent 5-8 years of Experience in Networking and Perimeter Security. Good knowledge in Firewalls, Proxies and in Two Factor Authentication Technical Skills: Candidate should have handled at least any two of the Firewall products. Cisco, Checkpoint, Palo Alto, and FortiGate, Experience with any of these Proxy products Bluecoat or Zscaler. Understanding of security landscape and different tools used Good Communication and interpersonal Skills are mandatory. Industry certifications in the above products would be an added advantage. Familiarity with ITIL framework would be an advantage
Posted 1 week ago
4.0 - 6.0 years
1 - 5 Lacs
Jaipur
Work from Office
Experience Required: 6+ years in Cybersecurity, with 4+years Reports To: Security Operations Lead / SOC Manager Location: Jaipur Job Type: Full-time, Customer locations Job Summary: We are seeking a skilled Infrastructure Operations Engineer to manage and maintain core IT infrastructure components including physical servers, operating systems, backup solutions, storage systems, databases, networking, and health monitoring tools. The ideal candidate will ensure availability, reliability, and security of the enterprise infrastructure. Key Responsibilities: Physical Servers & OS: Install, configure, and maintain physical servers in data center environments. Manage operating systems (Windows/Linux), including patching, hardening, and performance tuning. Perform OS upgrades, configuration backups, and lifecycle management. Backup & Storage: Administer backup tools (e.g., Veeam, Commvault, NetBackup) and ensure backup/restore success rates. Manage SAN/NAS storage solutions and perform capacity planning, replication, and snapshot management. Database: Support database platforms (e.g., SQL Server, Oracle, MySQL) for patching, backup, and uptime monitoring. Work with DBA team to support infrastructure needs related to databases. Networking: Perform basic configuration and troubleshooting of switches, routers, firewalls, and load balancers. Collaborate with network teams to ensure optimal connectivity and performance across environments. Health Monitoring: Implement and maintain infrastructure monitoring tools (e.g., Nagios, SolarWinds, Zabbix, PRTG). Proactively monitor system health and respond to alerts to prevent outages or performance degradation. Required Skills andQualifications: Experience with server hardware (Dell, HPE, Cisco UCS). Strong knowledge of Windows/Linux system administration. Familiarity with enterprise backup and storage solutions. Basic knowledge of networking fundamentals (TCP/IP, VLANs, routing). Hands-on experience with monitoring tools and log analysis. Good scripting knowledge (PowerShell, Bash) for automation. Familiarity with endpoint/server hardening, system configuration management, and patching. Experience using configuration and compliance management tools (e.g., Ansible, Chef, SCCM, GPO). Ability to document policies, procedures, and control deviations. Preferred Qualifications: ITIL Foundation or Practitioner certification. Experience in audit/compliance functions, particularly in regulated industries (BFSI, healthcare, government). Familiarity with ISO 27001, NIST 800-53, or other security frameworks. Education Requirements : BE, B.Tech in IT/CS/ECE, BCA, BSc CS and MCA Certification : Certifications: MCSE, RHCE, CCNA, VCP, or equivalent.
Posted 1 week ago
5.0 - 6.0 years
2 - 6 Lacs
Jaipur
Work from Office
Experience Required: 4+ years in Cybersecurity, with 2+years hands-on Anti APT tool and in IR Reports To: Security Operations Lead / SOC Manager Job Summary: We are looking for a highly skilled Anti-APT and IncidentResponse Specialist to lead the detection, analysis, and remediation ofsophisticated cyber threats, including Advanced Persistent Threats (APTs). Thecandidate will work closely with threat intelligence, SOC, and forensic teamsto respond to incidents, contain threats, and fortify the environment againstfuture attacks. Key Responsibilities: Anti-APT Operations: Monitor for indicators of APT campaigns using threat intelligence feeds, SIEM, EDR, NBAD, and anomaly detection tools. Identify and analyze tactics, techniques, and procedures (TTPs) used by threat actors aligned with MITRE ATT&CK. Leverage threat intelligence to proactively hunt and neutralize stealthy threats. Incident Response (IR): Lead and execute all phases of incident response: identification, containment, eradication, recovery, and lessons learned. Perform forensic analysis on systems and logs to determine the root cause, scope, and impact of security incidents. Collaborate with IT, SOC, and legal/compliance teams during major incidents and breach investigations. Create and maintain IR playbooks, response workflows, and escalation procedures. Detection and Prevention: Work with SIEM and SOAR teams to improve alert fidelity and develop custom correlation rules. Coordinate with endpoint, network, and cloud teams to plug gaps and strengthen defenses post-incident. Assist in configuring anti-APT technologies like sandboxing, deception platforms, and EDR/XDR solutions. Required Skills and Qualifications: Strong knowledge of APT groups and attack frameworks (e.g., MITRE ATT&CK, Lockheed Martin Kill Chain). Hands-on experience in incident response, digital forensics, threat hunting, and malware analysis. Proficiency with tools such as: EDR (e.g., CrowdStrike, SentinelOne, Carbon Black) SIEM (e.g., Splunk, QRadar, ArcSight) Forensics tools (e.g., FTK, EnCase, Volatility) Threat intel platforms (MISP, Anomali, ThreatConnect) Strong understanding of Windows/Linux internals, memory/process analysis, and network forensics. Experience writing detection rules (Sigma, YARA) and incident reports. Preferred Qualifications: Certifications: GCIH, GCFA, GNFA, CHFI, OSCP, or similar. Experience with APT campaigns linked to sectors like government, BFSI, or critical infrastructure. Exposure to cloud incident response (Azure, AWS, GCP) and OT/ICS threat environments. Education Requirements : BE, B.Tech in IT/CS/ECE, BCA, BSc CS and MCA Certification : CEH/CSA/CHFI
Posted 1 week ago
12.0 - 15.0 years
14 - 19 Lacs
Chennai
Work from Office
The leading security organization, TataCommunications Limited, has an immediate job opportunity for Security Operations Lead and the position is required for one of its important customers, Therole defines the ability to handle security team managing Firewalls and Zscalercloud proxy, this includes troubleshooting of security incidents to controlsthe impact also new service request from the customer. Theroles need ability to work independently as well as team management whilehandling multiple client incidents, projects, Service Improvement Plans,Hygiene projects. Responsibilities Lead the technical deploymentor troubleshooting skills on Fortinet Firewall, Zscaler Proxies, F5 WAF, DDoS Implement project/change andtroubleshoot incidents spanning Fortinet Firewall/UTM Implement project/change andtroubleshoot incidents on Zscaler cloud Proxy. Good knowledge on F5 WAF andDDoS service Adherence to ITIL servicemanagement framework Monitor/manage the customerperimeter security infrastructure as per the Service Level Agreement (SLA) withminimal escalations. Vulnerability Management of themanaged infrastructure with appropriate remediation Apply investigation techniquesto document root cause and impact of detected computer securityincidents. Performs or assists with ITsecurity assessments or audits of internal and external networks and systemsunder the direction of the IT Security management. Document findingsin written reports with recommendations for remediation. Assists with the developmentand documentation of an overall IT Security architecture to assureconfidentiality, integrity, and availability of company IT assets.Develops and maintains goodcommunications and working relationships with teams and external clients.Knowledge on Cyber security incidentsand reacting to it in a most optimal and secured way. Driving the mitigation.Identifying and mitigating therisks in the IT environment.Providing inputs to the continualservice improvements and driving the service improvement plans and the hygieneProjects.Actively giving inputs to automatingvarious tasks and driving the required projects.Provide on-call support as perrotation for emergency situations. L Experience/Skill/Qualifications: Bachelors Degree in computerscience or related IT field Experience in Managed SOC anddedicated customer environment 10 to 15 years of experience inNetwork security administration Expert level knowledge inFortinet Firewall and Zscaler cloud Proxies Good knowledge in F5 WAFmanagement Good knowledge in DDoS servicemanagement Expert or Professionalcertification in IT security or network / systems administration is desirable(CCIE, CCNP, CEH, CISSP) Fortinet NSE-1, NSE-2, NSE-3 isrequired, ZIA, ZPA, ZDX is required, Good communication skills Should be flexible to work in 24/7operations environment, Ability to adapt and follow theprocesses and guidelines, Possess an impeccable workethic and a high degree of integrity,
Posted 1 week ago
7.0 - 9.0 years
12 - 16 Lacs
Chennai
Work from Office
Roles/Responsibilities: Experiencein SIEM Tool like ArcSight, LogRhythm SIEM, Threat Intelligence, MalwareAnalysis, Incident Response Experiencein handling SOC customer in MSSP/multi-tenant environment Responsiblefor the technical Administration or troubleshooting in SIEM ensuring theefficient functionality of the solution Responsiblefor Incident Validation, Incident Analysis, Solution Recommendation, Good knowledge on implementation,installation, integration troubleshooting and overall functionalities of LogRhythm/ArcSight/QRadar/Splunk Arc Sight/LR/QRadar platformadministration, management experience, platform upgrade Experience in troubleshooting platformrelated issues, Data backup, restoration, retention Experience in creating content basedon MITRE Framework Exposure to SOAR, alert aggregation,automation, Playbook creation ArcSight/LRrule base fine tuning, Ongoing log source modifications, Configuration/policychanges, General SIEM Administration, SIEM Content Development Troubleshootingof an incident within IT Security incident response teams of SOC. Maintainsawareness of new and emerging cyber-attack threats with potential to harmcompany systems and networks. Devises and implements countermeasures tomitigate potential security threats. Assistswith the development and maintenance of IT security measurement and reportingsystems to aid in monitoring effectiveness of IT Security programs. Assistswith the development, revision, and maintenance of Standard OperatingProcedures and Working Instructions related to IT Security. Good Coordination skills with variousother teams for faster resolution/completion. Good to have threat huntingknowledge. Education/Skills: BE/B.Techor equivalent with minimum 7-10 years of experience Workexperience of minimum 6 years in SOC Incident Handling, Incident Response TrendAnalysis, administration/monitoring of SIEM Tool like ArcSight, LogRhythm SIEM,Threat Intelligence, Malware Analysis, Abilityto adapt and follow the processes and guidelines Possessan impeccable work ethic and a high degree of integrity GoodAnalytical & Problem Solving skills Ableto communicate with technical staff/management Flexibleto work after office and over weekend if required Highlymotivated & customer centric
Posted 1 week ago
5.0 - 8.0 years
2 - 6 Lacs
Mumbai
Work from Office
ob Title: Perimeter Security Specialist Job Location : Mumbai Job Summary: We are seeking experienced and dedicated professionals to join our cybersecurity team. These specialists will be responsible for safeguarding our customer organization's network infrastructure and web applications against various threats, including DDoS attacks, web application vulnerabilities, encrypted traffic management, and network anomalies. Roles and Responsibilities: DDoS Protection Specialist: DDoS Mitigation: Implement and manage DDoS mitigation strategies to protect the organization's network from disruptive DDoS attacks. Monitoring: Continuously monitor network traffic for unusual patterns and proactively respond to DDoS attacks. Incident Response: Develop and execute DDoS incident response plans, including coordination with relevant stakeholders. Security Awareness: Educate staff about DDoS threats and best practices for mitigation. WAF Specialist (Web Application Firewall): WAF Configuration: Configure, manage, and maintain the Web Application Firewall to secure web applications against common threats, including SQL injection, XSS, and more. Rule Development: Develop and maintain WAF security rules to adapt to evolving threats and application requirements. Incident Response: Investigate and respond to security incidents and breaches related to web applications. Security Auditing: Regularly audit WAF logs and rules to ensure compliance and effectiveness. Encrypted Traffic Management Specialist: SSL/TLS Inspection: Implement SSL/TLS decryption and inspection techniques to identify and mitigate threats hidden within encrypted traffic. Certificate Management: Manage SSL/TLS certificates and ensure their proper deployment. Traffic Analysis: Analyze encrypted network traffic for potential security threats. NBAD Specialist (Network-Based Anomaly Detection): NBAD Configuration: Configure, manage, and maintain NBAD systems to monitor network traffic for unusual behavior or anomalies. Anomaly Detection: Detect and respond to unusual network activities that may indicate security breaches. Incident Response: Investigate and respond to network anomalies and security incidents. Qualifications: Science Graduate (IT / Computer) is preferred. Bachelor of Engineering (BE), Bachelor of Technology (B.Tech), or Master of Computer Applications (MCA) is required. A minimum of 4 to 5 years of relevant experience in the field of information security and a total of 6-7 years of experience in the field of IT Security and the implementation/support of in-scope solutions. Certifications: Certification in at least 2 of the following: CCNA, RHCE, CompTIA. OEM Product Certification in at least 2 technologies should be mandatory Work Hours : Flexible to work in 24x7x365 environments and extend in case of P1 incident, critical patch upgrades/updates, DC D R drills and as and when required.
Posted 1 week ago
2.0 - 4.0 years
2 - 6 Lacs
Thane
Work from Office
Organisation : Novamesh Ltd (TATA Commununications Ltd) Position : L1, Location Belapur, Customerlocation Shift : 9x5 Job Summary: We are seeking a well-rounded Security SolutionsSpecialist with hands-on experience in deploying, configuring, and managingsecurity platforms including EfficientIP (DNS, DHCP, IPAM), PicusSecurity (Breach and Attack Simulation), Varonis (Data Security& Governance), and ColorTokens (Microsegmentation & Zero Trust).The candidate will play a key role in optimizing the security posture of theorganization through proactive technology implementation, tuning, andcontinuous improvement. Key Responsibilities: EfficientIP (DNS Security & DDI Management): Configure and manage DDI (DNS, DHCP, IPAM) solutions using EfficientIP. Implement DNS threat protection, DNS tunneling detection, and response actions. Integrate EfficientIP with SIEM/SOC platforms for alerting and incident enrichment. Picus Security (Breach and Attack Simulation - BAS): Operate and tune the Picus BAS platform to continuously validate security controls. Conduct attack simulations mapped to MITRE ATT&CK to identify gaps in defenses. Collaborate with red/blue teams to interpret simulation outcomes and drive improvements. Varonis (Data Security and Insider Threat): Deploy and maintain Varonis to monitor access to critical data repositories (file shares, SharePoint, OneDrive, etc.). Investigate anomalous file activity, permissions misuse, and potential data exfiltration attempts. Support data classification, audit, and compliance initiatives (e.g., GDPR, HIPAA, PCI). ColorTokens (Microsegmentation & Zero Trust): Implement Zero Trust and application-layer segmentation policies using ColorTokens platform. Monitor east-west traffic, define security zones, and restrict lateral movement. Work with infrastructure and cloud teams to enforce policy across hybrid environments. Required Qualifications: Education: B.E./B.Tech/MCA/M.Sc. in Computer Science or Information Technology Certification : CEH
Posted 1 week ago
3.0 - 5.0 years
4 - 8 Lacs
Pune
Work from Office
Role Purpose The purpose of the role is to resolve, maintain and manage clients software/ hardware/ network based on the service requests raised from the end-user as per the defined SLAs ensuring client satisfaction Do Ensure timely response of all the tickets raised by the client end user Service requests solutioning by maintaining quality parameters Act as a custodian of clients network/ server/ system/ storage/ platform/ infrastructure and other equipments to keep track of each of their proper functioning and upkeep Keep a check on the number of tickets raised (dial home/ email/ chat/ IMS), ensuring right solutioning as per the defined resolution timeframe Perform root cause analysis of the tickets raised and create an action plan to resolve the problem to ensure right client satisfaction Provide an acceptance and immediate resolution to the high priority tickets/ service Installing and configuring software/ hardware requirements based on service requests 100% adherence to timeliness as per the priority of each issue, to manage client expectations and ensure zero escalations Provide application/ user access as per client requirements and requests to ensure timely solutioning Track all the tickets from acceptance to resolution stage as per the resolution time defined by the customer Maintain timely backup of important data/ logs and management resources to ensure the solution is of acceptable quality to maintain client satisfaction Coordinate with on-site team for complex problem resolution and ensure timely client servicing Review the log which Chat BOTS gather and ensure all the service requests/ issues are resolved in a timely manner Mandatory Skills: Proofpoint Email Security. Experience: 3-5 Years.
Posted 1 week ago
5.0 - 10.0 years
4 - 7 Lacs
Bengaluru
Work from Office
Job Overview We are seeking an experienced and highly skilled Senior SOC Design Verification Engineer with a minimum of 5 years of hands-on experience in SOC Design Verification. As a key member of our team, you will play a pivotal role in ensuring the robustness and correctness of our cutting-edge System on Chip designs. Job Description Lead and manage SOC Design Verification efforts for complex projects, ensuring the successful execution of verification plans. Develop and implement comprehensive verification strategies, test plans, and test benches for high-speed SOCs, including low-speed peripherals like I2C/I3C, SPI, UART, GPIO, QSPI, and high-speed protocols like PCIe, Ethernet, CXL, MIPI, DDR and HBM Conduct Gate-level simulations, and power-aware verification using Xprop and UPF.Collaborate closely with cross-functional teams, architects, designers, and pre/post-silicon verification teams. Analyze and implement System Verilog assertions and coverage (code, toggle, functional). Provide mentorship and technical guidance to junior verification engineers.Manage and lead a dynamic team of verification engineers, fostering a collaborative and innovative work environment. Ensure verification signoff criteria are met and documentation is comprehensive.Demonstrate dedication, hard work, and commitment to achieving project goals and deadlines. Adhere to quality standards, implement good test practices, and contribute to the continuous improvement of verification methodologies. Experience with verification tools from Synopsys and Cadence, including VCS and Xsim. Integration of third-party VIPs (Verification IP) from Synopsys and Cadence. Qualifications Bachelors degree in computer science, Electrical/Electronics Engineering, or related field. ORMasters degree in computer science, Electrical/Electronics Engineering, or related field. ORPhD in Computer Science, Electrical/Electronics Engineering, or related field. 5+ years of hands-on experience in SOC Design Verification. Expertise in UVM (Universal Verification Methodology) and System Verilog. Prior experience working on IP level and SOC level verification projects. Proficient in verification tools such as VCS, Xsim, waveform analyzers, and third-party VIP integration (e.g., Synopsys VIPs and Cadence VIPs). Hands-on experience with UFS (Universal Flash Storage), Ethernet, PCIe, CXL, MIPI protocols.Solid understanding of low-speed peripherals (I2C/I3C, SPI, UART, GPIO, QSPI) and high-speed protocols. Experience in DDR, HBM, Gate-level simulations, and power-aware verification using Xprop and UPF. Proficiency in scripting languages such as shell, Makefile, and Perl. Strong understanding of processor-based SOC verification, including native, Verilog, System Verilog, and UVM mixed environment. C-System Verilog handshake and writing C test cases for bootup verification. Excellent problem-solving, analytical, and debugging skills.
Posted 1 week ago
7.0 - 11.0 years
0 Lacs
karnataka
On-site
As a Design Verification Engineer, you will be responsible for verifying complex designs such as accelerators, datapath IP, processor core subsystems, and complex interfaces/protocols using leading-edge methodologies like UVM and Formal DV. Your role will involve architecting the testbench, developing the verification environment, and defining test plans, tests, and verification methodology for block/sub-system level verification. You will collaborate with the design team to generate test plans, ensure code and functional coverage closure, integrate block testbenches at the sub-system level UVM environment, and verify integration. Additionally, you will interact with the analog co-simulation and firmware team to enable top-level chip verification aspects. Your responsibilities will also include packaging verification environments for Digital IP for seamless integration into the verification flow at different stages of execution. You will evaluate 3rd party IPs on key qualitative aspects and establish evaluation flows for home-grown and 3rd party IPs for consistent benchmarking of DV evaluation. To excel in this role, you should have a minimum B.E./B.Tech degree in Electrical/Electronics/Computer Science and 7-10+ years of experience in design verification with UVM and constrained random, coverage-based verification approaches. You must possess a strong understanding of DV concepts and the ability to develop scalable DV environment architecture for achieving first-pass DV success. Your adaptability to learn end application/systems and map them into smart verification test plans will be crucial. Excellent debugging and analytical skills, along with good interpersonal, teamwork, and communication skills, are essential for effectively driving discussions with geographically dispersed teams. Knowledge of assertion-based formal verification, standard on-chip interfaces, processor/SoC architecture, and/or DSP fundamentals will be advantageous. Experience with ASIC/SoC product DV and productization is highly desirable for this role.,
Posted 1 week ago
8.0 - 12.0 years
20 - 35 Lacs
Hyderabad
Work from Office
Job Title: SoC Infrastructure Development Lead (Dev-Lead) Experience: 8+ years Location: Hyderabad Notice Period: Immediate to 15 Days Role Overview We are looking for a highly experienced and technically strong SoC Infrastructure Development Lead to drive design, integration, and verification of infrastructure IPs that form the backbone of our complex SoC platforms. This role requires deep domain knowledge of infrastructure components such as interconnects, clocks, resets, power domains, debug fabric, and system control blocks, and the ability to coordinate across silicon, firmware, verification, and physical design teams. Key Responsibilities SoC Infrastructure Planning and Development Cross-IP Integration & SoC-Level Ownership Design Enablement & Firmware Interface Verification and Validation Required Expertise Technical Skills Strong RTL design skills using Verilog/SystemVerilog; familiarity with UVM and formal verification flows. In-depth knowledge of AMBA (AXI/AHB/APB), NoC, and coherent interconnects (e.g., CCN, CMN, or NOC from Arteris/NVIDIA). Expertise in clock tree design, clock gating strategies, and multi-domain reset and power sequencing. Experience with RTL-to-GDSII flows, including timing constraints, SDC generation, and ECO handling. Platform-Specific Expertise Experience working on Qualcomm, ARM, Intel, or custom ASIC platforms, with a solid understanding of SoC assembly and platform integration. Familiarity with: Qualcomm AOSS, RPMh, and RPM message protocol, ARM Coresight & debug/mem-ap infrastructure, Secure boot, eFuse management, and system control registers, DVFS, retention/idle states, and power collapse flows. Tools & Methodologies Proficient with tools like Synopsys Design Compiler, Primetime, VCS, SpyGlass, Questa, or Jasper. Working knowledge of scripts in Python/TCL/Perl for automation of flow and register map generation. Hands-on experience with hardware-software co-validation platforms (e.g., Synopsys ZeBu, Cadence Palladium, FPGA protos).
Posted 1 week ago
8.0 - 12.0 years
25 - 37 Lacs
Noida, Gurugram, Bengaluru
Work from Office
Role & responsibilities: Analyze and understand new log source formats (syslog, flat files, APIs, JSON etc.). Design and develop custom Flex Connectors, including support for JSON and non-standard log formats & deploy ArcSight Flex Connectors for custom log source integration. Lead parser creation and tuning for various log sources and security technologies. Collaborate with the SOC and threat intel teams to build detection use cases and correlation rules aligned with MITRE ATT&CK. Integrate ArcSight with SOAR platforms for automated response, leveraging Python scripting. Conduct feasibility analysis for new integrations and support parser deployment lifecycle. Review parser performance, log quality, EPS optimization, and correlation tuning. Document architecture, parser specifications, playbooks, and integration workflows. Lead implementation projects, including installation, configuration, and tuning of ArcSight ESM, Logger, and Smart Connectors. Work closely with security operations and infrastructure teams to integrate log sources and develop use cases. Perform infrastructure sizing, health checks, and system performance tuning. Develop and maintain documentation including solution design, implementation guides, and SOPs. Provide subject matter expertise during POCs, and implementation support. Preferred candidate profile: Bachelor in CS/IT or similar 8+ years of experience in cybersecurity with at least 4+ years in ArcSight solution design and deployment. Familiarity with regular expressions (regex) for parsing custom logs. Experience with log onboarding, parsing, and normalization processes. Log analysis (Analyst) Understanding of cloud environment (GCP) & Kubernetes & docker technologies Integration of different types of log sources Solid understanding of - CEF (Common Event Format) ,ArcSight Event Schema and Field Mapping, Device/Product Event Categorization Knowledge of Linux/Unix systems and basic scripting. Experience with ArcSight content development: rules, correlation, dashboards, reports. And familiarity with ArcSight upgrades and migration planning. Strong understanding of log management, threat detection, and SOC workflows. Knowledge of related tools and platforms such as SIEM, SOAR, firewalls, IDS/IPS, endpoint security. Scripting knowledge (e.g., Python, Shell) for automation and data parsing. Excellent communication and stakeholder management skills. Architect and implement end-to-end SIEM solutions using ArcSight 24* (ESM, SmartConnectors, Thub, Recon). Hands-on experience in leading parser development, customization, and tuning for various log sources and third-party security technologies. Integrate ArcSight with SOAR platforms for automated response, leveraging Python scripting. Skilled in performing feasibility analysis and POCs for new log source integrations and managing the complete parser deployment lifecycle.
Posted 1 week ago
2.0 - 3.0 years
4 - 7 Lacs
Thane, Navi Mumbai, Mumbai (All Areas)
Hybrid
Job Title: Security Analyst L1 Job Description: The Area: The Information Security Team is a central function governing corporate and product security globally. We have built a strong team of high performing security experts and are creating a new team within Information Security here at Morningstar. As a member of our new Security Operations Center Team, you will get to be a part of a growing and well supported program protecting Morningstars Infrastructure, Data, and People. The Role: As an analyst on our Security Operations Center Team, you will monitor and analyze threats, provide security monitoring, and incident response services. Day to day you will work with the team to understand, mitigate, and respond to threats quickly, restoring operations and limiting impact. You will analyze incidents to determine scope and impact and assist in recovery efforts. You will combine threat intelligence, event data, and assessments from recent events, to identify patterns to understand attackers' goals and stop them from succeeding. This position is based in our Mumbai office. Responsibilities: • Provide 24x7 monitoring operations for security alerts • Detect, analyze, report and respond to cyber security events and incidents using a combination of technology solutions and processes • Review and escalate alerts • Examine and operationalize new adversary detection methods to defend Morningstar • Assess the security impact of security alerts and traffic anomalies to identify malicious actions. • Generate reports for both technical and non-technical staff and stakeholders. Requirements + A bachelor’s degree and 2-3+ years’ experience in Information Security. + Excellent communication skills and an understanding of cyber security fundamentals. + Candidates should be interested in keeping up with the latest security trends. + Experience with security tools +Add-on Certification like Security+, CompTIA+, Splunk. Morningstar is an equal opportunity employer
Posted 1 week ago
3.0 - 8.0 years
3 - 7 Lacs
Hyderabad
Work from Office
Job Description Lead the design and deployment of scalable security automation workflows and playbooks in Cortex XSOAR (or equivalent platforms such as Splunk SOAR, Siemplify, etc.). Serve as technical owner of the SOAR platform, managing connectors, integrations, performance monitoring, version control, and upgrades. Build custom automations using Python scripts, decision logic, and API integrations to support alert enrichment, containment, and notification tasks. Architect integrations with SIEMs (e.g., Splunk, QRadar), EDR, threat intel feeds (e.g., Anomali, VirusTotal), ticketing systems (e.g., ServiceNow, Jira), and other tools. Drive automation of incident response (IR) use cases including phishing, malware, lateral movement, data exfiltration, insider threats, and vulnerability exploitation. Partner with SOC, threat intelligence, and cloud security teams to identify automation opportunities and translate them into technical solutions. Optimize SOAR playbooks to reduce mean time to detect (MTTD) and respond (MTTR) while maintaining reliability and resilience. Mentor junior automation engineers and provide code reviews, best practices, and process guidance. Contribute to development of automation standards, security engineering roadmaps, and cross-team documentation. Stay abreast of emerging SOAR trends, threat landscapes, and new platform features. Required Qualifications: 3+ years specifically working with SOAR platforms Cortex XSOAR strongly preferred; Splunk SOAR, Siemplify, or Chronicle SOAR also acceptable. Strong scripting experience in Python, especially within automation workflows. Proven expertise in integrating security tools using REST APIs, Python SDKs, and platform connectors. In-depth understanding of SOC operations, incident lifecycle, and security best practices (MITRE ATT&CK, NIST, etc.). Familiarity with SIEM platforms (e.g., Splunk) and threat intelligence enrichment techniques. Experience with version control (Git), CI/CD pipelines, and structured testing of automation code. Demonstrated ability to lead complex automation initiatives and work independently with minimal guidance. Strong written and verbal communication skills, especially in cross-functional team environments.
Posted 1 week ago
5.0 - 10.0 years
9 - 13 Lacs
Hyderabad
Work from Office
Job Title: Senior Cyber Security Delivery Specialist Job Location: Hyderabad Experience: 5 + years Responsibilities : Implement data classification and labelling to categorise and protect sensitive information using Microsoft Purview Define, design and implement data governance policies using Microsoft Purview Review policies, generate insights and ensure that data governance practices are effective prior to making recommendation for policy enforcement Support training of SecOps, GRC and Pilot users as required Collaborate with cross-functional teams within and outside of technology Provide guidance on data protection, privacy, and security best practices Stay up to date with the latest security trends, threats, and technologies to continuously improve the organisations security posture Development of project documentation and handover to operations teams Assist in the evaluation of solutions or security tools and technologies for projects assigned Experience: Minium of 5 years work experience in a Security Analyst/ Delivery role A minimum of 2 years of work experience delivering Cyber projects Experience implementing MS Purview from end to end (labelling, policy design, policy enforcement) Ability to think laterally and strategically with a solution focused approach Ability to deliver to scope, schedule and budget Experience managing own work and prioritising workload to meet deliverables Experience working with both technical and non-technical stakeholders An understanding of how data is protected at rest and in transit Knowledge of information security frameworks (NIST, ISO27001, PCI-DSS, SOC) Experience implementing or operating Password Management, API Observability, Honey Tokens or Application Whitelisting tools will be highly regarded About Softobiz: Innovation begins with like-minded people aiming to transform the world together. At Softobiz, we invite you to become a part of an organization that has been helping clients transform their business by fusing insights, creativity, and technology. With a team of 300+ technology enthusiasts, we have been trusted by leading enterprises around the globe for over 12+ years. At Softobiz, we foster a culture of equality, learning, collaboration, and creative freedom, empowering our employees to grow and excel in their careers. Our technical craftsmen are pioneers in the latest technologies like AI, machine learning, and product development. Why Should You Join Softobiz - Work with technical craftsmen who are pioneers in the latest technologies. - Access training sessions and skill-enhancement courses for personal and professional growth. - Be rewarded for exceptional performance and celebrate success through engaging parties. - Experience a culture that embraces diversity and creates an inclusive environment for all employees. For more information about our solutions and organization, visit www.softobiz.com , Follow us on LinkedIn , Twitter , and Facebook for more updates.
Posted 1 week ago
2.0 - 4.0 years
4 - 7 Lacs
Thiruvananthapuram
Work from Office
Description Job Title: Information Security Analyst/ Analyst Identity Governance and Compliance Department: Information Security Governance, Risk & Compliance (GRC) Experience: Level: 2 4 years Employment Type: Full-time Key Responsibilities: Manage the Identity Governance and compliance activities, including periodic User Access Reviews (UAR) and RBAC activities. Ensure IAM practices comply with internal policies and external regulatory requirements. Maintain and enhance identity governance policies, standards, and procedures. Provide subject matter expertise on Active Directory (AD), including group policies and access provisioning/deprovisioning. Align identity governance practices with frameworks such as PCI DSS, ISO 27001, NIST CSF, and COBIT. Engage with IT, HR, and business units to enforce least privilege principles and maintain accurate access records. Conduct regular training sessions for the SM team on security controls and client requirements. Coordinate SME involvement in quarterly meetings and training initiatives. Maintain and organize SharePoint and Jira spaces for audit readiness and evidence management. Participate in incident management, change control meetings, and cloud migration initiatives. Engage in SOC operations and threat tracking. Drive continuous improvement initiatives in identity governance and GRC processes. Lead the annual review of security information presentations in collaboration with Compliance. Required Qualifications: Bachelor s degree in Information Security, Computer Science, or a related field. 2 4 years of experience in Information Security, with a focus on Identity Governance and Compliance. Strong understanding of User Access Review (UAR) processes and tools. Experience with Active Directory (AD) and identity lifecycle management. Familiarity with regulatory and compliance frameworks: PCI DSS, ISO 27001, NIST, COBIT. Excellent analytical, documentation, and communication skills. Ability to work independently and collaboratively in a fast-paced environment. Preferred Qualifications: Relevant certifications such as CISSP, CISA, CISM, CRISC, or GIAC. Experience with IAM tools (e.g., SailPoint, Saviynt, Okta, Azure AD). Prior experience supporting internal or external audits. Knowledge of GRC tools and platforms. Understanding of legal and regulatory standards such as FERPA, CIS, and data protection laws. Knowledge of Cloud Identity (AWS or Azure Identity).
Posted 1 week ago
3.0 - 5.0 years
4 - 8 Lacs
Hyderabad
Work from Office
Job Description: We are seeking a proactive and detail-oriented Endpoint Security Engineer to manage and enhance our endpoint protection technologies. This role focuses on deploying, tuning, and monitoring Microsoft Defender products (such as Defender for Endpoint, Defender for Identity, Defender for O365 and Defender Antivirus ) with a strong emphasis on SCCM\Intune platform expertise to ensure comprehensive visibility, compliance, and rapid threat response. Key Responsibilities: Administer, monitor, and optimize Microsoft Defender suite deployments across the enterprise . Serve as an escalation point for complex endpoint and infrastructure-related incidents. Design and manage endpoint detection and response (XDR) policies using Defender for Endpoint. Develop threat-hunting hypotheses and implement new detection logic in Defender XDR. Provide mentorship and guidance to Tier 1/2 SOC analysts. Develop and maintain configuration baselines, health checks, and compliance reporting using Tanium. Investigate and remediate security alerts and endpoint incidents. Collaborate with SOC and IR teams for threat hunting, forensic analysis, and response automation. Document processes, configurations, and incident response procedures. Automate compliance and remediation workflows using PowerShell and Intune configuration profiles. Manage and monitor Microsoft Defender for Office 365 to protect users from phishing, malware, and other threats across Exchange, SharePoint, OneDrive, and Teams. Requirements: 3 5 years of experience in endpoint security or a related cybersecurity role. Deep knowledge of Microsoft Defender for Endpoint, Defender for Identity, and related Defender XDR tools. Strong experience with Intune platform. Experience with scripting (PowerShell,Python) for automation and remediation. Familiarity with SIEMs (e.g., Splunk, Sentinel) and EDR integrations. Strong analytical and troubleshooting skills.
Posted 1 week ago
5.0 - 7.0 years
18 - 20 Lacs
Thiruvananthapuram
Work from Office
Description Job Title: Information Security Lead / Lead Identity Governance and Compliance Department: Information Security Governance, Risk & Compliance (GRC) Experience: Level: 5 7 years Employment Type: Full-time Key Responsibilities: Lead and manage the Identity Governance and compliance activities, including periodic User Access Reviews (UAR) and RBAC activities. Ensure IAM practices comply with internal policies and external regulatory requirements. Maintain and enhance identity governance policies, standards, and procedures. Provide subject matter expertise on Active Directory (AD), including group policies and access provisioning/deprovisioning. Align identity governance practices with frameworks such as PCI DSS, ISO 27001, NIST CSF, and COBIT. Engage with IT, HR, and business units to enforce least privilege principles and maintain accurate access records. Conduct regular training sessions for the SM team on security controls and client requirements. Coordinate SME involvement in quarterly meetings and training initiatives. Maintain and organize SharePoint and Jira spaces for audit readiness and evidence management. Participate in incident management, change control meetings, and cloud migration initiatives. Engage in SOC operations and threat tracking. Drive continuous improvement initiatives in identity governance and GRC processes. Lead the annual review of security information presentations in collaboration with Compliance. Required Qualifications: Bachelor s degree in Information Security, Computer Science, or a related field. 5 7 years of experience in Information Security, with a focus on Identity Governance and Compliance. Strong understanding of User Access Review (UAR) processes and tools. Experience with Active Directory (AD) and identity lifecycle management. Familiarity with regulatory and compliance frameworks: PCI DSS, ISO 27001, NIST, COBIT. Excellent analytical, documentation, and communication skills. Ability to work independently and collaboratively in a fast-paced environment. Preferred Qualifications: Relevant certifications such as CISSP, CISA, CISM, CRISC, or GIAC. Experience with IAM tools (e.g., SailPoint, Saviynt, Okta, Azure AD). Prior experience supporting internal or external audits. Knowledge of GRC tools and platforms. Understanding of legal and regulatory standards such as FERPA, CIS, and data protection laws. Knowledge of Cloud Identity (AWS or Azure Identity).
Posted 1 week ago
5.0 - 10.0 years
14 - 19 Lacs
Bengaluru
Work from Office
Candidate will be responsible for building/maintaining highlyconfigurable and reusable IO Subsystems (Note: An IO Subsystem is alogic IP that processes the IO Pads/IO Ring information and requiredlogic to allow multiple on-chip peripherals to share the same IOs in aconfigurable manner) Job Description In your new role you will: Candidate will be responsible for building/maintaining highly configurable and reusable IO Subsystems (Note: An IO Subsystem is a logic IP that processes the IO Pads/IO Ring information and required logic to allow multiple on-chip peripherals to share the same IOs in a configurable manner) Candidate will be responsible for RTL design for integration of IO pads into SoC, building the required multiplexing logic and necessary power control signals integration. Strong fundamentals in DFT/Fault-grading and/or hands on experience. Sound & Practical Written and Verbal Communication Skills. Your Profile You are best equipped for this task if you have: Must have worked in ASIC Design flow, with ASIC experience of upto 5years. Must be strong in scripting using Perl/Python Must be familiar with RTL design for for driving decarbonization and digitalization. As a global leader in semiconductor solutions in power systems and IoT, Infineon enables game-changing solutions for green and efficient energy, clean and safe mobility, as well as smart and secure IoT. Together, we drive innovation and customer success, while caring for our people and empowering them to reach ambitious goals. Be a part of making life easier, safer and greener. Are you in We are on a journey to create the best Infineon for everyone. This means we embrace diversity and inclusion and welcome everyone for who they are. At Infineon, we offer a working environment characterized by trust, openness, respect and tolerance and are committed to give all applicants and employees equal opportunities. We base our recruiting decisions on the applicant s experience and skills. Learn more about our various contact channels. Please let your recruiter know if they need to pay special attention to something in order to enable your participation in the interview process. Click here for more information about Diversity & Inclusion at Infineon.
Posted 1 week ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough