Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
2.0 years
0 Lacs
Chennai
On-site
2 - 3 Years 1 Opening Chennai Role description Vulnerability Management Analyst Experience : 2 to 4 years Location : Hyderabad/Trivandrum/Kochi/Bangalore/Chennai Company: CyberProof, A UST Company Job Summary: We are seeking a skilled and proactive Vulnerability Management Analyst to join our security team. In this role, you’ll lead day-to-day operations of vulnerability assessment and remediation efforts for a client, while working hands-on with tools like Tenable and Wiz. Your sharp analysis, technical precision, and mentoring mindset will directly impact our enterprise security posture. Key Responsibilities: Lead and oversee vulnerability assessment scans using tools such as Tenable and Wiz , ensuring accurate execution and timely delivery. Configure and schedule scans, interpret assessment findings, and support ongoing remediation efforts in collaboration with stakeholders. Manage and maintain up-to-date vulnerability, asset, and configuration databases. Perform continuous asset discovery and ensure scan coverage remains comprehensive and consistent. Prioritize vulnerabilities based on criticality, exploitability, and potential business impact. Mentor junior analysts in scan execution, findings interpretation, and communication protocols. Escalate risks and coordinate mitigation tasks as per established security policies and response playbooks. Ensure adherence to company and customer information security standards and regulatory compliance. Preferred Qualifications: Proven experience in vulnerability management, including configuring and operating Tenable and Wiz platforms. Familiarity with CVSS scoring, patch management cycles, and vulnerability lifecycle workflows. Strong analytical skills with an ability to translate complex technical findings into actionable risk narratives. Experience working in hybrid cloud or enterprise environments is a plus. Certifications like CompTIA Security+, CEH are advantageous. Skills Vulnerability Assessment,Vulnerability Analysis,Vulnerability Scanning About UST UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to operation. With deep domain expertise and a future-proof philosophy, UST embeds innovation and agility into their clients’ organizations. With over 30,000 employees in 30 countries, UST builds for boundless impact—touching billions of lives in the process.
Posted 21 hours ago
2.0 years
5 - 10 Lacs
Bengaluru
On-site
Your Responsibilities Will Include : Monitoring and responding to security incidents Conducting vulnerability assessments & pen tests Managing firewalls, IDS/IPS, and endpoint security Enforcing cybersecurity policies & compliance Supporting cloud & network security What You Need to Bring : 2–5 years of relevant experience Hands-on with tools like Splunk, Nessus, Qualys Exposure to cloud platforms (AWS/Azure/GCP) Certifications like CEH, Security+, OSCP are a plus Why Join Us? High-impact role in a security-first environment Flexible work setup Learning & upskilling opportunities Collaborative, inclusive culture Job Types: Full-time, Permanent Pay: ₹500,000.00 - ₹1,000,000.00 per year Application Question(s): What is your current and expected CTC? What is your notice period? In case you are serving your notice period then what is your LWD? Experience: Cybersecurity: 2 years (Required) Splunk: 2 years (Preferred) Nessus: 2 years (Preferred) Qualys: 2 years (Preferred) Cloud Platforms: 2 years (Preferred) Work Location: In person
Posted 21 hours ago
3.0 years
0 Lacs
Itanagar, Arunachal Pradesh, India
Remote
Job Description Role: Facilitator – Cyber Security Location: Remote (India) Position Overview: The Facilitator plays a crucial role within our team, responsible for delivering high-quality educational content and support to students. The Facilitator will utilize their in-depth subject knowledge and experience to perform core activities such as grading, live chat support, on demand video support and quality assurance, ensuring that all content meets established standards. Additionally, the Facilitator will provide on-demand video support, engage in community support initiatives, and conduct Q&A sessions to foster student understanding and engagement. This role demands proactive learning, the ability to handle complex tasks, and the capacity to offer constructive feedback and process improvements. The Facilitator will also collaborate with mentors to identify and address weak areas within the team, contributing to the overall success and effectiveness of our educational programs. Eligibility Work experience of 3+ years in the relevant industry is recommended, with a portfolio to prove skill sets. Experience in EdTech will be an added advantage. Strong communication skills are essential for delivering live lessons to students in the US. Proficiency in facilitating sessions via Zoom or other online platforms is required. Diversified and in-depth subject knowledge with the required degree. Good grasp of subject-specific software/tools. Primary Responsibilities Perform all core activities (Grading, Livechat, QA, Live Lessons & Video Weekly Tutoring) within the given guidelines and achieve a QA score of 80% and above. Deliver quality (QA score will validate) content in terms of Grading and Livechat. Review the expert’s (Mentor Sessions) content as per the latest guidelines and processes. Proactively learn new activities/software/core-subjects and be a part of projects as and when required. Work on difficult tasks across all activities and deliver content without compromising quality. Provide suggestions/changes to activity guidelines or process documents. Review the content from external sources of all difficulty levels and send detailed feedback. Identify weak areas (Subject/Process) of the MNEs in the team and update them to the Lead. Handle queries from outside experts (MNEs). Provide on-demand video support for students. Participate in community support initiatives to assist students and resolve their queries. Conduct Q&A sessions as needed to enhance student understanding and engagement. Train MNEs and monitor their progress throughout their first 90 days (about 3 months) of onboarding. Support and guide MNEs in their day-to-day processes. Curate new tools and technology for respective subjects. Suggest additions/corrections in the current curriculum. Suggest new courses to be added as per market demand. Gauge incoming volume for chat and grading and suggest redistribution of working shifts as and when needed. Prepare initial reports for SME grading contribution and Livechat effectiveness. Secondary Responsibilities Analyze graded checkpoints and chats/video support and rate them as per defined standards. Present findings and recommendations in a plan that drives future process improvements. Cybersecurity Proficiency in Networking and Network Security, Linux and Windows Systems, Administration and Hardening Web Vulnerabilities, Cryptography and Encryption, Penetration Testing, SIEMs/ Incident Response Forensics Governance, Risk, and Compliance Cloud Security Security+ and CEH Certification Technical ability to configure virtual machines with Virtual Box and VMWare. Demonstrates genuine student advocacy and empathy for beginners Why do we exist? Students are working harder than ever before to stabilize their future. Our recent research study called State of the Student shows that nearly 3 out of 4 students are working to support themselves through college and 1 in 3 students feel pressure to spend more than they can afford. We founded our business on provided affordable textbook rental options to address these issues. Since then, we’ve expanded our offerings to supplement many facets of higher educational learning through Chegg Study, Chegg Math, Chegg Writing, Chegg Internships, Thinkful Online Learning, and more to support students beyond their college experience. These offerings lower financial concerns for students by modernizing their learning experience. We exist so students everywhere have a smarter, faster, more affordable way to student. Video Shorts Life at Chegg: http://youtu.be/Fwf90zgaOLA Chegg Corporate Career Page: https://jobs.chegg.com/ Chegg India: http://www.cheggindia.com/ Chegg Israel: http://www.chegg.com/about/working-at-chegg/israel/ Thinkful (a Chegg Online Learning Service): https://www.thinkful.com/about/#careers Chegg out our culture and benefits! http://www.chegg.com/about/working-at-chegg/benefits/ Chegg is an equal opportunity employer
Posted 21 hours ago
2.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
Role Description Vulnerability Management Analyst Experience : 2 to 4 years Location : Hyderabad/Trivandrum/Kochi/Bangalore/Chennai Company: CyberProof, A UST Company Job Summary We are seeking a skilled and proactive Vulnerability Management Analyst to join our security team. In this role, you’ll lead day-to-day operations of vulnerability assessment and remediation efforts for a client, while working hands-on with tools like Tenable and Wiz. Your sharp analysis, technical precision, and mentoring mindset will directly impact our enterprise security posture. Key Responsibilities Lead and oversee vulnerability assessment scans using tools such as Tenable and Wiz, ensuring accurate execution and timely delivery. Configure and schedule scans, interpret assessment findings, and support ongoing remediation efforts in collaboration with stakeholders. Manage and maintain up-to-date vulnerability, asset, and configuration databases. Perform continuous asset discovery and ensure scan coverage remains comprehensive and consistent. Prioritize vulnerabilities based on criticality, exploitability, and potential business impact. Mentor junior analysts in scan execution, findings interpretation, and communication protocols. Escalate risks and coordinate mitigation tasks as per established security policies and response playbooks. Ensure adherence to company and customer information security standards and regulatory compliance. Preferred Qualifications Proven experience in vulnerability management, including configuring and operating Tenable and Wiz platforms. Familiarity with CVSS scoring, patch management cycles, and vulnerability lifecycle workflows. Strong analytical skills with an ability to translate complex technical findings into actionable risk narratives. Experience working in hybrid cloud or enterprise environments is a plus. Certifications like CompTIA Security+, CEH are advantageous. Skills Vulnerability Assessment,Vulnerability Analysis,Vulnerability Scanning
Posted 21 hours ago
0 years
3 - 5 Lacs
Vadodara
On-site
Role Overview: We are seeking a knowledgeable and motivated Cyber Security Trainer to join our academic team. The Cyber Security Trainer plays a critical role in delivering high-quality academic and practical instruction in cyber security. This position combines teaching, mentorship, and curriculum development to equip students with the skills needed to navigate real-world cyber threats. By integrating current industry practices and fostering an engaging learning environment, the trainer contributes to both student success and the institution’s academic excellence in the cyber security domain Key Responsibilities: · Conduct theory lectures and hands-on lab sessions for undergraduate and postgraduate students in cyber security and related domains. · Prepare course materials, lab manuals, and digital resources aligned with curriculum objectives. · Evaluate student performance through internal assessments, practical exams, and end-semester examinations; participate in examination-related duties including question paper setting, invigilation, and evaluation. · Organize and lead technical seminars, workshops, faculty development programs (FDPs), and guest lectures to enhance learning and professional development. · Guide students in project work, certifications, and participation in cyber security challenges, hackathons, and competitions. Qualifications & Skills: · BTech, MCA, MTech in Computer Science, Information Security, or a related field (PhD preferred for senior roles). · Relevant industry certifications (e.g., CEH, CompTIA Security+, CISSP, OSCP) are desirable. · Prior teaching/training experience or industry experience in cyber security domains such as network security, ethical hacking, digital forensics, or incident response. (preferred but not mandatory) · Excellent communication and presentation skills. · Proficiency in using cyber security tools, simulators, and learning platforms. Job Type: Full-time Pay: ₹300,000.00 - ₹500,000.00 per year Benefits: Commuter assistance Leave encashment Paid sick time Paid time off Provident Fund Schedule: Day shift Application Question(s): Have you completed BTech, MCA, MTech in computer science, Information security, or a related field? Language: English (Required) Work Location: In person
Posted 21 hours ago
2.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Position Summary... Demonstrates up-to-date expertise and applies this to the development, execution, and improvement of action plans by providing expert advice and guidance to others in the application of information and best practices; supporting and aligning efforts to meet customer and business needs; and building commitment for perspectives and rationales. Provides and supports the implementation of business solutions by building relationships and partnerships with key stakeholders; identifying business needs; determining and carrying out necessary processes and practices; monitoring progress and results; recognizing and capitalizing on improvement opportunities; and adapting to competing demands, organizational changes, and new responsibilities. Models compliance with company policies and procedures and supports company mission, values, and standards of ethics and integrity by incorporating these into the development and implementation of business plans; using the Open Door Policy; and demonstrating and assisting others with how to apply these in executing business processes and practices. What you'll do... About Team: Marketplace Engineering team is at the forefront of building core platforms and services to enable Walmart to deliver vast selection at competitive prices and with best in class post-order experience by enabling third-party sellers to list, sell and manage their products to our customers on walmart.com. We do this by managing the entire seller lifecycle, monitoring customer experience, and delivering high-value insights to our sellers to help them plan their assortment, price, inventory. The team also actively collaborates with partner platform teams to ensure we continue to deliver the best experience to our sellers and our customers. This role will be focused on the Marketplace What you will do: As a Software Engineer III for Walmart, you’ll have the opportunity to: Develop intuitive software that meets and exceeds the needs of the customer and the company. You also get to collaborate with team members to develop best practices and requirements for the software. In this role it would be important for you to professionally maintain all codes and create updates regularly to address the customer’s and company’s concerns. You will show your skills in analysing and testing programs/products before formal launch to ensure flawless performance. Troubleshooting coding problems quickly and efficiently will offer you a chance to grow your skills in a high-pace, high-impact environment. Software security is of prime importance and by developing programs that monitor sharing of private information, you will be able to add tremendous credibility to your work. You will also be required to seek ways to improve the software and its effectiveness. Adhere to Company policies, procedures, mission, values, and standards of ethics and integrity What you will bring: B.E./B. Tech/MS/MCA in Computer Science or related technical field. Minimum 2+ years of object-oriented programming experience in Java. Excellent computer systems fundamentals, DS/Algorithms and problem-solving skills. Hands-on experience in building web based Java EE services/applications and Kafka, Apache Camel, RESTful Web-Services, Spring, Hibernate, Splunk, Caching. Excellent organisation, communication and interpersonal skills. Large scale distributed services experience, including scalability and fault tolerance. Exposure to cloud infrastructure, such as Open Stack, Azure, GCP, or AWS Exposure to build, CI/CD & deployment pipelines and related technologies like Kubernetes, Docker, Jenkins etc. A continuous drive to explore, improve, enhance, automate and optimize systems and tools. Experience in systems design and distributed systems. Exposure to SQL/NoSQL data stores like Cassandra, Elastic, Mongo etc. About Walmart Global Tech Imagine working in an environment where one line of code can make life easier for hundreds of millions of people. That’s what we do at Walmart Global Tech. We’re a team of software engineers, data scientists, cybersecurity expert's and service professionals within the world’s leading retailer who make an epic impact and are at the forefront of the next retail disruption. People are why we innovate, and people power our innovations. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasing their first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale, impact millions and reimagine the future of retail. Flexible, hybrid work We use a hybrid way of working with primary in office presence coupled with an optimal mix of virtual presence. We use our campuses to collaborate and be together in person, as business needs require and for development and networking opportunities. This approach helps us make quicker decisions, remove location barriers across our global team, be more flexible in our personal lives. Benefits Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include a host of best-in-class benefits maternity and parental leave, pto, health benefits, and much more. Belonging We aim to create a culture where every associate feels valued for who they are, rooted in respect for the individual. Our goal is to foster a sense of belonging, to create opportunities for all our associates, customers and suppliers, and to be a Walmart for everyone. At Walmart, our vision is "everyone included." by fostering a workplace culture where everyone is—and feels—included, everyone wins. Our associates and customers reflect the makeup of all 19 countries where we operate. By making Walmart a welcoming place where all people feel like they belong, we’re able to engage associates, strengthen our business, improve our ability to serve customers, and support the communities where we operate. Equal opportunity employer Walmart, inc., is an equal opportunities employer – by choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting and valuing unique styles, experiences, identities, ideas and opinions – while being inclusive of all people. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 2years’ experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 4 years’ experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, Network+, GISF, GSEC, CISSP, or CCSP, Master’s degree in Computer Science, Information Technology, Engineering, Information Systems, Cybersecurity, or related area Primary Location... BLOCK- 1, PRESTIGE TECH PACIFIC PARK, SY NO. 38/1, OUTER RING ROAD KADUBEESANAHALLI, , India R-2237196
Posted 21 hours ago
3.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 21 hours ago
3.0 years
0 Lacs
Gurugram, Haryana, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 21 hours ago
3.0 years
0 Lacs
Kolkata, West Bengal, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 21 hours ago
3.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 21 hours ago
3.0 years
0 Lacs
Kochi, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 21 hours ago
3.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 21 hours ago
3.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 21 hours ago
3.0 years
0 Lacs
Pune, Maharashtra, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 21 hours ago
3.0 years
0 Lacs
Noida, Uttar Pradesh, India
On-site
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Job Profile Name: Senior Incident Response Analyst Job Profile Summary To provide security monitoring and support to Client's technology platforms, network, applications, crew, and environments in response to incidents of varying severity and perform other security monitoring/incident response functions as needed. Job Description Duties and Responsibilities: Operate as second level support to a 24x7 managed security operations centre. Alert clients regarding intrusions and potential intrusions that may compromise their network infrastructure. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Takes a proactive role in the resolution of incidents, even after they are escalated Work on assigned ticket queue Understanding and exceeding expectations on all tasked SLA commitments Track and report on closure of tickets as per SLAs Escalating issues to Level 2 or Level 3 and management when necessary Providing daily and weekly reports on security and vulnerability incidents Working in shift teams Adheres to Client Information Security policies and departmental procedures, along with following industry best practices. Works with other departments (within and outside of Information Security) to communicate appropriate and consistent security requirements. Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager. Qualifications: Undergraduate degree in information/cyber security, an information technology-related field or equivalent combination of training, certifications, and experience. 3-6 years related experience. CompTIA Security+, ISC2 CISSP, SANS, or other similar certifications are a plus but not required. Knowledge of security concepts, theories, and best practices. Ability to analyze and demonstrate problem resolution skills. Demonstrated ability to work collaboratively as well as independently, with attention to detail. Demonstrated ability to be flexible and exercise good judgment. Demonstrated strong organization and time management skills. Strong verbal, written and interpersonal communication skills. Ability to deal effectively with various levels of business unit crew and management. Experience on SIEM, SOAR and EDR/XDR is must. Special Factors: Weekend availability/flexibility to work weekends is a MUST. Willing to support US shift (Night shift) EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 22 hours ago
3.0 years
0 Lacs
Bengaluru, Karnataka, India
On-site
Job Title: SOC Consultant Location: Gurgaon / Bangalore Experience: 3+ Years Position Type: Full-time Immediate Joiners Preferred Job Description: We are seeking a skilled SOC (Security Operations Center) Consultant with 3+ years of experience in security operations, threat analysis, and incident response. The ideal candidate should have hands-on experience with SIEM tools and a strong understanding of cybersecurity principles and frameworks. Key Responsibilities: Monitor, analyze, and respond to security events and incidents Operate and manage SIEM platforms (e.g., Splunk, QRadar, ArcSight, etc.) Perform real-time threat analysis, detection, and triage of security incidents Support vulnerability management and threat intelligence integration Work closely with clients and internal teams to implement security best practices Document security incidents and contribute to knowledge base development Assist in the development of security playbooks and incident response plans Required Skills: 3+ years of experience in SOC operations or a similar cybersecurity role Proficiency in SIEM tools and log analysis Good understanding of TCP/IP, IDS/IPS, firewalls, and malware analysis Familiarity with threat hunting techniques and cybersecurity frameworks (NIST, MITRE ATT&CK) Strong analytical and problem-solving skills Excellent communication and documentation skills Certifications (Preferred): CEH / CompTIA Security+ / SSCP / Splunk Certified / Microsoft SC-200 or equivalent
Posted 22 hours ago
2.0 years
0 Lacs
Ahmedabad, Gujarat, India
On-site
Line of Service Advisory Industry/Sector FS X-Sector Specialism Risk Management Level Associate Job Description & Summary In-depth knowledge of application development processes and at least one programming and one scripting language (e.g., Java, Scala, C#, JavaScript, Angular, ReactJs, Ruby, Perl, Python, Shell). •Knowledge on OS security (Windows, Unix/Linux systems, Mac OS, VMware), network security and cloud security. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Job Description & Summary: We are seeking a professional to join our Cybersecurity and Privacy services team, where you will have the opportunity to help clients implement effective cybersecurity programs that protect against threats. Responsibilities: L1 - Minimum 2 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting. L2 - Minimum 4 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/Vulnerability Management/ SOC platform management/ Automation/ Asset Integration/ Threat Intel Management/Threat Hunting. · Round the clock threat monitoring & detection · Analysis of any suspicious, malicious, and abnormal behavior. · Alert triage, Initial assessment, incident validation, its severity & urgency · Prioritization of security alerts and creating Incidents as per SOPs. · Reporting & escalation to stakeholders · Post-incident Analysis · Consistent incident triage & recommendations using playbooks. · Develop & maintain incident management and incident response policies and procedures. · Preservation of security alerts and security incidents artefacts for forensic purpose. · Adherence to Service Level Agreements (SLA) and KPIs. · Reduction in Mean Time to Detection and Response (MTTD & MTTR). Mandatory skill sets: Certified SOC Analyst (EC-Council), Computer Hacking Forensic Investigator (EC-Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc. Preferred skill sets: SOC - Splunk Years of experience required: 2-5 Years Education qualification: B.Tech/MCA/MBA with IT background/ Bachelor’s degree in Information Technology, Cybersecurity, Computer Science a Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Master of Business Administration, Bachelor of Engineering Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills SOC Operations Optional Skills SoCs Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date
Posted 1 day ago
3.0 years
0 Lacs
India
On-site
Key Responsibilities Monitor and triage alerts from SIEM platforms including Elastic Stack , correlating data from Zscaler, Defender for Endpoint, CrowdStrike Falcon , and other security tools. Investigate suspicious activity and escalate confirmed incidents with detailed impact assessments. Support incident response lifecycle —including containment, eradication, and recovery—according to defined playbooks. Collaborate with senior analysts and threat intelligence teams to conduct in-depth investigations and recommend mitigations. Perform log analysis, packet capture review, and behavioral analytics to uncover advanced threats. Conduct proactive threat hunting using data across various telemetry sources (e.g., endpoint, network, cloud). Document investigation steps, findings, and resolution actions for audit and knowledge base purposes. Continuously tune SIEM rules, detection logic, and alert thresholds to reduce false positives and increase fidelity. Provide audit and compliance support during security assessments and regulatory evaluations. Participate in weekly SOC reviews and post-incident reviews to improve detection and response capabilities. Stay updated with the latest threat intel, CVEs, TTPs (MITRE ATT&CK), and industry best practices. Qualifications & Skill sBachelor’s degree in computer science, Cybersecurity, Information Technolog y, or related field .2–3 year s of hands-on experience in a SOC or cybersecurity role, ideally in a 24x7 monitoring environment .Solid knowledge of :Endpoint detection tools (CrowdStrike Falcon, Defender for Endpoin t )Network and cloud security solutions (Zscaler Internet Access/ZP A )Open-source and commercial SIEM tools (preferably Elastic/EL K) .Understanding of network protocol s, log format s, and Windows/Linux/macOS securit y .Familiarity with MITRE ATT&C K, CVE/CVSS scoring, and vulnerability management principles .Strong communication and incident documentation skills .Willingness to work in rotational shifts for continuous 24x7 SOC coverag e .Preferred certifications: CompTIA Security+, Microsoft SC-200, Elastic Certified Analyst, CrowdStrike Certified Falcon Responder, or simila r .
Posted 1 day ago
6.0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
Key Job Responsibilities: VOC - VI (Vulnerability Intelligence) & ASM (Attack Surface Management) Analyst Environment / Context Saint Gobain, world leader in the habitat and construction market, is one of the top 100 global industrial groups. Saint-Gobain is present in 68 countries with 171 000 employees. They design, manufacture and distribute materials and solutions which are key ingredients in the wellbeing of each of us and the future of all. They can be found everywhere in our living places and our daily life: in buildings, transportation, infrastructure and in many industrial applications. They provide comfort, performance and safety while addressing the challenges of sustainable construction, resource efficiency and climate change . Saint-Gobain GDI Grou pe (250 persons at the head office, including 120 that are internal) is responsible for defining, setting up and managing the Group's Information Systems (IS) and Telecom policy with its 1,000 subsidiaries in 6,500 sites worldwide. The GDI Groupe also carries the common means (infrastructures, telecoms, digital platforms, cross-functional applications ). IN DEC, the IT Development Centre of Saint-Gobain, is an entity with a vision to leverage India’s technical skills in the Information Technology domain to provide timely, high-quality and cost-effective IT solutions to Saint-Gobain businesses globally. Within the Cybersecurity Department, the Cybersecurity Vulnerability Operations Cen ter mission is to Identify, assess and confirm vulnerability and threats that can affect the Group. The CyberVOC teams are based out of Paris and Mumbai and consist of skilled persons working in different Service Lines . Mission The VOC VI & ASM Analyst will be part of a team responsible for monitoring and identifying vulnerabilities as well as proactively assessing their threat with regards to Saint-Gobain context. The team also provides comprehensive feedback and guidance on detected vulnerabilities to assist Security Officers and Application Manager on the remediationpart. This role takes a holistic approach to identifying newly published vulnerabilities and contextualizing them to Saint-Gobain environment as well as tracking potential external entry points to Saint-Gobain systems anddata. The VOC VI & ASM Analyst is responsible for: Vulnerability Intelligence (VI): Monitor new vulnerabilities and assess their criticality and risk severity based on threat, exploit availability, ease of exploit, impact, …Communicate and publish an assessment on vulnerabilities related to software used in Saint-Gobain's scope Maintain timely, high-quality vulnerability bulletins, prioritizing issues against the Group’s asset exposure Update on a regular basis our software inventory in the scope of Vulnerability Assessment Service Keep the vulnerability database up to date; enrich each CVE and security bulletin with QDS, EPSS, CVSS metrics, … Attack Surface Management (ASM): Operate continuous monitoring of external assets via ASM Security tools Update on a regular basis the coverage of ASM tools, by adding known domains and IP ranges belonging to Saint-Gobain Assess the severity of the findings and confirm their presence (review, challenge, FP assessment, …) Track and report exposure trends; escalate high-risk findings to Blue-Team remediation owners Build and use the external footprint to proactively identify new threats and new vulnerabilities Leverage ASM tools to proactively identify external assets subject to newly published vulnerabilities BlackBox Pentesting: Drive proactive follow-up on detected vulnerabilities, engaging system owners and tracking remediationto closure Active follow up with Application managers to onboard new application in the BlackBox Pentesting service Pentest launch Contract follow-up Tools follow up and maintenance Vulnerability Management:Vulnerability review, recategorization, and false positive identification Proactive vulnerability testingand replayPre-analyze and consolidate vulnerability data from various scanning tools Prepare concise syntheses of available vulnerabilities Offer guidance to the SO and CISO on vulnerabilities Collaborate with key stakeholders to develop strategies for vulnerability management Scripting and automation:Automate data extraction and data push from VI and ASM tools to DataLake tools Build automation workflows to streamline vulnerability identification, assessment, and reporting Collaborate with the offensive and defensive teams to enhance vulnerability assessmentand t esting Skills and Qualifications Bachelor's degree in Computer Science, Information Security, EXTC or related field; relevant certifications (e.g., CISSP, CCSP, CompTIA Security+) are a plusProven experience (6+ years) working within the Cybersecurity field, with emphasis on security platform implementation & administration Experience on Penetration testing actions (web application, infrastructure, …) Experience with security scanning tools Experience with VI and ASM tools Experience in investigating newly published vulnerabilities and assessing their risks and severity Experience with scripting languages (e.g., Python, Bash, Powershell, C#, …) for automation and customization of security processes is a plus Experience with Pentester tools (Burp, SQLmap, Metasploit, Kali environment, …) Strong technical skills with an interest in open-source intelligence investigations Knowledge of NIST CVE database, OWASP Top 10, Microsoft security bulletins Excellent writing skills in English and ability to communicate complicate technical challenges in a business language to a range ofstakeholders. Personal Skills Has a systematic, disciplined, and analytical approach to problem solving with Thorough leadership skills & experience Excellent ability to think critically under pressure Strong communication skills to convey technical concepts clearly to both technical and non-technical stakeholders Willingness to stay updated with evolving cyber threats, technologies, and industry trends Capacity to work collaboratively with cross-functional teams, developers, and management to implement robust security measures Additional Information The position is based in Mumbai (India)
Posted 1 day ago
2.0 years
6 Lacs
Thiruvananthapuram
On-site
2 - 3 Years 1 Opening Trivandrum Role description Overview: We are looking for a skilled SIEM Administrator to manage and maintain Security Information and Event Management (SIEM) solutions such as Innspark , LogRhythm , or similar tools. This role is critical to ensuring effective security monitoring, log management, and event analysis across our systems. Key Responsibilities: Design, deploy, and manage SIEM tools (e.g., Innspark, LogRhythm, Splunk). Develop and maintain correlation rules, s, dashboards, and reports. Integrate logs from servers, network devices, cloud services, and applications. Troubleshoot log collection, parsing, normalization, and event correlation issues. Work with security teams to improve detection and response capabilities. Ensure SIEM configurations align with compliance and audit requirements. Perform routine SIEM maintenance (e.g., patching, upgrades, health checks). Create and maintain documentation for implementation, architecture, and operations. Participate in evaluating and testing new SIEM tools and features. Support incident response by providing relevant event data and insights. Required Qualifications: Bachelor’s degree in Computer Science, Information Security, or related field. 3+ years of hands-on experience with SIEM tools. Experience with Innspark, LogRhythm, or other SIEM platforms (e.g., Splunk, QRadar, ArcSight). Strong knowledge of log management and event normalization. Good understanding of cybersecurity concepts and incident response. Familiarity with Windows/Linux OS and network protocols. Scripting knowledge (e.g., Python, PowerShell) is a plus. Strong troubleshooting, analytical, and communication skills. Industry certifications (CEH, Security+, SSCP, or vendor-specific) are a plus. Key Skills: SIEM Tools (Innspark, LogRhythm, Splunk) Troubleshooting Log Management & Analysis Scripting (optional) Security Monitoring Skills Siem,Splunk,Troubleshooting Skills Siem,Splunk,Troubleshooting About UST UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to operation. With deep domain expertise and a future-proof philosophy, UST embeds innovation and agility into their clients’ organizations. With over 30,000 employees in 30 countries, UST builds for boundless impact—touching billions of lives in the process.
Posted 1 day ago
3.0 years
0 Lacs
Bengaluru
Remote
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Staff (CTM – Threat Detection & Response) KEY Capabilities: Experience in working with Splunk Enterprise, Splunk Enterprise Security & Splunk UEBA Minimum of Splunk Power User Certification Good knowledge in programming or Scripting languages such as Python (preferred), JavaScript (preferred), Bash, PowerShell, Bash, etc. Assist in remote and on-site gap assessment of the SIEM solution. Work on defined evaluation criteria & approach based on the Client requirement & scope factoring industry best practices & regulations Assist in interview with stakeholders, review documents (SOPs, Architecture diagrams etc.) Asist in evaluating SIEM based on the defined criteria and prepare audit reports Good experience in providing consulting to customers during the testing, evaluation, pilot, production and training phases to ensure a successful deployment. Experience in onboarding data into Splunk from various sources including unsupported (in-house built) by creating custom parsers Verification of data of log sources in the SIEM, following the Common Information Model (CIM) Experience in parsing and masking of data prior to ingestion in SIEM Provide support for the data collection, processing, analysis and operational reporting systems including planning, installation, configuration, testing, troubleshooting and problem resolution Assist clients to fully optimize the SIEM system capabilities as well as the audit and logging features of the event log sources Assist client with technical guidance to configure their log sources (in-scope) to be integrated to the SIEM Experience in SIEM content development which includes : Hands-on experience in development and customization of Splunk Apps & Add-Ons Builds advanced visualizations (Interactive Drilldown, Glass tables etc.) Build and integrate contextual data into notable events Experience in creating use cases under Cyber kill chain and MITRE attack framework Capability in developing advanced dashboards (with CSS, JavaScript, HTML, XML) and reports that can provide near real time visibility into the performance of client applications. Sound knowledge in configuration of Alerts and Reports. Good exposure in automatic lookup, data models and creating complex SPL queries. Create, modify and tune the SIEM rules to adjust the specifications of alerts and incidents to meet client requirement Experience in creating custom commands, custom alert action, adaptive response actions etc. Qualification & experience: Minimum of 3 years’ experience in Splunk and 3 to 5 years of overall experience with knowledge in Operating System and basic network technologies Experience in SOC as L1/L2 Analyst will be an added advantage Strong oral, written and listening skills are an essential component to effective consulting. Good to have knowledge of Vulnerability Management, Windows Domains, trusts, GPOs, server roles, Windows security policies, user administration, Linux security and troubleshooting Certification in any other SIEM Solution such as IBM QRadar, Exabeam, Securonix will be an added advantage Certifications in a core security related discipline (CEH, Security+, etc.) will be an added advantage. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Posted 1 day ago
7.0 years
0 Lacs
New Delhi, Delhi, India
On-site
Job Title: IT Security Engineer – Contractual (3+ / 5+ / 7+ Years Experience) Compensation: (6-10Lakh/10-15Lakh/12-18Lakh respectively) Location: New Delhi Type: Contractual [ 2 months contract] Openings: Multiple Domain Focus: Network Infrastructure Security, ISO 27019 Compliance Email: hr@pivotsec.in Note: This is an urgent contractual opening. Immediate joiners will be prioritized. Job Summary: P.I.V.O.T Security is seeking skilled IT Security Engineers for contractual roles with a primary focus on network architecture and infrastructure security reviews, covering routers, switches, firewalls, CCTV networks, and related devices. These roles are part of critical infrastructure security compliance assessments in alignment with ISO 27019 standards. Responsibilities (based on experience level): Review the entire network architecture, including: • Core and access routers & switches • Perimeter and internal firewalls • CCTV and physical security network components • Wireless network segmentation and NAC implementations • Conduct firewall audits, rulebase validations, and segmentation testing • Evaluate security configurations for IoT and surveillance systems (e.g., CCTV NVR/DVR) • Lead or support Vulnerability Assessment and Penetration Testing (VA/PT) of infrastructure • Identify gaps in network design, access control, and compliance with ISO 27019 • Document security weaknesses, propose remediations, and engage with client infra teams • Prepare technical documentation, risk reports, and mitigation strategies Skills & Tools: Assessment Tools: Nmap, Nessus, Burp Suite, Metasploit (based on role level) Device Knowledge: Cisco, Fortinet, Palo Alto, Juniper, Hikvision, Dahua, etc. Review Focus: Routing protocols, VLANs, ACLs, VPNs, NAT policies, CCTV network isolation Scripting (Senior roles): PowerShell, Bash, Python Understanding of critical infrastructure protection and ISO/IEC 27019 Certifications (Preferred): CEH, CompTIA Security+ (3–5 YOE) OSCP, CEH, or equivalent (5–7+ YOE) Candidate Requirements: 3 to 7+ years of experience in IT/network security, architecture assessment Strong knowledge of infrastructure hardening and secure configuration practices Ability to review, assess, and advise on physical and logical security architecture Effective communication and client interaction skills Capable of independently preparing architecture review reports To apply, email your updated resume to hr@pivotsec.in Use the subject line: "IT Security – [Years] YOE" (e.g. "IT Security – 5 YOE")
Posted 1 day ago
3.0 years
0 Lacs
Trivandrum, Kerala, India
On-site
Overview: Role description We are looking for a skilled SIEM Administrator to manage and maintain Security Information and Event Management (SIEM) solutions such as Innspark , LogRhythm , or similar tools. This role is critical to ensuring effective security monitoring, log management, and event analysis across our systems. Key Responsibilities: Design, deploy, and manage SIEM tools (e.g., Innspark, LogRhythm, Splunk). Develop and maintain correlation rules, s, dashboards, and reports. Integrate logs from servers, network devices, cloud services, and applications. Troubleshoot log collection, parsing, normalization, and event correlation issues. Work with security teams to improve detection and response capabilities. Ensure SIEM configurations align with compliance and audit requirements. Perform routine SIEM maintenance (e.g., patching, upgrades, health checks). Create and maintain documentation for implementation, architecture, and operations. Participate in evaluating and testing new SIEM tools and features. Support incident response by providing relevant event data and insights. Required Qualifications: Bachelor’s degree in Computer Science, Information Security, or related field. 3+ years of hands-on experience with SIEM tools. Experience with Innspark, LogRhythm, or other SIEM platforms (e.g., Splunk, QRadar, ArcSight). Strong knowledge of log management and event normalization. Good understanding of cybersecurity concepts and incident response. Familiarity with Windows/Linux OS and network protocols. Scripting knowledge (e.g., Python, PowerShell) is a plus. Strong troubleshooting, analytical, and communication skills. Industry certifications (CEH, Security+, SSCP, or vendor-specific) are a plus. Key Skills: SIEM Tools (Innspark, LogRhythm, Splunk) Troubleshooting Log Management & Analysis Scripting (optional) Security Monitoring Skills Siem,Splunk,Troubleshooting Skills Siem,Splunk,Troubleshooting
Posted 2 days ago
5.0 years
0 Lacs
India
On-site
Location: Fort Gillem, Forest Park, GA Required Clearance: TS/SCI with Polygraph Certifications: DoD 8140 IAT Level II certification (e.g., CompTIA Security+ CE, CCNA Security, CySA+). Required Education: Associate’s degree in IT, Computer Science, or related discipline preferred. Required Experience: Minimum of 5 years of experience in classified IT services and networking Position Description PingWind is seeking a Systems Administrator to provide day-to-day operational support for Army IT systems under a mission-critical DoD contract. The candidate will be responsible for system configuration, maintenance, user support, patching, and compliance activities in accordance with Army and DoD Information Assurance (IA) standards. Primary Responsibilities Typical Responsibilities/Tasks: Install, configure, and maintain Windows and/or Linux servers and workstations. Perform daily system monitoring, verify system availability and integrity, and review system logs for issues. Apply DISA STIGs and Security Technical Implementation Guidelines to harden systems. Implement IAVA patches and ensure compliance with cybersecurity directives. Create and manage user accounts, groups, and permissions using Active Directory (AD), Group Policy, and Role-Based Access Control (RBAC). Support user account provisioning/de-provisioning, system login issues, and file permissions. Monitor system performance, conduct root-cause analysis, and tune systems for efficiency. Maintain backup systems and disaster recovery procedures. Support Risk Management Framework (RMF) efforts, vulnerability scans, and POA&M remediation tasks. Assist with audit readiness, IA controls, and security incident response. Collaborate with cybersecurity personnel on system hardening and event analysis. Maintain technical documentation, SOPs, change logs, and configuration baselines. Provide Tier I/II support for help desk tickets, resolving hardware, software, and networking issues. Required Qualifications Minimum of 5 years of experience in classified IT services and networking DoD 8140 IAT Level II certification (e.g., CompTIA Security+ CE, CCNA Security, CySA+). Desired Qualifications Bachelor’s Degree Prior experience supporting an Army tactical or enterprise IT environment (NETCOM, PEO EIS, Army Futures Command, etc.). Familiarity with Army-specific systems such as GCSS-Army, Army Enterprise Email, or SIPR/NIPR networks. Experience with DoD RMF processes, DISA STIG compliance, and IAVA/Vulnerability Management. About PingWind PingWind is focused on delivering outstanding services to the federal government. We have extensive experience in the fields of cyber security, development, IT infrastructure, supply chain management and other professional services such as system design and continuous improvement. PingWind is a VA CVE certified Service-Disabled Veteran Owned Small Business (SDVOSB) and SBA HUBZone Certified with offices in Washington DC and Northern Virginia. www.PingWind.com Our benefits include: Paid Federal Holidays Robust Health & Dental Insurance Options 401k with matching Paid vacation and sick leave Continuing education assistance Short Term / Long Term Disability & Life Insurance Employee Assistance Program through Sun Life Financial EAP Guidance Resources Veterans are encouraged to apply PingWind, Inc. does not discriminate in employment opportunities, terms and conditions of employment, or practices on the basis of race, age, gender, religious or political beliefs, national origin or heritage, disability, sexual orientation, or any characteristic protected by law
Posted 2 days ago
6.0 years
0 Lacs
Noida
On-site
Job Information Date Opened 07/25/2025 Job Location Noida Job Type Full time Industry IT Services Work Experience 6-10 years City Noida State/Province Uttar Pradesh Country India Zip/Postal Code 201305 About Us We are an IT Consulting & IT Services company with ISO 9001, 14001, 20001 27001 & Great Place to Work Certified. We at Quadrafort assist our customers in enhancing Productivity and Business efficiency achieved by our best-in-class Cloud Solutions and innovative 360° consulting services. We are a Technology Consulting services provider assisted by a team of certified technologists aided by domain experience & proficiency garnered across industries and business verticals. We endeavor to empower organizations in their digital transformation journey with the least disruption with emphasis on proper adoption, to aid in achieving complex business goals. We work across industries encompassing Manufacturing, Retail, Hi-Tech, IT, BFSI, Healthcare, Automobile and Media. Industry - IT Services and IT Consulting Job Description We are seeking a dynamic and technically proficient Cybersecurity Analyst to support our presales and delivery teams. This hybrid role combines solution architecture, technical consulting, and hands-on implementation. The ideal candidate will have a strong foundation in enterprise cybersecurity and critical IT infrastructure, with the ability to engage directly with customers, design tailored solutions and ensure successful project execution. Key Responsibilities: Collaborate with the presales team to scope, size, and define cybersecurity solutions aligned with customer requirements. Develop and present compelling technical proposals, solution architectures, and proof-of-concept demonstrations. Translate business needs into technical requirements and articulate solution value to both technical and non-technical stakeholders. Design end-to-end cybersecurity architectures for enterprise environments, including on-prem, cloud, and hybrid models. Lead or support the deployment, configuration, and integration of cybersecurity technologies. Ensure timely and high-quality delivery of projects, adhering to best practices and compliance standards. Act as a trusted advisor during customer interactions, including discovery sessions, workshops, and technical deep-dives. Address complex technical queries and provide expert guidance on cybersecurity strategies, tools, and frameworks. Maintain strong relationships with key stakeholders to ensure customer satisfaction and solution adoption. Maintain hands-on expertise in cybersecurity domains such as network security, endpoint protection, identity and access management, SIEM/SOAR, and cloud security. Stay abreast of emerging threats, technologies, and regulatory changes to enhance solution offerings continuously. Contribute to internal knowledge sharing, solution accelerators, and reusable assets. Requirements 5+ Years of experience in cybersecurity solution design, implementation, or consulting. Proven experience with enterprise-grade cybersecurity. Strong understanding of IT infrastructure components including networking, virtualization, and cloud platforms. Demonstrated ability to lead technical engagements and deliver complex solutions. Excellent presentation, communication, and stakeholder management skills. Ability to align technical solutions with business outcomes and articulate Cyber Security’s value proposition effectively. Strong problem-solving, strategic thinking, and analytical skills. Bachelor’s/Master’s degree in Computer Science, Engineering, or related field. Industry certifications such as CISSP, CISM, CEH, CompTIA Security+, or equivalent.
Posted 2 days ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Security+ is a highly sought-after certification in the IT industry, especially in the field of cybersecurity. In India, the demand for security+ professionals is on the rise as companies focus on enhancing their security measures to protect sensitive data and prevent cyber attacks. Job seekers with security+ certification have a competitive edge in the job market and can explore various opportunities in this field.
These cities are known for their thriving IT industries and offer numerous job opportunities for security+ professionals.
The average salary range for security+ professionals in India varies based on experience and expertise. Entry-level positions may offer salaries ranging from INR 3-5 lakhs per annum, while experienced professionals can earn upwards of INR 10-15 lakhs per annum.
A typical career progression in the security+ field may include roles such as: - Junior Security Analyst - Security Consultant - Security Architect - Chief Information Security Officer
As professionals gain experience and expertise, they can move up the career ladder and take on more challenging and rewarding roles.
In addition to security+, professionals in this field are often expected to have skills in: - Network Security - Information Security Management - Penetration Testing - Risk Assessment - Incident Response
Having a combination of these skills can enhance job prospects and open up more opportunities in the cybersecurity domain.
As you explore job opportunities in the security+ domain in India, remember to showcase your skills, knowledge, and experience confidently during interviews. Prepare well, stay updated with the latest trends in cybersecurity, and showcase your passion for securing digital assets. With dedication and perseverance, you can build a successful career in the dynamic field of cybersecurity. Good luck with your job search!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
32455 Jobs | Dublin
Wipro
16590 Jobs | Bengaluru
EY
11025 Jobs | London
Accenture in India
10991 Jobs | Dublin 2
Amazon
8878 Jobs | Seattle,WA
Uplers
8715 Jobs | Ahmedabad
IBM
8204 Jobs | Armonk
Oracle
7750 Jobs | Redwood City
Capgemini
6181 Jobs | Paris,France
Muthoot FinCorp (MFL)
6170 Jobs | New Delhi