Jobs
Interviews

61 Snort Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4.0 - 6.0 years

7 - 11 Lacs

Pune

Work from Office

Role Description : As a Senior Network Security Specialist at Incedo, you will be responsible for managing and maintaining client network security. Your duties will include implementing security protocols, monitoring security logs, conducting vulnerability assessments, collaborating with other teams to manage risk, and providing security recommendations. Roles & Responsibilities: Designing and implementing network security strategies. Identifying and mitigating network security threats and vulnerabilities. Configuring and managing security devices such as firewalls and intrusion detection systems. Conducting security audits and assessments. Collaborating with other IT teams to ensure security policies and procedures are implemented. Providing technical support for security-related issues. Maintaining documentation of security configurations and changes. Technical Skills Skills Requirements: Knowledge of network security practices such as access control, intrusion detection, and incident response. Experience in configuring and managing network security devices such as firewalls, VPNs, and IDS/IPS. Familiarity with network security monitoring tools such as Wireshark, Snort, or Bro. Understanding of security frameworks and regulations such as NIST or PCI-DSS. Must have excellent communication skills and be able to communicate complex technical information to non-technical stakeholders in a clear and concise manner. Must understand the company's long-term vision and align with it. Provide leadership, guidance, and support to team members, ensuring the successful completion of tasks, and promoting a positive work environment that fosters collaboration and productivity, taking responsibility of the whole team. Qualifications 4-6 years of work experience in relevant field B.Tech/B.E/M.Tech or MCA degree from a reputed university. Computer science background is preferred

Posted 2 days ago

Apply

7.0 - 9.0 years

11 - 16 Lacs

Gurugram

Work from Office

Role Description : As a Technical Lead - Network Security at Incedo, you will be responsible for managing and maintaining client network security. Your duties will include implementing security protocols, monitoring security logs, conducting vulnerability assessments, collaborating with other teams to manage risk, and providing security recommendations. Roles & Responsibilities: Designing and implementing network security strategies. Identifying and mitigating network security threats and vulnerabilities. Configuring and managing security devices such as firewalls and intrusion detection systems. Conducting security audits and assessments. Collaborating with other IT teams to ensure security policies and procedures are implemented. Providing technical support for security-related issues. Maintaining documentation of security configurations and changes. Technical Skills Skills Requirements: Knowledge of network security practices such as access control, intrusion detection, and incident response. Experience in configuring and managing network security devices such as firewalls, VPNs, and IDS/IPS. Familiarity with network security monitoring tools such as Wireshark, Snort, or Bro. Understanding of security frameworks and regulations such as NIST or PCI-DSS. Must have excellent communication skills and be able to communicate complex technical information to non-technical stakeholders in a clear and concise manner. Must understand the company's long-term vision and align with it. Should be open to new ideas and be willing to learn and develop new skills. Should also be able to work well under pressure and manage multiple tasks and priorities. Qualifications 7-9 years of work experience in relevant field B.Tech/B.E/M.Tech or MCA degree from a reputed university. Computer science background is preferred .

Posted 2 days ago

Apply

4.0 - 6.0 years

7 - 11 Lacs

Pune

Work from Office

Role Description : As a Senior Network Security Specialist at Incedo, you will be responsible for managing and maintaining client network security. Your duties will include implementing security protocols, monitoring security logs, conducting vulnerability assessments, collaborating with other teams to manage risk, and providing security recommendations. Roles & Responsibilities: Designing and implementing network security strategies. Identifying and mitigating network security threats and vulnerabilities. Configuring and managing security devices such as firewalls and intrusion detection systems. Conducting security audits and assessments. Collaborating with other IT teams to ensure security policies and procedures are implemented. Providing technical support for security-related issues. Maintaining documentation of security configurations and changes. Technical Skills : Knowledge of network security practices such as access control, intrusion detection, and incident response. Experience in configuring and managing network security devices such as firewalls, VPNs, and IDS/IPS. Familiarity with network security monitoring tools such as Wireshark, Snort, or Bro. Understanding of security frameworks and regulations such as NIST or PCI-DSS. Must have excellent communication skills and be able to communicate complex technical information to non-technical stakeholders in a clear and concise manner. Must understand the company's long-term vision and align with it. Provide leadership, guidance, and support to team members, ensuring the successful completion of tasks, and promoting a positive work environment that fosters collaboration and productivity, taking responsibility of the whole team. Qualifications 4-6 years of work experience in relevant field B.Tech/B.E/M.Tech or MCA degree from a reputed university. Computer science background is preferred

Posted 2 days ago

Apply

4.0 years

0 Lacs

Gurgaon, Haryana, India

Remote

Do you like working on identifying and preventing potential cybersecurity risks? Are you ready for the next step in your career? Join our Digital Technology Team! Our Digital Technology business provides intelligent, connected technologies to monitor and control our energy extraction assets. We provide customers with the peace of mind needed to reliably and efficiently improve their operations. Our team creates business value through continuous improvement in up-time, resilience, performance, time to market, security and compliance Partner with the best As an Incident Response Analyst you will play a crucial role in safeguarding Baker Hughes information systems by analyzing a wide range of cybersecurity events. Your primary focus will be on identifying, investigating, and interpreting security incidents and trends, and making recommendations on appropriate containment and remediation steps. You will be at the forefront of detecting potential threats and vulnerabilities, providing critical insights that drive our cybersecurity defense strategies. As a Incident Response Analyst you will be Responsible for : Leading technical aspects of digital security incident detection and response, focusing on very unstructured incidents and high-risk events. Specializing in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and/or log-centric analysis (SIEM) Performing daily response operations with a schedule that may involve nontraditional working hours - act as escalation points for Event Triage Analysts Mentoring and train Event Analysts as required. The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role of an incident handler Fuel your passion Bachelor's Degree in Computer Science or “STEM” Majors (Science, Technology, Engineering and Math). A minimum 4 years of professional experience in STEM related degree, Political Science/Government/International Affairs. The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role of an incident handler Strong verbal and written communication skills Detailed understanding of APT, Cyber Crime and other associated tactics Strong track record of understanding and interest in recognized IT and OT security-related standards and technologies, demonstrated through training, job experience and/or industry Knowledge of and/or working on Baker Hughes OT products Professional experience with Cyber Security, Operations Security, Product Security, Industrial Control Systems (ICS), Information Assurance, and Information Technology Experience with host based detection and prevention suites (Microsoft Defender, OSSEC, Yara, MIR, Carbon Black, Tanium, etc.) Experience with host-centric tools for forensic collection and analysis (Microsoft Defender, Sleuth Kit, Volatility Framework, FTK, Encase, etc.) Experience with Network Forensics and/or Network Security Monitoring (NSM) tools (Snort, Bro-IDS, PCAP, tcpdump, etc.) and analysis techniques (alert, flow/session and PCAP analysis) Experience with malware and reverse engineering (Dynamic and static analysis) Strong IT infrastructure background including familiarity with the following: Networking (TCP/IP, UDP, Routing) Applications (HTTP, SMTP, DNS, FTP, SSH, etc.) Encryption (DES, AES, RSA) and hashing algorithms (MD5, SHA-1, etc.) System/Application vulnerabilities and exploitation Operating systems (Windows, *Nix, and Mac) Cloud technology (SaaS, IaaS, PaaS) and associated digital forensics and incident response techniques CISSP, CISM or related SANs certifications preferred Active US government security clearance Working knowledge of secure communication methods, including Secure Shell, S/MIME and PGP/GPG Work in a way that works for you We recognize that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Working flexible hours - flexing the times when you work in the day to help you fit everything in and work when you are the most productive. Occasionally working remotely from home or any other work location Working with us Our people are at the heart of what we do at Baker Hughes. We know we are better when all of our people are developed, engaged and able to bring their whole authentic selves to work. We invest in the health and well-being of our workforce, train and reward talent and develop leaders at all levels to bring out the best in each other. Working for you Our inventions have revolutionized energy for over a century. But to keep going forward tomorrow, we know we have to push the boundaries today. We prioritize rewarding those who embrace change with a package that reflects how much we value their input. Join us, and you can expect: Contemporary work-life balance policies and wellbeing activities Comprehensive private medical care options Safety net of life insurance and disability programs Tailored financial programs Additional elected or voluntary benefits About Us: We are an energy technology company that provides solutions to energy and industrial customers worldwide. Built on a century of experience and conducting business in over 120 countries, our innovative technologies and services are taking energy forward – making it safer, cleaner and more efficient for people and the planet. Join Us: Are you seeking an opportunity to make a real difference in a company that values innovation and progress? Join us and become part of a team of people who will challenge and inspire you! Let’s come together and take energy forward. Baker Hughes Company is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law. R147718

Posted 2 days ago

Apply

4.0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Do you like working on identifying and preventing potential cybersecurity risks? Are you ready for the next step in your career? Join our Digital Technology Team! Our Digital Technology business provides intelligent, connected technologies to monitor and control our energy extraction assets. We provide customers with the peace of mind needed to reliably and efficiently improve their operations. Our team creates business value through continuous improvement in up-time, resilience, performance, time to market, security and compliance Partner with the best As an Incident Response Analyst you will play a crucial role in safeguarding Baker Hughes information systems by analyzing a wide range of cybersecurity events. Your primary focus will be on identifying, investigating, and interpreting security incidents and trends, and making recommendations on appropriate containment and remediation steps. You will be at the forefront of detecting potential threats and vulnerabilities, providing critical insights that drive our cybersecurity defense strategies. As a Incident Response Analyst you will be Responsible for : Leading technical aspects of digital security incident detection and response, focusing on very unstructured incidents and high-risk events. Specializing in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and/or log-centric analysis (SIEM) Performing daily response operations with a schedule that may involve nontraditional working hours - act as escalation points for Event Triage Analysts Mentoring and train Event Analysts as required. The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role of an incident handler Fuel your passion Bachelor's Degree in Computer Science or “STEM” Majors (Science, Technology, Engineering and Math). A minimum 4 years of professional experience in STEM related degree, Political Science/Government/International Affairs. The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role of an incident handler Strong verbal and written communication skills Detailed understanding of APT, Cyber Crime and other associated tactics Strong track record of understanding and interest in recognized IT and OT security-related standards and technologies, demonstrated through training, job experience and/or industry Knowledge of and/or working on Baker Hughes OT products Professional experience with Cyber Security, Operations Security, Product Security, Industrial Control Systems (ICS), Information Assurance, and Information Technology Experience with host based detection and prevention suites (Microsoft Defender, OSSEC, Yara, MIR, Carbon Black, Tanium, etc.) Experience with host-centric tools for forensic collection and analysis (Microsoft Defender, Sleuth Kit, Volatility Framework, FTK, Encase, etc.) Experience with Network Forensics and/or Network Security Monitoring (NSM) tools (Snort, Bro-IDS, PCAP, tcpdump, etc.) and analysis techniques (alert, flow/session and PCAP analysis) Experience with malware and reverse engineering (Dynamic and static analysis) Strong IT infrastructure background including familiarity with the following: Networking (TCP/IP, UDP, Routing) Applications (HTTP, SMTP, DNS, FTP, SSH, etc.) Encryption (DES, AES, RSA) and hashing algorithms (MD5, SHA-1, etc.) System/Application vulnerabilities and exploitation Operating systems (Windows, *Nix, and Mac) Cloud technology (SaaS, IaaS, PaaS) and associated digital forensics and incident response techniques CISSP, CISM or related SANs certifications preferred Active US government security clearance Working knowledge of secure communication methods, including Secure Shell, S/MIME and PGP/GPG Work in a way that works for you We recognize that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Working flexible hours - flexing the times when you work in the day to help you fit everything in and work when you are the most productive. Occasionally working remotely from home or any other work location Working with us Our people are at the heart of what we do at Baker Hughes. We know we are better when all of our people are developed, engaged and able to bring their whole authentic selves to work. We invest in the health and well-being of our workforce, train and reward talent and develop leaders at all levels to bring out the best in each other. Working for you Our inventions have revolutionized energy for over a century. But to keep going forward tomorrow, we know we have to push the boundaries today. We prioritize rewarding those who embrace change with a package that reflects how much we value their input. Join us, and you can expect: Contemporary work-life balance policies and wellbeing activities Comprehensive private medical care options Safety net of life insurance and disability programs Tailored financial programs Additional elected or voluntary benefits About Us: We are an energy technology company that provides solutions to energy and industrial customers worldwide. Built on a century of experience and conducting business in over 120 countries, our innovative technologies and services are taking energy forward – making it safer, cleaner and more efficient for people and the planet. Join Us: Are you seeking an opportunity to make a real difference in a company that values innovation and progress? Join us and become part of a team of people who will challenge and inspire you! Let’s come together and take energy forward. Baker Hughes Company is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law. R147718

Posted 2 days ago

Apply

4.0 years

0 Lacs

Mumbai, Maharashtra, India

Remote

Do you like working on identifying and preventing potential cybersecurity risks? Are you ready for the next step in your career? Join our Digital Technology Team! Our Digital Technology business provides intelligent, connected technologies to monitor and control our energy extraction assets. We provide customers with the peace of mind needed to reliably and efficiently improve their operations. Our team creates business value through continuous improvement in up-time, resilience, performance, time to market, security and compliance Partner with the best As an Incident Response Analyst you will play a crucial role in safeguarding Baker Hughes information systems by analyzing a wide range of cybersecurity events. Your primary focus will be on identifying, investigating, and interpreting security incidents and trends, and making recommendations on appropriate containment and remediation steps. You will be at the forefront of detecting potential threats and vulnerabilities, providing critical insights that drive our cybersecurity defense strategies. As a Incident Response Analyst you will be Responsible for : Leading technical aspects of digital security incident detection and response, focusing on very unstructured incidents and high-risk events. Specializing in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and/or log-centric analysis (SIEM) Performing daily response operations with a schedule that may involve nontraditional working hours - act as escalation points for Event Triage Analysts Mentoring and train Event Analysts as required. The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role of an incident handler Fuel your passion Bachelor's Degree in Computer Science or “STEM” Majors (Science, Technology, Engineering and Math). A minimum 4 years of professional experience in STEM related degree, Political Science/Government/International Affairs. The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role of an incident handler Strong verbal and written communication skills Detailed understanding of APT, Cyber Crime and other associated tactics Strong track record of understanding and interest in recognized IT and OT security-related standards and technologies, demonstrated through training, job experience and/or industry Knowledge of and/or working on Baker Hughes OT products Professional experience with Cyber Security, Operations Security, Product Security, Industrial Control Systems (ICS), Information Assurance, and Information Technology Experience with host based detection and prevention suites (Microsoft Defender, OSSEC, Yara, MIR, Carbon Black, Tanium, etc.) Experience with host-centric tools for forensic collection and analysis (Microsoft Defender, Sleuth Kit, Volatility Framework, FTK, Encase, etc.) Experience with Network Forensics and/or Network Security Monitoring (NSM) tools (Snort, Bro-IDS, PCAP, tcpdump, etc.) and analysis techniques (alert, flow/session and PCAP analysis) Experience with malware and reverse engineering (Dynamic and static analysis) Strong IT infrastructure background including familiarity with the following: Networking (TCP/IP, UDP, Routing) Applications (HTTP, SMTP, DNS, FTP, SSH, etc.) Encryption (DES, AES, RSA) and hashing algorithms (MD5, SHA-1, etc.) System/Application vulnerabilities and exploitation Operating systems (Windows, *Nix, and Mac) Cloud technology (SaaS, IaaS, PaaS) and associated digital forensics and incident response techniques CISSP, CISM or related SANs certifications preferred Active US government security clearance Working knowledge of secure communication methods, including Secure Shell, S/MIME and PGP/GPG Work in a way that works for you We recognize that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Working flexible hours - flexing the times when you work in the day to help you fit everything in and work when you are the most productive. Occasionally working remotely from home or any other work location Working with us Our people are at the heart of what we do at Baker Hughes. We know we are better when all of our people are developed, engaged and able to bring their whole authentic selves to work. We invest in the health and well-being of our workforce, train and reward talent and develop leaders at all levels to bring out the best in each other. Working for you Our inventions have revolutionized energy for over a century. But to keep going forward tomorrow, we know we have to push the boundaries today. We prioritize rewarding those who embrace change with a package that reflects how much we value their input. Join us, and you can expect: Contemporary work-life balance policies and wellbeing activities Comprehensive private medical care options Safety net of life insurance and disability programs Tailored financial programs Additional elected or voluntary benefits About Us: We are an energy technology company that provides solutions to energy and industrial customers worldwide. Built on a century of experience and conducting business in over 120 countries, our innovative technologies and services are taking energy forward – making it safer, cleaner and more efficient for people and the planet. Join Us: Are you seeking an opportunity to make a real difference in a company that values innovation and progress? Join us and become part of a team of people who will challenge and inspire you! Let’s come together and take energy forward. Baker Hughes Company is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law. R147718

Posted 2 days ago

Apply

4.0 years

0 Lacs

Pune, Maharashtra, India

Remote

Do you like working on identifying and preventing potential cybersecurity risks? Are you ready for the next step in your career? Join our Digital Technology Team! Our Digital Technology business provides intelligent, connected technologies to monitor and control our energy extraction assets. We provide customers with the peace of mind needed to reliably and efficiently improve their operations. Our team creates business value through continuous improvement in up-time, resilience, performance, time to market, security and compliance Partner with the best As an Incident Response Analyst you will play a crucial role in safeguarding Baker Hughes information systems by analyzing a wide range of cybersecurity events. Your primary focus will be on identifying, investigating, and interpreting security incidents and trends, and making recommendations on appropriate containment and remediation steps. You will be at the forefront of detecting potential threats and vulnerabilities, providing critical insights that drive our cybersecurity defense strategies. As a Incident Response Analyst you will be Responsible for : Leading technical aspects of digital security incident detection and response, focusing on very unstructured incidents and high-risk events. Specializing in network-centric analysis (NSM), host-centric analysis (live response, digital forensics), malware analysis, and/or log-centric analysis (SIEM) Performing daily response operations with a schedule that may involve nontraditional working hours - act as escalation points for Event Triage Analysts Mentoring and train Event Analysts as required. The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role of an incident handler Fuel your passion Bachelor's Degree in Computer Science or “STEM” Majors (Science, Technology, Engineering and Math). A minimum 4 years of professional experience in STEM related degree, Political Science/Government/International Affairs. The best candidates for the role work well with other people and have strong verbal and written communication skills, a sense of diplomacy, and decision making skills to handle the often fast-paced role of an incident handler Strong verbal and written communication skills Detailed understanding of APT, Cyber Crime and other associated tactics Strong track record of understanding and interest in recognized IT and OT security-related standards and technologies, demonstrated through training, job experience and/or industry Knowledge of and/or working on Baker Hughes OT products Professional experience with Cyber Security, Operations Security, Product Security, Industrial Control Systems (ICS), Information Assurance, and Information Technology Experience with host based detection and prevention suites (Microsoft Defender, OSSEC, Yara, MIR, Carbon Black, Tanium, etc.) Experience with host-centric tools for forensic collection and analysis (Microsoft Defender, Sleuth Kit, Volatility Framework, FTK, Encase, etc.) Experience with Network Forensics and/or Network Security Monitoring (NSM) tools (Snort, Bro-IDS, PCAP, tcpdump, etc.) and analysis techniques (alert, flow/session and PCAP analysis) Experience with malware and reverse engineering (Dynamic and static analysis) Strong IT infrastructure background including familiarity with the following: Networking (TCP/IP, UDP, Routing) Applications (HTTP, SMTP, DNS, FTP, SSH, etc.) Encryption (DES, AES, RSA) and hashing algorithms (MD5, SHA-1, etc.) System/Application vulnerabilities and exploitation Operating systems (Windows, *Nix, and Mac) Cloud technology (SaaS, IaaS, PaaS) and associated digital forensics and incident response techniques CISSP, CISM or related SANs certifications preferred Active US government security clearance Working knowledge of secure communication methods, including Secure Shell, S/MIME and PGP/GPG Work in a way that works for you We recognize that everyone is different and that the way in which people want to work and deliver at their best is different for everyone too. In this role, we can offer the following flexible working patterns: Working flexible hours - flexing the times when you work in the day to help you fit everything in and work when you are the most productive. Occasionally working remotely from home or any other work location Working with us Our people are at the heart of what we do at Baker Hughes. We know we are better when all of our people are developed, engaged and able to bring their whole authentic selves to work. We invest in the health and well-being of our workforce, train and reward talent and develop leaders at all levels to bring out the best in each other. Working for you Our inventions have revolutionized energy for over a century. But to keep going forward tomorrow, we know we have to push the boundaries today. We prioritize rewarding those who embrace change with a package that reflects how much we value their input. Join us, and you can expect: Contemporary work-life balance policies and wellbeing activities Comprehensive private medical care options Safety net of life insurance and disability programs Tailored financial programs Additional elected or voluntary benefits About Us: We are an energy technology company that provides solutions to energy and industrial customers worldwide. Built on a century of experience and conducting business in over 120 countries, our innovative technologies and services are taking energy forward – making it safer, cleaner and more efficient for people and the planet. Join Us: Are you seeking an opportunity to make a real difference in a company that values innovation and progress? Join us and become part of a team of people who will challenge and inspire you! Let’s come together and take energy forward. Baker Hughes Company is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law. R147718

Posted 2 days ago

Apply

3.0 - 5.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Our growth plans: We process close to 4% of the country's freight on our software platform. Our goal is to get to 20% of the country's freight by 2028. This gives us a bird’s eye view of the market. We’re already the largest road freight technology platform in the country and we plan to build on this base to drive growth in software, freight marketplace and supply chain financing to get to a 100M USD revenue by 2028. About the Role: Cyber Security Engineer plays a pivotal role in safeguarding Freight Tiger’s Application & Cloud infrastructure assets and information. Key responsibilities: Lead the efforts towards development and implementation of cyber security architecture for Freight Tiger’s application and cloud infrastructure. Conduct regular vulnerability assessments to identify and mitigate potential security risks in applications and perform penetration testing to simulate cyber-attacks and identify weaknesses in the cloud infrastructure. Work and coordinate with engineering teams to fix security vulnerabilities & bugs and integrate security measures into the development lifecycle to ensure security is considered in all stages of software and system development. Lead incident response plans to address security incidents and investigate security breaches and provide detailed reports on root causes and recommended actions. Conduct cybersecurity best practices and awareness training campaigns across the organization. Plan and implement solutions to monitor network traffic and end user computing devices for unusual activities and potential security threats. Participate in regular security audits to assess compliance with security standards. Preferred qualifications: Graduation or higher, preferably in CS or relevant stream. CEH or similar industry certification. 3 - 5 years of relevant experience conducting security and vulnerability assessment of Applications and cloud infrastructure. Product Expertise: Strong experience with leading security assessment tools like Burp Suite, Metasploit, Wireshark, Snort and Nmap etc. Hands-on exposure of working with AWS environment including the security services like IAM, Guard Duty, CloudTrail, WAF, Shield etc. Exposure of participation in the audit process, preferably for PCI-DSS, ISO 2701, SOC II etc. Strong attention to detail with an analytical mind and outstanding problem-solving skills. Great awareness of cybersecurity trends and hacking techniques.

Posted 2 days ago

Apply

3.0 - 5.0 years

5 - 9 Lacs

Pune

Work from Office

Role Description As a Software Engineer - Network Security at Incedo, you will be responsible for managing and maintaining client network security. Your duties will include implementing security protocols, monitoring security logs, conducting vulnerability assessments, collaborating with other teams to manage risk, and providing security recommendations. Roles & Responsibilities: Designing and implementing network security strategies. Identifying and mitigating network security threats and vulnerabilities. Configuring and managing security devices such as firewalls and intrusion detection systems. Conducting security audits and assessments. Collaborating with other IT teams to ensure security policies and procedures are implemented. Providing technical support for security-related issues. Maintaining documentation of security configurations and changes. Technical Skills Skills Requirements: Knowledge of network security practices such as access control, intrusion detection, and incident response. Experience in configuring and managing network security devices such as firewalls, VPNs, and IDS/IPS. Familiarity with network security monitoring tools such as Wireshark, Snort, or Bro. Understanding of security frameworks and regulations such as NIST or PCI-DSS. Must have excellent communication skills and be able to communicate complex technical information to non-technical stakeholders in a clear and concise manner. Must understand the company's long-term vision and align with it. Nice-to-have skills Qualifications 3-5 years of work experience in relevant field B.Tech/B.E/M.Tech or MCA degree from a reputed university. Computer science background is preferred

Posted 2 days ago

Apply

4.0 - 6.0 years

7 - 11 Lacs

Pune

Work from Office

As a Senior Network Security Specialist at Incedo, you will be responsible for managing and maintaining client network security. Your duties will include implementing security protocols, monitoring security logs, conducting vulnerability assessments, collaborating with other teams to manage risk, and providing security recommendations. Roles & Responsibilities: Designing and implementing network security strategies. Identifying and mitigating network security threats and vulnerabilities. Configuring and managing security devices such as firewalls and intrusion detection systems. Conducting security audits and assessments. Collaborating with other IT teams to ensure security policies and procedures are implemented. Providing technical support for security-related issues. Maintaining documentation of security configurations and changes. Technical Skills Skills Requirements: Knowledge of network security practices such as access control, intrusion detection, and incident response. Experience in configuring and managing network security devices such as firewalls, VPNs, and IDS/IPS. Familiarity with network security monitoring tools such as Wireshark, Snort, or Bro. Understanding of security frameworks and regulations such as NIST or PCI-DSS. Must have excellent communication skills and be able to communicate complex technical information to non-technical stakeholders in a clear and concise manner. Must understand the company's long-term vision and align with it. Provide leadership, guidance, and support to team members, ensuring the successful completion of tasks, and promoting a positive work environment that fosters collaboration and productivity, taking responsibility of the whole team. Nice-to-have skills Qualifications Qualifications 4-6 years of work experience in relevant field B.Tech/B.E/M.Tech or MCA degree from a reputed university. Computer science background is preferred

Posted 5 days ago

Apply

90.0 years

0 Lacs

Pune, Maharashtra, India

On-site

At Allstate, great things happen when our people work together to protect families and their belongings from life’s uncertainties. And for more than 90 years our innovative drive has kept us a step ahead of our customers’ evolving needs. From advocating for seat belts, air bags and graduated driving laws, to being an industry leader in pricing sophistication, telematics, and, more recently, device and identity protection. Job Description We are seeking an experienced Threat Hunter to perform intelligence-driven network defense supporting the monitoring and incident response capabilities. The role will involve analysis of large amounts of data from vendors and internal sources, including various indicator feeds, Splunk, and several threat intelligence tools, etc. The candidate will perform the functions of threat operations and hunting and serve as a liaison for Threat Intelligence for the Cyber Security Operations Center, and mentor the incident handling, incident response, and forensics teams. Key Responsibilities Performs research and analysis of potential and known threats and vulnerabilities for assigned areas and cybersecurity operational systems; designs, executes, and records results of testing plans and scripts and suggests improvements Understanding of common network and application stack protocols, including but not limited to TCP/IP, SMTP, DNS, TLS, XML, HTTP, etc. Experience with security operations tools, including but not limited to: SIEM (e.g. Defender, Splunk, ArcSight) EDR (e.g. CrowdStrike, Tanium) Indicator management (e.g. ThreatConnect) Signature development/management (e.g. Snort rules, Yara rules) Knowledge of common security infrastructure tools (NIDS, HIPS, EDR, etc.) Excellent analytical and problem solving skills, a passion for research and puzzle-solving. Understanding of large, complex corporate network environments. Strong communication (oral, written, presentation), interpersonal and consultative skills, especially in regard to white papers, briefs, and presentations. Good organization and documentation skills Peer collaboration and mentorship skills Critically evaluates business processes and cybersecurity systems to develop incident response plans for assigned area; executes plan to detect, alert, and contain intrusions and attacks, ensure required actions are taking place, and communicate status to affected areas and leadership. Education 4 year Bachelors Degree (Preferred) Experience 2 or more years of experience (Preferred) Supervisory Responsibilities This job does not have any supervisory duties Education & Experience (in Lieu) In lieu of the above education requirements, an equivalent combination of education and experience may be considered. Primary Skills IT Security Operations, Security Tools, Technical Investigation, Threat Assessment, Vulnerability Scanning Shift Time Shift B (India) Recruiter Info Yateesh B G ybgaa@allstate.com About Allstate The Allstate Corporation is one of the largest publicly held insurance providers in the United States. Ranked No. 84 in the 2023 Fortune 500 list of the largest United States corporations by total revenue, The Allstate Corporation owns and operates 18 companies in the United States, Canada, Northern Ireland, and India. Allstate India Private Limited, also known as Allstate India, is a subsidiary of The Allstate Corporation. The India talent center was set up in 2012 and operates under the corporation's Good Hands promise. As it innovates operations and technology, Allstate India has evolved beyond its technology functions to be the critical strategic business services arm of the corporation. With offices in Bengaluru and Pune, the company offers expertise to the parent organization’s business areas including technology and innovation, accounting and imaging services, policy administration, transformation solution design and support services, transformation of property liability service design, global operations and integration, and training and transition. Learn more about Allstate India here.

Posted 6 days ago

Apply

170.0 years

0 Lacs

Greater Hyderabad Area

On-site

Area(s) of responsibility About Us Birlasoft, a global leader at the forefront of Cloud, AI, and Digital technologies, seamlessly blends domain expertise with enterprise solutions. The company’s consultative and design-thinking approach empowers societies worldwide, enhancing the efficiency and productivity of businesses. As part of the multibillion-dollar diversified CKA Birla Group, Birlasoft with its 12,000+ professionals, is committed to continuing the Group’s 170-year heritage of building sustainable communities. Location -Mumbai ,Pune ,Bangalore, Hyderabad , Noida Exp -8 yrs to 10 yrs About The Role We are seeking a skilled Network Security Engineer to design, implement, and maintain secure network infrastructures. The ideal candidate will possess strong expertise in network protocols, firewall and IDS/IPS configuration, VPN solutions, and security compliance standards. You will be instrumental in enhancing our network security posture through threat detection, risk assessment, and zero trust architecture implementation. Key Responsibilities Design, configure, and manage network security devices including firewalls (Palo Alto, Fortinet, Cisco ASA) and intrusion detection/prevention systems (Snort, Suricata). Implement and manage Network Access Control (NAC) systems utilizing 802.1X, RADIUS, and Cisco ISE for role-based access control. Configure and maintain secure VPN solutions including IPsec, SSL VPNs, and site-to-site tunnels. Conduct SIEM and log analysis using tools such as Splunk, QRadar, and ELK Stack to detect and respond to security threats. Design and enforce network segmentation and apply Zero Trust security principles. Ensure compliance with security standards such as ISO 27001, NIST, PCI-DSS, GDPR, and HIPAA. Perform threat modeling, vulnerability assessments, and risk analysis to mitigate security risks. Collaborate with cross-functional teams to develop and enforce security policies and procedures. Core Technical Competencies Deep understanding of network protocols including TCP/IP, UDP, ICMP, DNS, HTTP/S, FTP. Hands-on experience with firewall and IDS/IPS tools such as Palo Alto, Fortinet, Cisco ASA, Snort, and Suricata. Familiarity with Network Access Control frameworks (802.1X, RADIUS), especially Cisco ISE. Expertise in VPN technologies like IPsec and SSL VPNs. Proficiency in SIEM platforms and log correlation for threat detection and incident response. Knowledge of network segmentation strategies and Zero Trust architecture. Strong understanding of compliance requirements (ISO 27001, NIST, PCI-DSS, GDPR, HIPAA). Ability to conduct threat modeling and risk assessments. Required Certifications CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CEH (Certified Ethical Hacker) CompTIA Security+ CCNP Security (Cisco Certified Network Professional Security) Palo Alto PCNSA/PCNSE Qualifications Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field (or equivalent experience). Proven experience in network security engineering or a similar role. Why Join Us? Work with cutting-edge security technologies. Collaborate with a passionate and dynamic security team. Opportunities for professional growth and certification support.

Posted 6 days ago

Apply

170.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

About Us: Birlasoft, a global leader at the forefront of Cloud, AI, and Digital technologies, seamlessly blends domain expertise with enterprise solutions. The company’s consultative and design-thinking approach empowers societies worldwide, enhancing the efficiency and productivity of businesses. As part of the multibillion-dollar diversified CKA Birla Group, Birlasoft with its 12,000+ professionals, is committed to continuing the Group’s 170-year heritage of building sustainable communities. Location -Mumbai ,Pune ,Bangalore, Hyderabad , Noida Exp -8 yrs to 10 yrs About the Role: We are seeking a skilled Network Security Engineer to design, implement, and maintain secure network infrastructures. The ideal candidate will possess strong expertise in network protocols, firewall and IDS/IPS configuration, VPN solutions, and security compliance standards. You will be instrumental in enhancing our network security posture through threat detection, risk assessment, and zero trust architecture implementation. Key Responsibilities: Design, configure, and manage network security devices including firewalls (Palo Alto, Fortinet, Cisco ASA) and intrusion detection/prevention systems (Snort, Suricata). Implement and manage Network Access Control (NAC) systems utilizing 802.1X, RADIUS, and Cisco ISE for role-based access control. Configure and maintain secure VPN solutions including IPsec, SSL VPNs, and site-to-site tunnels. Conduct SIEM and log analysis using tools such as Splunk, QRadar, and ELK Stack to detect and respond to security threats. Design and enforce network segmentation and apply Zero Trust security principles. Ensure compliance with security standards such as ISO 27001, NIST, PCI-DSS, GDPR, and HIPAA. Perform threat modeling, vulnerability assessments, and risk analysis to mitigate security risks. Collaborate with cross-functional teams to develop and enforce security policies and procedures. Core Technical Competencies: Deep understanding of network protocols including TCP/IP, UDP, ICMP, DNS, HTTP/S, FTP. Hands-on experience with firewall and IDS/IPS tools such as Palo Alto, Fortinet, Cisco ASA, Snort, and Suricata. Familiarity with Network Access Control frameworks (802.1X, RADIUS), especially Cisco ISE. Expertise in VPN technologies like IPsec and SSL VPNs. Proficiency in SIEM platforms and log correlation for threat detection and incident response. Knowledge of network segmentation strategies and Zero Trust architecture. Strong understanding of compliance requirements (ISO 27001, NIST, PCI-DSS, GDPR, HIPAA). Ability to conduct threat modeling and risk assessments. Required Certifications: CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CEH (Certified Ethical Hacker) CompTIA Security+ CCNP Security (Cisco Certified Network Professional Security) Palo Alto PCNSA/PCNSE Qualifications: Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field (or equivalent experience). Proven experience in network security engineering or a similar role. Why Join Us? Work with cutting-edge security technologies. Collaborate with a passionate and dynamic security team. Opportunities for professional growth and certification support.

Posted 6 days ago

Apply

5.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

About the Role We are seeking a highly skilled and hands-on AI/ML Lead with deep experience in training and fine-tuning Large Language Models (LLMs) such as LLaMA 3 using frameworks like vLLM. The ideal candidate will bring a strong background in machine learning and a practical understanding of the cybersecurity domain—especially around threat intelligence, vulnerabilities, exploits, and configuration analysis. You will lead the development and implementation of models that understand, process, and generate insights across a wide range of cybersecurity content. You will guide a team of ML engineers and collaborate closely with cybersecurity SMEs, data engineers, and DevOps to ensure delivery of scalable, performant, and security-aware AI systems. Key Responsibilities Lead the fine-tuning and domain adaptation of open-source LLMs (e.g., LLaMA 3) using frameworks like vLLM, HuggingFace, DeepSpeed, and PEFT techniques. Develop data pipelines to ingest, clean, and structure cybersecurity data, including threat intelligence reports, CVEs, exploits, malware analysis, and configuration files. Collaborate with cybersecurity analysts to build taxonomy and structured knowledge representations to embed into LLMs. Drive the design and execution of evaluation frameworks specific to cybersecurity tasks (e.g., classification, summarization, anomaly detection). Own the lifecycle of model development including training, inference optimization, testing, and deployment. Provide technical leadership and mentorship to a team of ML engineers and researchers. Stay current with advances in LLM architectures, cybersecurity datasets, and AI-based threat detection. Advocate for ethical AI use and model robustness, especially given the sensitive nature of cybersecurity data. Required Qualifications 5+ years of experience in machine learning, with at least 2 years focused on LLM training or fine-tuning. Strong experience with vLLM, HuggingFace Transformers, LoRA/QLoRA, and distributed training techniques. Proven experience working with cybersecurity data—ideally including MITRE ATT&CK, CVE/NVD databases, YARA rules, Snort/Suricata rules, STIX/TAXII, or malware datasets. Proficiency in Python, ML libraries (PyTorch, Transformers), and MLOps practices. Familiarity with prompt engineering, RAG (Retrieval-Augmented Generation), and vector stores like FAISS or Weaviate. Demonstrated ability to lead projects and collaborate across interdisciplinary teams. Excellent problem-solving skills and strong written & verbal communication. Nice to Have Experience deploying models via vLLM in production environments with FastAPI or similar APIs. Knowledge of cloud-based ML training (AWS/GCP/Azure) and GPU infrastructure. Background in reverse engineering, malware analysis, red teaming, or threat hunting. Publications, open-source contributions, or technical blogs in the intersection of AI and cybersecurity. What We Offer Opportunity to work at the intersection of cutting-edge AI and cybersecurity. Collaborative and fast-paced environment. Access to state-of-the-art hardware and ML tooling. Support for research, conferences, and continuous learning.

Posted 6 days ago

Apply

0 years

0 Lacs

New Delhi, Delhi, India

On-site

Job Description We are seeking a talented DevOps and Infrastructure Engineer to join our dynamic team. The ideal candidate will have a passion for building and maintaining cloud infrastructure while ensuring the reliability and efficiency of our applications. You will be responsible for deploying and maintaining cloud environments, enhancing CI/CD pipelines, and ensuring optimal performance through proactive monitoring and troubleshooting. Roles and Responsibilities: Cloud Infrastructure: Deploy and maintain cloud infrastructure on Microsoft Azure or AWS, ensuring scalability and reliability. CI/CD Pipeline Enhancement: Continuously improve CI/CD pipelines and build robust development and production environments. Application Deployment: Manage application deployments, ensuring high reliability and minimal downtime. Monitoring: Monitor infrastructure health and perform application log analysis to identify and resolve issues proactively. Incident Management: Troubleshoot and debug incidents, collaborating closely with development teams to implement effective solutions. Infrastructure as Code: Enhance Ansible roles and Terraform modules, maintaining best practices for Infrastructure as Code (IaC). Tool Development: Write tools and utilities to streamline and improve infrastructure operations. SDLC Practices: Establish and uphold industry-standard Software Development Life Cycle (SDLC) practices with a strong focus on quality. On-call Support: Be available 24/7 for on-call incident management for production environments. Requirements:Incident Management: Troubleshoot and debug incidents, collaborating closely with development teams to implement effective solutions. Infrastructure as Code: Enhance Ansible roles and Terraform modules, maintaining best practices for Infrastructure as Code (IaC). Tool Development: Write tools and utilities to streamline and improve infrastructure operations. SDLC Practices: Establish and uphold industry-standard Software Development Life Cycle (SDLC) practices with a strong focus on quality. On-call Support: Be available 24/7 for on-call incident management for production environments. Requirements: Cloud Experience: Hands-on experience deploying and provisioning virtual machines on Microsoft Azure or Amazon AWS. Linux Administration: Proficient with Linux systems and basic system administration tasks. Networking Knowledge: Working knowledge of network fundamentals (Ethernet, TCP/IP, WAF, DNS, etc.). Scripting Skills: Proficient in BASH and at least one high-level scripting language (Python, Ruby, Perl). Tools Proficiency: Familiarity with tools such as Git, Nagios, Snort, and OpenVPN. Containerization: Strong experience with Docker and Kubernetes is mandatory. Communication Skills: Excellent interpersonal communication skills, with the ability to engage with peers, Education UG: BCA in Any Specialization, B.Tech/B.E. in Any Specialization PG: MCA in Any SpecializationAbout company Celeris Empowers Online Businesses with seamless global connectivity, Uniting Payment Providers and Acquirers for streamlined Communication, Control, and Management.

Posted 1 week ago

Apply

8.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Req ID: 285915 NTT DATA strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thinking organization, apply now. We are currently seeking a Network Security Firewall Specialist Advisor Palo Alto to join our team in Noida, Uttar Pradesh (IN-UP), India (IN). Drive for results - Ability to grasp complex issues to arrive at optimal solutions - Strong ethics and integrity - Flexible to changing needs of customer , account and team - Excellent customer facing communication skills, customer support and knowledge of ITIL best practices. ITIL certification is a plus. - High-level experience and proved knowledge in atleast 3 of different network security products likes Firewalls (Watchguard, Cisco, Palo Alto), Content Filtering (Cisco Umbrella, Bluecoats, Websense, McAfee Web gateway) and IDS/IPS (Cisco Sourcefire, McAfee, Tipping Point, Snort) - Strong working knowledge of Cisco Firepower ASA and FTD. - High-level networking troubleshooting skills and extensive knowledge of web connectivity and protocols (WCCP, PAC files, TCP/IP, HTTP, HTTPS, SSL, FTP, Telnet, SSH, etc.) - Understanding the integration with authentication protocols such as LDAP, IWA, IWA-direct, SSO, Active directory. - At least 2 High-level certification in Network security from any of the vendors like Cisco, Checkpoint, Juniper, McAfee, BlueCoat, SourceFire (CCNP, JNCIs, etc) - Candidate must possess good time management skills to properly manage operations duties and other task that will assist in the optimization of the Network Security team - Clear understanding of Windows and Linux operating systems - 8+ years of network troubleshooting experience and at least 4-5 years Network Security administration and design experience - Bachelor’s degree or equivalent experience. About NTT DATA NTT DATA is a $30 billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long term success. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure and connectivity. We are one of the leading providers of digital and AI infrastructure in the world. NTT DATA is a part of NTT Group, which invests over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. Visit us at us.nttdata.com NTT DATA is an equal opportunity employer and considers all applicants without regarding to race, color, religion, citizenship, national origin, ancestry, age, sex, sexual orientation, gender identity, genetic information, physical or mental disability, veteran or marital status, or any other characteristic protected by law. We are committed to creating a diverse and inclusive environment for all employees. If you need assistance or an accommodation due to a disability, please inform your recruiter so that we may connect you with the appropriate team.

Posted 1 week ago

Apply

10.0 - 13.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Summary Position Summary Cyber Threat Intelligence Collection Manager Overview Of The Job As part of the global Centralized Cybersecurity Threat Intel team, the Collection Manager reports to the Threat Intelligence Operation Lead. Leading the collection, ingestion, analysis and documentation of intelligence sources. Your primary role will be to lead a small team of collection analysts to make sure the intel that we collect helps us answer the issues our decision makers care about. As a Collection Manager, you will lead the collection and ingestion of intelligence data and internal telemetry, lead the processing of said data to become information that intelligence analysts can work with, evaluation of the sources, follow and lead the external threat monitoring and darkweb investigations’ capability, drive the team’s intelligence collection management plan, vendor and sources management evaluation and procurement internal process. The right candidate is a motivated individual with excellent managerial skills to organize and motivate an international team of collections analysts to identify new data sources, process existing data to be able to analyze in new and innovative ways, and create analytics, rules, and logic to detect badness in our environment. Additionally, the Collection Manager will regularly interface with Global security teams and vendors to ensure our intelligence collection needs are met. Other responsibilities include to : Identify and curate intelligence relevant to Deloitte’s Priority Intelligence Requirements (PIRs). Create and maintain analytics that can run on security devices and SIEM. Collaborate with internal stakeholders and work actively with vendors. Gain and maintain access for the TI team to Deloitte internal data and telemetry at the Global and MF level from sources to include but not limited to email, FWs, WAFs, IDPS, etc. Manage relationships with vendors and their procurement process. Create, maintain and update the high-level collection management plan. Processing and documenting intelligence from various data sources. Manage the conference attendance plan for the entire intelligence team. Support the intel sharing effort. Organize and maintain our database of technical indicators, intelligence reports, and briefings. Develop workflows for intelligence collection ranging from open source, vendor feeds, internal telemetry, etc. Lead a small, diverse team of regionally dispersed collections and malware analysts. Review, edit, and revise Malware and Threat Actor behavior report writings. Coordinate intelligence support to internal threat hunting efforts. Coordinate with Production Manager to ensure the right data is available to satisfy consumer requirements. Oversee collection metrics, seize all opportunities to improve quality and efficiency. Organize and provide training and staff professional development to the collection team to maintain expertise. Qualifications Education: Bachelor’s degree - a technology-related field, or equivalent education-related experience. Required Technical Experience: 10-13 years of experience in security operations or threat intelligence with a minimum of 2 years of experience in a management role or 8 years work experience with demonstrated leadership potential during that time. Experience working and managing large data sets and data feeds, especially from commercial threat intelligence vendors. Understanding of host and network forensic artifacts and indicators of compromise. Experience and knowledge of major cyber threat actors and their malware families activity and main behavior. Experience working in information technology / cyber security for a large, complex enterprise and collaborating across teams. Demonstrated ability to solve complex technical problems and adapt to changing technologies. Demonstrate excellent mastery of English, with strong written, verbal, and interpersonal communication skills. Desirable Skills And Experience Understanding and knowledge about the latest cyber threat trends. Familiarity with company internal procurement processes, vendor/sources contracts and renewals. Familiarity with Threat Intelligence Platform software such as ThreatConnect, OpenCTI or Anomali. Experience participating in threat intelligence sharing organizations. Intelligence Collections experience supporting report creation. Experience in scripting languages, especially Python, with a strong understanding of software development principles. Ability to create SNORT, YARA, SIGMA, and other behavior-based detection rules. Understanding of Splunk Enterprise Security, to include LookupTables and Splunk Threat Intelligence data model. Leadership & Management Qualifications and Skills: Monitor project progress, identify potential risks, and implement mitigation strategies. Report the projects status weekly gaining the track of each project from the team members. Responsible for planning, managing, and coordinating projects and teams for the development of new products, sources and improvements. Ability to provide oversight across multiple initiatives or projects. Experience working independently and geographically separate from some team members. Mentor and coach team members, fostering a culture of continuous learning and innovation. Desire and ability to work in a dynamic, fast-paced environment. Experience maintaining documentation. Work Location: Hyderabad Work Timing: 11AM – 8PM Our purpose Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Professional development At Deloitte, professionals have the opportunity to work with some of the best and discover what works best for them. Here, we prioritize professional growth, offering diverse learning and networking opportunities to help accelerate careers and enhance leadership skills. Our state-of-the-art DU: The Leadership Center in India, located in Hyderabad, represents a tangible symbol of our commitment to the holistic growth and development of our people. Explore DU: The Leadership Center in India . Benefits To Help You Thrive At Deloitte, we know that great people make a great organization. Our comprehensive rewards program helps us deliver a distinctly Deloitte experience that helps that empowers our professionals to thrive mentally, physically, and financially—and live their purpose. To support our professionals and their loved ones, we offer a broad range of benefits. Eligibility requirements may be based on role, tenure, type of employment and/ or other criteria. Learn more about what working at Deloitte can mean for you. Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Requisition code: 303042

Posted 1 week ago

Apply

3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

About PhonePe Group: PhonePe is India’s leading digital payments company with 50 crore (500 Million) registered users and 3.7 crore (37 Million) merchants covering over 99% of the postal codes across India. On the back of its leadership in digital payments, PhonePe has expanded into financial services (Insurance, Mutual Funds, Stock Broking, and Lending) as well as adjacent tech-enabled businesses such as Pincode for hyperlocal shopping and Indus App Store which is India's first localized App Store. The PhonePe Group is a portfolio of businesses aligned with the company's vision to offer every Indian an equal opportunity to accelerate their progress by unlocking the flow of money and access to services. Culture At PhonePe, we take extra care to make sure you give your best at work, Everyday! And creating the right environment for you is just one of the things we do. We empower people and trust them to do the right thing. Here, you own your work from start to finish, right from day one. Being enthusiastic about tech is a big part of being at PhonePe. If you like building technology that impacts millions, ideating with some of the best minds in the country and executing on your dreams with purpose and speed, join us! Information Security Engineer Objectives of this Role:  Drive secure system configuration standards (E.g. CIS Benchmarks) implementation and vulnerability management efforts across the enterprise. Primarily in Linuxenvironments  Evaluate and drive implementation of new Information security processes, tools and technologies  Own the implemented solutions end-to-end, right from inception to deployment and monitoring to regular upkeep  Liaise with cross functional teams to increase adoption of Information security standards  Provide security event correlation use cases and logic to generate SIEM alerts  Follow-up and close Information Security incidents/exceptions  Measure and increase efficacy of Information Security initiatives  Bring a DevSecOps mindset to implementations Skills And Qualifications  3+ years’ experience in Information security operations in a Linux heavy environment  Experience with IDS/IPS systems like OSSEC, Wazhu, Suricata, Snort etc.  Experience with Elastic and Kibana  Experience with Vulnerability and Configuration Assessment and Management standards, tools/technologies like – CIS Benchmarks, CVE, OVAL, OpenVAS, Nessus, Qualys etc.  Experience with opensource Identity Management with products like Apache Syncope, OpenIAM, Gluu etc.  Hands-on experience with common Security tools in Linux  Experience with SaltStack (or any other Infrastructure as code tools)  Proficient in at least two of these languages: Python/Go/Java/Perl  Good in basic data structures/algorithms  Hands on experience on web scale production setup  Awareness of cloud technologies, networking fundamentals, Mesos, KVM/QEMU, NodeJS/React will be good to have  Ability to manage small teams PhonePe Full Time Employee Benefits (Not applicable for Intern or Contract Roles) Insurance Benefits - Medical Insurance, Critical Illness Insurance, Accidental Insurance, Life Insurance Wellness Program - Employee Assistance Program, Onsite Medical Center, Emergency Support System Parental Support - Maternity Benefit, Paternity Benefit Program, Adoption Assistance Program, Day-care Support Program Mobility Benefits - Relocation benefits, Transfer Support Policy, Travel Policy Retirement Benefits - Employee PF Contribution, Flexible PF Contribution, Gratuity, NPS, Leave Encashment Other Benefits - Higher Education Assistance, Car Lease, Salary Advance Policy Working at PhonePe is a rewarding experience! Great people, a work environment that thrives on creativity, the opportunity to take on roles beyond a defined job description are just some of the reasons you should work with us. Read more about PhonePe on our blog. Life at PhonePe PhonePe in the news

Posted 2 weeks ago

Apply

8.0 - 12.0 years

15 - 30 Lacs

Bengaluru

Work from Office

Job Title : C++ Developer - SNORT & Compiler Design Location : Bangalore Experience : 8 to 12 Years Employment Type : Full-Time Job Overview : We are looking for an experienced C++ Developer with deep expertise in SNORT rule sets, compiler development, and FPGA-accelerated processing. This role requires a strong foundation in system-level programming, along with the ability to work on performance-critical data path processing for network security applications. Key Responsibilities : - Design and develop a C++/C-based compiler to convert SNORT rule sets into state tables - Implement regex lookup engines integrated with FPGA-based acceleration - Optimize rule parsing, conversion logic, and data path evaluation pipelines - Collaborate with hardware (FPGA) teams to align on rule engine performance - Handle result processing logic for high-speed data inspection - Ensure software meets security, latency, and throughput requirements - Communicate directly with the client for requirement gathering and technical clarifications Requirements : - 8 - 12 years of experience in C++/C development, with strong system-level programming skills - Hands-on experience with SNORT rule sets, IDS/IPS systems, or similar network security tools - Experience in compiler or parser development, preferably with experience in state machine generation - Good understanding of regular expressions, pattern matching, and performance optimization - Exposure to FPGA-accelerated architectures and hardware-software interfacing is a plus - Excellent analytical, debugging, and communication skills - Ability to interact effectively with clients and cross-functional teams Preferred Skills : - Familiarity with network protocols and deep packet inspection - Experience with rule optimization, rule merging, and traffic flow classification - Prior experience in cyber security product development or telecom network systems

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

At Gryffin Global, we are seeking a proactive and skilled Network Security Engineer to join our expanding IT security team. This role is integral to ensuring the integrity, confidentiality, and availability of our network systems and data by implementing cutting-edge security solutions, responding to security threats, and maintaining a robust security posture across our global infrastructure. The ideal candidate will bring deep expertise in network security protocols, hands-on experience with various security technologies, and the ability to work collaboratively with cross-functional teams. Key Responsibilities: Network Security Design & Implementation: Design, implement, and maintain secure network architecture to protect Gryffin Global’s critical systems and data. This includes firewalls, intrusion detection systems (IDS), virtual private networks (VPNs), and other security appliances. Threat Detection & Incident Response: Monitor and analyze network traffic for security threats, such as DDoS attacks, intrusions, or malicious activity. Act as a primary responder to network security incidents and work to quickly mitigate threats and prevent recurrence. Security Audits & Vulnerability Management: Regularly perform network security audits and vulnerability assessments to identify potential risks and areas for improvement. Provide recommendations for remediation and work with the IT and development teams to address vulnerabilities in a timely manner. Security Policies & Compliance: Develop and enforce network security policies, procedures, and guidelines to comply with industry standards and regulations (e.g., NIST, ISO 27001, GDPR). Ensure that the organization is aligned with best practices for data protection. Collaboration & Cross-Functional Support: Work closely with IT, system administrators, and development teams to integrate security into all aspects of our infrastructure, applications, and workflows. Provide guidance and support on secure network design, configuration, and implementation. Continuous Improvement: Stay current with emerging security technologies, industry trends, and evolving cyber threats. Continuously improve security posture by evaluating new tools, methodologies, and protocols that can enhance network protection. Documentation & Reporting: Maintain accurate and up-to-date documentation on network security architecture, configurations, and incident reports. Communicate security findings and risk assessments to senior leadership and stakeholders. Qualifications: Education & Experience: Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field, or equivalent work experience. Minimum of 5 years of experience in network security, with a proven track record of managing and securing enterprise-level networks. Hands-on experience with security solutions (firewalls, IDS/IPS, VPNs, network monitoring tools, etc.) and best practices for network security. Certifications: Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM) is preferred. Cisco Certified Network Associate (CCNA), Certified Network Defender (CND), or other relevant certifications are a plus. Technical Skills: Strong understanding of network protocols (TCP/IP, DNS, HTTP/S, etc.) and services (firewalling, VPN, IDS/IPS, etc.). Experience with network monitoring and security tools (e.g., Wireshark, Nmap, Snort, Palo Alto, Cisco ASA, etc.). Expertise in securing cloud environments (AWS, Azure, Google Cloud) and network security in hybrid environments. Familiarity with scripting languages (Python, Bash, etc.) to automate security tasks is a plus. Soft Skills: Excellent verbal and written communication skills, with the ability to clearly explain complex technical concepts to non-technical stakeholders. Strong problem-solving skills and ability to think critically under pressure. Ability to work both independently and collaboratively in a fast-paced environment. A proactive, detail-oriented mindset with a passion for continuous learning and professional growth. If you are passionate about cybersecurity, enjoy solving complex challenges, and want to be part of a forward-thinking organization, we would love to have you join our team!

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Job Title: Security Researcher - EDR About Trellix: Trellix, the trusted CISO ally, is redefining the future of cybersecurity and soulful work. Our comprehensive, GenAI-powered platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Along with an extensive partner ecosystem, we accelerate technology innovation through artificial intelligence, automation, and analytics to empower over 53,000 customers with responsibly architected security solutions. We also recognize the importance of closing the 4-million-person cybersecurity talent gap. We aim to create a home for anyone seeking a meaningful future in cybersecurity and look for candidates across industries to join us in soulful work. More at https://www.trellix.com/. Role Overview: We are looking for a skilled EDR Security Researcher. Your primary responsibility will be to evaluate and improve our EDR product's detection capabilities by identifying detection coverage gaps and developing signatures to address these gaps effectively. About the role: Reverse engineer malware to identify malicious code, obfuscation techniques, and communication protocols. Author detection rules for behavior-based detection engines. Conduct deep research on attacker campaigns and techniques to support detection investments and improve customer experience. Write generic threat detections based on static and dynamic detection engines. Demonstrate a strong understanding of cybersecurity threats, attack techniques, and the MITRE ATT&CK framework. Conduct proactive and reactive threat hunting and identify detection issues such as misses or misclassifications from a large-scale dataset. Respond to escalations to resolve detection effectiveness issues (misclassifications, false positives, and false negatives). Engage and collaborate with diverse partner teams to drive great customer experiences and ensure holistic protection. Develop alerting, reporting, and automated detection solutions. Build tools and automation to improve productivity. About you: 3+ years of experience writing detection using Snort, Yara, Sandbox, or proprietary detection engines. 2+ years of experience performing threat hunting or deep familiarity with incident response procedures, processes, and tools. 2+ years of experience querying and analyzing (for malware/TTPs) large datasets. Experience in programming or scripting languages (e.g., Python, PowerShell). Experience in utilizing various malware analysis tools and frameworks (e.g., IDA Pro). Experience performing detection engineering across multiple operating systems, including Windows, Linux, and macOS. Excellent verbal and written communication skills in English. Company Benefits and Perks: We work hard to embrace diversity and inclusion and encourage everyone to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees. Retirement Plans Medical, Dental and Vision Coverage Paid Time Off Paid Parental Leave Support for Community Involvement We're serious about our commitment to diversity which is why we prohibit discrimination based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.

Posted 2 weeks ago

Apply

12.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

About the Company - Kempegowda International Airport, Bengaluru (KIAB/ BLR Airport), named after founder of the City – Hiriya Kempegowda – has the unique distinction of being the first Greenfield Airport in India, established on a Public-Private Partnership (PPP) model. This heralded a revolution in Indian aviation, as more airports in the Country were privatised, thereafter. Responsibilities - Managed XDR Operations: Oversee threat detection, threat prevention, identity and access management, and incident response activities. Optimize the performance of managed XDR solutions to proactively identify and mitigate risks. Ensure a well-defined incident response plan is in place and regularly tested through simulations. Continuously improve detection and response capabilities based on threat intelligence and industry trends. Regularly review and update playbooks to address emerging threats and advanced attack techniques. Conduct post-incident reviews to identify lessons learned and improve processes. Monitor and evaluate partner performance, addressing any issues related to quality, cost, or delivery. Manage escalations as per contracted frameworks. Ensure unresolved escalations are tabled in governance forums and taken up for resolution. Drive the resolution of such escalations by working with all concerned stakeholders Review and provide feedback on periodic process, SLAs and KPI reports published by various ICT teams Escalate process compliance issues to senior leadership along with suggestion on remediation plan Review all Change Requests and provide insight & recommendations ensuring CRs/amendments are fit for purpose, negotiated and executed by working with all stakeholders. Execution of Security Projects: Lead and manage the successful delivery of cybersecurity projects, ensuring they align with business needs. Define clear project milestones, KPIs, and timelines to track progress effectively. Collaborate with internal and external stakeholders to ensure smooth implementation. Transition completed projects into ongoing operations with defined ownership and support mechanisms. Anticipate potential challenges and implement proactive risk management strategies. Financial Management: Oversee the development, management, and monitoring of the InfoSec budget, ensuring optimal allocation of resources. Accountability of budgeting and periodic financial forecasting for InfoSec – ensuring that the inputs on budgeting and forecasting are as per agreed frequency. Analyze and report on InfoSec financial performance, providing insights and recommendations for cost optimization, return on investment (ROI) and/ or Value Realization. Prepare and track InfoSec PRs and invoice processing and subsequent payments to partners and vendors. Ensure all InfoSec vendor payments are validated and approved by respective InfoSec teams and are aligned to agreed vendor payments terms and conditions. Track vendor payments against approved amount in InfoSec budget. Publish reports on InfoSec Financial Management to ICT leadership for review Security Architecture: Develop and implement a robust security architecture framework that integrates IT and OT systems. Evaluate and recommend security technologies and tools to improve organizational resilience. Ensure scalability, flexibility, and future-readiness of the security architecture. Conduct regular architecture reviews to ensure compliance with evolving standards and business changes. Provide technical leadership on emerging technologies and trends, such as Zero Trust and Secure Access Service Edge (SASE). Act as the primary SPOC for InfoSec in ARB (Architecture Review Board), ensuring terms and conditions are favorable and aligned with BIAL’s strategic information security goals. Regularly review deployments for compliance with organizational policies, regulatory requirements, ARB approvals and industry standards. Use insights gained from project performance to refine future ARBs, driving continuous improvement in partner selection, infosec requirements, service delivery and cost management. Maintain accurate and up-to-date records of all contractual communications, amendments, and performance evaluations. ICS Security: Develop and enforce security policies and controls for Industrial Control Systems (ICS) and Operational Technology (OT). Work closely with BIAL Projects and E&M teams to design secure processes for OT systems/ ICS. Perform regular vulnerability assessments and penetration testing of OT systems. Ensure alignment with BIAL Operational Technology Cybersecurity Policy and other relevant ICS/OT-specific security standards, such as IEC 62443. Establish monitoring mechanisms to detect and respond to threats in real-time within OT environments. Governance, Risk, and Compliance (GRC): Develop, implement, and maintain information security policies and governance frameworks. Conduct periodic risk assessments and audits to identify vulnerabilities and ensure regulatory compliance, both internally and with external partners. Provide regular updates to executive leadership on the organization’s risk profile and mitigation strategies. Manage relationships with regulatory authorities and ensure timely reporting of compliance metrics. Promote a culture of security awareness and responsibility throughout the organization. Ensure the maintenance of the BIAL’s certifications and standards, including ISO 27001:2022. Strategic Leadership: Provide strategic direction and leadership to the InfoSec team, fostering a culture of excellence and continuous improvement. Drive innovation in information security solutions and practices, ensuring the organization remains competitive and forward-looking. Act as a key advisor to senior management on Information Security matters, contributing to strategic decision-making. Qualifications: Bachelor’s degree in computer science, Information Security, or a related field (Master’s degree preferred). Certifications such as CISSP, CISM, CISA, CEH, or equivalent are highly desirable. A minimum of 12 years of experience in information security, with at least 5 years in a leadership role. Required Skills: Comprehensive understanding of cybersecurity frameworks, technologies, and methodologies (e.g., NIST CSF, ISO 27001, MITRE ATT&CK, ITIL v3, PMP, TOGAF, ISO 20k & 27k and COBIT). Expertise in managed XDR operations, incident response, threat intelligence, and identity management. Familiarity with security architecture principles, ICS/OT security frameworks, and industrial protocols. Strong knowledge of GRC principles and regulatory standards applicable to the industry. Proficient in process improvement and development practices. Strong knowledge of SLA & service management, contract negotiation, and operations management. Knowledge with InfoSec tools like: AV/EDR, Data Leakage Prevention, Metasploit, TripWire, Rapid7, Tenable, Snort, Nessus, Burp Suite, Appscan, Nmap, Wireshark, Firewalls, SIEM, SOAR, , SASE, CASB, PIM/PAM, WAF, O365 suite (Intune, Conditional access, Data classification and protection). Preferred Skills: Experience in driving initiatives centered on continuous improvement, innovation, execution excellence, customer centricity and automation. Leadership and strategic planning skills to align cybersecurity with organizational goals. Analytical and problem-solving skills for assessing threats, vulnerabilities, and risks in complex environments. Exceptional communication and stakeholder management skills to influence decision-making and secure buy-in. Technical expertise in deploying advanced security tools and technologies. Proven ability to lead cross-functional teams, drive organizational change, and manage complex projects. Ability to build and maintain relationships with internal teams, partners, and external vendors.

Posted 2 weeks ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Overview: We are seeking a highly skilled Senior Cyber Threat Intelligence Analyst to join the Canada CTI team. The role involves collecting, analyzing, and disseminating actionable intelligence to support cybersecurity operations and protect the organization against emerging threats. The candidate will collaborate with internal and external stakeholders, conduct threat research, and contribute to the development of intelligence-driven strategies. Responsibilities: Lead the monitoring and analysis of emerging cyber threats across various sectors (e.g., Finance, Healthcare, Education). Perform in-depth analysis of advanced threat actor campaigns, including TTPs (Tactics, Techniques, and Procedures), and translate findings into actionable intelligence. Develop and maintain a comprehensive repository of cyber threat data for risk assessment and trend analysis. Create and present detailed reports (Strategic, Tactical, and Operational) to stakeholders, ensuring technical findings are communicated effectively. Develop and document threat intelligence playbooks and procedures. Identify and improve security detection capabilities using YARA, SIGMA, Snort, and similar rulesets. Collaborate with cross-functional teams to assess risks and recommend mitigation strategies. Evaluate and refine alerts triggered by threat intelligence platforms. Use OSINT techniques to validate and prioritize alerts and escalate critical threats promptly. Work closely with international IT teams and third-party vendors to understand adversary intent and activity. Stay informed about the latest cybersecurity trends, vulnerabilities, and attack methodologies. Contribute to the design and enhancement of the organization's Threat Intelligence Program. Participates in the assessment, analysis, and design of improvements for the Threat Intelligence Program. Perform as-hoc intelligence gathering using OSINT tools and techniques Able to apply creative and critical thinking when approaching issues. Required Qualifications: Bachelor's degree in Computer Science or equivalent, with a certification such as GCTI (GIAC Cyber Threat Intelligence). Extensive experience with threat intelligence platforms and playbook development. Proficiency in tools like MITRE ATT&CK, Diamond Model, and Cyber Kill Chain frameworks. Strong analytical skills and expertise in OSINT techniques. Advanced knowledge of cybersecurity incidents, attack vectors, and threat actor behaviour. Familiarity with Python, APIs, Docker containers, and automation tools. Proven ability to work independently and handle complex situations. Excellent verbal and written communication skills to deliver briefings to diverse audiences. Additional Information: This position requires support during Canada business hours. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 3 weeks ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Overview: We are seeking a highly skilled Senior Cyber Threat Intelligence Analyst to join the Canada CTI team. The role involves collecting, analyzing, and disseminating actionable intelligence to support cybersecurity operations and protect the organization against emerging threats. The candidate will collaborate with internal and external stakeholders, conduct threat research, and contribute to the development of intelligence-driven strategies. Responsibilities: Lead the monitoring and analysis of emerging cyber threats across various sectors (e.g., Finance, Healthcare, Education). Perform in-depth analysis of advanced threat actor campaigns, including TTPs (Tactics, Techniques, and Procedures), and translate findings into actionable intelligence. Develop and maintain a comprehensive repository of cyber threat data for risk assessment and trend analysis. Create and present detailed reports (Strategic, Tactical, and Operational) to stakeholders, ensuring technical findings are communicated effectively. Develop and document threat intelligence playbooks and procedures. Identify and improve security detection capabilities using YARA, SIGMA, Snort, and similar rulesets. Collaborate with cross-functional teams to assess risks and recommend mitigation strategies. Evaluate and refine alerts triggered by threat intelligence platforms. Use OSINT techniques to validate and prioritize alerts and escalate critical threats promptly. Work closely with international IT teams and third-party vendors to understand adversary intent and activity. Stay informed about the latest cybersecurity trends, vulnerabilities, and attack methodologies. Contribute to the design and enhancement of the organization's Threat Intelligence Program. Participates in the assessment, analysis, and design of improvements for the Threat Intelligence Program. Perform as-hoc intelligence gathering using OSINT tools and techniques Able to apply creative and critical thinking when approaching issues. Required Qualifications: Bachelor's degree in Computer Science or equivalent, with a certification such as GCTI (GIAC Cyber Threat Intelligence). Extensive experience with threat intelligence platforms and playbook development. Proficiency in tools like MITRE ATT&CK, Diamond Model, and Cyber Kill Chain frameworks. Strong analytical skills and expertise in OSINT techniques. Advanced knowledge of cybersecurity incidents, attack vectors, and threat actor behaviour. Familiarity with Python, APIs, Docker containers, and automation tools. Proven ability to work independently and handle complex situations. Excellent verbal and written communication skills to deliver briefings to diverse audiences. Additional Information: This position requires support during Canada business hours. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 3 weeks ago

Apply

0 years

0 Lacs

Kolkata, West Bengal, India

On-site

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. Role Overview: We are seeking a highly skilled Senior Cyber Threat Intelligence Analyst to join the Canada CTI team. The role involves collecting, analyzing, and disseminating actionable intelligence to support cybersecurity operations and protect the organization against emerging threats. The candidate will collaborate with internal and external stakeholders, conduct threat research, and contribute to the development of intelligence-driven strategies. Responsibilities: Lead the monitoring and analysis of emerging cyber threats across various sectors (e.g., Finance, Healthcare, Education). Perform in-depth analysis of advanced threat actor campaigns, including TTPs (Tactics, Techniques, and Procedures), and translate findings into actionable intelligence. Develop and maintain a comprehensive repository of cyber threat data for risk assessment and trend analysis. Create and present detailed reports (Strategic, Tactical, and Operational) to stakeholders, ensuring technical findings are communicated effectively. Develop and document threat intelligence playbooks and procedures. Identify and improve security detection capabilities using YARA, SIGMA, Snort, and similar rulesets. Collaborate with cross-functional teams to assess risks and recommend mitigation strategies. Evaluate and refine alerts triggered by threat intelligence platforms. Use OSINT techniques to validate and prioritize alerts and escalate critical threats promptly. Work closely with international IT teams and third-party vendors to understand adversary intent and activity. Stay informed about the latest cybersecurity trends, vulnerabilities, and attack methodologies. Contribute to the design and enhancement of the organization's Threat Intelligence Program. Participates in the assessment, analysis, and design of improvements for the Threat Intelligence Program. Perform as-hoc intelligence gathering using OSINT tools and techniques Able to apply creative and critical thinking when approaching issues. Required Qualifications: Bachelor's degree in Computer Science or equivalent, with a certification such as GCTI (GIAC Cyber Threat Intelligence). Extensive experience with threat intelligence platforms and playbook development. Proficiency in tools like MITRE ATT&CK, Diamond Model, and Cyber Kill Chain frameworks. Strong analytical skills and expertise in OSINT techniques. Advanced knowledge of cybersecurity incidents, attack vectors, and threat actor behaviour. Familiarity with Python, APIs, Docker containers, and automation tools. Proven ability to work independently and handle complex situations. Excellent verbal and written communication skills to deliver briefings to diverse audiences. Additional Information: This position requires support during Canada business hours. EY | Building a better working world EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets. Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate. Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.

Posted 3 weeks ago

Apply
Page 1 of 3
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies