Jobs
Interviews

1069 Security+ Jobs - Page 10

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

6.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Role Overview The IT Lead will be responsible for leading the company’s technology infrastructure, IT operations, and system administration. The role includes ensuring secure, scalable, and reliable IT systems, supporting internal teams, managing vendors, and aligning IT strategy with business needs — especially in a fast-paced, data-driven product environment. Key Responsibilities 1. IT Infrastructure & Operations Manage and maintain office IT infrastructure (networks, firewalls, VPNs, etc.) Ensure uptime and reliability of systems, devices, and network Maintain inventory and lifecycle of laptops, desktops, software licenses Oversee IT support and troubleshooting for internal teams (hardware/software/network issues) 2. Cybersecurity & Compliance Implement cybersecurity protocols and data protection policies Manage identity access, endpoint protection, backups, and incident response Ensure compliance with GDPR, SOC 2 3. Business Applications & Tooling Administer internal platforms: email (O365), Slack, Teams, Jira, GitHub, etc. Support onboarding and offboarding automation (access provisioning/deprovisioning) Evaluate and implement new tools to enhance productivity and security 4. Vendor Management Manage relationships with IT vendors, ISPs, cloud service providers, etc. Negotiate contracts and track service performance 5. Planning Own IT budgets, roadmap, and capacity planning Work closely with Data Engineering, Consulting, Product, HR, and Engineering teams to enable seamless operations Qualifications & Skills Must-Have Bachelor’s degree in IT, Computer Science, or related field 6+ years of experience in IT infrastructure and support roles Hands-on expertise in networking, system administration (Windows/Mac/Linux), and cloud (AWS, GCP, or Azure) Familiarity with endpoint security and IT compliance frameworks Strong troubleshooting skills and ability to respond to incidents promptly Good-to-Have Experience in a product/startup environment Certifications: CCNA, CompTIA Security+, AWS Certified SysOps Admin (preferred) Soft Skills Problem-solving mindset with strong ownership Excellent communication and documentation skills Ability to work independently and manage competing priorities Stakeholder management – ability to interact with leadership and cross-functional teams

Posted 2 weeks ago

Apply

4.0 - 7.0 years

5 - 13 Lacs

Bengaluru

Hybrid

Hiring TPRM (third party risk management) risk assessment In a world of growing cyber threats and regulatory demands, role of a TPRM Analyst has never been more vital We are seeking Governance, Risk, and Compliance (GRC) to implement robust frameworks that integrate risk management, compliance, and governance processes into our business strategy. Experience - 4 -7Years Location - Bengaluru Work Mode - Hybrid Certifications: ISO 27001 LA/LI, ISC2 CC, Security+, CTPRP, CTPRA, CISA, CISM, CRISC, CISSP (any one is preferable ) Information Security Governance, Compliance and Security Assessment, experience, with a focus on IT and IS Risk Assessments and program reviews / establishment. Familiarity with and demonstrated experience assessing against the BS ISO/IEC/SIG 27002:2005 BS 7799 standard domains, BS 25999 including Risk Assessment; Security policy; Organization of Information Security; Asset Management; HR Security; Physical and Environmental Security; Communications and Operations Management; Access Control; IS Acquisition, Development and Maintenance; IS Incident Management; Business Continuity Management; and Compliance. Broad understanding of Information Security trends, services and disciplines and experience applying them in dynamic environments. Were ready to fast-track your application if youre available to start! Think youre a perfect fit? Drop your resume bhumika.soni@weareams.com or Share this with someone you know who fits the bill.

Posted 2 weeks ago

Apply

15.0 - 20.0 years

13 - 17 Lacs

Gurugram

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an L1 SOC Analyst you are the first line of defense in monitoring and triaging security alerts. You will work primarily with Sumo Logic SIEM and SOAR tools to identify potential security incidents, validate alerts, and escalate them according to the defined SOPs. You will ensure real-time visibility and log health while flagging suspicious activity promptly. This role is essential to ensuring timely detection and reducing noise from false positives Roles & Responsibilities:--Basic Security Knowledge:Understanding of key concepts (malware, phishing, brute force, etc.-SIEM Familiarity:Exposure to Sumo Logic UI and understanding how to read/query logs-Exposure to CrowdStrike Falcon Console:Ability to view and interpret endpoint alerts-Alert Triage:Ability to differentiate between false positives and real threats-Communication Skills: Clear written documentation and verbal escalation-Ticketing Systems:Familiarity with platforms like JIRA, ServiceNow, or similar-Basic understanding of cybersecurity fundamentals-Basic Scripting:Awareness of PowerShell or Python for log parsing-SOAR Exposure:Familiarity with automated triage workflows-Security Certifications:Security+, Microsoft SC-900, or similar certification-Operating System Basics:Windows and Linux process and file system awareness Professional & Technical Skills: -Monitor real-time alerts and dashboards in Sumo Logic SIEM-Perform initial triage on alerts and determine severity/priority-Escalate validated security incidents to L2 analysts per defined SOPs-Follow pre-defined SOAR playbooks to document or assist in response-Ensure alert enrichment fields are populated like host info, user details, etc.-Conduct basic log searches to support alert analysis-Perform daily health checks on log sources and ingestion pipelines-Maintain accurate ticket documentation for each alert handled-Participate in shift handovers and team sync-ups for awareness-SIEM:Basic log searching, correlation rule awareness-SOAR:Familiarity with playbook execution-Security Concepts:Basic understanding of malware, phishing, brute force-Tools:CrowdStrike EDR, Sumo Logic Additional Information:- The candidate should have minimum 2 years of experience in Security Information and Event Management (SIEM) Operations.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

2.0 years

4 - 4 Lacs

India

On-site

Job Title: L2 Engineer – Security Operations Center (SOC ) Company Name : Amyntor Infosec Private Limited Location: Trivandrum Department: Cyber Security Experience: 2-4 Years About Us: Amyntor Infosec is a leading provider of IT infrastructure and cybersecurity solutions, specializing in delivering high-impact projects to organizations across industries.We are seeking a dynamic and detail-oriented Level 2 SOC Analyst to join our cybersecurity operations team. This role is critical in strengthening our threat detection and incident response capabilities. The ideal candidate will be responsible for conducting in-depth analysis of security events, escalating sophisticated threats, and contributing to the creation and optimization of security playbooks. If you are passionate about defending digital infrastructure, possess strong analytical skills, and are eager to be part of a collaborative and fast-paced environment, we invite you to be a key player in our mission to proactively safeguard our clients and operations. About the Role: We are seeking a skilled and proactive L2 SOC Engineer to strengthen our cybersecurity operations team. The role demands technical excellence across incident management , security control implementation , and playbook development , with opportunities for direct client engagement during presales and project execution phases. We offer a dynamic environment with performance-linked incentives , overtime payments , and opportunities for career advancement. Key Responsibilities: Act as the Level 2 escalation point for security events across SIEM, EDR, IDS/IPS, and Firewall ecosystems. Lead or support the end-to-end implementation of SOC environments , including platform setup (SIEM, SOAR, log onboarding), use-case development, integration of security tools, and operational runbook creation. Implement security controls — technical, administrative, and operational — as per client risk profiles and project requirements. Collaborate internally with presales teams by providing technical inputs during solution design and client proposal stages. Develop, document, and maintain incident response playbooks and standard operating procedures (SOPs). Investigate escalated incidents, perform root cause analysis, and coordinate remediation actions. Continuously tune detection rules, optimize use-cases, and enhance threat detection strategies. Mentor and guide L1 SOC Analysts, fostering a culture of continuous learning and operational excellence. Proactively recommend improvements in client security posture based on real-time threat intelligence and gap assessments. Required Skills and Experience: Bachelor's Degree in Computer Science, Information Technology, Cybersecurity, or a related field. 2–4 years of hands-on experience in a SOC environment. Strong working knowledge of security platforms such as Wazuh , Splunk, QRadar, LogRhythm, or other SIEMs. Expertise in implementation of cybersecurity controls across technical, administrative, and operational domains. Good understanding of security standards, including MITRE ATT&CK, NIST Cybersecurity Framework, and ISO 27001. Ability to develop structured, actionable playbooks and process documentation. Strong problem-solving skills, analytical thinking, and an ability to perform under pressure. Relevant certifications (CEH, CompTIA Security+, CySA+, or equivalent) are preferred. Preferred Skills: Prior client-facing experience — in presales engagements, project implementations, or cybersecurity consulting — will be considered an added advantage. Experience in tuning SIEM use cases and detection logic for optimized threat detection. Strong communication skills to effectively convey technical findings to diverse audiences. Passion for security innovation, threat hunting, and continuous process improvements. Compensation and Benefits: Competitive Base Salary benchmarked to the cybersecurity market. Performance-Based Incentive Mechanisms linked to client satisfaction and incident response efficiency. Overtime Payment for work performed beyond standard hours. Paid cybersecurity certifications and specialized learning programs. Career advancement pathways into Threat Intelligence, Forensics, Security Architecture, and other specialized roles. Dynamic, innovation-driven work environment with exposure to leading-edge cybersecurity tools and practices. Why Join Us? Deliver mission-critical security services that protect and empower client organizations. Gain exposure across multiple industries, technologies, and security challenges. Be part of a results-driven team that values expertise, collaboration, and continuous growth. Note : Kindly read the Job Description fully before applying for this post Job Types: Full-time, Permanent Pay: ₹35,000.00 - ₹40,000.00 per month Benefits: Cell phone reimbursement Commuter assistance Schedule: Day shift Fixed shift Morning shift Supplemental Pay: Overtime pay Performance bonus Ability to commute/relocate: Technopark, Thiruvananthapuram, Kerala: Reliably commute or planning to relocate before starting work (Required) Education: Bachelor's (Required) Experience: Cybersecurity: 2 years (Required) SoC: 1 year (Required) Willingness to travel: 50% (Preferred) Work Location: In person

Posted 2 weeks ago

Apply

0.0 years

1 - 2 Lacs

Mohali

On-site

Job Title: GRC Intern (Governance, Risk & Compliance) Location: Mohali, Punjab (On-site) Job Type: Internship / Full-time (Based on performance) Experience: 0–1 Year Duration: 6 months (with possibility of extension or full-time offer) About Us: We are a cybersecurity solutions company providing cutting-edge services in compliance, data protection, and risk management. Join our dynamic team and kickstart your career in the fast-growing domain of GRC. Job Description: We are seeking a motivated and detail-oriented GRC Intern to support our Governance, Risk, and Compliance team. The ideal candidate is eager to learn and contribute to real-world compliance and risk projects. Key Responsibilities: Assist in developing and implementing policies, procedures, and documentation for risk and compliance programs. Support internal audits, risk assessments, and control testing. Help monitor compliance with industry regulations such as ISO 27001, SOC 2, GDPR, etc. Maintain documentation and evidence for ongoing audits and certifications. Research regulatory changes and assist in updating compliance frameworks. Collaborate with internal teams to ensure adherence to cybersecurity best practices. Requirements: Bachelor’s degree (B.Com, BBA, BCA, or related field) or pursuing final year. Basic understanding of compliance standards like ISO 27001, SOC 2, or GDPR is a plus. Strong written and verbal communication skills. Proficient in Microsoft Excel, Word, and PowerPoint. Attention to detail and ability to manage multiple tasks. Preferred Qualifications: Internship or coursework related to GRC, cybersecurity, or IT audits. Certifications (optional): ISO 27001 Foundation, CompTIA Security+, or similar. Job Types: Full-time, Permanent Pay: ₹13,500.00 - ₹18,000.00 per month Schedule: Night shift Ability to commute/relocate: Mohali, Punjab: Reliably commute or planning to relocate before starting work (Required) Location: Mohali, Punjab (Required) Shift availability: Night Shift (Required) Work Location: In person

Posted 2 weeks ago

Apply

1.0 years

1 - 3 Lacs

Noida

On-site

Job Title: Cyber Security Analyst Location: Noida Sec 63 Job Type: Full Time Shift: Day Experience Required: 6Months-1 years Salary: As per industry standards Job Summary: We are seeking a skilled and proactive Cyber Security Analyst to join our team and help protect our organization’s digital infrastructure. The ideal candidate will monitor systems, assess potential threats, and respond to incidents to maintain a secure IT environment. Key Responsibilities: Monitor security tools and dashboards to detect and respond to threats in real time Analyze security incidents and perform root cause analysis Conduct vulnerability assessments and risk analysis on networks, systems, and applications Implement and maintain security measures including firewalls, antivirus, and intrusion detection systems (IDS/IPS) Manage security audits and compliance reviews Develop and enforce security policies and procedures Stay up to date with the latest cybersecurity trends, threats, and technology Assist in disaster recovery and business continuity planning Collaborate with IT and development teams to ensure best practices in system security Required Skills & Qualifications: Bachelor's degree in Cyber Security, Computer Science, IT, or a related field Proven experience as a Cyber Security Analyst or similar role Strong understanding of network protocols, firewalls, and threat landscapes Experience with SIEM tools, endpoint protection, and vulnerability scanners Knowledge of data privacy regulations (e.g., GDPR, ISO 27001, etc.) Excellent analytical, problem-solving, and communication skills Relevant certifications preferred (e.g., CEH, CompTIA Security+, CISSP, etc.) Preferred Attributes: Critical thinker with attention to detail Proactive attitude towards continuous learning Strong team player with the ability to work under pressure Comfortable working in [mention if night shifts or rotational shifts are required Please share resume at ankita.saxena@rcvtechnologies.com Job Type: Full-time Pay: ₹15,000.00 - ₹25,000.00 per month Benefits: Commuter assistance Health insurance Leave encashment Life insurance Provident Fund Work Location: In person

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Pune, Maharashtra, India

Remote

ZS is a place where passion changes lives. As a management consulting and technology firm focused on improving life and how we live it, our most valuable asset is our people. Here you’ll work side-by-side with a powerful collective of thinkers and experts shaping life-changing solutions for patients, caregivers and consumers, worldwide. ZSers drive impact by bringing a client first mentality to each and every engagement. We partner collaboratively with our clients to develop custom solutions and technology products that create value and deliver company results across critical areas of their business. Bring your curiosity for learning; bold ideas; courage and passion to drive life-changing impact to ZS. Our most valuable asset is our people . At ZS we honor the visible and invisible elements of our identities, personal experiences and belief systems—the ones that comprise us as individuals, shape who we are and make us unique. We believe your personal interests, identities, and desire to learn are part of your success here. Learn more about our diversity, equity, and inclusion efforts and the networks ZS supports to assist our ZSers in cultivating community spaces, obtaining the resources they need to thrive, and sharing the messages they are passionate about. Security Operations Analyst We are seeking an experienced professional to join our Pune, India office as a Security Operations Analyst with a strong background in Security Information and Event Management (SIEM) platforms, specifically in Microsoft Sentinel and Wiz. The ideal candidate will be responsible for leading advanced threat detection, response, and monitoring activities. This role will be critical in enhancing our cybersecurity posture and ensuring the ZS environment remains secure against emerging threats. What you’ll do: Monitor Microsoft Sentinel for security alerts and events on a 24x7 basis Perform initial triage and analysis of security events, including prioritization and escalation based on defined incident response procedures Identify potential security incidents, false positives, and provide recommendations for mitigation or escalation to L2 SOC analysts Leverage KQL queries for investigations Document incidents, investigation results, and actions taken in the ticketing system Follow established SOC processes and playbooks for effective incident response Support continuous improvement by identifying gaps in monitoring and detection Monitoring of other security tools such EDR - CrowdStrike, AWS Security Alerts for level 1 analysis based on the defined playbooks Flexible in following updated playbooks as the security landscape changes Candidates must be flexible and willing to work varying 24*7 shifts to ensure consistent coverage What you’ll bring: Strong analytical and problem-solving abilities Excellent communication and interpersonal skills to effectively collaborate with cross-functional teams Proven ability to remain calm and efficient under a high-pressure environment Proficient in using SIEM tools, such as Microsoft Sentinel Experience in Cloud Security Operations and Incident Response platforms such as Wiz In-depth understanding of cyber threats, vulnerabilities, and attack vectors Knowledge in creating KQL queries and custom alerts within Microsoft Sentinel Exposure in incident response and management procedures Experienced in conducting L1 investigations and root cause analysis for incidents Adept at collaborating with stakeholders to resolve complex cybersecurity challenges Knowledge of major cloud platforms (AWS, Azure, GCP), including their security models, IAM roles, virtual private cloud (VPC) configurations, and cloud-native security tools Good to have skills and abilities: Excellent interpersonal (self-motivational, organizational, personal project management) skills Knowledge of vulnerability management and scanning best practices such as CVE database and the CVS System Ability to analyze cyber threats to develop actionable intelligence Flexibility to adapt to changing priorities and shifts Academic Qualifications: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent experience) 2+ years of experience in a Security Operations Center (SOC) environment, with a focus on SIEM management Hands-on experience with Microsoft Sentinel, including data connectors, KQL queries, analytics rules, and workbooks Exposure in incident response, threat detection, and security monitoring Solid understanding of Windows, Linux, and cloud security concepts Relevant certifications (e.g., CompTIA Security+, Microsoft Certified: Security Operations Analyst, GCIA, GCIH, OSDA, GCFA) are preferred Preferred Security Cloud Certifications: AWS Security Specialty Perks & Benefits: ZS offers a comprehensive total rewards package including health and well-being, financial planning, annual leave, personal growth and professional development. Our robust skills development programs, multiple career progression options and internal mobility paths and collaborative culture empowers you to thrive as an individual and global team member. We are committed to giving our employees a flexible and connected way of working. A flexible and connected ZS allows us to combine work from home and on-site presence at clients/ZS offices for the majority of our week. The magic of ZS culture and innovation thrives in both planned and spontaneous face-to-face connections. Travel: Travel is a requirement at ZS for client facing ZSers; business needs of your project and client are the priority. While some projects may be local, all client-facing ZSers should be prepared to travel as needed. Travel provides opportunities to strengthen client relationships, gain diverse experiences, and enhance professional growth by working in different environments and cultures. Considering applying? At ZS, we're building a diverse and inclusive company where people bring their passions to inspire life-changing impact and deliver better outcomes for all. We are most interested in finding the best candidate for the job and recognize the value that candidates with all backgrounds, including non-traditional ones, bring. If you are interested in joining us, we encourage you to apply even if you don't meet 100% of the requirements listed above. ZS is an equal opportunity employer and is committed to providing equal employment and advancement opportunities without regard to any class protected by applicable law. To Complete Your Application: Candidates must possess or be able to obtain work authorization for their intended country of employment.An on-line application, including a full set of transcripts (official or unofficial), is required to be considered. NO AGENCY CALLS, PLEASE. Find Out More At: www.zs.com

Posted 2 weeks ago

Apply

1.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Job Role- Cybersecurity Analyst / Ethical Hacker Job Type- Full-time Work mode-Onsite Location- Mumbai Job Summary: We are looking for a skilled Cybersecurity Analyst with a strong foundation in ethical hacking and information security. The ideal candidate should have hands-on experience in vulnerability assessments, penetration testing, and a good understanding of cybersecurity compliance standards. Key Responsibilities:  Perform vulnerability assessments and penetration testing (VAPT) on networks and applications using tools in Kali Linux.  Identify, assess, and mitigate cybersecurity threats across various IT systems.  Ensure compliance with security standards such as ISO 27001, SOC 2, and GDPR.  Work with various server environments including Windows, Linux, Web, Email, Proxy, Database servers, Cloud platforms, VPS, and Docker.  Investigate and recommend mitigation strategies for common cybersecurity threats.  Utilize firewalls and security tools to enhance infrastructure security.  Assist in maintaining and updating security protocols and documentation.  Collaborate with cross-functional teams on security best practices and awareness. Required Qualifications:  Specialization course or certification in Ethical Hacking or Cybersecurity (e.g., CEH, CompTIA Security+, etc.).  Understanding of information security compliance standards (ISO 27001, SOC 2, GDPR).  Basic knowledge of various server types used in IT environments.  Practical experience using Kali Linux for VAPT, network, and application security testing (minimum 1 year).  Familiarity with firewalls and their configuration.  Knowledge of common cybersecurity threats and their mitigation.  Basic understanding of JavaScript (preferred but not mandatory). Preferred Skills:  Strong analytical and problem-solving skills.  Good communication and teamwork abilities.  Adaptability and eagerness to stay updated with evolving cyber threats.

Posted 2 weeks ago

Apply

0 years

0 Lacs

Indore, Madhya Pradesh, India

On-site

Company Description Sofmen Technologies Pvt. Ltd. is your technology ally, offering comprehensive software engineering solutions to ensure seamless application and business function integration. Our diverse team of specialists collaborates using agile development and the Scrum process to deliver high-quality projects rapidly and efficiently. From custom CRM solutions to HIPAA-compliant healthcare systems, we leverage a wide range of technologies, frameworks, and platforms to provide optimal user experiences across various industries. Located in Indore, Sofmen is dedicated to creating great products that work perfectly for every user. Role Description This is a full-time, on-site role located in Indore for a System Administrator. The System Administrator will be responsible for managing and maintaining the organization's IT infrastructure, troubleshooting technical issues, providing technical support, and ensuring network security and performance. The role involves daily monitoring of system performance, implementing security protocols, managing network servers and technology tools, and collaborating with other IT team members to enhance system efficiency and reliability. Qualifications System Administration, Network Administration skills Troubleshooting and Technical Support skills Information Technology skills and knowledge Strong communication and collaboration abilities Experience with various operating systems and platforms Certifications such as CompTIA Network+, CompTIA Security+, or Microsoft Certified Systems Administrator (MCSA) are a plus Bachelor's degree in Information Technology, Computer Science, or a related field

Posted 2 weeks ago

Apply

8.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

About Company: Team1 Consulting is a leading System Integrator specializing in IT infrastructure, software, cyber security, cloud solutions, and generative AI domains. We deliver cutting-edge IT solutions tailored to drive innovation and accelerate business growth. Our expertise empowers organizations across industries to thrive in the digital era with customized, high-impact solutions that ensure success in an ever-evolving landscape. Job Description: CyberArk EPM Engineer (L2/L3 Level) Position Title: CyberArk EPM Resident Engineer – L2/L3 Experience: 3–8 Years Domain: Cyber Security – Endpoint Privilege Management Role Overview: We are seeking a CyberArk Endpoint Privilege Management (EPM) Engineer to provide L2/L3-level support for deployment, policy management, and daily operations of the CyberArk EPM solution. The role focuses on reducing endpoint risk by enforcing least privilege policies while enabling business productivity across a diverse user base. Key Responsibilities: CyberArk EPM Deployment & Configuration Deploy and configure CyberArk EPM agents across enterprise endpoints (Windows/macOS) Integrate EPM with Active Directory, SIEM, and endpoint management tools Develop and implement least privilege policies, application control, and privilege elevation rules Coordinate pilot testing and phased rollout across business units Daily Operations & Support Monitor EPM console for alerts, policy violations, and endpoint health Handle L2/L3 support tickets, incident response, and change requests Maintain and adjust policies based on real-time user behavior and application needs Analyze logs, generate reports, and escalate unresolved technical issues as needed User Engagement & Governance Work with desktop support and IT teams to ensure policy alignment Educate users and resolve policy-related access challenges Ensure compliance with internal security standards and regulatory requirements (e.g., ISO, GDPR) Required Skills & Experience: L2 Level (3–5 Years Experience) Experience with CyberArk EPM implementation and day-to-day administration Hands-on knowledge of policy configuration and troubleshooting Familiarity with Windows operating systems and endpoint behavior L3 Level (5–8 Years Experience) Expertise in designing and deploying complex least privilege policies Strong troubleshooting and scripting skills (PowerShell, VBScript, or similar) Experience in enterprise-wide endpoint protection strategy and analytics Preferred Certifications: CyberArk EPM Certification (or CyberArk Defender for EPM) Additional InfoSec certifications (CompTIA Security+, CISSP, CEH) are a plus

Posted 2 weeks ago

Apply

8.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

About Company: Team1 Consulting is a leading System Integrator specializing in IT infrastructure, software, cyber security, cloud solutions, and generative AI domains. We deliver cutting-edge IT solutions tailored to drive innovation and accelerate business growth. Our expertise empowers organizations across industries to thrive in the digital era with customized, high-impact solutions that ensure success in an ever-evolving landscape. Job Description: CyberArk PAM Resident Engineer (L2/L3 Level) Position Title: CyberArk PAM Resident Engineer – L2/L3 Experience: 3–8 Years Domain: Cyber Security – Identity & Access Management (IAM) Role Overview: We are looking to onboard a skilled CyberArk PAM (Privileged Access Management) Engineer at L2/L3 level to support the end-to-end deployment, configuration, and daily operational management of CyberArk PAM solutions. The engineer will be responsible for maintaining a secure, scalable, and compliant privileged access environment across the organization. Key Responsibilities: CyberArk Deployment & Configuration Implement and configure CyberArk Core components including Vault, PVWA, CPM, PSM, and PTA Integrate CyberArk with Active Directory, SIEM, ITSM, and ticketing systems Onboard privileged accounts and define password and session policies Support upgrades, patch management, and vault hardening Daily Operations & Maintenance Monitor health and performance of CyberArk components Handle L2/L3 incidents, service requests, and change requests Monitor password rotations, policy compliance, and session logs Maintain audit readiness by generating compliance and access reports Security & Governance Enforce least-privilege access practices and role-based policies Identify, investigate, and remediate anomalies or privileged access misuse Collaborate with InfoSec, Infra, and Compliance teams to ensure alignment with organizational policies Required Skills & Experience: L2 Level 3–5 years of hands-on experience in CyberArk administration Strong knowledge of user onboarding, policy enforcement, and basic troubleshooting Experience with CyberArk PVWA, CPM, PSM, PTA, and account provisioning L3 Level 5–8 years of experience in CyberArk architecture and end-to-end deployments Deep understanding of vault design, plugin integration, advanced policy configuration Experience working with scripts (PowerShell, Python), APIs, and advanced troubleshooting Preferred Certifications: CyberArk Defender / Sentry / Certified Delivery Engineer (CDE) Additional certifications like CISSP, CISM, CompTIA Security+ are a plus

Posted 2 weeks ago

Apply

0.0 - 1.0 years

0 - 0 Lacs

Technopark, Thiruvananthapuram, Kerala

On-site

Job Title: L2 Engineer – Security Operations Center (SOC ) Company Name : Amyntor Infosec Private Limited Location: Trivandrum Department: Cyber Security Experience: 2-4 Years About Us: Amyntor Infosec is a leading provider of IT infrastructure and cybersecurity solutions, specializing in delivering high-impact projects to organizations across industries.We are seeking a dynamic and detail-oriented Level 2 SOC Analyst to join our cybersecurity operations team. This role is critical in strengthening our threat detection and incident response capabilities. The ideal candidate will be responsible for conducting in-depth analysis of security events, escalating sophisticated threats, and contributing to the creation and optimization of security playbooks. If you are passionate about defending digital infrastructure, possess strong analytical skills, and are eager to be part of a collaborative and fast-paced environment, we invite you to be a key player in our mission to proactively safeguard our clients and operations. About the Role: We are seeking a skilled and proactive L2 SOC Engineer to strengthen our cybersecurity operations team. The role demands technical excellence across incident management , security control implementation , and playbook development , with opportunities for direct client engagement during presales and project execution phases. We offer a dynamic environment with performance-linked incentives , overtime payments , and opportunities for career advancement. Key Responsibilities: Act as the Level 2 escalation point for security events across SIEM, EDR, IDS/IPS, and Firewall ecosystems. Lead or support the end-to-end implementation of SOC environments , including platform setup (SIEM, SOAR, log onboarding), use-case development, integration of security tools, and operational runbook creation. Implement security controls — technical, administrative, and operational — as per client risk profiles and project requirements. Collaborate internally with presales teams by providing technical inputs during solution design and client proposal stages. Develop, document, and maintain incident response playbooks and standard operating procedures (SOPs). Investigate escalated incidents, perform root cause analysis, and coordinate remediation actions. Continuously tune detection rules, optimize use-cases, and enhance threat detection strategies. Mentor and guide L1 SOC Analysts, fostering a culture of continuous learning and operational excellence. Proactively recommend improvements in client security posture based on real-time threat intelligence and gap assessments. Required Skills and Experience: Bachelor's Degree in Computer Science, Information Technology, Cybersecurity, or a related field. 2–4 years of hands-on experience in a SOC environment. Strong working knowledge of security platforms such as Wazuh , Splunk, QRadar, LogRhythm, or other SIEMs. Expertise in implementation of cybersecurity controls across technical, administrative, and operational domains. Good understanding of security standards, including MITRE ATT&CK, NIST Cybersecurity Framework, and ISO 27001. Ability to develop structured, actionable playbooks and process documentation. Strong problem-solving skills, analytical thinking, and an ability to perform under pressure. Relevant certifications (CEH, CompTIA Security+, CySA+, or equivalent) are preferred. Preferred Skills: Prior client-facing experience — in presales engagements, project implementations, or cybersecurity consulting — will be considered an added advantage. Experience in tuning SIEM use cases and detection logic for optimized threat detection. Strong communication skills to effectively convey technical findings to diverse audiences. Passion for security innovation, threat hunting, and continuous process improvements. Compensation and Benefits: Competitive Base Salary benchmarked to the cybersecurity market. Performance-Based Incentive Mechanisms linked to client satisfaction and incident response efficiency. Overtime Payment for work performed beyond standard hours. Paid cybersecurity certifications and specialized learning programs. Career advancement pathways into Threat Intelligence, Forensics, Security Architecture, and other specialized roles. Dynamic, innovation-driven work environment with exposure to leading-edge cybersecurity tools and practices. Why Join Us? Deliver mission-critical security services that protect and empower client organizations. Gain exposure across multiple industries, technologies, and security challenges. Be part of a results-driven team that values expertise, collaboration, and continuous growth. Note : Kindly read the Job Description fully before applying for this post Job Types: Full-time, Permanent Pay: ₹35,000.00 - ₹40,000.00 per month Benefits: Cell phone reimbursement Commuter assistance Schedule: Day shift Fixed shift Morning shift Supplemental Pay: Overtime pay Performance bonus Ability to commute/relocate: Technopark, Thiruvananthapuram, Kerala: Reliably commute or planning to relocate before starting work (Required) Education: Bachelor's (Required) Experience: Cybersecurity: 2 years (Required) SoC: 1 year (Required) Willingness to travel: 50% (Preferred) Work Location: In person

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Position Summary... Demonstrates up-to-date expertise and applies this to the development, execution, and improvement of action plans by providing expert advice and guidance to others in the application of information and best practices; supporting and aligning efforts to meet customer and business needs; and building commitment for perspectives and rationales. Provides and supports the implementation of business solutions by building relationships and partnerships with key stakeholders; identifying business needs; determining and carrying out necessary processes and practices; monitoring progress and results; recognizing and capitalizing on improvement opportunities; and adapting to competing demands, organizational changes, and new responsibilities. Models compliance with company policies and procedures and supports company mission, values, and standards of ethics and integrity by incorporating these into the development and implementation of business plans; using the Open Door Policy; and demonstrating and assisting others with how to apply these in executing business processes and practices. What you'll do... About Team : This is the team which builds reusable technologies that aid in acquiring customers, onboarding and empowering merchants besides ensuring a seamless experience for both these stakeholders. We also optimize tariffs and assortment, adhering to the Walmart philosophy - Everyday Low Cost. In addition to ushering in affordability, we also create personalized experiences for customers the omnichannel way, across all channels - in-store, on the mobile app and websites. Marketplace is the gateway to domestic and international Third-Party sellers; we enable them to manage their end-to-end onboarding, catalog management, order fulfilment, return ; refund management. Our team is responsible for design, development, and operations of large-scale distributed systems by leveraging cutting-edge technologies in web/mobile, cloud, big data ; AI/ML. We interact with multiple teams across the company to provide scalable robust technical solutions. What you'll do: 3-6 years of experience building highly scalable, high performance, responsive web applications Good foundation in data structures, algorithms and design patterns Strong understanding of Javascript, NodeJS, and Frontend frameworks Good Experience of React and Redux Experience using OO and Functional Programming paradigm Understands whole product, its modules, and the interrelationship between them while being an expert in the assigned component or module Helps in designing interfaces and information exchange between modules Possesses advanced domain knowledge and shows great customer focus Demonstrates clarity of thinking to work through limited information and vague problem definitions Good with processes/methodologies and Skilled in build, release ; deployment processes Understanding and adapting frontend security and performance best practices What you'll bring: Experience in TypeScript Good in breaking down problems and estimate time for development tasks. Shows the ability to effectively delegate work. Experience with NodeJs Frameworks (Express / Hapi) Full stack experience with Java/JEE backend, with exposure to work with GQL, APIs System Performance mindset with good understanding for the best practises and reusable patterns About Walmart Global Tech Imagine working in an environment where one line of code can make life easier for hundreds of millions of people. Thats what we do at Walmart Global Tech. Were a team of software engineers, data scientists, cybersecurity experts and service professionals within the worlds leading retailer who make an epic impact and are at the forefront of the next retail disruption. People are why we innovate, and people power our innovations. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasing their first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale, impact millions and reimagine the future of retail. Flexible, hybrid work We use a hybrid way of working with primary in office presence coupled with an optimal mix of virtual presence. We use our campuses to collaborate and be together in person, as business needs require and for development and networking opportunities. This approach helps us make quicker decisions, remove location barriers across our global team, be more flexible in our personal lives. Benefits Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include a host of best-in-class benefits maternity and parental leave, PTO, health benefits, and much more. Belonging We aim to create a culture where every associate feels valued for who they are, rooted in respect for the individual. Our goal is to foster a sense of belonging, to create opportunities for all our associates, customers and suppliers, and to be a Walmart for everyone. At Walmart, our vision is "everyone included." By fostering a workplace culture where everyone isand feelsincluded, everyone wins. Our associates and customers reflect the makeup of all 19 countries where we operate. By making Walmart a welcoming place where all people feel like they belong, were able to engage associates, strengthen our business, improve our ability to serve customers, and support the communities where we operate. Equal Opportunity Employer Walmart, Inc., is an Equal Opportunities Employer By Choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting and valuing unique styles, experiences, identities, ideas and opinions while being welcoming of all people. Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Minimum Qualifications:Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 2years’ experience in software engineering or related area at a technology, retail, or data-driven company. Option 2: 4 years’ experience in software engineering or related area at a technology, retail, or data-driven company. Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, Network+, GISF, GSEC, CISSP, or CCSP, Master’s degree in Computer Science, Information Technology, Engineering, Information Systems, Cybersecurity, or related area Primary Location... BLOCK- 1, PRESTIGE TECH PACIFIC PARK, SY NO. 38/1, OUTER RING ROAD KADUBEESANAHALLI, , India R-2223609

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Thane, Maharashtra, India

On-site

Line of Service Advisory Industry/Sector Not Applicable Specialism Oracle Management Level Senior Associate Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisation's security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure. *Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Responsibilities: Configuring and managing monitoring tools deployed in SOC such as SIEM, UBA, NBA, DAM, DRA, PCAP, VA, SOAR, TIP, IMT (Incident Management Tool) and underlying SOC IT infrastructure to ensure their effectiveness. The broad outline of the activities involved for the contract period: - · Optimized deployment architecture & implementation · Configuration maintenance · Asset list management for SOC perspective · Data & log source management · Performance & Health Monitoring · License optimization & capacity planning · Tool Administration, user & role management · Reporting of SOC Audit and Compliance · Managing DR BCP Drill · Upkeeping the availability of the SOC tools · Version management of the deployed tools. · Cyber Drills & Simulations Mandatory skill sets: Mandatory (Any-one): - Certified SOC Analyst (EC-Council), Computer Hacking Forensic Investigator (EC-Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc. Preferred skill sets: L1 - Minimum 2 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting. L2 - Minimum 4 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/Vulnerability Management/ SOC platform management/ Automation/ Asset Integration/ Threat Intel Management/Threat Hunting. Years of experience required: 4+ Education qualification: I. B.E / B. Tech in: a) Cyber Security Computer Science/Computer Science & Engineering b) Information Technology/ Software Engineering/ c) Electronics & Communications Engineering d) Or equivalent degree in relevant discipline II. MCA or BCA or M.Tech / M.Sc/ B.Sc in: a) Computer Science b) Information Technology c) Electronic & Communications Engineering Shift Availability :On-Site-16X Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills Platform Management Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Cloud Security, Communication, Conducting Research, Creativity, Cyber Defense, Cyber Threat Intelligence, Embracing Change, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Learning Agility, Malware Analysis, Malware Detection Tools {+ 16 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Available for Work Visa Sponsorship? Government Clearance Required? Job Posting End Date

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Thane, Maharashtra, India

On-site

Line of Service Advisory Industry/Sector Not Applicable Specialism Operations Management Level Senior Associate Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisation's security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure. *Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Responsibilities: Configuring and managing monitoring tools deployed in SOC such as SIEM, UBA, NBA, DAM, DRA, PCAP, VA, SOAR, TIP, IMT (Incident Management Tool) and underlying SOC IT infrastructure to ensure their effectiveness. The broad outline of the activities involved for the contract period: - · Optimized deployment architecture & implementation · Configuration maintenance · Asset list management for SOC perspective · Data & log source management · Performance & Health Monitoring · License optimization & capacity planning · Tool Administration, user & role management · Reporting of SOC Audit and Compliance · Managing DR BCP Drill · Upkeeping the availability of the SOC tools · Version management of the deployed tools. · Cyber Drills & Simulations Mandatory skill sets: Mandatory (Any-one): - Certified SOC Analyst (EC-Council), Computer Hacking Forensic Investigator (EC-Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc. Preferred skill sets: L1 - Minimum 2 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting. L2 - Minimum 4 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/Vulnerability Management/ SOC platform management/ Automation/ Asset Integration/ Threat Intel Management/Threat Hunting. Years of experience required: 4+ Education qualification: I. B.E / B. Tech in: a) Cyber Security Computer Science/Computer Science & Engineering b) Information Technology/ Software Engineering/ c) Electronics & Communications Engineering d) Or equivalent degree in relevant discipline II. MCA or BCA or M.Tech / M.Sc/ B.Sc in: a) Computer Science b) Information Technology c) Electronic & Communications Engineering Shift Availability :On-Site-16X7 Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills Platform Support Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Cloud Security, Communication, Conducting Research, Creativity, Cyber Defense, Cyber Threat Intelligence, Embracing Change, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Learning Agility, Malware Analysis, Malware Detection Tools {+ 16 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Available for Work Visa Sponsorship? Government Clearance Required? Job Posting End Date

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Thane, Maharashtra, India

On-site

Line of Service Advisory Industry/Sector Not Applicable Specialism Operations Management Level Senior Associate Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisation's security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure. *Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Responsibilities: Configuring and managing monitoring tools deployed in SOC such as SIEM, UBA, NBA, DAM, DRA, PCAP, VA, SOAR, TIP, IMT (Incident Management Tool) and underlying SOC IT infrastructure to ensure their effectiveness. The broad outline of the activities involved for the contract period: - · Optimized deployment architecture & implementation · Configuration maintenance · Asset list management for SOC perspective · Data & log source management · Performance & Health Monitoring · License optimization & capacity planning · Tool Administration, user & role management · Reporting of SOC Audit and Compliance · Managing DR BCP Drill · Upkeeping the availability of the SOC tools · Version management of the deployed tools. · Cyber Drills & Simulations Mandatory skill sets: Mandatory (Any-one): - Certified SOC Analyst (EC-Council), Computer Hacking Forensic Investigator (EC-Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc. Preferred skill sets: L1 - Minimum 2 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting. L2 - Minimum 4 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/Vulnerability Management/ SOC platform management/ Automation/ Asset Integration/ Threat Intel Management/Threat Hunting. Years of experience required: 4+ Education qualification: I. B.E / B. Tech in: a) Cyber Security Computer Science/Computer Science & Engineering b) Information Technology/ Software Engineering/ c) Electronics & Communications Engineering d) Or equivalent degree in relevant discipline II. MCA or BCA or M.Tech / M.Sc/ B.Sc in: a) Computer Science b) Information Technology c) Electronic & Communications Engineering Shift Availability :On-Site-16X7 Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills Platform Management Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Cloud Security, Communication, Conducting Research, Creativity, Cyber Defense, Cyber Threat Intelligence, Embracing Change, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Learning Agility, Malware Analysis, Malware Detection Tools {+ 16 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Available for Work Visa Sponsorship? Government Clearance Required? Job Posting End Date

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Thane, Maharashtra, India

On-site

Line of Service Advisory Industry/Sector Not Applicable Specialism Operations Management Level Senior Manager Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisation's security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure. *Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Responsibilities: Configuring and managing monitoring tools deployed in SOC such as SIEM, UBA, NBA, DAM, DRA, PCAP, VA, SOAR, TIP, IMT (Incident Management Tool) and underlying SOC IT infrastructure to ensure their effectiveness. The broad outline of the activities involved for the contract period: - · Optimized deployment architecture & implementation · Configuration maintenance · Asset list management for SOC perspective · Data & log source management · Performance & Health Monitoring · License optimization & capacity planning · Tool Administration, user & role management · Reporting of SOC Audit and Compliance · Managing DR BCP Drill · Upkeeping the availability of the SOC tools · Version management of the deployed tools. · Cyber Drills & Simulations Mandatory skill sets: Mandatory (Any-one): - Certified SOC Analyst (EC-Council), Computer Hacking Forensic Investigator (EC-Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc. Preferred skill sets: L1 - Minimum 2 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting. L2 - Minimum 4 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/Vulnerability Management/ SOC platform management/ Automation/ Asset Integration/ Threat Intel Management/Threat Hunting. Years of experience required: 4+ Education qualification: I. B.E / B. Tech in: a) Cyber Security Computer Science/Computer Science & Engineering b) Information Technology/ Software Engineering/ c) Electronics & Communications Engineering d) Or equivalent degree in relevant discipline II. MCA or BCA or M.Tech / M.Sc/ B.Sc in: a) Computer Science b) Information Technology c) Electronic & Communications Engineering Shift Availability :On-Site-16X7 Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills Platform Management Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Cloud Security, Coaching and Feedback, Communication, Conducting Research, Creativity, Cyber Defense, Cyber Threat Intelligence, Embracing Change, Emotional Regulation, Empathy, Encryption, Inclusion, Influence, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Learning Agility {+ 24 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date

Posted 2 weeks ago

Apply

7.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Job Title: Sr. Office 365 Support Specialist Business Function/Sub Function: IT Infra & Operation Location: Noida, India Position Overview: We are looking for a highly accomplished IT Infrastructure, Operations, and ITSM Specialist to join the GEDU IT Infra & Operations Team at our Noida office. This role requires a dynamic professional with expertise in IT infrastructure, operations, network support, and IT service management, along with hands-on experience in Microsoft Azure, Office 365, and endpoint security solutions. The ideal candidate should have a strong technical background, proven leadership skills, and a user-centric approach. They will be responsible for leading IT support teams, ensuring the stability and security of IT infrastructure, and driving operational excellence. Working across multiple time zones as per business needs, they will collaborate with product managers, architects, and R&D teams to enhance IT services and align technology strategies with business objectives. This role demands a proactive mindset, the ability to manage critical IT projects, and a focus on continuous improvement, automation, and security compliance. If you are passionate about delivering seamless IT experiences, driving innovation, and building robust IT operations, we encourage you to apply. Key Responsibilities: IT Operations Management • Oversee the design, implementation, and maintenance of IT infrastructure, including cloud, on-premises and hybrid environments. • Manage Azure Active Directory, Entra ID, Office 365, and endpoint security solutions to ensure seamless IT operations. • Monitor system performance, availability, and security to proactively address potential risks and minimize downtime. • Ensure effective backup, disaster recovery, and business continuity planning for IT services. IT Service Management (ITSM) & Support • Lead incident, problem, change, and service request management in alignment with ITIL best practices. • Establish and enforce ITSM processes and SLAs to ensure prompt and effective resolution of IT issues. • Maintain and update ITSM documentation, including SOPs, knowledge base articles, and system documentation. • Collaborate with cross-functional teams to enhance service efficiency and user experience. Security, Compliance & Identity Management • Implement and manage security baselines, compliance policies, and endpoint security solutions (e.g., Microsoft Defender, Purview). • Oversee Multi-Factor Authentication (MFA), Single Sign-On (SSO), and Privileged Identity Management (PIM) for enhanced security. • Ensure compliance with global security standards and regulatory requirements. • Manage Zero Trust principles and enforce security hardening practices. Team Leadership & Vendor Management • Lead and mentor a team of IT support engineers, ensuring high performance and continuous skill development. • Manage relationships with third-party vendors and service providers, ensuring SLA adherence and prompt resolution of escalations. • Drive collaborative problem-solving and knowledge sharing across the IT team. • Automation & Process Optimization • Develop and automate IT workflows using PowerShell scripting and Microsoft Graph API. • Continuously optimize IT processes and drive innovation to improve operational efficiency. • Identify opportunities to reduce manual effort and enhance self-service capabilities. Project & Stakeholder Management • Manage IT infrastructure projects, upgrades, and migrations based on business requirements. • Collaborate with business leaders, product managers, and R&D teams to align IT strategies with organizational goals. • Provide regular reports and insights on IT performance, risks, and improvement plans. Qualifications: • Bachelor’s degree in computer science, Information Technology, Engineering, or a related field. • A master’s degree in IT Management or related disciplines is a plus. Professional Certifications (Preferred but not mandatory): • Microsoft Certifications : o Microsoft Certified: Azure Administrator Associate (AZ-104) o Microsoft Certified: Identity and Access Administrator (SC-300) o Microsoft 365 Certified: Modern Desktop Administrator Associate • IT Service Management (ITSM) & Security Certifications : o ITIL v4 Foundation (or higher) for ITSM best practices o CompTIA Security+ or CISSP for security management • Networking Certifications : o Cisco CCNA/CCNP, Aruba, or Arista networking certifications are a plus Work Experience: • 7 to 10 years of experience in Office 365 Administrator, Operations, ITSM, and Cloud Administration. • Hands-on experience in Microsoft Azure, Office 365, Entra ID, Intune, and Endpoint Security. • Strong knowledge of ITIL processes, service management tools, automation, and PowerShell scripting. • Proven experience in leading IT support teams, managing IT projects, and collaborating with cross-functional teams. Key Skills & Competencies: • Deep expertise in cloud, hybrid IT environments, and IT service management. • Strong problem-solving skills and the ability to troubleshoot complex technical issues. • Excellent communication, leadership, and stakeholder management skills. • Ability to work across different time zones as per business needs. • Strong analytical mindset, with a focus on continuous improvement and automation. To know our privacy policy, please click the link below: https://gedu.global/wp-content/uploads/2023/09/GEDU-Privacy-Policy-22092023-V2.0-1.pdf

Posted 2 weeks ago

Apply

8.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Job Description As a Senior Security Analyst/Engineer, you will be responsible for supporting the security operations of our organization by assisting in the monitoring, detection, and response to security incidents. This role offers a blend of security analysis and engineering tasks. This position offers a progression from foundational knowledge to more advanced responsibilities, allowing you to contribute significantly to the organization's cybersecurity efforts. Key Responsibilities: Security monitoring and analysis You assist in monitoring security events and alerts from various sources such as SIEM, IDS/IPS, antivirus systems, and endpoint detection platforms You conduct initial analysis of security events to determine their nature and potential impact on the organization You collaborate with senior analysts to investigate and respond to security incidents, including malware infections, phishing attempts, and unauthorized access attempts. Incident response You contribute to incident response activities by providing technical assistance during security incidents, including containment, eradication, and recovery efforts You document incident response procedures, develop post-incident reports, and conduct lessons learned sessions to improve incident handling capabilities You implement proactive measures to enhance incident detection and response capabilities, such as developing playbooks for common attack scenarios. Vulnerability management You support the vulnerability management process by assisting in vulnerability scanning, assessment, and remediation efforts You help prioritize and track the resolution of identified vulnerabilities in systems and applications You collaborate with system owners and IT teams to ensure timely patching and mitigation of identified vulnerabilities, leveraging automation and orchestration where possible You conduct security assessments and penetration tests to identify weaknesses in systems, applications, and network infrastructure. Security tool You assist in the administration and configuration of security tools and technologies, such as firewalls, intrusion detection/prevention systems, and endpoint security solutions You participate in the evaluation and testing of new security technologies to enhance the organization's security posture You optimize the configuration and tuning of security tools and technologies to improve detection accuracy, reduce false positives, and enhance overall effectiveness You evaluate emerging security technologies and solutions, recommending and implementing enhancements to the security toolset based on industry best practices and organizational requirements. Security awareness and training You support security awareness and training initiatives by assisting in the development of educational materials and delivering security awareness briefings to staff. Qualifications and Skills: Bachelor's degree ( Bachelor of Engineering / Bachelor of Technology) in Information Technology , Computer Science, Information Security, or related field 8-12 years of experience in a cybersecurity role with progressively increasing responsibilities Strong understanding of cybersecurity principles, threat landscape, and attack methodologies Proficiency in security tools and technologies such as SIEM, EDR, IDS/IPS, firewalls, and vulnerability scanners Excellent analytical, problem-solving, and decision-making skills Effective communication and stakeholder management abilities Certifications such as CompTIA Security+, CEH (Certified Ethical Hacker), or equivalent are a plus. Experience Demonstrated experience in conducting security analysis, incident response, and vulnerability management in a complex environment Hands-on experience with security tool optimization, security assessments, and penetration testing Proven track record of incident response efforts and effectively managing security incidents from detection to resolution. Career development This role offers a valuable opportunity for career growth and development in the field of cybersecurity. As you gain experience and proficiency, you will have the opportunity to progress into more specialized roles such as Senior Security Analyst, Incident Responder, or Security Engineer. Continued learning and professional certifications will be encouraged to enhance your skills and knowledge in the cybersecurity domain. Your Team Global cyber security team has the mission to enable Carmeuse digitalization strategy without security compromises. The cyber team is composed of regional senior security managers, cyber architects based around the globe with major presence in US, Belgium & Romania. Global cyber team is in charge of security design, delivery and operations to safeguard Carmeuse digital IT & OT footprint. Working with our cybersecurity team, you'll be at the forefront of innovation designed to strengthen our operations. Your Manager Victor Alexandrescu, 45 years old, is the leader of the team. With more than 20 years' experience, he brings a wealth of practical knowledge to the role. Victor joined Carmeuse 1 year ago. His management style is direct and based on trust and support. He focuses on efficiency and continuous improvement, always looking for ways to optimize processes and enhance team performance. He promotes a mindset centered on proactive problem-solving and achieving tangible results. Why Should You Join? We truly believe that where you work matters and, as a family business, we know what makes our employees happy! Permanent contract Flexible working hours Home working policy Competitive salary package and benefits A lot of growing possibilities A strong HR and training policy to develop your skills Work life balance #Hybrid The Recruitment Process: If you apply for this great position, you could go through these different steps: Georges Mensah-Boateng, our Talent Acquisition Lead will analyze your Résumé and cover letter A first "Teams" interview will be scheduled with Georges. You will take 2 personality questionnaires. He will want to know more about you, as a person and as a professional. He will assess your motivations and answer to your questions You will have a second interview with Victor Alexandrescu (our Cybersecurity Delivery Manager) and Aurelie Mordant (our HRBP). The last interview will take place with Stavros Georgakopoulos (our Cyber Security Architect), Rusty Gavin (our OT Cyber Security Lead) and Eugene Marchenko (our IT Security Director).

Posted 2 weeks ago

Apply

3.0 years

5 - 5 Lacs

Hyderābād

On-site

Home to the world's best loved and trusted hygiene, health, and nutrition brands. Our purpose defines why we exist: to protect, heal and nurture in the relentless pursuit of a cleaner, healthier world. We are a global team united by this purpose. Join us in our fight to make access to the highest quality hygiene, wellness, and nourishment a right and not a privilege. Information Technology & Digital In IT and D, you'll be a force for good, whether you're championing cyber security, defining how we harness the power of technology to improve our business, or working with data to guide the innovation of consumer loved products. Working globally across functions, you'll own your projects and process from start to finish, with the influence and visibility to achieve what needs to be done. And if you're willing to bring your ideas to the table, you'll get the support and investment to make them happen. Your potential will never be wasted. You'll get the space and support to take your development to the next level. Every day, there will be opportunities to learn from peers and leaders through working on exciting, varied projects with real impact. And because our work spans so many different businesses, from Research and Product Development to Sales, you'll keep learning exciting new approaches. About the role As an IT&D Security Analyst, you will be instrumental in detecting and responding to security incidents, conducting in-depth post-incident technical analysis, and managing security alerts across IT and OT environments. You will collaborate closely with the Cyber Security Team to refine requirements, develop advanced threat detection mechanisms, create robust incident response playbooks, and implement automation strategies. Furthermore, you will actively participate in threat hunting exercises and contribute to the enhancement of our SIEM and EDR platforms. Your responsibilities Key Responsibilities: Respond to, resolve, and escalate security incidents as required. Contribute to the development and refinement of the IT security incident response process and supporting materials. Conduct threat hunting activities to identify threat actor groups and their tactics, techniques, and procedures (TTPs). Capture threat intelligence on actor TTPs and develop appropriate countermeasures. Participate in post-incident reviews and deliver presentations to senior management. Engage in security incident tabletop exercises. Assist in developing processes and procedures to optimize incident response times, incident analysis, and overall, SOC operations. The experience we're looking for Minimum of 3 years of experience in responding to cyber incidents. Technical expertise in security-related systems and applications such as EDR, IDS/IPS, Proxy, SIEM, WAF, and SOAR. Proven experience in developing, documenting, and maintaining security procedures. Strong understanding of network infrastructure, including routers, switches, firewalls, and associated network protocols. Proficiency in TCP/IP and network administration/protocols. Understanding of how Operating Systems works (Windows, Linux) Excellent analytical and problem-solving skills for effective security incident resolution. Relevant certifications such as Security+, Network+, GCIA, GCIH, CISP, GMON, etc. Ability to work independently with minimal supervision. Experience with scripting languages (Bash, PowerShell, Python) is advantageous. Solid knowledge of software engineering, information risk, security guidelines, and architecture standards. Excellent verbal and written English language skills. Innovative and experimental approach to problem-solving. Strong communication and interpersonal skills. The skills for success SOC operations, Threat response,EDR, TCP/IP What we offer With inclusion at the heart of everything we do, working alongside our four global Employee Resource Groups, we support our people at every step of their career journey, helping them to succeed in their own individual way. We invest in the wellbeing of our people through parental benefits, an Employee Assistance Program to promote mental health, and life insurance for all employees globally. We have a range of other benefits in line with the local market. Through our global share plans we offer the opportunity to save and share in Reckitt's potential future successes. For eligible roles, we also offer short-term incentives to recognise, appreciate and reward your work for delivering outstanding results. You will be rewarded in line with Reckitt's pay for performance philosophy. Equality We recognise that in real life, great people don't always 'tick all the boxes'. That's why we hire for potential as well as experience. Even if you don't meet every point on the job description, if this role and our company feels like a good fit for you, we still want to hear from you. All qualified applicants will receive consideration for employment without regard to age, disability or medical condition; colour, ethnicity, race, citizenship, and national origin; religion, faith; pregnancy, family status and caring responsibilities; sexual orientation; sex, gender identity, gender expression, and transgender identity; protected veteran status; size or any other basis protected by appropriate law.

Posted 2 weeks ago

Apply

0 years

2 - 3 Lacs

India

Remote

Key Responsibilities Technical Support & Troubleshooting : Diagnose and resolve issues related to CCTV cameras, DVR/NVR systems, and associated software. Provide assistance to clients via phone, email, or remote access tools. Installation & Configuration : Set up and configure CCTV systems, including cameras and recording equipment, ensuring optimal coverage and functionality. System Maintenance : Conduct routine inspections and maintenance to ensure continuous operation of CCTV systems. Perform necessary repairs or upgrades as needed. Client Training & Documentation : Provide training to clients on system operation. Maintain detailed records of installations, maintenance activities, and technical issues. Collaboration : Work closely with sales and technical teams to identify and resolve system issues. Stay updated with the latest advancements in CCTV technology. Required Skills & Qualifications Technical Expertise : Proficiency in CCTV systems, including knowledge of cameras, recorders, and surveillance software. Familiarity with networking principles and IP camera systems. pathsgroup.comaceda.co.uk+2expertia.ai+2superworks.com+2 Problem-Solving Abilities : Strong analytical skills to diagnose and resolve technical issues efficiently. Communication Skills : Excellent verbal and written communication to effectively assist clients and document technical information. Educational Background : A degree or diploma in Electrical Engineering, Information Technology, or a related field is often preferred. Certifications : Certifications such as CompTIA Security+, CCNA, or vendor-specific credentials can be advantageous. Job Type: Full-time Pay: ₹20,000.00 - ₹30,000.00 per month Work Location: In person

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Position: AWS Vulnerability Management Engineer Location: Gurugram/Bangalore Experience: 5+ years Job Description: We are seeking a highly motivated and skilled Security Engineer with 5+ years of experience to join our dynamic team. The ideal candidate will have a strong background in vulnerability management and remediation activities in an enterprise environment. This role requires a proactive approach to identifying, assessing, and mitigating security vulnerabilities to ensure the safety and integrity of our systems. Responsibilities Conduct regular vulnerability assessments and scans to identify security weakness in our systems and applications. Collaborate with cross-functional teams to prioritize and remediate identified vulnerabilities in timely manner. Develop and implement remediation plans ensuring compliance with industry standards and best practices. Requires comprehensive knowledge and practical experience with one or more cutting-edge cyber tools for vulnerability assessment. Recommend security tools and solutions to improve overall security posture. Create and maintain documentation related to vulnerability management process and remediation activities. Provide support and guidance to other team members on best practices and possible remediation efforts. Generate and present regular reports on vulnerability metrics with progress and anomalies detected. Required Skills: 5+ years of experience in vulnerability management and remediation activities within an enterprise environment. Strong understanding of security principles, vulnerabilities, and remediation planning. Proficiency in Scripting and automation using python or similar. Experience with API's and integrating security tools with other systems. Strong communication and collaboration skills. Experience with vulnerability assessment tools such as SNYK, Qualys, Wiz, Container security, Prisma Cloud, and GitHub Advanced Security . Experience with security frameworks and standards such as NIST, ISO 27001, or CIS. Knowledge of cloud security best practices and experience with cloud platform such as AWS. Relevant Security certifications such as CISSP, CEH, or CompTIA Security+. About Stratacent: Stratacent is a Global IT Consulting and Services firm, headquartered in Jersey City, NJ, with global delivery centres in Pune and Gurugram plus offices in USA, London, Canada and South Africa. We are a leading IT services provider focusing in Financial Services, Insurance, Healthcare and Life Sciences. We help our customers in their transformation journey and provides services around Information Security, Cloud Services, Data and AI, Automation, Application Development and IT Operations. URL - http://stratacent.com Employee Benefits: Group medical and accidental insurance Transport facility One-time meal Continuous Learning Program Stratacent India Private Limited is an equal opportunity employer and will not discriminate against any employee or applicant for employment on the basis of race, color, creed, religion, age, sex, national origin, ancestry, handicap, or any other factor protected by law.

Posted 2 weeks ago

Apply

0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

JD for Network Security: Skill-Network Security Experience-8 to 12yrs location-Mumbai Security Policy Implementation: Develop, implement, and enforce network security policies, standards, and procedures. Vulnerability Management: Conduct regular vulnerability assessments and penetration testing of network infrastructure, analyze findings, and implement remediation plans. Threat Monitoring and Analysis: Monitor network traffic and security logs for suspicious activity, analyze potential threats, and respond to security incidents. Security Audits and Compliance: Assist with internal and external security audits and ensure compliance with relevant industry regulations and standards (e.g., ISO 27001, PCI DSS, GDPR). Secure Network Design: Participate in the design and architecture of secure network solutions for new projects and infrastructure upgrades. In-depth knowledge of firewall technologies (e.g., Cisco ASA/Firepower, Palo Alto Networks, Fortinet), including rule configuration, VPN setup (IPsec, SSL VPN), and advanced features. Experience with Intrusion Detection/Prevention Systems (IDS/IPS) and their deployment and management. Familiarity with web security technologies (e.g., web application firewalls - WAFs, content filtering). Experience with SIEM (Security Information and Event Management) systems for log analysis and correlation. Relevant security certifications such as CompTIA Security+, Network+, CySA+, CCNA Security, CCNP Security, Palo Alto Networks Certified Network Security Engineer (PCNSE), Fortinet NSE certifications, or equivalent. Experience with cloud security technologies (e.g., AWS Security, Azure Security Center, GCP Security Command Center).

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Thane, Maharashtra, India

On-site

Line of Service Advisory Industry/Sector Not Applicable Specialism Operations Management Level Senior Associate Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisation's security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure. *Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. " Responsibilities: Configuring and managing monitoring tools deployed in SOC such as SIEM, UBA, NBA, DAM, DRA, PCAP, VA, SOAR, TIP, IMT (Incident Management Tool) and underlying SOC IT infrastructure to ensure their effectiveness. The broad outline of the activities involved for the contract period: - · Optimized deployment architecture & implementation · Configuration maintenance · Asset list management for SOC perspective · Data & log source management · Performance & Health Monitoring · License optimization & capacity planning · Tool Administration, user & role management · Reporting of SOC Audit and Compliance · Managing DR BCP Drill · Upkeeping the availability of the SOC tools · Version management of the deployed tools. · Cyber Drills & Simulations Mandatory skill sets: Mandatory (Any-one): - Certified SOC Analyst (EC-Council), Computer Hacking Forensic Investigator (EC-Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc. Preferred skill sets: L1 - Minimum 2 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/ Vulnerability Management/ SOC platform management/ Automation/Asset Integration/ Threat Intel Management /Threat Hunting. L2 - Minimum 4 years of relevant experience in SOC/Incident Management/Incident Response /Threat Detection Engineering/Vulnerability Management/ SOC platform management/ Automation/ Asset Integration/ Threat Intel Management/Threat Hunting. Years of experience required: 4+ Education qualification: I. B.E / B. Tech in: a) Cyber Security Computer Science/Computer Science & Engineering b) Information Technology/ Software Engineering/ c) Electronics & Communications Engineering d) Or equivalent degree in relevant discipline II. MCA or BCA or M.Tech / M.Sc/ B.Sc in: a) Computer Science b) Information Technology c) Electronic & Communications Engineering Shift Availability :On-Site-16X7 Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Engineering Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required Skills Platform Management Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Cloud Security, Communication, Conducting Research, Creativity, Cyber Defense, Cyber Threat Intelligence, Embracing Change, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Learning Agility, Malware Analysis, Malware Detection Tools {+ 16 more} Desired Languages (If blank, desired languages not specified) Travel Requirements Available for Work Visa Sponsorship? Government Clearance Required? Job Posting End Date

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Chennai, Tamil Nadu

On-site

Category: Infrastructure/Cloud Main location: India, Tamil Nadu, Chennai Position ID: J0625-1351 Employment Type: Full Time Position Description: Responsibilities Direct Responsibilities Operate the log collection platforms: Monitoring of performance and capacity Monitoring of log collection coverage of various sources Update and patching of all components of the collection environment. Working with IT Production teams in case of Incidents to ensure the continuous delivery of log data Monitoring of the pipelines sending log data to the SIEM environments Alignment with Asset Management teams to keep logging baseline up to date. Build and regular update of operational KPI’s Contributing Responsibilities Support CSIRT team in investigations in case local log data is needed Technical & Behavioral Competencies Technical Skills Proven expertise of all components of the Elastic stack – Kafka, Elastic search, Log stash Expertise in Linux server administration and load balancer Familiarity with security tools and technologies such as SIEM, IDS / IPS, firewalls and antivirus systems. Ability to interpret and analyze logs generated by various systems, applications, and devices to detect. anomalies, security incidents, and unauthorized activities. Familiarity with incident response procedures and methodologies. Proficiency in using vulnerability scanning tools such as Nessus, Qualys, or OpenVAS to identify and prioritize security vulnerabilities in systems and networks. Proficiency in deploying, configuring, and managing IDS/IPS solutions to detect and prevent intrusion. and malicious activities on networks. Specific Qualifications (if required) Skills Referential Behavioural Skills: (Please select up to 4 skills) Attention to detail / rigor Ability to collaborate / Teamwork Ability to deliver / Results driven Client focused Transversal Skills: (Please select up to 5 skills) Analytical Ability Ability to develop and adapt a process Ability to understand, explain and support change Ability to set up relevant performance indicators Ability to develop and adapt a process Education Level: Bachelor Degree or equivalent Experience Level At least 5 years Other/Specific Qualifications (if required) Certification like CEH, CompTIA Security+, CISSP could be added advantage Skills: Linux Nessus What you can expect from us: Together, as owners, let’s turn meaningful insights into action. Life at CGI is rooted in ownership, teamwork, respect and belonging. Here, you’ll reach your full potential because… You are invited to be an owner from day 1 as we work together to bring our Dream to life. That’s why we call ourselves CGI Partners rather than employees. We benefit from our collective success and actively shape our company’s strategy and direction. Your work creates value. You’ll develop innovative solutions and build relationships with teammates and clients while accessing global capabilities to scale your ideas, embrace new opportunities, and benefit from expansive industry and technology expertise. You’ll shape your career by joining a company built to grow and last. You’ll be supported by leaders who care about your health and well-being and provide you with opportunities to deepen your skills and broaden your horizons. Come join our team—one of the largest IT and business consulting services firms in the world.

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies