1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
3.00 LPA TO 6.00 LPA
Location- Delhi CP
Minimum 2 years of experience in handling security related products & services and preferably SIEM solution.
• Person should have adequate knowledge of security devices like firewalls, IPS, Web Application Firewall, DDOS, EDR, Incident response, SOAR and other security devices.
• Construction of SIEM content required to produce Content Outputs ...
1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
6.00 LPA TO 7.00 LPA
Pre-Screening Questions for Cybersecurity Expert:
1. Have you directly handled any regulatory cybersecurity audits or inspections by SEBI or NSE/BSE? If yes, briefly mention the scope and outcome.
2. List the key cybersecurity controls you have implemented to comply with SEBI’s Cybersecurity & Cyber Resilience Framework (CSCRF) for stockbrokers.
3. Have you led ...
1 Opening(s)
4.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
ob Title: SOC (Security Analyst)
Job Overview:
We are seeking a highly skilled SOC Expert to join our dynamic cybersecurity team. The ideal candidate will play a crucial role in monitoring, detecting, analysing, and responding to security incidents. Candidate requires a deep understanding of security operations and a proactive approach to threat management ...
1 Opening(s)
5.0 Year(s) To 12.0 Year(s)
18.00 LPA TO 22.00 LPA
Key Responsibilities:
Client Relationship Management: Build and maintain strong relationships with enterprise clients, understanding their business objectives and aligning our services to meet their needs.
Act as the main point of contact for clients, addressing concerns, resolving issues, and proactively communicating updates.
Service Delivery Oversight: Oversee the end-to-end delivery of Enterprise Managed Services, ...
1 Opening(s)
3.0 Year(s) To 7.0 Year(s)
5.00 LPA TO 8.00 LPA
Job Description
CEH or equivalent Certification and Proven work experience as a CEH
In-depth knowledge of parameter manipulation, session hijacking, and cross-site scripting.
Identifying and recording security flaws and breaches.
Knowledge and understanding of SIEM tools.
Manage the incident and related documents like an incident report, incident plan, etc.
Prepare the ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Responsibilities to handle - Company's all cases related to police authorities such as FIR, our Vehicle accident cases, or any other police cases related to our establishment.Labor Commissioner, Municipal Board, Town & Country Planning, Land revenue Department, Forest Department for FCA Act, & MOEF..Liaison with Mining Dept. At District Head ...
1 Opening(s)
8.0 Year(s) To 12.0 Year(s)
28.00 LPA TO 32.00 LPA
Typical Years of Experience • 8-12 yearsEducational Qualification • BE/BSC(Comp/IT) (or equivalent)
Skills: Threat Intel: Cyble, Threat intelligence, Fortirecon & Cloudsek
Role TaskThreat Intelligence & Researcher Keep track of APTs groups (advanced persistent threats), Know APT Groups motivation, their tools & techniques, the malware they write, and C&C (command and control center), identify ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
12.00 LPA TO 20.00 LPA
Handle Escalated incident tickets from L1 Team.
Analyse and investigate security events from various sources; Triage security events and incidents, detect anomalies, and report remediation actions.
Manage security incidents through all phases of the incident response process through to
Closure
Using SIEM, Full Packet Capture, Intrusion Detection, Vulnerability Scanning and Malware analysis technologies for ...
1 Opening(s)
9.0 Year(s) To 15.0 Year(s)
20.00 LPA TO 30.00 LPA
Job Description – Network Security Operations
Network Security Management:
Applies advanced subject matter knowledge to solve complex business issues and is regarded as a subject matter expert.
1. Serves as a Network Security expert in Network design & Implementation, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices.2. Ensures ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...