Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 5.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
Are you someone who jumps into action when something breaks Do you enjoy digging into dashboards, logs, and alerts to find out what went wrong Were looking for a Product Support Engineer who loves solving problems and working closely with teams to keep systems running smoothly. In this role, you&aposll be the first point of contact for production issues. You&aposll monitor system health, investigate alerts, and work with Engineering, DevOps, Product, and Customer Support teams to fix problems fast. From resolving customer support tickets to setting up alerts and dashboards, your work will directly impact the stability and reliability of our services. If you&aposre hands-on with monitoring tools, understand cloud basics, can dig into logs, and are eager to take ownership of production support, we&aposd love to connect with you. What You&aposll Do: Monitor system health and performance using tools like Grafana, New Relic, Datadog, Sumo Logic, Dynatrace, etc. Create and maintain dashboards, alerts, and log queries to improve visibility and issue detection. Respond to and resolve support tickets by working closely with customer support and engineering teams. Use Jira to track issues, bugs, and tasks; keep them updated with clear status and progress. Document processes, known issues, and solutions in Confluence and maintain operational playbooks. Troubleshoot and analyze production issues using logs and monitoring data. Support root cause analysis and contribute to post-incident reviews. Assist in automating routine tasks and improving support workflows. Communicate effectively with both technical and non-technical stakeholders. Apply basic SQL and programming knowledge for debugging and data checks. Collaborate with engineering, DevOps, product, and customer support teams to ensure fast resolution and continuous improvement. What Were Looking For: B.Tech / MCA in Computer Science, IT, or a related field 3+ years of experience in a technical support, product support, or site operations role Hands-on experience with monitoring and observability tools like Grafana, New Relic, Datadog, Sumo Logic, Dynatrace, etc. Experience in creating dashboards, setting up alerts, and analyzing logs Working knowledge of Jira (issue tracking) and Confluence (documentation) Basic understanding of cloud platforms such as AWS or GCP Strong problem-solving skills with a proactive mindset Familiarity with SQL for basic querying and troubleshooting Basic programming or scripting experience (e.g., Python, Bash) Good communication skills and ability to collaborate across teams (engineering, DevOps, product, and support) About Kissht: Kissht, a Great Place to Work certified organization, is a consumer-first credit app that is transforming the landscape of consumer credit. As one of the fastest-growing and most respected FinTech companies, Kissht is a pioneer in data and machine-based lending. With over 15 million customers, including 40% from tier 2 cities and beyond, we offer both short and long-term loans for personal consumption, business needs, and recurring expenses. Founded by Ranvir and Krishnan, alumni of IIT and IIM, and backed by renowned investors like Endiya Partners, the Brunei Investment Authority, and the Singapore Government, Kissht is synonymous with excellence in the industry. Join us and be a part of a dynamic, innovative company that is changing the future of financial technology. Show more Show less
Posted 2 days ago
6.0 - 10.0 years
10 - 15 Lacs
Bengaluru
Work from Office
We are looking for a Senior Site Reliability Engineer, to join our Service Reliability and Operation group. We provide innovative team collaboration and an opportunity to build, operate and support scalable and reliable services that underpin Thomson Reuters products. About the Role In this opportunity as a Senior Site Reliability Engineer, you will: Be a Professional SRE: Implement site reliability engineering and DevOps best practices. Feed non-functional requirements into the product backlog, such as, but not limited to, high availability, scalability, self-healing, observability, continuous delivery, security Build and maintain monitoring for all aspects of infrastructure, micro-services and the platform and implement Alerting mechanism using cloud native solutions Provide primary operational support and engineering for distributed platforms Act as the go to person for any production issue. Troubleshoot and monitor until successful mitigation, communicate effectively, postmortem and implementation of the learnings. Maintain IaCand CICD and promote best practices for our CI/CD processes Focus on Continuousimprovement andtechnical standardsdrive improvements in productivity,monitoring,toolingand set industry best practices. On-call Rotation:Participate in on-call/shift rotations. When on-call, you are expected to drive the troubleshooting and mitigation activities while working on incident Be innovative and curious: Maintain end-to-end security ensuring that we meet best practices standards Keepup-to-datewith emerging cloud technology trends, especially around DevOps, Service Reliability and Security. Adopt pan-TR operation principles to ensure consistency and efficiency Documenting tribal knowledge. Constant upkeep of documentation and runbooks can ensure that teams get the information they need right when they need it Be collaborative: Extreme collaboration within our teams Canada, US, Mexico and India About you: Youre a fit for the role of Senior Site Reliability Engineer if you: Bachelors degree in computer science or related field - a must Minimum of 6-10 yearsofexperience as DevOps/SRE engineer andCloud engineerwith hands-on experience in AWS cloud technologies. Highly skilled in UNIX/Linux-based Systems Proven experience in building and operating PRODUCTION cloud-native infrastructure, applications, and services on AWS. Experience or knowledge of Container technology such as Docker, Kubernetes and Istio service mesh Must have experience using AWS services (such as Cloud Front, EKS, ECS, RDS, Threat detection and other security controls) Must have 2+ years scripting and programming experience(PowerShell, Bash) Experience or knowledge of Observability toolsDataDog, ELK, SumoLogic, CloudWatch Experience or knowledge with Version Control and CI/CD (Git/ Azure DevOps / JFrog Artifactory) Experience or knowledge writing Infrastructure as Code (IaC) (Terraform / CloudFormation / other) Team player with a can do attitude#LI-SS6 Whats in it For You Hybrid Work Model Weve adopted a flexible hybrid working environment (2-3 days a week in the office depending on the role) for our office-based roles while delivering a seamless experience that is digitally and physically connected. Flexibility & Work-Life Balance: Flex My Way is a set of supportive workplace policies designed to help manage personal and professional responsibilities, whether caring for family, giving back to the community, or finding time to refresh and reset. This builds upon our flexible work arrangements, including work from anywhere for up to 8 weeks per year, empowering employees to achieve a better work-life balance. Career Development and Growth: By fostering a culture of continuous learning and skill development, we prepare our talent to tackle tomorrows challenges and deliver real-world solutions. Our Grow My Way programming and skills-first approach ensures you have the tools and knowledge to grow, lead, and thrive in an AI-enabled future. Industry Competitive Benefits We offer comprehensive benefit plans to include flexible vacation, two company-wide Mental Health Days off, access to the Headspace app, retirement savings, tuition reimbursement, employee incentive programs, and resources for mental, physical, and financial wellbeing. Culture: Globally recognized, award-winning reputation for inclusion and belonging, flexibility, work-life balance, and more. We live by our valuesObsess over our Customers, Compete to Win, Challenge (Y)our Thinking, Act Fast / Learn Fast, and Stronger Together. Social Impact Make an impact in your community with our Social Impact Institute. We offer employees two paid volunteer days off annually and opportunities to get involved with pro-bono consulting projects and Environmental, Social, and Governance (ESG) initiatives. Making a Real-World Impact: We are one of the few companies globally that helps its customers pursue justice, truth, and transparency. Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. Thomson Reuters informs the way forward by bringing together the trusted content and technology that people and organizations need to make the right decisions. We serve professionals across legal, tax, accounting, compliance, government, and media. Our products combine highly specialized software and insights to empower professionals with the data, intelligence, and solutions needed to make informed decisions, and to help institutions in their pursuit of justice, truth, and transparency. Reuters, part of Thomson Reuters, is a world leading provider of trusted journalism and news. We are powered by the talents of 26,000 employees across more than 70 countries, where everyone has a chance to contribute and grow professionally in flexible work environments. At a time when objectivity, accuracy, fairness, and transparency are under attack, we consider it our duty to pursue them. Sound excitingJoin us and help shape the industries that move society forward. As a global business, we rely on the unique backgrounds, perspectives, and experiences of all employees to deliver on our business goals. To ensure we can do that, we seek talented, qualified employees in all our operations around the world regardless of race, color, sex/gender, including pregnancy, gender identity and expression, national origin, religion, sexual orientation, disability, age, marital status, citizen status, veteran status, or any other protected classification under applicable law. Thomson Reuters is proud to be an Equal Employment Opportunity Employer providing a drug-free workplace. We also make reasonable accommodations for qualified individuals with disabilities and for sincerely held religious beliefs in accordance with applicable law. More information on requesting an accommodation here. Learn more on how to protect yourself from fraudulent job postings here. More information about Thomson Reuters can be found on thomsonreuters.com.
Posted 3 days ago
5.0 - 8.0 years
18 - 23 Lacs
Pune
Work from Office
Overview We are looking for a Security Engineer III to join the Critical Start Technologies Private Ltd. team, operating under the Critical Start umbrella, supporting our India operations. This is an exciting opportunity for a skilled security professional with 5–8 years of hands-on experience in security engineering, threat detection, and investigation. We are looking for a curious, technically adept individual who thrives in a fast-paced, high-impact environment. You bring deep technical expertise, a proactive mindset, and a passion for solving complex security challenges using industry-leading tools and frameworks. The ideal candidate is a driven and resourceful security professional who thrives on diving deep into threat activity—whether it’s analyzing port scans or crafting custom detection queries. With a strong understanding of the MITRE ATT&CK framework, you’re capable of building your own detection content and conducting investigations independently, without relying solely on predefined rules. You take initiative, enjoy improving processes, and excel in autonomous, project-based environments. Your analytical mindset, technical curiosity, and collaborative spirit enable you to contribute meaningfully to both team goals and larger security objectives. Responsibilities Investigate and validate alerts generated by industry-standard EDR and SIEM platforms, ensuring data quality and investigative clarity for our Security Operations Center (SOC). Proactively identify opportunities to improve alert fidelity through detection tuning, custom rule development, and the creation of IOCs and IOAs. Author and maintain clear, user-centric investigation procedures to guide SOC analysts and drive consistency in alert handling. Collaborate cross-functionally with Engineering and Product teams to enhance security tools and improve platform efficacy. Conduct periodic quality assurance checks on alerts—especially during platform updates or vendor API changes—to maintain actionable fidelity. Design, write, and translate threat detection content across tools including but not limited to Splunk, Microsoft Sentinel, Devo, Microsoft 365 Defender, Palo Alto Cortex XDR, CrowdStrike, and SentinelOne. Lead internal knowledge-sharing sessions and mentor junior team members to foster a culture of collaboration and continuous learning. Operate effectively in a global, agile team spanning multiple time zones, balancing independence with team collaboration. Qualifications Required Qualifications: 5+ years of experience in cybersecurity with a focus on threat detection, security engineering, or incident investigation. Hands-on experience with multiple EDR and SIEM tools such as Splunk, Microsoft Sentinel, Devo, Microsoft 365 Defender, Palo Alto Cortex XDR, CrowdStrike, SentinelOne, Carbon Black, or Cylance. Proficiency in one or more query languages (e.g., SPL, KQL, Sumo Logic). Experience building use cases for SIEM platforms and a solid grasp of log source types including firewalls, operating systems, and proxies. Strong verbal and written communication skills with the ability to convey complex concepts to both technical and non-technical stakeholders. Ability to work independently while effectively collaborating with distributed teams. Familiarity with tools like GitHub, Jira, and Confluence. Preferred Qualifications: Professional certifications such as OSCP, CISSP, or equivalent. Experience creating parsers or custom log processing logic. Exposure to agile development environments and DevSecOps culture.
Posted 2 weeks ago
5.0 - 10.0 years
6 - 13 Lacs
Pune
Work from Office
Job Title: SOC L2/L3 Support Location: Pune (5 days WFO) 24/7 Support Experience: 5+ Job Type: Full Time Employment Expertise You'll Bring: Bachelors degree in computer science, Information Security, or a related field (or equivalent experience). 5+ years of experience in a cybersecurity role, preferably in a SOC environment. Strong understanding of cybersecurity principles, concepts, and technologies. Experience with security monitoring tools such as QRadar, Palo Alto, Splunk, CrowdStrike, SentinelOne, SIEM, IDS/IPS, and endpoint detection platforms. Familiarity with incident response procedures and frameworks (e.g., NIST, SANS). Excellent analytical and problem-solving skills. Strong communication and interpersonal skills. Relevant certifications (e.g., CompTIA Security+, GIAC Security Essentials) are a plus.
Posted 2 weeks ago
10.0 - 18.0 years
15 - 25 Lacs
Pune
Work from Office
Job Title: Security Operations Center (SOC) Lead Job Type: Full-time Experience: 10+ years Location: Pune, India Job Summary: We are seeking a highly skilled and proactive SOC Lead to manage and mature our 24x7 Security Operations Center. This role involves leading a team of 15 analysts (L1L3), supporting multiple customer environments, and driving operational excellence in threat detection, incident response, and SOC process improvement. The ideal candidate will have deep technical expertise in SIEM and EDR tools, strong leadership capabilities, and excellent communication skills. Required Skills & Experience: 10+ years of experience in cybersecurity, with at least 4 years in a SOC leadership role. Proven experience managing multi-tenant or MSSP environments. Hands-on expertise with: SIEMs: QRoC, Sumo Logic, Splunk, Palo Alto SIEM EDR tools: CrowdStrike, SentinelOne Strong knowledge of: SIEM rule creation and use case development Log source onboarding, integration, and troubleshooting Incident response lifecycle and threat detection methodologies Excellent communication and writing skills; ability to present to customers and executives. Experience in producing and interpreting SOC metrics and dashboards. Familiarity with frameworks such as MITRE ATT&CK, NIST, and SANS. Preferred Qualifications: Bachelor's degree in computer science, Information Security, or related field. Industry certifications such as CISSP, CISM, GCIA, GCIH, CEH, or equivalent. Experience with scripting (Python, PowerShell) for automation and enrichment. Exposure to cloud security monitoring (AWS, Azure, GCP). Work Environment: Require on-call availability and rotational shifts. Mandatory Skills: QRadar,/ QRoC/ Palo Alto SIEM/ Sumo Logic, Threat Intelligence and Detection, Incident Response, SIEM Desirable Skills: Threat Intelligence and Detection, QRoC, Incident Response, SIEM, Security, Operational Excellence, Process Improvement, Threat Intelligence, Vulnerability Management, Splunk, Scripting, Cloud Security, Monitoring
Posted 2 weeks ago
10.0 - 18.0 years
15 - 25 Lacs
Pune
Work from Office
Position Title: SOC Level 3 Implementation Engineer/Analyst Location: Pune (5 Days a week onsite) 24/7 Support Job Type: Full-time Qualifications Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience). 8+ years of experience in a cybersecurity role, with a focus on security solution design and implementation. Strong understanding of cybersecurity principles, concepts, and technologies, including network security, endpoint security, and threat detection. Experience with security technologies and tools, such as QRadar, Splunk, SumoLogic, Palo Alto SIEM & SOAR, CrowdStrike & SentinelOne EDR, firewalls, and endpoint protection platforms. Proficiency in scripting and automation languages (e.g., Python, PowerShell) for integration and workflow automation. Excellent analytical, problem-solving, and communication skills. Relevant certifications (e.g., CEH, CISSP, CCSP, CISM, GIAC) are preferred. Mandatory Skills Incident Response QRADAR/ Palo Alto SIEM/ Sumo Logic/ QRoc SIEM Desirable Skills Incident Response QRADAR SIEM Sumo Logic Work Flow Security Splunk Products Performance Automation and Orchestration Monitoring Scripting Powershell
Posted 2 weeks ago
4.0 - 8.0 years
0 Lacs
ahmedabad, gujarat
On-site
As an Experienced Systems Administrator, you will have a strong foundation in Linux, infrastructure management, and incident response. You will be skilled in monitoring, troubleshooting, and maintaining reliable systems across virtualized and cloud-based environments. Your main responsibilities will include collaborating with the operations team to manage escalations and oversee incident management. You will also be expected to implement strategies and solutions to enhance daily operations, focusing on system stability, security, and scalability. You will drive real-time monitoring of system performance and capacity, addressing alerts promptly to optimize systems. Leading troubleshooting efforts, you will coordinate responses to network and system issues. Your role will involve conducting and overseeing server, application, and network equipment setup and maintenance. Additionally, you will ensure effective outage notification and escalation for prompt resolution. Furthermore, mentoring and training team members on technical skills and troubleshooting methods will be a key part of your responsibilities. You will also be responsible for maintaining up-to-date documentation of processes and procedures in the WIKI. Key Skills: - Minimum 4 years of experience in Linux system administration. - Proficiency in datacenter technologies and cloud platforms such as AWS/GCP. - Experience in application deployment using tools like Git and StackStorm. - Strong troubleshooting skills across networks and systems, including familiarity with network protocols (TCP/IP, UDP, ICMP) and tools like TCPdump. - Advanced diagnostic skills in network performance and system capacity monitoring. - Proficiency in Linux command-line operations. - Analytical skills with the ability to interpret and act on data effectively. - Ability to prioritize and escalate issues efficiently. - Adaptability to shift work and capacity for multitasking in high-pressure scenarios. - Excellent leadership, communication, and interpersonal skills. - Bachelor's degree in Computer Science, Engineering (BE/B.Tech), MCA, or M.Sc. Desired Skills: - Basic experience with Configuration Management tools like Ansible, SaltStack, or StackStorm. - Basic experience with CI/CD tools like Jenkins. - Experience with monitoring tools such as Nagios, Sensu, Zabbix. - Basic experience with Log Analytics tools like Splunk, Elasticsearch, Sumo Logic, Prometheus, or Grafana. - Knowledge of Virtualization technologies like VMware, KVM. - Strong fundamentals in Linux, troubleshooting, and networking. - Knowledge of Containerization technologies like Kubernetes, Rancher. - Experience with Cloud Providers such as AWS or GCP. - Advanced knowledge of Networking concepts including BGP, F5 Load Balancer, and switching protocols. - Relevant certifications like RHCSA, CCNA, or equivalent. (hirist.tech),
Posted 2 weeks ago
15.0 - 20.0 years
13 - 17 Lacs
Gurugram
Work from Office
About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an L1 SOC Analyst you are the first line of defense in monitoring and triaging security alerts. You will work primarily with Sumo Logic SIEM and SOAR tools to identify potential security incidents, validate alerts, and escalate them according to the defined SOPs. You will ensure real-time visibility and log health while flagging suspicious activity promptly. This role is essential to ensuring timely detection and reducing noise from false positives Roles & Responsibilities:--Basic Security Knowledge:Understanding of key concepts (malware, phishing, brute force, etc.-SIEM Familiarity:Exposure to Sumo Logic UI and understanding how to read/query logs-Exposure to CrowdStrike Falcon Console:Ability to view and interpret endpoint alerts-Alert Triage:Ability to differentiate between false positives and real threats-Communication Skills: Clear written documentation and verbal escalation-Ticketing Systems:Familiarity with platforms like JIRA, ServiceNow, or similar-Basic understanding of cybersecurity fundamentals-Basic Scripting:Awareness of PowerShell or Python for log parsing-SOAR Exposure:Familiarity with automated triage workflows-Security Certifications:Security+, Microsoft SC-900, or similar certification-Operating System Basics:Windows and Linux process and file system awareness Professional & Technical Skills: -Monitor real-time alerts and dashboards in Sumo Logic SIEM-Perform initial triage on alerts and determine severity/priority-Escalate validated security incidents to L2 analysts per defined SOPs-Follow pre-defined SOAR playbooks to document or assist in response-Ensure alert enrichment fields are populated like host info, user details, etc.-Conduct basic log searches to support alert analysis-Perform daily health checks on log sources and ingestion pipelines-Maintain accurate ticket documentation for each alert handled-Participate in shift handovers and team sync-ups for awareness-SIEM:Basic log searching, correlation rule awareness-SOAR:Familiarity with playbook execution-Security Concepts:Basic understanding of malware, phishing, brute force-Tools:CrowdStrike EDR, Sumo Logic Additional Information:- The candidate should have minimum 2 years of experience in Security Information and Event Management (SIEM) Operations.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
3.0 - 8.0 years
13 - 17 Lacs
Gurugram
Work from Office
About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Level 2 SOC Analyst, your role involves deeper investigation of security alerts and confirmed incidents. You will validate escalated events using Sumo Logic and CrowdStrike Falcon, enrich them with context, and work closely with L3 analysts to assist in containment and timely remediation. You will also assist in improving detection fidelity and supporting SOAR automation. Roles & Responsibilities:-Intermediate Sumo Logic SIEM query and dashboarding skills-Alert Triage & Investigation:Experience investigating escalated alerts using SIEM or EDR-Hands-on experience with CrowdStrike EDR investigations-Incident Response and Containment:Take necessary actions to contain, eradicate and recover from security incidents.-Malware Analysis:Perform malware analysis using the sandboxing tools like CS etc.-SOAR Execution:Running and modifying basic playbooks in Sumo Logic SOAR-Incident Reporting and Documentation:Strong reporting skills with accurate detail capture to provide the RCA for the true positive security incidents with detailed documentation.-Communication & Collaboration:Send emails to request information, provide updates, and coordinate with different teams to ensure tasks are completed efficiently.-MITRE ATT&CK Mapping:Ability to classify incidents with tactics/techniques-Alert fine tuning recommendations to reduce false positive noise-Investigate alerts escalated by L1 to determine scope, impact, and root cause-Perform in-depth endpoint and network triage using CrowdStrike-Use CrowdStrike Falcon to perform endpoint analysis and threat validation-Correlate multiple log sources in Sumo Logic to trace attacker activity-Execute or verify SOAR playbooks for containment actions (isolate host, disable user)-Enrich events with asset, identity, and threat intelligence context-Document investigation workflows, evidence, and final conclusions-Support L3 during major incidents by performing log or memory triage-Suggest improvements in alert logic or SOAR workflow to reduce false positives-Conduct threat research aligned to alert patterns and business context-Enhance alert fidelity with threat intel and historical context-Document investigation findings and communicate with stakeholders Professional & Technical Skills: -Exposure to threat hunting techniques-Scripting to assist SOAR playbook tuning-Triage Automation:Ability to identify playbook gaps and recommend improvements-Cloud Security Basics:Awareness of log patterns from AWS/Azure-Log Analysis:Correlation and trend identification in Sumo Logic-Certifications:SC-200, CySA+, ECSA or relevant advanced certification-SIEM:Advanced queries, dashboards, correlation logic-SOAR:Execute and troubleshoot playbooks-Tools:CrowdStrike (RTR, detections, indicators), Sumo Logic SIEM-Threat Analysis:IOC enrichment, TTP identification-Primary Skill:Incident Investigation and Enrichment Additional Information:- The candidate should have minimum 3 years of experience in Security Information and Event Management (SIEM) Operations.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
15.0 - 20.0 years
13 - 17 Lacs
Bengaluru
Work from Office
About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As the SOC L3 Analyst you will lead the technical handling of critical security incidents. Youll be responsible for deep-dive analysis, root cause investigation, forensics, and containment using tools such as CrowdStrike, Sumo Logic SIEM, and SOAR. You will be responsible for onboarding and managing log sources, building SIEM use cases (custom + in built), and developing automation in SOAR to support incident response and threat detection workflows Roles & Responsibilities:-End-to-End Incident Response Ownership:Ability to handle incident lifecycle (detect, contain, remediate)-Subject matter expert for handling the escalated critical or actual true positive incidents.-CrowdStrike Deep Dive:Using Real Time Response (RTR), Threat Graph, custom IOA rules-Strong command over Sumo Logic SIEM content engineering:Creating detection rules, dashboards, and field extractions-Threat Hunting:Behavior-based detection using TTPs-SOAR Automation:Designing playbooks, integrations with REST APIs, ServiceNow, CrowdStrike-Threat Intel Integration:Automation of IOC lookups and enrichment flows-Forensic Skills: Live host forensics, log correlation, malware behavioral analysis-Deep experience in advanced threat detection and incident response-Scripting Proficiency:Python, PowerShell, Bash for automation or ETL-Error Handling & Debugging:Identify and resolve failures in SOAR or data pipelines-Proficiency in CrowdStrike forensic and real-time response capabilities-Experience Sumo Logic SOAR for playbook optimization-Use case development in Sumo Logic SIEM Professional & Technical Skills: -Lead high-severity incident response, coordinating with stakeholders and IT teams-Perform endpoint forensic triage using CrowdStrike Real Time Response (RTR)-Conduct detailed log analysis and anomaly detection in Sumo Logic-Customize or create new detection rules and enrichments in SIEM-Develop/Tune SOAR playbooks for advanced scenarios, branching logic, and enrichment-Perform root cause analysis and support RCA documentation-Mentor L1 and L2 analysts through case walk-throughs and knowledge sharing-Generate post-incident reports and present findings to leadership-Lead investigations and coordinate response for major incidents-Perform root cause analysis and post-incident reviews-Develop advanced detection content in Sumo Logic-Optimize SOAR playbooks for complex use cases-Onboard and maintain data sources in Sumo Logic SIEM and ensure parsing accuracy-Build custom dashboards, alerts, and queries aligned with SOC use cases-Create and maintain field extractions, log normalization schemas, and alert suppression rules-Integrate external APIs into SOAR (e.g., VirusTotal, WHOIS, CrowdStrike)-Monitor log health and alert performance metrics; troubleshoot data quality issues-Collaborate with L3 IR and Threat Intel teams to translate threat use cases into detections-Participate in continuous improvement initiatives and tech upgrades-Conduct playbook testing, version control, and change documentation-CrowdStrike:Custom detections, forensic triage, threat graphs-SIEM:Rule creation, anomaly detection, ATT&CK mapping-SOAR:Playbook customization, API integrations, dynamic playbook logic-Threat Intelligence:TTP mapping, behavioral correlation-SIEM:Parser creation, field extraction, correlation rule design-Scripting:Python, regex, shell scripting for ETL workflows-Data Handling:JSON, syslog, Windows Event Logs-Tools:Sumologic SIEM, Sumo logic SOAR & Crowdstrike EDR-Exp in in SOC/IR including 4+ in L3 role (IR + SIEM Content Engineering & SOAR) Additional Information:- The candidate should have minimum 5 years of experience in Security Information and Event Management (SIEM) Operations.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 3 weeks ago
2.0 - 5.0 years
4 - 7 Lacs
Mumbai
Work from Office
Are you someone who jumps into action when something breaksDo you enjoy digging into dashboards, logs, and alerts to find out what went wrong Were looking for a Product Support Engineer who loves solving problems and working closely with teams to keep systems running smoothly. In this role, you'll be the first point of contact for production issues. You'll monitor system health, investigate alerts, and work with Engineering, DevOps, Product, and Customer Support teams to fix problems fast. From resolving customer support tickets to setting up alerts and dashboards, your work will directly impact the stability and reliability of our services. If you're hands-on with monitoring tools, understand cloud basics, can dig into logs, and are eager to take ownership of production support, we'd love to connect with you. What You'll Do: Monitor system health and performance using tools like Grafana, New Relic, Datadog, Sumo Logic, Dynatrace, etc. Create and maintain dashboards, alerts, and log queries to improve visibility and issue detection. Respond to and resolve support tickets by working closely with customer support and engineering teams. Use Jira to track issues, bugs, and tasks; keep them updated with clear status and progress. Document processes, known issues, and solutions in Confluence and maintain operational playbooks. Troubleshoot and analyze production issues using logs and monitoring data. Support root cause analysis and contribute to post-incident reviews. Assist in automating routine tasks and improving support workflows. Communicate effectively with both technical and non-technical stakeholders. Apply basic SQL and programming knowledge for debugging and data checks. Collaborate with engineering, DevOps, product, and customer support teams to ensure fast resolution and continuous improvement. What Were Looking For: B.Tech / MCA in Computer Science, IT, or a related field 3+ years of experience in a technical support, product support, or site operations role Hands-on experience with monitoring and observability tools like Grafana, New Relic, Datadog, Sumo Logic, Dynatrace, etc. Experience in creating dashboards, setting up alerts, and analyzing logs Working knowledge of Jira (issue tracking) and Confluence (documentation) Basic understanding of cloud platforms such as AWS or GCP Strong problem-solving skills with a proactive mindset Familiarity with SQL for basic querying and troubleshooting Basic programming or scripting experience (e.g., Python, Bash) Good communication skills and ability to collaborate across teams (engineering, DevOps, product, and support)
Posted 3 weeks ago
3.0 - 6.0 years
15 - 22 Lacs
Pune
Work from Office
About Position: The ideal candidate will possess a strong understanding of cybersecurity principles, excellent communication skills, and the ability to present complex information in a clear and concise manner. This role will require interaction with key stakeholders and customers, demanding both a presentable personality and the ability to explain technical content to various audiences. Role: Security operation Analyst L2 + Sumo Logic Location: Pune Experience: 3 to 6 years Job Type: Full Time Employment What You'll Do: As a SOC L2 Analyst, you will play a pivotal role in defending the organization's information assets by handling complex security incidents, performing detailed investigations, and mentoring L1 analysts. This position involves using advanced security tools to detect, analyze, and respond to sophisticated cyber threats. You will also contribute to improving SOC processes and ensuring the organization stays ahead of evolving cybersecurity challenges. Minimum 5 years of experience in Security Operations Incident Response with expertise in using SIEM Tools (Sumo Logic), EDR, Email Security, Incident Response and responsible for providing advanced technical support and incident response. Key Responsibilities: Utilizing the Sumo Logic tool to monitor the security environment for potential threats and incidents. Analyzing and triaging security alerts generated by the Sumo Logic, making informed decisions on the appropriate response. Responding to security incidents, taking appropriate actions to contain, mitigate, and remediate security threats. Analyzing and reviewing and validating the logs from the log sources. Suggesting user case fine tuning, new use case creation. Troubleshooting SIEM issues related to log sources. Collaborating with other members of the SOC team, as well as internal and external stakeholders, to resolve complex security incidents. Keeping up to date with the latest cybersecurity threats, trends, and technologies to improve the efficiency and effectiveness of incident response. Documenting security incidents, responses, and related information in accordance with established procedures. Expertise You'll Bring: Establish KPI, review & manage security logs and provide reports based on KPI and metrics. Respond to client's requests, concerns, and suggestions. Track SOC performance in terms of SLAs and incidents quality Prepare the Daily, Weekly, Monthly reports as per the client requirements. Certifications: CEH, CompTIA Security+, SumoLogic any of these Certification is an added advantage Benefits: Competitive salary and benefits package Culture focused on talent development with quarterly promotion cycles and company-sponsored higher education and certifications Opportunity to work with cutting-edge technologies Employee engagement initiatives such as project parties, flexible work hours, and Long Service awards Annual health check-ups Insurance coverage: group term life, personal accident, and Mediclaim hospitalization for self, spouse, two children, and parents Inclusive Environment: Persistent Ltd. is dedicated to fostering diversity and inclusion in the workplace. We invite applications from all qualified individuals, including those with disabilities, and regardless of gender or gender preference. We welcome diverse candidates from all backgrounds. We offer hybrid work options and flexible working hours to accommodate various needs and preferences. Our office is equipped with accessible facilities, including adjustable workstations, ergonomic chairs, and assistive technologies to support employees with physical disabilities. If you are a person with disabilities and have specific requirements, please inform us during the application process or at any time during your employment. We are committed to creating an inclusive environment where all employees can thrive. Our company fosters a value-driven and people-centric work environment that enables our employees to: Accelerate growth, both professionally and personally Impact the world in powerful, positive ways, using the latest technologies Enjoy collaborative innovation, with diversity and work-life wellbeing at the core Unlock global opportunities to work and learn with the industry's best Let's unleash your full potential at Persistent "Persistent is an Equal Opportunity Employer and prohibits discrimination and harassment of any kind."
Posted 1 month ago
3.0 - 8.0 years
4 - 8 Lacs
Gurugram
Remote
Job Title: Production Support Engineer Experience: 3+ Years Location: Remote (Work from Home) Shift: Rotational Shifts (Morning & Afternoon) Compensation: Night Shift Allowance applicable Work Schedule: Follows Client Calendar Job Summary: We are seeking a skilled and dependable Production Support Engineer with 3+ years of experience in Oracle PL/SQL development and production environment support. The ideal candidate should have hands-on expertise in resolving production incidents, managing job workflows, and performing root cause analysis using tools like Control-M , Sumo Logic , and Dynatrace . This is a remote role with rotational shift timing (morning and afternoon), aligned with the client's operational calendar. Key Responsibilities: Provide day-to-day support for critical production systems in a 24/7 environment. Develop and troubleshoot PL/SQL scripts (joins, loops, exception handling, functions, procedures). Monitor and manage job workflows using Control-M . Conduct log analysis and system performance monitoring using Sumo Logic and Dynatrace . Perform root cause analysis and ensure rapid resolution of incidents and issues. Automate routine support tasks using Bash scripting on Linux/Unix systems. Maintain proper documentation through JIRA and Confluence . Collaborate with cross-functional teams to ensure minimal downtime and high system availability. Technical Skills Required: Database: Oracle PL/SQL Queries, Joins, Exception Handling, Functions, Procedures, Packages Monitoring Tools: Control-M, Sumo Logic, Dynatrace Scripting & OS: Bash scripting, Linux/Unix Collaboration Tools: JIRA, Confluence Desired Attributes: Strong analytical and problem-solving skills in high-pressure production environments. Proactive approach to system monitoring and performance tuning. Experience working in client-facing roles with shift flexibility. Ability to prioritize and manage multiple incidents/tasks simultaneously.
Posted 1 month ago
3.0 - 8.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Operations Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Level 2 SOC Analyst, your role involves deeper investigation of security alerts and confirmed incidents. You will validate escalated events using Sumo Logic and CrowdStrike Falcon, enrich them with context, and work closely with L3 analysts to assist in containment and timely remediation. You will also assist in improving detection fidelity and supporting SOAR automation. Roles & Responsibilities:-Intermediate Sumo Logic SIEM query and dashboarding skills-Alert Triage & Investigation:Experience investigating escalated alerts using SIEM or EDR-Hands-on experience with CrowdStrike EDR investigations-Incident Response and Containment:Take necessary actions to contain, eradicate and recover from security incidents.-Malware Analysis:Perform malware analysis using the sandboxing tools like CS etc.-SOAR Execution:Running and modifying basic playbooks in Sumo Logic SOAR-Incident Reporting and Documentation:Strong reporting skills with accurate detail capture to provide the RCA for the true positive security incidents with detailed documentation.-Communication & Collaboration:Send emails to request information, provide updates, and coordinate with different teams to ensure tasks are completed efficiently.-MITRE ATT&CK Mapping:Ability to classify incidents with tactics/techniques-Alert fine tuning recommendations to reduce false positive noise-Investigate alerts escalated by L1 to determine scope, impact, and root cause-Perform in-depth endpoint and network triage using CrowdStrike-Use CrowdStrike Falcon to perform endpoint analysis and threat validation-Correlate multiple log sources in Sumo Logic to trace attacker activity-Execute or verify SOAR playbooks for containment actions (isolate host, disable user)-Enrich events with asset, identity, and threat intelligence context-Document investigation workflows, evidence, and final conclusions-Support L3 during major incidents by performing log or memory triage-Suggest improvements in alert logic or SOAR workflow to reduce false positives-Conduct threat research aligned to alert patterns and business context-Enhance alert fidelity with threat intel and historical context-Document investigation findings and communicate with stakeholders Professional & Technical Skills: -Exposure to threat hunting techniques-Scripting to assist SOAR playbook tuning-Triage Automation:Ability to identify playbook gaps and recommend improvements-Cloud Security Basics:Awareness of log patterns from AWS/Azure-Log Analysis:Correlation and trend identification in Sumo Logic-Certifications:SC-200, CySA+, ECSA or relevant advanced certification-SIEM:Advanced queries, dashboards, correlation logic-SOAR:Execute and troubleshoot playbooks-Tools:CrowdStrike (RTR, detections, indicators), Sumo Logic SIEM-Threat Analysis:IOC enrichment, TTP identification-Primary Skill:Incident Investigation and Enrichment Additional Information:- The candidate should have minimum 3 years of experience in Security Information and Event Management (SIEM) Operations.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
15.0 - 20.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Operations Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education\ Summary :As an L1 SOC Analyst you are the first line of defense in monitoring and triaging security alerts. You will work primarily with Sumo Logic SIEM and SOAR tools to identify potential security incidents, validate alerts, and escalate them according to the defined SOPs. You will ensure real-time visibility and log health while flagging suspicious activity promptly. This role is essential to ensuring timely detection and reducing noise from false positives Roles & Responsibilities:--Basic Security Knowledge:Understanding of key concepts (malware, phishing, brute force, etc.-SIEM Familiarity:Exposure to Sumo Logic UI and understanding how to read/query logs-Exposure to CrowdStrike Falcon Console:Ability to view and interpret endpoint alerts-Alert Triage:Ability to differentiate between false positives and real threats-Communication Skills: Clear written documentation and verbal escalation-Ticketing Systems:Familiarity with platforms like JIRA, ServiceNow, or similar-Basic understanding of cybersecurity fundamentals-Basic Scripting:Awareness of PowerShell or Python for log parsing-SOAR Exposure:Familiarity with automated triage workflows-Security Certifications:Security+, Microsoft SC-900, or similar certification-Operating System Basics:Windows and Linux process and file system awareness Professional & Technical Skills: -Monitor real-time alerts and dashboards in Sumo Logic SIEM-Perform initial triage on alerts and determine severity/priority-Escalate validated security incidents to L2 analysts per defined SOPs-Follow pre-defined SOAR playbooks to document or assist in response-Ensure alert enrichment fields are populated like host info, user details, etc.-Conduct basic log searches to support alert analysis-Perform daily health checks on log sources and ingestion pipelines-Maintain accurate ticket documentation for each alert handled-Participate in shift handovers and team sync-ups for awareness-SIEM:Basic log searching, correlation rule awareness-SOAR:Familiarity with playbook execution-Security Concepts:Basic understanding of malware, phishing, brute force-Tools:CrowdStrike EDR, Sumo Logic Additional Information:- The candidate should have minimum 2 years of experience in Security Information and Event Management (SIEM) Operations.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
15.0 - 20.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Operations Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an L1 SOC Analyst you are the first line of defense in monitoring and triaging security alerts. You will work primarily with Sumo Logic SIEM and SOAR tools to identify potential security incidents, validate alerts, and escalate them according to the defined SOPs. You will ensure real-time visibility and log health while flagging suspicious activity promptly. This role is essential to ensuring timely detection and reducing noise from false positives Roles & Responsibilities:--Basic Security Knowledge:Understanding of key concepts (malware, phishing, brute force, etc.-SIEM Familiarity:Exposure to Sumo Logic UI and understanding how to read/query logs-Exposure to CrowdStrike Falcon Console:Ability to view and interpret endpoint alerts-Alert Triage:Ability to differentiate between false positives and real threats-Communication Skills: Clear written documentation and verbal escalation-Ticketing Systems:Familiarity with platforms like JIRA, ServiceNow, or similar-Basic understanding of cybersecurity fundamentals-Basic Scripting:Awareness of PowerShell or Python for log parsing-SOAR Exposure:Familiarity with automated triage workflows-Security Certifications:Security+, Microsoft SC-900, or similar certification-Operating System Basics:Windows and Linux process and file system awareness Professional & Technical Skills: -Monitor real-time alerts and dashboards in Sumo Logic SIEM-Perform initial triage on alerts and determine severity/priority-Escalate validated security incidents to L2 analysts per defined SOPs-Follow pre-defined SOAR playbooks to document or assist in response-Ensure alert enrichment fields are populated like host info, user details, etc.-Conduct basic log searches to support alert analysis-Perform daily health checks on log sources and ingestion pipelines-Maintain accurate ticket documentation for each alert handled-Participate in shift handovers and team sync-ups for awareness-SIEM:Basic log searching, correlation rule awareness-SOAR:Familiarity with playbook execution-Security Concepts:Basic understanding of malware, phishing, brute force-Tools:CrowdStrike EDR, Sumo Logic Additional Information:- The candidate should have minimum 2 years of experience in Security Information and Event Management (SIEM) Operations.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
15.0 - 20.0 years
13 - 17 Lacs
Bengaluru
Work from Office
Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Operations Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As the SOC L3 Analyst you will lead the technical handling of critical security incidents. Youll be responsible for deep-dive analysis, root cause investigation, forensics, and containment using tools such as CrowdStrike, Sumo Logic SIEM, and SOAR. You will be responsible for onboarding and managing log sources, building SIEM use cases (custom + in built), and developing automation in SOAR to support incident response and threat detection workflows Roles & Responsibilities:-End-to-End Incident Response Ownership:Ability to handle incident lifecycle (detect, contain, remediate)-Subject matter expert for handling the escalated critical or actual true positive incidents.-CrowdStrike Deep Dive:Using Real Time Response (RTR), Threat Graph, custom IOA rules-Strong command over Sumo Logic SIEM content engineering:Creating detection rules, dashboards, and field extractions-Threat Hunting:Behavior-based detection using TTPs-SOAR Automation:Designing playbooks, integrations with REST APIs, ServiceNow, CrowdStrike-Threat Intel Integration:Automation of IOC lookups and enrichment flows-Forensic Skills: Live host forensics, log correlation, malware behavioral analysis-Deep experience in advanced threat detection and incident response-Scripting Proficiency:Python, PowerShell, Bash for automation or ETL-Error Handling & Debugging:Identify and resolve failures in SOAR or data pipelines-Proficiency in CrowdStrike forensic and real-time response capabilities-Experience Sumo Logic SOAR for playbook optimization-Use case development in Sumo Logic SIEM Professional & Technical Skills: -Lead high-severity incident response, coordinating with stakeholders and IT teams-Perform endpoint forensic triage using CrowdStrike Real Time Response (RTR)-Conduct detailed log analysis and anomaly detection in Sumo Logic-Customize or create new detection rules and enrichments in SIEM-Develop/Tune SOAR playbooks for advanced scenarios, branching logic, and enrichment-Perform root cause analysis and support RCA documentation-Mentor L1 and L2 analysts through case walk-throughs and knowledge sharing-Generate post-incident reports and present findings to leadership-Lead investigations and coordinate response for major incidents-Perform root cause analysis and post-incident reviews-Develop advanced detection content in Sumo Logic-Optimize SOAR playbooks for complex use cases-Onboard and maintain data sources in Sumo Logic SIEM and ensure parsing accuracy-Build custom dashboards, alerts, and queries aligned with SOC use cases-Create and maintain field extractions, log normalization schemas, and alert suppression rules-Integrate external APIs into SOAR (e.g., VirusTotal, WHOIS, CrowdStrike)-Monitor log health and alert performance metrics; troubleshoot data quality issues-Collaborate with L3 IR and Threat Intel teams to translate threat use cases into detections-Participate in continuous improvement initiatives and tech upgrades-Conduct playbook testing, version control, and change documentation-CrowdStrike:Custom detections, forensic triage, threat graphs-SIEM:Rule creation, anomaly detection, ATT&CK mapping-SOAR:Playbook customization, API integrations, dynamic playbook logic-Threat Intelligence:TTP mapping, behavioral correlation-SIEM:Parser creation, field extraction, correlation rule design-Scripting:Python, regex, shell scripting for ETL workflows-Data Handling:JSON, syslog, Windows Event Logs-Tools:Sumologic SIEM, Sumo logic SOAR & Crowdstrike EDR-Exp in in SOC/IR including 4+ in L3 role (IR + SIEM Content Engineering & SOAR) Additional Information:- The candidate should have minimum 5 years of experience in Security Information and Event Management (SIEM) Operations.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education
Posted 1 month ago
5.0 - 7.0 years
25 - 40 Lacs
Pune
Work from Office
Our world is transforming, and PTC is leading the way.Our software brings the physical and digital worlds together, enabling companies to improve operations, create better products, and empower people in all aspects of their business. Our people make all the difference in our success. Today, we are a global team of nearly 7,000 and our main objective is to create opportunities for our team members to explore, learn, and grow – all while seeing their ideas come to life and celebrating the differences that make us who we are and the work we do possible. Job Details As a senior SRE / Observability Engineer, you will be part of the Atlas Platform Engineering team and will: Create and maintain observability standards and best practices Review the current observability platform, identify areas for improvement, and guide the team in enhancing monitoring, logging, tracing, and alerting capabilities. Expand the observability stack across multiple clouds, regions, and clusters, managing all observability data. Design and implement monitoring solutions for complex distributed systems to provide deep insights into systems and services aiming at complete visibility of digital operations Supporting the ongoing evaluation of new capabilities in the observability stack, conducting proof of concepts, pilots, and tests to validate their suitability. Assist teams in creating clear, informative, and actionable dashboards to improve system visibility. Automate monitoring and alerting processes, including enrichment strategies and ML-driven anomaly detection where applicable. Provide technical leadership to the observability team with clear priorities ensuring agreed outcomes are achieved in a timely manner. Work closely with R&D and product development teams (understand their requirements and challenges) to ensure seamless visibility into system and service performance. Work closely with the Traffic Management team to identify and standardise on existing and new observability tools as part of a holistic solution Conduct training sessions and create documentation for internal teams Support the definition of SLI (service level indicators) and SLO (service level objectives) for the Atlas services. Keep track of the error budget of each service Participate in the emergency response process Conduct RCAs (root cause analysis) Help to automate repetitive tasks and reduce toil. Qualifications: People and communication qualifications Be a strong team player Have good collaboration and communication skills Ability to translate technical concepts for non-technical audiences Problem-solving and analytical thinking Technical qualifications - general: Familiarity with cloud platforms (Ideally Azure) Familiarity with Kubernetes and Istio as the architecture on which the observability and Atlas services run, and how they integrate and scale. Experience with infrastructure as code and automation Knowledge of common programming languages and debugging techniques Have a strong technical background and be hands on. Linux and scripting languages (Bash, Python, Golang). Significant Understanding of DevOps principles. Technical qualifications - observability Strong understanding of observability principles (metrics, logs, traces) Experience with APM tools and distributed tracing Proficiency in log aggregation and analysis Knowledge and hands-on experience with monitoring, logging, and tracing tools such as Prometheus, Prometheus, Grafana, Datadog, New Relic, Sumologic, ELK Stack, or others Knowledge of Open Telemetry, including OTEL collector and code instrumentation Experience designing and building unified observability platforms that enable the use of data (metrics, logs, and traces) to determine quickly if their application or service is operating as desired. Technical qualifications – SRE Understanding of the Google SRE principles Experience in defining SLIs and SLOs Experience in performing RCAs (root cause analysis) Experience in system performance Experience in incident response Knowledge of status tools, such as Atlassian Status Page or similar Knowledge of incident management and paging tools, such as PagerDuty or similar Knowledge of ITIL (Information Technology Infrastructure Library) processes Qualifications: People and communication qualifications • Be a strong team player • Have good collaboration and communication skills • Ability to translate technical concepts for non-technical audiences • Problem-solving and analytical thinking Technical qualifications - general: • Familiarity with cloud platforms (Ideally Azure) • Familiarity with Kubernetes and Istio as the architecture on which the observability platform runs, and how they integrate and scale. • Experience with infrastructure as code and automation • Knowledge of common programming languages and debugging techniques • Have a strong technical background and be hands on. • Linux and scripting languages (Bash, Python, Golang). • Significant Understanding of DevOps principles. Technical qualifications - observability • Strong understanding of observability principles (metrics, logs, traces) • Experience with APM tools and distributed tracing • Proficiency in log aggregation and analysis • Knowledge and hands-on experience with monitoring, logging, and tracing tools such as Prometheus, Prometheus, Grafana, Datadog, New Relic, Sumologic, ELK Stack, or others • Knowledge of Open Telemetry, including OTEL collector and code instrumentation • Experience designing and building unified observability platforms that enable the use of data (metrics, logs, and traces) to determine quickly if their application or service is operating as desired. Life at PTC is about more than working with today’s most cutting-edge technologies to transform the physical world. It’s about showing up as you are and working alongside some of today’s most talented industry leaders to transform the world around you. If you share our passion for problem-solving through innovation, you’ll likely become just as passionate about the PTC experience as we are. Are you ready to explore your next career move with us? We respect the privacy rights of individuals and are committed to handling Personal Information responsibly and in accordance with all applicable privacy and data protection laws. Review our Privacy Policy here ."
Posted 1 month ago
6.0 - 11.0 years
9 - 13 Lacs
Bengaluru
Work from Office
About the role : In this opportunity, you will: Be a Professional SRE: Implement site reliability engineering and DevOps best practices. Feed non-functional requirements into the product backlog, such as, but not limited to, high availability, scalability, self-healing, observability, continuous delivery, security Build and maintain monitoring for all aspects of infrastructure, micro-services and the platform and implement Alerting mechanism using cloud native solutions Provide primary operational support and engineering for distributed platforms Act as the go to person for any production issue. Troubleshoot and monitor until successful mitigation, communicate effectively, postmortem and implementation of the learnings. Maintain IaCand CICD and promote best practices for our CI/CD processes Focus on Continuousimprovement andtechnical standardsdrive improvements in productivity,monitoring,toolingand set industry best practices. On-call Rotation:Participate in on-call/shift rotations. When on-call, you are expected to drive the troubleshooting and mitigation activities while working on incident Be innovative and curious: Maintain end-to-end security ensuring that we meet best practices standards Keepup-to-datewith emerging cloud technology trends, especially around DevOps, Service Reliability and Security. Adopt pan-TR operation principles to ensure consistency and efficiency Documenting tribal knowledge. Constant upkeep of documentation and runbooks can ensure that teams get the information they need right when they need it Be collaborative: Extreme collaboration within our teams Canada, US, Mexico and India About you: You're a fit for the role if you have: Bachelors degree in computer science or related field - a must Minimum of 6+ yearsofexperience as DevOps/SRE engineer andCloud engineerwith hands-on experience in AWS cloud technologies. Highly skilled in UNIX/Linux-based Systems Proven experience in building and operating PRODUCTION cloud-native infrastructure, applications, and services on AWS. Experience or knowledge of Container technology such as Docker, Kubernetes and Istio service mesh Must have experience using AWS services (such as Cloud Front, EKS, ECS, RDS, Threat detection and other security controls) Must have 2+ years scripting and programming experience(PowerShell, Bash) Experience or knowledge of Observability toolsDataDog, ELK, SumoLogic, CloudWatch Experience or knowledge with Version Control and CI/CD (Git/ Azure DevOps / JFrog Artifactory) Experience or knowledge writing Infrastructure as Code (IaC) (Terraform / CloudFormation / other) Team player with a can do attitude #LI-SM1 Whats in it For You Hybrid Work Model Weve adopted a flexible hybrid working environment (2-3 days a week in the office depending on the role) for our office-based roles while delivering a seamless experience that is digitally and physically connected. Flexibility & Work-Life Balance: Flex My Way is a set of supportive workplace policies designed to help manage personal and professional responsibilities, whether caring for family, giving back to the community, or finding time to refresh and reset. This builds upon our flexible work arrangements, including work from anywhere for up to 8 weeks per year, empowering employees to achieve a better work-life balance. Career Development and Growth: By fostering a culture of continuous learning and skill development, we prepare our talent to tackle tomorrows challenges and deliver real-world solutions. Our Grow My Way programming and skills-first approach ensures you have the tools and knowledge to grow, lead, and thrive in an AI-enabled future. Industry Competitive Benefits We offer comprehensive benefit plans to include flexible vacation, two company-wide Mental Health Days off, access to the Headspace app, retirement savings, tuition reimbursement, employee incentive programs, and resources for mental, physical, and financial wellbeing. Culture: Globally recognized, award-winning reputation for inclusion and belonging, flexibility, work-life balance, and more. We live by our valuesObsess over our Customers, Compete to Win, Challenge (Y)our Thinking, Act Fast / Learn Fast, and Stronger Together. Social Impact Make an impact in your community with our Social Impact Institute. We offer employees two paid volunteer days off annually and opportunities to get involved with pro-bono consulting projects and Environmental, Social, and Governance (ESG) initiatives. Making a Real-World Impact: We are one of the few companies globally that helps its customers pursue justice, truth, and transparency. Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. Thomson Reuters informs the way forward by bringing together the trusted content and technology that people and organizations need to make the right decisions. We serve professionals across legal, tax, accounting, compliance, government, and media. Our products combine highly specialized software and insights to empower professionals with the data, intelligence, and solutions needed to make informed decisions, and to help institutions in their pursuit of justice, truth, and transparency. Reuters, part of Thomson Reuters, is a world leading provider of trusted journalism and news. We are powered by the talents of 26,000 employees across more than 70 countries, where everyone has a chance to contribute and grow professionally in flexible work environments. At a time when objectivity, accuracy, fairness, and transparency are under attack, we consider it our duty to pursue them. Sound excitingJoin us and help shape the industries that move society forward. As a global business, we rely on the unique backgrounds, perspectives, and experiences of all employees to deliver on our business goals. To ensure we can do that, we seek talented, qualified employees in all our operations around the world regardless of race, color, sex/gender, including pregnancy, gender identity and expression, national origin, religion, sexual orientation, disability, age, marital status, citizen status, veteran status, or any other protected classification under applicable law. Thomson Reuters is proud to be an Equal Employment Opportunity Employer providing a drug-free workplace. We also make reasonable accommodations for qualified individuals with disabilities and for sincerely held religious beliefs in accordance with applicable law. More information on requesting an accommodation here. Learn more on how to protect yourself from fraudulent job postings here. More information about Thomson Reuters can be found on thomsonreuters.com.
Posted 1 month ago
2.0 - 6.0 years
15 - 25 Lacs
Noida
Work from Office
Preferred Qualifications Strong knowledge and experience working with Splunk, QRadar, SumoLogic or similar security information event management systems (SIEM) required Experience with query and scripting languages Experience with AWS security tools such as Guardduty, Inspector and Security Hub Experience with Crowdstrike Falcon or similar endpoint security suite required. BA/BS or higher in Cyber Security, Computer Science, Information Technology, Management of Information Systems, or a related field Excellent written and verbal communication skills Extremely organized and able to manage multiple, time-sensitive projects simultaneously CISSP, CompTIA Security+, CEH, or similar certifications preferred Responsibilities Perform daily reviews of security alerts and dashboards Perform weekly log analysis and threat hunting Detect and analyze security events and incidents Coordinate escalations to internal response teams to ensure timely incident resolutions Review threat intelligence from multiple sources Maintain standard operating procedures, processes and guidelines Automate security analysis, administration and remediation procedures, workflows and tasks Assist with Incident Response Help configure Mac and Windows laptops to meet security requirements. Develop and maintaining information security metrics Provide IT support to local staff and troubleshoot hardware and software issues. Maintain awareness of trends in security regulatory, technology, and operational requirements
Posted 1 month ago
5.0 - 10.0 years
7 - 11 Lacs
Hyderabad
Work from Office
Responsibilities Core Skills: Performance Testing and Engineering: Load testing tools (JMeter, Load Runner, etc.), APM and Logging (Grafana, Sumo Logic, New Relic, etc.), Cloud infrastructure and monitoring (AWS, CloudWatch, etc.) Essential Job Functions Lead the performance testing program, collaborating closely with agile teams and architects to build and maintain framework(s) to benchmark application performance across all layers of the application stack Apply advanced performance testing methodologies and best practices. Help setup production performance analysis framework and build-out strategies to load test the system Analyze test results, configure analysis graphs, and compile comprehensive performance test reports. Diagnose root causes of performance issues and implement optimization solutions to enhance application performance. Qualifications Qualifications Minimum of 10 years of experience in performance testing, preferably in a high-transaction SaaS environment, with proficiency in tools such as JMeter or Load Runner. Expertise in handling HTTP/HTML, web services, and asynchronous calls. Good-to-great understanding of memory and CPU utilization, throughput, latency, etc. Experience with monitoring and analysis tools like New Relic, Grafana, Sumo Logic, and AppDynamics. Experience with profiling and heap analysis tools Proficiency in at least one programming language. Experience with databases including MS SQL Server and MySQL Familiarity with AWS a plus Self-motivated, able to learn and research issues independently with a keen eye to details Must be passionate about wanting to make the software performance better i.e. “wont-quit-till-I-figure-out-the-root-cause mentality” Good analytical and problem-solving skills combined with technical writing and communication skills Familiarity with Agile/SCRUM SDLC strongly preferred
Posted 1 month ago
3.0 - 6.0 years
10 - 15 Lacs
Bengaluru
Work from Office
We are looking for a Senior Site Reliability Engineer, to join our Service Reliability and Operation group. We provide innovative team collaboration and an opportunity to build, operate and support scalable and reliable services that underpin Thomson Reuters’ products. About the Role: In this opportunity as a Senior Site Reliability Engineer , you will be responsible to: Be a Professional SRE: Implement site reliability engineering and DevOps best practices. Feed non-functional requirements into the product backlog, such as, but not limited to, high availability, scalability, self-healing, observability, continuous delivery, security Build and maintain monitoring for all aspects of infrastructure, micro-services and the platform and implement Alerting mechanism using cloud native solutions Provide primary operational support and engineering for distributed platforms Act as the go to person for any production issue. Troubleshoot and monitor until successful mitigation, communicate effectively, postmortem and implementation of the learnings. Maintain IaC and CICD and promote best practices for our CI/CD processes Focus on Continuous improvement and technical standards – drive improvements in productivity, monitoring, tooling and set industry best practices. On-call Rotation: Participate in on-call/shift rotations (L2). About You: You’re a fit for the role of Senior Site Reliability Engineer if your background includes: Bachelor’s degree in computer science or related field - a must Minimum of 7+ years of experience as DevOps/SRE engineer and Cloud engineer with hands-on experience in AWS cloud technologies. Highly skilled in UNIX/Linux-based Systems Proven experience in building and operating PRODUCTION cloud-native infrastructure, applications, and services on AWS or Azure. Experience or knowledge of Container technology such as Docker, Kubernetes and Istio service mesh Must have experience using AWS services (such as Cloud Front, EKS, ECS, RDS, Threat detection and other security controls) or Azure services (such as AKS, ACR, Entra ID Network Security Group) or Azure services (such as AKS, ACR, Entra ID Network Security Group) Must have 2+ scripting and programming experience (PowerShell, Bash) Experience or knowledge of Observability toolsDataDog, ELK, SumoLogic, CloudWatch, Azure Monitor Experience or knowledge with Version Control and CI/CD (Git/ Azure DevOps / JFrog Artifactory) Experience or knowledge writing Infrastructure as Code (IaC) (Terraform / CloudFormation / ArgoCD / other) Team player with a can-do attitude #LI-PS1 What’s in it For You Hybrid Work Model We’ve adopted a flexible hybrid working environment (2-3 days a week in the office depending on the role) for our office-based roles while delivering a seamless experience that is digitally and physically connected. Flexibility & Work-Life Balance: Flex My Way is a set of supportive workplace policies designed to help manage personal and professional responsibilities, whether caring for family, giving back to the community, or finding time to refresh and reset. This builds upon our flexible work arrangements, including work from anywhere for up to 8 weeks per year, empowering employees to achieve a better work-life balance. Career Development and Growth: By fostering a culture of continuous learning and skill development, we prepare our talent to tackle tomorrow’s challenges and deliver real-world solutions. Our Grow My Way programming and skills-first approach ensures you have the tools and knowledge to grow, lead, and thrive in an AI-enabled future. Industry Competitive Benefits We offer comprehensive benefit plans to include flexible vacation, two company-wide Mental Health Days off, access to the Headspace app, retirement savings, tuition reimbursement, employee incentive programs, and resources for mental, physical, and financial wellbeing. Culture: Globally recognized, award-winning reputation for inclusion and belonging, flexibility, work-life balance, and more. We live by our valuesObsess over our Customers, Compete to Win, Challenge (Y)our Thinking, Act Fast / Learn Fast, and Stronger Together. Social Impact Make an impact in your community with our Social Impact Institute. We offer employees two paid volunteer days off annually and opportunities to get involved with pro-bono consulting projects and Environmental, Social, and Governance (ESG) initiatives. Making a Real-World Impact: We are one of the few companies globally that helps its customers pursue justice, truth, and transparency. Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs the way forward by bringing together the trusted content and technology that people and organizations need to make the right decisions. We serve professionals across legal, tax, accounting, compliance, government, and media. Our products combine highly specialized software and insights to empower professionals with the data, intelligence, and solutions needed to make informed decisions, and to help institutions in their pursuit of justice, truth, and transparency. Reuters, part of Thomson Reuters, is a world leading provider of trusted journalism and news. We are powered by the talents of 26,000 employees across more than 70 countries, where everyone has a chance to contribute and grow professionally in flexible work environments. At a time when objectivity, accuracy, fairness, and transparency are under attack, we consider it our duty to pursue them. Sound excitingJoin us and help shape the industries that move society forward. As a global business, we rely on the unique backgrounds, perspectives, and experiences of all employees to deliver on our business goals. To ensure we can do that, we seek talented, qualified employees in all our operations around the world regardless of race, color, sex/gender, including pregnancy, gender identity and expression, national origin, religion, sexual orientation, disability, age, marital status, citizen status, veteran status, or any other protected classification under applicable law. Thomson Reuters is proud to be an Equal Employment Opportunity Employer providing a drug-free workplace. We also make reasonable accommodations for qualified individuals with disabilities and for sincerely held religious beliefs in accordance with applicable law. More information on requesting an accommodation here. Learn more on how to protect yourself from fraudulent job postings here. More information about Thomson Reuters can be found on thomsonreuters.com.
Posted 2 months ago
6.0 - 10.0 years
10 - 15 Lacs
Bengaluru
Work from Office
We are looking for a Senior Site Reliability Engineer, to join our Service Reliability and Operation group. We provide innovative team collaboration and an opportunity to build, operate and support scalable and reliable services that underpin Thomson Reuters’ products. About the Role In this opportunity as a Senior Site Reliability Engineer, you will: Be a Professional SRE: Implement site reliability engineering and DevOps best practices. Feed non-functional requirements into the product backlog, such as, but not limited to, high availability, scalability, self-healing, observability, continuous delivery, security Build and maintain monitoring for all aspects of infrastructure, micro-services and the platform and implement Alerting mechanism using cloud native solutions Provide primary operational support and engineering for distributed platforms Act as the go to person for any production issue. Troubleshoot and monitor until successful mitigation, communicate effectively, postmortem and implementation of the learnings. Maintain IaC and CICD and promote best practices for our CI/CD processes Focus on Continuous improvement and technical standards – drive improvements in productivity, monitoring, tooling and set industry best practices. On-call Rotation: Participate in on-call/shift rotations. When on-call, you are expected to drive the troubleshooting and mitigation activities while working on incident Be innovative and curious: Maintain end-to-end security ensuring that we meet best practices standards Keep up-to-date with emerging cloud technology trends, especially around DevOps, Service Reliability and Security. Adopt pan-TR operation principles to ensure consistency and efficiency Documenting “tribal” knowledge. Constant upkeep of documentation and runbooks can ensure that teams get the information they need right when they need it Be collaborative: Extreme collaboration within our teams – Canada, US, Mexico and India About you: You’re a fit for the role of Senior Site Reliability Engineer if you: Bachelor’s degree in computer science or related field - a must Minimum of 6-10 years of experience as DevOps/SRE engineer and Cloud engineer with hands-on experience in AWS cloud technologies. Highly skilled in UNIX/Linux-based Systems Proven experience in building and operating PRODUCTION cloud-native infrastructure, applications, and services on AWS. Experience or knowledge of Container technology such as Docker, Kubernetes and Istio service mesh Must have experience using AWS services (such as Cloud Front, EKS, ECS, RDS, Threat detection and other security controls) Must have 2+ years scripting and programming experience (PowerShell, Bash) Experience or knowledge of Observability toolsDataDog, ELK, SumoLogic, CloudWatch Experience or knowledge with Version Control and CI/CD (Git/ Azure DevOps / JFrog Artifactory) Experience or knowledge writing Infrastructure as Code (IaC) (Terraform / CloudFormation / other) Team player with a can do attitude#LI-SS6 What’s in it For You Hybrid Work Model We’ve adopted a flexible hybrid working environment (2-3 days a week in the office depending on the role) for our office-based roles while delivering a seamless experience that is digitally and physically connected. Flexibility & Work-Life Balance: Flex My Way is a set of supportive workplace policies designed to help manage personal and professional responsibilities, whether caring for family, giving back to the community, or finding time to refresh and reset. This builds upon our flexible work arrangements, including work from anywhere for up to 8 weeks per year, empowering employees to achieve a better work-life balance. Career Development and Growth: By fostering a culture of continuous learning and skill development, we prepare our talent to tackle tomorrow’s challenges and deliver real-world solutions. Our Grow My Way programming and skills-first approach ensures you have the tools and knowledge to grow, lead, and thrive in an AI-enabled future. Industry Competitive Benefits We offer comprehensive benefit plans to include flexible vacation, two company-wide Mental Health Days off, access to the Headspace app, retirement savings, tuition reimbursement, employee incentive programs, and resources for mental, physical, and financial wellbeing. Culture: Globally recognized, award-winning reputation for inclusion and belonging, flexibility, work-life balance, and more. We live by our valuesObsess over our Customers, Compete to Win, Challenge (Y)our Thinking, Act Fast / Learn Fast, and Stronger Together. Social Impact Make an impact in your community with our Social Impact Institute. We offer employees two paid volunteer days off annually and opportunities to get involved with pro-bono consulting projects and Environmental, Social, and Governance (ESG) initiatives. Making a Real-World Impact: We are one of the few companies globally that helps its customers pursue justice, truth, and transparency. Together, with the professionals and institutions we serve, we help uphold the rule of law, turn the wheels of commerce, catch bad actors, report the facts, and provide trusted, unbiased information to people all over the world. About Us Thomson Reuters informs the way forward by bringing together the trusted content and technology that people and organizations need to make the right decisions. We serve professionals across legal, tax, accounting, compliance, government, and media. Our products combine highly specialized software and insights to empower professionals with the data, intelligence, and solutions needed to make informed decisions, and to help institutions in their pursuit of justice, truth, and transparency. Reuters, part of Thomson Reuters, is a world leading provider of trusted journalism and news. We are powered by the talents of 26,000 employees across more than 70 countries, where everyone has a chance to contribute and grow professionally in flexible work environments. At a time when objectivity, accuracy, fairness, and transparency are under attack, we consider it our duty to pursue them. Sound excitingJoin us and help shape the industries that move society forward. As a global business, we rely on the unique backgrounds, perspectives, and experiences of all employees to deliver on our business goals. To ensure we can do that, we seek talented, qualified employees in all our operations around the world regardless of race, color, sex/gender, including pregnancy, gender identity and expression, national origin, religion, sexual orientation, disability, age, marital status, citizen status, veteran status, or any other protected classification under applicable law. Thomson Reuters is proud to be an Equal Employment Opportunity Employer providing a drug-free workplace. We also make reasonable accommodations for qualified individuals with disabilities and for sincerely held religious beliefs in accordance with applicable law. More information on requesting an accommodation here. Learn more on how to protect yourself from fraudulent job postings here. More information about Thomson Reuters can be found on thomsonreuters.com.
Posted 2 months ago
13.0 - 18.0 years
35 - 55 Lacs
Bengaluru
Hybrid
SRE Manager About Ushur I Ushur XOS l Ushur GenA I Location: Bangalore Work Mode: Hybrid Experince: 12 to 18 Years The Role Our fast-growing team is seeking a Manager of SRE to join us as we pioneer Customer Experience AutomationTM as an Industry category. As the Manager of SRE you will be responsible for two important charters Operate and manage Ushurs production cloud Build a white-glove customer support and incident management function The ideal candidate for this role will be passionate about building a healthy high-performing team, and bring strong technical leadership, a customer-centric focus, and results-oriented action. You will begin as a player/coach while building and continuously improving execution, processes, tools/technology and analytics. Responsibilities Build and Manage a world-class SRE team. Design a 24x7 follow-the-sun organization including seamless handover across regions. Mentor and grow team focused on delivering white glove support and incident management service. Drive data-driven SRE strategy by defining and prioritizing SRE Objectives and Key Results (OKRs) aligned with company mission. This includes setting measurable targets for key service level agreements Manager Enterprise Support function to deliver exceptional white glove experiences at scale in close partnership with our Customer Success, Solution Consulting and Engineering teams. Responsible for ensuring that the Ushur platform runs reliably in production. Partner with the DevOps, Security and Engineering teams to automate deployment, monitoring and observability of the production cloud. Bring deep technical expertise in Ushur Customer Experience Automation. Provide customers with ongoing technical support and incident management for complex issues and support escalations. Optimize and automate support processes including improving the reliability of on-call processes, managing incidents, updating runbooks and documentation, reviewing RCAs and recommending solutions to prevent the recurrence and severity of incidents. Cross-functionally to drive positive customer outcomes. Engage with Product, Sales, Customer Success, Solution Consulting, Security, and Engineering, as necessary to make customers successful on our platform Qualifications 5+ years of experience of SRE/CloudOps Manager/Lead role in Enterprise SaaS Track record of developing and mentoring great talent, building and motivating high-achieving teams. Ability to lead diverse teams across multiple time zones. Business Acumen - Ability to quickly grasp and adapt to a variety of customer verticals, geographies, and business structures. Excellent verbal, written, and presentation skills with the ability to absorb complex technical concepts and communicate them to a non-technical audience Highly organized, collaborative and detail-oriented Deep experience with AWS cloud services, REST APIs, Linux Experience with DevOps processes and Build deployment, and orchestration technologies Passion for technology and for being a part of a fast-growing SaaS startup where we move quickly and wear many hats Flexible approach, able to operate effectively with uncertainty and change Driven, self-motivated, enthusiastic and with a can do attitude Benefits Great Company Culture. We pride ourselves on having a values-based culture that is welcoming, intentional, and respectful. Bring your whole self to work . We are focused on building a diverse culture, with innovative ideas where you and your ideas are valued. We are a start-up and know that every person has a significant impact! Rest and Relaxation . 20 days of flexible leaves per year, Monthly Wellness Day (aka a day off to care for yourself) and more! Health Benefits. Preventive health checkups, Medical Insurance covering the dependents, wellness sessions, and health talks at the office Keep learning. One of our core values is Growth Mindset - we believe in lifelong learning. Certification courses are reimbursed. Ushur Community offers wide resources for our employees to learn and grow. Flexible Work. In-office or hybrid working model, depending on position and location. We seek to create an environment for all our employees where they can thrive in both their profession and personal life. Why join us? We are passionate about Ushur, our product, and helping our employees grow and develop in their career in a caring, collaborative environment. We offer a very competitive compensation plan & stock options for the ideal candidates.
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough