Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
8.0 - 15.0 years
0 Lacs
mumbai, maharashtra, india
On-site
We are seeking a highly skilled and experienced Senior SOC with 7-10 years of hands-on experience in cybersecurity, specializing in threat detection, incident management, and team leadership. In this senior leadership role, you will be responsible for overseeing the operation and performance of our Security Operations Center, ensuring efficient threat monitoring, detection, and response for multiple client organizations. You will manage and guide a team of L1, L2, and L3 analysts while maintaining high service standards, meeting SLAs, and ensuring client satisfaction. Key Responsibilities: Lead and manage the day-to-day operations of the Security Operations Center (SOC), overseeing the efforts of L1, L2, and L3 analysts to ensure effective incident detection, investigation, and response. Ensure continuous improvement of SOC processes, with a focus on enhancing threat detection, incident response times, and automation capabilities. Serve as the primary point of contact for client security incidents, providing guidance and managing reporting, incident resolution, and improvement strategies. Monitor and ensure service-level agreements (SLAs) are met consistently, ensuring that clients receive exceptional, timely security services. Prepare and present regular client reports on incident analysis, threat trends, and operational performance. Lead incident response activities, including the development and execution of response plans, to mitigate threats and limit impact on clients. Mentor and develop team members, fostering a culture of continuous learning, collaboration, and excellence within the SOC. Drive the development of security policies, procedures, and incident response frameworks to ensure best practices and compliance with industry standards. Collaborate with other cybersecurity teams and leadership to align security operations with broader business goals and initiatives. Skills & Qualifications: 8-15 years of professional experience in cybersecurity, with at least 5 years in a leadership role managing a Security Operations Center or a similar security function. Deep understanding of SOC operations, threat intelligence, incident management, SIEM tools, and security frameworks. Proven expertise in managing and mentoring cybersecurity teams, with a focus on developing junior and mid-level analysts and enhancing team performance. Strong communication skills with the ability to effectively interact with clients, explain complex security incidents, and deliver high-level reports and recommendations. Hands-on experience with security tools (e.g., SIEM, IDS/IPS, endpoint protection) and an in-depth understanding of cybersecurity vulnerabilities and mitigation techniques. Familiarity with compliance regulations such as GDPR, HIPAA, and NIST frameworks. Relevant certifications, such as CISSP, CISM, or similar, are highly preferred. Strong problem-solving abilities, with a proactive approach to threat detection and incident response. Show more Show less
Posted 5 days ago
4.0 - 9.0 years
9 - 19 Lacs
bengaluru
Work from Office
Your potential, unleashed. Indias impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realise your potential amongst cutting edge leaders, and organisations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilientnot only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks Your work profile As Deputy Manager in our Cyber Team youll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: - Key Responsibilities: Work with security teams to understand their requirements and translate them into SIEM use cases Design, implement, and test SIEM use cases to detect specific types of security threats Continuously optimize use cases to improve detection accuracy and reduce false positives Develop and implement SIEM rules and correlation logic to detect security incidents Tune alerts to minimize false positives and ensure they are actionable Create and maintaining parsers/connectors in SIEM and SOAR Set appropriate thresholds for alerts based on analysis and threat intelligence Ensure data is normalized and enriched for effective correlation and analysis Develop and maintain log parsing rules to accurately ingest and process data Maintain detailed documentation of SIEM use cases, including design, implementation, and tuning procedures Generate reports on the performance and effectiveness of SIEM use cases Work closely with stakeholders, including SOC analysts, incident responders, and IT teams, to ensure use cases meet their needs Collaborate with SIEM vendors to troubleshoot issues and implement new features Innovate and experiment with new use case ideas to enhance the SIEM's detection capabilities Design and develop automated workflows to address common security operations tasks and incidents Write and maintain scripts (e.g., Python, PowerShell) to support automation tasks Create and implement playbooks that automate the response to security incidents. Develop use cases for automation based on common incident scenarios and threat patterns Automate the enrichment of security alerts with contextual information to improve decision-making Integrate various security tools (e.g., SIEM, EDR, ITSM (Service Now), firewalls, Threat intelligence platforms) with the SOAR platform. Continuously optimize automated workflows to reduce false positives and enhance detection accuracy. Tune the performance of automated workflows to ensure they operate efficiently and effectively. Establish a feedback loop with security teams to gather input on automation performance and make necessary adjustments. Monitor the performance and health of the SOAR platform and automated workflows Maintain detailed documentation of automated workflows, playbooks, and scripts. Skills Required: Proficiency with proposed SOAR and SIEM solutions Experience in configuring, managing, and optimizing SOAR and SIEM platforms Strong skills in scripting languages (e.g., Python, PowerShell, JavaScript) for developing automation scripts Experience in writing and maintaining scripts to automate security tasks and processes Experience in utilizing RESTful APIs to enable communication between different security tools Experience in converting MITRE TTPs to Misuse cases for better detection and response Shall have 7 Years of experience and proposed OEM certifications SOC Operations -SIEM Use case and SOAR Automation Specialist SPLUNK/Palo Alto SOAR Desired qualifications Education B.E / B.Tech (Tier 1/2) in Computer Science, Information Technology or related fields Skills Technologies : SOC Operations -Network Security Specialist NBAD, Anti -APT and Anti-DDoS CISCO Palo Alto Netscout Experience Required - 4 to 9 years Location and way of working Base location: Koramangala - Bangalore (Mandatory client deputation) Professional is required to work from office How youll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the worlds most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report . Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals. *Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices. At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution. In this regard, you may refer to a more detailed advisory given on our website at: https://www2.deloitte.com/in/en/careers/advisory-for-career-aspirants.html?icid=wn_
Posted 6 days ago
15.0 - 17.0 years
0 Lacs
mumbai, maharashtra, india
On-site
Assistant Vice President - IT Security Lead Roles & Responsibilities: In depth understanding of information security policies, procedures, compliance monitoring, disaster recovery operations. Handling Internal and External Systems Audit covering key areas like Network Security, Security operations, Vulnerability Assessment, Access Control. Hands on in SIEM and understanding of SOC operations, Patch management, Antivirus, URL Web Filtering, Vulnerability and Configuration Assessment, Firewalls (preferably Checkpoint), IDS/ IPS, WAF, VPN, PIM, DDoS, DLP and APT solutions Capacity management and performance management of security solutions. Knowledge of networking concepts like switching and routing, network monitoring tools Good understanding of information security standard and process such as ISO 27001 Implements security improvements by assessing current situation; evaluating trends; anticipating requirements Determines security violations and inefficiencies by conducting periodic audits. Upgrades system by implementing and maintaining security controls. Ensuring compliance to regulatory requirement by maintaining SOP and process adherence Project Management : Defining, Planning, Scoping, scheduling, preparing complete work breakdown. Vendor Management/SLA Monitoring Compliance: Monitor compliance as per organizational information security policy, procedure and Guidelines. Defining new policies and reviewing existing policies for changes. Understanding of SEBI security guidelines Educational Qualification: Bachelors degree in Computer Science, information technology or equivalent professional experience Experience: 15+ years of combined experience in Network security/IT Security. Skills Required: Experience in driving change in security functions Experience with contract and vendor negotiations. Functional Competencies required: Experience of working in Stock Exchange environment Good written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate security and risk-related concepts to technical and nontechnical audiences. Show more Show less
Posted 6 days ago
2.0 - 6.0 years
0 Lacs
pune, maharashtra
On-site
Arctera plays a crucial role in ensuring the smooth functioning of IT systems worldwide. Counting on Arctera's expertise, one can rely on the operationality of credit cards at stores, consistent power supply to homes, and uninterrupted production of medications in factories. Arctera's services are trusted by both large-scale organizations and smaller entities, enabling them to combat ransomware attacks, natural calamities, and compliance issues effortlessly. Leveraging the power of data and its flagship products - Insight, InfoScale, and Backup Exec, Arctera ensures data security and privacy while minimizing environmental impact and preventing illicit data usage. The data landscape is evolving rapidly, with a continuous surge in data volumes being generated daily. The ongoing global digital transformation, coupled with the advent of AI, is paving the way for a significant escalation in data creation. By becoming a part of the Arctera team, you will be contributing to the innovative efforts aimed at leveraging cutting-edge technologies to safeguard critical global infrastructure and uphold data integrity. **Job Title:** Info Sec Analyst - Cloud Security Posture Management (CSPM) **Location:** Pune, India **Job Type:** Full-time **Job Summary:** As a Cloud Security Operations Analyst, your primary responsibility will revolve around the monitoring, detection, and response to security threats within cloud environments (AWS, Azure, GCP). This role encompasses the management of Cloud Security Posture Management (CSPM) solutions, incident response, threat analysis, and mitigation of cloud security risks. Your role will be crucial in ensuring that the organization's cloud security posture aligns with industry best practices and regulatory standards. **Key Responsibilities:** - Monitor and handle security alerts from CSPM tools like Crowdstrike CSPM, Zscaler CNAPP, Wiz, and Prisma Cloud. - Conduct basic investigations of cloud security incidents and document the findings. - Assist in reviewing misconfigurations in cloud services and recommend corrective actions. - Maintain documentation for cloud security policies and playbooks. - Lead investigations into cloud security incidents and misconfigurations, including forensic analysis and threat intelligence correlation. - Manage and optimize CSPM tools to minimize false positives and enhance cloud security hygiene. - Collaborate closely with SOC teams to analyze and mitigate cloud-based threats, including IAM misconfigurations, API security, and data exposure risks. - Provide security recommendations and remediation guidance to DevOps and Engineering teams. - Support compliance initiatives (CIS, NIST, PCI-DSS) and cloud security audits. - Lead incident post-mortems to identify gaps and enhance cloud security processes. - Stay updated on emerging cloud threats, vulnerabilities, and attack vectors to proactively reinforce the cloud security posture. **Required Skills & Qualifications:** - 2-4 years of experience in cloud security, SOC operations, or cybersecurity. - Basic understanding of cloud platforms (AWS, Azure, GCP) and their security controls. - Familiarity with SIEM tools and log analysis for security events. - Proficiency in working with CSPM tools like Crowdstrike CSPM, Zscaler CNAPP, Wiz, or other cloud-native security solutions. - Basic comprehension of SIEM integrations with cloud environments and log analysis techniques. - Knowledge of threat intelligence, attack techniques (MITRE ATT&CK), and incident response methodologies. - Experience in scripting and automation for security tasks. - Certifications such as AWS Security Specialty, AZ-500, or Security+ would be advantageous.,
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
delhi
On-site
As a Sales Engineer at Trend Micro, you will be joining a high-performance team that focuses on cutting-edge technology solutions related to cybersecurity. Trend Micro is a global leader in unified endpoint security, network security, email security, and XDR offerings. You will have ample opportunities to work with technologies like cloud native application security, Devsecops, and other emerging areas of cloud security. Your role as a Sales Engineer at Trend Micro goes beyond being an evangelist; you will also act as a cybersecurity consultant, helping enterprises navigate cloud technologies and AI-driven security solutions. You will work closely with customers as a reliable advisor and technologist, guiding them in selecting and deploying Trend Micro Next-Gen security solutions. Key Responsibilities: - Understand the customer journey with the product and ensure a smooth experience for customers - Focus on customer success throughout the engagement, onboarding, and product experience journey - Train and build the sales organization by being an effective storyteller and providing guidance on selling techniques - Stay updated on emerging cybersecurity partners and leverage channel partners for customer engagement - Collaborate with the sales team and product managers to stay informed about the latest product and technology updates - Deliver engaging technical demonstrations of Trend Micro products and their benefits - Empower partners and channels to propose and position Trend Micro solutions effectively - Present complex technical solutions to all levels of an organization in a clear and engaging manner - Apply problem-solving skills to design solutions that address customer needs - Provide training to customers and prospects on Trend Micro solutions - Work with technical support personnel to ensure quality support and customer satisfaction - Contribute to departmental best practices and strategies for increased efficiency - Stay updated on current technical knowledge and participate in technical communities of interest - Actively participate in webinars, workshops, and industry events as a speaker or panelist Our Ideal Candidate: - Experienced in delivering high-quality presales support and solutions that add unique value for customers - Knowledgeable about SOC operations, security analytics, cloud architecture, SASE, CASB, and Zero Trust model - Familiar with Microsoft O365, Azure, Google, AWS services - Exposure to security software solutions like Firewall, Content Security, Intrusion Prevention, encryption, data leakage prevention, and data protection - Strong written and spoken communication skills in English - Passionate about cybersecurity and customer security - Understanding of public cloud technologies such as AWS and Azure Join Trend Micro: Trend Micro offers an inclusive, global work environment where your unique perspectives and ideas are celebrated. You will be part of a culture that values empathy, cooperation, and collaboration to drive performance and innovation. If you believe in challenging the status quo and making a positive impact, join Trend Micro where your potential is limitless, and you are empowered to learn, lead, and excel.,
Posted 1 week ago
8.0 - 13.0 years
7 - 17 Lacs
bengaluru, delhi / ncr
Hybrid
Role & responsibilities Client Engagement & Solutioning: Engage with clients to understand their cybersecurity requirements, challenges, especially around SOC operations. Design and propose tailored SOC solutions including SIEM, SOAR, threat intelligence, incident response, and managed detection & response (MDR). Lead technical discussions, presentations, and demonstrations to articulate the value of proposed solutions. Proposal & Bid Management: Respond to RFPs/RFIs/RFQs with detailed technical content and solution architecture. Collaborate with internal teams to develop Statements of Work (SOW), pricing models, and delivery plans. Technical Leadership: Stay updated on cybersecurity trends, SOC technologies, and threat landscapes. Provide thought leadership in SOC design, architecture, and operations. Support the development of new service offerings in the SOC and cybersecurity domain. Collaboration & Enablement: Work with product, engineering, and delivery teams to ensure feasibility and alignment of proposed solutions. Train and support sales teams on SOC capabilities and value propositions. Required Skills & Experience: 8+ years in cybersecurity pre-sales, solution architecture, or consulting roles. Strong understanding of SOC operations, SIEM platforms (e.g., Splunk, QRadar, Azure Sentinel), and incident response workflows. Familiarity with cybersecurity frameworks (e.g., MITRE ATT&CK, NIST, ISO 27001). Experience with cloud security, endpoint protection, and threat intelligence platforms is a plus. Excellent communication and presentation skills, with the ability to simplify complex technical concepts. Relevant certifications such as CISSP, CEH, or CISM are highly desirable.
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
karnataka
On-site
The primary responsibility of an Infoscion is to lead consulting engagements by providing high-quality and value-adding solutions to customers. This involves guiding the team through problem definition, diagnosis, solution design, development, and deployment. As an Infoscion, you will review proposals, analyze solutions, and identify potential risks for client business problems. Additionally, you will suggest change management strategies and communication mechanisms to manage change effectively. As part of your role, you will coach and mentor team members, provide subject matter training, and motivate the team through feedback and recognition. You will actively contribute to unit-level and organizational initiatives aimed at delivering high-quality consulting solutions while adhering to organizational guidelines. If you are passionate about helping clients navigate their digital transformation journey, this role offers an exciting opportunity to make a significant impact. In terms of technical requirements, proficiency in various domains such as Network, Data Networking, Application Security, Vulnerability Management, Data Security, Finacle Core Tech Product Configuration, Infrastructure Security, and Security Incident and Event Management (SIEM) is essential. Moreover, you are expected to have a good understanding of software configuration management systems, strong business acumen, awareness of industry trends, logical thinking, problem-solving skills, and the ability to collaborate effectively. Knowledge of industry domains, financial processes, pricing models, SDLC, agile methodologies, project management, and team management is also crucial. Preferred skills include expertise in Network, Data Networking, Network Management, Application Security, Vulnerability Management, Data Security, Infrastructure Security, Security Incident and Event Management (SIEM), SOC Operations, and GRC Tool implementation & maintenance (Servicenow GRC).,
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
karnataka
On-site
You are invited to join our Information Security team as an Enterprise IT Security Analyst specializing in Security Operations Center (SOC) activities. In this role, you will play a crucial part in maintaining the security and effectiveness of our security operations by monitoring security alerts, analyzing incidents, and contributing to incident response processes. Your expertise in SOC operations, incident response, and security monitoring tools will be invaluable in supporting SOC initiatives. Your key responsibilities will include monitoring security alerts and events using tools such as Splunk, Microsoft Sentinel, Kusto (KQL), or Splunk Search Processing Language (SPL). You will be tasked with analyzing and triaging security incidents, assisting in incident response processes, handling security incidents and tickets, conducting security assessments, and contributing to the design of SOC use cases. Additionally, you will provide technical support for SOC-related issues, leverage AWS skills for cloud security monitoring, and stay up-to-date with the latest SOC trends and technologies. To excel in this role, you must possess a Bachelor's degree in computer science or a related field, along with 3 years of experience in SOC operations. A CompTIA Security+ certification or similar qualification is required, as well as experience with SIEM technologies and a strong understanding of SOC principles, practices, and frameworks. Your proven experience in incident response and management will be highly beneficial. While not mandatory, proficiency in AWS cloud security and Windows Defender, excellent problem-solving and analytical skills, strong communication abilities, and the capacity to work both independently and as part of a team are considered advantageous. Experience in a SOC analyst role within a security operations team and knowledge of cloud security challenges will also be beneficial. At Notified, we value diversity and are committed to providing equal opportunities for all. This role is based out of The Leela Office in Bangalore, with a hybrid work schedule that allows flexibility in your working arrangements. By joining our team, you will have the opportunity to work in an international environment, foster innovation and creativity, and benefit from comprehensive health insurance and extensive learning opportunities. Your contributions will help us amplify stories globally and support our clients in reaching their audiences effectively.,
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
karnataka
On-site
As a Lead Security Analyst - SOC at Amagi, you will play a crucial role in the Detection Engineering, SIEM/WAF rule management, Cloud Security, and SOC operations. With 7-9 years of experience in SOC operations, including 2 years in a lead role, you will bring your expertise to the team. Your technical skills will be put to the test as you handle SIEM platforms, WAF configurations, cloud platforms (AWS/GCP), Kubernetes security, and DevOps tools like Jenkins and Terraform. Proficiency in Python for automation will be a key asset in enhancing detection workflows and reducing operational overhead. Your responsibilities will include designing and maintaining robust SIEM detection rules, optimizing WAF rules, identifying and remediating security misconfigurations in cloud environments, as well as developing and executing SOC processes such as incident response plans. Your role will also involve mentoring junior SOC analysts, incorporating threat intelligence feeds, generating security metrics, and collaborating with various teams to align security strategies with business goals. This full-time, in-office position based in Bangalore, India, offers you the opportunity to work with cutting-edge cloud technologies in a dynamic environment. You should be prepared for on-call work to ensure 24/7 SOC coverage, adapt to rotating schedules, and provide support during off-hours when required. Strong leadership, problem-solving, communication skills, analytical abilities, and attention to detail are essential soft skills for this role. If you are passionate about security operations, have a deep technical background, and are looking to make a significant impact in a fast-growing media and entertainment technology company, Amagi is the place for you. Join us on our mission to establish the world's foremost media technology business and be a part of a transformative journey that sets us apart in the realm of media technology. Visit www.amagi.com for more information.,
Posted 2 weeks ago
10.0 - 12.0 years
0 Lacs
mumbai, maharashtra, india
On-site
When you join Trend, you become part of a unique and diverse global family and you get to work towards a world safe for exchanging digital information. Technical Account Manager - Mumbai About Trend Micro Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fuelled by decades of security expertise, global threat research, and continuous innovation, Trend Micro&aposs cybersecurity platform protects hundreds of thousands of organisations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defence techniques optimised for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organisations to simplify and secure their connected world. For additional information, visit www.trendmicro.com Position Overview As a Technical Account Manager at Trend Micro, youll be the trusted advisor and technical expert for enterprise customers. Your mission is to co-create secure, scalable solutions that improve the customers cybersecurity posture and operational efficiency. Youll guide clients through onboarding, deployment, and optimization of Trend Micros security platform, ensuring long-term value and satisfaction. Primary Responsibilities Act as the primary technical point of contact post-deployment for our enterprise customers. Provide technical account management, ensuring high customer satisfaction, retention, and referenceability. Work closely with customer IT and security teams to align product capabilities with business requirements and risk posture. Conduct root cause analysis and long-term strategic assistance to prevent incident recurrence. Oversee post-sales technical engagement, including configuration audits, optimization, upgrades, and architectural reviews. Coordinate across cross-functional teams like Product Engineering, R&D, and Sales Engineering to resolve complex issues. Maintain detailed documentation including troubleshooting steps, resolutions, and operational processes. Deliver technical workshops and share best practices to improve product adoption and maturity. Act as a subject matter expert (SME) on customer integrations in multi-OS and hybrid environments (Windows, Linux, Solaris, Cloud). Support security compliance efforts and vulnerability management discussions with customers. Collaborate with internal teams to enhance customer/partner experience? Skills & Qualifications 10 or more years of experience in technical support, security architecture, systems engineering, or a relevant field. Proven expertise in managing complex post-sales technical issues, especially in cybersecurity domains. Strong knowledge of security frameworks, SIEM/SOC operations, and endpoint/network defense technologies. Deep understanding of multiple operating systems (Windows Server, Linux, Solaris) and network infrastructure. Proactive problem-solving and analytical skills, capable of performing detailed technical assessments. Strong interpersonal and client-facing consulting experience. Excellent written and verbal communication skills, including the ability to articulate complex topics simply. Highly process-orientated, strong in documentation and technical reporting. Bachelors Degree in Engineering or equivalent is preferred. Technical certifications are strongly preferred (e.g., TCAP, TSCE, VCP, CCNA, CCNP, CISSP, MCSE, Cloud Platform Certifications). Excellent communication skills. ? Trend Micro strives to build an environment of equity and inclusion, which reflects diverse points of view. We welcome, value, promote, and celebrate diversity the very experiences and attributes that make us who we are, including but not limited to race, ethnicity, nationality, gender, gender identification, sexual orientation, level of ability, age, religion, veteran status, socio-economic status, and political philosophy. We embrace change, empower people, and encourage innovation. Join Trend Micro and Thrive with us. Show more Show less
Posted 2 weeks ago
0.0 - 4.0 years
0 Lacs
karnataka
On-site
As an entry-level Splunk Associate supporting managed detection and response (MDR) operations, you will play a vital role in log onboarding, dashboard creation, and incident correlation utilizing Splunk. Your key responsibilities will include working on Splunk data ingestion from various log sources such as Windows, Linux, and Firewall. You will assist in the development of dashboards, alerts, and scheduled reports. Additionally, you will provide support in troubleshooting indexers, search heads, and source configurations. It will also be part of your duties to document standard operating procedures (SOPs) and queries for internal knowledge sharing. To excel in this role, a basic understanding of Splunk or SIEM tools is required. Familiarity with Linux/Windows system logs will be advantageous. An interest in cybersecurity, SOC operations, or log analytics will further enhance your contribution. Possessing the Splunk Fundamentals I certification will be considered a valuable asset. If you are enthusiastic about entering the field of cybersecurity and eager to learn and grow in a dynamic environment, this position as an entry-level Splunk Associate is an excellent opportunity to kickstart your career in MDR operations.,
Posted 2 weeks ago
3.0 - 7.0 years
0 Lacs
varanasi, uttar pradesh
On-site
About Seceon: Seceon is a leading provider of AI-driven cybersecurity solutions. The innovative platform empowers organizations to detect, respond to, and prevent advanced threats in real-time. With a focus on automation, scalability, and simplicity, Seceon ensures businesses of all sizes stay protected. Job Summary: As a Customer Success Engineer at Seceon, you will serve as the primary technical point of contact for customers. Your mission is to ensure seamless onboarding, deployment, and ongoing success with the cybersecurity solutions. Working closely with customers, internal support teams, and engineering, you will resolve issues, drive adoption, and ensure overall satisfaction. Key Responsibilities: - Act as a trusted advisor to Seceon customers, guiding them through onboarding and implementation of the platform. - Troubleshoot and resolve technical issues in collaboration with internal support and product teams. - Deliver product training and support customer enablement sessions. - Monitor customer health, usage trends, and proactively suggest improvements. - Gather feedback to contribute to product improvements and customer retention strategies. - Document processes, FAQs, and solutions to build a strong knowledge base. - Support sales and pre-sales efforts with product demos and technical clarifications when needed. Requirements: - Bachelors degree in Computer Science, Engineering, IT, or related field. - 3+ years of experience in a technical support, customer success, or implementation engineering role. - Strong understanding of cybersecurity concepts (SIEM, SOC operations, threat detection preferred). - Basic knowledge of networking, firewalls, and cloud infrastructure (AWS/Azure is a plus). - Excellent communication and interpersonal skills. - Customer-first attitude with the ability to manage multiple priorities.,
Posted 2 weeks ago
8.0 - 11.0 years
10 - 14 Lacs
pune
Hybrid
Job Title: Senior Technical Bid Manager Cyber Security General Description The Senior Technical Bid Manager (Cyber Security) will be responsible for preparing technical and commercial proposals in response to RFP/RFI/RFQ. The role also supports presales activities such as preparing and delivering presentations, gathering client requirements, and collaborating with internal technical teams to deliver tailored cybersecurity solutions. Experience Requirements Minimum 8 years of experience in technology. At least 4 years of experience in Cyber Security . Minimum 2 years in bid management (proposal preparation). Experience in the GCC market is a plus. At least 2 years as a presales consultant or bid manager in leading technology companies. Deep knowledge and hands-on experience in: SOC Operations & SIEM systems (selection, implementation, operation, support). Managed Security Services (sales offerings & operations). Strong understanding of Cyber Security standards/frameworks: ISO 27000 series NIST COBIT CIS Controls HITRUST CSF FISMA Proven track record in presales (sales pitches, presentations, requirement gathering, technical discussions). Comprehensive understanding of sales and tendering processes . Experience collaborating with partners, handling scope discussions, and resolving conflicts. Key Responsibilities Prepare technical and commercial proposals in response to RFP/RFI/RFQ across: SOC Services Infrastructure Security VAPT Services Application Security Cloud Security Data Security Managed Security Services Develop complete proposal content including: SoW/requirements Technical solution write-ups Product descriptions Assumptions & constraints BoM (Bill of Materials) Service & delivery methodology Project management methodology Timelines Commercials, terms & conditions Team profiles, success stories, and company profile Support presales by conducting demos, presentations, PoCs, and technical discussions. Work closely with cybersecurity teams to align solutions with customer requirements. Develop strategic bid plans aligned with market trends and organizational goals. Coordinate with cross-functional teams (sales, legal, technical) to deliver high-quality proposals. Drive quality assurance and continuous improvement in bid processes. Stay updated on cybersecurity trends to guide solution strategies. Skills Requirements Excellent command of English (written and spoken). Strong presentation and communication skills. Ability to engage with stakeholders at all levels. Strong organizational and project management skills. Strategic thinker with problem-solving ability. Proficient in bid management tools and MS Office Suite (Word, Excel, PowerPoint). Ability to work on dynamic timelines and manage 6+ engagements simultaneously . Other Requirements Willingness to travel occasionally to Qatar (approx. 10%) . Education & Certifications Bachelor’s degree in Computer Science, Engineering, Information Technology, or a related field. Highly desired Cybersecurity certifications (in priority order): CISSP CISM CEH PCCSA PCNSA CCSP GIAC ECSA CySA+ Security+ PenTest+ CASP
Posted 2 weeks ago
3.0 - 8.0 years
10 - 20 Lacs
gurugram
Work from Office
Your potential, unleashed. India's impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilientnot only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks. Your work profile. We are seeking a skilled SOC Operations professional to manage, maintain, and enhance our SOC platform, ensuring effective monitoring, detection, and response to security incidents. The ideal candidate will have strong experience in SOC administration, threat detection, and SOC operations to provide continuous security improvements and support to the SOC team. Key Responsibilities: Conduct in-depth investigation of security incidents including data collection, root cause analysis, and recovery efforts, ensuring compliance with defined SLAs. Validate and fine-tune correlation rules, use-cases, and custom detections in SIEM tools to reduce false positives and improve detection fidelity. Propose new SIEM use cases with playbook creation based on threat intelligence, evolving TTPs, or internal security gaps. Conduct alert quality reviews, enhancing or retiring outdated detection logic and recommending improved strategies. Provide mentorship and analytical support to L1 analysts, helping them enhance detection and response capabilities. Continuously monitor SIEM and other security tools for alerts indicating potential threats, policy violations, or anomalies in the network. Lead incident response activities, focusing on containment and eradication of threats while ensuring forensic integrity for post-event analysis. Correlate data from various sources to identify security incidents and create actionable intelligence. Collaborate with cross-functional teams and subject matter experts to resolve complex technical issues swiftly. Review logs, metrics, and system behavior to identify patterns and early indicators of compromise. Document incidents, root cause, and resolution steps in a structured manner, and contribute to the refinement of incident response playbooks. Share security knowledge and threat insights across the team to promote continuous learning and improvement. Keep leadership informed of high-priority incidents and propose tactical/strategic countermeasures. Ensure adherence to internal policies, regulatory requirements, and industry best practices throughout all SOC processes. Education: Bachelors degree in Computer Science, Cybersecurity, or related field, or equivalent experience Required Skill Set: 410 years of professional experience in Information Security, SOC operations or incident response. Strong knowledge of cybersecurity frameworks and methodologies including MITRE ATT&CK, Cyber Kill Chain and NIST IR. God Knowledge in Cloud Security concepts and toolsexperience with EDR, DLP, and Firewall technologies is a must. Deep understanding of core network and security principles (Operating systems, TCP/IP, ports, detection/IDS/IPS, etc.). Working knowledge of malware analysis and sandbox environments. Ability to interpret complex alerts and logs from diverse sources and translate them into practical response actions. Excellent communication, documentation, and collaboration skills to interact with stakeholders at all levels. How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organization and the business area you’re applying to. Check out recruiting tips from Deloitte professionals. *Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices. At Deloitte, ethics and integrity are fundamental and noat negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution.
Posted 3 weeks ago
5.0 - 9.0 years
0 Lacs
hyderabad, telangana
On-site
As a Splunk Security Engineer / SOC Specialist at our TOP MNC, you will have the opportunity to work on cutting-edge Splunk deployments and drive innovation in cybersecurity operations. If you are passionate about security, analytics, and enjoy solving complex problems, we invite you to join our team. We are looking for individuals with 5-8 years of experience who are immediate joiners and willing to work in a Pan India(Hybrid) location. In this role, you will be responsible for driving complex Splunk deployments, addressing unique customer challenges, and working across diverse use cases. Your responsibilities will include leveraging best practices to create innovative solutions that maximize Splunk adoption and value. You will be involved in performing advanced SOC operations such as monitoring, alerting, escalation, and incident resolution. Additionally, you will triage and resolve incidents that go beyond predefined procedures, assist clients with advanced incident response and remediation, and conduct advanced intelligence research activities. If you are someone who excels in high-impact environments and is eager to contribute to the field of cybersecurity, we encourage you to apply now or share your CV at kalyani@coretek.io. Join us in making a difference in the world of cybersecurity and driving forward innovation in the industry.,
Posted 3 weeks ago
3.0 - 6.0 years
2 - 6 Lacs
Hyderabad, Telangana, India
On-site
The SOC Tier 2 Analyst acts as the primary escalation point for Tier 1 analysts, leading the investigation and coordination of security incidents. This role is critical to maintaining strong cybersecurity defenses by conducting advanced threat detection, in-depth incident analysis, and supporting response efforts. The analyst contributes to process improvement, threat hunting, and ongoing SOC maturity through mentoring and collaboration across security teams. Roles & Responsibilities Act as the main escalation point for Tier 1 analysts, offering technical expertise and guidance Perform advanced analysis of security events using SIEM, EDR, IDS/IPS, and firewall logs Investigate and respond to threats aligned with MITRE ATT&CK tactics and techniques Lead incident response activities including containment, eradication, and recovery Conduct forensic analysis and artifact review to identify root cause and scope Collaborate with threat intelligence and threat hunting teams to enhance detection capabilities Develop and refine SOC standard operating procedures (SOPs) and playbooks Coordinate with engineering teams to tune and optimize security tools and controls Mentor Tier 1 analysts to elevate SOC capabilities and ensure knowledge transfer Support security audits, compliance initiatives, and reporting as needed Basic Qualifications Master's degree in Information Technology or Cybersecurity OR Bachelor's degree with minimum 1 year of experience in Security Operations or related field OR Diploma with minimum 2 years of experience in Security Operations or related field Must-Have Skills Strong understanding of SOC operations, event triage, and incident escalation Experience analyzing cyber threats and attacker TTPs Proficient in tools such as SIEM (Splunk, QRadar, Sentinel), EDR (CrowdStrike, Defender ATP), IDS/IPS Experience managing incident response across detection, containment, eradication, and recovery Working knowledge of Windows and Linux security, including log analysis and scripting (PowerShell, Bash) Good-to-Have Skills Exposure to 24/7 SOC operations and shift leadership Experience with forensic tools (Volatility, Autopsy, FTK) and malware analysis Familiarity with cloud security monitoring (AWS, Azure, GCP) Knowledge of cybersecurity frameworks such as MITRE ATT&CK, NIST CSF, and CIS controls Hands-on threat hunting experience Professional Certifications CompTIA Security+, CEH, GSEC, GCFA, MTA Security Fundamentals, CISSP (preferred) Soft Skills Strong communication and collaboration skills with global teams Ability to prioritize effectively in high-pressure, fast-paced environments Strong critical thinking and problem-solving abilities Commitment to continuous learning and proactive knowledge sharing
Posted 1 month ago
5.0 - 10.0 years
0 Lacs
navi mumbai, maharashtra
On-site
Eventus Security is a prominent cybersecurity solutions provider specializing in threat detection, incident response, and managed security services. The organization aims to assist clients in proactively securing their digital assets through cutting-edge technologies and expert-driven services. By prioritizing innovation and trust, Eventus Security empowers businesses to remain resilient in the constantly evolving cyber threat landscape. The ideal candidate for the position of Security Lead (L3) SOC at Eventus Security should possess 5-10 years of relevant experience. The job locations for this role are Navi Mumbai and Ahmedabad. Key Responsibility Areas: Security Incident Leadership: - Take charge of high-priority security investigations and incident response activities. - Ensure accurate analysis, containment, remediation, and post-incident reporting. Operational Oversight: - Supervise day-to-day Security Operations Center (SOC) operations. - Manage shift handovers, escalation procedures, and ensure continuous operations in a 24/7 environment serving global customers. Technical Expertise: - Serve as the escalation point for complex threats and security incidents. - Conduct in-depth analysis of logs, packets, malware, and behavioral patterns using EDR, XDR, SIEM, and forensic tools. Threat Detection and Hunting: - Proactively hunt for threats using various data sources and tools. - Develop and optimize detection use-cases, correlation rules, and playbooks to enhance threat visibility and decrease dwell time. Process & Playbook Management: - Develop, refine, and enforce standard operating procedures (SOPs), playbooks, and incident response workflows. - Drive consistent and measurable outcomes through effective process management. Customer Engagement: - Engage with global stakeholders, particularly clients from the US and Canada. - Provide clear incident briefings, RCA reports, and advisory support to clients. Collaboration and Mentorship: - Mentor L1 and L2 analysts and facilitate training sessions. - Support skill development across shifts to enhance team capabilities. Continuous Improvement: - Participate in tuning detection content and tool configurations. - Support red/blue/purple team exercises to enhance SOC maturity. Documentation and Reporting: - Maintain high-quality documentation of incidents, processes, and technical findings. - Contribute to executive and operational reporting to ensure transparency and accountability.,
Posted 1 month ago
2.0 - 12.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Associate Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. As a cybersecurity generalist at PwC, you will focus on providing comprehensive security solutions and experience across various domains, maintaining the protection of client systems and data. You will apply a broad understanding of cybersecurity principles and practices to address diverse security challenges effectively. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us. At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firms growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: We are seeking a professional to join our Cybersecurity and Privacy services team, where you will have the opportunity to help clients implement effective cybersecurity programs that protect against threats, drive transformation, and foster growth. As companies increasingly adopt digital business models, the generation and sharing of data among organizations, partners, and customers multiply. We play a crucial role in ensuring that our clients are protected by developing transformation strategies focused on security, efficiently integrating and managing new or existing technology systems, and enhancing their cybersecurity investments. As an L3 Analyst/SOC Manager, you will be responsible for overseeing regular operations, driving continuous improvement processes, and managing client and vendor interactions. This role involves managing complex incidents escalated from L2 analysts, operating the Security Incident process, and mentoring junior team members to build a cohesive and motivated unit. Responsibilities Review cybersecurity events analyzed by L2 security analysts, serving as the escalation point for detection, response, and remediation activities. Monitor and guide the team in triaging cybersecurity events, prioritizing, and recommending/performing response measures. Provide technical support for IT teams in response and remediation activities for escalated cybersecurity events/incidents. Follow up on cybersecurity incident tickets until closure. Guide L1 and L2 analysts in analyzing events and response activities. Expedite cyber incident response and remediation activities when delays occur, coordinating with L1 and L2 team members. Review and provide suggestions for information security policies and best practices in client environments. Ensure compliance with SLAs and contractual requirements, maintaining effective communication with stakeholders. Review and share daily, weekly, and monthly dashboard reports with relevant stakeholders. Update and review documents, playbooks, and standard operational procedures. Validate and update client systems and IT infrastructure documentation. Share knowledge on current security threats, attack patterns, and tools with team members. Create and review new use cases based on evolving attack trends. Analyze and interpret Windows, Linux OS, firewall, web proxy, DNS, IDS, and HIPS log events. Develop and maintain threat detection rules, parsers, and use cases. Understand security analytics and flows across SaaS applications and cloud computing tools. Validate use cases through selective testing and logic examination. Maintain continuous improvement processes and build/groom teams over time. Develop thought leadership within the SOC. Mandatory Skill Sets Bachelors degree (minimum requirement). 2-8 years of experience in SOC operations. Experience analyzing malicious traffic and building detections. Experience in application security, network security, and systems security. Knowledge of security testing tools (e.g., BurpSuite, Mimikatz, Cobalt Strike, PowerSploit, Metasploit, Nessus, HP Web Inspect). Proficiency in common programming and scripting languages (Python, PowerShell, Ruby, Perl, Bash, JavaScript, VBScript). Familiarity with cybersecurity frameworks and practices (OWASP, NIST CSF, PCI DSS, NY-DFS). Experience with traditional security operations, event monitoring, and SIEM tools. Knowledge of MITRE or similar frameworks and procedures used by adversaries. Ability to develop and maintain threat detection rules and use cases. Preferred Skill Sets Strong communication skills, both written and oral. Experience with SMB and large enterprise clients. Good understanding of ITIL processes (Change Management, Incident Management, Problem Management). Strong expertise in multiple SIEM tools and other SOC environment devices. Knowledge of firewalls, IDS/IPS, AVI, EDR, Proxy, DNS, email, AD, etc. Understanding of raw log formats of various security devices. Foundational knowledge of networking concepts (TCP/IP, LAN/WAN, Internet network topologies). Relevant certifications (CEH, CISA, CISM, etc.). Strong work ethic and time management skills. Coachability and dedication to consistent improvement. Ability to mentor and encourage junior teammates. Knowledge of regex and parser creation. Ability to deploy SIEM solutions in customer environments. Years Of Experience Required 2-12 + years Education Qualification B.Tech Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering Degrees/Field Of Study Preferred Certifications (if blank, certifications not specified) Required Skills SoCs Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Azure Data Factory, Communication, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture, Security Compliance Management, Security Control, Security Incident Management, Security Monitoring + 3 more Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship No Government Clearance Required No Job Posting End Date Show more Show less
Posted 1 month ago
6.0 - 10.0 years
0 Lacs
karnataka
On-site
As a Senior Specialist in Cyber Security Operations at AB InBev GCC, you will have the exciting opportunity to be a part of a growing team of top professionals dedicated to protecting AB InBev from sophisticated threats. Your role will involve working as a Cyber threat hunter, investigating security alerts, and responding to incidents within defined timelines. You will collaborate with incident responders in a 24x7 shift model and utilize your deep knowledge of security tools and platforms to monitor threats and new attack techniques. Key tasks and accountabilities include monitoring, responding, and processing security alerts triggered from various SOC tools deployed across on-premises and cloud environments. You will investigate events, create incident storylines, and communicate necessary remediation steps. Additionally, you will co-relate different log sources, own incidents till completion, adhere to SLAs, and collaborate with internal teams for automation and process improvements. In this role, you will act as an Incident commander during critical incidents, prepare incident reports, create incident response SOPs, and seek opportunities to drive efficiencies. Your ability to effectively communicate complex technology to non-tech audiences, collaborate with stakeholders, and ensure client satisfaction will be crucial. Moreover, you will continuously enhance your threat hunting skills, stay updated on security standards, and work towards improving defensive controls. To qualify for this role, you should ideally have a Bachelor's degree in Computer Science or Information Systems, along with 6+ years of experience in incident response, CISRT, and SOC operations. You should possess expertise in EDR, SIEM, log analysis tools, and cloud security solutions. Security certifications such as CEH, CHFI, or CompTIA Security+ would be a plus. Your strong analytical skills, knowledge of operating systems, and networking concepts will be essential for success in this role. If you have a passion for cyber security, a desire to excel in a global team environment, and an undying love for beer, then this role at AB InBev GCC is the perfect opportunity for you to dream big and create a future with more cheers.,
Posted 1 month ago
5.0 - 10.0 years
0 Lacs
karnataka
On-site
You should have at least 7 years of experience in the Information Security field, specifically with direct experience in SOAR or other automation solutions. Your expertise should include Palo Alto XSOAR with SOC Operations understanding, with a focus on resolving Security Incidents and automating related tasks. A minimum of 5 years of hands-on experience in SOC / Incident Response is required. Additionally, you should possess experience with SOAR or other automation solutions (e.g., IT automation, SIEM, case management) and have a strong background in triaging security events using various tools like SIEM, SOAR, and XDR in a security operations environment. Proficiency in scripting and development skills (e.g., BASH, Perl, Python, or Java) along with a solid understanding of regular expressions is crucial for this role. This position falls under the Others category and is a Full-Time role located in Bangalore/Pune. The ideal candidate should have 7-10 years of relevant experience and be available to start immediately.,
Posted 1 month ago
8.0 - 12.0 years
0 Lacs
noida, uttar pradesh
On-site
You are an experienced professional with over 8 years of experience, seeking to set up SOC L1 operations, develop processes, procedures, and integrate teams. In this role, you will collaborate with Cadence SOC L2/L3 teams to establish a fully operational L1 framework. Your expertise in tools used in the SOC ecosystem such as Splunk, Devo, and Sentinel One is essential. Your key responsibilities will include designing and implementing SOC L1 workflows, processes, and escalation paths, onboarding and guiding the L1 team to align with L2/L3 operations, developing SOPs, incident response playbooks, and documentation. You will configure monitoring tools and dashboards for effective threat management and provide full-time onsite support for 6-8 weeks, transitioning to part-time remote support. To excel in this role, you should have proven experience in SOC operations and team setup, strong knowledge of SOC tools like SIEM and cybersecurity frameworks, excellent documentation, and communication skills. Possessing relevant certifications such as Security+ or CSA would be advantageous. This is a full-time position with a rotational shift schedule. The job requires you to be based in Noida, Uttar Pradesh and have the flexibility to commute or relocate before starting work. You will also be expected to provide details regarding your current CTC, expected CTC, notice period, current location, the level you are supporting, years of experience in SOC tools and cybersecurity frameworks, experience in Splunk and Sentinel One, and your comfort level with 24/7 support. If you meet the qualifications and are ready to take on the challenges of setting up SOC L1 operations and collaborating with cross-functional teams, this role offers an exciting opportunity to contribute to Cadence's cybersecurity initiatives.,
Posted 1 month ago
6.0 - 10.0 years
0 Lacs
coimbatore, tamil nadu
On-site
As a SOC Architect at Sennovate, located in Coimbatore, you will be a part of an Information Security managed Security Service provider specializing in Identity and Access Management (IAM) and Security Operations Center (SOC) powered by AI. Your role will involve leading the SOC Team with a strong focus on research and development in the Security domain. If you align with Sennovate's culture, which emphasizes accountability, respect, continuous learning, personal ownership, rejecting average standards, showing gratitude, and valuing time and simplicity, then you are the right fit for this role. Your responsibilities will include providing technical leadership in designing, implementing, and maintaining SOC systems. You will be expected to embrace thought leadership, provide mentorship to team members, and develop strategies to enhance security protocols, incident response, and threat detection capabilities. Additionally, you will drive improvements in SOC processes, workflows, and toolsets, while also leading the R&D team in exploring innovative security solutions. The ideal candidate will hold a Bachelor's degree in Computer Science, Information Technology, or a related field, with 6-10 years of extensive experience in SOC operations, security architecture, and design. Hands-on experience with security tools across various platforms, strong knowledge of Linux and Windows OS, and an understanding of security architectures are required. Additionally, the candidate should have excellent communication and presentation skills, demonstrated expertise in leading R&D initiatives, and relevant certifications such as CISSP, CISM, or CISA would be advantageous. Strong leadership, communication, and problem-solving skills are also essential for this role.,
Posted 1 month ago
5.0 - 9.0 years
0 Lacs
maharashtra
On-site
When you join Trend, you become part of a unique and diverse global family and you get to work towards a world safe for exchanging digital information. The Sales Engineer (SE) for India will play a crucial role as the technical bridge between our Sales Representatives and their pre-sales customers. As a Trend Micro product expert, you will guide customers and prospects in the selection and deployment of Trend Micro Next-Gen security solutions. You will take joint ownership with the Sales team in developing customer relationships and provide leadership in security architecture. Your strong problem-solving skills will help influence customers" technical strategy. As a trusted advisor, you will develop an understanding of customer needs, risks, tolerance, and technology gaps. Apart from your role as a technologist, you are expected to understand the customer journey with our product and ensure a smooth experience for customers throughout their engagement, onboarding, and product usage. Customer success is a top priority, and you will play a key role in enabling a positive customer experience. You will also be responsible for building and training the sales organization, acting as a storyteller to help the sales team sell more effectively. Understanding the emerging ecosystem of cybersecurity partners like SOC services partners, CSPs (cloud service partners), MSSPs, etc., will be essential. You will work closely with channel partners to upscale and train them for better customer engagement. Additionally, you will provide routine updates on new products/technologies to internal sales staff and collaborate with Regional/Global Product Managers and Product Marketing Managers to stay updated on the latest trends. Your responsibilities will include confidently delivering technical demonstrations, encouraging partners and channels to propose our products effectively, presenting technical solutions to all levels of an organization, designing customer-centric solutions, delivering training to customers and prospects, ensuring quality support and customer health, contributing to best practices, and continuous learning to maintain current technical knowledge. Experience in delivering high-quality presales support and solutions, understanding SOC operations, security analytics capabilities, cloud architecture, cloud native application security, SASE, CASB, Zero trust model, and knowledge of Microsoft O365, Azure, Google, AWS services will be advantageous. Exposure to security software solutions and good communication skills in English are required. A strong interest in cybersecurity and public cloud technologies like AWS and Azure is essential. Sales Engineers at Trend Micro actively participate in webinars, workshops, and industry events as speakers or panelists. Strong public speaking skills will be an added advantage to excel in this role. Join Trend Micro, embrace change, empower people, encourage innovation, and thrive with us.,
Posted 1 month ago
10.0 - 15.0 years
15 - 20 Lacs
Noida, Gurugram, Greater Noida
Work from Office
Advanced knowledge in handling security incidents and leading investigations. Proficiency in managing and optimizing SOC operations. Experience in implementing security protocols and policies. Expertise in Malware Reverse Engineering, Required Candidate profile Certified Information Systems Security Professional (CISSP). Certified Information Security Manager (CISM). GIAC Certified Enterprise Defender (GCED). Certified Information Security Auditor (CISA),
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
pune, maharashtra
On-site
The primary responsibility as an Infoscion is to actively support the consulting team in various project phases, such as problem definition, effort estimation, diagnosis, solution generation, design, and deployment. You will be tasked with exploring alternatives to recommended solutions through thorough research, including literature surveys, public domain information, vendor evaluations, etc., and developing proof of concepts. Additionally, you will be responsible for creating requirement specifications from business needs, defining processes, and detailed functional designs based on requirements. Configuring solution requirements, diagnosing issues, identifying root causes, seeking clarifications, and shortlisting solution alternatives will also be part of your role. Furthermore, you are expected to contribute to unit-level and organizational initiatives to deliver high-quality solutions that add value to customers. If you believe you possess the skills to assist clients in their digital transformation journey, this opportunity is tailored for you. In terms of technical requirements, proficiency in Technology Infrastructure Security, SOC Operations, Security Incident and Event Management (SIEM), Oracle Cloud Service, Cloud RightNow, and Desktop Workflow is essential. Moreover, you should be able to collaborate with clients to identify business challenges and contribute to refining, analyzing, and structuring relevant data for client deliverables. Staying abreast of the latest technologies and trends, possessing logical thinking, problem-solving skills, and the ability to collaborate effectively are also crucial. You should be capable of assessing current processes, pinpointing improvement areas, and recommending suitable technology solutions. Having knowledge in one or two industry domains is considered advantageous. Preferred Skills: - Technology: Infrastructure Security, SOC Operations - Technology: Infrastructure Security, Security Incident and Event Management (SIEM) - Technology: Security Operations, Threat Intelligence,
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |