Experience: 10+ years Summary :We are seeking a highly skilled and proactive SOC Lead to manage and mature our 24x7 Security Operations Center. This role involves leading a team of 15 analysts (L1L3), supporting multiple customer environments, and driving operational excellence in threat detection, incident response, and SOC process improvement. The ideal candidate will have deep technical expertise in SIEM and EDR tools, strong leadership capabilities, and excellent communication skills. Key Responsibilities: Lead and manage a team of 15-20 SOC analysts (L1, L2, L3) across multiple customer environments.Act as the primary Incident Responder for critical security incidents.Conduct Root Cause Analysis (RCA) and develop Corrective and Preventive Actions (CAPA).Mentor and train junior/fresher SOC analysts to prepare them for advanced roles.Support and co-lead SIEM migration projects in collaboration with SIEM Engineers.Configure and fine-tune SIEM rules and use cases for enhanced threat detection.Integrate and troubleshoot log sources across diverse platforms and environments.Generate and present SOC KPIs and metrics to internal stakeholders and customers.Lead technical tabletop exercises with internal teams and customer stakeholders.Support SOC maturity assessments and contribute to continuous improvement initiatives.Maintain and enhance SOC documentation, playbooks, and standard operating procedures.Collaborate with threat intelligence, vulnerability management, and engineering teams. Required Skills Experience: 10+ years of experience in cybersecurity, with at least 4 years in a SOC leadership role.Proven experience managing multi-tenant or MSSP environments. Hands-on expertise with: SIEMs: QRoC, Sumo Logic, Splunk, Palo Alto SIEMEDR Tools: CrowdStrike, SentinelOneStrong knowledge of: SIEM rule creation and use case developmentLog source onboarding, integration, and troubleshootingIncident response lifecycle and threat detection methodologiesExcellent communication and writing skills; ability to present to customers and executives.Experience in producing and interpreting SOC metrics and dashboards.Familiarity with frameworks such as MITRE ATTCK, NIST, and SANS. Preferred Qualifications:Bachelors degree in computer science, Information Security, or related field.Industry certifications such as CISSP, CISM, GCIA, GCIH, CEH, or equivalent. Experience with scripting (Python, PowerShell) for automation and enrichment. Exposure to cloud security monitoring (AWS, Azure, GCP). Work Environment: Require on-call availability and rotational shifts.
Position Title: SOC Level 3 Implementation Engineer/Analyst Responsibilities : Security Solution Design and Architecture: Collaborate with stakeholders to understand business requirements and define the architecture and design of security solutions within the SOC. Actively participate in Technical Table Top Drills (internal and external). Actively participate in Incident Response bridge calls. Develop comprehensive security architecture blueprints, SOC Maturity, and defense-in-depth strategies. Experience with security technologies and tools, such as QRadar, Splunk, SumoLogic, Palo Alto SIEM SOAR, CrowdStrike SentinelOne EDR, and endpoint protection platforms. Technology Evaluation and Selection: Evaluate and recommend security technologies, products, and vendors based on organizational needs, industry best practices, and emerging threats. Conduct proof-of-concept (POC) evaluations to assess the performance, functionality, and suitability of security solutions for deployment within the SOC environment. Security Solution Implementation: Lead the implementation and deployment of security technologies SIEM and SOAR and solutions within the SOC, ensuring adherence to design specifications and security standards. Configure and customize security products and tools to align with organizational requirements and operational workflows. Coordinate with cross-functional teams, including network engineering, system administration, and application development, to facilitate smooth deployment and integration. Process Development and Optimization: Define and document security processes, procedures, and workflows within the SOC, including incident detection, response, and remediation. Implement automation and orchestration capabilities to streamline SOC operations and improve response times to security incidents. Continuously assess and optimize security processes to enhance efficiency, effectiveness, and scalability. Security Tool Management and Administration: Administer and maintain security monitoring and detection tools deployed within the SOC environment, such as SIEM (Security Information and Event Management), SOAR and EDR (Endpoint Detection and Response) platforms. Perform routine maintenance tasks, including software updates, patch management, and configuration changes, to ensure the reliability and performance of security tools. Troubleshoot and resolve technical issues related to security tools and infrastructure, collaborating with vendors and support teams as needed. Log Source integration and its troubleshooting. Documentation and Knowledge Transfer: Prepare RCA for P1 and P2 Security Incidents. Maintain comprehensive documentation of implemented security solutions, configurations, and processes, including design documents, deployment guides, and standard operating procedures (SOPs). Provide training and knowledge transfer to SOC analysts and other stakeholders on new security technologies, tools, and procedures. Conduct technical training sessions, workshops, and brown bag sessions to enhance the skills and capabilities of the SOC team. Qualifications: Bachelors degree in Computer Science, Information Security, or a related field (or equivalent experience). 8+ years of experience in a cybersecurity role, with a focus on security solution design and implementation. Strong understanding of cybersecurity principles, concepts, and technologies, including network security, endpoint security, and threat detection. Experience with security technologies and tools, such as QRadar, Splunk, SumoLogic, Palo Alto SIEM SOAR, CrowdStrike SentinelOne EDR, firewalls, and endpoint protection platforms. Proficiency in scripting and automation languages (e.g., Python, PowerShell) for integration and workflow automation. Excellent analytical, problem-solving, and communication skills.Relevant certifications (e.g., CEH, CISSP, CCSP, CISM, GIAC) are preferred.
Type: Contract/Permanent Location: Remote Rate: $25 per Hour All Inclusive Need 7+ Years experience on SAP Treasury SAP Finance IHC resource with 5 to 6 years of In-House Cash (IHC) Module experience. Minimum 2 full lifecycle implementations with SAP Treasury Modules in ECC 6.0. Design, configuration, testing, and deployment of Electronic Bank Statements, In-House Cash (IHC), Banking, and bank interfaces. Strong knowledge in AP, AR, GL, and Intercompany operations. Collaborate with AP, AR, and Treasury teams to gather and analyze requirements and translate them into SAP solutions. Prepare documentation including functional specs, process flows, configuration guides. Troubleshoot and resolve issues, working closely with technical teams on RICEFW items. Top 3 Skills : SAP IHC SAP Treasury AP, AR, GL, and Intercompany
Position Title: SOC Level 2 Analyst Job Description: Overview: As a SOC Level 2 Analyst, you will play a crucial role in monitoring, analyzing, and responding to security incidents and threats within our organizations environment. You will work closely with SOC Level 1 analysts, as well as other cybersecurity professionals, to ensure the integrity, confidentiality, and availability of our systems and data. Responsibilities : Security Monitoring and Analysis:Monitor security event alerts generated by various security systems, including QRadar, Palo Alto, Splunk, CrowdStrike, SentinelOne, SIEM, IDS/IPS, and endpoint detection platforms.Analyze security events to identify potential security incidents or anomalies that may pose a risk to the organization. Incident Triage and Investigation:Triage incoming security alerts based on their severity and potential impact on the organization.Conduct preliminary investigations to determine the nature and scope of security incidents.Gather and analyze evidence, including logs, network traffic, and system artifacts, to identify indicators of compromise (IOCs). Incident Response and Mitigation:Assist in the containment, eradication, and recovery phases of security incidents. Follow established incident response procedures and workflows to ensure timely and effective response to security threats.Collaborate with other members of the SOC team and relevant stakeholders to coordinate incident response efforts. Threat Intelligence Analysis:Stay informed about the latest cyber threats, vulnerabilities, and attack techniques by analyzing threat intelligence feeds and reports.Use threat intelligence to enhance the organizations detection capabilities and proactively identify emerging threats. Documentation and Reporting:Maintain accurate and detailed records of security incidents, including timelines of events, actions taken, and findings.Prepare incident reports and post-mortems to document the outcomes of security incidents and lessons learned.Ensure that all documentation complies with internal policies and regulatory requirements. Continuous Improvement:Participate in ongoing training and professional development activities to enhance knowledge and skills in cybersecurity. Provide feedback and suggestions for improving SOC processes, procedures, and tools.Stay abreast of industry best practices and emerging technologies in cybersecurity. Qualifications : Bachelors degree in Computer Science, Information Security, or a related field (or equivalent experience). 5+ years of experience in a cybersecurity role, preferably in a SOC environment. Strong understanding of cybersecurity principles, concepts, and technologies.Experience with security monitoring tools such as QRadar, Palo Alto, Splunk, CrowdStrike, SentinelOne, SIEM, IDS/IPS, and endpoint detection platforms. Familiarity with incident response procedures and frameworks (e.g., NIST, SANS).Excellent analytical and problem-solving skills. Strong communication and interpersonal skills. Relevant certifications (e.g., CompTIA Security+, GIAC Security Essentials) are a plus.
Years of experience : 5- 8 years Required Skills: Python Environments and Frameworks APIs & Call Stacks (REST API) QMS system Messaging Service Stack AI/ML experience (ML/Deep learning frameworks, environments, platforms, and libraries) Azure (services) Stack Azure Data Lake SQL Servers and databases Jitterbit Desired Skills: Microsoft Azure AI Document Intelligence Microsoft Azure AI Foundry
Years of experience : 5- 8 years Required Skills: Python Environments and Frameworks APIs & Call Stacks (REST API) QMS system Messaging Service Stack AI/ML experience (ML/Deep learning frameworks, environments, platforms, and libraries) Azure (services) Stack Azure Data Lake SQL Servers and databases Jitterbit Desired Skills: Microsoft Azure AI Document Intelligence Microsoft Azure AI Foundry
As a Data Engineer, you will be responsible for developing data inbound and outbound patterns using Oracle OnPrem technology. Your key tasks will include ensuring data quality and integrity throughout the data lifecycle, proficiently using SQL for data extraction, transformation, and loading (ETL), monitoring and analyzing data workflows for bottlenecks and failures, optimizing data processing workflows for performance and efficiency, and integrating data into the Data Lake following architectural standards. Moreover, you will be expected to document and standardize data processes and workflows. In addition to the mandatory skills, having experience in implementing architectural best practices for data patterns and process design, providing technical support and training to internal stakeholders on data processing, and familiarity with process automation or tooling to enhance data workflows will be advantageous. The ideal candidate for this position should have 6-9 years of experience in the field. If you are passionate about data engineering and possess the required skills and experience, we encourage you to apply for this opportunity.,