Jobs
Interviews
Alcon Cyber Security Consultancy

Alcon Cyber Security Consultancy specializes in providing cybersecurity solutions and consulting services to businesses. They focus on threat assessments, compliance, risk management, and cybersecurity strategy development.

6 Job openings at Alcon Cyber Security Consultancy
Presales Engineer Cybersecurity Solutions

Mumbai

5 - 7 years

INR 7.0 - 9.0 Lacs P.A.

Work from Office

Full Time

Role Summary We are seeking a Presales Engineer who will play a critical role in supporting our sales team by designing and presenting cybersecurity solutions tailored to client requirements. While the primary focus will be on presales activities, the candidate should also be flexible to support delivery teams during project implementations when needed. This role involves regular interaction with customers, OEMs, and internal stakeholders and may include travel to client sites across India. Key Responsibilities Lead technical presales activities including client presentations, product demos, and solution workshops. Understand client requirements and map them to our cybersecurity service offerings (SIEM, Microsoft Security, DLP, VAPT, GRC, etc.). Prepare solution architecture, BoQs, and technical proposals in coordination with delivery and OEM teams. Participate in RFP/RFI responses and create high-quality technical documentation and SoWs. Collaborate with sales, project, and technical teams to ensure a smooth transition from presales to delivery. Provide support during delivery phase on a need basis (e.g., PoC, architecture validation, configuration oversight). Maintain up-to-date knowledge of cybersecurity trends, tools, and compliance frameworks. Be available for travel to customer sites across India for presales meetings, workshops, or project support. Required Skills & Experience 5-7 years of experience in cybersecurity presales, consulting, or solution engineering. Technical understanding of SIEM (LogRhythm, Elastic, or equivalent), Microsoft Security solutions (M365 Defender, Sentinel, etc.), DLP, VAPT, cloud security, and GRC. Strong verbal and written communication and customer-facing skills. Proven experience in drafting proposals, SoWs, and designing security architectures. Exposure to implementation or delivery of security solutions is a strong advantage. Knowledge of compliance and security frameworks such as ISO 27001, NIST, etc. Industry certifications like CEH, Microsoft SC-series, LogRhythm Certified, Elastic, or similar preferred. What We Offer Opportunity to work with a growing cybersecurity brand across India and the Middle East. Exposure to the latest technologies and enterprise-scale projects. Support for skill development and industry certifications. Collaborative team culture and a strong focus on career growth. ","

SOC Analyst - L1 (Mumbai)

Mumbai, Maharashtra, India

0 years

None Not disclosed

On-site

Full Time

Job Title: L1 SOC Analyst – LogRhythm SIEM Location: Mumbai, India Employment Type: Full-Time | Onsite About the Role: We are seeking a proactive and dedicated L1 SOC Analyst to join our Security Operations Center in Mumbai. The analyst will be the first line of defense, responsible for monitoring, triaging, and escalating security alerts using LogRhythm SIEM. This is an excellent opportunity for candidates looking to build a strong career in cybersecurity operations. Key Responsibilities: • Monitor security events and alerts through LogRhythm SIEM console • Perform initial analysis, classification, and triage of security incidents • Escalate genuine security incidents to L2 SOC team following defined procedures • Maintain incident logs, documentation, and shift handover reports • Support incident investigations by collecting relevant logs and evidence • Monitor health of SIEM log sources and report issues proactively • Follow SOC playbooks and response procedures with high attention to detail • Participate in shift-based operations (24x7 rotational shifts) Key Skills & Competencies: • 0.6 to 2 years of experience in SOC or cybersecurity monitoring role • Hands-on exposure to LogRhythm SIEM • Knowledge of security event types, log analysis, and basic networking concepts • Understanding of common security threats, malware, phishing, brute force, etc. • Good communication skills — both written and verbal • Ability to work effectively under pressure and as part of a team Preferred Qualifications: • Bachelor’s Degree in Information Security, Computer Science, or related field • LogRhythm Certifications– optional but desirable • Security certifications like CompTIA Security+, CEH – an added advantage

SOC Analyst L2- Mumbai

Mumbai, Maharashtra, India

2 years

None Not disclosed

On-site

Full Time

Job Title: L2 SOC Analyst – LogRhythm SIEM Location: Mumbai, India Employment Type: Full-Time | Onsite About the Role: We are looking for an experienced L2 SOC Analyst to strengthen our Security Operations Center in Mumbai. The ideal candidate will have 2 to 5 years of hands-on experience in security monitoring and incident analysis, particularly on LogRhythm SIEM. You will be responsible for in-depth analysis, incident investigation, escalation, and coordination with response teams. Key Responsibilities: • Monitor, analyze, and triage security alerts from LogRhythm SIEM and other security platforms • Investigate and validate security incidents with detailed analysis and impact assessment • Conduct threat hunting and advanced log correlation as per SOC playbooks • Respond to incidents as per defined escalation matrix and coordinate with internal/external teams • Perform root cause analysis, recommend containment and mitigation actions • Provide guidance and mentorship to L1 SOC Analysts for escalated incidents • Prepare incident reports, analysis summaries, and dashboards for management • Monitor and report SIEM health, log source integration issues, and tuning requirements • Participate in continuous improvement of detection rules and SOC processes • Work in 24x7 rotational shifts with readiness for critical incident handling Required Skills & Competencies: • 2 to 5 years of SOC operations experience, with a focus on SIEM monitoring and incident handling • Strong hands-on experience with LogRhythm SIEM (Mandatory) • Good understanding of security threats, attack vectors, malware behavior, and common vulnerabilities • Practical experience in analyzing logs from firewalls, IDS/IPS, endpoint security, and cloud platforms • Familiarity with MITRE ATT&CK framework and threat intelligence usage • Strong analytical thinking, incident response capabilities, and problem-solving skills • Good communication skills for incident reporting and escalation Preferred Certifications: • LogRhythm Certified Deployment Engineer (LCDE) or LogRhythm Certified SOC Analyst (LCSA) - Optional • CompTIA Security+, CEH, CySA+, or equivalent security certifications • Any threat hunting or incident response certification is a plus Work Mode: Onsite – Mumbai SOC Facility Shift: 24x7 Rotational Shifts (Including Nights and Weekends)

SOC Analyst - L1 (Mumbai)

Mumbai

0 - 2 years

INR 2.0 - 6.0 Lacs P.A.

Work from Office

Full Time

":" Job Title: L1 SOC Analyst LogRhythm SIEM Location: Mumbai, India Employment Type: Full-Time | Onsite About the Role: We are seeking a proactive and dedicated L1 SOC Analyst to join our Security Operations Center in Mumbai. The analyst will be the first line of defense, responsible for monitoring, triaging, and escalating security alerts using LogRhythm SIEM. This is an excellent opportunity for candidates looking to build a strong career in cybersecurity operations. Key Responsibilities: - Monitor security events and alerts through LogRhythm SIEM console - Perform initial analysis, classification, and triage of security incidents - Escalate genuine security incidents to L2 SOC team following defined procedures - Maintain incident logs, documentation, and shift handover reports - Support incident investigations by collecting relevant logs and evidence - Monitor health of SIEM log sources and report issues proactively - Follow SOC playbooks and response procedures with high attention to detail - Participate in shift-based operations (24x7 rotational shifts) Key Skills & Competencies: - 0.6 to 2 years of experience in SOC or cybersecurity monitoring role - Hands-on exposure to LogRhythm SIEM - Knowledge of security event types, log analysis, and basic networking concepts - Understanding of common security threats, malware, phishing, brute force, etc. - Good communication skills both written and verbal - Ability to work effectively under pressure and as part of a team Preferred Qualifications: - BachelorDegree in Information Security, Computer Science, or related field - LogRhythm Certificationsoptional but desirable - Security certifications like CompTIA Security+, CEH an added advantage ","

SOC Analyst L2- Mumbai

Mumbai

2 - 5 years

INR 3.0 - 7.0 Lacs P.A.

Work from Office

Full Time

":" Job Title: L2 SOC Analyst LogRhythm SIEM Location: Mumbai, India Employment Type: Full-Time | Onsite About the Role: We are looking for an experienced L2 SOC Analyst to strengthen our Security Operations Center in Mumbai. The ideal candidate will have 2 to 5 years of hands-on experience in security monitoring and incident analysis, particularly on LogRhythm SIEM. You will be responsible for in-depth analysis, incident investigation, escalation, and coordination with response teams. Key Responsibilities: - Monitor, analyze, and triage security alerts from LogRhythm SIEM and other security platforms - Investigate and validate security incidents with detailed analysis and impact assessment - Conduct threat hunting and advanced log correlation as per SOC playbooks - Respond to incidents as per defined escalation matrix and coordinate with internal/external teams - Perform root cause analysis, recommend containment and mitigation actions - Provide guidance and mentorship to L1 SOC Analysts for escalated incidents - Prepare incident reports, analysis summaries, and dashboards for management - Monitor and report SIEM health, log source integration issues, and tuning requirements - Participate in continuous improvement of detection rules and SOC processes - Work in 24x7 rotational shifts with readiness for critical incident handling Required Skills & Competencies: - 2 to 5 years of SOC operations experience, with a focus on SIEM monitoring and incident handling - Strong hands-on experience with LogRhythm SIEM (Mandatory) - Good understanding of security threats, attack vectors, malware behavior, and common vulnerabilities - Practical experience in analyzing logs from firewalls, IDS/IPS, endpoint security, and cloud platforms - Familiarity with MITRE ATT&CK framework and threat intelligence usage - Strong analytical thinking, incident response capabilities, and problem-solving skills - Good communication skills for incident reporting and escalation Preferred Certifications: - LogRhythm Certified Deployment Engineer (LCDE) or LogRhythm Certified SOC Analyst (LCSA) - Optional - CompTIA Security+, CEH, CySA+, or equivalent security certifications - Any threat hunting or incident response certification is a plus Work Mode: Onsite Mumbai SOC Facility Shift: 24x7 Rotational Shifts (Including Nights and Weekends) ","

SOC Analyst L2

maharashtra

2 - 6 years

INR Not disclosed

On-site

Full Time

As an L2 SOC Analyst specializing in LogRhythm SIEM, your role will involve strengthening the Security Operations Center in Mumbai. With 2 to 5 years of hands-on experience in security monitoring and incident analysis, particularly focusing on LogRhythm SIEM, you will play a crucial part in the in-depth analysis, incident investigation, escalation, and coordination with response teams. Your key responsibilities will include monitoring, analyzing, and triaging security alerts from LogRhythm SIEM and other security platforms. You will be responsible for investigating and validating security incidents with detailed analysis and impact assessment, conducting threat hunting, and advanced log correlation as per SOC playbooks. Additionally, you will respond to incidents following defined escalation matrices, perform root cause analysis, recommend containment and mitigation actions, and provide guidance and mentorship to L1 SOC Analysts for escalated incidents. Moreover, you will prepare incident reports, analysis summaries, and dashboards for management, monitor and report SIEM health, log source integration issues, and tuning requirements. Your role will also involve participating in the continuous improvement of detection rules and SOC processes. Being ready to work in 24x7 rotational shifts with a constant readiness for critical incident handling is essential for this position. To excel in this role, you should possess 2 to 5 years of SOC operations experience, with a specific focus on SIEM monitoring and incident handling. Strong hands-on experience with LogRhythm SIEM is mandatory, in addition to a good understanding of security threats, attack vectors, malware behavior, and common vulnerabilities. Practical experience in analyzing logs from firewalls, IDS/IPS, endpoint security, and cloud platforms is required, along with familiarity with the MITRE ATT&CK framework and the usage of threat intelligence. Furthermore, you should exhibit strong analytical thinking, incident response capabilities, and problem-solving skills. Effective communication skills for incident reporting and escalation are essential for this role. Preferred certifications include LogRhythm Certified Deployment Engineer (LCDE) or LogRhythm Certified SOC Analyst (LCSA), while certifications such as CompTIA Security+, CEH, CySA+, or equivalent security certifications are optional. Any threat hunting or incident response certification would be considered a plus. This is a full-time role based at the Mumbai SOC facility, requiring you to work in 24x7 rotational shifts, including nights and weekends.,

FIND ON MAP

Alcon Cyber Security Consultancy

Alcon Cyber Security Consultancy logo

Alcon Cyber Security Consultancy

|

Cybersecurity

Techville

50-100 Employees

6 Jobs

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Job Titles Overview