Jobs
Interviews

220 Threat Intelligence Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

1.0 - 5.0 years

0 Lacs

punjab

On-site

As a Cybersecurity Analyst at our organization, you will play a vital role in safeguarding digital assets and making a tangible impact. We are currently looking for skilled and passionate individuals to join our IT/Cybersecurity team in Mohali, India. In this role, you will have the opportunity to monitor and detect security alerts, perform initial triage of potential incidents, and assist in incident investigations. As an L1 Analyst, you will also leverage threat intelligence to enhance detection capabilities and escalate issues when necessary. For L2 Analysts, you will lead in-depth security incident investigations and threat-hunting activities. You will be responsible for conducting vulnerability assessments, supporting remediation efforts, providing mentorship to L1 analysts, and contributing to security awareness programs. To qualify as an L1 Analyst, you should have a Bachelor's degree or equivalent experience in cybersecurity or IT, a basic understanding of security tools such as SIEM, IDS/IPS, and firewalls, strong analytical and problem-solving skills, and a willingness to work in a 24/7 environment. For L2 Analysts, a minimum of 2+ years of experience in cybersecurity, preferably in a SOC environment, is required. You should possess advanced knowledge of security tools and incident response processes, as well as relevant certifications such as CEH, CISSP, CISM, or CompTIA Security+. Joining our team means being part of a dynamic environment where your skills are valued, and you contribute to securing critical information systems. You will have access to professional growth opportunities and work in a collaborative setting dedicated to excellence in cybersecurity. This is a full-time, permanent position with benefits including health insurance, performance bonuses, and yearly bonuses. The work schedule involves rotational shifts, and the expected start date is 27/01/2025. If you are enthusiastic about cybersecurity and want to be part of a team that values your contributions, we encourage you to apply and be a part of our mission to protect digital assets.,

Posted 3 days ago

Apply

18.0 - 22.0 years

0 Lacs

karnataka

On-site

The Head of Information Security (equivalent to CISO role) in Bangalore is responsible for creating and maintaining the enterprise vision, strategy, and program to protect the organization's information assets" integrity, availability, and confidentiality. This key leadership role involves implementing and managing comprehensive security measures and practices. The individual will lead a team of security professionals, develop and execute a robust cybersecurity framework, and collaborate with different departments to mitigate risks effectively. The primary responsibilities include developing and implementing an information security strategy aligned with organizational goals, establishing and maintaining security policies and procedures, managing IT security budget, and monitoring key security metrics for compliance and effectiveness. The Head of Information Security will oversee the design and implementation of a resilient security architecture, evaluate security technologies and tools, and collaborate with technology partners to integrate security into new systems. In terms of security operations, the individual will oversee day-to-day security infrastructure operations, develop incident response plans, conduct security, risk, and vulnerability assessments, and lead incident response efforts in case of security incidents. Keeping abreast of security threats and trends, identifying vulnerabilities, conducting security audits, and managing third-party security risks are also essential responsibilities. Ensuring compliance with relevant laws, regulations, and industry standards, such as ITIL, ISO, NIST, and others, leading audits and assessments, and integrating security practices into daily operations are crucial aspects of the role. Collaborating with internal and external stakeholders, conducting security awareness and training programs, and leading OT/ICS cybersecurity initiatives are also part of the responsibilities. The ideal candidate should have a post-graduate or bachelor's degree in engineering with 18-22 years of work experience, including 7-10 years in leading a cybersecurity organization. Knowledge of IT-related regulatory requirements, industry best practices, and security certifications like CISA, CISSP, CISM, and ISO 27001:2013 LA are highly desirable. Familiarity with security technologies, excellent communication skills, and industry-specific knowledge in Healthcare or Pharma sectors are preferred qualifications for this role.,

Posted 3 days ago

Apply

1.0 - 5.0 years

0 Lacs

ahmedabad, gujarat

On-site

You will be responsible for working in 24x7 shifts and keeping continuous vigilance on all logs and alerts. Your main duties will include detecting incidents by monitoring the SIEM console, rules, reports, and dashboards. You will need to monitor SIEM console resources to identify any anomalies and report incidents to the concerned team and SOC. If SLAs are not met, you will be required to escalate the incidents. Monitoring the health of the SIEM tool, triaging events related to EDR tool and M365, and assisting the SOC Analyst in incident workflow are also part of your responsibilities. You will assist the SOC team in incident detection and resolution, communicate with external teams for incident resolution, and maintain documentation and MIS reports. In terms of technical and functional skills, you should have an understanding of Cybersecurity Fundamentals & Security Fundamentals, be proficient in log analysis, threat intelligence, and have knowledge of networking/operating systems and good communication skills. Soft skills such as problem-solving, time management, critical thinking, and teamwork are essential for this role. Additionally, having SIEM certifications and other cybersecurity certifications will be beneficial for this position.,

Posted 3 days ago

Apply

10.0 - 14.0 years

0 Lacs

hyderabad, telangana

On-site

As a Security Engineer at Google, you will have the opportunity to work in Bengaluru, Karnataka, India or Hyderabad, Telangana, India. You should have a minimum of 10 years of technical experience in areas such as cloud security research, network security, intrusion detection systems, and threat intelligence. Operating within cross-functional teams and leading Security Engineering teams in the Cloud Security domain are essential experiences for this role. In this position, you will play a crucial role in creating and maintaining a secure operating environment for Google's users and developers. Your responsibilities will include protecting network boundaries, hardening computer systems and network devices against attacks, and providing security services to safeguard sensitive data like passwords and customer information. Additionally, you will collaborate with software engineers to identify and address security flaws and vulnerabilities proactively. The ideal candidate will be an expert in at least two security domains and possess strong leadership skills to manage a team dedicated to addressing Google-wide security challenges. You will be responsible for identifying fundamental security issues within Google and driving significant security enhancements across the infrastructure. Your primary focus will be managing a team of security engineers and analysts to develop threat and abuse detection solutions for Google Cloud Platform (GCP). You will be expected to inspire and nurture talent within the team, set strategic direction, and foster collaboration with partner teams to achieve shared objectives and drive continuous improvement efforts in abuse detection. Join us at Google Cloud, where we empower organizations worldwide to digitally transform their business using cutting-edge technology and sustainable development tools. Become a part of our team and contribute to solving critical business problems for customers across more than 200 countries and territories.,

Posted 3 days ago

Apply

12.0 - 16.0 years

0 Lacs

karnataka

On-site

As a Deal Solution Designer Manager in Cyber Security offerings at EY, you will play a critical role in enabling EY and its clients to effectively address Information Security challenges. Your expertise will be instrumental in crafting efficient and precise deal proposals that facilitate the transition, management, and transformation of clients" Information Security landscapes. Your primary responsibilities include: Client Interaction: You will serve as a trusted advisor, gathering client requirements and translating them into bespoke solutions aligned with the client's objectives. Working closely with the Global Managed Services solution architect, you will define deal scope and craft proposals leveraging your technical knowledge and understanding of EY's technological capabilities. As a technical leader, you will ensure seamless communication and alignment throughout the solution development process. Deal shaping: The Cyber Security DSD plays a pivotal role in deal architecture and solution design, providing guidance on solution definition, offering thought leadership, and evaluating technical feasibility and costs. You will leverage EY Client Technology's products, tools, and processes to propose solutions that align with client requirements and vision. Technical proposal development: You will collaborate with internal stakeholders to develop deal solutions focusing on managed services for various domains. In a cloud-first environment, you will propose suitable cloud solutions and identify implementation possibilities of existing EY products to enhance customer outcomes. Essential Functions of the Job: Deal Architecture & Solutioning for mid-large-scale managed services Cyber security deals. Thought leadership during deal development, pursuit & close phases. Deep understanding of EY Global Managed Services drivers, products, tools & processes. Conduct product demonstrations and presentations. Apply TOGAF and SAFe principles to deal/solution architecture design. Integrate all architecture disciplines and identify ways to reduce costs. Proactively contribute to the development of the Architecture community. Collaborate with various teams to handover detailed solution plans after deal closure. Knowledge and Skills Requirements: Maintain an up-to-date understanding of the global cyber threat landscape. Develop and architect CTI solutions tailored to client needs. Strong tech background with experience in deal development, architecture & strategy. Good Communication Skills in English. Business acumen and ability to develop ongoing customer relationships. Identify technical risks and develop mitigation strategies. Leadership & negotiating skills. Other Requirements: Proven experience in cybersecurity, with a focus on threat intelligence and vulnerability management. Strong understanding of cybersecurity frameworks, standards, and best practices. Experience in a presales or solutions architect role within the cybersecurity industry. Certifications in Agile Delivery, DevOps, TOGAF, or IASA would be desirable. Regular international and domestic travel may be required. Job Requirements: Education: BS/MS in Computer Science, Engineering, or related field. Relevant certifications such as CISSP, CISM, CEH, or GIAC. Experience: 12+ years of technology, business development & thought leadership in Cyber Security domain. Joining EY presents a great opportunity to be part of an innovative team where your knowledge and expertise are valued in shaping cutting-edge solutions for clients.,

Posted 3 days ago

Apply

3.0 - 7.0 years

0 Lacs

karnataka

On-site

Join our dedicated team in a role where your expertise in risk assessments and cybersecurity exercises propels forward our mission of safeguarding our operations and enhancing resiliency. This position offers the unique opportunity to shape our security posture and contribute to our continuous improvement in an environment that values innovation and teamwork. As an Assessments & Exercises Senior Associate within our cybersecurity team, you will utilize industry-standard assessment methodologies and techniques to proactively identify risks and vulnerabilities in people, processes, and technology. You will collaborate with the team to design and execute risk-promoting tests and simulations, evaluate preventative controls, incident response processes, and detection capabilities. Your ability to make informed decisions and foster continuous improvement will contribute to the achievement of our team's operational goals and the mitigation of cyber and resiliency risks. Collaborate with other Assessments & Exercises team members to conduct testing and simulations such as penetration tests, technical controls assessments, cyber exercises, or resiliency simulations, and contribute to the development and refinement of assessment methodologies to ensure alignment with industry standards and regulatory requirements. Partner with subject matter experts to evaluate controls for effectiveness and impact on operational risk, as well as opportunities to automate control evaluation. Develop comprehensive assessment reports, including detailed findings, risk assessments, and remediation recommendations, and effectively communicate these insights to relevant stakeholders as you contribute to decisions that yield continuous improvement. Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best practices, and regulations. Apply this knowledge to enhance the firm's assessment strategy. Required qualifications, capabilities, and skills: - Formal Training or Certification required on Cybersecurity or resiliency, assessments or simulation exercises and 3+ years applied experience. - Prior experience in offensive or defensive technical cybersecurity roles, focusing on solutions to reduce cybersecurity risks. - Basic coding (scripting) experience in languages such as Python, C, JavaScript, and VBScript. - Demonstrated proactivity and resourcefulness in identifying and analyzing data sources for data-driven investigations. - Knowledge or experience in cybersecurity roles and processes, including Incident Response, Threat Intelligence, Penetration Testing, and more. - Familiarity with network architecture concepts, cloud architectures, and deploying large-scale applications in enterprise environments. Preferred Qualifications, Capabilities, and Skills: - Familiar in developing both tactical and strategic tools and capabilities. - Familiar in building analytical processes, templates, and documentation. - Bachelor's Degree in Computer Science or a related field, or equivalent experience.,

Posted 3 days ago

Apply

10.0 - 15.0 years

14 - 20 Lacs

Bengaluru

Work from Office

10+ yrs Exp in cybersecurity Multi-tenant MSSP SOC Analytics rules KQL Playbooks Logic Apps Workbooks Connectors Incident response Detection use cases-MITRE ATT&CK Defender XDR stack PowerShell ISO 27001 SOC 2 /PCI DSS CISSP CISM GIAC (GCIA, GCIH)

Posted 3 days ago

Apply

4.0 - 8.0 years

10 - 15 Lacs

Hyderabad

Work from Office

Note: By applying to this position you will have an opportunity to share your preferred working location from the following: Hyderabad, Telangana, India; Bengaluru, Karnataka, India Minimum qualifications: Bachelor's degree or equivalent practical experience, 5 years of experience with working in security analysis, network security, intrusion detection system, threat intelligence or threat detection, 2 years of experience as a technical security professional, with digital forensics or systems administration, Experience with executive or customer stakeholder management and communication, Experience with a data motivated approach towards solving information security tests, Preferred qualifications: Master's degree in Computer Science or a related field, Knowledge of defensive security concepts such as adversity tactic and technique, MITRE ATT and CK framework, logging etc Knowledge of networking and internet protocols( e-g , TCP/IP, HTTP, SSL) and analyzing malicious network traffic, Excellent organizational and multitasking skills, About The Job Product Security Engineering (PSE) is the team within the Cloud CISO organization responsible for helping to ensure every product Cloud ships is as secure as it can be and increasing the assurance levels of security in the infrastructure underlying all our products This team also focus on increasing the capabilities of each product team to develop more secure products by design and by default, from patterns, tools and frameworks to increasing the skill level of embedded security leads, In this role, you will be part of the team that is responsible for protecting Google and its users from attacks and abuses originating from Google Cloud Platform You will ensure trust and reputation not only for this product, but also for Google as a brand and company You will work globally and cross-functionally with several internal stakeholders, Google Cloud accelerates every organizations ability to digitally transform its business and industry We deliver enterprise-grade solutions that leverage Googles cutting-edge technology, and tools that help developers build more sustainably Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems, Responsibilities Research new detection techniques to prevent/mitigate abusive activities such as outbound security attacks, botnet, DDoS and other malicious behaviors which violate Google Cloud Platform's (GCP) Terms of Service, Develop fidelity detection to identify malicious activity based on raw network and host level telemetry, Analyze logs, packets to increase accuracy of detections, Hunt for threats/abusers and respond, Google is proud to be an equal opportunity workplace and is an affirmative action employer We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status We also consider qualified applicants regardless of criminal histories, consistent with legal requirements See also Google's EEO Policy and EEO is the Law If you have a disability or special need that requires accommodation, please let us know by completing our Accommodations for Applicants form , Show

Posted 3 days ago

Apply

4.0 - 8.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Note: By applying to this position you will have an opportunity to share your preferred working location from the following: Hyderabad, Telangana, India; Bengaluru, Karnataka, India Minimum qualifications: Bachelor's degree or equivalent practical experience, 5 years of experience with working in security analysis, network security, intrusion detection system, threat intelligence or threat detection, 2 years of experience as a technical security professional, with digital forensics or systems administration, Experience with executive or customer stakeholder management and communication, Experience with a data motivated approach towards solving information security tests, Preferred qualifications: Master's degree in Computer Science or a related field, Knowledge of defensive security concepts such as adversity tactic and technique, MITRE ATT and CK framework, logging etc Knowledge of networking and internet protocols( e-g , TCP/IP, HTTP, SSL) and analyzing malicious network traffic, Excellent organizational and multitasking skills, About The Job Product Security Engineering (PSE) is the team within the Cloud CISO organization responsible for helping to ensure every product Cloud ships is as secure as it can be and increasing the assurance levels of security in the infrastructure underlying all our products This team also focus on increasing the capabilities of each product team to develop more secure products by design and by default, from patterns, tools and frameworks to increasing the skill level of embedded security leads, In this role, you will be part of the team that is responsible for protecting Google and its users from attacks and abuses originating from Google Cloud Platform You will ensure trust and reputation not only for this product, but also for Google as a brand and company You will work globally and cross-functionally with several internal stakeholders, Google Cloud accelerates every organizations ability to digitally transform its business and industry We deliver enterprise-grade solutions that leverage Googles cutting-edge technology, and tools that help developers build more sustainably Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems, Responsibilities Research new detection techniques to prevent/mitigate abusive activities such as outbound security attacks, botnet, DDoS and other malicious behaviors which violate Google Cloud Platform's (GCP) Terms of Service, Develop fidelity detection to identify malicious activity based on raw network and host level telemetry, Analyze logs, packets to increase accuracy of detections, Hunt for threats/abusers and respond, Google is proud to be an equal opportunity workplace and is an affirmative action employer We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status We also consider qualified applicants regardless of criminal histories, consistent with legal requirements See also Google's EEO Policy and EEO is the Law If you have a disability or special need that requires accommodation, please let us know by completing our Accommodations for Applicants form , Show

Posted 3 days ago

Apply

2.0 - 3.0 years

3 - 6 Lacs

Bengaluru

Work from Office

Exclusive Walkin Drive for Security Engineer (AI) at Bangalore on 12th August 25 Greeting from Infosys BPM Ltd., You are kindly invited for the Infosys BPM:: Walk-In Drive on 12th August 25 at Bangalore(JP Nagar). Note: Please carry copy of this email to the venue and make sure you register your application before attending the walk-in. Please mention Candidate ID on top of the Resume https://career.infosys.com/jobdesc?jobReferenceCode=PROGEN-HRODIRECT-206442 Interview Information: Interview Date: 12 August 2025 Interview Time: 9 AM till 12 PM Interview Venue - Bangalore:: Infosys BPM Limited, #785,Ground Floor Axis Sai Jyoti, 15th Cross 100 Feet Road,Sarakki,1st Phase JP Nagar, Bengaluru, Karnataka560078 Landmark: Near Sindhoor Convention Centre Note: No Candidate parking facility available at JP Nagar recruitment center location. Documents to Carry: Please carry 2 set of updated CV (Hard Copy). Please carry Face Mask**. Mandatory to carry PAN or Passport for Identity proof. Job Description Job Title: Security Engineer AI CoE (Vulnerability Management & Penetration Testing) Experience: 2-3 yrs Location: Bengaluru Department: DTS - AI Center of Excellence (CoE) Employment Type: Full-time About the Role: We are seeking a proactive and detail-oriented Security Engineer to join our AI Center of Excellence (CoE) . In this role, you will work closely with AI product teams to identify, assess, and remediate security vulnerabilities across cloud-native and AI-driven platforms. You will play a key role in ensuring the security posture of our AI solutions through vulnerability scans, penetration testing, and secure DevOps practices. Key Responsibilities: Conduct regular vulnerability assessments using tools like Qualys , Nessus , or OpenVAS . Collaborate with product and DevOps teams to triage, prioritize, and remediate vulnerabilities in application and infrastructure layers. Assist in penetration testing activities and support red/blue team exercises. Implement security controls and best practices across Azure , AWS , or GCP environments. Contribute to secure CI/CD pipelines by integrating security checks and automating compliance. Maintain documentation of findings, remediation plans, and risk mitigation strategies. Stay updated on emerging threats, CVEs, and cloud security trends. Required Skills & Qualifications: 24 months of experience in cybersecurity , DevSecOps , or cloud security roles. Familiarity with vulnerability scanning tools and penetration testing methodologies . Basic understanding of cloud security principles (Azure/AWS/GCP). Exposure to OWASP Top 10 , CIS Benchmarks , and secure coding practices . Strong analytical and problem-solving skills. Good communication skills to collaborate with cross-functional teams. Preferred Qualifications: Certifications such as CEH , Security+ , AZ-500 , or AWS Security Specialty . Experience with SIEM tools (e.g., Splunk,Sentinel) and threat modeling . Knowledge of scripting for automation (Python, Bash, PowerShell). Exposure to AI/ML security or model risk management is a plus. What Youll Gain: Hands-on experience securing AI platforms and cloud-native applications. Opportunity to work with cutting-edge technologies in a fast-paced innovation hub. Mentorship from senior security architects and cloud experts. A collaborative environment focused on continuous learning and impact. Regards, Infosys BPM Recruitment team

Posted 3 days ago

Apply

6.0 - 11.0 years

12 - 22 Lacs

Coimbatore

Work from Office

About the Role: As a Information Security Officer, you'll join growing Global Corporate Security Office diverse international team bridging divisions, central services, and global entities. Ideal for career changers or early cybersecurity enthusiasts, this role offers a hands-on learning experience with room to grow. What Youll Do: Develop, review, and maintain security policies and procedures; produce documentation and guidelines to foster organizational security awareness. Support or manage internal frameworks and audits related to ISMS (ISO 27001), QMS (ISO 9001), and SOC2. Handle security incidents end-to-end, from detection to resolution and post-incident analysis. Contribute to security-focused projects: define requirements, assess risks & mitigations, and monitor adherence to securitybydesign principles. Advise on secure product design and development to uphold privacy and regulatory standards. Build team security maturity: assess current competencies, identify gaps, propose improvements, and drive training initiatives. Serve as a liaison for a designated Cegeka Group entity, addressing security/compliance queries and verifying conformance with baseline standards. Support corporate security office in validating compliance across group entities (CSAF/minimum security standards). Maintain the corporate security risk register: identify, document, and track organizational risks. Seek and participate in ongoing training to strengthen security expertise; provide feedback and suggest enhancements to existing processes. Technical Exposure: SIEM/SOAR : Hands-on experience with Splunk or equivalent tools. EDR : Familiarity with CrowdStrike endpoint protection. Vulnerability Management : Using tools like Microsoft Intune . Network Security : Understanding of firewalls (e.g., FortiGate) and other perimeter controls. Application Security (AppSec) : Secure coding practices, code reviews, and application threat modeling. SDLC Security : Integration of security controls into development lifecycles. AI Risk Awareness : Understanding risks associated with AI models and data privacy. Enterprise Risk Management : Experience in identifying, analyzing, and mitigating enterprise-level security risks. Threat Intelligence : Ability to analyze threat reports and integrate actionable intelligence into security posture. Requirements: Bachelors or masters degree in a relevant field or equivalent practical experience. Excellent communication capabilities with both technical and business stakeholders (e.g., CISO, IT, engineering). Familiarity with frameworks like NIST or ISO 27001. CISSP and/or CISM certifications. Fluent in English (verbal and written)

Posted 3 days ago

Apply

3.0 - 5.0 years

1 - 6 Lacs

Noida

Work from Office

Good experience in SIEM tools, event logging and event analysis and experience in forensic analysis, Packet Analysis tools like Wireshark, TCP Dump etc. SIRT/SIEM/Threat Hunting Background/intel, netwitness, splunk, qRadar, RSA Netwitness, Linux/python understanding/Ethical hiking/programming background added advantage. Good knowledge in enterprise security products like SIEM tools, SOC, Security Incident Management, Threat Intel, Malware analysis, Firewalls, IPS, Web/content Filtering tools, AV, APT Tools, Wireshark, TCP Dump, Encase/Any other Forensic tool kit Very good understanding of security fundamentals and principles, attack techniques, Mitre, TTP, hacking tools etc Having experience of managing team of 24X7 team members across multiple locations. Red/Blue teaming activities Hands on experience on Threat Intel Management/Platform (TIM/TIP) Leveraging knowledge of the Cyber Kill Chain Framework and working familiarity of the MITRE ATT&CK Framework. Location: Noida. Must be willing to work in 24/7 shifts (including night shifts).

Posted 3 days ago

Apply

6.0 - 8.0 years

11 - 16 Lacs

Hyderabad

Work from Office

What is the Security Operations responsible for? Security Operations is responsible for continuous monitoring and improving organizations security posture while preventing, detecting, analyzing, and responding to Cyber Security incidents with the aid of both technology and well-defined processes and procedures. Security Operations is expected to possess extensive knowledge of incident response methodologies, a deep understanding of cybersecurity threats, and hands-on experience in managing and mitigating security incidents. What are the ongoing responsibilities of Analyst Security Operations? Lead and coordinate incident response activities, ensuring timely and effective resolution. Develop and maintain incident response playbooks and procedures. Perform threat hunting using SIEM, EDR, and threat intelligence. Conduct digital forensics and malware analysis to determine the scope and impact of incidents. Collaborate with IT, legal, and business teams to contain and remediate threats. Stay current with emerging threats, vulnerabilities, and security trends. Mentor and guide junior SOC analysts. Required Qualifications: Experience:6-8 years in cybersecurity, with a focus on SOC operations and incident response. Environment:Experience in a 24x7 operational environment, preferably across multiple geographies. Technical Skills: Good understanding of networking protocols, operating systems (Windows/Linux), and security technologies. Exposure to malware analysis and digital forensics. Familiarity with cybersecurity frameworks (e.g., NIST, MITRE ATT&CK, ISO 27001). Hands-on experience with tools such as: SIEM:Splunk, CrowdStrike, QRadar EDR:CrowdStrike, Carbon Black, SentinelOne SOAR:Palo Alto XSOAR, Splunk SOAR Forensics:FTK Imager, Autopsy, Wireshark, Procmon Preferred Certifications: GIAC Certified Incident Handler (GCIH) GIAC Certified Forensic Analyst (GCFA) Certified Ethical Hacker (CEH) Soft Skills & Attributes: Strong analytical and problem-solving mindset. Excellent communication and collaboration skills. Ability to work under pressure and manage multiple priorities. High integrity and a proactive, team-oriented attitude. Strategic and tactical thinking with attention to detail. Work Shift Timings - 6:00 AM 3:00 PM 2:00 PM - 11:00 PM IST

Posted 3 days ago

Apply

5.0 - 9.0 years

0 Lacs

maharashtra

On-site

As a Customer Success Manager at CloudSEK, you will play a pivotal role in ensuring that strategic accounts derive maximum value from our cybersecurity solutions. Your primary responsibilities will involve cultivating strong relationships with clients, offering expert guidance on threat management, and facilitating seamless integration and utilization of CloudSEK's products. Your background in cybersecurity will be instrumental in comprehending and addressing the specific needs and challenges faced by our clients. Your key responsibilities will include: Account Management: - Cultivating and nurturing relationships with client accounts to maintain high levels of customer satisfaction and retention. - Conducting Quarterly Business Reviews (QBRs) and Annual Business Reviews (ABRs) to evaluate and enhance customer engagement. - Engaging with customers in-person twice a year to reinforce relationships and gain insights into their evolving requirements. Cybersecurity Expertise: - Providing expert advice on threat intelligence, data leak prevention, and other cybersecurity issues. - Serving as a security analyst by offering insights and recommendations based on threats identified by CloudSEK's platform. - Collaborating with customer security teams to ensure optimal utilization of CloudSEK's solutions. Customer Engagement: - Developing and implementing customer engagement strategies to establish strong relationships with key stakeholders, including CXOs and CISOs. - Cultivating customer champions within client organizations to drive advocacy and referrals. - Generating and sharing client-specific quality reports, while gathering feedback to continuously enhance service delivery. Revenue Generation and Retention: - Identifying opportunities for upselling and cross-selling CloudSEK's products and services. - Ensuring timely renewals and maintaining a high customer retention rate. - Sourcing referrals and actively participating in revenue generation activities. Product Usage and Feedback: - Ensuring 100% product usage for subscribed features by customers. - Conducting configuration reviews and providing recommendations for product enhancements. - Collecting and analyzing customer feedback to contribute to product development and improvement. Operational Excellence: - Maintaining accurate records of customer interactions and activities in CRM systems. - Contributing to the team by sharing knowledge, conducting training sessions, and creating internal articles. Qualifications: - 5+ years of experience in Cybersecurity, Client-facing roles, or related positions in the cybersecurity industry. - Profound understanding of cybersecurity principles, threat intelligence, and digital risk management. - Excellent communication and interpersonal skills to build robust client relationships. - Proven track record of achieving customer success goals and driving revenue growth. - Ability to work autonomously and manage multiple accounts concurrently. If you possess experience in conducting Business Reviews, managing Onsite meetings, maintaining NRR and GRR, and excelling in Threat Analysis and Value Delivery, it would be considered advantageous. Joining CloudSEK offers you an opportunity to develop and enhance your skills while contributing to meaningful work. In addition to a competitive salary, we provide a comprehensive range of generous perks and incentives, including flexible working hours, along with access to food, unlimited snacks, and drinks in the office. Moreover, we believe in unwinding and fostering a sense of community through games, fun activities, and music, allowing you to showcase your artistic side.,

Posted 4 days ago

Apply

5.0 - 12.0 years

0 Lacs

maharashtra

On-site

You are invited to join our team as a skilled and vigilant L1 Cyber Security Professional for EDR Operations within our dynamic security team. Your primary responsibility will involve monitoring, analyzing, and responding to security incidents, particularly focusing on Carbon Black EDR alerts and maintaining SLAs. As a qualified candidate, you should possess a Graduation/Post-graduation degree in Computers, Information Systems, Computer Science, or Information Technology Systems with 5 to 7 years of relevant work experience as a security analyst, including hands-on experience with EDRs. It is preferred that you hold at least one cyber security certification such as CEH, CompTIA+, etc. Additionally, familiarity with banking business practices and IT trends in the banking sector would be beneficial. Your role will require you to proactively research and monitor Carbon Black EDR, identify potential threats, troubleshoot EDR agent-related issues, and analyze endpoint data to detect Indicators of Compromise (IOCs) and suspicious activities. Furthermore, you should be well-versed in threats like phishing, ransomware, spyware, and have the ability to decode encrypted scripts for alert execution comprehension. In this position, you will conduct initial triage and assessment of security incidents, escalate confirmed incidents to the appropriate teams, and ensure all EDR operations and tickets are resolved within SLAs. It is essential to have expertise in TCP/IP network traffic, Internet protocols, event log analysis, and stay updated with the latest cybersecurity threats, vulnerabilities, and trends relevant to endpoints. Moreover, you should be familiar with Runbooks, Playbooks, and Standard Operating Procedures, possess strong analytical skills to support conclusions, and maintain awareness of industry best practices for endpoint security and threat detection. Effective communication, teamwork, positive attitude, and a sense of ownership are key personal skills required for this role. If you are ready to take on this exciting opportunity and meet the specified qualifications, please share your updated resume with us at kanchana@kaivale.com.,

Posted 4 days ago

Apply

2.0 - 6.0 years

0 Lacs

karnataka

On-site

The Associate Intelligence Operations Analyst is responsible for conducting internal triage operations, aligning intelligence services to customer requirements, liaising with the various components of the Intelligence Team internally, and managing customer requests from initiation to delivery. You will serve as a single point of contact for the intelligence delivery process, enforcing Standard Operating Procedures, making improvements, and communicating procedural changes across ZeroFox. Provide support for unique and client-tailored requests that arise on an ad hoc basis. Undertake ownership of processes as required, demonstrating the ability to deliver results within specified deadlines autonomously. You will maintain and update Standard Operating Procedures, Frequently Asked Questions, and other intelligence documentation. Conduct after-action analysis to identify lessons learned, mistakes, personnel issues, and suggestions for improved processes. Continuously seek improvements based on internal and external feedback while liaising with various internal departments and stakeholders to keep lines of communication open. Required qualifications include fluency in written and spoken English with exceptional grammar and articulate communication skills. You should possess more than 2 years of demonstrable experience in composing content on subjects such as cyber security, threat intelligence, information technology, or related fields. An unwavering attention to detail in research and writing is essential, with the ability to produce quality work under aggressive deadlines. Comfort with independent and team work, adaptability to varying situations, and innovative problem-solving skills are necessary. Upholding discretion and confidentiality is crucial, along with the flexibility to provide weekend support. Desired qualifications include familiarity with open-source research, a strong understanding of cybersecurity, basic knowledge of geopolitics and current affairs, and experience in copy editing. In this role, you will be the sole liaison in communication between the Intelligence Team for all intelligence operations. Maintaining a high sense of professionalism and respect while communicating internally and externally on behalf of the intelligence teams is key. You will provide outstanding customer service for both clients and teammates in other business units. ZeroFox offers an awesome culture with a close-knit, talented, and innovative team. Opportunities for learning and contributing to the Digital Risk Protection platform exist in a respectful and nourishing work environment where every opinion is valued. Innovation is central to our operations, fostering a purposeful environment that enables rapid research, development, and innovation. Excellent communication across teams, organizations, and leaders is encouraged, with competitive compensation and benefits available. ZeroFox is dedicated to making the internet safer for all through innovation and disruptive cybersecurity solutions. With a people-first culture and a focus on disrupting external cyber threats, it's an exciting time to join us on our mission. If you're ready to be part of a collaborative team and take on the challenges of cybersecurity, consider joining us in the Den today.,

Posted 4 days ago

Apply

0.0 - 1.0 years

6 - 9 Lacs

Bengaluru

Work from Office

We help progressive enterprises navigate the new reality of digital risks with proactive and intelligent cybersecurity, Job Description Key Responsibilities: Lead Generation & Prospecting Research and identify potential clients within the BFSI/NBFC segments using online databases, social platforms (e-g, LinkedIn), and CRM tools, Develop and maintain a list of qualified leads based on ideal customer profiles, Segment and prioritize leads based on business potential and interest, Cold Calling & Outreach Initiate outbound calls/emails to potential clients to introduce the companys cybersecurity offerings, Engage with gatekeepers and decision-makers (CISOs, CTOs, IT heads), Set up appointments or demos for the Account Growth Director Understanding Cybersecurity Products Develop a basic understanding of cybersecurity concepts (firewalls, endpoint protection, SIEM, DLP, threat intelligence, etc ), Learn and clearly communicate value propositions, product benefits, and use cases, Stay up-to-date with industry trends, compliance requirements (like RBI guidelines for NBFCs), and competitors, CRM & Reporting Log all outreach activities in CRM tools Track and report key metrics such as call volume, lead conversion rates, and meeting setups, Follow up diligently on interested leads and keep them warm through nurturing campaigns, Preferred Skills & Qualities Strong communication and persuasion skills, especially over the phone, Basic understanding of cybersecurity solutions or willingness to learn quickly, Prior internship or experience in B2B or tech sales is a plus, Familiarity with the financial and NBFC sector is an advantage, Self-motivated, target-driven, and organized, check(event)

Posted 4 days ago

Apply

2.0 - 5.0 years

3 - 6 Lacs

Lucknow

Work from Office

Responsibilities: * Collaborate with security teams on threat response plans * Monitor endpoints for suspicious activity * Analyze SIEM data for threats & incidents * Conduct regular SOC audits & reporting *SIEM CV- hr@megahertzinfotech.com

Posted 4 days ago

Apply

3.0 - 8.0 years

13 - 17 Lacs

Pune

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Cyber Threat Intelligence Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to assess security needs, documenting security controls, and transitioning to cloud security-managed operations, all while ensuring compliance with industry standards and best practices. You will engage in discussions to refine security strategies and provide guidance on implementing effective security measures across the organization. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Conduct regular assessments of cloud security measures to identify potential vulnerabilities and recommend improvements.- Collaborate with cross-functional teams to ensure alignment of security practices with business objectives. Professional & Technical Skills: - Must To Have Skills: Proficiency in Cyber Threat Intelligence.- Strong understanding of cloud security principles and frameworks.- Experience with threat modeling and risk assessment methodologies.- Familiarity with security compliance standards such as ISO 27001, NIST, and GDPR.- Ability to analyze and respond to security incidents effectively. Additional Information:- The candidate should have minimum 3 years of experience in Cyber Threat Intelligence.- This position is based at our Pune office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 4 days ago

Apply

7.0 - 12.0 years

13 - 17 Lacs

Gurugram

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Threat Hunting Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Engage with multiple teams and contribute on key decisions- Provide solutions to problems for their immediate team and across multiple teams- Lead security threat hunting initiatives- Develop and implement threat detection strategies- Conduct security assessments and audits Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Threat Hunting- Strong understanding of threat intelligence analysis- Experience with security incident response- Knowledge of cloud security best practices- Hands-on experience with security tools and technologies Additional Information:- The candidate should have a minimum of 7.5 years of experience in Security Threat Hunting- This position is based at our Gurugram office- A 15 years full time education is required Qualification 15 years full time education

Posted 4 days ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Operation Automation Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :We are seeking an experienced and innovative SOAR Architect to lead the design, development, and implementation of advanced Security Orchestration, Automation, and Response (SOAR) solutions. The ideal candidate will leverage their expertise in platforms like Splunk Phantom, Chronicle SOAR, and Cortex XSOAR to optimize and automate incident response workflows, enhance threat detection, and improve overall security operations efficiency. Roles & Responsibilities:- SOAR Strategy and Architecture:Develop strategies for automation, playbook standardization, and process optimization.- Playbook Development:Create, test, and deploy playbooks for automated threat detection, investigation, and response. Collaborate with SOC teams to identify repetitive tasks for automation and translate them into SOAR workflows.- Integration and Customization:Integrate SOAR platforms with existing security tools, including SIEM, threat intelligence platforms, and endpoint protection. Customize connectors and APIs to enable seamless communication between security tools.- Collaboration and Leadership:Work closely with SOC analysts, threat hunters, and other stakeholders to align automation efforts with organizational goals. Provide technical mentorship to analysts on SOAR platform utilization.- Performance Optimization:Continuously evaluate SOAR platform performance and implement improvements for scalability and reliability. Monitor automation workflows and troubleshoot issues to ensure consistent operations.- Compliance and Best Practices:Ensure that all SOAR implementations align with industry standards, compliance regulations, and organizational policies. Stay up to date with the latest advancements in SOAR technology and incident response practices. Professional & Technical Skills: - Proficiency in scripting and programming Python to develop custom playbooks and integrations.- Strong understanding of security operations, incident response, and threat intelligence workflows.- Proven track record of integrating SOAR with SIEM solutions (e.g., Splunk, Chronicle), EDR, and other security tools.- Ability to troubleshoot complex integration and automation issues effectively. Additional Information:- Certifications such as Splunk Phantom Certified Admin, XSOAR Certified Engineer, or equivalent.- Experience with cloud-native SOAR deployments and hybrid environments.- Familiarity with frameworks like MITRE ATT&CK, NIST CSF, or ISO 27001.- A 15 year full-time education is required- 3.5 years of hands-on experience with SOAR platforms like Splunk Phantom (On-Prem and Cloud), Chronicle SOAR, and Cortex XSOAR. Qualification 15 years full time education

Posted 4 days ago

Apply

8.0 - 12.0 years

0 Lacs

hyderabad, telangana

On-site

The Manager, Exposure Management plays a crucial role in identifying, analyzing, and mitigating cybersecurity exposures across enterprise systems. Your focus will be on vulnerability management, attack surface monitoring, and web application scanning to ensure timely detection and response to risks impacting the organization's digital footprint. It is essential to possess strong technical expertise, attention to detail, and the ability to collaborate across teams to influence remediation activities and enhance security posture. Key Responsibilities - Operate enterprise vulnerability scanning platforms, validate findings, and monitor remediation efforts effectively. - Continuously assess the organization's internal and external attack surface for untracked assets, misconfigurations, and exposed services. - Identify and manage asset ownership across business units, ensuring accurate data consistently reflected in the configuration management database (CMDB). - Collaborate with infrastructure, application, and business stakeholders for prompt and comprehensive updates to asset and ownership records. - Configure, execute, and analyze web application security scans, working closely with development teams to address identified issues. - Prioritize vulnerabilities based on exploitability, threat intelligence, and business impact using structured frameworks and tools. - Prepare detailed reports and dashboards tailored for various audiences, from technical teams to executive leadership. - Partner with IT, infrastructure, and cybersecurity stakeholders to facilitate risk-informed remediation activities. - Contribute to continuous process enhancements and tool optimization throughout the exposure management lifecycle. Basic Qualifications - A Bachelor's degree in Computer Science, Information Security, Engineering, or a related technical field, along with a minimum of 10 years of experience in cybersecurity, focusing on vulnerability or exposure management. - A Master's degree in Computer Science, Information Security, Engineering, or a related technical field, combined with at least 8 years of experience in cybersecurity, with a focus on vulnerability or exposure management. Preferred Qualifications - Hands-on experience with tools like Tenable, Qualys, Rapid7, or similar platforms. - Familiarity with web application scanning tools and techniques. - Experience in managing or supporting a CMDB and asset lifecycle processes in a large organization. - Understanding of frameworks such as CVSS, MITRE ATT&CK, and NIST CSF. - Strong communication and analytical skills to effectively communicate technical risks to business stakeholders. - Experience supporting compliance and regulatory programs within a global business context. In addition to competitive benefits programs, we offer health insurance, professional development opportunities, and an Employee Assistance Programme to help you achieve your personal goals. At our organization, we value the expertise, creativity, and passion of our employees and strive to create an inclusive environment that promotes growth, innovation, and diversity. Join us and be part of The Carrier Way, where you can make a difference. Apply now!,

Posted 6 days ago

Apply

3.0 - 7.0 years

0 Lacs

haryana

On-site

We are seeking a highly motivated Business Analyst with expertise in analyzing and documenting requirements for ServiceNow security modules. The ideal candidate will possess a strong background in vulnerability management, security incident response, and ServiceNow capabilities. This role entails close collaboration with stakeholders, developers, and solution architects to ensure accurate requirements gathering, gap analysis, and solution design. Collaborating with business and technical teams is a key responsibility of this role to gather, analyze, and document detailed business and functional requirements effectively. The candidate must be adept at writing clear user stories in ServiceNow JIRA, following Agile SDLC processes. Creating process flows using Visio and defining expected outcomes based on stakeholder communication are essential tasks. Moreover, working closely with developers and solution architects to translate business needs into technical solutions is a vital aspect of this position. The candidate will conduct requirement validation sessions with stakeholders to ensure clarity and alignment, contribute to process improvements, and identify opportunities to enhance current implementations. Thorough documentation, strong attention to detail, and timely communication throughout the project lifecycle are crucial. Required Skills & Qualifications: - Bachelor's degree in Computer Science, Engineering, Business, or a related field. - 3 years of hands-on experience in Requirement Analysis. - Strong analytical and problem-solving skills. - Excellent verbal and written communication skills with a high level of attention to detail. - Experience working in Agile environments, with tools like JIRA, Visio, etc. ServiceNow Expertise (Preferred): - Hands-on knowledge of ServiceNow modules: Vulnerability Response (VR), Security Incident Response (SIR), Threat Intelligence. - Good to have exposure to GRC (Governance, Risk, and Compliance), Security Operations Center (SOC), Service Portal & Workspaces. - Basic understanding of REST APIs and ServiceNow integrations. - Certifications preferred: ServiceNow Admin Certification, CIS Vulnerability Response (CIS-VR), CIS Security Incident Response (CIS-SIR). Key Attributes: - Ability to recognize implementation gaps, risks, and potential improvements. - Strong stakeholder engagement and coordination skills. - Capable of balancing multiple priorities in a dynamic, fast-paced environment.,

Posted 1 week ago

Apply

3.0 - 7.0 years

0 Lacs

haryana

On-site

As a Security Engineer at Expedia Group, you will be part of the Security Solutions Engineering team responsible for designing and implementing critical security systems and services. Your role will involve working on key initiatives from conceptualization to deployment, requiring a deep understanding of complex technical environments and the ability to develop effective security solutions. Your responsibilities will include: - Implementing Endpoint Detection and Response (EDR) solutions such as Anti-malware Agents and Data Loss Prevention - Managing Web Content Filtering for seamless Internet protection using on-premise and cloud-based web proxies - Overseeing Vulnerability Management for DC and cloud assets, including patching and compliance - Utilizing Threat Intelligence feeds from sources like Recorded Future - Conducting Threat detection through User Behavior Analysis and investigation - Integrating SIEM & SOAR solutions and managing Container security - Implementing Network security measures including Web Application Firewall, Intrusion Prevention, and Anti-malware detection - Maintaining, monitoring, and enhancing systems and security posture with a focus on service excellence - Collaborating with cross-functional teams to solve complex problems and influence engineering practices To qualify for this role, you should have: - A Bachelor's or Master's degree in a Technical field or equivalent professional experience - At least 3 years of experience in security engineering and operations support in a mission-critical environment - Hands-on experience with AWS Cloud services and security - Proficiency in various security technologies such as Web Content Filtering, Web Application Firewalls, Intrusion Detection Systems, and SIEM - Strong analytical skills and the ability to correlate and analyze security-related data - Programming experience in languages like Java, Python, Perl, or C++ - Excellent organizational and communication skills - A proactive and innovation-driven mindset with the ability to thrive in a fast-paced environment If you require any accommodations during the application process, please contact our Recruiting Accommodations Team. Join us at Expedia Group and be part of a diverse and inclusive community that values your contribution to shaping the future of travel.,

Posted 1 week ago

Apply

7.0 - 10.0 years

11 - 15 Lacs

Mumbai

Work from Office

At Seclore, we're redefining how enterprises secure their dataanytime, anywhere. As a Senior Sales Engineer, youll be at the forefront of that mission. Youll work hand-in-hand with the sales team, acting as a trusted technical advisor and solution architect for prospects and customers. If youre passionate about uncovering needs, crafting innovative solutions, and building strong customer relationships, wed love to talk. Here's what you will get to explore: Sales Collaboration: Work alongside the sales team to introduce Seclores data-centric security solutions to prospective customers. Discovery Solution Design: Lead discovery sessions to deeply understand customer needs, then design and deliver tailored technical presentations and demos to C-level and technical audiences. Technical Expertise: Become a subject matter expert in Seclores platform, leveraging product capabilities to create impactful, customized solutions. Proof of Value Execution: Define use cases, success criteria, and test scenarios. Coordinate technical setup and environmental prerequisites. Guide the customer through evaluation, provide support, and ensure a successful closure. Proposal RFP Support: Collaborate on technical content, pricing models, and implementation plans for RFPs and RFIs. Market Insight: Track security market trends, competitive products, and create internal battlecards to aid in strategic selling. Customer Advocacy: Act as the voice of the customer internally, offering feedback to Product Management and Engineering. Partner Enablement: Support ecosystem partners in developing best-fit solutions. Cross-Functional Collaboration: Work closely with Product, Engineering, Delivery, and Support to ensure alignment during the sales cycle. We can see the next Entrepreneur At Seclore if you: Have a Bachelors or Masters degree in a relevant field. Experience: 7+ years in a customer-facing Sales Engineering or Pre-Sales role at an enterprise software company, ideally in the data security domain. Communication: Strong written and verbal communication skills, with the ability to convey technical concepts to both technical and non-technical stakeholders. Presentation: Proven experience delivering compelling product demos, technical presentations, and user training sessions. Mindset: Self-driven, collaborative, and adaptablewith a focus on closing deals and thriving in a fast-paced startup culture. Bonus Points (Preferred Skills) Experience with data-centric security technologies such as: DLP, Data Classification, Encryption, Threat Intelligence CASB, Endpoint Security, Email Security, Cloud Security Cloud environment understanding like Azure, AWS, etc. AD and User Authentication tools and services Certifications in cybersecurity or related domains Familiarity with verticals like BFSI, Pharma, Manufacturing etc. and their compliances and regulations CRM proficiency and a structured approach to asynchronous work and documentation Why do we call Seclorites Entrepreneurs, not Employees We value and support those who take the initiative and calculate risks. We have an attitude of a problem solver and an aptitude that is tech agnostic. You get to work with the smartest minds in the business. We are thriving, not living. At Seclore, it is not just about work but about creating outstanding employee experiences. Our supportive and open culture enables our team to thrive.

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies