5 Opening(s)
3.0 Year(s) To 10.0 Year(s)
3.00 LPA TO 10.00 LPA
Job Description
· Continuous monitoring the SIEM dashboard for alerts and incidents
· Monitoring of console of Cyber Security tools like Anti-APT, WAF, DLP etc to identify the security events and health status on need basis.
· Perform first level event analysis for identified alerts before qualifying the incidents.
· Categorize/Triage the Security Incidents ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Description:We are looking for an experienced and creative Red Team Operator to conduct full-scope adversarysimulations and emulate APT-style attacks. You will test organizational defenses and deliver tacticalinsights to enhance cybersecurity resilience.Responsibilities:• Plan and execute adversary emulation based on TTPs from the MITRE ATT&CK framework.• Develop custom payloads and simulate attacks ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Description:We are seeking an experienced Kernel Developer to join our low-level systems and platform securityteam. This role involves developing and enhancing kernel modules for Windows and/or Linuxsystems and troubleshooting kernel-level issues. You will be part of a team focused on systemperformance, custom kernel components, and defensive/offensive kernel engineering.Responsibilities:• Develop and ...
1 Opening(s)
2.0 Year(s) To 10.0 Year(s)
5.00 LPA TO 10.00 LPA
1. Minimum 2 years of experience in Security Operations Centre
2. Experience across SOC domains use case creation, incident management, threat hunting, threat intelligence etc.
3. Solid understanding of cyber security, network security, end point security concepts
4. Good understanding of recent cyber threats, latest attack vectors
5. Must have experience in any one ...
1 Opening(s)
3.0 Year(s) To 10.0 Year(s)
14.00 LPA TO 28.00 LPA
1. Minimum 3-5 years of experience in Security Operations Centre
2. Experience across SOC domains use case creation, incident management, threat hunting, threat intelligence etc.
3. Solid understanding of cyber security, network security, end point security concepts
4. Good understanding of recent cyber threats, latest attack vectors
5. Must have experience in any one SIEM (Splunk), EDR and SOAR ...
1 Opening(s)
7.0 Year(s) To 15.0 Year(s)
15.00 LPA TO 26.00 LPA
Minimum 7 years of experience in conducting hypothesis based threat hunting using SIEM logs (preferably Splunk)
Good knowledge of recent cyber trends/attacks, MITRE framework
Good understanding of network, end point based attacks
Must have experience in developing hypothesis using DNS, Proxy, EDR logs
Must have experience in drafting hunting reports and communicating to senior ...
1 Opening(s)
4.0 Year(s) To 10.0 Year(s)
6.00 LPA TO 8.00 LPA
As a Threat Analyst you will play a pivotal role in safeguarding our organization against cyber threats. Collaborating with enterprise systems, log analysis platforms, and endpoint collection systems, you will lead investigations, identify potential threats, and execute strategies to neutralize them effectively.
This position will require the candidate to be aligned ...
1 Opening(s)
2.0 Year(s) To 8.0 Year(s)
9.00 LPA TO 12.00 LPA
Responsibilities • Manages overall personnel, performance, daily operations, and discipline of self • The position will be responsible to provide remote support for IT infrastructure • Drive specific improvement projects as required by Management Team from time to time • Be accountable and responsible for actions taken • Take ownership ...
2 Opening(s)
10.0 Year(s) To 14.0 Year(s)
25.00 LPA TO 32.00 LPA
Job Responsibilities
Understand business security requirements and develop accurate and realistic design plan along with risk mitigation solutions for the project.
Have a broad technical and deep security-based background.
Able to take highly technical requirements & create easy to understand, complete standard operating procedures
The Analyst works with multiple technology platforms and interfaces with ...
1 Opening(s)
4.0 Year(s) To 10.0 Year(s)
10.00 LPA TO 15.00 LPA
Lead company to SOC2/ISO 27001 certification;
Develop and maintain information security policies;
Design and implement information security policy education, training, and awareness programs;
Establish security risk matrix and framework; select security solutions to address security controls for enterprise landscape;
Partner with key business and IT leaders to develop security policies, standards, guidelines, and procedures ...