1 Opening(s)
3.0 Year(s) To 4.0 Year(s)
Not Disclosed by Recruiter
Job Description:
We are seeking a skilled and motivated Information Security Analyst 1 with 3 to 4 years of experience to join our team. The ideal candidate will have hands-on experience with Active Directory (AD) and Privileged Access Management (PAM) systems. This role involves ensuring the security and integrity of our ...
1 Opening(s)
7.0 Year(s) To 12.0 Year(s)
Not Disclosed by Recruiter
The role
As Lead Security Operations Engineer, you will provide technical leadership for a growing team of Security Engineers in the management of vulnerabilities from identification through to resolution. You will work closely with IT Operations, Cyber Security and the wider IT teams including line of business teams to ensure vulnerabilities ...
1 Opening(s)
4.0 Year(s) To 10.0 Year(s)
6.00 LPA TO 8.00 LPA
As a Threat Analyst you will play a pivotal role in safeguarding our organization against cyber threats. Collaborating with enterprise systems, log analysis platforms, and endpoint collection systems, you will lead investigations, identify potential threats, and execute strategies to neutralize them effectively.
This position will require the candidate to be aligned ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
5.00 LPA TO 20.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Splunk SIEM
Good to Have Skills : Security Information & Event Management (SIEM) Platform Operations
Job Requirements : Role Title SOC Sr Security Analyst Support Tier Level 2 Career ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
5.00 LPA TO 20.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Arcsight Security Information and Event Management
Good to Have Skills : Security Information & Event Management (SIEM) Platform Operations
Job Requirements : Role Title SOC Sr Security Analyst Support ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
10.00 LPA TO 20.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Arcsight Security Information and Event Management
Good to Have Skills : Security Information & Event Management (SIEM) Platform Operations
Job Requirements : Role Title SOC Sr Security Analyst Support ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
10.00 LPA TO 20.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Arcsight Security Information and Event Management
Good to Have Skills : Security Information & Event Management (SIEM) Platform Management
Job Requirements : Role Title SOC Sr Security Analyst Support ...
3 Opening(s)
3.0 Year(s) To 8.0 Year(s)
5.00 LPA TO 15.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Arcsight Security Information and Event Management
Good to Have Skills : Security Information & Event Management (SIEM) Platform Operations
Job Requirements : Role Title SOC Sr Security Analyst Support ...
3 Opening(s)
3.0 Year(s) To 8.0 Year(s)
5.00 LPA TO 15.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Arcsight Security Information and Event Management
Good to Have Skills : Security Information & Event Management (SIEM) Platform Operations
Job Requirements : Role Title SOC Sr Security Analyst Support ...
1 Opening(s)
5.0 Year(s) To 7.0 Year(s)
10.00 LPA TO 15.00 LPA
Key Responsibilities
Assess Security Controls: Evaluate the effectiveness of an organization's security policies, procedures, systems, and controls.
Identify Vulnerabilities: Conduct security scans, code reviews, and penetration testing to find weaknesses in networks, applications, and systems.
Ensure Compliance: Audit for adherence to industry standards (like ISO 27001) and relevant security regulations and policies.
Document Findings: Prepare detailed reports ...