sentinel-jobs-in-coimbatore, Coimbatore

7 Sentinel Jobs nearby Coimbatore

Toggle to save search
posted 2 months ago

SOC Analyst

Rezilyens LLC
experience2 to 6 Yrs
location
Chennai, Tamil Nadu
skills
  • Splunk
  • QRadar
  • VLAN
  • WAN
  • LAN
  • VPN
  • SAN
  • OSI Model
  • Firewall
  • Troubleshooting
  • Security Monitoring
  • Security Operations
  • MS Sentinel
  • ELK
  • Regular Expression
  • Query Languages
  • Networking Fundamentals
  • NextGen Firewalls
  • Reasoning
  • ProblemSolving
  • IndustryRecognized Certifications
  • MicrosoftAzure Security Platforms
  • Defender for Cloud
  • M365 Defender
  • Defender for Azure AD Identity Protection
  • Azure Active Directory
  • Purview Information Protection
Job Description
As an ideal candidate for this position, you should have 2-3 years of experience with MS Sentinel/Splunk/QRadar/ELK. Your understanding of regular expression and query languages will be essential for this role. Additionally, familiarity with Networking fundamentals such as VLAN, WAN, LAN, VPN, SAN, OSI Model, Firewall, Next-Gen Firewalls, etc., will be beneficial. **Key Responsibilities:** - Experience in implementing Sentinel and familiarity with security monitoring and security operations. - Strong troubleshooting, reasoning, and problem-solving skills. - Hold industry-recognized certifications in security technologies or network technologies. - Knowledge and/or experience with Microsoft/Azure security platforms including Defender for Cloud, M365 Defender, Defender for Azure AD Identity Protection, Azure Active Directory, and Purview Information Protection. **Qualifications Required:** - 2-3 years of experience with MS Sentinel/Splunk/QRadar/ELK. - Understanding of regular expression and query languages. - Familiarity with Networking fundamentals such as VLAN, WAN, LAN, VPN, SAN, OSI Model, Firewall, Next-Gen Firewalls, etc. - Industry-recognized certifications in security technologies or network technologies. Please note that no additional details about the company are provided in the job description.,
ACTIVELY HIRING

Top Companies are Hiring in Your City

For Multiple Roles

Jio Platforms Ltd
Jio Platforms Ltdslide-preview-Genpact
posted 2 months ago

Title Terraform

Colan Infotech Private Limited
experience3 to 7 Yrs
location
Chennai, Tamil Nadu
skills
  • AWS
  • Azure
  • GCP
  • Jenkins
  • DynamoDB
  • RBAC
  • Sentinel
  • Kubernetes
  • Docker
  • Terraform
  • CICD
  • GitHub Actions
  • Terraform Cloud
  • S3
  • IaC
  • Terratest
  • Checkov
  • Open Policy Agent
Job Description
Role Overview: You will be responsible for designing and implementing Infrastructure as Code (IaC) solutions using Terraform. Additionally, you will develop and maintain reusable Terraform modules for cloud infrastructure automation. You will collaborate with cloud architects, DevOps, and security teams to optimize cloud deployments and ensure scalability, security, and compliance of infrastructure solutions. Your role will also involve improving cloud infrastructure reliability through automated provisioning and monitoring, as well as documenting best practices, standards, and Terraform coding guidelines. Moreover, you will provide mentorship and guidance to junior Terraform developers and cloud engineers. Key Responsibilities: - Write and manage Terraform scripts for provisioning AWS, Azure, and GCP infrastructure. - Optimize Terraform configurations for high availability, cost efficiency, and security. - Integrate Terraform with CI/CD pipelines using GitHub Actions, Jenkins, and AWS CodePipeline. - Manage state files and remote backends using Terraform Cloud or S3 with DynamoDB locking. - Implement Role-Based Access Control (RBAC) and security best practices in IaC deployments. - Troubleshoot and debug Terraform-related issues in production and staging environments. - Automate infrastructure testing using tools like Terratestand Checkov. - Contribute to infrastructure governance, enforcing policies via Sentinel or Open Policy Agent (OPA). Qualifications Required: - Extensive experience in designing, developing, and managing Terraform-based infrastructure. - Strong knowledge of cloud platforms (AWS, Azure, GCP) and their best practices. - Experience integrating Terraform with DevOps pipelines and automation workflows. - Hands-on expertise in Terraform security, governance, and policy enforcement. - Familiarity with containerization and orchestration using Kubernetes and Docker. - Experience in cloud migration projects and hybrid cloud architectures.,
ACTIVELY HIRING
posted 2 months ago
experience3 to 7 Yrs
location
Chennai, Tamil Nadu
skills
  • analytical skills
  • communication skills
  • Microsoft Defender for Cloud Apps
  • Microsoft Defender for Identity
  • Microsoft Defender for CloudDefender for ServerMicrosoft Defender for Endpoint
  • Kusto Query Language KQL
  • cybersecurity concepts
  • incident response methodologies
  • writing
  • optimizing KQL queries
  • Microsoft Sentinel
  • problemsolving abilities
Job Description
As a Security Analyst at Scybers, a cybersecurity-focused organization committed to delivering advanced security solutions and services, your primary responsibility will be to collaborate with clients to enhance their security monitoring, detection, and response capabilities using Microsoft security technologies. You will work closely with clients to optimize their security posture and provide security advisory based on Microsoft security best practices. **Key Responsibilities:** - Configure, monitor, and manage security alerts and incidents using Microsoft Defender solutions. - Assist clients in developing complex KQL queries in Microsoft Sentinel and Defender to fulfill their specific security monitoring requirements. - Conduct proactive threat hunting using KQL and Microsoft security tools. - Investigate and address security incidents, pinpointing root causes and proposing mitigation strategies. - Collaborate with clients to optimize their security posture by fine-tuning Microsoft security configurations. - Provide security advisory and recommendations based on Microsoft security best practices. **Required Skills & Qualifications:** - Hands-on experience in Microsoft Defender for Cloud Apps, Microsoft Defender for Identity, Microsoft Defender for Cloud/Defender for Server/Microsoft Defender for Endpoint, or Kusto Query Language (KQL) for threat hunting. - Solid grasp of cybersecurity concepts, threat landscapes, and incident response methodologies. - Proficiency in writing and optimizing KQL queries for security monitoring and threat hunting. - Experience with Microsoft Sentinel is advantageous. - Strong analytical and problem-solving abilities. - Excellent communication skills to engage effectively with clients and stakeholders. If you possess expertise in any of the mentioned areas and have a fervor for cybersecurity, we are eager to hear from you!,
ACTIVELY HIRING
question

Are these jobs relevant for you?

posted 1 month ago

Lead Infrastructure Engineer

vThink Global Technologies Private Limited
experience3 to 7 Yrs
location
Chennai, Tamil Nadu
skills
  • Windows
  • Routers
  • Switches
  • Firewall
  • AWS
  • CCNA
  • Redhat Linux
  • Cyber Security
  • Scalability
  • Cloud Computing
  • Linux Servers
  • VPC
  • Sentinel One
  • Resiliency Measures
  • Spam Filters
  • Cloudbased Solutions
  • Application Performance Optimization
Job Description
As an experienced Cloud Infrastructure Specialist, your role will involve reviewing and evaluating the existing cloud infrastructure to identify areas for improvement and implementing necessary changes to enhance networking and firewalls (WAFs). You will also be responsible for configuring and monitoring Routers, Switches, Firewall, including VPC Enabling, and troubleshooting issues in AWS. Key Responsibilities: - Configure and deploy cyber security tools (e.g., Sentinel One) to protect the AWS infrastructure from potential threats and vulnerabilities. - Implement best practice resiliency measures like spam filters to ensure stability and reliability of the cloud infrastructure. - Conduct thorough reviews of the existing AWS infrastructure, identify areas for optimization, and implement best practice configurations on web services. - Design, deploy, and manage cloud-based solutions on the AWS platform. - Collaborate with development teams to optimize application performance and scalability in the AWS environment. - Ensure the security, availability, and reliability of AWS resources and applications. - Stay up to date with the latest trends and developments in cloud computing and AWS services. Qualifications Required: - Hands-on experience in handling Linux Servers and Windows. - Added advantage if you have implemented CCNA or Redhat Linux certifications. Please note: No additional details of the company were provided in the job description.,
ACTIVELY HIRING
posted 2 weeks ago

L2 SOC Analyst

Kryptos Technologies
experience3 to 7 Yrs
location
Chennai, All India
skills
  • Sentinel
  • QRadar
  • Splunk
  • Penetration Testing
  • Digital Forensics
  • Security
  • ITSM
  • Microsoft Defender
  • Palo Alto
  • Incident Response
  • Threat Intel
  • Threat Hunting
  • Vulnerability Exploitation
  • SC200
  • SC100
  • SC900
  • AZ500
  • Palo Alto PCNSA
  • Palo Alto PCNSE
Job Description
In this role as a Security Operations Center (SOC) Analyst in Chennai, you will be responsible for monitoring security alerts using tools like Microsoft Sentinel and Defender XDR. Your key responsibilities will include performing initial triage and analysis of incidents, executing first-level containment actions such as endpoint isolation and credential disablement, and escalating complex incidents to the Shift Lead or SOC Manager. Your strong analytical and communication skills will be essential in this role. Additionally, you will be required to maintain incident logs and ITSM records, as well as assist in creating shift handover documentation. To excel in this position, you should have at least 3 to 5 years of SOC experience and be familiar with tools like Microsoft Defender, Sentinel, QRadar, Splunk, and Palo Alto. Working knowledge of incident response processes on these technologies, proactive threat intel, threat hunting, exploiting vulnerabilities, and digital forensics will be crucial. Candidates with industry certifications such as Security+, SC-200, SC-100, SC-900, AZ-500, Palo Alto PCNSA, or PCNSE will be preferred for this role. Your expertise in these areas will enable you to effectively contribute to the security operations of the company. We look forward to welcoming a skilled and dedicated SOC Analyst to our team in Chennai. In this role as a Security Operations Center (SOC) Analyst in Chennai, you will be responsible for monitoring security alerts using tools like Microsoft Sentinel and Defender XDR. Your key responsibilities will include performing initial triage and analysis of incidents, executing first-level containment actions such as endpoint isolation and credential disablement, and escalating complex incidents to the Shift Lead or SOC Manager. Your strong analytical and communication skills will be essential in this role. Additionally, you will be required to maintain incident logs and ITSM records, as well as assist in creating shift handover documentation. To excel in this position, you should have at least 3 to 5 years of SOC experience and be familiar with tools like Microsoft Defender, Sentinel, QRadar, Splunk, and Palo Alto. Working knowledge of incident response processes on these technologies, proactive threat intel, threat hunting, exploiting vulnerabilities, and digital forensics will be crucial. Candidates with industry certifications such as Security+, SC-200, SC-100, SC-900, AZ-500, Palo Alto PCNSA, or PCNSE will be preferred for this role. Your expertise in these areas will enable you to effectively contribute to the security operations of the company. We look forward to welcoming a skilled and dedicated SOC Analyst to our team in Chennai.
ACTIVELY HIRING
posted 2 weeks ago

L3 SOC Analyst

UST Global
experience5 to 13 Yrs
location
Chennai, Tamil Nadu
skills
  • Sentinel
  • Splunk
  • Tools
  • Analytical skills
  • Network traffic analysis
  • Security tools
  • SIEM vendors such as QRadar
  • Incident response
  • Threat hunting
  • Attack patterns
  • Techniques
  • Procedures TTPs
  • Writing procedures
  • Runbooks
  • Playbooks
  • Problemsolving skills
  • System logs analysis
  • Indicators of Compromise IOCs
  • Advanced Persistent Threats APTs
  • Setting up SIEM solutions
  • Troubleshooting connectivity issues
  • Security frameworks
  • Best practices
  • Collaboration with IT
  • security teams
  • EDR tools Crowdstrike
  • Defender
  • SentinelOne
Job Description
As an L3 SOC Analyst at UST, you will be responsible for handling high and critical severity security incidents by utilizing your expertise in SIEM tools such as QRadar, Sentinel, or Splunk. Your key responsibilities include: - Acting as an escalation point for high and critical severity security incidents - Conducting in-depth investigations to assess impact and understand the extent of compromise - Analyzing attack patterns and providing recommendations for security improvements - Performing proactive threat hunting and log analysis to detect potential threats - Providing guidance on mitigating risks and improving security hygiene - Identifying gaps in security processes and proposing enhancements - Ensuring end-to-end management of security incidents - Documenting and updating incident response processes and defining future outcomes - Participating in war room discussions, team meetings, and executive briefings - Training team members on security tools and incident resolution procedures Must-Have Skills: - Experience with SIEM vendors such as QRadar, Sentinel, Splunk - Incident response and threat hunting expertise - Strong knowledge of attack patterns, Tools, Techniques, and Procedures (TTPs) - Experience in writing procedures, runbooks, and playbooks - Strong analytical and problem-solving skills - Hands-on experience with system logs, network traffic analysis, and security tools - Proficiency in identifying Indicators of Compromise (IOCs) and Advanced Persistent Threats (APTs) Good-to-Have Skills: - Experience setting up SIEM solutions and troubleshooting connectivity issues - Familiarity with security frameworks and best practices - Ability to collaborate with IT and security teams effectively About UST: UST is a global digital transformation solutions provider that has been working with the world's best companies for over 20 years. With over 30,000 employees in 30 countries, UST partners with clients from design to operation, embedding innovation and agility into their organizations for boundless impact.,
ACTIVELY HIRING
posted 1 week ago

Terraform

Colan Infotech Private Limited
experience5 to 9 Yrs
location
Chennai, Tamil Nadu
skills
  • GitHub
  • Jenkins
  • Terraform
  • CICD pipelines
  • AWS CodePipeline
  • Terratestand Checkov
Job Description
Role Overview: You will be responsible for designing and implementing Infrastructure as Code (IaC) solutions using Terraform. Your main tasks will involve developing and maintaining reusable Terraform modules for cloud infrastructure automation, collaborating with cloud architects, DevOps, and security teams to optimize cloud deployments, ensuring scalability, security, and compliance of infrastructure solutions, and improving cloud infrastructure reliability through automated provisioning and monitoring. Additionally, you will document best practices, standards, and Terraform coding guidelines and provide mentorship and guidance to junior Terraform developers and cloud engineers. Key Responsibilities: - Write and manage Terraform scripts for provisioning AWS, Azure, and GCP infrastructure. - Optimize Terraform configurations for high availability, cost efficiency, and security. - Integrate Terraform with CI/CD pipelines using GitHub Actions, Jenkins, and AWS CodePipeline. - Manage state files and remote backends using Terraform Cloud or S3 with DynamoDB locking. - Implement Role-Based Access Control (RBAC) and security best practices in IaC deployments. - Troubleshoot and debug Terraform-related issues in production and staging environments. - Automate infrastructure testing using tools like Terratestand Checkov. - Contribute to infrastructure governance, enforcing policies via Sentinel or Open Policy Agent (OPA). Qualifications Required: - Extensive experience in designing, developing, and managing Terraform-based infrastructure. - Strong knowledge of cloud platforms (AWS, Azure, GCP) and their best practices. - Experience integrating Terraform with DevOps pipelines and automation workflows. - Hands-on expertise in Terraform security, governance, and policy enforcement. - Familiarity with containerization and orchestration using Kubernetes and Docker. - Experience in cloud migration projects and hybrid cloud architectures.,
ACTIVELY HIRING
posted 2 weeks ago
experience3 to 7 Yrs
location
Maharashtra, Pune
skills
  • Software Engineering
  • Network Administration
  • Python
  • Sentinel
  • Linux
  • Windows
  • Agile development
  • Virtualization
  • IT Systems
  • FlexNet
  • CAE software
  • Cloud technologies
Job Description
As a Product Specialist, Licensing & Installation Support at Gamma Technologies, you will be crucial in ensuring successful implementation and utilization of the GT-SUITE software for customers. Your role will focus on managing IT-facing components, providing technical support, and guaranteeing a smooth and secure experience for customers. Key Responsibilities: - Oversee and provide technical support for the software installer on various platforms - Manage the licensing solution to ensure customers can maximize the value of GT-SUITE - Address antivirus issues to maintain a secure and efficient working environment with minimal downtime - Provide customer support by offering technical assistance and troubleshooting to resolve software installation, runtime, and licensing issues - Define and own the long-term vision for IT-facing components of GT-SUITE, prioritizing key feature improvements - Collaborate with development, QA, and product teams to align IT-facing product features with business goals and customer needs - Oversee concurrent development projects and participate in sprint planning to deliver timely feature updates Qualifications Required: - BS/BA in Information Technology, Engineering, Computer Science, or related technical degrees - Relevant fields of study in Software Engineering, IT Systems, or Network Administration - 3-5 years of experience in technical support, product management, or IT-related roles, preferably in the software or engineering industry - Prior exposure to customer-facing support roles in a technical capacity - Experience with software installation, licensing management tools, and troubleshooting complex issues - Familiarity with various operating systems, especially Linux and Windows - Knowledge of Python or similar scripting languages - Excellent written and verbal communication skills in English - Ability to work from 3 pm to 11.59 pm IST for global team collaboration Additional Company Details: - Dynamic and highly talented team of experts - Opportunity to implement your ideas and make them accessible to a large customer base - Build a professional network in various branches of the industry - Hybrid work policy with 3 days per work week in the office - Attractive salary and additional company benefits Gamma Technologies is an Equal Opportunity Employer committed to creating an inclusive workplace for all.,
ACTIVELY HIRING
posted 1 week ago

SME - SIEM

Microland
experience2 to 6 Yrs
location
Karnataka
skills
  • Technology
  • Securonix SIEM Tools Expert
  • Sentinel SIEM Tool Expert
  • ArcSight SIEM Tools Administrator
  • Cybersecurity General Administrator
  • Network Traffic Analysis Administrator
  • CompTIA Security
  • Certified SOC Analyst CSA
  • GIAC Security Essentials GSEC
  • Certified Ethical Hacker CEH
  • Cisco Certified CyberOps Associate
  • GIAC Certified Incident Handler GCIH
  • GIAC Security Operations Certified GSOC
Job Description
As an experienced Security Information and Event Management (SIEM) Specialist, your role will involve: - Leading incident response efforts, utilizing advanced techniques for containment, eradication, and recovery. - Conducting in-depth digital forensics investigations. - Configuring and optimizing SIEM systems to ensure effective threat detection. - Deeply understanding log analysis techniques and tools to identify patterns and anomalies in large datasets. - Integrating threat intelligence into monitoring and response processes. - Collaborating closely with IT and security teams to ensure comprehensive security coverage. - Coordinating response efforts during major incidents and ensuring effective communication among stakeholders. - Continuously evaluating and enhancing security processes and procedures. - Contributing to the development and updating of security policies and procedures. Qualifications required for this role include: - Bachelor's degree in Engineering (B.E / B.Tech) or MCA. - Expertise in Securonix SIEM Tools at Level 3 Support. - Experience with Sentinel SIEM Tool at Level 3 Support. - Knowledge of ArcSight SIEM Tools administration at Level 2 Support. - Understanding of Cybersecurity General Administration at Level 2 Support. - Familiarity with Network Traffic Analysis administration at Level 2 Support. - Certification in one or more of the following: CompTIA Security+, Certified SOC Analyst (CSA), GIAC Security Essentials (GSEC), Certified Ethical Hacker (CEH), Cisco Certified CyberOps Associate, GIAC Certified Incident Handler (GCIH), GIAC Security Operations Certified (GSOC). You will be based in Bengaluru, India, and will play a crucial role in enhancing the security posture of the organization.,
ACTIVELY HIRING
posted 2 months ago
experience5 to 9 Yrs
location
All India
skills
  • DevOps
  • Azure Administrator
  • Azure Security
  • Azure Kubernetes
  • Microsoft Defender for Cloud
  • Microsoft Sentinel
  • Azure Key Vault
  • CICD pipelines
  • Azure Monitor
  • Log Analytics
  • Network Watcher
Job Description
As an Azure Security Analyst/Engineer at NTT DATA, your primary responsibilities will include: - Provisioning, configuring, managing, and monitoring Azure virtual machines, storage accounts, IaaS, PaaS, and networking components such as load balancers, Application Gateway, vNet, VPN Gateway, etc. - Performing regular OS and security patching, backups/restore, implementing disaster recovery for Azure resources, and providing Azure storage management. - Setting up and managing Microsoft Defender for Cloud, Microsoft Sentinel, Azure Key Vault, network security, data encryption, and related security compliance and remediation. - Setting up and integrating DevOps processes, managing CI/CD pipelines for Azure applications, and providing performance monitoring through Azure Monitor, Log Analytics, Network Watcher, and related automated alerts. - Being an expert in Azure Kubernetes support, including setup, configuration, and support. - Supporting 24x7 operations, including incident response and issue resolution. Qualifications required for this role: - Bachelor's Degree in Information Technology or equivalent. - Five (5) years" experience as an Azure Cloud Administrator or Azure Cloud Engineer. - Certification as Azure Administrator Associate or higher. NTT DATA, a $30 billion global innovator of business and technology services, serves 75% of the Fortune Global 100. With experts in more than 50 countries and a strong partner ecosystem, their services include business and technology consulting, data and artificial intelligence, industry solutions, and application, infrastructure, and connectivity management. NTT DATA is dedicated to helping clients innovate, optimize, and transform for long-term success. Being part of the NTT Group, NTT DATA invests significantly in R&D to support organizations and society in moving confidently into the digital future. Please note that the compensation for this remote role at NTT DATA ranges from an hourly rate of $80 to $85, depending on factors such as work location, experience, technical skills, and qualifications. Additionally, the position may be eligible for incentive compensation based on individual and/or company performance. Company benefits, including but not limited to medical, dental, and vision insurance, life and AD&D insurance, paid time off, employee assistance, and participation in a 401k program, may be provided based on the nature of the role offered.,
ACTIVELY HIRING
posted 2 months ago

Senior Enterprise Account Manager

L A Technologies Pvt Ltd
experience5 to 9 Yrs
location
All India
skills
  • Cyber Security
  • Networking
  • Security
  • Wireless
  • Juniper
  • Account Management
  • Sales
  • Lead Generation
  • Business Development
  • Communication
  • Interpersonal skills
  • Negotiation
  • Datacenter
  • Server platforms
  • Fortinet
  • Crowdestrike
  • Palo Alto
  • Sentinel One
  • Relationshipbuilding
  • Sales data analysis
Job Description
As a Senior Enterprise Account Manager at L.A Technologies, your role will involve account management, lead generation, sales operations, and business development on a day-to-day basis. Key Responsibilities: - Manage accounts effectively to ensure customer satisfaction - Generate leads to expand the client base - Handle sales operations to meet targets - Develop new business opportunities Qualifications Required: - Proficient in account management and sales techniques - Skilled in lead generation and business development strategies - Experienced in sales operations and business development roles - Possess excellent communication and interpersonal skills - Strong negotiation and relationship-building abilities - Ability to analyze sales data and trends - Bachelor's degree in Business Administration or related field L.A Technologies is a specialized group of Cyber Security professionals based in the Mumbai Metropolitan Region. They focus on providing top-notch services in Cyber Security, Datacenter, Networking, Security, Wireless, and Server platforms for Internet and business applications. The company has a team of certified professionals in Juniper, Fortinet, Crowdstrike, Palo Alto, Sentinel One along with a network of IT industry experts offering a wide range of IT services.,
ACTIVELY HIRING
posted 2 months ago
experience1 to 5 Yrs
location
All India
skills
  • JavaScript
  • Python
  • C
  • SQL
  • PostgreSQL
  • JSON
  • Go
  • SharePoint
  • Supabase
  • TypeScript
  • Postiz
  • NestJS
  • Prisma
  • HWiNFO
  • Hard Disk Sentinel
  • Meetily AI
Job Description
As a Full-Stack Developer / Technical Specialist joining our team in Chennai, you will have the opportunity to work on a variety of projects involving frontend, backend, and data-driven tools. Your contributions will be crucial to both in-house projects and outsourced technology solutions. Key Responsibilities: - Develop, maintain, and enhance applications using JavaScript, Python, C, SQL. - Integrate and leverage Meetily AI for advanced features in web and application workflows. - Work with HWiNFO and Hard Disk Sentinel for hardware monitoring and outsourced solutions. - Build and manage backend services using Supabase (REST API, JSON, PostgreSQL, TypeScript, Go). - Develop and maintain applications on Postiz using NestJS, Prisma, Postgres. - Utilize SharePoint for document management, workflows, and internal collaboration. - Collaborate with cross-functional teams to ensure robust application design, security, and performance. - Troubleshoot, debug, and optimize code for scalability and reliability. Skills & Requirements: - Strong programming skills in JavaScript, Python, C, SQL. - Hands-on experience with Supabase, including REST APIs, PostgreSQL, JSON, TypeScript, and Go. - Experience with Postiz (NestJS, Prisma, Postgres) for backend development. - Familiarity with SharePoint for enterprise collaboration and content management. - Understanding of hardware monitoring tools such as HWiNFO and Hard Disk Sentinel. - Ability to integrate AI tools like Meetily AI into web and application workflows. - Strong problem-solving skills, with an eye for detail and quality. - Excellent communication skills for coordinating with internal and outsourced teams. Preferred Qualifications: - Bachelors degree in Computer Science, Engineering, or related field. - Prior experience in a startup or fast-paced environment is a plus. - Familiarity with outsourcing workflows and coordinating with external tech teams. In addition, you will have the opportunity to work on cutting-edge AI and full-stack projects, learn and work across multiple platforms and technologies, and be part of a collaborative startup environment with growth potential.,
ACTIVELY HIRING
posted 2 months ago
experience2 to 6 Yrs
location
All India
skills
  • REST API
  • JSON
  • SQL
  • Network administration
  • Process Development
  • Process Improvement
  • Process Architecture
  • Python programming language
  • Incident Response
  • Threat Intelligence tools
  • Splunk SOAR platform
  • SIEM solutions
  • Network monitoring technology platforms
  • Endpoint protection tools
  • ServiceNow SOAR
  • Scripting technologies
  • Cybersecurity
  • Incident Response Management
Job Description
As a Senior Cyber Managed Service professional specializing in Threat Detection & Response with expertise in Security Orchestration, Automation and Response (Sentinel SOAR), your role at EY will be crucial in combating cyber threats and contributing to the development of a better working world. Your key capabilities will include: - Demonstrating excellent teamwork skills, passion, and drive to succeed in identifying security automation strategies and providing creative integrations and playbooks. - Collaborating with the customer and team members to find innovative solutions to challenges and needs, executing and maintaining Sentinel SOAR related processes, and administering the Sentinel SOAR platform. - Developing custom scripts and playbooks using Python programming language, REST API, and JSON, with basic SQL knowledge. Creating reusable Python-based playbooks and utilizing Splunk SOAR platform for automation and orchestration. - Partnering with security operations teams, threat intelligence groups, and incident responders, while also working in a security operations center with experience in SIEM solutions like Splunk and Microsoft Sentinel. - Willingness to learn new technologies, assist in developing technical content, and conceptualize/implement automation for business process workflows. - Having knowledge in Network monitoring technology platforms and endpoint protection tools such as Fidelis XPS, Carbon Black, Tanium, etc., and the ability to support and mitigate production issues. - Coordinating with vendors for incident closure, reviewing, assessing, benchmarking, and developing issue remediation action plans. Qualifications and experience required for this role include: - Minimum of 3+ years of experience in cybersecurity with network architecture knowledge, experience in deploying and integrating Sentinel SOAR solution in global enterprise environments. - Experience in ServiceNow SOAR is advantageous, along with strong oral, written, and listening skills, and a background in network administration. - Hands-on experience with scripting technologies like Python, REST, JSON, and certifications in SIEM Solution such as Splunk or SC-200 will be beneficial. - A honours degree in a technical field, minimum 2 years of working in SOAR (Sentinel), and knowledge in cybersecurity, incident response management, and core security-related disciplines. EY is committed to building a better working world by creating new value for clients, people, society, and the planet. With a focus on data, AI, and advanced technology, EY teams help clients shape the future with confidence and address pressing issues. Operating across assurance, consulting, tax, strategy, and transactions, EY's globally connected network offers services in over 150 countries and territories.,
ACTIVELY HIRING
posted 7 days ago
experience2 to 6 Yrs
location
Karnataka
skills
  • Technology
  • Securonix SIEM Tools Expert
  • Sentinel SIEM Tool Expert
  • ArcSight SIEM Tools Administrator
  • Cybersecurity General Administrator
  • Network Traffic Analysis Administrator
Job Description
As a Security Operations Center (SOC) Analyst, your role will involve: - Expert knowledge of threat detection techniques and tools. - Leading incident response efforts, including advanced techniques for containment, eradication, and recovery. - Conducting in-depth digital forensics investigations. - Expertise in configuring and optimizing SIEM (Security Information and Event Management) systems. Your responsibilities will include: - Deep understanding of log analysis techniques and tools. - Identifying patterns and anomalies in large datasets. - Integrating threat intelligence into monitoring and response processes. - Staying updated on the latest threat intelligence and applying it to enhance security. You will be required to collaborate and coordinate with: - Other IT and security teams to ensure comprehensive security coverage. - Lead the coordination of response efforts during major incidents. - Ensure effective communication and collaboration among all stakeholders. - Coordinate with external partners and vendors for specialized support. Qualifications: - Engineer - B.E / B.Tech / MCA - Certification in CompTIA Security+, Certified SOC Analyst (CSA), GIAC Security Essentials (GSEC), Certified Ethical Hacker (CEH), Cisco Certified CyberOps Associate, GIAC Certified Incident Handler (GCIH), GIAC Security Operations Certified (GSOC) Location: India - Bengaluru This position requires a high level of expertise in Securonix, Sentinel, ArcSight SIEM tools, and Cybersecurity administration. Continuous evaluation and improvement of security processes and procedures are essential to enhance the overall security posture.,
ACTIVELY HIRING
posted 2 months ago
experience5 to 9 Yrs
location
Haryana
skills
  • Vulnerability Management
  • Cloud Security
  • Sentinel
  • CISSP
  • CISA
  • CISM
  • GCIH
  • GREM
  • Digital Forensic Investigations
  • Incident Response
  • Endpoint Detection
  • Response EDR
  • Security Operations
  • Monitoring
  • Security Incident Management
  • Response
  • Identity Access Management
  • DevSecOps
  • Microsoft Advanced Threat Protection ATP
  • CrowdStrike Falcon
  • VMware Carbon Black
  • Information Security Principles
  • CRISC
  • GCFA
  • GCFE
Job Description
As a part of an international team of specialists, you will be responsible for assisting clients with their most complex information security needs and contributing to their business resilience. Your role will involve leading, managing, and delivering incident response engagements during cyber security incidents. Key Responsibilities: - Work with clients across different industries to address concerns related to potential and actual breaches of technology, business systems, and information assets. - Collaborate with clients" IT teams to respond to cyber security breaches, including the deployment of Endpoint Detection and Response (EDR) tools, collection of system artifacts, event timeline reconstruction, and containment. - Inspire, manage, and lead a team of experienced security consultants in conducting digital forensic investigations and incident response engagements in complex environments. - Lead and manage incident response measures to accurately assess, contain, mitigate, and report threats. - Oversee the monitoring, analysis, and triaging of security events. - Identify and propose realistic solutions and improvements for complex issues. - Develop innovative solutions for clients on various local and international engagements. - Actively identify and support business development opportunities. - Manage project budgets effectively to ensure quality client outcomes within expected timeframes. Qualifications Required: - Recognized university degree in Computer Science, Computer/Electrical Engineering. - Minimum 5 years of IT security and risk experience in a consulting environment. - Significant experience in digital forensic, incident response, business development, client relationship management, and team management. - Practical knowledge and experience in Information Security domains such as Security Operations, Digital Forensic, Security Incident Management, Identity & Access Management, Vulnerability Management, Cloud Security, and DevSecOps. - Understanding of Endpoint Detection and Response (EDR) technologies like Microsoft Advanced Threat Protection (ATP), CrowdStrike Falcon, VMware Carbon Black, Sentinel, etc. - Strong business acumen and ability to grasp cyber concepts quickly. - Good knowledge of information security principles, techniques, and standards. - Professional certifications such as CISSP, CRISC, CISA, CISM, GCIH, GCFA, GCFE, GREM, or other relevant qualifications. - Excellent written and oral communication skills for presenting ideas and results to technical and non-technical audiences. Additional Details: The company values diversity and inclusiveness and encourages individuals with excellent problem-solving skills and the ability to prioritize shifting workloads. A collaborative team player with effective communication skills will thrive in this dynamic organization. EY offers a competitive remuneration package based on individual and team performance, with a commitment to inclusivity and flexible working arrangements. Continuous learning, transformative leadership, and a diverse and inclusive culture are key aspects of the company's offerings.,
ACTIVELY HIRING
posted 2 days ago
experience3 to 7 Yrs
location
All India
skills
  • Sentinel
  • Classification
  • Segmentation
  • Anomaly detection
  • Spatial analysis
  • Image analysis
  • Pattern matching
  • Satellite Imagery Analysis
  • Opensource datasets
  • Landsat
  • MODIS
  • DEM
  • NDVI
  • NDWI
  • EVI
  • SAVI
  • AIML algorithms
  • Timeseries pattern recognition
  • GIS tools
Job Description
Role Overview: As a Satellite Imagery Analyst, you will be responsible for acquiring, preprocessing, and analyzing satellite imagery utilizing open-source datasets such as Sentinel, Landsat, MODIS, DEM, among others. Your role will involve efficiently processing and managing large-scale geospatial catalogs. You will conduct vegetation, water stress, and land cover analysis by employing various indices like NDVI, NDWI, EVI, SAVI, and thermal bands. Key Responsibilities: - Utilize AI/ML algorithms to perform classification, segmentation, anomaly detection, and time-series pattern recognition on both raster and vector data. - Apply spatial analysis techniques to estimate biomass, carbon storage, forest loss, and environmental footprints. - Detect and map tree cover, land use change, water bodies, and burn scars using multispectral and temporal satellite imagery. - Implement pest/disease detection frameworks through image analysis and pattern matching techniques. - Translate raw satellite data into decision-support insights using GIS tools and visual dashboards. Qualifications Required: - Bachelor's degree in Geography, Remote Sensing, Geoinformatics, or a related field. - Proficiency in utilizing open-source satellite imagery datasets like Sentinel, Landsat, and MODIS. - Experience with indices such as NDVI, NDWI, EVI, SAVI, and thermal bands for geospatial analysis. - Strong knowledge of AI/ML algorithms for image analysis and pattern recognition. - Familiarity with GIS tools for translating satellite data into actionable insights. (Note: No additional details of the company were provided in the job description.),
ACTIVELY HIRING
posted 1 week ago
experience1 to 5 Yrs
location
Maharashtra, Thane
skills
  • Cloud Security
  • Design
  • implementation
  • DDoS
  • Sentinel
  • WAF
Job Description
As a Cloud Security Engineer, your role involves designing Cloud Security Solutions and providing expert advice to customers on security best practices and methodologies. Your key responsibilities include: - Designing security framework for different cloud services - Working on proof-of-concept projects and conducting customer workshops - Understanding customer security requirements, proposing custom solutions, and delivering them - Building capabilities in new areas such as cloud security governance, risk, and compliance (IaaS, PaaS, SaaS) - Managing the Infra security framework with changes in the threat landscape - Designing threat modeling for applications based on standards - Supporting strategic partnerships with security technology vendors and business partners - Performing periodical SLA reviews with customers and suppliers - Driving governance and compliance in the areas of Endpoint Security and Identity & Access Management - Demonstrating an intermediate level of expertise in Data Security, Network Security, or Application Security - Familiarity with compliance and security standards across the enterprise cloud landscape - Technical understanding in Cloud Computing technologies, monitoring tools, encryption tools, and best practices - Experience with enterprise security solutions such as WAF, IPS, DDOS, and SIEM - Identifying and eliminating security vulnerabilities with strategic solutions - Understanding UTMs, load balancers, WAF technologies, and associated protocols - Requirement gathering, analysis, solution development, presentations, and BoQ preparation Your knowledge and skills should include: - Good understanding of the Security Architectures of Azure, GCP, or AWS - Familiarity with Public, Private, and Hybrid Cloud solutions - Knowledge of Cloud best practices and guidelines - Strong oral, written, and interpersonal communication skills - Ability to work effectively in distributed and multi-cultural teams - Good understanding of ITSM processes and related tools - Willingness to learn and explore new technologies - Highly flexible and adaptable to change and technology forward-thinking Educational Qualifications: - Bachelor's degree in Engineering in Computer Science, Computer Engineering, or Information Technology Years of Experience: - 2 to 3 years of experience in information security - 1 to 2 years of experience in cloud (Azure, AWS, or GCP) security,
ACTIVELY HIRING
posted 2 months ago
experience6 to 10 Yrs
location
Karnataka
skills
  • Git
  • Github
  • IAM
  • Cloud Security
  • Data Security
  • Network Security
  • Terraform Sentinel
  • OPA Gatekeeper
  • AWS Security services
Job Description
As a TRIS Generalist Engineer specializing in AWS security, your role will involve designing, implementing, and enforcing security policies and controls within the AWS environment. You will play a crucial part in ensuring the security of infrastructure as code and policy enforcement. Your primary responsibilities will include: - Designing, implementing, and managing security policies and controls within AWS using tools like Terraform Sentinel and OPA Gatekeeper. - Developing and maintaining automated security checks and guardrails for AWS infrastructure and applications. - Integrating security tools and practices into the CI/CD pipeline, leveraging Github for version control and collaboration. - Collaborating with development, operations, and compliance teams to ensure adherence to security best practices and regulatory requirements. - Conducting security assessments and audits of AWS environments to identify and remediate vulnerabilities. - Specializing in and contributing to IAM, Cloud Security, Data Security, or Network Security domains. - Staying up-to-date with the latest AWS security features, threats, and mitigation techniques. - Providing technical guidance and support to engineering teams on security-related matters. - Troubleshooting and resolving security incidents and issues. Qualifications required for this role include: - Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. - 6+ years of experience in a cloud security or generalist engineering role with a strong focus on AWS. - Proven hands-on experience with Terraform Sentinel for policy-as-code. - In-depth knowledge of AWS Security services and best practices. - Experience with OPA Gatekeeper for policy enforcement, particularly in Kubernetes environments. - Proficiency with Git and Github for version control and collaborative development. - Strong understanding of security principles, threats, and vulnerabilities in cloud environments. - Ability to specialize and demonstrate expertise in at least one of the following domains: IAM, Cloud, Data Security, or Network Security. - Excellent problem-solving, analytical, and communication skills. - Ability to work effectively in a hybrid work environment. Preferred qualifications for this role include: - AWS Certified Security - Specialty certification. - Experience with other security tools and technologies. - Familiarity with compliance frameworks such as SOC 2, ISO 27001, NIST. - Scripting skills (e.g., Python, Bash) for automation. - Experience with other cloud providers like Azure, GCP is a plus.,
ACTIVELY HIRING
posted 2 months ago
experience3 to 7 Yrs
location
Karnataka
skills
  • Firewalls
  • IDSIPS
  • DDoS
  • VPN
  • AWS
  • Azure
  • GCP
  • SIEM Sentinel
  • network security tools
  • DNS Security
  • Cloud Firewalls
  • cloud platforms
Job Description
As a Security Analyst - Sentinel at Capgemini in Bangalore, you will play a crucial role in monitoring SIEM Sentinel and other security dashboards, investigating escalated incidents, and coordinating with stakeholders for resolution. Your responsibilities will include: - Monitoring SIEM (e.g., Azure Sentinel) and security tools for threat detection. - Investigating and responding to escalated incidents in rotational shifts. - Performing deep-dive analysis and coordinating mitigation efforts. - Supporting SIEM reporting and troubleshooting. - Collaborating with Subject Matter Experts (SMEs) to develop threat hunting rules for ICS/OT environments. - Maintaining and updating incident response playbooks. - Preparing KPI dashboards and reports for stakeholders. Your qualifications should include: - Hands-on experience with network security tools such as Firewalls, IDS/IPS, DDoS, VPN, DNS Security, and Cloud Firewalls. - Strong understanding of network security architecture and protocols. - Experience with cloud platforms like AWS, Azure, and GCP. - Ability to manage high-impact incidents and prioritize effectively. - Knowledge sharing and documentation upkeep. At Capgemini, you will have the opportunity to shape your career with a range of career paths and internal opportunities. You will receive comprehensive wellness benefits including health checks, telemedicine, insurance, elder care, partner coverage, and new parent support through flexible work arrangements. Additionally, you will work on cutting-edge projects in technology and engineering with industry leaders, contributing to solutions that address societal and environmental challenges. Capgemini is a global business and technology transformation partner with a diverse team of over 340,000 members in more than 50 countries. With a strong heritage of over 55 years, Capgemini is trusted by clients to unlock the value of technology across various industries. The company delivers end-to-end services and solutions leveraging capabilities in AI, generative AI, cloud, and data, combined with deep industry expertise and a partner ecosystem.,
ACTIVELY HIRING
posted 2 months ago
experience3 to 7 Yrs
location
Karnataka
skills
  • Splunk
  • JIRA
  • ServiceNow
  • ConnectWise
  • analytical skills
  • communication skills
  • interpersonal skills
  • SOC operations
  • incident response
  • security monitoring tools
  • Microsoft Sentinel
  • Kusto KQL
  • Splunk Search Processing Language SPL
  • Fresh Service
  • AWS skills
  • cloud security monitoring
  • Windows Defender
  • SIEM technologies
  • problemsolving
Job Description
As an Enterprise IT Security Analyst (SOC) at our company, you will play a crucial role in maintaining the security and efficiency of our Information Security team. Your responsibilities will include monitoring security alerts, analyzing and triaging security incidents, assisting in incident response processes, handling security incidents and tickets, conducting security assessments and audits, contributing to SOC use case generation, providing technical support, leveraging AWS skills for cloud security monitoring, staying updated with the latest SOC trends, and preparing and presenting SOC reports to senior management. Key Responsibilities: - Monitor security alerts and events using SOC tools such as Splunk, Microsoft Sentinel, Kusto (KQL), or Splunk Search Processing Language (SPL). - Analyze and triage security incidents to determine their impact and urgency. - Assist in incident response processes, including detection, analysis, containment, eradication, and recovery. - Handle security incidents and tickets using tools like JIRA, ServiceNow, Fresh Service, and ConnectWise. - Conduct regular security assessments and audits to identify and mitigate SOC-related risks. - Contribute to the generation and design of SOC use cases to enhance threat detection and response capabilities. - Provide technical support and troubleshooting for SOC-related issues. - Utilize AWS skills for cloud security monitoring and incident response. - Leverage Windows Defender for endpoint protection and threat management. - Stay current with the latest SOC trends, technologies, and threats to proactively address potential security issues. - Prepare and present SOC reports and metrics to senior management. Qualifications Required: - Bachelors degree in computer science, Information Technology, or a related field. - 3 years of experience in SOC operations or a related field. - CompTIA Security+ certification or similar. - Experience with any SIEM technologies. - Strong understanding of SOC principles, practices, and frameworks. - Proven experience in incident response and management. Our company, Notified, is dedicated to creating a more connected world by offering tools to amplify stories for over 10,000 global customers. We are passionate about helping individuals and brands share their stories globally. Our products are designed to empower storytellers, and our personalized service approach ensures that we deliver wisdom and insight to our clients. At Notified, we value diversity and are committed to being an equal opportunities employer. We celebrate and support differences within our team and believe in building success upon them. Join us in our mission to help our clients reach global and targeted audiences, measure outcomes, and fulfill their commitments. This role will be based at The Leela Office in Bangalore, with a hybrid work schedule that includes office and remote work days. You will have access to a range of benefits, including a comprehensive health insurance plan, learning opportunities through our internal university, and various social outings and events with colleagues. We look forward to welcoming you to our team and working together to enhance our security operations and make a positive impact in the digital world.,
ACTIVELY HIRING
logo

@ 2025 Shine.com | All Right Reserved

Connect with us:
  • LinkedIn
  • Instagram
  • Facebook
  • YouTube
  • Twitter