Home
Jobs

42 Azure Sentinel Jobs

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

7.0 - 12.0 years

11 - 15 Lacs

Hyderabad

Work from Office

Naukri logo

Urgent Requirement for Analytics Cloud Remediation. Location Pan India. JD POSITION GENERAL DUTIES AND TASKS Key Responsibilities:1. Write scripts for comprehensive data collection and assessments of our Azure cloud environment to identify security, permissions, misconfigurations, and potential threats, utilizing Microsoft Azure native tools and programming language.2. Automation script for Azure resource provisioning and maintenance3. Cloud engineering and Sysops automation which includes Infrastructure as code (IaC), Policy, roles as a code 4. Developing ARM templates with extensibility i.e functions and expression5. Automate e2e Sysops/SecOps tasks using Azure Security Center, Azure Sentinel, Azure Policy, and Azure Key Vault to enhance the resilience and integrity of our cloud environment.6. Automate deployment across different environment using CI/CD pipeline

Posted 18 hours ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Noida

Work from Office

Naukri logo

Company Overview With 80,000 customers across 150 countries, UKG is the largest U.S.-based private software company in the world. And we're only getting started. Ready to bring your bold ideas and collaborative mindset to an organization that still has so much more to build and achieveRead on. Here, we know that you're more than your work. That's why our benefits help you thrive personally and professionally, from wellness programs and tuition reimbursement to U Choose "” a customizable expense reimbursement program that can be used for more than 200+ needs that best suit you and your family, from student loan repayment, to childcare, to pet insurance. Our inclusive culture, active and engaged employee resource groups, and caring leaders value every voice and support you in doing the best work of your career. If you're passionate about our purpose "” people "”then we can't wait to support whatever gives you purpose. We're united by purpose, inspired by you. Demonstrate and promote Cloud Security for serverless architecture including AWS Lambda, Google Cloud Functions, and Azure Functions Ensure secure configuration of cloud networking components (VPCs, subnets, gateways, etc.), enforcing the principle of least privilege in cloud environments. Securing container technology such as Kubernetes and Docker Harden compute resources (VMs, containers, etc.) and establish secure runtime environments. Automation DDoS Mitigation & Web Application Firewall (WAF) Management Provide security expertise and guidance to development and engineering teams Define technical control requirements, evaluate existing tool effectiveness, and propose solutions to enhance the company's cloud security posture Acts as a consultant on best practices to internal customers to ensure processes are embedded to ensure compliance to security standards 3-5 years of combined experience as a Software Engineer, Security Engineer or a Cloud Security Engineer At least 3 years of experience building and architecting on Cloud-based Platforms In-depth knowledge of cloud security principles, cloud-native security tools (e.g., AWS IAM, Security Hub, Azure Sentinel), and practices like encryption, IAM, and micro-segmentation. Detailed understanding of Cloud Security fundamentals Professional experience architecting/operating solutions and security frameworks built on AWS, Azure, or Google Cloud and virtualization technologies, such as Kubernetes, Docker and OpenStack The ability to design, install and maintain security controls over multi-cloud platforms 3-5 years of relevant experience working with technologies such as Ansible, Terraform, RegEx, Chef Comfortable working with at least one scripting Languages such as Python, Bash, PowerShell, batch scripts. Experience managing and provisioning infrastructure using Infrastructure as Code tools. Experience with Cloud Security Posture Management tools. Experience providing security threat assessments and technical guidance for network architecture design and security considerations. Experience communicating effectively across internal and external organizations, for complex mission-critical solutions. Outstanding written and verbal communication skills Bachelor's degree or Master's degree in Information Systems, Information Security, or related fields; preferred but not required. Certification in any of the following a plusGoogle Professional Cloud Security Engineer; AWS Cloud Architect; Azure Security Engineer Associate; CISSP Where we're going UKG is on the cusp of something truly special. Worldwide, we already hold the #1 market share position for workforce management and the #2 position for human capital management. Tens of millions of frontline workers start and end their days with our software, with billions of shifts managed annually through UKG solutions today. Yet it's our AI-powered product portfolio designed to support customers of all sizes, industries, and geographies that will propel us into an even brighter tomorrow! Disability Accommodation UKGCareers@ukg.com

Posted 20 hours ago

Apply

7.0 - 12.0 years

15 - 25 Lacs

Chennai

Hybrid

Naukri logo

We are looking for a Lead Cybersecurity Engineer with deep technical expertise and leadership experience to drive innovative threat detection solutions and lead a team of security engineers. The ideal candidate will bring hands-on experience in research & development (R&D) , demo environment creation , endpoint security , SIEM operations , and cloud-native tools such as Azure Sentinel and the Microsoft Defender suite . This role will play a strategic part in shaping our security detection roadmap and mentoring a high-performing team. Key Responsibilities: Technical Leadership & Strategy Lead a team of cybersecurity engineers in R&D, detection engineering, and solution design. Define detection strategies and oversee implementation of new use cases across tools. Collaborate with security architects, threat intel, and SOC teams for end-to-end threat coverage. R&D & Security Innovation Drive continuous improvement through security research, PoCs, and new technology evaluations. Analyze evolving threats and proactively build defense strategies and custom detections. Lead the development of security content aligned with frameworks like MITRE ATT&CK. Demo Environment & Simulation Lab Design and lead the creation of demo/test environments to simulate real-world threats. Automate environment deployment for testing security tools, rules, and threat scenarios. Build reusable assets and playbooks for internal enablement and customer-facing demos. Endpoint & SIEM Security Lead implementation and optimization of Microsoft Defender for Endpoint , Defender for Identity , and Defender for Cloud . Oversee the configuration and tuning of Azure Sentinel , including custom KQL queries, analytics rules, and automation via playbooks. Ensure integration of diverse log sources and enrichment for advanced threat detection. People & Process Management Mentor junior engineers and promote skill development across the security engineering team. Establish standards and documentation for security engineering best practices. Drive cross-functional collaboration with IT, Cloud, Compliance, and SOC stakeholders. Required Skills & Experience: 8+ years in cybersecurity roles, with 3+ years in a leadership or senior engineering position . Strong hands-on experience with: Azure Sentinel (KQL, workbooks, playbooks) Microsoft Defender for Endpoint, Identity, and Cloud Endpoint security, EDR, and threat detection Security lab/demo environment setup Excellent understanding of security frameworks (MITRE ATT&CK, NIST, etc.). Strong scripting and automation skills (PowerShell, Python, etc.). Experience managing or mentoring technical teams and delivering complex security projects.

Posted 1 day ago

Apply

4.0 - 7.0 years

8 - 16 Lacs

Gurugram

Work from Office

Naukri logo

tYour potential, unleashed. India impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilientnot only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks. Your work profile. We are seeking a skilled SOC Operations Level 2 to manage, maintain, and enhance our /clients SOC platform, ensuring effective monitoring, detection, and response to security incidents. The ideal candidate will have strong experience in SOC administration, threat detection, and SOC operations to provide continuous security improvements and support to the SOC team. Key Responsibilities: Primary responsibilities are to provide support for SIEM and Incident Monitoring and response services with expert level knowledge on technology and operations skills. Responsible for SIEM (Arcisght and Azure Sentinel ) and other Incident Monitoring/Response tools platform management, administration, enhancements , use cases preparation and deployment. Ensure critical technology components are monitored to proactively detect cyber related incidents. Develop and deploy robust detection and response capabilities. Conduct in-depth investigation of security incidents including data collection, root cause analysis, and recovery efforts, ensuring compliance with defined SLAs Validate and fine-tune correlation rules, use-cases, and custom detections in SIEM tools to reduce false positives and improve detection fidelity. Propose new SIEM use cases with playbook creation based on threat intelligence, evolving TTPs, or internal security gaps. Conduct alert quality reviews, enhancing or retiring outdated detection logic and recommending improved strategies. Provide mentorship and analytical support to L1 analysts, helping them enhance detection and response capabilities. Continuously monitor SIEM and other security tools for alerts indicating potential threats, policy violations, or anomalies in the network. Lead incident response activities, focusing on containment and eradication of threats while ensuring forensic integrity for post-event analysis. Correlate data from various sources to identify security incidents and create actionable intelligence. Collaborate with cross-functional teams and subject matter experts to resolve complex technical issues swiftly. Review logs, metrics, and system behavior to identify patterns and early indicators of compromise. Document incidents, root cause, and resolution steps in a structured manner, and contribute to the refinement of incident response playbooks Share security knowledge and threat insights across the team to promote continuous learning and improvement. Keep leadership informed of high-priority incidents and propose tactical/strategic countermeasures. Ensure adherence to internal policies, regulatory requirements, and industry best practices throughout all SOC processes. Required Skill Set: 3-5 years of professional experience in Information Security, SOC operations or incident response. Strong hands-on engineering and operations experience on Azure Sentinel and Arcsight SIEM Strong knowledge of cybersecurity frameworks and methodologies including MITRE ATT&CK, Cyber Kill Chain and NIST IR. Deep understanding of core network and security principles (Operating systems, TCP/IP, ports, detection/IDS/IPS, etc.). Ability to interpret complex alerts and logs from diverse sources and translate them into practical response actions. Excellent communication, documentation, and collaboration skills to interact with stakeholders at all levels. Preferred to have SC 200 , SC 100 certification , ArcSight Certified How youll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the worlds most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyones welcome entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Heres a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area youre applying to. Check out recruiting tips from Deloitte professionals. *Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices. At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution. In this regard, you may refer to a more detailed advisory given on our website at: https://www2.deloitte.com/in/en/careers/advisory-for-career-aspirants.html?icid=wn_

Posted 1 day ago

Apply

5.0 - 8.0 years

6 - 16 Lacs

Hyderabad

Work from Office

Naukri logo

LTIMindtree Hiring for Azure Sentinel L2/L3 SOC Analyst for Hyderabad Location- Notice period-immediate to 15 days. Exp-5 to 8 yrs. Location- Hyderabad Skill Combination: Minimum 6 yrs in security domain, and at least 3 yrs as L2/L3 if interested Share me these details along with CV-Richa.Srivastava@ltimindtree.com Total Experience- Current CTC- Expected CTC- Holding offers if any- Current Location- Preferred Location- Notice period- Skills- Date of Birth- PAN No- Passport size photo- Pan no- Availability for interview (YES/NO)- Job Description- Develop and maintain playbooks runbooks and incident response procedures Collaborate with threat intelligence teams to enrich alerts and improve detection capabilities Conduct post incident reviews and root cause analysis Mentor and train L1 and L2 SOC analysts Recommend and implement improvements to SOC tools processes and detection rules Stay current with emerging threats vulnerabilities and security technologies The expectations from the graders would be To evaluate the tasks that are being fed into the agent for their real world applicability To evaluate the agent output to come up with a ground truth and rate the agent output in a predefined rubric based on the inputs pr-ovided by us To have very deep SOC analyst experience and insights This also includes any other skills needed to evaluate the agent output The ability to scale to around min 2030 evaluations per day per grader based on the complexity of the task Core Technical Skills SIEM Tools eg Splunk QRadar Microsoft Sentinel Endpoint Detection and Response EDR eg CrowdStrike SentinelOne Firewall and IDSIPS eg Palo Alto Snort Suricata Log Analysis and Packet Capture Analysis eg Wireshark Threat Intelligence Platforms eg MISP Recorded Future Incident Response and Forensics Scripting Automation Python PowerShell Bash Operating Systems Windows Linux macOS Networking Fundamentals TCPIP DNS HTTP VPNs

Posted 1 day ago

Apply

4.0 - 6.0 years

1 - 6 Lacs

Bengaluru, Mumbai (All Areas)

Hybrid

Naukri logo

Role & responsibilities - Deploy, configure, and maintain the Devo, Swimlane, and Sentinel platforms. - Provide tier 2 support for platform-related incidents, troubleshooting complex issues, and identifying root causes. - Develop and implement automation scripts for routine tasks and workflows. - Collaborate with cross-functional teams to integrate platform solutions into existing infrastructure. - Lead platform upgrades, patch management, and capacity planning initiatives. - Mentor associate engineers and provide technical guidance and support. - Monitor platform performance, conduct performance tuning, and implement optimization strategies. Requirements: - Bachelor's degree in Computer Science, Engineering, or related field. - 3-5 years of experience in IT operations or platform engineering roles. - Proficiency in scripting languages such as Python, PowerShell, or Bash. - Hands-on experience with cloud platforms (e.g., AWS, Azure, GCP) and containerization technologies (e.g., Docker, Kubernetes). - Strong understanding of networking concepts, security best practices, and IT infrastructure components. - Excellent troubleshooting and diagnostic skills. - Ability to work independently and collaboratively in a fast-paced environment.

Posted 2 days ago

Apply

2.0 - 7.0 years

8 - 18 Lacs

Noida, Gurugram, Mumbai (All Areas)

Hybrid

Naukri logo

Role & responsibilities Develop and implement custom analytics rules within Microsoft Sentinel to identify security threats and anomalies. Leverage KQL and other tools to create custom detection on Microsoft Defender XDR MDE & MDCA. Create advanced detection rules based on business requirements & SOC Use Cases. Work with SIEM and SOAR solutions at scale. Collaborate with other security teams to identify and prioritize security requirements and develop effective solutions. Update the code (KQL) on analytical rule for finetuning the false positive incidents. Stay up to date with the latest security threats and trends and apply this knowledge to improve our security posture. Perform content enrichment depending on feedback received from security analysts. Have a strong understanding of Cloud Security and Networking Concepts and practices. Helps to create reports that properly present the key risk and performance indicators. Communicating & reporting concise summaries of complex scenarios & information across diverse and senior stakeholder groups. Design, maintain Content Management standard operating procedures (SOP), processes and guidelines. Report preparation for leads and management review with data from dashboards & reports. Preferred candidate profile Strong understanding of JSON, Kusto Query Language (KQL) and PowerShell languages. Experience analyzing data from cybersecurity monitoring tools such as SIEM / SOAR platforms, host and network logs, firewall and IPS/IDS logs and email security gateway. Strong understanding of security operations concepts: perimeter defense, endpoint management, data leak prevention, kill chain analysis and security metrics. Knowledge of the common attack vectors on various layers. Knowledge and experience working with the Cyber Kill Chain Model, MITER ATT&CK Matrix. Experience with Security Operations Center, SIEM management & solutions ownership. Knowledge of various security methodologies and technical security solutions. Conduct an audit of the platform configuration to optimize it. Optimizing the way logs are processed and leveraged by SOC team members. Knowledge on schemas of Microsoft Defender XDR solutions (Microsoft Entra ID and ID protection, Microsoft Defender for Endpoint, Microsoft Defender for Cloud apps, Microsoft Purview Information Protection) and Microsoft 365. Knowledge of schemas with security events logs from Microsoft windows server. Experience of working within a regulatory/controlled environment. Understanding of Cyber Security Risk and mitigation strategies.

Posted 2 days ago

Apply

5.0 - 10.0 years

7 - 14 Lacs

Bengaluru

Work from Office

Naukri logo

Role & responsibilities Preferred candidate profile This role is for you if you have the below Educational qualifications •Graduation degree in any stream or equivalent / post-graduation degree/diploma, Certification in any IAM product would be an added advantage. Work experience •We are looking for a of IAM resource with 5+ years of experience for one of our engagements. The resource must work from our Pune/Bangalore office and willing to work on shifts The ideal candidate will: •At least 60 months of Privileged Access Management domain experience with expertise in Conjur as the primary skill and CyberArk administration as the secondary skill •A quick learner and adaptable to changing environments •Have strong analytical skills and communication skills •Build strong professional working relationships with client personnel •Clear understanding of IAM solution design and configuration •Working in rotational shifts supporting client environment. •Deliver timely and high-quality work diligently •Identify issues and opportunities, and communicate them to appropriate senior member Technical Skills Required: •60 months of experience in Conjur and CyberArk administration 1. Conjur Administration: •Serve as the primary administrator for Conjur, overseeing deployment, configuration, and maintenance of the Conjur environment. •Manage secrets within Conjur, ensuring their protection and proper access control according to organizational policies and requirements. •Monitor system performance, conduct regular health checks, and ensure high availability and reliability of Conjur services. •Troubleshoot and resolve complex issues related to Conjur infrastructure and performance. •Implement and enforce best practices for secrets management, policy management, and integration with other systems. 2. CyberArk Privilege Cloud Administration: •Act as a secondary administrator for CyberArk Privilege Cloud, contributing to the deployment, configuration, and maintenance of the solution. •Assist in managing privileged accounts, credential rotation, session management, and audit trails as per organizational policies. •Support monitoring and troubleshooting of CyberArk Privilege Cloud performance and issues, ensuring reliable and secure operations.

Posted 3 days ago

Apply

2.0 - 6.0 years

4 - 8 Lacs

Hyderabad

Work from Office

Naukri logo

Have knowledge on Microsoft cloud platform Azure AD and Azure IAM. Should understand Identity Lifecycle management, Access Management, Multi-factor Authentication and Privilege Identity and Access implementation knowledge. Should be having IDAM project experience. Knowledge of Active Directory Identities and the Life cycle user creation/modification, security group - creation/modification, password management. Knowledge of Azure Cloud and Azure AD. Azure SSO Configurations, Azure MFA Configurations and Troubleshooting Understanding of Conditional Access Policies Knowledge of Azure AD RBAC concepts, Custom Roles and PAM configurations Knowledge of monitoring the Azure AD logs Knowledge of creating NSGs and modifications of it. Knowledge of Azure Identity Provisioning Service Knowledge of Azure Identity Governance. PowerShell Training and should be able to write scripting for Azure AD and PowerShell Command lets. Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT

Posted 4 days ago

Apply

7.0 - 9.0 years

8 - 13 Lacs

Hyderabad

Work from Office

Naukri logo

Security Engineer Hyderabad, Telangana IT Description Why youll want to work at nimble! This is a great opportunity to join a well-established and market-leading brand serving a high-growth end market while gaining valuable experience and visibility to Executive leadership. As an organization, we are in considerable growth mode through acquisition and with a laser focus on positive culture building. The Information Security Engineer is responsible for safeguarding the organization's systems and data assets. This critical role focuses on preventing and mitigating unauthorized access, modification, or destruction of sensitive information. The Engineer actively participates in the development and implementation of robust IT security policies and standards. Through close collaboration with end-users across various departments, this position ensures the alignment of security measures with individual business needs while maintaining strict adherence to company-wide security policies and procedures. The Information Security Engineer reports directly to the Director of Information Security and maintains an indirect reporting line to the Chief Information Technology Officer. Threat Detection & Response: Monitor the organization's servers and networks for security breaches using tools such as Windows Defender, Windows Purview, Crowdstrike, Rapid7 Investigate and respond to security incidents promptly. Utilize Windows Defender, Rapid7 and Wiz for vulnerability scanning and threat intelligence gathering. Implement and enforce security policies through Intune. Security Architecture & Engineering: Design, implement, and maintain security controls, including firewalls, intrusion detection/prevention systems (IDPS), and data encryption. Conduct security assessments and penetration testing. Develop and maintain security standards and best practices. Endpoint Security Management: Manage endpoint security solutions, including Windows Defender and Crowdstrike Vulnerability Management: Identify, assess, and prioritize vulnerabilities using Windows Defender, Wiz and Rapid7. Develop and implement remediation plans. Compliance & Reporting: Prepare reports that document security metrics, attempted attacks, and security breaches. Ensure compliance with relevant security standards and regulations. Security Awareness & Training: Educate and train employees on IT security best practices and awareness. Collaborate with IT teams, business units, and other stakeholders to ensure effective security implementation. Clearly communicate security risks and recommendations to management. Requirements 5+ years of experience in systems or network administration/engineering 1+ years of experience in information security roles Strong understanding of security principles and best practices (e.g., NIST) Proficient with Windows Server administration and management Proficient with network protocols and topologies Experience with security information and event management (SIEM) systems Experience with scripting languages (e.g., Python, PowerShell) Strong analytical and problem-solving skills Excellent written and verbal communication skills Ability to work independently and as part of a team Experience with cloud security (e.g. Azure, Defender) Experience with security orchestration and automation platforms (SOAR). Experience with container security and microservices. This job description is intended to provide a general overview of the position. Responsibilities and qualifications may vary depending on the specific needs of the organization. This revised job description incorporates the specified security software suites and provides a more comprehensive overview of the role. Contact details: Interested candidates drop your resumes to 8179814131 - Navya (Whats App only)

Posted 6 days ago

Apply

7.0 - 9.0 years

7 - 15 Lacs

Hyderabad

Hybrid

Naukri logo

Role & responsibilities Role : Azure Sentinel Experience : 7 to 9 Years Location : Hyderabad Notice Period: Immediate to 15 Days Job Description We are looking for an experienced SOC Engineer (L2/L3) with hands-on expertise in Microsoft Azure Sentinel. The ideal candidate will be responsible for advanced threat detection, incident response, and evaluating AI-generated security analysis outputs. Key Responsibilities: Perform exploratory, simple, and complex data analysis for the alerts on sentinel (e.g., anomaly detection, clustering). Create and review visualizations such as timelines and activity graphs. Generate and validate reports with insights, recommendations, and next steps. Evaluate AI-generated outputs for: Accuracy of insights and structured data. Quality of code and logic. Relevance and real-world applicability. Grade outputs using a predefined rubric and provide feedback. Handle 2030 evaluations per day depending on task complexity.Required Skills: 6-9 years of experience in a SOC environment (L2/L3 level). Strong knowledge of Azure Sentinel and KQL (Kusto Query Language). Experience with threat detection, incident response, and security analytics. Familiarity with data visualization and reporting tools. Ability to assess AI-generated content and provide structured evaluations. Preferred Qualifications:Ai/ML Knowledge and understanding of Python Experience with AI/ML in cybersecurity. Certifications like AZ-500, SC-200, or equivalent

Posted 6 days ago

Apply

4.0 - 9.0 years

18 - 33 Lacs

Bengaluru

Work from Office

Naukri logo

- Opportunity with Billion Dollar Canadian Multinational. - Looking for Strong technical acumen SOC Senior Analyst and offers the opportunity to significantly enhance the SOC's maturity by refining detection rules and incident response playbooks. Required Candidate profile 5+ Yrs in SOC. Kusto Query Language (KQL) queries, Microsoft Sentinel's Investigation Graph, User and Entity Behavior Analytics (UEBA) insights, Microsoft Defender XDR suite SC-200 Certification.

Posted 1 week ago

Apply

7.0 - 10.0 years

8 - 15 Lacs

Hyderabad, Pune, Bengaluru

Work from Office

Naukri logo

Role & responsibilities The primary role of a Security Analyst (L2) is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures. Specifically, these analysts will be responsible for monitoring the SIEM tools for security events and closing or escalating those events as necessary. Security Analysts maintain the group email address and distribution lists, answer the main phone lines, and update all relevant documentation such as shift logs and tickets. Additionally, assist the MDR Analyst in an incident workflow and assist the MDR team in incident detection, remediation and communicate with external teams in proper incident resolution. We are currently seeking a Senior Security Associate for our KPMG Managed Services (Spectrum) practice to join us in our Bangalore office. Note : Candidate must be willing to Work from Office only ( Bangalore Location) & willing to do 24x7 rotational shift (Mandatory requirement for this role) Specifically, Security Analysts (L2) will: 1. Rapidly identify, categorize, prioritize and investigate events as the initial cyber event detection group for the enterprise using all available security logs and intelligence sources to include but not limited to: a. Firewalls (Zscalar, Cisco ASA & Palo Alto etc.,) b. Systems and Network Devices c. Web Proxies (Zscalar) d. Intrusion Detection/Prevention Systems (Zscalar, Cisco ASA & Palo Alto etc.,) e. Data Loss Prevention (Zscalar) f. EDR / Antivirus Systems (Crowd Strike, MDE etc.,) g. Knowledgebase Framework (Confluence) 2. Continuously monitor SIEM and logging environments for security events and alerts to threats, intrusions, and/or compromises, including: SIEM tools like Splunk & Microsoft Sentine queue management from different data sources Network/EndPoint/Firewall etc., (Splunk & Microsoft Sentinel etc.,) Security email inbox (ProofPoint, Rapid7, Area1 etc.,) Intel feeds via email and other sources (e.g. NH-ISAC) Incident Ticketing queue (ServiceNow) 3. Validate alerts as they come in to eliminate false positives and use other internal and external data sources to enrich alerts with additional context 4. Perform triage of service requests from customers and internal teams 5. Use playbook procedures to carry out standard plays for routine event types and escalate alerts to Level 2 Analysts for further triage and remediation 6. Assist with containment of threats and remediation of environment during or after an incident 7. Act as a participant during Threat Hunting activities at the direction of one or more Incident Response Handlers 8. Document event analysis and write comprehensive reports of incident investigations 9. Proactively improve security-related operational processes and procedures 10. Use available security tools for historical analysis purposes as necessary for detected events; for example, historical searches using SIEM tools (Splunk & Microsoft Sentinel) 11. Maintain operational shift logs with relevant activity from the Analysts shift. Document investigation results, ensuring relevant details are passed to Level 2 or MDR Analysts for final event analysis 12. Update/reference knowledgebase tool (e.g. Confluence) as necessary for changes to processes and procedures, and ingest of daily intelligence reports and previous shift logs 13. Conduct research and document events of interest within the scope of IT Security 14. Alternatively, consulting, or advisory experience in Security Operations 15. Monitor and analyse Intrusion Detection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, Security Incident and Event Management (SIEM) toolset and other event logs to identify security attacks and threats for remediation/suppression. 16. Validate IOCs that triggered the original alert. 17. Research additional internal and external data sources for additional enrichment of event information 18. Determine when an event has reached the threshold of an incident and engage Incident Response Handler to declare an incident. 19. Create filters, data monitors, dashboards, and reports within monitoring utilities. 20. Troubleshoot security monitoring devices to improve event correlation and performance. 21. Handle high and critical severity incidents as described in the operations playbook. 22. Operational level experience in some of these domains (not all): security engineering, alert triaging, rule writing, incident response, DFIR, threat intelligence and management, vulnerability management, and security control testing 23. In-depth knowledge of at least one SIEM platform or security data lake and related processes 24. Knowledge of various security tools, their functions, and comparisons 25. Knowledge of network and cloud security fundamentals 26. Ability to explain complex technical concepts in business terms. 27. Extensive experience in report writing and presentation. 28. Strong, adaptable, and flexible work ethic 29. Good time management skills 30. Ability to work under pressure and prioritise activities Qualifications Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field 5+ years of technical experience of prior MDR/SOC/Incident response experience Demonstrated technical knowledge of current network security, network hardware, protocols, and standards required Shall have demonstrated professional experience in incident detection and response, malware analysis, or cyber forensics Act as a workstream participant to support tier-1, tier-2, or tier-3 SOC environments Demonstrated strong oral and written communication and client facing skills Demonstrated strong analytical and communications skills Flexibility to adapt to different types of engagement, working hours, work environments, and locations Proven ability to work creatively, analytically in a problem-solving environment Ability to work nights, weekends, and/or holidays in the event of an incident response emergency Be comfortable working against deadlines in a fast-paced environment Identify issues, opportunities for improvement, and communicate them to an appropriate senior member Demonstrated technical knowledge of current network security, network hardware, protocols, and standards required Required skills: 6+ years of technical experience in Information Security Experience with SIEM tools (Qradar, Splunk, Logrhythm, Solarwinds, etc.) Experience in Azure Sentinel Familiarity with common IDS/IPS and Firewalls (Snort, Cisco, Fortigate, Sourcefire) Familiarity with incident response process and activities Familiarity with TCP/IP protocol, OSI Seven Layer Model Knowledge of Windows, Unix-based systems, architectures, and network security devices Intermediate level of knowledge of LAN and WAN technologies Must have a solid understanding of information technology, information security domains Knowledge of security best practices and concepts Desired certifications: Security+, C|EH, Network+, Certified Information Systems Security Professional (CISSP), GIAC Certified Intrusion Analyst, GIAC Certified Incident Handler, or GIAC Reverse Engineering Malware Familiarity with ticketing tool / ITSM tool Personal drive, positive work ethic to deliver results within tight deadlines and in demanding situations Preferred candidate profile

Posted 1 week ago

Apply

16.0 - 20.0 years

35 - 60 Lacs

Hyderabad

Work from Office

Naukri logo

Job Summary The Sr. Cyber Security Architect will play a pivotal role in designing and implementing robust security solutions to protect our digital assets. Candidate should have expertise in governance risk management compliance and operational technology security to protect against cyber threats and ensure the uninterrupted functioning of essential operations. Design secure system architectures for OT environments including network segmentation and access controls.mplement security controls and intru Responsibilities Lead the design and implementation of comprehensive security solutions to safeguard digital assets. Oversee the integration of Azure Sentinel for enhanced threat detection and response capabilities. Provide expert guidance on deploying Proofpoint Enterprise Email Protection to secure email communications. Implement Windows Defender ATP to ensure endpoint protection across the organization. Manage Checkpoint Firewall configurations on AWS/Azure to maintain network security. Collaborate with cross-functional teams to align security architecture with business objectives. Conduct regular security assessments to identify vulnerabilities and recommend improvements. Develop and maintain security policies and procedures to ensure compliance with industry standards. Monitor security systems and respond to incidents promptly to minimize impact. Design user-centric security solutions that enhance the overall user experience. Stay updated with the latest security trends and technologies to inform strategic decisions. Facilitate training sessions to educate employees on security best practices. Support the development of security strategies that contribute to the companys mission and societal impact. Qualifications Possess extensive experience in solution design and architecture with a focus on security. Demonstrate proficiency in Azure Sentinel and its application in threat detection. Have a strong background in deploying and managing Proofpoint Enterprise Email Protection. Show expertise in configuring and maintaining Windows Defender ATP. Exhibit knowledge of Checkpoint Firewall operations on AWS/Azure platforms. Understand user experience services and their integration with security solutions. Hold a degree in Computer Science Information Technology or a related field. Certifications Required Not Required

Posted 1 week ago

Apply

10.0 - 12.0 years

15 - 16 Lacs

Pune

Hybrid

Naukri logo

Role & responsibilities Strong understanding of cybersecurity standards, practices, and policies Hands on experience with Security Technologies such as SIEM, Secure web gateway, mail protection, endpoint protection / EDR, WAF, Identity & Threat protection, etc. Hands on experience of security tools implementation including initial setup, configuration and managing daily operations Experience with Windows, Linux, and MacOS architectures Knowledge of security best practices for on-premises virtualization (VMware) and multiple cloud platforms (e.g.: Azure, GCP, AWS) Understanding of network concepts and protocols, including monitoring logs for anomalous activity Proven experience in leading projects and managing vendor relationships Excellent communication skills, with the ability to assertively address Information Security challenges Familiarity with risk analysis and mitigation methodology, security policy and procedure development, incident response and handling, security training and awareness Hands on knowledge of incident response (investigating BEC, phishing, etc.) Hands on experience on reviewing and analyzing IIS and/or Kubernetes logs for threat investigation Technical/Domain Skills: Security related certifications (e.g., CISSP, CISM, or equivalent) Scripting and automation capabilities via tools like: Python, Bash, PowerShell, API Active engagement in Information Security communities, keeping apprised of the latest tools, technologies, and threats Education (Required): Education: BE / B. Tech Work Experience (Required): •10 to 12 years of experience

Posted 1 week ago

Apply

8.0 - 11.0 years

35 - 37 Lacs

Kolkata, Ahmedabad, Bengaluru

Work from Office

Naukri logo

Dear Candidate, We are hiring a Cloud Security Architect to design secure, scalable, and compliant cloud environments by embedding security throughout architecture and operations. Key Responsibilities: Define security architecture standards and implement cloud security frameworks. Secure identity, access management, encryption, logging, and network controls. Perform threat modeling, risk assessments, and architecture reviews. Design automation for security enforcement in cloud CI/CD pipelines. Collaborate with DevOps, compliance, and infrastructure teams. Required Skills & Qualifications: Deep understanding of cloud security (AWS, Azure, GCP). Knowledge of IAM, KMS, firewalls, security groups, WAFs, and SIEM tools. Experience with tools like Prisma Cloud, Sentinel, or AWS Security Hub. Familiarity with NIST, CIS Benchmarks, and ISO 27001 standards. Certifications such as AWS Security Specialty, Azure Security Engineer, or CISSP. Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Reddy Delivery Manager Integra Technologies

Posted 1 week ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Bengaluru

Work from Office

Naukri logo

Educational Requirements Bachelor of Engineering Service Line Data & Analytics Unit Responsibilities A day in the life of an Infoscion As part of the Infosys delivery team, your primary role would be to interface with the client for quality assurance, issue resolution and ensuring high customer satisfaction. You will understand requirements, create and review designs, validate the architecture and ensure high levels of service offerings to clients in the technology domain. You will participate in project estimation, provide inputs for solution delivery, conduct technical risk planning, perform code reviews and unit test plan reviews. You will lead and guide your teams towards developing optimized high quality code deliverables, continual knowledge management and adherence to the organizational guidelines and processes. You would be a key contributor to building efficient programs/ systems and if you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you!If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you! Additional Responsibilities: Knowledge of more than one technology Basics of Architecture and Design fundamentals Knowledge of Testing tools Knowledge of agile methodologies Understanding of Project life cycle activities on development and maintenance projects Understanding of one or more Estimation methodologies, Knowledge of Quality processes Basics of business domain to understand the business requirements Analytical abilities, Strong Technical Skills, Good communication skills Good understanding of the technology and domain Ability to demonstrate a sound understanding of software quality assurance principles, SOLID design principles and modelling methods Awareness of latest technologies and trends Excellent problem solving, analytical and debugging skills Technical and Professional Requirements: DBT Developer Preferred Skills: Technology->Cloud Security->Microsoft Azure - Threat Detection & Response->Azure Sentinel

Posted 1 week ago

Apply

6.0 - 11.0 years

15 - 25 Lacs

Chennai, Bengaluru

Hybrid

Naukri logo

Greeting of the Day.... I am Hirimng Thales Vormrtric/ Thales CipherTrust enginner for my client... Location: Chennai, Bangalore Experienece:6-13 Years NP: Immedaite-60 days Job Description • 6+ years in Encryption and Key Management tools and technologies. • Hands-on expertise with Vormetric DSM and CipherTrust Manager. • Proficient in Linux and Windows OS with administration knowledge. • Strong understanding of encryption, key management, and cryptographic principles. • Familiarity with Public Key Infrastructure (PKI) is a plus. • Hands-on experience onboarding applications, databases, and storage platforms into CipherTrust Manager or Vormetric DSM. • Vormetric DSM / CipherTrust Manager. • skills in stakeholder communication, process understanding, and documentation. • Proficient in using enterprise-level security tools for data protection. Primary Skills • Encryption • Key Management and Cryptography • Vormetric DSM • CipherTrust Manager Secondary Skills Ability to work with cross-functional teams and support secure integration processes To apply send me your resume at chanchal@oitindia.com or sharwe this job in your community.

Posted 2 weeks ago

Apply

3.0 - 6.0 years

9 - 13 Lacs

Mumbai

Work from Office

Naukri logo

Roles & Responsibilities: Azure Security Posture and Azure Sentinel SIEM, Azure Security Center, Azure Policy, Azure Sentinel and Azure Monitor The focus of this team is to identify security vulnerabilities, remediate and implement security controls across MCS. Excellent stakeholder management skills and should be able to manage stakeholders at senior levels. Experience in proposing technical solutions in Microsoft. Experience in application security implementation using Azure AD Knowledge of CI and CD processes and Tools like AzureDevOPs Knowledge of defining build and release pipeline. Good understanding of cloud design patterns Ability to quickly perform POC on technically challenging requirements. Suggest tool/frameworks in given problem context Excellent written and oral communication skills Self-starter with quick learning ability and efficient Implementation skills with respect to country nuances Consultative and service bent of mind while dealing with key stakeholders Multi-task and should be able to work under stringent deadlines Ability to understand and work on various internal

Posted 2 weeks ago

Apply

2.0 - 4.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Should have done SIEM Engineeringactivities for more than 2 years. Hands on Experience to Configure,manage, and maintain the Microsoft Sentinel SIEM platform including logmanagement, retention configurations, maintenance of logs at low cost. Monitor, analyze, investigate andrespond to security incidents in MS Sentinel by collaborating with the SOC teamand Customers. Should be able to Integrate/onboarddevices (Linux, Palo Alto, Fortinet, windows and other devices etc.) to Azuresentinel Should have expertise in integratingdata sources which are not supported by Sentinel tool OOB. Custom parserdevelopment and ability to solve technical issues in Sentinel. Troubleshoot and resolve issuesrelated to SIEM (Sentinel) infrastructure and integrations like logs notreporting to Sentinel. Creation of integration documentsand sending them to customers as per requirement. Strong Knowledge of different MicrosoftDefender products Generate and reviewWeekly/Monthly reports to provide insights on security posture and SIEMeffectiveness to Customers Regularly review use caseperformance and keep track of any fine tuning done to use cases includingidentifying scenarios where fine tuning can be done and effectively communicateto customer/internal for fine tuning. Act as single point of contact forthe client during any issues of Integration or Incidents. What you ll do: Creation and Fine Tuning inCustom KQL queries and functions for complex detection and monitoring Requirements. Knowledge of Workbooks creation, Building Playbooks (Enrichment andResponse) in Sentinel automation through logic apps. Preference should be given to candidateswho have completed expert training and certifications in Sentinel and Defender productsof Microsoft. Strong communication, collaborationand multi-tasking skills to work effectively with cross-functional teams andstakeholders. Relevant professionalcertifications such as: AZ-900, SC-900, SC-200, Certified Ethical Hacker (CEH)or any other SIEM Engineering certification. Stay updated with the latesttrends and developments in SIEM technologies and cybersecurity threats andutilize it in System if required. What we offer: Insurance Group Medical Coverage, Group Personal Accident, Group Term Life Insurance Rewards and Recognition Program,Employee Referral Program, Wellness Program and CSR Initiatives Maternity and Paternity Leaves Company Sponsored CertificationProgram

Posted 2 weeks ago

Apply

1.0 - 6.0 years

11 - 15 Lacs

Bengaluru

Work from Office

Naukri logo

Cybersecurity, Azure Sentinel SIEM,MS Defender for Endpoints (EDR/ATP),AWS IAM,SOAR Concept, Fortinet FortiSOAR, Palo Alto Networks - Firewalls, Cortex XSOAR, Python We are seeking a Cybersecurity Analyst with 1-6years of experience in fundamental cybersecurity concepts, including SIEM, EDR, IAM, and SOAR platforms The ideal candidate should have a basic understanding of security automation and orchestration using platforms like FortiSOAR, Palo Alto XSOAR, and ThreatConnect (preferred) Experience with SOAR play book creation , integration etc Additionally, knowledge of Python scripting for automation and security tasks will be an added advantage

Posted 2 weeks ago

Apply

4.0 - 6.0 years

1 - 6 Lacs

Bengaluru

Hybrid

Naukri logo

Role & responsibilities Strong background developing Azure Sentinel/DEVO analytics rules, incidents, playbooks, notebooks, workbooks, threat hunting within the Azure Cloud. Strong and demonstrated background working with Log Analytics Workspaces, Kusto Query Language (KQL), Language integrated query Dashboard\workbook development. Strong understanding of Azure PaaS services. Solid experience with Logic Apps in Azure Experience in Creation of Resource groups, Log analytics workspace for Azure Sentinel & DEVO Integration to Data sources Develop SIEM and SOAR use cases and log data collection utilizing the Azure Sentinel, DEVO and Azure Log Analytics toolsets. Highly proficient with Azure Sentinel, DEVO and Azure Log Analytics. Develop analytics rules, incidents, playbooks, notebooks, workbooks, threat hunting and KQL queries for data normalization and parsing capabilities within Log Analytics' data ingestion pipeline. Develop incident response capabilities using Logic Apps in Azure. Integrate and automate developed use cases into Azure DevOps CI/CD pipelines. Develop Jupyter notebooks in Python and integrate them with Azure Sentinel Understanding of Azure Lighthouse, Azure AD, B2B, and common Cloud authentication patterns. Ability to configure, automate, harden, and deploy Azure Sentinel Services. Possess skills on Use case Development DEVO, Sentinel, Splunk. Hands-on experience with Sentinel/Splunk SIEM use case creation and tuning. Strong understanding of Cloud Security and Networking Concepts and practices. Work with Tactical Use Case Development team to assist in processing the more intricate use case development tickets from our customer request queue. Excellent knowledge on MITRE Tactics and Techniques Work closely with our Threat Intel team to identify security alerting gaps that we can fill with our detection services. Back up Operation Use Case Development team on SIEM onboarding tasks and Security Analyst collaboration. Experience with multiple attack vectors such as Malware, Trojans, Exploit Kits, Ransomware and Phishing techniques Provide superior technical security expertise to ensure that the Security Operations Centre (SOC) is always delivering a professional service to its customers Conduct detailed analytical queries and investigations, identify areas that require specific attention, identify indicators of compromise (IOC) or events of interest (EOI) that need further investigation and develop use cases and rules to be developed into the SIEM platform Develop and improve Security Information and Event Management (SIEM) content and all relevant technologies used in the team, continually refining and create the rules and logic (use cases) to make the detection capabilities more efficient and effective Create and enhance internal processes and procedures Professional communications and reporting to SOC stakeholders and customers Act as a mentor and team lead to all First Level Security Analysts, support and supervise them, ensure knowledge transfer within the team Deliver qualified information about actual threats and indications, recommendations how the associated risk can be mitigated Contribute to the overall performance and success of the Security Operations Centre Build on and continuously improve SOC analytics framework Ensure effective operation of SIEM content: filters, rules, expressions and other identification mechanisms of the threat and vulnerability management technologies used within the SOC Mentor and guide the First Level Security Analysts Provides professional data analysis within the SOC processes and to SOC customers in order to drive further security measures and risk mitigation activities. Responsible for execution and maintenance of SOC related analytical processes and tasks Detailed technical security reporting to Management operating companies and appropriate stakeholders Work closely with other Information Security teams to ensure effective intrusion detection and incident response Continually maintain and improve technical capabilities through individual development activities, accreditations and certifications to remain constantly prepared to challenge the ever-evolving cyber threat Deep information security expertise Knowledge of network concepts, Windows and Unix administration Knowledge of typical security devices such as firewalls, intrusion detection systems, AV and End Point security, Web Application Firewalls, anti-spam systems, event correlation systems, etc. Understanding of security threats, attack scenarios; analysis and intrusion detection skills Analytical and Communication Skills: a. Excellent analytical skills and out-of-the box thinking b. Excellent communication capabilities c. Team player d. Fluent in English Quick learner and intuitive thinker the more you learn, the faster you’ll grow. Effective time task management skills. Confidence in independently delivering technical solution. Good problem-solving skills; ability to visualize a problem/situation and think abstractly to solve it

Posted 3 weeks ago

Apply

10.0 - 12.0 years

9 - 13 Lacs

Mumbai

Work from Office

Naukri logo

Job Information Job Opening ID ZR_1690_JOB Date Opened 24/01/2023 Industry Technology Job Type Work Experience 10-12 years Job Title Security Architect City Mumbai Province Maharashtra Country India Postal Code 400001 Number of Positions 4 Roles & Responsibilities: Azure Security Posture and Azure Sentinel SIEM, Azure Security Center, Azure Policy, Azure Sentinel and Azure Monitor The focus of this team is to identify security vulnerabilities, remediate and implement security controls across MCS. Excellent stakeholder management skills and should be able to manage stakeholders at senior levels. Experience in proposing technical solutions in Microsoft. Experience in application security implementation using Azure AD Knowledge of CI and CD processes and Tools like AzureDevOPs Knowledge of defining build and release pipeline. Good understanding of cloud design patterns Ability to quickly perform POC on technically challenging requirements. Suggest tool/frameworks in given problem context Excellent written and oral communication skills Self-starter with quick learning ability and efficient Implementation skills with respect to country nuances Consultative and service bent of mind while dealing with key stakeholders Multi-task and should be able to work under stringent deadlines Ability to understand and work on various internal check(event) ; career-website-detail-template-2 => apply(record.id,meta)" mousedown="lyte-button => check(event)" final-style="background-color:#2B39C2;border-color:#2B39C2;color:white;" final-class="lyte-button lyteBackgroundColorBtn lyteSuccess" lyte-rendered=""> I'm interested

Posted 3 weeks ago

Apply

4.0 - 8.0 years

12 - 15 Lacs

Pune

Remote

Naukri logo

About V Group V Group Inc., an IT-based solution entity based out of New Jersey. With multiple offshore sites (Pune and Bhopal) in India. With offerings ranging from IT infrastructure to Product development, V Group Inc provides a compliant service in numerous industry sectors while maintaining structure, stability, and core values. Ranked by INC5000 in 2020 - Fastest Growing IT Co. in the USA. Current business groups include e-commerce, Digital, Professional services, IT projects, and Products. Join our team of innovative technical and business-savvy people; with a passion for creating solutions! Visit us at: https://www.vgroupinc.com (Corporate website) || https://www.webstorevgroup.net (Ecommerce Store) || https://www.vgroupdigital.com/portfolio (Digital Products). Job Details: Position Title : Security Operation Analyst (L1 SOC) Job Locatio n: Pune Job Timing: Rotational (On Call support is required) Experience : 4+ Years of relevant experience. Job functions: The security analyst, Level 1, works within the SOC (Security Operations Center) and is responsible for the monitoring of systems, investigating root causes, and coordinating with Level 2 and 3 engineers for analysis and response. SIEM Alert Investigation . Monitor alerts and notices from firm’s managed SIEM solution. Alerts may require investigation, coordination, or escalation. Monitor Microsoft Defender ATP High alerts through Azure console and email. Same as above. Web site blocks/ Exceptions. Using the Cisco Umbrella platform, manage exceptions to policies by whitelisting or otherwise allowing someone to access a site, once approved. Perform vulnerability scans on new servers and other resources prior to allowing them to be put into production. Notify stakeholders of vulnerabilities to be remediated and steps to remediate them. Assist with regularly scheduled vulnerability scans . Assist with the renewal and acquisition of certificates Communicate policies with end-users Create new ways to search for potentially suspicious events on systems Participate in projects to improve security monitoring toolkits as well as to improve defensive controls Provide different types of data to measure security and compliance Understanding of an Information Security Management program and related standards such as ISO 27001, NIST, COBIT, etc. Additional Activities: Support in incident management, build skills to grow Support in Vulnerability Assessment, Threat Intelligence, coordinating patches Assist in configuration of Azure Sentinel E5 EMS Microsoft Security migration support in future Requirement : 3+ years of experience L1 support analyst in SOC (Security Ops Groups) MUST HAVE: SIEM tool experience MUST HAVE: Azure Defender, Azure ATP (Advance Threat Protection) Experience Good to have: Azure Sentinel, E5 EMS Microsoft Security exp., Azure Security Center Perks & Benefits Health & Accident Insurance Paid Leaves and Sick Leaves Education sponsorship / Certification Reimbursement Free Training Platforms Gym membership EPF, Gratuity. Onsite Opportunities.

Posted 3 weeks ago

Apply

5.0 - 10.0 years

12 - 18 Lacs

Pune, Bengaluru, Delhi / NCR

Hybrid

Naukri logo

SOC Analyst 5+ Years of exp in SOC, and should have exp with Azure/AWS cloud. Exp in Remediation and "Defender for Cloud " is a must. About the role As a SOC Analyst L3, you will play a critical role in strengthening our organization's security posture through proactive threat detection and response. You will monitor system and network activity for any dangers or weaknesses and delve into the details of potential security incidents. Along the way, you will get to: Incident Analysis: Analyze security notifications to identify potential security issues and evaluate their impact and severity. Incident Response: Oversee the response to verified security incidents, including containment measures and investigation. Threat and Vulnerability Analysis: Investigate, document, and report on information security issues and emerging trends. Adjust Security Tools and Processes: Fine-tune security tools and processes to improve the organization's overall security posture. Be Ambitious: This opportunity is not just about what you do today but also about where you can go tomorrow. When you bring your hunger, heart, and harmony to Insight, your potential will be met with continuous opportunities to upskill, earn promotions, and elevate your career. What were looking for Technical Proficiency: In-depth knowledge of security protocols, techniques, and technologies. Analytical Skills: Ability to analyze system performance and troubleshoot complex security issues. Communication: Effective communication skills to interact with team members and stakeholders. What you can expect Were legendary for taking care of you, your family and to help you engage with your local community. We want you to enjoy a full, meaningful life and own your career at Insight. Some of our benefits include: Freedom to work from another locationeven an international destination—for up to 30 consecutive calendar days per year. Medical Insurance Health Benefits Professional Development: Learning Platform and Certificate Reimbursement Shift Allowance But what really sets us apart are our core values of Hunger, Heart, and Harmony, which guide everything we do, from building relationships with teammates, partners, and clients to making a positive impact in our communities. Join us today, your ambITious journey starts here. When you apply, please tell us the pronouns you use and any reasonable adjustments you may need during the interview process. At Insight, we celebrate diversity of skills and experience so even if you don’t feel like your skills are a perfect match - we still want to hear from you! Today's talent leads tomorrow's success. Learn more about Insight: https://www.linkedin.com/company/insight/

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies