1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...
2 Opening(s)
4.0 Year(s) To 7.0 Year(s)
12.00 LPA TO 16.00 LPA
4 - 7 years of experience in operational security roles is required, with previous SOC experience stronglypreferred.ï‚· Deep familiarity with one or more SIEM tools is required.ï‚· A good knowledge of a wide variety of security products is required.ï‚· A strong understanding of technical IT concepts is required, including:o Windows ...
3 Opening(s)
3.0 Year(s) To 8.0 Year(s)
5.00 LPA TO 15.00 LPA
Role : SW/Application Tech Support Practitioner
Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on ...
3 Opening(s)
3.0 Year(s) To 8.0 Year(s)
5.00 LPA TO 15.00 LPA
Role : SW/Application Tech Support Practitioner
Role Description : Act as the ongoing interface between the client and the system or application. Dedicated to quality, using exceptional communication skills to keep our world class systems running. Can accurately define a client issue and can interpret and design a resolution based on ...
4 Opening(s)
5.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
This role with report to Information security management Associate Head - Solutions and architecture
Ability to learn, understand and work with team to gain insight into security solutions and architecture functions
Should have good understanding of network, OS and security solutions. etc.
1. Configure and administer security devices2. Support in SOP preparations
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
15.00 LPA TO 25.00 LPA
Monitoring and detection:
SOCs continuously monitor various systems like networks, servers, databases, and endpoints for any signs of a cyberattack. They analyze security data to spot unusual activities, patterns, and anomalies.
Threat analysis:
SOC analysts investigate alerts and data feeds to determine if a threat is real, assess its potential impact, and differentiate between ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
25.00 LPA TO 26.00 LPA
Roles & Responsibilities:
Monitor SIEM Alerts on 24 x 7 x 365 basis including Night Shifts on a rotational roster.
Investigate Alerts Detected and carryout Incident Response.
Document & report appropriate Incidents to the concerned Resolver Groups using Ticketing Tools.
Monitor Network Traffic, perform Threat Hunting to identify compromised systems, negate ...
4 Opening(s)
5.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
Ability to learn, understand and work with team to gain insight into risk, compliance and awarenessfunctions.Responsibilities1. Identify, assess, and monitor security risks; perform risk assessments and recommendmitigation strategies. 2. Maintain risk register and report to leadership. 3. Develop, review, and enforce security policies aligned with frameworks (e.g., ISO 27001,NIST, CIS) and regulations ...
4 Opening(s)
5.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
Vertical - Information Security Management
Job Purpose-
Ability to learn, understand and work with team to gain insight into SOC and cyber forensic functions
Functional Responsibility
1.Perform Level1 SOC monitoring2. Timely escalation of incident if the same is not remediated within TAT3. Improve adherence to TAT over a period of time
Competencies Required-
1. Good understanding of network, ...