Home
Jobs

2257 Soc Jobs - Page 8

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 6.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

About The Role : Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT

Posted 1 week ago

Apply

5.0 - 9.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails

Posted 1 week ago

Apply

5.0 - 10.0 years

9 - 13 Lacs

Bengaluru

Work from Office

Naukri logo

? Identify gaps and weaknesses on current alerting platforms and recommend improvements to ensure evolving capabilities. Identify gaps and weaknesses on Data Loss Prevention platforms. Continually review existing risk scoring models and adjust accordingly to ensure proper focus on significant security events and business needs. Administrate of DLP solution and liaising with GRC & CISO function to configure policies and work on reporting, monitor and respond to different alerts generated from the DLP solution. Demonstrate a good understanding of incident response process and event escalations, repone to DLPs escalations reported by incident response team. Share recommendations to further identify sensitive data and strengthen security controls. Collaborate & partner with legal, compliance team to support customer privacy initiative and continue compliance with different regulations, to mature company data life cycle management with focus on data security. Ability to independently research and solve technical issues and Demonstrated integrity in a professional environment.

Posted 1 week ago

Apply

3.0 - 5.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

About The Role Primary Skill (Technical Skill) Application Packaging Secondary Skill Windows, MECM, Intune ? Experience Level 6 –8 Years (B3) 3 - 5 Years (B2) Location of Posting Chennai Rates Including Mark up - 80 K/M - 90K/M ? Candidate should have the experience of customer facing role Primary Knowledge- Hands-on experience in Creation of MSI, MSIX, Intunewin packages using Flexera Admin Studio/ Install-shield, Microsoft Tools like Win32 Content Prep & MSIX Packaging tool Experience in creating Connection groups and Runvirtual keys Basic to Intermediate know-how and experience towards Scripting – VB script / PowerShell scripting Knowledge of Operating Systems – Win 10, Win11 Experience with SCCM (Microsoft Endpoint Configuration Manager) ? Support the Service & Product Manager across several technical domains Contribute expertise to the management of existing and new IT products and services Define workarounds for known errors and initiate process improvements Strong understanding of performance analysis for Applications packaging process Experience in Testing and implementing Application Packages Establish and implement policies, procedures, and technologies. Familiarity with support processes, including Incident, Problem, Request, Event, and Change Management. ? Mandatory Skills: Application Packaging - Windows. Experience3-5 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 week ago

Apply

2.0 - 6.0 years

4 - 8 Lacs

Hyderabad

Work from Office

Naukri logo

About The Role : Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT

Posted 1 week ago

Apply

2.0 - 6.0 years

4 - 8 Lacs

Hyderabad

Work from Office

Naukri logo

Wipro Limited (NYSE:WIT, BSE:507685, NSE:WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role : Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 week ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

Hyderabad

Work from Office

Naukri logo

? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails

Posted 1 week ago

Apply

2.0 - 6.0 years

5 - 9 Lacs

Noida

Work from Office

Naukri logo

? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails

Posted 1 week ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Chennai

Work from Office

Naukri logo

At Mr. Cooper Group, You Make the Dream Possible. Our purpose is simple: Keeping the dream of homeownership alive. As a Mr. Cooper Group team member, you play a big role in making that dream possible. Around here, we know our roles and work together, volunteer to make a difference, and challenge the status quo when needed. Everything we do is in the care and service of our teammates and our customers. Join us and make the dream of home ownership possible! Role Responsibilities: 65% - Serve as HR technical point of contact for moderate to complex integration projects and production support enhancements. 15% - Support SOX, SOC & Information Security infrastructure optimization & support. 10% - Identify and deploy process improvements & automation to support an improved PEX and data quality. 10% - Responsible for working ticket & task queues as L3 support. Additional Duties: May act as a liaison between internal customers and external vendors Maintains and tracks all issues/work using standard Issue Tracking Processes Other duties as assigned Core Requirements: Minimum of a 2 - 4 year degree required: Information Systems or Computer Science concentration or equivalent Minimum of 5+ years of experience in Interface/Integration design & ETL development and 2 - 4 years Workday integration experience (i.e. EIB, Connector, Studio) Knowledge of relational databases, structured query language, enterprise resource planning systems, report writing & design Working knowledge and/or experience with Workday Prism and Workday HCM is a plus Working knowledge and/or experiences with SAP CallidusCloud is a plus Good written, verbal, interpersonal, presentation skills Ability to communicate among technical and non-technical employees, and process orientation skills A customer driven approach and good customer management skills Ability to prioritize work, be highly organized, and work independently Ability to identify problems and apply creative solutions Ability to manage many tasks while maintaining high degrees of attention to detail, accuracy and poise under pressure Must have collaborative work style Basic Proficiency in Microsoft Excel & PowerPoint Must be able to maintain strictest confidence Job Requisition ID: 023765 Job Category: Human Resources Primary Location City: Chennai Primary Location Region: Tamil Nadu Primary Location Postal Code: 600089 Primary Location Country: India Additional Posting Location(s):

Posted 1 week ago

Apply

2.0 - 7.0 years

4 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Network Security Engineer - Staffing & HR Services Job Title: Network Security Engineer Job Summary: We are seeking a dynamic and experienced Network Security Engineer to join SCLERAVDMS Private Limited. The ideal candidate will lead the implementation and management of our network security infrastructure, ensuring the alignment of security strategies with business objectives. This role requires a strategic thinker with strong technical expertise, deep knowledge of network security best practices, and the ability to proactively identify and address potential vulnerabilities. The Network Security Engineer will be responsible for safeguarding the organization s data and IT systems while fostering a secure, efficient, and compliant environment. Key Responsibilities: Design, implement, and maintain network security systems, ensuring the protection of company systems, data, and networks. Handle and manage SOC, ISO, or HIPAA audits to ensure compliance with industry standards and regulatory requirements. Conduct regular network security assessments, vulnerability assessments, and penetration testing. Assist with internal and external audits, providing necessary documentation and evidence for compliance. Collaborate with IT and security teams to identify and resolve network security vulnerabilities. Monitor and respond to security incidents, ensuring quick resolution and minimal impact on operations. Develop and enforce network security policies, procedures, and best practices. Stay up to date with emerging network security threats and industry trends, implementing appropriate solutions. Maintain detailed records of security incidents and audits for reporting and compliance purposes. Qualifications: Bachelor s degree in Computer Science, Information Technology, Cybersecurity, or a related field. Minimum of 2 years of experience in a network security role with experience in SOC Audits, ISO Audits, or HIPAA Audits. Strong understanding of network protocols, security technologies, and network defense strategies. Hands-on experience with security tools such as firewalls, intrusion detection systems, and encryption technologies. Knowledge of regulatory standards including SOC 1/2, ISO 27001, HIPAA, and NIST frameworks. Familiarity with common security frameworks, risk management, and incident response procedures. Ability to analyze and resolve complex security issues in a timely manner. Strong communication and documentation skills. Relevant certifications (e.g., CISSP, CISM, CISA, or similar) are a plus.

Posted 1 week ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

Scopely is looking for a Senior Security Operations Center Engineer to join our Information Technology team in Bangalore on a hybrid basis. At Scopely, we care deeply about what we do and want to inspire play, every day - whether in our work environments alongside our talented colleagues, or through our deep connections with our communities of players. We are a global team of game lovers who are developing, publishing and innovating the mobile games industry, connecting millions of people around the world daily. What You Will Do You will be part of the Security Operations & Cloud Security team supporting all security operations at Scopely and will be at the forefront of identifying and reacting to new threats, risks and vulnerabilities that affect the industry. This role also requires collaboration and engagement with game teams, information technology, business partners, and vendors. You should enjoy working with an international team, embrace a fast-paced environment, and champion teamwork. Related activities would include: Support the execution of Scopelys security operations strategy, including daily monitoring and analysis of security events Manage and triage security alerts, reduce false positives, and continuously fine-tune detection rules, playbooks, and use cases Participate in the coordination, escalation, and resolution of security incidents in collaboration with internal stakeholders and external partners Perform security investigations from escalated alerts, threat hunting, or reports Perform digital forensics applied to incident response, to support case investigations Conduct network scans to identify vulnerabilities across internal and perimeter environments, and monitor for signs of exploitation or misconfiguration Contribute to vulnerability and patch management efforts by tracking open issues, validating remediations, and supporting mitigation activities Participate in proof-of-concept (PoC), proof-of-value (PoV), and project initiatives aimed at enhancing SOC tools, workflows, and detection capabilities Maintain SOC tools and platforms in an up-to-date and operationally ready state Document security investigations and incidents, including lessons learned / post-mortem analysis, and team processes. Contribute to the development and refinement of incident response playbooks and knowledge base articles Assist with the creation and delivery of security operations performance reports using predefined KPIs, including both operational metrics and risk indicators Foster strong relationships with business units, development teams, and external security vendors to align security operations with broader organizational goals Provide on-call support as part of a rotating schedule to ensure 24/7 incident readiness What We re Looking For Bachelor s degree in Information Security, Computer Science, or a related field. Equivalent practical experience will also be considered 5+ years of experience in a security operations or similar role, with proven exposure to incident detection, investigation, and response Strong understanding of core security topics, including incident response, threat hunting, threat intelligence, malware analysis, advanced persistent threats (APT), forensic analysis, and vulnerability management Solid knowledge of security frameworks and standards such as NIST Cybersecurity Framework (CSF), MITRE ATT&CK, Cyber Kill Chain, and ISO/IEC 27001/27002, as well as familiarity with relevant international regulations and compliance requirements Proficiency with Security Information and Event Management (SIEM) platforms, including experience deploying, configuring, and optimizing tools Hands-on experience with Managed Detection and Response (MDR), Endpoint Detection and Response (EDR), and Cloud Security Posture Management (CSPM) tools Experience working with open-source and commercial Security Orchestration, Automation, and Response (SOAR) platforms Familiarity with network and vulnerability scanning tools Strong practical experience in multi-cloud environments, including cloud-native security tooling Strong collaboration skills and ability to work effectively within a team environment; capable of following procedures and escalating issues appropriately Excellent verbal and written communication skills with the ability to convey complex security topics to both technical and non-technical audiences Security certifications such as CISSP, CEH, GSOC, GCIH, or equivalent are highly desirable. Bonus Points Development and/or scripting experience (e.g., Python, Bash, PowerShell) At Scopely, we create games for everyone - and want to ensure that the people behind our games reflect that! We are committed to creating a diverse, supportive work environment where everyone is treated with respect. We are committed to providing equal employment opportunities and welcome individuals from all backgrounds to join us & embrace the adventure! About Us Scopely is a global interactive entertainment and mobile-first video game company, home to many top, award-winning experiences such as "MONOPOLY GO!," Star Trek Fleet Command, Stumble Guys, MARVEL Strike Force, and Yahtzee With Buddies, among others. Scopely creates, publishes, and live-operates immersive games that empower a directed-by-consumer experience across multiple platforms--from mobile, web, PC and beyond. Founded in 2011, Scopely is fueled by a world-class team and a proprietary technology platform Playgami that supports one of the most diversified portfolios in the games industry. Recognized multiple times as one of Fast Company s World s Most Innovative Companies, Scopely is a multi-billion-dollar business due to its ability to create long-lasting game experiences that players enjoy for years. Scopely has global operations in more than a dozen markets across Asia, EMEA, and North America, and is home to many internal game development teams, referred to as Scopely Studios, with additional game studio partners across four continents. Scopely was acquired by Savvy Games Group in July 2023 for $4.9 billion, and is now an independent subsidiary of Savvy. For more information on Scopely, visit: scopely.com Notice to candidates: Scopely, Inc and its affiliates will never request payment or ask for financial information as a condition for applying to a position or receiving an offer of employment. All official Scopely, Inc. recruiters only use email domains that end with @scopely.com. Our official website is www.scopely.com. Please only apply to positions posted on our official website and ensure the recruiter only communicates via the official email domain. Should you have any questions or encounter any fraudulent requests/emails/websites, please immediately contact recruiting@scopely.com . Our job applicant privacy policies are available here: California Privacy Notice and EEA/UK Privacy Notice .

Posted 1 week ago

Apply

6.0 - 10.0 years

8 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

6 - 10 years of work experience Go NodeJS AWS Terraform PostgreSQL Kafka TypeScript Datadog Company Overview Millions of families juggle elder-care across continents. 2care.ai turns that anxiety into confident, proactive care with an AI Health Voice Agent, WhatsApp-first workflows, and a unified medical-data platform. Founded by founders that have scaled SaaS globally to $80M, built consumer product which was acquired for $500M, and ex-AWS, managed operations, we ve just secured backing from Silicon-Valley & Indian health-tech angels to go after the $430 B global market. Build in India, ship to the world starting USA The Impact You ll Own As a Principal Engineer and Founding Engineering Leader, you will: Architect the future: Design the end-to-end backend infrastructure, including microservices, data pipelines, event buses, and observability, to enable real-time interpretation of thousands of biomarkers. Build for trust & compliance: Lead the implementation of HIPAA/GDPR-ready security measures, role-based access, audit trails, encryption, and FHIR-compatible APIs. Scale real-time care: Create resilient APIs unifying WhatsApp, voice, and web dashboards to ensure 99.99% uptime. Own data strategy: Shape our multi-tenant Postgres + time-series + vector-DB stack for longitudinal health graphs, AI embeddings, and analytics. Lead & mentor: Hire the first backend squad, establish engineering best practices (IaC, CI/CD, trunk-based dev, TDD), and cultivate a culture of autonomy, craftsmanship, and user focus. Partner with founders & doctors: Translate clinical workflows into elegant, safe services. Our Current Stack NextJs(TypeScript) MySql (Planetscale) Cloudflare(R2,Queues, Workers) Redis AI Integration with Claude, OpenAI and Gemini Whatsapp Business Integration Vercel Github with actions for CI/CD Future AI-agent-first stack could look like TypeScript-everywhere + Next.js foundation for DX consistency. Add a vector store (Pinecone / Weaviate) to power retrieval-augmented agents event streaming (Cloudflare Queues at edge) so agents run in parallel and stay decoupled Package each medical agent as an isolated TypeScript service (AWS Lambda / Workers), orchestrated by a light workflow engine (LangGraph-style) Expand Redis into a multi-tier cache (metadata, embeddings, feature flags) & OpenTelemetry tracing Bake in HIPAA/SOC 2 guardrails at middleware level (PII redaction, audit logs) What Success Looks Like in 12 Months Achieve zero-to-one PMF with backend reliably supporting 100x traffic with Pass HIPAA readiness audits to unlock US provider integrations. Hire, mentor, and enable a team of 5 high-bar engineers shipping weekly value. What You Bring 7 + years building distributed systems at scale, ideally in health-tech, healthcare, or other regulated data domains. Expertise in two of Go, TypeScript-Node, Python, plus experience with REST, gRPC/GraphQL, and event-driven patterns (Kafka, SNS/SQS, NATS ). Cloud expertise on AWS (EKS / Fargate / Lambda / RDS / DynamoDB) with IaC (Terraform / CDK / Pulumi) and CI/CD (GitHub Actions, Argo). Security-first mindset: Familiarity with OAuth2/OIDC, JWT, KMS, audit trails, SOC 2 / ISO 27001. *** Healthcare Tech experience a BIG plus. ** Startup DNA : bias for action, comfort with ambiguity, obsession with user outcomes. Bonus: experience with LLM/ML inference, stream processing, or healthcare platforms.

Posted 1 week ago

Apply

3.0 - 8.0 years

3 - 7 Lacs

Chennai

Work from Office

Naukri logo

We are looking for a content development engineer or L2 level SOC SIEM engineer with hands-on experience in developing new rules, use cases based on various log sources including Cloud Security log sources and integrating various log sources with SIEM Platform. Roles and Responsibilities: Creating and implementing new threat detection content, rules and use cases to deploy in SIEM platform with different data sets like Proxy, VPN, Firewall, DLP, etc. Assisting with process development and process improvement for Security Operations to include creation/modification of SOPs, Playbooks, and Work instructions. Developing custom content based on threat intelligence and threat hunting results. Identifying gaps in the existing security controls and develop/propose new security controls. SIEM Engineering and knowledge of integrating various log sources with any SIEM platform. Custom parsing of logs being ingested into the SIEM Platform 3+ years of experience working in the field of Content development and experience in delivering and/or building content on any of the SIEM tools like Splunk/Arc-sight /QRadar/Nitro ESM/etc. Deep understanding of MITRE ATT&CK Framework. Experience in SOC Incident analysis with an exposure to information security technologies such as Firewall, VPN, Intrusion detection tools, Malware tools, Authentication tools, endpoint technologies, EDR and cloud security tools. Good understanding of networking concepts. Experience interpreting, searching, and manipulating data within enterprise logging solutions (e.g. SIEM, IT Service Management (ITSM) tools, workflow, and automation) In depth knowledge of security data logs and an ability to create new content on advanced security threats on a need basis as per Threat Intelligence. Ability to identify gaps in the existing security controls. Good experience in writing queries/rules/use cases for security analytics (ELK, Splunk or any other SIEM platform) and deployment of content. Experience on EDR tools like Crowd-strike and good understanding on TTPs like Process Injection. Excellent communication, listening & facilitation skills Ability to demonstrate an investigative mindset. Excellent problem-solving skills. Preferred : Understanding of MITRE ATT&CK framework. Demonstrable experience in Use case /rule creation on any SIEM Platform. Chronicle Backstory/ YARA / Crowds trike rules is a plus. Location: Pan India

Posted 1 week ago

Apply

9.0 - 13.0 years

25 - 30 Lacs

Bengaluru

Work from Office

Naukri logo

Member of Technical Staff - ABL (Memory) FW Engineer THE ROLE: Being part of the elite Embedded Firmware team, ABL Firmware engineer is responsible for enabling key memory technologies (DDR4/DDR5/NVDIMM) of different DIMM types (UDIMM / SODIMM / RDIMM / LRDIMM / LPDDR) and speed across AMD Embedded SoC products. AMD memory firmware provides best of features to customers including flexibility and RAS support. ABL engineer will enable and maintain the firmware at best of its quality addressing all enhancements, fixes and maintaining releases on time. The role also involves prototyping, designing and implementing cutting edge features for top tier markets. THE PERSON: Person in this role must be self-driven with high ownership. Being proactive is key in this key role given the large number of program impact. The role also demands good team and collaborative working within & across groups in AMD. The role provides high visibility and opportunities to present solution across verticals & horizontals where good articulation skill is much appreciated. KEY RESPONSIBILITIES: Design for key features Proto of new opportunities and enhancements Key memory technology investigations Memory technology enablement Implementation Defect fixes Reviews Integration and firmware release management PREFERRED EXPERIENCE: 9-13 years experience with minimum 5 years experience on relevant memory technologies Experience with memory recognition and configuration code Experience with hardware debug tools Good problem solving, analysis and debugging skills Good understanding of DDR4, DDR5, NVDIMM Good understanding of different DIMM types (UDIMM / SODIMM / RDIMM / LRDIMM / LPDDR) Good understanding of UMC features like ECC, SME, SEV, RAS etc Understanding of different vendor implementations and memory timing difference is a big plus Knowledge of platform BIOS and UEFI/Coreboot is a big plus Scripting knowledge is a plus ACADEMIC CREDENTIALS: Bachelor s in engineering (Computer Science / Electronics) Masters in any computer field is a plus LOCATION: Bengaluru #LI-SK4 Benefits offered are described: AMD benefits at a glance .

Posted 1 week ago

Apply

0.0 - 2.0 years

5 - 8 Lacs

Chennai

Work from Office

Naukri logo

User provisioning and management, upgrade/patch, monitoring, problem resolution, and configuration management. Execute all provided Standard Operating Procedures (SOP) and policies. Modify permissions and access control lists. Perform routine management of backup and recovery services; file and disk management; and virus protection. Maintain consistent operation of multi-user systems, including coordination with internal and external stakeholders. Engage with internal and external parties (e.g., ISPs, vendors) to troubleshoot and resolve issues, escalating as necessary to ensure timely resolution. Perform design, implementation, and administration activities for complex power generation computing environments on networks, communications, and infrastructure. Evaluate host, system, and network configurations for newly acquired sites and make recommendations for improvement. Review security, antivirus, traffic, and event logs. Adhere to cybersecurity and information security procedures, guidelines, and policies. Evaluate vendor products, services, and suggestions. Perform hardware and software upgrades. Perform routine management of backup and recovery services; file and disk management; and virus protection. Other Report project status for all recurring and non-recurring efforts as required. Attend staff and client meetings as required. Availability for 24-hour on call duty to meet customer requirements. Availability to make occasional, planned shifts in work hours to accommodate efforts that can only be performed after generation hours. Develop and document technical processes and procedures as needed. Ensure that required tasks are completed or directed to others as necessary. Effective written and oral communication at all organizational levels internally and with external customers. Analyze known and ad-hoc requirements to determine an efficient schedule, workflow, and process to complete. Provide Subject Matter Expertise in the evolution of IT/OT framework programs developed for our customers, which include product selection, infrastructure design, and security policies. Execute SOPs. Preferred Experience Experience in NERC CIP-regulated environments is preferred. Experience in compliance programs or standard-driven environments (e.g., PCI-DSS, NIST, ISO-27001) SOC, NOC, or other operation center experience Work experience in at least one of the following areas: Network and infrastructure design, deployment, or maintenance. Power generation, especially renewable energy. Required Qualification & Education A university technical degree or minimum 0-2 years of relevant IT/OT professional experience. Direct or indirect service experience and/or experience providing remote support. Ability to read electrical, network, infrastructure, and cabling drawings. All applicants must have prior professional IT/OT systems management experience and knowledge in at least two of the following fields: Server hardware and OS management. Networking and infrastructure design, implementation, and management. Cybersecurity, including Next-Generation Firewall configuration and management. Remote infrastructure and network support. Data storage and recovery. Work experience in at least one of the following focus areas is required: Tier 2 or Tier 3 IT help desk support. IT infrastructure design or support. Computer network design or support. Host hardening or security monitoring (Cybersecurity). Skills & Competencies Ethical, responsible, and reliable. Self-motivated. Desire to learn and share newly acquired knowledge with colleagues. Remain cool under pressure in a fast-changing environment. Navigate business and technical challenges with ease. Effective oral and written communication with peers, external customers, and direct supervisors. Exceptional organizational skills required. Strong team collaborator. Independently make decisions and solve problems. Accurately remember and clearly communicate detailed technical information. Able to work in an electrical environment. This may have been achieved through formal training, previous work experience, or the ability to demonstrate electrical safety skills. A valid driver s license is required. NGFW configuration, maintenance, and administration. Microsoft Windows Server support. Effective written and oral communication at all organizational levels, including engineers, end-users, and external customers. Additional Notes This position requires participation in the company s 24/7 on call rotation. Occasionally required to lift and move up to 50 pounds. Must be willing and able to travel throughout North America, or internationally as required.

Posted 1 week ago

Apply

7.0 - 12.0 years

15 - 20 Lacs

Hyderabad

Work from Office

Naukri logo

Job Overview We are seeking a strategic and hands-on Manager of Business Intelligence (BI) and Data Governance to lead the development and execution of our enterprise-wide data strategy. This role will oversee data governance frameworks, manage modern BI platforms, and ensure the integrity, availability, and usability of business-critical data. Reporting into senior leadership, this role plays a pivotal part in shaping data-informed decision-making across functions including Finance, Revenue Operations, Product, and more. The ideal candidate is a technically proficient and people-oriented leader with a deep understanding of data governance, cloud data architecture, and SaaS KPIs. They will drive stakeholder engagement, enablement, and adoption of data tools and insights, with a focus on building scalable, trusted, and observable data systems. About Us When you join iCIMS, you join the team helping global companies transform business and the world through the power of talent. Our customers do amazing things: design rocket ships, create vaccines, deliver consumer goods globally, overnight, with a smile. As the Talent Cloud company, we empower these organizations to attract, engage, hire, and advance the right talent. We re passionate about helping companies build a diverse, winning workforce and about building our home team. Were dedicated to fostering an inclusive, purpose-driven, and innovative work environment where everyone belongs. Responsibilities Data Governance Leadership: Establish and maintain a comprehensive data governance framework that includes data quality standards, ownership models, data stewardship processes, and compliance alignment with regulations such as GDPR and SOC 2. Enterprise Data Architecture: Oversee data orchestration across Salesforce (SFDC), cloud-based data warehouses (e.g., Databricks, Snowflake, or equivalent), and internal systems. Cross collaborate with data engineering team for the development and optimization of ETL pipelines to ensure data reliability and performance at scale. Team Management & Enablement: Lead and mentor a team of BI analysts, and governance specialists. Foster a culture of collaboration, continuous learning, and stakeholder enablement to increase data adoption across the organization. BI Strategy & Tools Management: Own the BI toolset (with a strong emphasis on Tableau), and define standards for scalable dashboard design, self-service reporting, and analytics enablement. Evaluate and incorporate additional platforms (e.g., Power BI, Looker) as needed. Stakeholder Engagement & Strategic Alignment: Partner with leaders in Finance, RevOps, Product, and other departments to align reporting and data strategy with business objectives. Translate business needs into scalable reporting solutions and drive enterprise-wide adoption through clear communication and training. Data Quality & Observability: Implement data quality monitoring, lineage tracking, and observability tools to proactively detect issues and ensure data reliability and trustworthiness. Documentation & Transparency: Create and maintain robust documentation for data processes, pipeline architecture, code repositories (via GitHub), and business definitions to support transparency and auditability for technical and non-technical users. Executive-Level Reporting & Insight: Design and maintain strategic dashboards that surface key SaaS performance indicators to senior leadership and the board. Deliver actionable insights to support company-wide strategic decisions. Continuous Improvement & Innovation: Stay current with trends in data governance, BI technologies, and AI. Proactively recommend and implement enhancements to tools, processes, and governance maturity. Qualifications Data Governance Expertise: Proven experience implementing data governance frameworks, compliance standards, and ownership models across cross-functional teams. SQL Expertise: Advanced SQL skills with a strong background in ETL/data pipeline development across systems like Salesforce and enterprise data warehouses. BI Tools Mastery: Expertise in Tableau for developing reports and dashboards. Experience driving adoption of BI best practices across a diverse user base. Salesforce Data Proficiency: Deep understanding of SFDC data structure, reporting, and integration with downstream systems. Version Control & Documentation: Hands-on experience with GitHub and best practices in code versioning and documentation of data pipelines. Leadership & Stakeholder Communication: 3+ years of people management experience with a track record of team development and stakeholder engagement. Analytics Experience: 8+ years of experience in analytics roles, working with large datasets to derive insights and support executive-level decision-making. Programming Knowledge: Proficiency in Python for automation, data manipulation, and integration tasks. SaaS Environment Acumen: Deep understanding of SaaS metrics, business models, and executive reporting needs. Cross-functional Collaboration: Demonstrated success in partnering with teams like Finance, Product, and RevOps to meet enterprise reporting and insight goals. EEO Statement iCIMS is a place where everyone belongs. We celebrate diversity and are committed to creating an inclusive environment for all employees. Our approach helps us to build a winning team that represents a variety of backgrounds, perspectives, and abilities. So, regardless of how your diversity expresses itself, you can find a home here at iCIMS.

Posted 1 week ago

Apply

5.0 - 10.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

The Opportunity Were looking for the Wavemakers of tomorrow. Design Engineer - SoC Boot, Power Management and Security Were looking for the Wavemakers of tomorrow. Alphawave Semi enables tomorrow s future by accelerating the critical data communication at the heart of our digital world - from seamless video streaming to AI to the metaverse and much more. Our technology powers product innovation in the most data-demanding industries today, including data centers, networking, storage, artificial intelligence, 5G wireless infrastructure, and autonomous vehicles. Customers partner with us for mission-critical data communication, our innovative technologies, and our proven track record. Together, we enable the next generation of digital technology. Why Join Us? Opportunity to work on cutting-edge ARM-based SoC designs. Work with a team in a high-impact, fast-paced environment. Competitive compensation and career growth opportunities. Work alongside some of the best minds in the semiconductor industry. What Youll Do Leading design for SoC Subsystem targeted for Boot, Security, power management, and low speed peripherals using Arm CPU Core in an inclusive team environment Architecting, Planning Design activities at subsystem level Demonstrate expertise in boot, security and low power multi core Arm CPU based SoC. Collaborate with the design verification team to debug. Demonstrate expertise knowledge in design of SoC Boot, Security that includes RoT, security components at SoC level. Integration and support for slow speed peripherals such as I2C, xSPI, eMMC, UART, JTAG, GPIOs, Debugger, etc. Support Emulation and FPGA teams Low power methodology that includes multi power domain, multi-voltage domain, DVFS Define implementation strategy for Power-Performance metric for SoC with Architects What Youll Need Bachelors or Masters degree in Computer Science, Electrical Engineering, or a related field. This role requires a minimum of 15+ years of ASIC Micro-architecture and RTL design experience. Proficiency in System Verilog, VHDL, Verilog, C. Proficiency with ARM-specific System Management design Strong background in digital design, RTL coding (Verilog/VHDL), and ASIC/FPGA debug methodologies Proven experience in SOC design Deep understanding of hardware design, verification, and post-silicon validation It Would Be Amazing If You Had Experience in multi-core, multi-voltage, multi-power domain debug design micro-architecture and RTL design Experience in designing SoC with slow speed peripherals such as I2C, SPI, eMMC, UART, GPIOs, JTAG/SW. Experience with boot flow and SoC security implementation using Arm components Supporting and bringing up FPGA, Emulation based systems targeting PCIe Experience working across multiple chiplets in large-scale SOCs Hands-on SoC bring up experience in a lab environment We have a flexible work environment to support and help employees thrive in personal and professional capacities As part of our commitment to the well-being and satisfaction of our employees, we have designed a comprehensive benefits package that includes: Competitive Compensation Package Restricted Stock Units (RSUs) Provisions to pursue advanced education from Premium Institute, eLearning content providers Medical Insurance and a cohort of Wellness Benefits Educational Assistance Advance Loan Assistance Office lunch & Snacks Facility Equal Employment Opportunity Statement Alphawave Semi is an equal opportunity employer, welcoming all applicants regardless of age, gender, race, disability, or other protected characteristics. We value diversity and provide accommodations during the recruitment process.

Posted 1 week ago

Apply

8.0 - 10.0 years

20 - 25 Lacs

Mumbai

Work from Office

Naukri logo

Position will be responsible for QA function. Develop, implement and maintain the Quality Management System (QMS) at Scitara. Perform audits (internal and vendor) to ensure compliance to organizational procedures, customer and regulatory requirements and establish the training function within Scitara. Key Responsibilities Perform audits (internal and vendor) to ensure compliance to organizational procedures, customer and regulatory requirements. Responsible for authoring, reviewing and approving Standard Operating Procedures, Work Instructions, Policies, Manuals and Guidance documents for Scitara. Represent Scitara in customer audits, regulatory inspections and certification audits (ISO 27001 and SOC II Type 2). Responsible to ensure education and awareness about audit / inspection readiness in the organization. Impart training on SOPs and regulations. Manage CAPAs and deviations at an organizational level. Ensure that software systems meet regulatory requirements (e.g., 21 CFR Part 11, EU Annex 11, GAMP 5). Provide QA oversight for all phases of validation (planning, testing, deployment, and change control). Review and approve validation deliverables (e.g., Validation Plan, Test Plan, Test Scripts, Traceability Matrix, Validation Summary Report). Implementing the data privacy policies and associated processes in Scitara across functional units. Bachelor s or Master s degree in appropriate field of study. IT CSV QA candidate with 08-10 years experience in QA, IT and Computer System validation with some background of Software Development. Expertise in validation principles and validation types, software development best practices, and quality management systems used in the FDA/MHRA/EMA regulated environments is required. Preferably, candidates who have worked / supported Pharma / Life Sciences companies. Desired Skills Knowledge and understanding of GxPs and other governing regulations, both local and international. Understanding of quality systems processes and their implementation.

Posted 1 week ago

Apply

1.0 - 4.0 years

3 - 7 Lacs

Bengaluru

Work from Office

Naukri logo

Were Celonis, the global leader in Process Mining technology and one of the worlds fastest-growing SaaS firms. We believe there is a massive opportunity to unlock productivity by placing data and intelligence at the core of business processes - and for that, we need you to join us. The Team: As part of the Information Security Organization, you will be working closely with different departments for their information security compliance. This role will be part of the new and growing Compliance Engineering function . The Information Security team plays a critical role in ensuring Celoniss technology and information assets are appropriately guarded from external and internal threats. The Security GRC Department youll be joining is responsible for maintaining existing security attestations at Celonis globally, balancing risk with appropriate controls and assessing control effectiveness. The Role: This isnt a typical compliance role. It is a technical, hands-on position within our GRC organization , at the critical interface between business operations and technology . Here, you can be a data analyst , an engineer, an auditor, and a builder, using leading technology to design, create, and run automated solutions that test our security controls. In addition to that your analytical skills will contribute to our overall security process intelligence. You will get hands-on experience with our own Celonis platform, modern GRC (Governance, Risk, and Compliance) tools, and low-code automation. The work you ll do: Design and build assets to test and continuously monitor the effectiveness of our internal security controls including continuous evidence collection Rigorously test and validate the data and logic within your solutions to ensure accuracy, completeness, and reliability. Participate in and support internal as well as external security compliance audits, applying your technical understanding as well as business acumen to assess control design and effectiveness. Develop and manage insights to measure program effectiveness. This includes metrics for compliance and offers the opportunity to support broader security performance and risk management analytics. Work with technical and non-technical teams across Celonis to translate security requirements into automated tests and operational workflows. The qualifications you need: Academic background in Computer Science, Engineering, Information Systems, Physics, Mathematics or a related field, or equivalent work experience. You thrive on big challenges, can anticipate and adapt to changes in direction, and are driven to continuously improve the solution. A Builders Mindset: You have foundational experience with data integration and analyzing data using SQL, Python, or similar languages in a database-like environment. Strong Problem-Solving Skills: You are a self-starter who can troubleshoot issues independently and enjoys tackling open-ended challenges. Excellent Communication Skills: You can clearly articulate and right-size complex technical issues in English to both technical and non-technical people. This role requires working in shifts aligned with Central European Time (CET) to collaborate effectively with our global teams. Preferred Qualifications: A strong interest in or foundational knowledge of Process Mining, Continuous Controls Monitoring, Evidence Collection, GRC platforms, and IT Auditing. Knowledge of cloud technologies from different cloud service models and security frameworks ( ISO 27001, SOC 2, NIST etc.) Demonstrated knowledge of technology risks, infrastructure, and information security princip What Celonis Can Offer You: Pioneer Innovation: Work with the leading, award-winning process mining technology, shaping the future of business. Accelerate Your Growth: Benefit from clear career paths, internal mobility, a dedicated learning program, and mentorship opportunities. Receive Exceptional Benefits: Including generous PTO, hybrid working options, company equity (RSUs), comprehensive benefits, extensive parental leave, dedicated volunteer days, and much more . Prioritize Your Well-being: Access to resources such as gym subsidies, counseling, and well-being programs. Connect and Belong: Find community and support through dedicated inclusion and belonging programs. Make Meaningful Impact: Be part of a company driven by strong values that guide everything we do: Live for Customer Value, The Best Team Wins, We Own It, and Earth Is Our Future. Collaborate Globally: Join a dynamic, international team of talented individuals. Empowered Environment: Contribute your ideas in an open culture with autonomous teams. About Us: Celonis makes processes work for people, companies and the planet. The Celonis Process Intelligence Platform uses industry-leading process mining and AI technology and augments it with business context to give customers a living digital twin of their business operation. It s system-agnostic and without bias, and provides everyone with a common language for understanding and improving businesses. Celonis enables its customers to continuously realize significant value across the top, bottom, and green line. Celonis is headquartered in Munich, Germany, and New York City, USA, with more than 20 offices worldwide. Get familiar with the Celonis Process Intelligence Platform by watching this video . Celonis Inclusion Statement: At Celonis, we believe our people make us who we are and that The Best Team Wins . We know that the best teams are made up of people who bring different perspectives to the table. And when everyone feels included, able to speak up and knows their voice is heard - thats when creativity and innovation happen. Your Privacy: Any information you submit to Celonis as part of your application will be processed in accordance with Celonis Accessibility and Candidate Notices By submitting this application, you confirm that you agree to the storing and processing of your personal data by Celonis as described in our Privacy Notice for the Application and Hiring Process . Please be aware of common job offer scams, impersonators and frauds. Learn more here .

Posted 1 week ago

Apply

4.0 - 7.0 years

9 - 10 Lacs

Pune

Work from Office

Naukri logo

Role: SOC Analyst Location: Kharadi, Pune Life Unlimited. At Smith+Nephew, we design and manufacture technology that takes the limits off living! The Security Analyst works on the detection and response for potential security incidents on the Smith & Nephew network, systems, and applications. This includes technical analysis and incident management, communications, and reporting. The role works with the Global SOC Manager. The work includes partnering closely with other functions within Information Security, with outsourced tier 1 SOC functions, with the wider IT team including Service Desk, as well as with HR, Legal, Procurement, and other functions. The role interacts with end users and technical resolver teams within Smith & Nephew as well as outsourced suppliers. The working hours are Monday to Friday (11AM - 8PM IST). What will you be doing? Complete alert and incident response activities following standard runbooks and processes, with work to include the initial triage and analysis, recording of the incident with all relevant details to high standards, and documenting all containment and response actions. Uses Smith+Nephew technology platforms and security tools to conduct investigations such as threat hunting or other proactive investigations outside the incident process. Write comprehensive reports including assessment-based findings, outcomes, and propositions for enhancements such as new detection plays, new runbooks or playbooks, process improvements, or tuning detection rules. Mentoring and coaching other team members, sharing skills and experience to enable higher levels of performance. Provide technical domain expertise to projects and initiatives aimed at improving the capability and maturity of Smith & Nephew information security practices. What will you need to be successful? Bachelor s degree in Computer Science or a related subject preferred or equivalent experience. Licenses/Certifications: Relevant entry- or mid-level security certifications are advantageous but not required. Job-specific training will be provided. Experience: At least 4 years of experience in a relevant Information Security role. Experience working hands-on with SIEM and EDR/XDR technologies for the identification and response to existing and emerging threats. Familiar with MITRE ATT&CK for the identification and mapping of attacker tactics, techniques, and procedures (TTPs). Familiarity with network models (OSI and TCP/IP), common network terminology and concepts, and network equipment. Must be able to correctly interpret logs for firewalls (including WAF and IDS/IPS), Windows and Linux operating system logs, AWS and Azure cloud logs. Familiarity with web-related technologies (Web applications, Web Services, Service Oriented Architectures) and network/web-related protocols. Competences: Understanding of industry frameworks such as MITRE ATT&CK, MITRE D3FEND, NIST CSFv2, and NIST SP800-61r2. Using SIEM (including scripted query languages) and EDR/XDR technologies, threat intelligence tools, and ITSM tools. Familiarity with AWS and Azure cloud technologies and cloud security standards (CSA or equivalent). Understanding of API security and familiarity with AI security concepts (such as NIST AI RMF). Familiarity with ITIL methodology and terminology. Excellent written and oral communication skills, service attitude, and analytical approach to problem solving. Ability to work independently without daily direction, balancing conflicting priorities, and effectively tracking and managing task completion to committed deadlines. You. Unlimited. We believe in crafting the greatest good for society. Our strongest investments are in our people and the patients we serve. Inclusion, Diversity and Equity- Committed to Welcoming, Celebrating and Thriving on Diversity, Learn more about Employee Inclusion Groups on our website ( https://www.smith-nephew.com/ ). Other reasons why you will love it here! Your Future: Major medical coverage + policy exclusions and insurance non-medical limit. Educational Assistance. Work/Life Balance: Flexible Personal/Vacation Time Off, Privilege Leave, Floater Leave. Your Wellbeing: Parents/Parents in Law s Insurance (Employer Contribution of 7,000/- annually), Employee Assistance Program, Parental Leave. Flexibility : Hybrid Work Model (For most professional roles) Training: Hands-On, Team-Customized, Mentorship Extra Perks: Free Cab Transport Facility for all employees; One-Time Meal provided to all employees as per shift. Night shift allowances

Posted 1 week ago

Apply

4.0 - 8.0 years

8 - 13 Lacs

Pune

Work from Office

Naukri logo

Role Overview: The Cloud Security Engineer will have a profound impact on security operations, engineering, and architecture domains. The overall objective of this role is to support various teams such as product security, security operations, security engineering and various business initiatives and projects in building a secure cloud infrastructure in line with industry best practices. The Cloud Security Engineer will also implement a highly automated approach to monitoring and detecting incidents, as well as responding to them timely and effectively. Responsibilities: Advise internal customers on best practices in design and implementation of secure cloud systems Conduct reviews of various cloud platforms, services, and business initiatives to assess cyber risk Conduct Cloud Security Posture Management (CSPM) activities Design, develop, and implement security solutions to prevent exposure of cloud resources. Design, develop, and implement security requirements for cloud-based systems to meet business requirements with appropriate security controls Maintain, monitor, and deploy security baselines and automation solutions for hybrid cloud identity platform. Design and develop cloud-specific security procedures, standards, and policies. Provide support with security incidents, helping the Threat Management team prioritize and remediate appropriately Support requirements around SOC2 compliance alongside addressing the project requirements for the AWS platform and Lumino Lead continuous improvement and engineering maturity across cloud solutions. Location: Pune, India Education: Bachelors degree in computer science, information systems and/or equivalent formal training or work experience. Nice to have Licenses/ Certifications: CISSP or equivalent security-related industry certifications AWS Certified Security - Specialty and/or AWS Associate or higher certification Certified Cloud Zero Trust (CCZT) Professional Certification Certified Cloud Security Professional (CCSP) HIPAA compliance-related certifications (e.g., Certified HIPAA Professional - CHP) Experience: Overall 10+ years of experience in IT, with at least 5 years focused on AWS security 5+ years of experience as an Information Security Administrator or Engineer 3+ years of experience in Cloud Security Architecture and/or Engineering. 2+ years of Application Security/Secure Software Development. Strong understanding of different cloud architecture models, hosting, and deployment models. Strong experience implementing security monitoring, logging, and alerting Practical knowledge of AWS foundation services related to compute, network, storage, content delivery, administration and security, deployment and management, automation technologies Strong knowledge of cloud security best practices and AWS Well-Architected Framework, especially the Security Pillar Familiarity with using AWS Cloud Services (EC2, DynamoDB, API Gateway, RDS, Lambda, CloudFront, CloudFormation, CloudWatch, Route 53, WAF, GuardDuty, Security Groups, AWS IAM, etc) Solid understanding of HIPAA regulations, as well as other compliance frameworks such as SOC 2, PCI-DSS, and GDPR Experience working with cloud security and governance tools, cloud access security brokers (CASBs), and server virtualization technologies. Experience with assessment, development, implementation, optimization, and documentation of a comprehensive and broad set of security technologies and processes (secure software development (Application Security), data protection, cryptography, key management, identity and access management (IAM), network security) within SaaS, IaaS, PaaS, and other cloud environments Basic experience with Azure Experience with deployment orchestration, automation, and security configuration management (Jenkins, Puppet, Chef, Cloudformation, Terraform, Ansible) would be a great plus Experience with services programming (AWS Lambda, Docker, etc.) would be a great plus NICE TO HAVE: Understanding of M365 suit and Azure security mechanisms Competences: Excellent written and oral communication skills. Excellent customer service skills and problem resolution. Experience in being able to manage and prioritize multiple tasks in an effective manner. Experience with service-oriented architecture for cloud-based services. Understanding of distributed denial of service attack intelligence gathering, concepts, mitigation tools, and techniques. Understanding of mobility security device and application risk and threat assessment. Understanding of nation and non-nation state actors, hacktivist groups, advanced threats, and the "kill chain" methodology. Familiarity with secure coding best practices. Strong communication & organizational skills, ability to multi-task, strong attention to details, excellent problem solving and follow-up skills required Travel Requirements: 10% Stay connected and receive alerts for jobs like this by joining our talent community . Were more than just a company - were a community! Follow us on LinkedIn to see how we support and empower our employees and patients every day. Check our Glassdoor page for a glimpse behind the scenes and a sneak peek into You . Unlimited . , life, culture, and benefits at S+N. Explore our new website and learn more about our mission, our team, and the opportunities we offer.

Posted 1 week ago

Apply

2.0 - 5.0 years

7 - 11 Lacs

Hyderabad

Work from Office

Naukri logo

Infrastructure Engineering Senior Analyst - HIH - Evernorth ABOUT EVERNORTH: Evernorth exists to elevate health for all, because we believe health is the starting point for human potential and progress. As champions for affordable, predictable and simple health care, we solve the problems others don t, won t or can t. Our innovation hub in India will allow us to work with the right talent, expand our global footprint, improve our competitive stance, and better deliver on our promises to stakeholders. We are passionate about making healthcare better by delivering world-class solutions that make a real difference. We are always looking upward. And that starts with finding the right talent to help us get there. Position Overview At Cigna, were more than a health insurance company. Were a global health service company. Identity and Access Management is an integral part of IT whose mission is to enforce the principle of Least Privilege through regular Reviews and other Technical Access Controls while preserving Compliance for testing by external auditors. Help us secure our identities and audit our future. Get ready for a job that encourages you to think strategically yet stay connected with your teams. Do you have Identity or Cyber Security experience? If so, prepare to innovate, create, and inspire. The Identity and Access Management Engineer will be responsible for the design, development, and delivery of Identity-based solutions - primarily joiner/mover/leaver/SoD controls and Role Based Access Control (RBAC). These solutions will help deliver on our mission to enforce the principal of Least Privilege through Technical Access Controls procedures while preserving Compliance for testing by external auditors. Responsibilities The Information Protection Advisor will be responsible for the design, development, and execution of Role Based and Attribute Based Access Controls and Role Reviews. They will also ensure our colleagues have an efficient way to obtain the system access they need while preserving the integrity and security of the data being accessed. Responsibilities include, but are not limited to, the following: Managing all phases of application lifecycle including requirements analysis, application design, construction, quality control testing, deployment and integration, troubleshooting, maintenance and change management Design and configure Technical Access Control solutions withing Cigna s Identity Governance tool - SAVIYNT. Automate manual Access Control processes such as Role Based and Attribute Based Access Controls (RBAC/ABAC), provisioning, terminations, account lifecycle and compliance. Develop automated data feeds for applications and infrastructure to send identity data to Identity Governance tools. Collaborate with key stakeholders to understand, document, and assess identity landscape. Work within compliance standards compliance standards (e.g., SOC 2, SOX, PCI-DSS, HIPAA, etc.) and federal compliance frameworks (e.g., FedRAMP, NIST 800-53, etc.) and produce control operation audit evidence Qualifications Required Skills: Bachelor s degree in computer science, Cyber Security, Information Technology, Information Sciences, or equivalent educational or professional experience and/or qualifications preferred. Strong experience in Identity and Access Management tools such as Saviynt, Sailpoint, etc. Experience in developing Web services using technologies like REST, SAML, OAuth and JSON Scripts Proficiency in scripting and programming languages (e.g., Perl, Python, Java, PowerShell etc). Strong experience in SQL Building business process and workflow. Data mining and data mapping skills. Required Experience & Education: 3-5 years of experience required Bachelor s degree in computer science, Cyber Security, Information Technology, Information Sciences, Risk Management, or equivalent educational or professional experience and/or qualifications preferred but not required At least 2+ years of experience working in the fields of Identity and Access Management and Privileged Access Management Understanding of information risk management concepts Strong analytical abilities and mind-set Attention to detail Working experience adapting to a dynamic work environment by learning quickly, solving problems, and making decisions with minimal supervision Effective verbal and written communication skills for working with both technical teams and business end-users Demonstrated ability to coordinate people and teams cross-functionally to resolve complex issues with designated time frames Equal Opportunity Statement About Evernorth Health Services

Posted 1 week ago

Apply

1.0 - 3.0 years

1 - 4 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

About Us At SentinelOne, were redefining cybersecurity by pushing the limits of whats possible?leveraging AI-powered, data-driven innovation to stay ahead of tomorrows threats From building industry-leading products to cultivating an exceptional company culture, our core values guide everything we do Were looking for passionate individuals who thrive in collaborative environments and are eager to drive impact If youre excited about solving complex challenges in bold, innovative ways, wed love to connect with you What are we looking for Join our Vigilance organization, an elite force of cyber security experts providing a Managed Detection and Response (MDR) service to our largest customers Help drive a world-class threat monitoring, hunting, and response service Be an integral part of a 24x7 follow-the-sun global SOC, and work with key POCs, and customers, to provide an additional level of security and confidence, by leveraging intelligence feeds, threat logs, and IOCs Collaborate with our world-class threat team and researchers, and various RnD teams as you help shape our product, help customers be more secure, and introduce yourself to the cyber tech ecosystem What will you do Proactively monitor and review threats and suspicious events from customers participating in the service Investigate alerts, triage, deep dive, and come up with proper action items and remediation plans Use multiple sources of data from the customer, our intelligence cloud, external threat feeds, etc- Perform proactive hunting for threat data, leveraging our deep visibility abilities and proprietary research cloud Work with the customer to follow up on items that require additional investigation Provide Incident follow-up & support Maintain excellent customer satisfaction through professional, proactive, and personal service Work closely with our research and development team Contribute to our knowledge base by creating malware analysis cookbooks and best practices What experience or knowledge should you bring 3-7 years of experience with Technical Support, SOC, IR, Malware Analysis, or IT Security is a must Strong network and security knowledge is desired Experience with SQL, bash, python, and powershell Professional and articulate with excellent written and verbal communication skills Ability to multitask and prioritize Multi-OS support experience: Windows, Mac & Linux (mobile platforms an advantage) Experience with incident response, computer forensic investigations, or threat hunting is a plus Experience with host base (endpoint agent), or sandbox (network-based) security solutions is an advantage Be able to work a fluid and dynamic schedule to cover hours and days outside of the normal work week Why us You will be joining a cutting-edge company, where you will tackle extraordinary challenges and work with the very best in the industry Industry-leading gender-neutral parental leave Paid Company Holidays Paid Sick Time Employee stock purchase program Disability and life insurance Employee assistance program Gym membership reimbursement Cell phone reimbursement Numerous company-sponsored events, including regular happy hours and team-building events SentinelOne is proud to be an Equal Employment Opportunity and Affirmative Action employer We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics SentinelOne participates in the E-Verify Program for all U S based roles Show more Show less

Posted 1 week ago

Apply

1.0 - 4.0 years

6 - 9 Lacs

Mumbai

Work from Office

Naukri logo

What will you do every day As a Security & Compliance Specialist, you are responsible for helping the implementation of the organization's information security and compliance programs You will also help in implementing and reviewing data protection and privacy controls through technical, operational, and administrative measures The ideal candidate will have good experience in Security in SaaS products, a deep understanding of regulatory requirements, and a proactive approach to managing security threats and third-party risks; someone who enjoys security work and possesses both deep and wide expertise in the security space Job Responsibilities Develop and Implement Security & Privacy Policies (Primary | Must have) Create and maintain comprehensive security policies and procedures for cloud environments and application security that align with organizational goals and regulatory requirements Ensure policies are regularly updated and communicated to relevant stakeholders; should be an SME for Enterprise Security and Privacy related activities Third-Party Risk Management (Primary | Must have) Handle the third-party risk management activities (TPRM) covering both inbound and outbound assessments (through the Customer & Vendor lifecycles) Collaborate with procurement and legal teams to ensure third-party contracts include appropriate security and compliance requirements (this includes reviews of MSA, Bids, RFPs) Compliance Oversight (Primary | Must have) Ensure the organizations compliance with relevant laws, regulations, and standards (e g-, GDPR, HIPAA, ISO 27001, ISO 27701, DPDP, SOC 2); should be an SME for compliance Implementation of minimum 3 standards from GDPR, HIPAA, ISO 27001, ISO 27701, DPDP, SOC 2 Lead internal and external audits and manage responses to audit findings Product Security Practices (Primary | Must have) Integrate security practices into the software development lifecycle (SDLC) and review the releases based on the established Secure SDLC processes Review the Products from time to time checking the availability of enterprise security features Cloud & Infra Security (Secondary | Good to have) Implement, review and maintain robust security controls for cloud platforms (AWS/Azure/GCP) as per the industry best practices (DevSecOps) Perform security assessments/reviews and VA scans (non-mandatory) on cloud infra Cybersecurity (Secondary | Good to have) Knowledge on Cyber Attack Vectors, Cyber Threat Intelligence, Attack Surface Mgmt , etc- Adequate knowledge on Incident Response, Business Resilience and Risk Management Other responsibilities To act as a Security & Privacy champion/catalyst for all functions/BUs within the Company This role needs an avert-risk mindset and should handle Incident Management (able to Identify, Analyze, and Resolve Security Incidents) Contribute to the Cloud & CyberSecurity roadmap and act as an internal advisory/consultant Training entire staff about security and privacy best practices whenever necessary Experience & Other Requirements Degree/Diploma in Computer Science / Information Technology / Cybersecurity or equivalent 2+ years (2-5) of experience in information security, with a focus on compliance Proven track record in implementing security and compliance policies & controls in a Product based Product company (preferably in a SaaS-based company) At least 2 years of working and implementation knowledge for any three of the compliances (ISO 27001, 27701, GDPR, HIPAA, SOC 2, DPDP) Good to have working knowledge of Cloud security practices & involved in DevSecOps activities Good research mindset with a zeal to explore, learn, share, and implement Preferable who can join in 30 days Show more Show less

Posted 1 week ago

Apply

4.0 - 11.0 years

30 - 35 Lacs

Ahmedabad

Work from Office

Naukri logo

To work as a Frontend engineer and taking care of Synthesis, LEC, CLP and Power Analysis for complex SoC projects. Job Description Implement high-performance, low-power, and area-efficient digital designs. Write and implement block level and top-level constraints for Synthesis, Static Timing Analysis . Optimize designs for power, performance, and area, and meet PPA goals. Power analysis using PT-PX or equivalent flow. Logic Equivalence Check (LEC) and Low Power Checks (CLP) at block and SoC level designs. Define and evaluate constraints and signoff Test/DFT mode timing requirements. Your Profile Strong fundamentals and experience in Synthesis and STA domains. Write and implement block level and top-level timing constraints for Synthesis Optimize designs for power, performance, and area, and meet design goals. Knowledge on Power analysis and PT-PX flow. Understanding of DFT flows, including scan insertion. Write and evaluate Test/DFT mode timing constraints. Thorough with Logic Equivalence Check debug capability. we'll known about UPF concepts and Low Power Checks at block and full chip level. Defining and verification of STA constraint for Functional and Test/SCAN Modes. Defining PVT s corners required for covering all desired scenarios for a design Knowledge on OCV/AOCV/POCV derates. Understanding of Prime-Time and TEMPUS tools, which helps in quick debugging of design/timing issues. VASTA timing closure based on chip IR drop. Knowledge on signal SI analysis and PT-PX flow

Posted 1 week ago

Apply

Exploring SOC Jobs in India

The job market for Security Operations Center (SOC) professionals in India is thriving with the increasing demand for cybersecurity experts. SOC jobs involve monitoring, detecting, and responding to security incidents to protect organizations from cyber threats. If you are considering a career in cybersecurity, exploring SOC roles in India can be a rewarding option.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Delhi/NCR
  5. Mumbai

These cities are known for their strong presence of IT and cybersecurity companies actively seeking SOC professionals.

Average Salary Range

The average salary range for SOC professionals in India varies based on experience and expertise. Entry-level SOC analysts can expect to earn around INR 4-6 lakhs per annum, while experienced SOC managers or consultants can command salaries ranging from INR 12-20 lakhs per annum.

Career Path

In the SOC field, a typical career progression may include roles such as SOC Analyst, SOC Engineer, SOC Team Lead, SOC Manager, and eventually Chief Information Security Officer (CISO). Advancing through these roles often involves gaining experience, acquiring relevant certifications, and developing strong analytical and problem-solving skills.

Related Skills

Besides expertise in SOC operations, professionals in this field are expected to have knowledge of network security, incident response, threat intelligence, and cybersecurity tools. Proficiency in programming languages like Python, knowledge of SIEM (Security Information and Event Management) tools, and familiarity with compliance standards such as GDPR and ISO 27001 can also be beneficial.

Interview Questions

  • What is the difference between a security incident and a security event? (basic)
  • Explain the purpose of a SIEM tool in a SOC environment. (medium)
  • How would you investigate a potential security breach in a network? (medium)
  • Describe the steps involved in a typical incident response process. (medium)
  • What is the role of threat intelligence in a SOC? (basic)
  • How do you stay updated with the latest cybersecurity threats and trends? (basic)
  • Can you explain the concept of Indicators of Compromise (IoC)? (medium)
  • What is the significance of log analysis in cybersecurity? (basic)
  • How would you prioritize security alerts in a busy SOC environment? (medium)
  • Have you worked with any specific security frameworks like NIST or MITRE ATT&CK? (advanced)
  • ...

Closing Remark

As you navigate the SOC job market in India, remember to continuously enhance your skills, stay updated with industry trends, and showcase your passion for cybersecurity. With dedication and preparation, you can confidently pursue rewarding opportunities in this dynamic field. Good luck in your job search!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies