Jobs
Interviews

8 Threat Monitoring Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 7.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

We are seeking an experienced and visionary Head of Cyber Security to lead our global and regional cybersecurity efforts. This senior leadership role will be responsible for defining and executing a comprehensive security strategy that safeguards our digital assets and operations across multiple geographies. Key Responsibilities Develop and implement a robust cybersecurity strategy aligned with global and regional business goals. Lead the design, development, and operation of a world-class Security Operations Center (SOC) . Oversee threat monitoring , incident response , digital forensics , and penetration testing activities. Manage cybersecurity architecture and ensure compliance with international standards, including ISO 27001 , NIST , and GDPR . Architect and implement proprietary threat detection and cyber defense platforms. Serve as the principal cybersecurity advisor to internal stakeholders, clients, regulatory bodies, and strategic partners. Drive cyber readiness, conduct internal risk assessments, and lead employee awareness training programs. Recruit, mentor, and develop high-performing cybersecurity teams and technical staff. Qualifications & Experience 5+ years in a senior cybersecurity leadership role , preferably in critical infrastructure, defense, or government environments. Deep expertise in network security , SIEM , IDS/IPS , incident response , and digital forensics tools and methodologies. Proven experience managing large-scale cyber operations across multiple countries or regions. Strong understanding of global cybersecurity frameworks: ISO 27001 , NIST , GDPR , etc. Excellent leadership, communication, and stakeholder engagement skills. Show more Show less

Posted 3 weeks ago

Apply

3.0 - 7.0 years

0 Lacs

navi mumbai, maharashtra

On-site

The role is based in Navi Mumbai and you will be required to attend a Face to Face Drive on 5th July (Saturday), with all rounds of the interview process scheduled for the same day. The ideal candidate should have an immediate to 45 days" notice period. Your main responsibilities will include round-the-clock threat monitoring and detection, as well as the analysis of any suspicious, malicious, and abnormal behavior. You will be responsible for alert triage, initial assessment, incident validation, severity determination, and urgency evaluation. Additionally, you will need to prioritize security alerts and create Incidents following Standard Operating Procedures (SOPs). It will be your duty to report and escalate incidents to stakeholders and conduct post-incident analysis. You will be expected to consistently triage incidents and provide recommendations using playbooks. Furthermore, you will be required to develop and maintain incident management and incident response policies and procedures. Part of your role will involve the preservation of security alerts and security incident artifacts for forensic purposes. You must adhere to Service Level Agreements (SLA) and Key Performance Indicators (KPIs) and work towards reducing the Mean Time to Detection and Response (MTTD & MTTR).,

Posted 1 month ago

Apply

7.0 - 10.0 years

25 - 30 Lacs

Noida

Work from Office

Functional Competencies 1. Security Monitoring (Threat Monitoring, Detection and Response). 2. Security and Vulnerability Assessments. 3. Security Incident Management. 4. Identity and Access Management. Job Duties & Responsibilities 1. Applying subject expertise in evaluating business operations and processes. 2. Identifying areas where technical solutions would improve business performance. 3. Consulting across business operations, providing mentorship, and contributing specialized knowledge. 4. Recommending technical solutions and determining software development requirements. 5. Providing subject expertise and guidance to Security Analysts, Leads. 6. Overseeing the development, testing, and implementation of technical solutions. 7. Determining whether technical solutions meet defined requirements. 8. Verifying technical reference information, including user guides, training manuals, and system requirements. 9. Ensuring accurate representation of expertise prior to the distribution of technical solutions to end-users. 10. Documenting processes and disseminating information to all relevant stakeholders. 11. Conducting thorough research to stay updated on changes in their field of expertise. 12. Contributing to the development of policies and procedures relevant to their area of expertise. Special and Other duties 1. Prepare various reports for management decision making. 2. Perform other functions as assigned by the Chief Information Security Officer or Management. 3. Manage Subordinates performance and conduct formal appraisal. Competency Requirement Education or Academic Qualification 1. Bachelors degree in computer science or related streams. 2. NFQ Level 7+ Work Exposure or Professional Experience 1. Minimum 7 years of relevant experience in Information Security with at least 5 years in Security Operations. 2. Professional certification like CISSP, CISM, ISO27001, CEH. 3. Advanced ability to recommend and implement technical solutions for cross-functional projects. 4. Knowledge of systems and software engineering to optimally integrate subject expertise in software solution designs. 5. Excellent recordkeeping, as well as written and verbal communication skills. 6. Thorough understanding of the latest security principles, techniques, and protocols. 7. Problem solving skills and ability to work under pressure. Skills required (Soft & Technical) 1. Security Operations, Security Architecture. 2. Knowledge of Security Portfolio and Operations.

Posted 1 month ago

Apply

10.0 - 14.0 years

20 - 35 Lacs

Noida

Work from Office

Lead Security Analyst (P4) Must Have skills: SOC, End to end investigation, L4 ticket investigation, IDR ( Incident Response) , Digital Forensics, Public Cloud Experience: 10 to 14 years Shift: Rotational Job Responsibilities: As a Level 4 (L4) Lead Security and Threat Monitoring Analyst, you will be part of UKGs Global Security Operations Center (GSOC) team investigating events of interest and incidents as they are validated, prioritized, and categorized by UKGs 24x7 L1, L2 and L3 analyst teams. You will facilitate and follow UKG’s standard processes to investigate, contain, eradicate, and respond in a continued and unified effort to protect the confidentiality, integrity, and availability of UKG, our partners’ and customers’ data and services. You will be an escalation point for all incidents, either regionally or during shift assignment; analyzing, confirming, re-prioritizing if necessary and/or escalating/remediating those identified threats within the UKG computing environment. Having handson experience into Digital Forensics and Public cloud. You will work closely with UKG’s GSOC teams in the US, Europe, and India to promote an integrated, uniform, and holistic threat detection and response capability to facilitate and enable a robust and proactive security posture. You will leverage your skills, experience, and creativity to perform initial, forensically sound collection and analysis, methodologies to contain, eradicate, and recover from realized threats such as zero-day, ransomware, malware and other APT’s. Additionally, you will be responsible for participating in incident response activities as part of the Cyber Incident Response Team (CIRT) or as the Cyber Incident Response Lead (CIRL), post incident reporting and continuous improvement recommendations to enhance UKG’s security posture through process development, tool rationalization, detection technique and automation enhancement opportunities and enablement/training possibilities. Due to the nature of the work, you are required to have occasional on-call duties on weekends and/or holidays. Additional work hours may also be required during an incident investigation. Primary/Essential Duties and Key Responsibilities: • Review tickets escalated from L1 or L2 analysts to confirm the priority, category and accuracy of the details and conditions. • Pivot to additional security tools to obtain and ascertain context or information and any other pertinent information to inform on the most effective and efficient mitigation/remediation actions. • Escalate tickets as required to GSOC Director for additional scrutiny and incident declaration. • Collaborate with UKG internal and external groups to develop and execute containment, eradication, and recovery strategies for lower priority incidents. • Identify, approve, and implement blocking, listing and other mechanisms to promote a robust security posture. • Participate in the Cyber Incident Response Plan (CIRP) process as part of the Cyber Incident Response Team (CIRT) or as the Cyber Incident Response Lead (CIRL) to lead and/or support mitigating and/or remediating critical incidents. • Participate in post-incident activities including coordinating and providing input within the requisite reports and identifying areas for continuous improvements within the GSOC enablement, processes or technology. • Provide mentoring and enablement of junior analysts globally to expand and extend UKG’s GSOC capabilities and experiential capacities. Qualification (Experience, Education, Certification, License and Training): • Bachelor's degree in computer science or a related discipline • CISSP, CCSP, GIAC or other relevant cyber security certifications • Working professional with 9+ years of relevant Security/SOC experience Required Qualifications: • Knowledge of the common attack vectors on the network layer, different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). • Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored) and cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). • Knowledge of cybersecurity, incident response methodologies, privacy principles, cyber threats, vulnerabilities, and detection methodologies and techniques for detecting intrusions. • Experience with Splunk, Google Chronicle, Elastic Search, EDR solutions, email security tools, and cloud environments (GCP, Azure). • Knowledge and experience in reverse engineering to understand how an information asset works and analyzing system components to identify potential vulnerabilities. • Knowledge and experience in developing automations using scripting languages like Python and PowerShell to automate various tasks and improve accuracy, enhance task consistency, and increase scalability. • Knowledge and experience in Security Information and Event Management (SIEM) use case and content development techniques and objectives. • Knowledge and experience in conducting and participating in security audits and assessments. • Understanding and experience in developing, and delivering relevant and value-add operational metrics to support and provide visibility into the GSOC program. • Communicate in English: write clearly and speak authoritatively to different audiences (business leaders and engineers). Preferred Qualifications: • Knowledge of new and emerging cybersecurity technologies, threats, and threat vectors. • Knowledge and experience in designing, executing, and reporting threat hunting activities. • Knowledge and experience around offensive security (ethical hacking) techniques to identify and mitigate/remediate vulnerabilities in the UKG environment. • Knowledge and experience in cyber forensic procedures and how to extract information and generate reports in support of incident response and other advanced requirements.

Posted 1 month ago

Apply

6.0 - 10.0 years

14 - 24 Lacs

Pune

Hybrid

Hi Everyone, I am on lookout for Infosec Analyst- GSOC for leading product based MNC in Yerwada, Pune. Kindly refer below JD:- Should have experience with Global Security Operation Center(SOC) Should have good experience with concepts of SIEM Should have strong experience in Incident Response Any SIEM tools experience: (Splunk, Azure Sentinel, EDR, MS Defender, Azure Sentinel, Any) Share your resume on nitika.sh@peoplefy.com NOTE: Immediate joiners to max 30 days are preferred.

Posted 2 months ago

Apply

3.0 - 8.0 years

8 - 12 Lacs

Pune

Work from Office

Greetings from Peoplefy Infosolutions !!! We are hiring for one of our reputed MNC client based in Pune. We are looking for candidates with 3 + years of experience in : Security operations center Global SOC Experience Threat Monitoring/ Threat Detection/ Threat Prevention Any SIEM tools Interested candidates for above position kindly share your updated CV to asha.ch@peoplefy.com with below details : Notice Period : Experience: CTC : ECTC : Current Location :

Posted 2 months ago

Apply

8 - 12 years

12 - 18 Lacs

Pune

Work from Office

A Cyber Threat Intelligence Specialist plays a crucial role in safeguarding organizations against cyber threats by gathering, analyzing, and interpreting data to identify potential risks and vulnerabilities. Here's a detailed job description for such a role: Overview: As a Cyber Threat Intelligence Specialist, you will be responsible for monitoring, analyzing, and interpreting cyber threats to protect our organization's information assets. You will gather intelligence from various sources, assess the relevance and credibility of the information, and provide actionable insights to enhance our cybersecurity posture."Experience with CrowdStrike Platform (CTI, NG/SIEM, EDR, Cloud Security, Exposure Management etc) is highly preferred" Key Responsibilities: Threat Monitoring and Analysis: Monitor various sources such as security alerts, incident reports, threat feeds, and open-source intelligence (OSINT) for potential cyber threats. Analyze incoming data to identify emerging threats, vulnerabilities, and attack patterns. Utilize threat intelligence platforms and tools to aggregate and correlate information for comprehensive analysis. Intelligence Gathering: Collect intelligence from internal sources (e.g., security logs, network traffic) and external sources (e.g., threat intelligence feeds, forums, dark web) to identify potential threats. Collaborate with internal teams and external partners to gather actionable intelligence related to specific threats targeting the organization. Threat Assessment: Evaluate the credibility, relevance, and potential impact of identified threats on the organization's systems, networks, and data. Conduct risk assessments to prioritize threats based on severity and potential impact on business operations. Reporting and Communication: Prepare detailed reports and briefings to communicate threat intelligence findings to stakeholders, including senior management, IT teams, and incident response teams. Provide recommendations and guidance on mitigating identified threats and vulnerabilities. Incident Response Support: Provide support during cybersecurity incidents by supplying timely and accurate threat intelligence to incident response teams. Assist in the investigation and analysis of security incidents to understand the root cause and prevent future occurrences. Continuous Improvement: Stay updated on the latest cybersecurity trends, attack techniques, and threat intelligence methodologies. Contribute to the enhancement of threat intelligence processes, tools, and technologies to improve the organization's cybersecurity posture. Qualifications: Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or other relevant certifications. Proven experience in cyber threat intelligence analysis, preferably in a corporate or government environment. Proficiency in using threat intelligence platforms, security tools, and data analysis techniques. Strong understanding of cybersecurity principles, threat landscape, and attack vectors. Excellent analytical and problem-solving skills with attention to detail. Effective communication and interpersonal skills to collaborate with cross-functional teams. Ability to work under pressure and prioritize tasks in a fast-paced environment. Company Description Syngenta is one of the worlds leading agriculture innovation company (Part of Syngenta Group) dedicated to improving global food security by enabling millions of farmers to make better use of available resources. Through world class science and innovative crop solutions, our 60,000 people in over 100 countries are working to transform how crops are grown. We are committed to rescuing land from degradation, enhancing biodiversity and revitalizing rural communities. A diverse workforce and an inclusive workplace environment are enablers of our ambition to be the most collaborative and trusted team in agriculture. Our employees reflect the diversity of our customers, the markets where we operate and the communities which we serve. No matter what your position, you will have a vital role in safely feeding the world and taking care of our planet. To learn more visit: Qualifications Bachelors degree in computer science, Information Security, Additional Information Note: Syngenta is an Equal Opportunity Employer and does not discriminate in recruitment, hiring, training, promotion or any other employment practices for reasons of race, color, religion, gender, national origin, age, sexual orientation, gender identity, marital or veteran status, disability, or any other legally protected status. Follow us on: Twitter LinkedIn India page {"@context":"http://schema.org","@type":"JobPosting","url":"https://jobs.syngenta.com/job/cyber-threat-intelligence-specialist-in-in-pune-jid-10525","title":"Cyber Threat Intelligence Specialist","description":" A Cyber Threat Intelligence Specialist plays a crucial role in safeguarding organizations against cyber threats by gathering, analyzing, and interpreting data to identify potential risks and vulnerabilities. Here's a detailed job description for such a role: Position Title: Cyber Threat Intelligence Specialist Overview: As a Cyber Threat Intelligence Specialist, you will be responsible for monitoring, analyzing, and interpreting cyber threats to protect our organization's information assets. You will gather intelligence from various sources, assess the relevance and credibility of the information, and provide actionable insights to enhance our cybersecurity posture.Experience with CrowdStrike Platform (CTI, NG/SIEM, EDR, Cloud Security, Exposure Management etc) is highly preferred Key Responsibilities: Threat Monitoring and Analysis: Monitor various sources such as security alerts, incident reports, threat feeds, and open-source intelligence (OSINT) for potential cyber threats. Analyze incoming data to identify emerging threats, vulnerabilities, and attack patterns. Utilize threat intelligence platforms and tools to aggregate and correlate information for comprehensive analysis. Intelligence Gathering: Collect intelligence from internal sources (e.g., security logs, network traffic) and external sources (e.g., threat intelligence feeds, forums, dark web) to identify potential threats. Collaborate with internal teams and external partners to gather actionable intelligence related to specific threats targeting the organization. Threat Assessment: Evaluate the credibility, relevance, and potential impact of identified threats on the organization's systems, networks, and data. Conduct risk assessments to prioritize threats based on severity and potential impact on business operations. Reporting and Communication: Prepare detailed reports and briefings to communicate threat intelligence findings to stakeholders, including senior management, IT teams, and incident response teams. Provide recommendations and guidance on mitigating identified threats and vulnerabilities. Incident Response Support: Provide support during cybersecurity incidents by supplying timely and accurate threat intelligence to incident response teams. Assist in the investigation and analysis of security incidents to understand the root cause and prevent future occurrences. Continuous Improvement: Stay updated on the latest cybersecurity trends, attack techniques, and threat intelligence methodologies. Contribute to the enhancement of threat intelligence processes, tools, and technologies to improve the organization's cybersecurity posture. Qualifications: Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or other relevant certifications. Proven experience in cyber threat intelligence analysis, preferably in a corporate or government environment. Proficiency in using threat intelligence platforms, security tools, and data analysis techniques. Strong understanding of cybersecurity principles, threat landscape, and attack vectors. Excellent analytical and problem-solving skills with attention to detail. Effective communication and interpersonal skills to collaborate with cross-functional teams. Ability to work under pressure and prioritize tasks in a fast-paced environment. Company Description Syngenta is one of the worlds leading agriculture innovation company (Part ofSyngenta Group) dedicated to improving global food security by enabling millions of farmers to make better use of available resources. Through world class science and innovative crop solutions, our 60,000 people in over 100 countries are working to transform how crops are grown. We are committed to rescuing land from degradation, enhancing biodiversity and revitalizing rural communities. A diverse workforce and an inclusive workplace environment are enablers of our ambition to be the most collaborative and trusted team in agriculture. Our employees reflect the diversity of our customers, the markets where we operate and the communities which we serve. No matter what your position, you will have a vital role in safely feeding the world and taking care of our planet. To learn more visit: Qualifications Bachelors degree in computer science, Information Security,

Posted 3 months ago

Apply

5.0 - 8.0 years

18 - 20 Lacs

bengaluru

Work from Office

The Crisis Management Centre (CMC) monitors, assesses and manages risks people, assets and business operations. leading the firms crisis management response to mitigate the impact of disruption, enable recovery processes, and ensure the safety of their people. The Crisis Management Centre Supervisor oversees day-to-day operations in the CMC, including incident response, threat monitoring, and travel security. Responsibilities: Line management of CMC Analysts including hiring, development, training and drilling, and review Provide operational guidance and oversight to the team of CMC Analysts monitoring and responding to internal and external incidents, ensuring necessary effort/resource is appropriately allocated, and escalated Assist the CMC Manager in the strategic development of the CMC Analysts training and drilling program, this includes proficiency in responding to incidents, adherence to SOPs, and use of CMC tools and systems. Coordinate officewide mass communication drafting and issuance for policies and crisis response notification During an incident provide support firmwide crisis management procedures such as call management, and information gathering Direct the team and coordinate production and editing of threat reports and risk analyses Plan and coordinate crisis management related activities including firm-wide people accountability, crisis responder training and drills and other functional tests of crisis response mechanisms Compiling and maintaining risk and performance-related datasets to optimise operational performance and proficiency of the CMC Contribute to the ongoing identification and implementation of enhancements to the crisis management process, especially innovative uses of technology. Skills / Requirements: Excellent communication skills in English and other Asian languages. Skills in other languages is advantageous. Critical thinking skills with a proven ability to work well under pressure, showing good judgement and ability to escalate in a calm and efficient manner Strong understanding and interest of APAC and global geopolitical affairs Highly proficient in incident management protocols and CMC tools, particularly in mass communication and treat monitoring Demonstrable team leadership skills and management of personnel capability. Able to support and develop individuals to maximise their potential, particularly in giving feedback on performance and guiding or editing the work of others Good organisational skills and ability to prioritise simultaneous incidents and requests Confident collecting and analysing information from various sources to create threat reports relevant to the firms threat exposure Computer skills (Microsoft Office) Salary: Best in industry (Negotiable for good candidate)

Posted Date not available

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies