Jobs
Interviews

3 Securonix Siem Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 7.0 years

0 Lacs

chennai, tamil nadu

On-site

You will be responsible for performing deep-dive investigations on security incidents using Securonix SIEM. Your role will involve correlating alerts and utilizing UEBA to detect anomalies and insider threats. Additionally, you will be expected to fine-tune detection rules to reduce false positives in Securonix and conduct threat hunting to identify unknown threats using behavioral analytics. Moreover, you will investigate security events such as ransomware, APTs, data exfiltration, and privilege escalations. Collaborating with L3 analysts, you will help develop playbooks and automation through SOAR integration. You will also provide guidance to L1 analysts and support security awareness training initiatives. Furthermore, your responsibilities will include generating reports on security trends and SOC performance to ensure effective monitoring and response to potential threats.,

Posted 2 days ago

Apply

2.0 - 4.0 years

7 - 8 Lacs

Bengaluru

Work from Office

Exp: 3 to 4 yrs Location: Bangalore (Base Location) willing to travel Dubai (Client Location) Availability: Immediately No. Of Positions: 2 JD :- - Candidate should have good understanding of cloud - Any SIEM tool experience is preferred (They have Securonix SIEM PS support available so candidate is not expected to work on Securonix side configuration but should understand how the integration works with any SIEM solution) - candidate should have good understanding of cloud integration methods available (Cloud-native connectors, API-based ingestion, agent-based) - Should have an understanding of the cloud models ( IaaS, PaaS, SaaS security responsibilities in each) - Should have an understanding of the Logging Services : AWS CloudWatch and Azure Monitor - Scripting & Automation knowledge is preferred: Python, PowerShell, Bash for automation and log parsing, Lambda functions, Azure Logic Apps, Amazon EventBridge.

Posted 1 month ago

Apply

1.0 - 4.0 years

4 - 8 Lacs

Chennai

Work from Office

Responsibilities: Monitor and analyze security alerts generated by Securonix SIEM . Perform initial triage of security incidents based on risk scores and behavioral analytics. Escalate security incidents to L2 for deeper investigation. Assist in fine-tuning Securonix correlation rules to reduce false positives. Document incidents, investigation steps, and outcomes in the incident management system. Support phishing investigations and basic threat analysis. Follow standard operating procedures (SOPs) for incident response. Requirements: Bachelors degree in Cybersecurity, IT, or related field. Basic knowledge of SIEM and User Entity Behavior Analytics (UEBA) . Understanding of security frameworks (NIST, SOC 2, MITRE ATT&CK). Strong analytical skills and attention to detail. Certificationslike Securonix Security Analyst, Security+, or Microsoft SC-900 (preferred).

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies