Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
0.0 years
0 - 0 Lacs
Gurugram
Work from Office
About the Team: The Fraud Preventions & LEA management team under Risk Operations manages the LEA queries and resolutions through immediate responses and gathering requisite response from different business units within PayU. The team consists of 8-10 members ranging Execs to Sr.Manager level employees who reports in to Head of Investigations. About the Role: The role requires a person to be well versed with the nodal functions of financial sectors and should be able to handle the LEA (Law Enforcement Agencies) queries and represenatations and enhance internal processes to manage the LEA requirements within timlines and develop cordial relationship with multiple LEA’s/Regulatory(MHA, RBI, CBI, CID, Cyber Crime, Stae Police etc.) across india. Responsibilities: Handling daya to day LEA/regulatory enquiries received by Payu through multiple channels/sources and resolve within the timelines as per regulations. Liaising internally within the PayU India organization for collection of data, documents and factual inputs for providing timely and accurate responses within timelines. Good Knowledge about Cybercrime / Financial frauds with Banks/Cards etc. Exp. in handling RBI and Regulatory enquiries/cases. Handling cases relted to Acquiring and issuing banks. Risk monitoring for merchants and suspicion reporting. Dealing with Cyber Police Officials & Banks over phone call and assisting them as per the requirement as point of contact (case to case basis). Dealing with merchants to fetch the details or reolve disputes received through LEA/Regulatory. Daily case closure and reporting tracker update/upload. Requirements: Graduate with experience in same field is preferred. Experience in handling of Cyber crime and other financial frauds of cards misuses etc. Team player, who is eager to develop/learn and work towards team objectives. What we offer? A positive, get-things-done workplace A dynamic, constantly evolving space (change is par for the course – important you are comfortable with this) An inclusive environment that ensures we listen to a diverse range of voices when making decisions. Ability to learn cutting edge concepts and innovation in an agile start-up environment with a global scale Access to 5000+ training courses accessible anytime/anywhere to support your growth and development (Corporate with top learning partners like Harvard, Coursera, Udacity) About us: At PayU, we are a global fintech investor and our vision is to build a world without financial borders where everyone can prosper. We give people in high growth markets the financial services and products they need to thrive. Our expertise in 18+ high-growth markets enables us to extend the reach of financial services. This drives everything we do, from investing in technology entrepreneurs to offering credit to underserved individuals, to helping merchants buy, sell, and operate online. Being part of Prosus, one of the largest technology investors in the world, gives us the presence and expertise to make a real impact. Find out more at www.payu.com Our Commitment to Building A Diverse and Inclusive Workforce As a global and multi-cultural organization with varied ethnicities thriving across locations, we realize that our responsibility towards fulfilling the D&I commitment is huge. Therefore, we continuously strive to create a diverse, inclusive, and safe environment, for all our people, communities, and customers. Our leaders are committed to create an inclusive work culture which enables transparency, flexibility, and unbiased attention to every PayUneer so they can succeed, irrespective of gender, color, or personal faith. An environment where every person feels they belong, that they are listened to, and where they are empowered to speak up. At PayU we have zero tolerance towards any form of prejudice whether a specific race, ethnicity, or of persons with disabilities, or the LGBTQ communities.
Posted 2 hours ago
3.0 - 4.0 years
4 - 8 Lacs
Hyderabad
Work from Office
Job Description Learn to create automated workflows and scripts to improve security operations and incident response. Develop, test, and implement automation scripts using tools such as Python, PowerShell, and other scripting languages. Gain hands-on experience working with various security tools and platforms (e.g., SIEM, IDS/IPS, firewalls) to integrate and automate processes. Collaborate with Security and IT teams to ensure seamless integration of automation solutions. Assist in automating repetitive tasks in incident detection, investigation, and response to improve efficiency and accuracy. Learn to develop playbooks and automated response actions for common security incidents Stay updated with the latest cybersecurity trends, threats, and automation technologies. Identify opportunities for process improvements and recommend innovative automation solutions. Document automation processes, scripts, and workflows. Strong understanding of cybersecurity principles, threats, and best practices. Familiarity with DevSecOps practices and integrating security into CI/CD pipelines. Knowledge of cloud security and automation in cloud environments (AWS, Azure, GCP)
Posted 5 hours ago
7.0 - 10.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
About The Company Tata Communications Redefines Connectivity with Innovation and IntelligenceDriving the next level of intelligence powered by Cloud, Mobility, Internet of Things, Collaboration, Security, Media services and Network services, we at Tata Communications are envisaging a New World of Communications Roles/Responsibilities Experience in SIEM Tool like ArcSight, LogRhythm SIEM, Threat Intelligence, Malware Analysis, Incident Response Experience in handling SOC customer in MSSP/multi-tenant environment Responsible for the technical Administration or troubleshooting in SIEM ensuring the efficient functionality of the solution Responsible for Incident Validation, Incident Analysis, Solution Recommendation, Good knowledge on implementation, installation, integration troubleshooting and overall functionalities of LogRhythm/ArcSight/QRadar/Splunk Arc Sight/LR/QRadar platform administration, management experience, platform upgrade Experience in troubleshooting platform related issues, Data backup, restoration, retention Experience in creating content based on MITRE Framework Exposure to SOAR, alert aggregation, automation, Playbook creation ArcSight/LR rule base fine tuning, Ongoing log source modifications, Configuration/policy changes, General SIEM Administration, SIEM Content Development Troubleshooting of an incident within IT Security incident response teams of SOC. Maintains awareness of new and emerging cyber-attack threats with potential to harm company systems and networks. Devises and implements countermeasures to mitigate potential security threats. Assists with the development and maintenance of IT security measurement and reporting systems to aid in monitoring effectiveness of IT Security programs. Assists with the development, revision, and maintenance of Standard Operating Procedures and Working Instructions related to IT Security. Good Coordination skills with various other teams for faster resolution/completion. Good to have threat hunting knowledge. Education/Skills BE/B.Tech or equivalent with minimum 7-10 years of experience Work experience of minimum 6 years in SOC Incident Handling, Incident Response Trend Analysis, administration/monitoring of SIEM Tool like ArcSight, LogRhythm SIEM, Threat Intelligence, Malware Analysis, Ability to adapt and follow the processes and guidelines Possess an impeccable work ethic and a high degree of integrity Good Analytical & Problem Solving skills Able to communicate with technical staff/management Flexible to work after office and over weekend if required Highly motivated & customer centric
Posted 6 hours ago
12.0 years
0 Lacs
Chennai, Tamil Nadu, India
On-site
About The Company Tata Communications Redefines Connectivity with Innovation and IntelligenceDriving the next level of intelligence powered by Cloud, Mobility, Internet of Things, Collaboration, Security, Media services and Network services, we at Tata Communications are envisaging a New World of Communications Job Description seeking a highly motivated and experienced Technical Account manager/Engagement lead. In this customer-facing role, candidate will be responsible for overseeing the successful delivery and services assurance support lifecycle for services (Managed Hosting , Public cloud , Managed security services, Managed connectivity like MPLS, ILL , End user support etc) offered to end customer directly at our client's locations. You will be the primary point of contact for our clients, ensuring enhanced customer experience & may also need to work from customer location if required. Responsibilities Manage the Technical post-sales relationship for accounts. Serve as the primary technical client contact and advocate for day to day and escalated issues and requests Establish and maintain customer satisfaction across accounts through account planning, proactive client communications, issue remediation and containment, and performance measurement. Protect existing revenue streams, additional revenue generation. Actively farm existing account base to identify new solutions or service opportunities. Provide valuable account information and insight to support the sales force. Build and execute an account specific relationship framework inclusive of regularly schedule status calls, quarterly business reviews, account documentation, reference management and account planning sessions. Leverage internal subject matter experts to help customers optimize their investment, ensure program objectives are being met and measure the value of the solution to their organizations. Coordinate activities and provide leadership on directions of key projects, initiatives and issues across internal business unites. Conduct regular briefings on account status to senior management and other internal stakeholders. Responsible for Capacity reports, Risk tracking & Service Improvement plans for managed accounts Preparing a POA & Leading Major activity e.g. DC – DR drill, Handover post deployment Regularly phase out Service Improvement plans (Technical & Process) to customer & maintain a related tracker Should also be able to drive related Customer Project deliverables. Should be able to do customer Architectural review with a expected expertise area on Linux , Windows , Middleware May need to work from customer location ( if business demands ) Tracking Inventory including licenses SLA reconciliation and resolving associated billing disputes. Support, Revenue enhancement through accelerated deliveries. Lead internal transition projects Desired Skill sets & requirement Total Experience of 12 to 15 years with 4+ years’ experience in Technical account management/Technical client relationship supporting/Engagement Lead ( single point of contact ) Experience with Virtualization, clustering Exposure on Public Cloud ( Azure Or AWS ) with mandatory Expert Certification Exposure to Firewalls, Proxies (physical and cloud), IDS / IPS. Exposure to SIEM, Zscaler. Exposure to UCC/IP telephony, MPLS, ILL Technical understanding of Linux operating systems Technical understanding of Storage and Backups Experience on License management Understanding of emerging Information Security trends and position for customers. Excellent analytical and problem-solving skills. Excellent logical reasoning to assess technical issues. Capacity Management for customer infrastructure and services. Risk Identification and tracking for Customer infra & SOP preparation Leading customer calls ( especially to front end P1 incidents ) Experience on Public Cloud and getting into conclusion on the purpose of the call. Ability to audit customer infrastructure and suggest improvements. Ability to forecast churn and upgrades for account base. Ability to tailor message formats and contents to the audience and get heard. Ability to manage multiple initiatives simultaneously. Comfortable dealing with complex customer relationships, decision processes and competing agendas Ability to travel for customer meeting/service reviews. Preferred BE, Btech or MCA,
Posted 6 hours ago
0 years
8 - 20 Lacs
Shimla
Remote
Network Security Engineer Location- Shimla, HP Work shift- 6 days in a week Roles and Responsibilities Manage secure and redundant routing and switching infrastructure to ensure 24x7 availability of critical services. Implement network segmentation to enhance security, improve performance, and isolate faults across departments. Ensure VPN connectivity (IPSec/SSL) for remote offices and departments in line with security policy frameworks. Deploy, configure, and maintain Next Generation Firewalls (NGFWs) for traffic inspection, threat prevention, and application control. Operate Anti-DDoS solutions to counter volumetric and protocol-based attacks. Enforce Web Application Firewall (WAF) protections for public-facing applications and servers. Utilize Anti-APT solutions to detect, analyze, and contain advanced persistent threats. Administer Software and Link Load Balancers to ensure service uptime and bandwidth optimization across multiple ISP connections. Design and maintain high-availability security architectures for critical enterprise applications. Deploy and manage Endpoint Security tools including antivirus, device control, and policy enforcement for desktops, laptops, and servers. Monitor and control sensitive data using Data Loss Prevention (DLP) tools aligned with organizational data classification guidelines. Integrate and operate EDR/XDR solutions for continuous endpoint monitoring and incident response. Implement malware protection tools for both end-user and server environments. Enforce Access Control Policies including role-based access, least privilege, and scheduled access reviews. Implement data encryption standards and manage secure key handling and PKI-based authentication mechanisms. Operate Intrusion Detection/Prevention Systems (IDS/IPS) to identify and mitigate malicious traffic. Analyze logs and security events using SIEM tools to uncover policy violations and emerging threats. Lead incident response efforts in coordination with CERT-In, Third Party Auditors (TPA), and MeitY in case of security breaches. Desired Skills/Background Certifications: CCNP Security, Fortinet NSE, or JNCIS-SEC (mandatory). Strong grasp of network and cybersecurity principles, standards, and best practices. Hands-on experience with firewalls, VPNs, IDS/IPS, load balancers, DLP, SIEM, EDR/XDR, and endpoint protection technologies. Excellent analytical, problem-solving, and troubleshooting capabilities. Ability to manage complex, high-availability security architectures in enterprise-scale environments. Proven experience in incident handling, root cause analysis, and working with regulatory bodies and third parties. Job Types: Full-time, Permanent Pay: ₹827,684.83 - ₹2,032,853.26 per year Schedule: Day shift Supplemental Pay: Performance bonus Work Location: In person
Posted 6 hours ago
6.0 years
0 Lacs
Cochin
On-site
The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Requirements Must-haves: Must have experience in SIEM, Threat hunting and Team management 6-8 Year Experience as SOC Analyst – (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Knowledge of creating and modifying the dashboards. Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows Deep Knowledge in SIEM, Ticketing tool, EDR, Vulnerability Management, MimeCast, DMARC tool. Excellent written and verbal communication skills. Good to have: · Good to have industry certifications on any SIEM Platform, CEH, C|SA, CompTIA Security+ & Others Main Responsibilities Tier 1 SOC analysts are incident responders, remediating serious attacks escalated from junior analyst, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments(CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Leading efforts to counter SLA breaches and anticipating the likelihood of future security alerts,incidents. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone),based on the security event severity and suspicious activities, escalate to managed service support teams, tier 2 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when newthreats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. · Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Keep updated with the likes of OWASP Top 10 vulnerabilities, Bleeping Computer articles etc., for acquiring the knowledge over current threats in security perspective. Other responsibilities and additional duties as assigned by the security management team or service delivery manager. Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting Job Type: Full-time Work Location: In person
Posted 6 hours ago
4.0 years
0 Lacs
Hyderābād
On-site
About this role: Wells Fargo is seeking a highly motivated and experienced Senior software Engineer (SailPoint IIQ Developer) to join our team. In this role, you will be responsible for the design, development, implementation, and support of our Identity and Access Management (IAM) solutions using SailPoint IdentityIQ (IIQ). The ideal candidate will be a hands-on developer with a strong understanding of IAM principles and a proven track record of successfully implementing and customizing SailPoint IIQ. In this role, you will: Lead moderately complex initiatives and deliverables within technical domain environments Contribute to large scale planning of strategies Design, code, test, debug, and document for projects and programs associated with technology domain, including upgrades and deployments Review moderately complex technical challenges that require an in-depth evaluation of technologies and procedures Resolve moderately complex issues and lead a team to meet existing client needs or potential new clients needs while leveraging solid understanding of the function, policies, procedures, or compliance requirements Collaborate and consult with peers, colleagues, and mid-level managers to resolve technical challenges and achieve goals Lead projects and act as an escalation point, provide guidance and direction to less experienced staff Required Qualifications: 4+ years of Software Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education Desired Qualifications: Strong years of hands-on experience developing and implementing SailPoint IIQ solutions. Strong understanding of Identity and Access Management (IAM) principles and concepts. Experience with Java, BeanShell/JavaScript, XML, and SQL. Experience with configuring and customizing SailPoint IIQ connectors. Experience with developing custom workflows, rules, forms, and reports in SailPoint IIQ. Experience with integrating SailPoint IIQ with other enterprise systems. Proficient in SailPoint IIQ development and configuration. Strong analytical and problem-solving skills. Excellent communication and interpersonal skills. Ability to work independently and as part of a team. Ability to manage multiple tasks and priorities. Job Expectations: Design and Development: Design, develop, and implement SailPoint IIQ solutions to meet business requirements. Develop custom workflows, rules, forms, and reports within SailPoint IIQ. Configure and customize SailPoint IIQ connectors for various target systems (e.g., Active Directory, databases, cloud applications). Write and maintain technical documentation related to SailPoint IIQ configurations and customizations. Implementation and Integration: Participate in the full software development lifecycle, including requirements gathering, design, development, testing, and deployment. Integrate SailPoint IIQ with other enterprise systems, such as HR systems, ticketing systems, and security information and event management (SIEM) systems. Perform unit testing and integration testing of SailPoint IIQ configurations and customizations. IAM Best Practices: Adhere to IAM best practices and security standards. Stay up-to-date on the latest SailPoint IIQ features and capabilities. Contribute to the development of IAM policies and procedures. Posting End Date: 31 Jul 2025 *Job posting may come down early due to volume of applicants. We Value Equal Opportunity Wells Fargo is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other legally protected characteristic. Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit's risk appetite and all risk and compliance program requirements. Candidates applying to job openings posted in Canada: Applications for employment are encouraged from all qualified candidates, including women, persons with disabilities, aboriginal peoples and visible minorities. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process. Applicants with Disabilities To request a medical accommodation during the application or interview process, visit Disability Inclusion at Wells Fargo . Drug and Alcohol Policy Wells Fargo maintains a drug free workplace. Please see our Drug and Alcohol Policy to learn more. Wells Fargo Recruitment and Hiring Requirements: a. Third-Party recordings are prohibited unless authorized by Wells Fargo. b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.
Posted 6 hours ago
3.0 years
4 - 8 Lacs
Gurgaon
On-site
Expedia Group brands power global travel for everyone, everywhere. We design cutting-edge tech to make travel smoother and more memorable, and we create groundbreaking solutions for our partners. Our diverse, vibrant, and welcoming community is essential in driving our success. Why Join Us? To shape the future of travel, people must come first. Guided by our Values and Leadership Agreements, we foster an open culture where everyone belongs, differences are celebrated and know that when one of us wins, we all win. We provide a full benefits package, including exciting travel perks, generous time-off, parental leave, a flexible work model (with some pretty cool offices), and career development resources, all to fuel our employees' passion for travel and ensure a rewarding career journey. We’re building a more open world. Join us. Introduction to team: Are you passionate about cloud and the technology needed to drive security? Do you love engineering of critical security systems and services; including Endpoint detection and Response, Intrusion Detection, Data Leakage Prevention, Web Content Filtering, Firewall Compliance, Vulnerability and Security Event Management? Expedia Group Security Solutions Engineering team is searching for a top-notch Security Engineer who will deliver on key initiatives, starting from the idea phase all the way through requirements definition, analysis, technical specifications, engineering & deployment. This is a highly visible role that requires an understanding of our large, complex technical environment and has the ability to design/engineer simple, elegant technical security solutions. In this role, you will: Endpoint detection and response - EDR Anti-malware Agents, Advanced threat protection, Data Loss Prevention Web Content Filtering - Seamless Internet protection, On premise and cloud based web proxies Vulnerability Management - DC and cloud asset vulnerability patching and compliance Threat Intelligence - Intelligence feeds from sources like Recorded Future Threat detection - User Behavior Analysis and investigation SIEM & SOAR solutions and integrations Container security and discovery Network security - Web Application Firewall, Intrusion Prevention, network based spyware, Anti-malware detection and blocking, AWS Guard Duty Security audit and Orchestration tools Proactively maintain, monitor and improve our systems and security posture with a focus on service excellence Write and contribute to project plans, author engineering level documentation, and develop detailed test plans. Collaborate with business and technical teams to solve complex problems Influence the engineering practices within and beyond the Affinity team Experience and qualifications: Bachelor's or Masters degree in a Technical field; or equivalent related professional experience 3+ years of experience in security engineering and operations support of a mission critical environment Hands on experience with AWS Cloud services like EC2, VPC, S3, IAM, CloudFormation and Lambda; relevant experience with AWS cloud security is highly preferred Hands On / administration experience of Web Content Filtering(WCF), Web Application Firewalls(WAF), Intrusion Detection Systems(IDS), Vulnerability Management(VM) & Patching, Password Management, Data Loss Prevention(DLP), Endpoint Detection & Response(EDR), SIEM, Resilient SOAR etc. Knowledge and understanding of systems and/or network design principles and thorough understanding of security principles and technical architectures. Ability to correlate and analyze log information, packet captures, security alerts, and artifacts. Preferred if you have applied computer programming and/or scripting language experience (Java, Python, Perl, Ruby, C++ etc.) Excellent organizational and communication skills, interacting with security stakeholders, gathering requirements, implementing security solutions etc. Innovation driven mindset, reducing technical debt by optimizing security solutions, and automating day to day tasks. Ability to thrive in a dynamic, collaborative and fast paced environment. Strong interpersonal skills as well as strong problem-solving and analytical skills. Accommodation requests If you need assistance with any part of the application or recruiting process due to a disability, or other physical or mental health conditions, please reach out to our Recruiting Accommodations Team through the Accommodation Request. We are proud to be named as a Best Place to Work on Glassdoor in 2024 and be recognized for award-winning culture by organizations like Forbes, TIME, Disability:IN, and others. Expedia Group's family of brands includes: Brand Expedia®, Hotels.com®, Expedia® Partner Solutions, Vrbo®, trivago®, Orbitz®, Travelocity®, Hotwire®, Wotif®, ebookers®, CheapTickets®, Expedia Group™ Media Solutions, Expedia Local Expert®, CarRentals.com™, and Expedia Cruises™. © 2024 Expedia, Inc. All rights reserved. Trademarks and logos are the property of their respective owners. CST: 2029030-50 Employment opportunities and job offers at Expedia Group will always come from Expedia Group’s Talent Acquisition and hiring teams. Never provide sensitive, personal information to someone unless you’re confident who the recipient is. Expedia Group does not extend job offers via email or any other messaging tools to individuals with whom we have not made prior contact. Our email domain is @expediagroup.com. The official website to find and apply for job openings at Expedia Group is careers.expediagroup.com/jobs. Expedia is committed to creating an inclusive work environment with a diverse workforce. All qualified applicants will receive consideration for employment without regard to race, religion, gender, sexual orientation, national origin, disability or age.
Posted 6 hours ago
7.0 years
0 Lacs
Delhi
On-site
Job requisition ID :: 86652 Date: Jul 24, 2025 Location: Delhi CEC Designation: Manager Entity: Deloitte Touche Tohmatsu India LLP Your potential, unleashed. India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks Overview: The SOC Operations Manager for an MSSP (Managed Security Service Provider) is responsible for overseeing the day-to-day operations of the Security Operations Center, ensuring the delivery of high-quality security monitoring, incident detection, and response services to multiple clients. This role involves managing a team of security analysts, engineers, and incident responders to protect client environments. The SOC Operations Manager will focus on optimizing service delivery, ensuring SLAs are met, managing customer relationships, and driving continuous improvement in the SOC's performance. Key Responsibilities SOC Operations Management : Lead 24/7 operations of the MSSP SOC, ensuring continuous monitoring, analysis, and response to security incidents across multiple client environments. Manage and support a team of SOC analysts (Tier 1, Tier 2, Tier 3), incident responders, and engineers in handling security incidents for clients. Ensure that SLAs (Service Level Agreements) with clients are met, including response times, reporting, and incident resolution. Oversee shift management and ensure that the SOC is properly staffed to meet operational requirements. Incident Detection, Response, and Escalation : Oversee the detection, investigation, and response to security incidents within client environments. Ensure proper escalation of incidents to client contacts based on the severity and impact of the incident. Lead incident management processes, ensuring clear communication and effective coordination between SOC teams and clients during incidents. Conduct post-incident reviews, ensuring that root causes are identified and that lessons learned are incorporated into operational procedures. Customer Relationship Management : Serve as the primary point of contact for key client accounts, ensuring effective communication and alignment of security services with client expectations. Conduct regular client meetings to discuss SOC performance, incidents, and overall security posture. Provide reporting and metrics to clients on security operations, incident handling, and threat landscape updates. Address client concerns and feedback, ensuring a high level of customer satisfaction. Service Delivery Optimization : Continuously review and optimize SOC processes, workflows, and tools to improve efficiency and effectiveness. Implement automation and orchestration (SOAR) to streamline repetitive tasks and improve response times. Collaborate with security engineering teams to maintain, update, and fine-tune detection systems (SIEM, IDS/IPS, EDR) and ensure the SOC’s capabilities remain state-of-the-art. Implement proactive threat hunting and use case tuning to reduce false positives and increase detection accuracy. SOC Technology Management : Oversee the use and management of SOC tools such as SIEM, SOAR, EDR, threat intelligence platforms, and log management solutions. Ensure that log sources, alerts, and security data from client environments are properly ingested and monitored. Work with the engineering team to ensure that tools and technologies are up-to-date and meet the operational needs of the SOC and its clients. Team Leadership and Development : Lead, coach, and mentor the SOC team, providing training and professional development opportunities to enhance their skills and knowledge. Conduct performance evaluations, set goals, and provide feedback to SOC team members. Foster a culture of collaboration, knowledge sharing, and continuous improvement within the SOC team. Ensure team members are cross trained on various tools and security technologies used within the MSSP SOC. Compliance and Reporting : Ensure SOC operations comply with industry standards and regulations (e.g., ISO 27001, PCI-DSS, GDPR) and client-specific security requirements. Provide regular and ad-hoc reports to clients, demonstrating SOC performance, incident details, threat trends, and service improvements. Manage audits and assessments of SOC processes and ensure that the SOC meets internal and external compliance requirements. Threat Intelligence and Continuous Improvement : Collaborate with the threat intelligence team to stay updated on the latest threats, vulnerabilities, and attack techniques. Incorporate threat intelligence into SOC workflows and detection use cases to improve threat detection capabilities. Lead efforts to refine and develop new use cases, alerts, and detection logic to ensure the SOC can effectively respond to emerging threats. Collaboration and Communication : Act as the bridge between the SOC team, other departments, and external partners, ensuring smooth communication and collaboration across the organization. Collaborate with the incident response, security engineering, and risk management teams to improve overall security posture. Engage with vendors and technology providers to optimize the SOC’s toolset and capabilities. Qualifications: Education : Bachelor’s degree in Information Security, Computer Science, or a related field. A Master’s degree in Cybersecurity or Business Management is preferred. Experience : 7+ years of experience in cybersecurity, with at least 3+ years in SOC management or an equivalent leadership role. Experience working in an MSSP or managing security operations for multiple clients is preferred. Strong experience with security tools (SIEM, EDR, IDS/IPS), threat intelligence, and incident response. Proven track record of leading teams in a 24/7 SOC environment. Certifications : One or more of the following (or similar): CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) GIAC (GCIH, GCIA, GSOC) CompTIA Security+ CEH (Certified Ethical Hacker) How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report. Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome… entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals. *Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices. At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution. In this regard, you may refer to a more detailed advisory given on our website at: https://www2.deloitte.com/in/en/careers/advisory-for-career-aspirants.html?icid=wn_
Posted 6 hours ago
4.0 years
10 - 22 Lacs
Bhubaneshwar
On-site
Bhubaneswar, India Job Category : Security Research Posting Date : 01 January 2024 Job Type : Engineering Years of Experience : 5-10 Does this position require a security clearance? No Applicants are required to read,write and speak the following languages Hindi/English Additional Info : Job Description As an esteemed Security Research Engineer with expertise in offensive methodologies and substantiating exploitation, your indispensable role within our security team cannot be understated. Your principal task entails spearheading team exercises to evaluate and enhance our organizational defenses. Moreover, you will partake in team exercises, working alongside the team to strengthen detection prowess and simulate intricate attack scenarios. As part of your role, you will have the responsibility of overseeing and implementing an efficient security strategy, along with security programs and services that are both effective and reliable. Responsibilities Ensure that you remain ahead in the industry by consistently enhancing your understanding of emerging threats, up-to-date attack techniques, and well-documented vulnerabilities. Conduct diverse exercises, including internal and external penetration tests and lateral movement assessments. Evaluate and circumvent security systems to uncover vulnerabilities and propose enhancements. Improve tools for managing configuration or attack paths. Simulate advanced methods and detect different approaches to Tactics, Techniques, and Procedures (TTPs) that could remain unnoticed. Create comprehensive reports that thoroughly document the discoveries, approaches, and applicable suggestions derived from Team engagements. Construct concise and persuasive reports that proficiently convey identified weaknesses, potential attack paths, and potential consequences to relevant parties. Guarantee that reports offer pragmatic advice for rectifying vulnerabilities and improving overall security. Qualifications Bachelor's degree in Computer Science or certifications in Offensive Security such as OSCP, OSCE, or similar qualifications. Minimum of 4 years of experience in a similar role, showcasing a strong background in offensive security and penetration testing. Required Skills Proficient in writing IPS/SIEM detection logic using tools like Splunk or Anvilogic. Hands-on experience in blue team activities with SPL, KQL, YARA-L, and SIGMA. Skilled in crafting detection logic for SIEM or Data Lakes, including Splunk, Anvilogic, etc. Excellent English communication skills, both written and verbal, to effectively communicate complex technical concepts to technical and non-technical stakeholders. Capable of sharing knowledge effectively to educate others. Strong problem-solving abilities and a creative mindset for identifying attack vectors and developing innovative strategies. Disclaimer Hiring Range: from 1000000 to 2250000 per annum. May be eligible for bonus and equity. We maintain broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Nirmalya’s differing products, industries and lines of business. Candidates are typically placed into the range based on the preceding factors as well as internal peer equity. About Us Nirmalya's career has the potential to encompass various industries, roles, countries, and cultures, allowing for growth in novel positions and driving innovation, while effectively balancing work and personal life. Nirmalya has achieved success over the years by embracing change, fostering innovation, and consistently upholding ethical principles, thereby delivering exceptional results for leading companies across multiple industries.To foster and support the talents responsible for such accomplishments, our dedication lies in cultivating an inclusive culture that appreciates and embraces diverse insights and perspectives. We strive to create a workforce that inspires thought leadership and sparks innovation, ensuring a thriving environment for all. Nirmalya Employee Benefits are meticulously designed to prioritize equality, reliability, and affordability. Our comprehensive package encompasses essential features such as Medical and Life Insurance, while also granting access to Retirement Planning and more. Additionally, we actively encourage our employees to actively contribute to the well-being of the communities where we operate. We firmly believe that fostering diversity and inclusion lays the foundation for innovation. To shape a brighter tomorrow, we seek talent from diverse backgrounds, embracing a range of perspectives and abilities. We are committed to providing reasonable accommodations to individuals with disabilities throughout the job application, interview, and prospective role stages, thereby enabling them to effectively perform crucial job functions. Our dedication lies in fostering an inclusive workforce that enables every individual to thrive. We believe in the power of diverse perspectives and value every voice, as it is this harmony that propels us to surpass previous achievements. As an Equal Employment Opportunity Employer, Nirmalya ensures that all applicants are treated fairly and without discrimination. We promote equality regardless of race, color, religion, national origin, gender identity, disability, protected veterans’ status, or any other characteristic protected by law. Additionally, Oracle complies with applicable legislation by considering qualified applicants with arrest and conviction records for employment opportunities. Join our team where diversity is celebrated, and everyone's unique contribution is respected. Together, we embrace innovation and strive towards excellence – a testament to our commitment to fostering an inclusive and thriving workplace.
Posted 6 hours ago
1.0 - 3.0 years
4 Lacs
India
Remote
Role Overview: We are seeking a dynamic and experienced Talent Acquisition Executive to join our HR team. The ideal candidate should have a strong background in hiring for the Cybersecurity domain, with a deep understanding of niche skill sets such as SOC, SIEM, Threat Intelligence, Penetration Testing, Cloud Security, and more. This role requires a proactive recruiter with strong networking abilities and a proven track record of identifying and hiring top cybersecurity talent. Key Responsibilities: Contribute to employee engagement initiatives and internal HR communications Manage end-to-end recruitment cycle for cybersecurity roles (junior to leadership level). Understand job requirements from hiring managers and translate them into effective sourcing strategies. Source, screen, and evaluate potential candidates using various sourcing tools like Naukri, LinkedIn, GitHub, etc. Build and maintain a strong pipeline of qualified cybersecurity professionals. Develop and maintain relationships with cybersecurity communities, colleges, and relevant industry groups. Coordinate and schedule interviews, gather feedback, and ensure a smooth recruitment process. Ensure an excellent candidate experience throughout the hiring process. Maintain recruitment metrics, dashboards, and reports for analysis and process improvements. Stay updated on cybersecurity hiring trends and skill demands. Qualifications & Skills: Bachelor’s/Master’s degree in Human Resources, IT, or related field. 1-3 years of experience in IT/technical recruitment with a focuse on cybersecurity hiring. Familiarity with cybersecurity roles and tools such as SOC, SIEM (Splunk, QRadar, etc.), EDR, vulnerability assessment, etc. Hands-on experience with applicant tracking systems (ATS) and HRMS tools. Excellent communication and interpersonal skills. Ability to work in a fast-paced environment with multiple open roles. Strong analytical and organizational skills. Preferred Skills: Technical background or certifications in HR/Recruitment or basic cybersecurity (added advantage). Experience hiring for global or remote cybersecurity roles. Existing cybersecurity talent network is a plus. Job Types: Full-time, Permanent Pay: Up to ₹35,000.00 per month Benefits: Leave encashment Paid time off Provident Fund Schedule: Day shift Monday to Friday Application Question(s): Do you have experience in hiring for cyber security related roles? Language: Fluent English (Required) Work Location: In person
Posted 6 hours ago
3.0 - 6.0 years
3 - 6 Lacs
Ahmedabad
Remote
Job Title: Talent Acquisition Specialist Company : Techdefence Labs Solutions Ltd. Location: Ahmedabad Department: Human Resources Job Type: Full-Time, Onsite About Techdefence: Techdefence is a leading cybersecurity solutions provider specializing in offensive and defensive security, AI-powered threat intelligence, and enterprise security frameworks. Our comprehensive services and product portfolio cater to global enterprises, government agencies, and critical infrastructure, ensuring proactive protection against cyber threats. With a strong R&D focus, Techdefence delivers cutting-edge security solutions in the areas of cloud security, network security, application security, penetration testing, SOC solutions, and managed security services. Our expertise in cyber resilience, risk management, and compliance frameworks (ISO 27001, NIST, GDPR, PCI-DSS, etc.) positions us as a trusted partner for organizations worldwide. Role Overview: We are seeking a dynamic and experienced Talent Acquisition Specialist to join our HR team. The ideal candidate should have a strong background in hiring for the Cybersecurity domain, with a deep understanding of niche skill sets such as SOC, SIEM, Threat Intelligence, Penetration Testing, Cloud Security, and more. This role requires a proactive recruiter with strong networking abilities and a proven track record of identifying and hiring top cybersecurity talent. Key Responsibilities: Contribute to employee engagement initiatives and internal HR communications Manage end-to-end recruitment cycle for cybersecurity roles (junior to leadership level). Understand job requirements from hiring managers and translate them into effective sourcing strategies. Source, screen, and evaluate potential candidates using various sourcing tools like Naukri, LinkedIn, GitHub, etc. Build and maintain a strong pipeline of qualified cybersecurity professionals. Develop and maintain relationships with cybersecurity communities, colleges, and relevant industry groups. Coordinate and schedule interviews, gather feedback, and ensure a smooth recruitment process. Ensure an excellent candidate experience throughout the hiring process. Maintain recruitment metrics, dashboards, and reports for analysis and process improvements. Stay updated on cybersecurity hiring trends and skill demands. Qualifications & Skills: Bachelor’s/Master’s degree in Human Resources, IT, or related field. 3-6 years of experience in IT/technical recruitment with at least 2 years focused on cybersecurity hiring. Familiarity with cybersecurity roles and tools such as SOC, SIEM (Splunk, QRadar, etc.), EDR, vulnerability assessment, etc. Hands-on experience with applicant tracking systems (ATS) and HRMS tools. Excellent communication and interpersonal skills. Ability to work in a fast-paced environment with multiple open roles. Strong analytical and organizational skills. Preferred Skills: Technical background or certifications in HR/Recruitment or basic cybersecurity (added advantage). Experience hiring for global or remote cybersecurity roles. Existing cybersecurity talent network is a plus.
Posted 6 hours ago
0 years
3 - 7 Lacs
Ahmedabad
On-site
Job Information Work Experience 0-0.6 (Associate Cyber Security Analyst) Industry IT Services Job Type Full time Date Opened 07/24/2025 City Ahmedabad State/Province Gujarat Country India Zip/Postal Code 380015 About Us E2logy is a leading software solutions company dedicated to empowering businesses with innovative technology and exceptional service. We combine our expertise in various domains with cutting-edge development practices to deliver high-quality, custom software solutions that cater to your unique needs and goals. Visit our website: https://e2logy.com/ to learn more about our services and expertise. Job Description We are seeking a Fresher Associate Cyber Security Analyst – VAPT who will play a supportive role in helping protect the organization’s cloud infrastructure, web and mobile applications, and internal systems. This entry-level role is ideal for recent graduates passionate about cybersecurity and eager to begin their career in a hands-on, learning-focused environment. You will work under the guidance of senior team members to identify vulnerabilities, support penetration testing activities, and enhance our overall security posture in alignment with global security standards such as ISO/IEC 27001 . Responsibilities: Assist in conducting vulnerability assessments and penetration testing on Web applications,Mobile applications,Cloud-based environments,Internal systems and network infrastructure Support the use of tools like Burp Suite, Nmap, Wireshark, Nessus, OWASP ZAP, etc., under supervision. Document basic findings, potential risks, and help prepare technical reports for internal teams. Work closely with senior analysts, DevOps, and development teams to understand and remediate security weaknesses. Contribute to maintaining and improving the organization’s compliance with ISO/IEC 27001 security guidelines , including proper documentation, risk identification, and implementation of relevant controls. Stay updated with emerging threats, vulnerabilities, and VAPT methodologies aligned with industry standards like OWASP Top 10 , ISO 27001 etc . Help in maintaining compliance with key standards such as OWASP Top 10, ISO 27001, PCI-DSS, etc. Requirements Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field. Basic understanding of web application security, network protocols, and common attack vectors. Exposure to or academic use of tools such as Burp Suite, Nmap, Wireshark, or Kali Linux. Familiarity with OWASP Top 10, CVEs, and basic cybersecurity concepts. Strong curiosity, analytical mindset, and attention to detail. Good communication skills and a willingness to learn in a team-oriented environment. Preferred Skills : Basic awareness of secure coding practices or code review. Introductory knowledge of cloud security, SIEM, or IDS/IPS tools. knowledge of ISO/IEC 27001 controls , risk assessment, or compliance practices. Certifications Like CompTIA Security+,Certified Ethical Hacker (CEH),eLearnSecurity Junior Penetration Tester (eJPT),ISO/IEC 27001 Foundation or Practitioner(Not Mandatory) Benefits Competitive compensation and performance-linked incentives. Health insurance and employee wellness benefits. Career development support and learning resources. Opportunity to work with modern cybersecurity tools and frameworks. Work Environment: Collaborative and supportive office setting with Alternative Saturday Working Flexibility to extend working hours during high-priority assessments or audits. Application Process: Please submit your resume, cover letter, and optionally a portfolio of academic or personal projects to careers@e2logy.com
Posted 6 hours ago
3.0 years
0 Lacs
Alīgarh
On-site
ArcSight SIEM Trainer Needed – Onsite Delivery in Qatar CyberFort Tech is seeking a seasoned ArcSight professional to deliver a 5-day corporate training in Qatar , focused on hands-on implementation and advanced operational execution. Key Expertise Required: Strong proficiency in ArcSight Logger , SmartConnector setup , and log source integration Proven experience in designing and refining correlation rules for real-time alerting Ability to guide SOC teams through use case development , active channel tuning , and incident response workflows Enterprise-level delivery of ArcSight training, customized for SOC analysts , security engineers , and SIEM architects Location: Qatar Duration: 5 Days Covered: Travel, food, and accommodation Compensation: ₹10,000/day This is a high-impact training opportunity to shape security posture for global clients. Trainers must demonstrate deep technical fluency and strong communication skills. Job Type: Contractual / Temporary Contract length: 7 days Pay: ₹9,000.00 - ₹10,000.00 per day Experience: Arcsight: 3 years (Required) Work Location: In person Application Deadline: 28/07/2025 Expected Start Date: 05/08/2025
Posted 6 hours ago
8.0 years
3 - 4 Lacs
Noida
On-site
Join our Team About this opportunity: We are now looking for a Senior Security Engineer professional for our Managed Security team. This job role has accountability for researching, designing, engineering, implementing, and supporting security solutions in partnership with the respective stakeholders within Ericsson and / or customer organization and / or 3rd Party Providers. The professional will work alongside a highly skilled, diverse team, making sure that the information assets, that we are responsible to protect, are secured. What you will do: Design, implement, manage, monitor, and troubleshoot cybersecurity defenses, including configuration management, network security, systems security, and monitoring systems / tools. Participate in planning and audit scope development as well as project execution as a critical team member on complex technology related assessments. Play an active role in the design and execution of infrastructure initiatives to ensure an evolving adherence to industry best practices for information security. Lead the execution of the assessment of specific technical areas of a project, supervising other team members and providing coaching where needed. Perform Security Incident Management, including but not limited to: supporting SIEM tools, integrating logs into the tool, creating and modifying rules, investigating and resolving alerts, automating tasks. Research new and emerging threats to gain insight into the evolving threat landscape, and share knowledge with the team. Promote new ideas and new ways of executing projects and internal infrastructure enhancements. Innovate and automate repetitive activities and corrective actions, including broader automation initiatives. Analyzes and recommends security controls and procedures in business processes related to use of information systems and assets, and monitors for compliance Responds to information security incidents, including investigation of countermeasures to and recovery from computer-based attacks, unauthorized access, and policy breaches; interacts and coordinates with third-party incident responders, including law enforcement The skills you bring: Strong knowledge of information security Strong knowledge of SIEM tools (such as McAfee ESM, QRadar, ArcSight, Splunk, etc.), scanning tools (Nessus, Qualys, IBM AppScan, etc.) and PAM tools (BeyondTrust, CyberArk, etc.) Strong knowledge of both Linux-based and MS Windows-based system platforms with a strong technical understanding and aptitude for analytical problem-solving Strong understanding of enterprise, network, system and application level security issues Strong understanding of enterprise computing environments, distributed applications, and a strong understanding of TCP/IP networks along with available security controls (technical & process controls) for respective layers Good understanding of the system hardening processes, tools, guidelines and benchmarks Fundamental understanding of encryption technologies Participate in the out-of-hours on call rotation, providing technical support to the business for incidents Strong knowledge sharing and collaboration skills Deliver results and meet customer expectations Excellent communication skills; English is a must Key Qualifications: Education: BE/ B.Tech (Telecommunication/ Computer Science) Minimum years of relevant experience: 8 to 15 years experience with at least 8 years in IT and 7 years in Security ITIL certification, CCSP, OSCP, Security +, CISSP or similar will be an advantage Basic knowledge of telecommunications networks will be an added advantage Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Bangalore Req ID: 769624
Posted 6 hours ago
4.0 years
9 - 11 Lacs
Calcutta
Remote
Linde Global Support Services Pvt. Ltd | Business Area: Information Services (IT) Specialist – IT Security Operations Kolkata, West Bengal, India | Workplace Type: On-Site | Job Type: Regular / Permanent / Unlimited / FTE | Reference Code: req24645 It's about Being What's next. What's in it for you? You will be required to : - Operate Linde plc Cybersecurity services including EDR, SIEM SOC, Vulnerability Assessment and Part of a CERT that responds to cybersecurity incidents in Linde plc Also hunt for threats and signs of malicious use within Linde plc networks and systems. And ensure vendors that deliver cybersecurity operations services deliver within SLA and are fit for purpose. You will also need to track latest threat and technology trends and anticipates new risk vectors and emerging mitigating tech solutions. and identify cyber risks and security gaps in Linde plc and develops technical solutions to mitigate them. At Linde, employees can enjoy a range of benefits that make the workplace comfortable and enjoyable. These include loyalty offers, annual leave, an on-site eatery, employee resource groups, and teams that provide support and foster a sense of community. These benefits demonstrate Linde's commitment to creating a positive work experience for its employees. Making an impact. What will you do? In this role you will monitor alarms and events from Linde plc cybersecurity systems ensuring appropriate response, coordination and closure of incidents; incident cause analysis Actively looks for signs of compromise, malicious use and threats over the Linde plc landscape and responds accordingly (Threat hunting) You will perform test on Linde plc Cybersecurity systems to identify their limits of ability to detect cyber attacks and implements controls to mitigate deficiencies. Regularly meets with regional IT teams to understand and identify cybersecurity risks across Linde plc and consequentially creates plan to mitigate and reporting to track status. Also, you will work with vendors that provide Linde plc security operational services such as EDR monitoring, SOC SIEM tool management, pen test coordination etc Winning in your role. Do you have what it takes? Broad understanding and experience of Linde business activities Significant exposure to Linde IT infrastructure and operating Linde IT systems Excellent understanding of the Linde IT organisation and processes. You have experience in infrastructure / service / cybersecurity operations Understands programming languages such as Python, Powershell (optional) Strong Technical Experience in core security technologies – EDR, Firewall, SIEM, Antivirus, Security Vulnerability and pen test tools, incident response (optional) Overall 4+ years of experience in the field of Cybersecurity You must be certified in IT security with deep technology skills across a wide range of topics and have excellent communication skills You have the ability to lead/manage teams remotely and to operate in a multi-cultural environment Technology expert Cybersecurity Moreover you have the ability to lead, motivate and develop IT capability in his/her areas of responsibility Ability to build and maintain relationships with business colleagues and other IT functional heads Finally you have a strong Technical Experience in core security technologies Why you will love working for us! Linde Plc. is a leading global industrial gases and engineering company with 2024 sales of $33 billion and 65,000 employees spread across multiple countries. We live our mission of making our world more productive every day by providing high-quality solutions, technologies and services which are making our customers more successful and helping to sustain and protect our planet. Linde Global Support Services Pvt. Ltd. (LGSS) is a wholly owned subsidiary of Linde, based out of Kolkata, India. It is a Global IT Delivery Center that has been successfully delivering IT Enabled Services to the group companies of Linde, across the world for almost two decades, since 2006. Our goal is to provide and support IT services and solutions that are critical for the operation of the entire group. As part of Linde's core Global IT Team, we cover a wide portfolio of IT services and solutions that ensure the continuous operation of Linde's business across multiple businesses across various geographies, time zones and cultures. The technical teams use their IT skills and experience to maintain and manage the IT applications and infrastructure of the organization. At Linde Global IT Delivery Center, Kolkata we offer exciting career opportunities to grow and work in leading technologies in a truly global work environment. Whatever you seek to accomplish, and wherever you want those accomplishments to take you, a career at Linde provides limitless ways to achieve your potential, while making a positive impact in the world. Be Linde. Be Limitless. Have we inspired you? Let's talk about it! We are looking forward to receiving your complete application (motivation letter, CV, certificates) via our online job market. Any designations used of course apply to persons of all genders. The form of speech used here is for simplicity only. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability, protected veteran status, pregnancy, sexual orientation, gender identity or expression, or any other reason prohibited by applicable law. Linde Global Support Services Pvt. Ltd acts responsibly towards its shareholders, business partners, employees, society and the environment in every one of its business areas, regions and locations across the globe. The company is committed to technologies and products that unite the goals of customer value and sustainable development. #LI-DNI
Posted 6 hours ago
5.0 years
0 Lacs
Hyderabad, Telangana, India
On-site
Skills :-Security Operations + Netskope, Devo, and/or Akamai +cloud security frameworks and zero trust architecture. Location :- Hyderabad Shift Timings :- 6.30 pm - 3.30 am Analyst, Security Operations Omnicom Global Solutions, Hyderabad IN About Omnicom Global Solutions Omnicom Global Solutions is an integral part of Omnicom Group, a leading global marketing and corporate communications company. Omnicom’s branded networks and numerous specialty firms provide advertising, strategic media planning and buying, digital and interactive marketing, direct and promotional marketing, public relations, and other specialty communications services to over 5,000 clients in more than 70 countries. OGS India plays a critical role for our group companies and global agencies by providing stellar products, solutions, and services across Creative Services, Technology, Marketing Science (Data & Analytics), Advanced Analytics, Market Research, Business Support Services, Media Services, and Project Management. With over 4000 talented colleagues in India, we are growing rapidly and are looking for professionals like you to help build the next chapter of our journey. Role Overview We have an exciting opportunity for an Analyst, Security Operations at our Hyderabad office. This role is responsible for maintaining the confidentiality, integrity, and availability of personal information and company assets, ensuring compliance with Omnicom’s internal policies and standards. The Analyst will support the tools, technologies, and operational architecture that monitor and protect Omnicom’s physical and digital environments. This role plays a vital part in defending the organization’s infrastructure and data by executing daily operational security tasks and contributing to long-term strategic security initiatives. Key Responsibilities Manage and support cybersecurity tools and software that protect Omnicom’s digital and physical environments. Operate and maintain controls such as Web Access Firewall (WAF), Zero Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), Cloud Firewall (CFW), Endpoint Detection & Response (EDR), and Security Information and Event Management (SIEM) systems. Deploy and maintain software agents and intermediate nodes to facilitate secure operations across cloud and on-premises environments. Collaborate across internal Omnicom teams as well as with external support, accounting, and engineering teams from trusted security partners. Monitor environments for security threats and respond in accordance with incident response protocols. Support ongoing security posture improvement initiatives and assist in risk mitigation efforts. Required Qualifications 3–5 years of experience in security operations, cybersecurity, or IT infrastructure. Working knowledge of security platforms such as WAF, CASB, ZTNA, CFW, EDR, and SIEM tools. Familiarity with incident detection, triage, and response processes. Experience in agent deployment and system integration for enterprise-wide security tools. Strong analytical and problem-solving skills with a proactive security mindset. Ability to coordinate across teams and manage third-party security service providers. Excellent communication skills and a detail-oriented approach to operational tasks. Preferred Qualifications Security certifications such as CompTIA Security+, GIAC, or equivalent. Experience with cloud security frameworks and zero trust architecture. Exposure to regulatory compliance environments (e.g., GDPR, HIPAA, ISO 27001).
Posted 6 hours ago
7.0 - 10.0 years
0 Lacs
Pune, Maharashtra, India
On-site
About The Company Tata Communications Redefines Connectivity with Innovation and IntelligenceDriving the next level of intelligence powered by Cloud, Mobility, Internet of Things, Collaboration, Security, Media services and Network services, we at Tata Communications are envisaging a New World of Communications Key Responsibilities Incident Response And Management Lead the incident response process, including identification, containment, eradication, and recovery. Analyze and respond to complex security incidents and breaches. Conduct post-incident analysis and develop reports with recommendations to prevent future incidents. Security Monitoring And Analysis Oversee the continuous monitoring of security alerts and events. Analyze logs and data from various sources (e.g., SIEM, firewalls, EDR, IDS/IPS) to identify suspicious activity. Perform advanced threat hunting and forensic analysis. Vulnerability Management Conduct regular vulnerability assessments. Identify, prioritize, and remediate security vulnerabilities in systems and applications. Collaborate with IT and development teams to implement security patches and updates. Security Architecture And Engineering Design and implement security solutions to protect the organization's networks, systems, and data. Develop and maintain security policies, standards, and procedures. Evaluate and recommend new security technologies and tools. Compliance And Risk Management Ensure compliance with relevant regulatory requirements and industry standards (e.g., ISO 27001, NIST). Perform risk assessments and develop mitigation strategies. Document and maintain security controls and frameworks. Technical Expertise Required Skills and Qualifications Advanced knowledge of cybersecurity principles, techniques, and technologies. Proficiency in using security tools such as SIEM, IDS/IPS, firewalls, and endpoint protection solutions. Experience with vulnerability management, penetration testing, and forensic analysis. Experience Minimum of 7-10 years of experience in cybersecurity, with at least 2-3 years in an L3 or senior role. Proven track record of handling complex security incidents and leading incident response efforts. Experience in designing and implementing security architectures and solutions. Certifications Relevant certifications such as CISSP, CISM, CEH, GIAC, or equivalent are highly desirable. Analytical And Problem-Solving Skills Strong analytical skills with the ability to identify and mitigate security threats. Excellent problem-solving skills and the ability to think critically under pressure. Communication And Collaboration Strong communication skills, both written and verbal. Ability to collaborate effectively with cross-functional teams and stakeholders. Preferred Skills And Qualifications Experience with cloud security (e.g., AWS, Azure, Google Cloud). Knowledge of scripting and automation tools (e.g., Python, PowerShell). Familiarity with regulatory requirements and standards (e.g., GDPR, HIPAA).
Posted 7 hours ago
0 years
0 Lacs
Mumbai, Maharashtra, India
On-site
About The Company Tata Communications Redefines Connectivity with Innovation and IntelligenceDriving the next level of intelligence powered by Cloud, Mobility, Internet of Things, Collaboration, Security, Media services and Network services, we at Tata Communications are envisaging a New World of Communications Job Description seeking a highly motivated and experienced Project Manager - Technical account manager. In this customer-facing role, candidate will be responsible for overseeing the successful delivery and services assurance support lifecycle for services (Managed Hosting - cloud, Microsoft End user service, Managed security services, Managed connectivity like MPLS, ILL etc)) offered to end customer directly at our client's locations. You will be the primary point of contact for our clients, ensuring enhanced customer experience. Responsibilities Serve as the primary technical client contact and advocate for day to day and escalated issues and requests Ensuring satisfaction through proactive communication, issue resolution, and regular engagement (status calls, QBRs, documentation). Safeguard existing revenue streams while identifying and driving new business opportunities within accounts through strategic collaboration with sales teams. Lead key initiatives like DC-DR drills and post-deployment handovers, manage service improvement plans, and *ensure timely delivery of customer project milestones. Collaborate with internal teams and subject matter experts to align on project goals, optimize customer investments, and provide leadership across business units. Track capacity, risks, and service improvements; maintain related trackers; and provide regular account status updates to senior management and stakeholders. Understanding of POA & Leading Major activity e.g. DC – DR drill, Handover post deployment Regularly phase out Service Improvement plans (Technical & Process) to customer & maintain a related tracker Should also be able to drive related Customer Project deliverables. Monitoring, managing, and administering the monetary terms of SLAs and other billing related aspects. Provide the relevant reports including real time as well as past data/information/reports for the department to validate the billing and SLA related penalties. The reports shall consist (not limited to) of: Summary of resolved unresolved and escalated issues / complaints. Logs of backup and restoration undertaken reports. Component wise Virtual machines availability and resource utilization reports. Consolidated SLA / Non- conformance reports. (Detailed Daily, Weekly, Monthly Progress Report) Clarity on SOP of Operations and Monitoring. Should be able to do customer Architectural review Would need to work from Office or customer location (Mumbai) Tracking Inventory including licenses. SLA reconciliation and resolving associated billing disputes. Support, Revenue enhancement through accelerated deliveries. Desired Skill sets & requirement B.E./B.Tech/ MCA ( profile expects min 12-15 yrs of experience in which 10+ yrs experience requested for PM ) In managing and implementing large multilocation IT Network Projects Experience of implementing end to end Projects in PSU/ Government Bodies/ Autonomous Organizations (Under any Indian Government law) in India. Certifications: PMP / Prince2 Certification (If certified better). Technical Certification: Vmware, Openstack, Operating System Proficient in Windows/Linux systems and virtualization technologies with strong technical understanding of Linux OS, storage, Network and backup solutions. Experienced in public and private cloud environments, with exposure to firewalls, proxies, IDS/IPS, SIEM, DDoS protection, and Zscaler. Familiar with MPLS, and ILL, ensuring robust enterprise connectivity and communication. Familiar with InfoSec trends, enabling effective positioning of security solutions for customers. Strong analytical mindset with proven ability to troubleshoot and resolve complex technical issues efficiently. Excellent logical reasoning to assess technical issues. Capacity Management for customer infrastructure and services. Risk Identification and tracking for Customer infra Leading customer calls and getting into conclusion on the purpose of the call. Ability to audit customer infrastructure and suggest improvements. Ability to forecast churn and upgrades for account base. Ability to tailor message formats and contents to the audience and get heard. Ability to manage multiple initiatives simultaneously. Comfortable dealing with complex customer relationships, decision processes and competing agendas Ability to travel for customer meeting/service reviews or Resident On site at Customer Place The standard working hours are from 09:30 am to 06:30 pm, Flexibility may be required to accommodate project deadlines.
Posted 7 hours ago
5.0 - 8.0 years
3 - 7 Lacs
Jaipur
Work from Office
Shift : 9x5 Job Description for Threat Hunter/TIP admin Skillset Must : Network forensic (Packet Capture andRe-Construction Capability), Knowledge on Threat Intelligence Platform (TIP)/Anti APT/ EDR Certified with any threat hunting certification,or equivalent . Responsible for conducting all threat-huntingactivities necessary for identifying the threats including zero day. Hunt for security threats, identify threat actorgroups and their techniques, tools and processes. Strong knowledge of APT lifecycle, tactics,techniques, and procedures (TTPs). Familiarity with MITRE ATT&CK framework andmapping threats to techniques. Provide expert analytic investigative support toL1 and L2 analysts for complex security incidents. Proficiency in malware behavior analysis andsandboxing. Perform analysis of security incidents forfurther enhancement of rules, reports, AI/ML models. Perform analysis of network packet captures,DNS, proxy, NetFlow, malware, host-based security and application logs, as wellas logs from various types of security sensors uncovering the unknown aboutinternet threats and threat actors. Analyse logs, alerts, suspicious malwaressamples from all the SOC tools, other security tools deployed such asAnti-Virus, Anti APT solutions, EDR, IPS/IDS, Firewalls, Proxies, ActiveDirectory, Vulnerability assessment tools etc. Using knowledge of the current threat landscape,threat actor techniques, and the internal network, analyze log data to detectactive threats within the network. Build, document and maintain a comprehensivemodel of relevant threats to customer. Proactively identify potential threat vectorsand work with team to improve prevention and detection methods. Identify and propose automated alerts for newand previously unknown threats. Incident Response for identified threats. Strong knowledgeof APT lifecycle, tactics, techniques, and procedures (TTPs). Hands-onexperience with Trellix (formerly McAfee) APT solutions, EDR, and ThreatIntelligence. Proficiency inmalware behavior analysis and sandboxing. Familiarity withMITRE ATT&CK framework and mapping threats to techniques. Experience withsecurity monitoring tools such as SIEM, SOAR, EDR, and Threat IntelligencePlatforms (TIPs). Solidunderstanding of network protocols, endpoint protection, and intrusiondetection systems. Required Qualifications: Education: B.E./B.Tech/MCA/M.Sc. in Computer Science or Information Technology. Experience: Minimum 6+ years of relevant experience in Security Operations, Threat Detection, or Incident Response. Certification : CSA/CEH
Posted 7 hours ago
4.0 years
0 Lacs
Jaipur, Rajasthan, India
On-site
About The Company Tata Communications Redefines Connectivity with Innovation and IntelligenceDriving the next level of intelligence powered by Cloud, Mobility, Internet of Things, Collaboration, Security, Media services and Network services, we at Tata Communications are envisaging a New World of Communications Experience Required: 4+ years in Cybersecurity, with 2+ years hands-on any threat intelligence platform Reports To: Security Operations Lead / SOC Manager Location: Jaipur Job Type: Full-time, Customer locations Job Summary We are seeking a skilled Threat Intelligence Engineer/Analyst with hands-on experience in managing and operating a Unified Threat Intelligence Platform (UIP). The ideal candidate will be responsible for integrating, enriching, analyzing, and disseminating threat intelligence across security systems (SIEM, SOAR, EDR) to enhance threat detection, hunting, and response efforts. Key Responsibilities Administer and maintain the Unified Threat Intelligence Platform (e.g., MISP, Anomali, ThreatConnect, EclecticIQ, TIP from commercial vendors). Should have worked on any of the TI platform. Experience in Recorded future preferred. Aggregate, normalize, and enrich threat intel feeds from internal, commercial, and open-source sources (OSINT). Map Indicators of Compromise (IOCs), TTPs, and threat actor profiles using frameworks such as MITRE ATT&CK and STIX/TAXII. Integrate UIP with SIEM, SOAR, and EDR platforms to enable automated threat correlation and alert enrichment. Analyze and prioritize threat intelligence based on relevance, risk level, and business impact. Coordinate with threat-hunting and SOC teams to enable actionable use of threat intelligence. Create and manage threat intelligence dashboards, reports, and alerts. Continuously improve threat ingestion, enrichment pipelines, and integration workflows. Required Skills And Qualifications Solid understanding of Threat Intelligence lifecycle: collection, processing, analysis, dissemination. Experience with commercial or open-source TIP/UIP tools (e.g., MISP, ThreatConnect, Anomali, EclecticIQ). Strong knowledge of STIX/TAXII, OpenIOC, YARA, Sigma rules. Experience integrating threat intel into SIEM (e.g., Splunk, QRadar, Sentinel) and SOAR platforms. Familiarity with threat actor behavior, campaigns, malware families, and IOC tracking. Working knowledge of scripting (Python preferred) for automation and data transformation. Ability to analyze complex data and present threat intelligence in clear, actionable formats. Education Requirements BE, B.Tech in IT/CS/ECE, BCA, BSc CS and MCA Certification CEH/CSA/ NBAD certification
Posted 7 hours ago
6.0 years
0 Lacs
Jaipur, Rajasthan, India
On-site
About The Company Tata Communications Redefines Connectivity with Innovation and IntelligenceDriving the next level of intelligence powered by Cloud, Mobility, Internet of Things, Collaboration, Security, Media services and Network services, we at Tata Communications are envisaging a New World of Communications Organisation : Novamesh Ltd (TATA Commununications Ltd) Position : L2/L3, Location – Jaipur Shift : 9x5 Job Description For Threat Hunter/TIP Admin Skillset Must : Network forensic (Packet Capture and Re-Construction Capability), Knowledge on Threat Intelligence Platform (TIP)/ Anti APT/ EDR Certified with any threat hunting certification, or equivalent . Responsible for conducting all threat-hunting activities necessary for identifying the threats including zero day. Hunt for security threats, identify threat actor groups and their techniques, tools and processes. Strong knowledge of APT lifecycle, tactics, techniques, and procedures (TTPs). Familiarity with MITRE ATT&CK framework and mapping threats to techniques. Provide expert analytic investigative support to L1 and L2 analysts for complex security incidents. Proficiency in malware behavior analysis and sandboxing. Perform analysis of security incidents for further enhancement of rules, reports, AI/ML models. Perform analysis of network packet captures, DNS, proxy, NetFlow, malware, host-based security and application logs, as well as logs from various types of security sensors uncovering the unknown about internet threats and threat actors. Analyse logs, alerts, suspicious malwares samples from all the SOC tools, other security tools deployed such as Anti-Virus, Anti APT solutions, EDR, IPS/IDS, Firewalls, Proxies, Active Directory, Vulnerability assessment tools etc. Using knowledge of the current threat landscape, threat actor techniques, and the internal network, analyze log data to detect active threats within the network. Build, document and maintain a comprehensive model of relevant threats to customer. Proactively identify potential threat vectors and work with team to improve prevention and detection methods. Identify and propose automated alerts for new and previously unknown threats. Incident Response for identified threats. Strong knowledge of APT lifecycle, tactics, techniques, and procedures (TTPs). Hands-on experience with Trellix (formerly McAfee) APT solutions, EDR, and Threat Intelligence. Proficiency in malware behavior analysis and sandboxing. Familiarity with MITRE ATT&CK framework and mapping threats to techniques. Experience with security monitoring tools such as SIEM, SOAR, EDR, and Threat Intelligence Platforms (TIPs). Solid understanding of network protocols, endpoint protection, and intrusion detection systems. Required Qualifications Education: B.E./B.Tech/MCA/M.Sc. in Computer Science or Information Technology. Experience: Minimum 6+ years of relevant experience in Security Operations, Threat Detection, or Incident Response. Certification : CSA/CEH
Posted 7 hours ago
4.0 years
0 Lacs
Jaipur, Rajasthan, India
On-site
About The Company Tata Communications Redefines Connectivity with Innovation and IntelligenceDriving the next level of intelligence powered by Cloud, Mobility, Internet of Things, Collaboration, Security, Media services and Network services, we at Tata Communications are envisaging a New World of Communications Experience Required: 4+ years in Cybersecurity, with 2+ years hands-on Anti APT tool and in IR Reports To: Security Operations Lead / SOC Manager Location: Jaipur Job Type: Full-time, Customer locations Job Summary We are looking for a highly skilled Anti-APT and Incident Response Specialist to lead the detection, analysis, and remediation of sophisticated cyber threats, including Advanced Persistent Threats (APTs). The candidate will work closely with threat intelligence, SOC, and forensic teams to respond to incidents, contain threats, and fortify the environment against future attacks. Key Responsibilities Anti-APT Operations: Monitor for indicators of APT campaigns using threat intelligence feeds, SIEM, EDR, NBAD, and anomaly detection tools. Identify and analyze tactics, techniques, and procedures (TTPs) used by threat actors aligned with MITRE ATT&CK. Leverage threat intelligence to proactively hunt and neutralize stealthy threats. Incident Response (IR) Lead and execute all phases of incident response: identification, containment, eradication, recovery, and lessons learned. Perform forensic analysis on systems and logs to determine the root cause, scope, and impact of security incidents. Collaborate with IT, SOC, and legal/compliance teams during major incidents and breach investigations. Create and maintain IR playbooks, response workflows, and escalation procedures. Detection And Prevention Work with SIEM and SOAR teams to improve alert fidelity and develop custom correlation rules. Coordinate with endpoint, network, and cloud teams to plug gaps and strengthen defenses post-incident. Assist in configuring anti-APT technologies like sandboxing, deception platforms, and EDR/XDR solutions. Required Skills And Qualifications Strong knowledge of APT groups and attack frameworks (e.g., MITRE ATT&CK, Lockheed Martin Kill Chain). Hands-on experience in incident response, digital forensics, threat hunting, and malware analysis. Proficiency with tools such as: EDR (e.g., CrowdStrike, SentinelOne, Carbon Black) SIEM (e.g., Splunk, QRadar, ArcSight) Forensics tools (e.g., FTK, EnCase, Volatility) Threat intel platforms (MISP, Anomali, ThreatConnect) Strong understanding of Windows/Linux internals, memory/process analysis, and network forensics. Experience writing detection rules (Sigma, YARA) and incident reports. Preferred Qualifications Certifications: GCIH, GCFA, GNFA, CHFI, OSCP, or similar. Experience with APT campaigns linked to sectors like government, BFSI, or critical infrastructure. Exposure to cloud incident response (Azure, AWS, GCP) and OT/ICS threat environments. Education Requirements BE, B.Tech in IT/CS/ECE, BCA, BSc CS and MCA Certification CEH/CSA/CHFI
Posted 7 hours ago
0 years
0 Lacs
Thane, Maharashtra, India
On-site
About The Company Tata Communications Redefines Connectivity with Innovation and IntelligenceDriving the next level of intelligence powered by Cloud, Mobility, Internet of Things, Collaboration, Security, Media services and Network services, we at Tata Communications are envisaging a New World of Communications Organisation : Novamesh Ltd (TATA Commununications Ltd) Position : L1, Location – Belapur, Customer location Shift : 9x5 Job Summary We are seeking a well-rounded Security Solutions Specialist with hands-on experience in deploying, configuring, and managing security platforms including EfficientIP (DNS, DHCP, IPAM), Picus Security (Breach and Attack Simulation), Varonis (Data Security & Governance), and ColorTokens (Microsegmentation & Zero Trust). The candidate will play a key role in optimizing the security posture of the organization through proactive technology implementation, tuning, and continuous improvement. Key Responsibilities EfficientIP (DNS Security & DDI Management): Configure and manage DDI (DNS, DHCP, IPAM) solutions using EfficientIP. Implement DNS threat protection, DNS tunneling detection, and response actions. Integrate EfficientIP with SIEM/SOC platforms for alerting and incident enrichment. Picus Security (Breach And Attack Simulation - BAS) Operate and tune the Picus BAS platform to continuously validate security controls. Conduct attack simulations mapped to MITRE ATT&CK to identify gaps in defenses. Collaborate with red/blue teams to interpret simulation outcomes and drive improvements. Varonis (Data Security And Insider Threat) Deploy and maintain Varonis to monitor access to critical data repositories (file shares, SharePoint, OneDrive, etc.). Investigate anomalous file activity, permissions misuse, and potential data exfiltration attempts. Support data classification, audit, and compliance initiatives (e.g., GDPR, HIPAA, PCI). ColorTokens (Microsegmentation & Zero Trust) Implement Zero Trust and application-layer segmentation policies using ColorTokens platform. Monitor east-west traffic, define security zones, and restrict lateral movement. Work with infrastructure and cloud teams to enforce policy across hybrid environments. Education Required Qualifications: B.E./B.Tech/MCA/M.Sc. in Computer Science or Information Technology Certification : CEH
Posted 7 hours ago
4.0 - 7.0 years
3 - 7 Lacs
Jaipur
Work from Office
Experience Required: 4+ years in Cybersecurity, with 2+years hands-on any threat intelligence platform Reports To: Security Operations Lead / SOC Manager Location: Jaipur Job Type: Full-time, Customer locations Job Summary: We are seeking a skilled Threat IntelligenceEngineer/Analyst with hands-on experience in managing and operating a UnifiedThreat Intelligence Platform (UIP). The ideal candidate will be responsible forintegrating, enriching, analyzing, and disseminating threat intelligence acrosssecurity systems (SIEM, SOAR, EDR) to enhance threat detection, hunting, andresponse efforts. Key Responsibilities: Administer and maintain the Unified Threat Intelligence Platform (e.g., MISP, Anomali, ThreatConnect, EclecticIQ, TIP from commercial vendors). Should have worked on any of the TI platform. Experience in Recorded future preferred. Aggregate, normalize, and enrich threat intel feeds from internal, commercial, and open-source sources (OSINT). Map Indicators of Compromise (IOCs), TTPs, and threat actor profiles using frameworks such as MITRE ATT&CK and STIX/TAXII. Integrate UIP with SIEM, SOAR, and EDR platforms to enable automated threat correlation and alert enrichment. Analyze and prioritize threat intelligence based on relevance, risk level, and business impact. Coordinate with threat-hunting and SOC teams to enable actionable use of threat intelligence. Create and manage threat intelligence dashboards, reports, and alerts. Continuously improve threat ingestion, enrichment pipelines, and integration workflows. Required Skills and Qualifications: Solid understanding of Threat Intelligence lifecycle: collection, processing, analysis, dissemination. Experience with commercial or open-source TIP/UIP tools (e.g., MISP, ThreatConnect, Anomali, EclecticIQ). Strong knowledge of STIX/TAXII, OpenIOC, YARA, Sigma rules. Experience integrating threat intel into SIEM (e.g., Splunk, QRadar, Sentinel) and SOAR platforms. Familiarity with threat actor behavior, campaigns, malware families, and IOC tracking. Working knowledge of scripting (Python preferred) for automation and data transformation. Ability to analyze complex data and present threat intelligence in clear, actionable formats. Education Requirements : BE, B.Tech in IT/CS/ECE, BCA, BSc CS and MCA Certification : CEH/CSA/ NBAD certification
Posted 8 hours ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
The Security Information and Event Management (SIEM) job market in India is thriving, with a growing demand for professionals who can monitor, analyze, and respond to security incidents in real-time. SIEM jobs offer lucrative career opportunities for individuals with a strong understanding of cybersecurity concepts and technologies.
The average salary range for SIEM professionals in India varies based on experience level: - Entry-level: INR 4-6 lakhs per annum - Mid-level: INR 8-12 lakhs per annum - Experienced: INR 15-20 lakhs per annum
Career progression in the SIEM field typically follows a path from: - SIEM Analyst - SIEM Engineer - SIEM Consultant - SIEM Architect
In addition to SIEM expertise, professionals in this field are often expected to have knowledge of: - Network Security - Incident Response - Threat Intelligence - Security Operations Center (SOC) operations
As you explore SIEM jobs in India, remember to continuously upgrade your skills, stay informed about the latest cybersecurity trends, and practice answering interview questions to showcase your expertise confidently. With the right preparation and dedication, you can excel in the dynamic field of SIEM and carve out a successful career for yourself. Good luck!
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
31458 Jobs | Dublin
Wipro
16542 Jobs | Bengaluru
EY
10788 Jobs | London
Accenture in India
10711 Jobs | Dublin 2
Amazon
8660 Jobs | Seattle,WA
Uplers
8559 Jobs | Ahmedabad
IBM
7988 Jobs | Armonk
Oracle
7535 Jobs | Redwood City
Muthoot FinCorp (MFL)
6170 Jobs | New Delhi
Capgemini
6091 Jobs | Paris,France