Home
Jobs

283 Security Monitoring Jobs - Page 2

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 10.0 years

6 - 13 Lacs

Lucknow

Work from Office

Naukri logo

Managed Services SOC Manager Job Summary: The Security Operations Center (SOC) Security L-2 Analyst serves in a SOC team, is responsible for conducting information security investigations as a result of security incidents identified by the Level-1 security analysts who are monitoring the security consoles from various SOC entry channels (SIEM, Tickets, Email and Phone). The L2 SOC Security Analyst is expected to have a solid understanding of information security and computer systems concepts and should be ready to work in shifts. An engineer in this position act as a point of escalation for Level-1 SOC security analysts in support of information security investigations to provide guidance and oversight on incident resolution and containment techniques. Job Description : Responsible for conducting information security investigations as a result of security incidents identified by the Level 1 security analyst who are monitoring the security consoles from various SOC entry channels (SIEM, Tickets, Email and Phone), Act as a point of escalation for Level-1 SOC security analysts in support of information security investigations to provide guidance and oversight on incident resolution and containment techniques. Should have experience in Developing new correlation rules & Parser writing Experience in Log source integration Act as the lead coordinator to individual information security incidents. Mentor security analysts regarding risk management, information security controls, incident analysis, incident response, SIEM monitoring, and other operational tasks (tools, techniques, Procedures) in support of technologies managed by the Security Operations Center. Document incidents from initial detection through final resolution. Participate in security incident management and vulnerability management processes. Coordinate with IT teams on escalations, tracking, performance issues, and outages. Works as part of a team to ensure that corporate data and technology platform components are safeguarded from known threats. Communicate effectively with customers, teammates, and management. Prepare Monthly Executive Summary Reports for managed clients and continuously improve their content and presentation. Provide recommendations in tuning and optimization of security systems, SOC security process, procedures and policies. Define, create and maintain SIEM correlation rules, customer build documents, security process and procedures. Follow ITIL practices regarding incident, problem and change management. Staying up-to-date with emerging security threats including applicable regulatory security requirements. Maintain an inventory of the procedures used by the SOC and regularly evaluate the SOC procedures and add, remove, and update the procedures as appropriate Publish weekly reports to applicable teams Generate monthly reports on SOC activity Secondary skills like AV, HIPS, DCS, VA/ PT desirable Required Technical Expertise Must have experience in SIEM Management tool (QRADAR) Should have certifications like, ITIL, CCNA, CEH, VA (Product) Certification, CISM Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host based firewalls, Anti-Malware, HIDS General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows NT

Posted 5 days ago

Apply

5.0 - 9.0 years

7 - 13 Lacs

Bengaluru, Karnataka, India

On-site

Foundit logo

Develop and refine threat hunting techniques and tools. Experience in monitoring and alert handling in QRadar SIEM. In-depth knowledge of advanced persistent threats (APTs) and attack vectors. Collaborate with threat intelligence teams to integrate new threat data into hunting processes. Security incident handling and reporting. Experienced in EDR alert analysis, preferably Sentinel One. Preferred candidate profile Bachelor's degree in computer science, Information Security, or related field. Should be flexible to work in 24/7 rotational shifts. Should possess good communication skills.

Posted 5 days ago

Apply

3.0 - 6.0 years

2 - 4 Lacs

Meerut

Work from Office

Naukri logo

Just 100m from Delhi-Meerut Expressway Interested Candidates may WhatsApp their Profile @ 9837044200 (No calls please) Role & responsibilities Security Supervisor will be responsible for maintaining the overall security of the Hotel Training the Guards Implementing Security Policies of the company and as briefed by the CSO Monitoring the Security Team & reporting to CSO Monitoring & surveillance physically as instructed by the CSO Handling staff as well guest's nuisance Observing the security breaches & implementing solutions to control the same Observing staff hide-out areas and absenteeism from the work place VIP guests security protocol management Preferred candidate profile Ex-Serviceman Work experience in a hotel 3 - 4 Years experience at a position of Security Supervisor Diploma or equivalent will be an added advantage Perks and benefits Industry standards

Posted 6 days ago

Apply

4.0 - 9.0 years

4 - 9 Lacs

Pune, Maharashtra, India

On-site

Foundit logo

We are seeking an experienced professional to join our Pune, India office as a Senior Security Operations Analyst with a strong background in Security Information and Event Management (SIEM) platforms, specifically in Microsoft Sentinel and Wiz. The ideal candidate will be responsible for leading advanced threat detection, response, and monitoring activities. This role will be critical in enhancing our cybersecurity posture and ensuring the ZS environment remains secure against emerging threats. What you'll do: Manage the day-to-day operations of Microsoft Sentinel, including rule creation, log ingestion, data analytics, and alert triaging Develop and tune detection rules, use cases, and analytics within Sentinel to improve threat visibility and detection capabilities Leverage Wiz Defend to detect and respond to runtime threats across cloud workloads and Kubernetes environments in real-time Continuously monitor and investigate alerts generated by Wiz Defend to enhance threat detection, triage, and incident response capabilities Perform proactive threat hunting to identify and mitigate advanced threats Conduct in-depth incident investigations and coordinate response efforts to ensure swift remediation Collaborate with internal stakeholders and the Threat Intelligence team to identify and mitigate potential security threats Generate reports and dashboards to communicate SOC performance metrics and security posture to leadership Continuously improve SOC processes and playbooks to streamline operations and response efforts Mentor junior SOC analysts and provide guidance on security best practices This role requires participation in a rotational shift Flexibility and availability to respond to urgent incidents outside of assigned shifts, as needed What you'll bring: Strong analytical and problem-solving abilities Excellent communication and interpersonal skills to effectively collaborate with cross-functional teams Proven ability to remain calm and efficient under a high-pressure environment Proficient in using SIEM tools, such as Microsoft Sentinel Experience with data migration strategies across SIEM platforms Experience on Cloud Security Operations and Incident Response platforms such as Wiz In-depth understanding of cyber threats, vulnerabilities, and attack vectors Proficient in creating KQL queries and custom alerts within Microsoft Sentinel Expertise in developing SIEM use cases and detection rules Skilled in incident response and management procedures Experienced in conducting deep-dive investigations and root cause analysis for incidents Adept at collaborating with stakeholders to resolve complex cybersecurity challenges Ability to automate routine SOC processes to enhance operational efficiency Experienced in mentoring and guiding junior analysts in security operations Knowledge of major cloud platforms (AWS, Azure, GCP), including their security models, IAM roles, virtual private cloud (VPC) configurations, and cloud-native security tools Good to have skills and abilities: Excellent interpersonal (self-motivational, organizational, personal project management) skills Knowledge of vulnerability management and scanning best practices such as CVE database and the CVS System Ability to analyze cyber threats to develop actionable intelligence Skill in using data visualization tools to convey complex security information Academic Qualifications: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent experience) 4+ years of experience in a Security Operations Center (SOC) environment, with a focus on SIEM management Strong hands-on experience with Microsoft Sentinel, including data connectors, KQL queries, analytics rules, and workbooks Experience with SIEM migration Expertise in incident response, threat detection, and security monitoring Solid understanding of Windows, Linux, and cloud security concepts Relevant certifications (e.g., CompTIA Security+, Microsoft Certified Security Operations Analyst, GCIA, GCIH, OSDA, GCFA) are preferred Preferred Security Cloud Certifications: AWS Security Specialty

Posted 6 days ago

Apply

5.0 - 8.0 years

16 - 20 Lacs

Gurugram

Work from Office

Naukri logo

Job Description: Cloud Segment Information Security Officer (SISO GL28) Location- Gurgaon Position Overview: The Cloud Segment Information Security Officer (SISO) is responsible for overseeing and implementing security measures to protect the organizations cloud-based data and infrastructure. This role involves developing cloud-specific security strategies, managing risks, ensuring compliance, and leading incident response efforts. A key aspect of this role is fostering strong relationships and partnerships with business leaders and stakeholders to ensure security measures align with business objectives. Key Responsibilities: Cloud Security Strategy: Develop and implement security strategies tailored to the cloud segment to ensure the protection of cloud-based data and infrastructure. Risk Management: Identify, assess, and mitigate security risks associated with cloud operations and technologies. Incident Response: Lead incident response efforts for security breaches within the cloud segment, including investigation, containment, and remediation. Compliance: Ensure compliance with relevant cloud-specific regulations and standards. Collaboration: Work closely with other IT teams and cloud segment leaders to integrate security measures into cloud services and applications. Training and Awareness: Support security training and awareness programs for employees within the cloud segment to promote a security-conscious culture. Policy Development: Develop and enforce security policies and procedures specific to cloud operations. Audit and Assessment: Support security audits and assessments to ensure the effectiveness of security measures within the cloud segment. Business Partnership: Foster strong relationships with business leaders and stakeholders to ensure security measures support and enhance business objectives. Collaborate with business units to understand their needs and provide tailored cloud security solutions. Qualifications: Proven experience in developing and implementing cloud security strategies. Strong knowledge of cloud risk management and security architecture. Experience in leading cloud incident response efforts. Familiarity with cloud compliance regulations and security monitoring tools. Excellent collaboration and communication skills. Ability to conduct training and develop cloud security policies. Experience in conducting cloud security audits and assessments. Demonstrated ability to build and maintain relationships with business leaders and stakeholders. At UnitedHealth Group, our mission is to help people live healthier lives and make the health system work better for everyone. We believe everyoneof every race, gender, sexuality, age, location and incomedeserves the opportunity to live their healthiest life. Today, however, there are still far too many barriers to good health which are disproportionately experienced by people of color, historically marginalized groups and those with lower incomes. We are committed to mitigating our impact on the environment and enabling and delivering equitable care that addresses health disparities and improves health outcomes an enterprise priority reflected in our mission. njp

Posted 1 week ago

Apply

9.0 - 13.0 years

5 - 10 Lacs

Bengaluru

Work from Office

Naukri logo

This role involves the development and application of engineering practice and knowledge in designing, managing and improving the processes for Industrial operations, including procurement, supply chain and facilities engineering and maintenance of the facilities. Project and change management of industrial transformations are also included in this role. Job Description - Grade Specific Focus on Industrial Operations Engineering. Develops competency in own area of expertise. Shares expertise and provides guidance and support to others. Interprets clients needs. Completes own role independently or with minimum supervision. Identifies problems and relevant issues in straight forward situations and generates solutions. Contributes in teamwork and interacts with customers. Skills (competencies)

Posted 1 week ago

Apply

15.0 - 22.0 years

5 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Job Title: Senior Manager (Security) Looking for a Security Manager who will be responsible for creating and executing security programs, procedures, and policies. The role involves coordinating security operations with other members of the security and cross-functional teams. The ideal candidate should possess outstanding leadership, strong communication and security management skills. Qualifications and Experience: - University degree or equivalent through experience and professional certification. - 15 years of expertise in security operations in the private sector with a minimum of five years in a key leadership position in Corporate Security. - In-depth knowledge of global risk assessment approaches. - Ability to interact effectively with diverse cultures and build consensus. - Proven capability to direct and manage initiatives, provide assistance, and generate value. - Outstanding verbal, written, and interpersonal communication abilities. (English, Hindi and Local language a must (based on the location of the factory) - Proficient in providing risk management training. - Familiarity with contemporary security devices, deployment, and monitoring. - Experience in security auditing. Prior experience in Multinational corporations preferably in Electronics manufacturing. Responsibilities: Policy and Procedure Development: - Develop and execute company-wide security policies, protocols, and procedures in collaboration with management and meeting customer expectations. Surveillance and Emergency Response: - Demonstrate exceptional abilities in surveillance and emergency response. - Dedication to security regulations and understanding of potential dangers and safety issues. Technology Integration: - Implement technology-driven monitoring systems for continuous improvement. Audit and Compliance: - Conduct security audits as required by management, customers and by law. - Examine audit results, identify non-compliance areas, and take necessary action. Security operations tasks: - Coordinate with cross-functional teams on project requirements, standards and deadlines. - Develop and execute project plans, ensuring timely completion. - Administer vendors for on-time delivery and completion. Team Management: - Recruit, train, and oversee security personnel. - Ensure alignment with the company's core values and long-term strategy. Collaboration and Communication: - Attend meetings with other departments, clients, and stakeholders to establish operational requirements. - Liaise with law enforcement agencies, government entities, and regulatory authorities. Confidentiality - Ensure confidentiality of work assignments and comply to non-disclosure agreements.

Posted 1 week ago

Apply

8.0 - 13.0 years

4 - 7 Lacs

Bengaluru

Work from Office

Naukri logo

Looking for a Security Specialist/Asst. Manager with Man-guarding experience who can communicate effectively, supervise daily security operations, and make informed decisions. The candidate should also know about physical security practices, Man management, recruitment, scrutiny, training and Investigations. Qualifications and Experience: - University degree or equivalent through experience and professional certification. - 8 years of expertise in managing security operations in the private sector with a minimum of 3 years in a team management role. - In-depth knowledge of Man-guarding deployment needs and Training. - Hands-on experience in designing and developing security deployment plans. - Strong leadership and team management skills. - Ensure confidentiality of work assignments and comply with non-disclosure agreements. - Good verbal, written, and interpersonal communication abilities. (English, Hindi and Local language a must (based on the location of the factory) Responsibilities: - Oversee and coordinate day to day of Guarding services at the site. - Coordinate and support client/process audits from a Guarding standpoint. - Guarding Vendor Management and ensuring compliance with regulatory requirements. - Develop and Implement security policies and manage effective implementation. - Provide training programs to maintain a high competency level among Security staff. - Conduct security awareness sessions for employees/ vendors to increase awareness about security practices. - Conduct a performance evaluation of the guard force and identify areas of improvement. - Develop an automated tool to evaluate weekly/ fortnightly/ monthly areas of improvement and corrective plans. - Designing retention/recognition programs. - Conduct and support investigations at the site. - Emergency preparedness and contingency planning. - Liasoning with Law enforcement authorities and communicating internally on potential business disruptions.

Posted 1 week ago

Apply

1.0 - 6.0 years

6 - 16 Lacs

New Delhi, Pune

Work from Office

Naukri logo

Objective: Serve as L1/L2/L3 level core security domains. Lead architecture reviews, complex troubleshooting, performance tuning, threat modeling, and support design/implementation changes. Technologies Supported Domain Platform DDoS Protection Radware DefensePro / Cloud DDoS NGFW Palo Alto (Panorama, Cortex XSOAR) SIEM & IDAM OpenText ArcSight / CyberRes WAF & LB Radware AppWall / Alteon VX Endpoint Security Trend Micro Apex One / Vision One VAPT Tenable.io / SecurityCenter HSM Thales Luna / payShield APM & Logging Elastic Stack (ELK + Observability) Advanced Skill Set Expert in one or more: DDoS, NGFW, SIEM, WAF, VAPT Protocol-level packet analysis Threat intelligence and hunting workflows SIEM correlation strategy and content development Complex API integrations and automation scripting (Python/Shell) Familiarity with Zero Trust, MITRE ATT&CK, SOAR

Posted 1 week ago

Apply

2.0 - 3.0 years

12 - 13 Lacs

Bengaluru

Work from Office

Naukri logo

The opportunity: Join our dynamic Threat Intelligence and Detection Engineering (TIDE) team within Cyber Operations, dedicated to safeguarding critical infrastructure. Work alongside motivated professionals in a collaborative environment, leveraging cutting-edge technologies, automation, and innovative GenAI solutions. Youll have opportunities to expand your professional network across various cybersecurity disciplines, including Cyber Defense Center (CDC), Vulnerability Management (VMAD), and Architecture Engineering (AE). We prioritize enthusiasm, creativity, and passion for continuous learning over extensive experience. You should be curious, innovative, and excited to explore emerging cybersecurity approaches. How you ll make an impact: Develop and implement detection engineering content, automation, and integrations across IT/OT environments. Enhance our Security Orchestration, Automation, and Response (SOAR) platform by developing additional integrations and response automations. Incorporate cutting-edge GenAI technologies into operational processes. Build and maintain detection baselines tailored to evolving threats and business-specific use cases. Collaborate closely with Incident Response and Threat Intelligence teams to continuously refine detection capabilities. Conduct proactive technical analyses post-incident to improve operational effectiveness and response efficiency. Monitor cybersecurity trends, emerging threats, and innovative technologies, applying insights to enhance detection and response strategies. Support evaluations and integration of new cybersecurity tools and platforms. Foster continuous improvement initiatives in tooling, automation, and operational processes. Responsible to ensure compliance with applicable external and internal regulations, procedures, and guidelines. Living Hitachi Energy s core values of safety and integrity, which means taking responsibility for your own actions while caring for your colleagues and the business. Your background: Bachelors or master s degree in relevant field. A minimum of 2-3 years in cybersecurity (OT/IT), emphasizing operational procedures in threat monitoring and incident management. A grasp of the IT/OT Threat Landscape. Proficiency in threat detection engineering automation, including the entire Use Case lifecycle. Hands-on experience or strong interest in Microsoft Azure security solutions, particularly Azure Sentinel, including developing detection rules and automations using Kusto Query Language (KQL). Familiarity with Azure cloud infrastructure and enthusiasm for leveraging cloud-native technologies in detection engineering and security monitoring. Hands-on experience with security tech, like firewalls, anomaly detection tools, EDR, and IDS. A foundational understanding of security standards and frameworks such as NIST, CIS, MITRE ATTCK, and the Cyber Kill Chain. Experience in roles such as SOC, CSIRT, or CSOC would be advantageous. Effective communication skills, allowing you to articulate security issues to peers, stakeholders, and clients. Proficiency in both spoken written English language is required and German language skills would be a significant asset. Qualified individuals with a disability may request a reasonable accommodation if you are unable or limited in your ability to use or access the Hitachi Energy career site as a result of your disability. You may request reasonable accommodations by completing a general inquiry form on our website. Please include your contact information and specific details about your required accommodation to support you during the job application process. .

Posted 1 week ago

Apply

8.0 - 12.0 years

13 - 17 Lacs

Hyderabad

Work from Office

Naukri logo

Job : Cloud Infra and Devops Lead Jobs in Hyderabad (J49135)- Job in Hyderabad Cloud Infra and Devops Lead (Job Code : J49135) Job Summary 8 - 12 Years Cloud Infra and Devops Lead BE-Comp/IT, BE-Other, BTech-Comp/IT, BTech-Other, MCA Stream of Study: Computer Science/IT IT-Software/Software Services IT Software - Application Programming / Maintenance Key Skills: Cloud Services Docker and Kubernetes Job Post Date: Sunday, June 15, 2025 Company Description Our client is a global knowledge practice that provides consulting, technology, engineering, management and innovation services to leading businesses, governments, non-governmental organizations and not-for-profits. We focus on gaining, refining and sharing expertise in the energy and utility sector, then provide strategic advice and implement outcome-driven solutions. Working with customers across the utility value chain, we deliver sustainable and lasting improvements to their efficiency and performance, adding value to their bottom line. Demand for power, gas and water is consistently growing as the population of the planet expands. Our goal is to support large consumers of energy and water, and improve the sustainability of resources by increasing efficiency and optimizing existing operations. We also develop commercially successful ways to use renewable resources which deliver transformative advantages for our customers. As demand grows so does opportunity, something Enzen has seized on since its inception in 2006. The business has grown and developed across the globe, with a physical presence in the UK, India, Australia, USA, Spain, Turkey, Middle-East, Africa and Kazakhstan. As we push into the second decade of the company, we`re super-charging our growth by delivering exceptional value and results to our customers. For people with the right mindset, the opportunity to develop and grow in the organization has never been greater. Our expanding solutions, services and geographies mean we`re always on the lookout for individuals who can drive positive change and are hungry for the success and rewards that go with it. Job Description "Deep understanding of cloud platforms (AWS, Azure) and cloud-native services. Expertise in CI/CD tools (Jenkins, GitLab CI, Azure DevOps, etc. ). Hands-on with Infrastructure as Code tools like Terraform. Biceps CloudFormation, ARM templates would be added advantage Knowledge in Kubernetes, Docker, and container orchestration. Strong understanding of networking, security, monitoring, and logging tools. Familiarity with automation tools like Ansible, Chef, or Puppe"

Posted 1 week ago

Apply

12.0 - 15.0 years

55 - 60 Lacs

Ahmedabad, Chennai, Bengaluru

Work from Office

Naukri logo

Dear Candidate, We are seeking a Security Operations Engineer to monitor, detect, investigate, and respond to security incidents and threats across systems and networks. Key Responsibilities: Monitor alerts and logs using SIEM tools (Splunk, QRadar, Sentinel). Analyze security incidents, conduct root cause analysis, and coordinate response. Support threat hunting and vulnerability assessments. Maintain and tune security tools (IDS/IPS, endpoint protection, firewalls). Document incident reports and provide remediation recommendations. Required Skills & Qualifications: Experience in a Security Operations Center (SOC) or similar role. Strong knowledge of cybersecurity concepts and incident response. Familiarity with EDR tools (CrowdStrike, Carbon Black) and log analysis. Scripting and automation skills for detection and response tasks. Security certifications such as CEH, CompTIA Security+, or GCIA are beneficial. Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Srinivasa Reddy Kandi Delivery Manager Integra Technologies

Posted 1 week ago

Apply

0.0 - 1.0 years

1 - 2 Lacs

Kochi

Work from Office

Naukri logo

A monitoring executive is responsible for overseeing and ensuring the proper functioning of systems, processes, or activities. This includes tasks like data monitoring, system surveillance, maintaining operational efficiency

Posted 1 week ago

Apply

12.0 - 17.0 years

20 - 25 Lacs

Bengaluru

Work from Office

Naukri logo

Number of Openings 3 ECMS ID in sourcing stage TS-ID-15358 Assignment Duration 6 Months Total Yrs. of Experience 12+ years Relevant Yrs. of experience 10 +years Detailed JD (Roles and Responsibilities) Crypto Mainframe Engineer Position Overview We are seeking an experienced Crypto Mainframe Engineer to join our team. The ideal candidate will have a minimum of 10 years of experience working in financial institutions and a strong background in using KeyFactor PrimeKey. This is a unique opportunity to work on cutting-edge encryption technologies and ensure the security of our financial systems Key Responsibilities Design, implement, and maintain cryptographic systems on mainframe platforms. Utilize KeyFactor PrimeKey to manage and deploy cryptographic keys and certificates. Ensure the security and integrity of financial data through the application of advanced encryption techniques. Collaborate with cross-functional teams to integrate cryptographic solutions into existing systems Monitor and respond to security incidents related to cryptographic systems. Keep abreast of the latest developments in cryptography and implement best practices Provide technical guidance and mentorship to junior engineers and staff Qualifications Bachelors degree in Computer Science, Information Security, or a related field Minimum of 10 years of experience working in financial institutions Extensive experience with KeyFactor PrimeKey for key and certificate management Strong understanding of cryptographic algorithms and protocols Knowledge of mainframe systems and their security features Experience with incident response and security monitoring Excellent problem-solving and analytical skills Strong communication and teamwork skills. Preferred Skills Masters degree in a relevant field Experience with EKMF and other mainframe cryptography Certifications in cryptography or information security (e.g., CISSP, CISM) Experience with other cryptographic tools and technologies Knowledge of regulatory requirements in the financial sector. Domain Crypto Mainframe Engineer Max Vendor Rate in Per Day (Currency in relevance to work location) 12000 INR Work Location given in ECMS ID Bangalore/Pune WFO/WFH/Hybrid WFO Hybrid BG Check (Before OR After onboarding) As per Infosys Policy Is there any working in shifts from standard Daylight (to avoid confusions post onboarding) YES/ NO NO

Posted 1 week ago

Apply

3.0 - 5.0 years

2 - 3 Lacs

Hyderabad

Work from Office

Naukri logo

Age limit upto 53 years Must be an Ex serviceman in Army/Navy with relevant experience into security. Must have experience in fire fighting,Fire Alarm System,Security operations. Preferably from Telangana or Andhra Pradesh ( Hyderabad preferred)

Posted 1 week ago

Apply

10.0 - 20.0 years

3 - 4 Lacs

Mohali

Work from Office

Naukri logo

Fortis Hospital Mohali is hiring Security Supervisor from Amry retired. interested candidates can come directly for the interview or share resume at baljinder.singh@fortishealthcare.com

Posted 1 week ago

Apply

1.0 - 2.0 years

3 - 4 Lacs

Karnal

Work from Office

Naukri logo

Responsibilities: Monitoring sites (Convenience stores, gas stations, etc.) for our end clients/customers. Assisting employees located overseas remotely via phone or camera. Creating reports for any suspicious activities for employees working at the remote site (overseas) or for customers present at the site. You will act as a virtual supervisor for the sites, in terms of assuring the safety of the employees located overseas and requesting them to complete assigned tasks. Basic Qualifications: Must have 12th or Graduated or graduation pursuing. Must have 1-2 years of experience. Basic computer skills are required as 100% of our work is on computers. Good communication skills. Self-learner. Shift Timings: Morning Shift 7am to 3 pm (Prefer Female & Male candidate) Evening Shift 3pm to 11pm (Prefer Female & Male candidate) Night Shift 11pm to 7am (Prefer Male candidate only)

Posted 1 week ago

Apply

2.0 - 7.0 years

7 - 11 Lacs

Mumbai

Work from Office

Naukri logo

As SIEM Analyst, you will be responsible for handling the daily monitoring of Information security events on the SIEM tools. Come join our team of IBM experts, who are leaders with vision, distinguished engineers and IT architects who have worked with thousands of clients to transform enterprise IT, migrate to cloud, apply automation and ensure business continuity. We help client run their IT better, accelerate innovation and deliver unmatched performance with the power automation. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to explore new opportunities every single day. And if you relish the freedom to bring creative, thoughtful solutions to the table, there's no limit to what you can accomplish here. * Responsible for security researcher to provide insight and understanding of new and existing information security threats * Responsible to participate in recommending improvements to SOC security process, procedures, policies, security incident management and vulnerability management processes * You will be involved in evaluating, recommending, implementing, and solving problems related to security solutions and evaluating IT security of the new IT Infrastructure systems * Keep yourself up-to-date with emerging security threats including applicable regulatory security requirements * Work in a 24x7 Security Operation Centre (SOC) environment Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise * Minimum 2+ years’ experience in SIEM. * Proven expertise in handling the daily monitoring of Information Security events on the QRadar / ArcSight / Splunk console platform * Proficient in monitoring security events from various SOC channels (SIEM, Tickets, Email and Phone), based on the security event severity to handle the service support teams, tier2 information security specialists * Expertise in threat modelling and Use case development and ability to review policies of security monitoring tools based on security concepts and logical approach. Preferred technical and professional experience * Preferred OEM Certified SOAR specialist + CEH * Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work * Intuitive individual with an ability to manage change and proven time management * Proven interpersonal skills while contributing to team effort by accomplishing related results as needed * Up-to-date technical knowledge by attending educational workshops, reviewing publications

Posted 1 week ago

Apply

4.0 - 8.0 years

6 - 11 Lacs

Chennai

Work from Office

Naukri logo

Lennox (NYSE: LII) Driven by 130 years of legacy, HVAC and refrigeration success, Lennox provides our residential and commercial customers with industry-leading climate-control solutions. At Lennox, we win as a team, aiming for excellence and delivering innovative, sustainable products and services. Our culture guides us and creates a workplace where all employees feel heard and welcomed. Lennox is a global community that values each team member s contributions and offers a supportive environment for career development. Come, stay, and grow with us. Job Description Pursue specialization in specific areas of security operations, such as threat hunting, malware analysis, or digital forensics, through targeted training and hands-on experience. Utilize Splunk SIEM and CrowdStrike EDR tools to monitor, detect, and respond to security incidents. Develop and execute security monitoring strategies and initiatives, working closely with the SOC management team to align efforts with organizational goals. Create and maintain standard operating procedures (SOPs) to ensure consistent and effective security operations. Support Monitoring Team to take remote session with user for troubleshooting the user machines to remove malware Lead the preparation and delivery of weekly presentations to provide executive-level insights into SOC operations, including key metrics, trends, and emerging threats. Take ownership of false positive report preparations, ensuring accurate identification and documentation of false positives to improve detection and response capabilities. Shift-leading capabilities, managing SOC operations during assigned shifts, including supervision of GET/Associate Security Analysts and coordination of incident response activities. Collaborate with the Security Specialist team on high-priority security incidents, providing expertise and assistance as needed to facilitate incident resolution. Flexible to Provide support to 24/7 L1 Monitoring shift members. Qualifications Proven experience using Splunk SIEM, including the ability to analyze prepared use cases, contribute to the creation of custom dashboards, and fine-tune false positive alerts. Good knowledge of SIEM architecture. Excellent skills in email security incident handling, including investigating phishing emails and providing verdicts, as well as basic knowledge of Office 365 Email Exchange. Experience with CrowdStrike EDR for security monitoring and threat detection, along with static and dynamic malware analysis and interactive sandbox report analysis capabilities. ITIL tool experience, particularly with Service-Now. Exposure to firewall and WAF log analysis. Strong knowledge of security SOP creation and maintenance. Basic knowledge of file integrity monitoring. Understanding of security compliance frameworks such as PCI and NIST. Basic understanding of vulnerability management and experience with tools such as Rapid7 and Nessus. Experience with cloud security monitoring, including AD risky detections and Defender for Cloud. Excellent communication and presentation skills. Commitment to continuous learning and professional development. Flexibility to work shifts from 1 PM to 10 PM and 3 PM to 12 AM.

Posted 1 week ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

Chennai

Work from Office

Naukri logo

Pursue specialization in specific areas of security operations, such as threat hunting, malware analysis, or digital forensics, through targeted training and hands-on experience. Utilize Splunk SIEM and CrowdStrike EDR tools to monitor, detect, and respond to security incidents. Develop and execute security monitoring strategies and initiatives, working closely with the SOC management team to align efforts with organizational goals. Create and maintain standard operating procedures (SOPs) to ensure consistent and effective security operations. Support Monitoring Team to take remote session with user for troubleshooting the user machines to remove malware Lead the preparation and delivery of weekly presentations to provide executive-level insights into SOC operations, including key metrics, trends, and emerging threats. Take ownership of false positive report preparations, ensuring accurate identification and documentation of false positives to improve detection and response capabilities. Shift-leading capabilities, managing SOC operations during assigned shifts, including supervision of GET/Associate Security Analysts and coordination of incident response activities. Collaborate with the Security Specialist team on high-priority security incidents, providing expertise and assistance as needed to facilitate incident resolution. Flexible to Provide support to 24/7 L1 Monitoring shift members. Qualifications Proven experience using Splunk SIEM, including the ability to analyze prepared use cases, contribute to the creation of custom dashboards, and fine-tune false positive alerts. Good knowledge of SIEM architecture. Excellent skills in email security incident handling, including investigating phishing emails and providing verdicts, as well as basic knowledge of Office 365 Email Exchange. Experience with CrowdStrike EDR for security monitoring and threat detection, along with static and dynamic malware analysis and interactive sandbox report analysis capabilities. ITIL tool experience, particularly with Service-Now. Exposure to firewall and WAF log analysis. Strong knowledge of security SOP creation and maintenance. Basic knowledge of file integrity monitoring. Understanding of security compliance frameworks such as PCI and NIST. Basic understanding of vulnerability management and experience with tools such as Rapid7 and Nessus. Experience with cloud security monitoring, including AD risky detections and Defender for Cloud. Excellent communication and presentation skills. Commitment to continuous learning and professional development. Flexibility to work shifts from 1 PM to 10 PM and 3 PM to 12 AM.

Posted 1 week ago

Apply

7.0 - 12.0 years

25 - 35 Lacs

Noida, Chennai, Bengaluru

Work from Office

Naukri logo

Roles and Responsibilities Conduct threat hunting activities to identify potential security threats and vulnerabilities. Analyze malware samples using various tools such as QRadar, Splunk, and ArcSight. Perform incident response duties including handling incidents, conducting root cause analysis, and implementing remediation measures. Monitor security event logs from multiple sources to detect anomalies and potential security breaches. Collaborate with other teams to develop threat intelligence reports and improve overall security posture. Desired Candidate Profile 7-12 years of experience in Security Operations Center (SOC) or related field. Strong understanding of incident response, threat analysis, threat intelligence gathering, log analysis, and security monitoring concepts. Proficiency in tools like QRadar, Splunk, ArcSight for malware analysis and incident response tasks.

Posted 1 week ago

Apply

8.0 - 13.0 years

15 - 30 Lacs

Mumbai

Work from Office

Naukri logo

Position: Third Party Risk Management (TPRM) Manager Location: Mumbai Reports to: CISO Key Responsibilities: Due Diligence & Risk Assessment: Perform thorough due diligence on third-party vendors, evaluating operational, security, compliance, and financial risks. Vendor Monitoring & Reporting: Continuously assess and monitor third-party risks, security postures, and contract compliance. Report risk status to senior management. Risk Mitigation & Incident Management: Implement risk mitigation strategies and lead incident management for third-party breaches or failures. Cross-Department Collaboration: Work with procurement, legal, IT, and other business units to ensure third-party contracts and security align with risk management strategies. Technical Skills & Tools: Risk Management Tools: Experience with RSA Archer, MetricStream, or LogicManager for risk assessments, vendor scoring, and compliance tracking. Security Monitoring: Proficiency in SIEM tools like Splunk, IBM QRadar, and ArcSight for detecting, analyzing, and managing third-party security events. Vulnerability Management: Hands-on experience with Tenable.io, Qualys, or Rapid7 Nexpose for vulnerability scanning and management. Third-Party Management Platforms: Familiarity with OneTrust, ProcessUnity, or Prevalent for ongoing third-party risk assessments and monitoring. Incident Response: Experience using tools like ServiceNow or PagerDuty for handling third-party security incidents and coordinating remediation actions. IAM Tools: Working knowledge of Okta, CyberArk for ensuring secure vendor access to bank systems. Qualifications: Education: Bachelor's degree ISO/IEC 27001 Lead Implementer PCI DSS Certified Information Systems Auditor (CISA) Strong analytical skills with the ability to assess and mitigate complex third-party risks. Excellent communication and stakeholder management skills. Ability to navigate regulatory environments and ensure compliance with third-party risk policies. Ability to drive strategic risk management initiatives while handling day-to-day operational challenges. Interested candidates can share CV at jeshant.katoch@paytmbank.com

Posted 1 week ago

Apply

15.0 - 20.0 years

3 - 7 Lacs

Hyderabad

Work from Office

Naukri logo

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Accenture MxDR Ops Security Threat Analysis Good to have skills : NAMinimum 2 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. You will provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Be a crucial part of ensuring the security of the organization's digital assets and operations. Roles & Responsibilities:Perform security monitoring by analyzing logs, traffic and alerts generated by variety of device technologiesTimely response to customer requests like detection capabilities, tuning, etc.Research new threats and provide recommendations to enhance detection capabilitiesStrong desire for continuous learning on vulnerabilities, attacks and countermeasures Identify opportunities for process improvement Professional & Technical Skills: Experience in SOC operations with customer-facing responsibilitiesDeep understanding on cyber security fundamentals, security devices, network defense concepts and threat landscapeHands-on experience in SIEM and threat hunting tools Added advantage in working with any SOAR platformDesirable knowledge in any scripting language and EDR productsStrong customer service and interpersonal skillsStrong problem-solving skillsAbility to communicate clearly at all levels, demonstrating strong verbal and written communication skills.Adaptability to accept change Additional Information:Work as part of analysis team that works 24x7 on a rotational shift Minimum a bachelors or a masters degree in addition to regular 15- year full time educationThe candidate should have minimum 2 years of experience This position is based at our Chennai office. Qualification 15 years full time education

Posted 1 week ago

Apply

5.0 - 9.0 years

7 - 13 Lacs

Bengaluru

Work from Office

Naukri logo

Job Description: 5+ years of experience in Security Operations Center and Threat Hunting. Develop and refine threat hunting techniques and tools. Experience in monitoring and alert handling in QRadar SIEM. In-depth knowledge of advanced persistent threats (APTs) and attack vectors. Collaborate with threat intelligence teams to integrate new threat data into hunting processes. Security incident handling and reporting. Experienced in EDR alert analysis, preferably Sentinel One. Preferred candidate profile Bachelor's degree in computer science, Information Security, or related field. Should be flexible to work in 24/7 rotational shifts. Should possess good communication skills.

Posted 1 week ago

Apply

6.0 - 9.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

Job Title: Senior GCP Data Engineer Location: Chennai, Bangalore, Hyderabad Experience: 6-9 Years Job Summary: We are seeking a GCP Data & Cloud Engineer with strong expertise in Google Cloud Platform services, including BigQuery, Cloud Run, Cloud Storage , and Pub/Sub . The ideal candidate will have deep experience in SQL coding , data pipeline development, and deploying cloud-native solutions. Key Responsibilities: Design, implement, and optimize scalable data pipelines and services using GCP Build and manage cloud-native applications deployed via Cloud Run Develop complex and performance-optimized SQL queries for analytics and data transformation Manage and automate data storage, retrieval, and archival using Cloud Storage Implement event-driven architectures using Google Pub/Sub Work with large datasets in BigQuery , including ETL/ELT design and query optimization Ensure security, monitoring, and compliance of cloud-based systems Collaborate with data analysts, engineers, and product teams to deliver end-to-end cloud solutions Required Skills & Experience: 3+ years of experience working with Google Cloud Platform (GCP) Strong proficiency in SQL coding , query tuning, and handling complex data transformations Hands-on experience with: BigQuery Cloud Run Cloud Storage Pub/Sub Understanding of data pipeline and ETL/ELT workflows in cloud environments Familiarity with containerized services and CI/CD pipelines Experience in scripting languages (e.g., Python, Shell) is a plus Strong analytical and problem-solving skills

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies