Symosis Security

4 Job openings at Symosis Security
Backend Developer (Python/API Integration) India 3 years None Not disclosed Remote Part Time

Company Description Symosis Security helps organizations navigate the evolving intersection of cybersecurity, AI risk, and regulatory compliance. Since 2004, we’ve partnered with public and private sector clients to secure critical systems, assess vulnerabilities, and implement resilient security programs. We specialize in integrating AI risk governance into cybersecurity programs, offering threat modeling, policy development, and technical safeguards for AI-enabled workflows, LLM use cases, and SaaS integrations. With a global delivery model and deep domain expertise, Symosis serves as a trusted advisor to organizations needing precision, pragmatism, and proven leadership in an AI-powered threat landscape. Role Description Python Developer – API Integrations for SaaS Security Project We are looking for a backend engineer to help build API integrations for a SaaS Security Posture Management (SSPM) project. You will work with our technical team to ingest security posture data from third-party SaaS applications via REST APIs and push it into our security platform using a defined JSON schema. Responsibilities: Develop Python scripts to call SaaS APIs (OAuth2, token-based) Normalize and transform JSON responses to canonical schema Work with YAML-based config files Handle pagination, error logging, and retries Push transformed data into downstream ingestion APIs Requirements: 1–3 years of experience in Python development Strong knowledge of REST APIs and JSON handling Experience with GitHub and Git workflows (PR, commits, branching) Bonus: Familiarity with Adaptive Shield or SSPM concepts Bonus: Exposure to Azure or Databricks is a plus Duration: 3–6 months, 20 hrs/week Qualifications Experience in Back-End Web Development, Software Development, and Programming skills Proficiency in Python and API Integration Knowledge of Object-Oriented Programming (OOP) principles Ability to collaborate effectively with Front-End Developers Excellent problem-solving and debugging skills Strong understanding of cybersecurity principles is a plus Bachelor's degree in Computer Science, Engineering, or related field Ability to work independently and remotely

Tier 2 SOC Analyst – MSSP (Remote, India) India 5 years None Not disclosed Remote Full Time

Location : Remote (India only) Type : Full-Time Experience : 5+ years in SOC/NOC environments Company : Symosis Security About the Role Symosis Security is hiring experienced Tier 2 SOC Analysts to support our 24x7 Managed Security Services delivery. You’ll play a critical role in triaging and responding to security alerts, conducting threat investigations, and continuously tuning detection logic using CrowdStrike, InsightIDR, and InsightVM. Key Responsibilities Analyze and triage alerts in InsightIDR and CrowdStrike Falcon Perform initial and secondary investigation of potential threats Correlate events, enrich alerts with contextual data, and escalate as needed Tune detection rules, reduce false positives, and document response playbooks Conduct threat hunting and IOC enrichment based on evolving threat intel Track vulnerability findings and coordinate with the vulnerability management process Collaborate closely with U.S.-based SOC Manager and global analyst team Support onboarding, shift handoffs, and continuous improvement of SOC workflows Requirements 5+ years of experience in a SOC, NOC, or MSSP environment Strong working knowledge of EDR , SIEM , and VM tools — ideally CrowdStrike , InsightIDR , and InsightVM and ServiceNow Familiarity with NIST, MITRE ATT&CK, and common alert triage frameworks Strong documentation, incident reporting, and communication skills Willingness to work night or rotating shifts to support U.S. client coverage Tool certifications (CrowdStrike, Rapid7) preferred or achievable within 4 weeks

SOC/NOC Manager – MSSP Lead (India-Based, Full-Time) india 7 years None Not disclosed Remote Full Time

Location : Remote (India) Type : Full-Time Company : Symosis Security About Symosis Security Symosis is a cybersecurity consulting firm purpose-built for the AI-native, cloud-first era. We help public-sector and enterprise clients mature their security operations through managed services, offensive testing, governance, and automation. We’re expanding our MSSP practice and looking for a hands-on leader to own SOC delivery, client engagement, and operational maturity. The Role We’re hiring a Full-Time SOC/NOC Manager to lead MSSP service delivery for a high-profile U.S.-based public sector client. You’ll serve as the primary point of contact, manage a global analyst team, and help design and scale managed security operations. This is a strategic and technical leadership role ideal for someone who thrives in both execution and communication, has experience supporting U.S. time zones (EST/PST), and is eager to leverage AI tools for process automation and continuous improvement. What You’ll Do Serve as the primary client-facing point of contact Lead 24x7 SOC/NOC operations with India-based Tier 2 analysts Ensure clear and timely communication with internal teams and client stakeholders Design and maintain: Alert triage workflows and escalation protocols Detection and response tuning across leading SIEM and EDR platforms Vulnerability management lifecycle and remediation tracking Threat intelligence integration and RCA coordination Own and report on SLAs, KPIs, and monthly service metrics Implement redundancy strategies, shift planning, and documentation standards Develop SOPs, training modules, and onboarding playbooks Identify automation opportunities and build solutions using AI/ML tooling Collaborate across time zones; ensure alignment with U.S. EST/PST client schedules What We’re Looking For 7+ years managing SOC, NOC, or MSSP operations Proven ability to lead globally distributed security teams and ensure 24x7 coverage Strong familiarity with leading SIEM, EDR, and VM platforms Excellent communicator – written, verbal, and presentation Experience supporting clients or teams across U.S. time zones (EST/PST) Familiarity with NIST CSF, MITRE ATT&CK, and the full incident lifecycle Hands-on experience with AI-driven automation (e.g., scripting, ML-based triage, workflow orchestration) Experience with public-sector or regulated environments is a strong plus Based in India, available full-time, and comfortable working flexible hours Why Join Symosis? Shape the foundation of a fast-growing MSSP practice Work directly with executive leadership on strategic initiatives Flexible remote work culture and flat reporting structure High-impact projects with long-term client partnerships Join a technical, AI-driven, and mission-focused team

SOC/NOC Manager – MSSP Lead (India-Based, Full-Time) india 7 years None Not disclosed Remote Full Time

Location : Remote (India) Type : Full-Time Company : Symosis Security About Symosis Security Symosis is a cybersecurity consulting firm purpose-built for the AI-native, cloud-first era. We help public-sector and enterprise clients mature their security operations through managed services, offensive testing, governance, and automation. We’re expanding our MSSP practice and looking for a hands-on leader to own SOC delivery, client engagement, and operational maturity. The Role We’re hiring a Full-Time SOC/NOC Manager to lead MSSP service delivery for a high-profile U.S.-based public sector client. You’ll serve as the primary point of contact, manage a global analyst team, and help design and scale managed security operations. This is a strategic and technical leadership role ideal for someone who thrives in both execution and communication, has experience supporting U.S. time zones (EST/PST), and is eager to leverage AI tools for process automation and continuous improvement. What You’ll Do Serve as the primary client-facing point of contact Lead 24x7 SOC/NOC operations with India-based Tier 2 analysts Ensure clear and timely communication with internal teams and client stakeholders Design and maintain: Alert triage workflows and escalation protocols Detection and response tuning across leading SIEM and EDR platforms Vulnerability management lifecycle and remediation tracking Threat intelligence integration and RCA coordination Own and report on SLAs, KPIs, and monthly service metrics Implement redundancy strategies, shift planning, and documentation standards Develop SOPs, training modules, and onboarding playbooks Identify automation opportunities and build solutions using AI/ML tooling Collaborate across time zones; ensure alignment with U.S. EST/PST client schedules What We’re Looking For 7+ years managing SOC, NOC, or MSSP operations Proven ability to lead globally distributed security teams and ensure 24x7 coverage Strong familiarity with leading SIEM, EDR, and VM platforms Excellent communicator – written, verbal, and presentation Experience supporting clients or teams across U.S. time zones (EST/PST) Familiarity with NIST CSF, MITRE ATT&CK, and the full incident lifecycle Hands-on experience with AI-driven automation (e.g., scripting, ML-based triage, workflow orchestration) Experience with public-sector or regulated environments is a strong plus Based in India, available full-time, and comfortable working flexible hours Why Join Symosis? Shape the foundation of a fast-growing MSSP practice Work directly with executive leadership on strategic initiatives Flexible remote work culture and flat reporting structure High-impact projects with long-term client partnerships Join a technical, AI-driven, and mission-focused team