1,612 Blockchain Security Specialist jobs in India

Information Security Specialist

Bengaluru, Karnataka TOYO MODEC OFS India Private Limited (OFS-India)

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

About the Company:

Toyo India & Modec Singapore have joined hands to start a joint venture, Global Capability Centre at Bangalore.

Corporate Office, Bangalore


About the Role


Engineer – Information Security in the Quality and Information Security Management Department.


Responsibilities


  • Establish, Implement, Maintain and Improve Information Security Management System (ISMS) as per ISO 27001:2022 Standard.
  • Plan and Conduct Information Security (IS) Trainings.
  • IS Risk Assessment and Treatment.
  • Incident Management.
  • Plan and Conduct ISMS Internal Audits.
  • Root Cause Analysis.
  • Implementation of IS Best Practices.
  • IS Vendor Audits.
  • Plan, Schedule and Monitor IS activities.
  • Presentation Skills, Interpersonal Skills, Time Management Skills.

Qualifications


  • Education Qualification: B.E / Diploma in Computers / Information Technology / Electronics & Telecommunication / etc. from recognized University / Board.
  • Technical Qualification: Certified ISO 27001:2022 Internal Auditor / Lead Auditor.
  • Experience: 8-12 Years; Relevant: 4-6 Years.

Required Skills


  • Certified Information System Auditor (CISA) / Certified Information Security Manager (CISM).
  • Knowledge of ISO 31000 and ISO 27005 Standards.
  • Experience in Network and Server Security.
  • Knowledge related to Software Development Life Cycle (SDLC) Security.
  • Knowledge of National (e.g. IT Act) / International Laws / Regulations (e.g. EUGDPR) / Standards (e.g. NIST) related to Information Security.


Preferred Skills


  • Develop, Update and Review ISMS Policies and procedures in accordance with ISO 27001.
  • Plan and Conduct IS Awareness Trainings.
  • Prepare IS Awareness emailers and posters.
  • Perform and Evaluate Risks and review Risk Registers of Stakeholders.
  • Management of IS Incidents.
  • Plan, Conduct Internal Audits and report findings.
  • Coordinate and follow up for Internal / External Audit Reports and its closures.
  • Plan, coordinate and follow up with External Auditors / Certification Agency for ISO 27001.
  • Review Root Cause Analysis, Correction and Corrective Actions.
  • Coordinate with stakeholders to improve IS Controls.
  • Support Departments to prepare for External Audits.
  • Participate in Management Review Meetings Agenda, Presentation, MOM and follow up.
  • Review Bidding / Contracts and determine IS requirements.
This advertiser has chosen not to accept applicants from your region.

Information Security Specialist

Bengaluru, Karnataka ZEISS India

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Role Summary

As a member of Global Security Operations Center, you will be responsible for driving the operational activities of SOC and lead complex investigations, conduct advanced threat analysis, and initiate incident responses activities across various business units. He/she is also responsible for process improvement activities, mentoring the team through training initiatives.



Responsibilities

  • Managing shifts / team in the 24X7 SOC Environment.
  • Act as a first point of escalation for SOC team and assist with handing out work assignments to the team members.
  • Handling escalated security incidents/ issues, Responsible for deep dive analysis of escalated incidents, threat hunting.
  • Highlight potential security risks to SOC Manager and concerned SPOCs.
  • Maintain and optimize security tools and technologies used within the SOC.
  • Support Adhoc investigations on need basis.
  • Identify opportunities for continuous improvement in security operations.
  • Continuously improve threat detection capabilities, use cases and SOPs.
  • Support SOC manager for creating new operational guidelines, processes, and procedures.
  • Mentor and provide guidance to L1 analysts and serves as the POC for escalation issues that may arise.
  • Support rotational 16x5 operational shifts and on call when needed.

Role Requirements

Experience

At least 7+ years prior experience as a SOC Lead/Lead Analyst in SOC environment with hands-on experience in performing security monitoring and response activities, incident handling, alert tracking, and/or cybersecurity case management.


Process and Technology Skills

  • Proven experience in handling any of the EDR solution such as Defender or Crowdstrike.
  • Configure and optimize EDR settings to enhance security posture and ensure effective threat detection.
  • Analyze threat intelligence and security data to identify trends, patterns, and emerging threats
  • Capability to recognize different security situations and refine recurring security notifications by finetuning.
  • Respond to security incidents promptly, conducting thorough investigations and implementing remediation strategies to mitigate risks.
  • Strong background in incident analysis, evidence collection, documentation, communications, reporting and response.
  • Ability to manage cloud security controls, including firewalls, intrusion detection systems, and encryption protocols.
  • Lead and coordinate incident response efforts for cloud-related security incidents.
  • Collaborate with business and development teams to ensure security best practices are integrated into cloud architecture and deployments.
  • Proven experience with cloud platforms such as AWS, Azure, or Google Cloud.
  • Experience in mentoring and training junior analysts, Provide technical and functional support to L1 Team with analytical feedback.
  • Proven experience in any SIEM tools and/or log management solution
  • Must have good knowledge in firewalls, IDS/IPS, Anti-Virus, EDR, Proxy, DNS, email, AD, etc.
  • Good understanding of mainstream operating systems (Windows, Linux, etc) and security infrastructure
  • Good understanding of log parsing and event analysis (Ability to understand and interpret Windows, Linux OS, firewall, web proxy, DNS log events)
  • Expertise in creation of reports, dashboards, metrics for SOC operations
  • Knowledge in developing use cases for security monitoring, threat management and threat modelling.
  • Knowledge of MITRE or similar frameworks and procedures used by adversaries.
  • Advanced knowledge of malware operation and indicators
  • Good understanding of ITIL processes including Incident Management, Change Management and Problem Management
  • Advanced knowledge of networking fundamentals (OSI Layers, TCP/IP, protocols, and services.)
  • Sound knowledge in Information Security policies, procedures, standards, best practices, and guidelines
  • Involvement in threat intelligence and cybersecurity communities.
  • Deep understanding of Cyber Kill Chain and other applicable analytic models
  • Optionally, experience in at least one of the following: Python, PowerShell, VBscript.


Other skills

  • Knowledge and understanding of project management methodologies, processes, and tools.
  • Strong analytical skills and ability to solve complex technical problems with high attention to detail and accuracy.
  • Strong team player and ability to work in a challenging and constantly changing environment.
  • Ability to multitask and work independently with minimal direction and maximum accountability.
  • Proficiency in verbal and written communication skills.
  • Proficiency in time management and presentation skills
  • Proficiency in decision-making and problem-solving skills


Education and Certification

  • Bachelor’s degree in computer information systems or related field or equivalent demonstrated experience & knowledge.
  • Professional certification in Information security like Security+, CCSE, CCSP, AZ900 – AZ500 etc., TICSA, MCSE, CISSP, etc. would be advantageous
This advertiser has chosen not to accept applicants from your region.

Information Security Specialist

Bengaluru, Karnataka ZEISS India

Posted today

Job Viewed

Tap Again To Close

Job Description

Role Summary

As a member of Global Security Operations Center, you will be responsible for driving the operational activities of SOC and lead complex investigations, conduct advanced threat analysis, and initiate incident responses activities across various business units. He/she is also responsible for process improvement activities, mentoring the team through training initiatives.

Responsibilities

  • Managing shifts / team in the 24X7 SOC Environment.
  • Act as a first point of escalation for SOC team and assist with handing out work assignments to the team members.
  • Handling escalated security incidents/ issues, Responsible for deep dive analysis of escalated incidents, threat hunting.
  • Highlight potential security risks to SOC Manager and concerned SPOCs.
  • Maintain and optimize security tools and technologies used within the SOC.
  • Support Adhoc investigations on need basis.
  • Identify opportunities for continuous improvement in security operations.
  • Continuously improve threat detection capabilities, use cases and SOPs.
  • Support SOC manager for creating new operational guidelines, processes, and procedures.
  • Mentor and provide guidance to L1 analysts and serves as the POC for escalation issues that may arise.
  • Support rotational 16x5 operational shifts and on call when needed.

Role Requirements

Experience

At least 7+ years prior experience as a SOC Lead/Lead Analyst in SOC environment with hands-on experience in performing security monitoring and response activities, incident handling, alert tracking, and/or cybersecurity case management.

Process and Technology Skills

  • Proven experience in handling any of the EDR solution such as Defender or Crowdstrike.
  • Configure and optimize EDR settings to enhance security posture and ensure effective threat detection.
  • Analyze threat intelligence and security data to identify trends, patterns, and emerging threats
  • Capability to recognize different security situations and refine recurring security notifications by finetuning.
  • Respond to security incidents promptly, conducting thorough investigations and implementing remediation strategies to mitigate risks.
  • Strong background in incident analysis, evidence collection, documentation, communications, reporting and response.
  • Ability to manage cloud security controls, including firewalls, intrusion detection systems, and encryption protocols.
  • Lead and coordinate incident response efforts for cloud-related security incidents.
  • Collaborate with business and development teams to ensure security best practices are integrated into cloud architecture and deployments.
  • Proven experience with cloud platforms such as AWS, Azure, or Google Cloud.
  • Experience in mentoring and training junior analysts, Provide technical and functional support to L1 Team with analytical feedback.
  • Proven experience in any SIEM tools and/or log management solution
  • Must have good knowledge in firewalls, IDS/IPS, Anti-Virus, EDR, Proxy, DNS, email, AD, etc.
  • Good understanding of mainstream operating systems (Windows, Linux, etc) and security infrastructure
  • Good understanding of log parsing and event analysis (Ability to understand and interpret Windows, Linux OS, firewall, web proxy, DNS log events)
  • Expertise in creation of reports, dashboards, metrics for SOC operations
  • Knowledge in developing use cases for security monitoring, threat management and threat modelling.
  • Knowledge of MITRE or similar frameworks and procedures used by adversaries.
  • Advanced knowledge of malware operation and indicators
  • Good understanding of ITIL processes including Incident Management, Change Management and Problem Management
  • Advanced knowledge of networking fundamentals (OSI Layers, TCP/IP, protocols, and services.)
  • Sound knowledge in Information Security policies, procedures, standards, best practices, and guidelines
  • Involvement in threat intelligence and cybersecurity communities.
  • Deep understanding of Cyber Kill Chain and other applicable analytic models
  • Optionally, experience in at least one of the following: Python, PowerShell, VBscript.

Other skills

  • Knowledge and understanding of project management methodologies, processes, and tools.
  • Strong analytical skills and ability to solve complex technical problems with high attention to detail and accuracy.
  • Strong team player and ability to work in a challenging and constantly changing environment.
  • Ability to multitask and work independently with minimal direction and maximum accountability.
  • Proficiency in verbal and written communication skills.
  • Proficiency in time management and presentation skills
  • Proficiency in decision-making and problem-solving skills

Education and Certification

  • Bachelor’s degree in computer information systems or related field or equivalent demonstrated experience & knowledge.
  • Professional certification in Information security like Security+, CCSE, CCSP, AZ900 – AZ500 etc., TICSA, MCSE, CISSP, etc. would be advantageous
This advertiser has chosen not to accept applicants from your region.

Information Security Specialist

Bengaluru, Karnataka TOYO MODEC OFS India Private Limited (OFS-India)

Posted today

Job Viewed

Tap Again To Close

Job Description

About the Company:

Toyo India & Modec Singapore have joined hands to start a joint venture, Global Capability Centre at Bangalore.

Corporate Office, Bangalore

About the Role

Engineer – Information Security in the Quality and Information Security Management Department.

Responsibilities

  • Establish, Implement, Maintain and Improve Information Security Management System (ISMS) as per ISO 27001:2022 Standard.
  • Plan and Conduct Information Security (IS) Trainings.
  • IS Risk Assessment and Treatment.
  • Incident Management.
  • Plan and Conduct ISMS Internal Audits.
  • Root Cause Analysis.
  • Implementation of IS Best Practices.
  • IS Vendor Audits.
  • Plan, Schedule and Monitor IS activities.
  • Presentation Skills, Interpersonal Skills, Time Management Skills.

Qualifications

  • Education Qualification: B.E / Diploma in Computers / Information Technology / Electronics & Telecommunication / etc. from recognized University / Board.
  • Technical Qualification: Certified ISO 27001:2022 Internal Auditor / Lead Auditor.
  • Experience: 8-12 Years; Relevant: 4-6 Years.

Required Skills

  • Certified Information System Auditor (CISA) / Certified Information Security Manager (CISM).
  • Knowledge of ISO 31000 and ISO 27005 Standards.
  • Experience in Network and Server Security.
  • Knowledge related to Software Development Life Cycle (SDLC) Security.
  • Knowledge of National (e.g. IT Act) / International Laws / Regulations (e.g. EUGDPR) / Standards (e.g. NIST) related to Information Security.

Preferred Skills

  • Develop, Update and Review ISMS Policies and procedures in accordance with ISO 27001.
  • Plan and Conduct IS Awareness Trainings.
  • Prepare IS Awareness emailers and posters.
  • Perform and Evaluate Risks and review Risk Registers of Stakeholders.
  • Management of IS Incidents.
  • Plan, Conduct Internal Audits and report findings.
  • Coordinate and follow up for Internal / External Audit Reports and its closures.
  • Plan, coordinate and follow up with External Auditors / Certification Agency for ISO 27001.
  • Review Root Cause Analysis, Correction and Corrective Actions.
  • Coordinate with stakeholders to improve IS Controls.
  • Support Departments to prepare for External Audits.
  • Participate in Management Review Meetings Agenda, Presentation, MOM and follow up.
  • Review Bidding / Contracts and determine IS requirements.
This advertiser has chosen not to accept applicants from your region.

Information security specialist

Bengaluru, Karnataka TOYO MODEC OFS India Private Limited

Posted today

Job Viewed

Tap Again To Close

Job Description

About the Company: Toyo India & Modec Singapore have joined hands to start a joint venture, Global Capability Centre at Bangalore. Corporate Office, Bangalore About the Role Engineer – Information Security in the Quality and Information Security Management Department. Responsibilities Establish, Implement, Maintain and Improve Information Security Management System (ISMS) as per ISO 27001:2022 Standard. Plan and Conduct Information Security (IS) Trainings. IS Risk Assessment and Treatment. Incident Management. Plan and Conduct ISMS Internal Audits. Root Cause Analysis. Implementation of IS Best Practices. IS Vendor Audits. Plan, Schedule and Monitor IS activities. Presentation Skills, Interpersonal Skills, Time Management Skills. Qualifications Education Qualification: B. E / Diploma in Computers / Information Technology / Electronics & Telecommunication / etc. from recognized University / Board. Technical Qualification: Certified ISO 27001:2022 Internal Auditor / Lead Auditor. Experience: 8-12 Years; Relevant: 4-6 Years. Required Skills Certified Information System Auditor (CISA) / Certified Information Security Manager (CISM). Knowledge of ISO 31000 and ISO 27005 Standards. Experience in Network and Server Security. Knowledge related to Software Development Life Cycle (SDLC) Security. Knowledge of National (e.g. IT Act) / International Laws / Regulations (e.g. EUGDPR) / Standards (e.g. NIST) related to Information Security. Preferred Skills Develop, Update and Review ISMS Policies and procedures in accordance with ISO 27001. Plan and Conduct IS Awareness Trainings. Prepare IS Awareness emailers and posters. Perform and Evaluate Risks and review Risk Registers of Stakeholders. Management of IS Incidents. Plan, Conduct Internal Audits and report findings. Coordinate and follow up for Internal / External Audit Reports and its closures. Plan, coordinate and follow up with External Auditors / Certification Agency for ISO 27001. Review Root Cause Analysis, Correction and Corrective Actions. Coordinate with stakeholders to improve IS Controls. Support Departments to prepare for External Audits. Participate in Management Review Meetings Agenda, Presentation, MOM and follow up. Review Bidding / Contracts and determine IS requirements.

This advertiser has chosen not to accept applicants from your region.

Information Security Specialist

Bengaluru, Karnataka TOYO MODEC OFS India Private Limited (OFS-India)

Posted today

Job Viewed

Tap Again To Close

Job Description

About the Company:
Toyo India & Modec Singapore have joined hands to start a joint venture, Global Capability Centre at Bangalore.
Corporate Office, Bangalore

About the Role

Engineer – Information Security in the Quality and Information Security Management Department.

Responsibilities

Establish, Implement, Maintain and Improve Information Security Management System (ISMS) as per ISO 27001:2022 Standard.
Plan and Conduct Information Security (IS) Trainings.
IS Risk Assessment and Treatment.
Incident Management.
Plan and Conduct ISMS Internal Audits.
Root Cause Analysis.
Implementation of IS Best Practices.
IS Vendor Audits.
Plan, Schedule and Monitor IS activities.
Presentation Skills, Interpersonal Skills, Time Management Skills.

Qualifications

Education Qualification: B.E / Diploma in Computers / Information Technology / Electronics & Telecommunication / etc. from recognized University / Board.
Technical Qualification: Certified ISO 27001:2022 Internal Auditor / Lead Auditor.
Experience: 8-12 Years; Relevant: 4-6 Years.

Required Skills

Certified Information System Auditor (CISA) / Certified Information Security Manager (CISM).
Knowledge of ISO 31000 and ISO 27005 Standards.
Experience in Network and Server Security.
Knowledge related to Software Development Life Cycle (SDLC) Security.
Knowledge of National (e.g. IT Act) / International Laws / Regulations (e.g. EUGDPR) / Standards (e.g. NIST) related to Information Security.

Preferred Skills

Develop, Update and Review ISMS Policies and procedures in accordance with ISO 27001.
Plan and Conduct IS Awareness Trainings.
Prepare IS Awareness emailers and posters.
Perform and Evaluate Risks and review Risk Registers of Stakeholders.
Management of IS Incidents.
Plan, Conduct Internal Audits and report findings.
Coordinate and follow up for Internal / External Audit Reports and its closures.
Plan, coordinate and follow up with External Auditors / Certification Agency for ISO 27001.
Review Root Cause Analysis, Correction and Corrective Actions.
Coordinate with stakeholders to improve IS Controls.
Support Departments to prepare for External Audits.
Participate in Management Review Meetings Agenda, Presentation, MOM and follow up.
Review Bidding / Contracts and determine IS requirements.
This advertiser has chosen not to accept applicants from your region.

Information Security Specialist

Bengaluru, Karnataka ZEISS India

Posted today

Job Viewed

Tap Again To Close

Job Description

Role Summary
As a member of Global Security Operations Center, you will be responsible for driving the operational activities of SOC and lead complex investigations, conduct advanced threat analysis, and initiate incident responses activities across various business units. He/she is also responsible for process improvement activities, mentoring the team through training initiatives.

Responsibilities
Managing shifts / team in the 24X7 SOC Environment.
Act as a first point of escalation for SOC team and assist with handing out work assignments to the team members.
Handling escalated security incidents/ issues, Responsible for deep dive analysis of escalated incidents, threat hunting.
Highlight potential security risks to SOC Manager and concerned SPOCs.
Maintain and optimize security tools and technologies used within the SOC.
Support Adhoc investigations on need basis.
Identify opportunities for continuous improvement in security operations.
Continuously improve threat detection capabilities, use cases and SOPs.
Support SOC manager for creating new operational guidelines, processes, and procedures.
Mentor and provide guidance to L1 analysts and serves as the POC for escalation issues that may arise.
Support rotational 16x5 operational shifts and on call when needed.

Role Requirements
Experience
At least 7+ years prior experience as a SOC Lead/Lead Analyst in SOC environment with hands-on experience in performing security monitoring and response activities, incident handling, alert tracking, and/or cybersecurity case management.

Process and Technology Skills
Proven experience in handling any of the EDR solution such as Defender or Crowdstrike.
Configure and optimize EDR settings to enhance security posture and ensure effective threat detection.
Analyze threat intelligence and security data to identify trends, patterns, and emerging threats
Capability to recognize different security situations and refine recurring security notifications by finetuning.
Respond to security incidents promptly, conducting thorough investigations and implementing remediation strategies to mitigate risks.
Strong background in incident analysis, evidence collection, documentation, communications, reporting and response.
Ability to manage cloud security controls, including firewalls, intrusion detection systems, and encryption protocols.
Lead and coordinate incident response efforts for cloud-related security incidents.
Collaborate with business and development teams to ensure security best practices are integrated into cloud architecture and deployments.
Proven experience with cloud platforms such as AWS, Azure, or Google Cloud.
Experience in mentoring and training junior analysts, Provide technical and functional support to L1 Team with analytical feedback.
Proven experience in any SIEM tools and/or log management solution
Must have good knowledge in firewalls, IDS/IPS, Anti-Virus, EDR, Proxy, DNS, email, AD, etc.
Good understanding of mainstream operating systems (Windows, Linux, etc) and security infrastructure
Good understanding of log parsing and event analysis (Ability to understand and interpret Windows, Linux OS, firewall, web proxy, DNS log events)
Expertise in creation of reports, dashboards, metrics for SOC operations
Knowledge in developing use cases for security monitoring, threat management and threat modelling.
Knowledge of MITRE or similar frameworks and procedures used by adversaries.
Advanced knowledge of malware operation and indicators
Good understanding of ITIL processes including Incident Management, Change Management and Problem Management
Advanced knowledge of networking fundamentals (OSI Layers, TCP/IP, protocols, and services.)
Sound knowledge in Information Security policies, procedures, standards, best practices, and guidelines
Involvement in threat intelligence and cybersecurity communities.
Deep understanding of Cyber Kill Chain and other applicable analytic models
Optionally, experience in at least one of the following: Python, PowerShell, VBscript.

Other skills
Knowledge and understanding of project management methodologies, processes, and tools.
Strong analytical skills and ability to solve complex technical problems with high attention to detail and accuracy.
Strong team player and ability to work in a challenging and constantly changing environment.
Ability to multitask and work independently with minimal direction and maximum accountability.
Proficiency in verbal and written communication skills.
Proficiency in time management and presentation skills
Proficiency in decision-making and problem-solving skills

Education and Certification
Bachelor’s degree in computer information systems or related field or equivalent demonstrated experience & knowledge.
Professional certification in Information security like Security+, CCSE, CCSP, AZ900 – AZ500 etc., TICSA, MCSE, CISSP, etc. would be advantageous
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Blockchain security specialist Jobs in India !

Information Security Specialist

New
Bengaluru, Karnataka TOYO MODEC OFS India Private Limited (OFS-India)

Posted today

Job Viewed

Tap Again To Close

Job Description

About the Company:

Toyo India & Modec Singapore have joined hands to start a joint venture, Global Capability Centre at Bangalore.

Corporate Office, Bangalore


About the Role


Engineer – Information Security in the Quality and Information Security Management Department.


Responsibilities


  • Establish, Implement, Maintain and Improve Information Security Management System (ISMS) as per ISO 27001:2022 Standard.
  • Plan and Conduct Information Security (IS) Trainings.
  • IS Risk Assessment and Treatment.
  • Incident Management.
  • Plan and Conduct ISMS Internal Audits.
  • Root Cause Analysis.
  • Implementation of IS Best Practices.
  • IS Vendor Audits.
  • Plan, Schedule and Monitor IS activities.
  • Presentation Skills, Interpersonal Skills, Time Management Skills.

Qualifications


  • Education Qualification: B.E / Diploma in Computers / Information Technology / Electronics & Telecommunication / etc. from recognized University / Board.
  • Technical Qualification: Certified ISO 27001:2022 Internal Auditor / Lead Auditor.
  • Experience: 8-12 Years; Relevant: 4-6 Years.

Required Skills


  • Certified Information System Auditor (CISA) / Certified Information Security Manager (CISM).
  • Knowledge of ISO 31000 and ISO 27005 Standards.
  • Experience in Network and Server Security.
  • Knowledge related to Software Development Life Cycle (SDLC) Security.
  • Knowledge of National (e.g. IT Act) / International Laws / Regulations (e.g. EUGDPR) / Standards (e.g. NIST) related to Information Security.


Preferred Skills


  • Develop, Update and Review ISMS Policies and procedures in accordance with ISO 27001.
  • Plan and Conduct IS Awareness Trainings.
  • Prepare IS Awareness emailers and posters.
  • Perform and Evaluate Risks and review Risk Registers of Stakeholders.
  • Management of IS Incidents.
  • Plan, Conduct Internal Audits and report findings.
  • Coordinate and follow up for Internal / External Audit Reports and its closures.
  • Plan, coordinate and follow up with External Auditors / Certification Agency for ISO 27001.
  • Review Root Cause Analysis, Correction and Corrective Actions.
  • Coordinate with stakeholders to improve IS Controls.
  • Support Departments to prepare for External Audits.
  • Participate in Management Review Meetings Agenda, Presentation, MOM and follow up.
  • Review Bidding / Contracts and determine IS requirements.
This advertiser has chosen not to accept applicants from your region.

Information Security Specialist

Delhi, Delhi CryptoMize

Posted today

Job Viewed

Tap Again To Close

Job Description

Responsibilities

END -->

Our Principles

These are some of the principles that we strongly believe in, preach and actually follow as well.

Commitments

We clearly commit what we can do, by when can we do it and how we would do it, And then we do it.

Confidentiality

We are extremely paranoid about protecting the confidentiality of what we do, for whom and how we do it.

Comfortability

We ensure comfortability of you and your team with ours, which can only come from complete transparency.

Capability

We keep improving our already awesome capabilities by investing all resources at our disposal.

Information Security Specialist Jobs

Information Security Specialist career path

Information Security Specialist Responsibilities


• Post-Graduate degree in system administration, network security, network administration or a related field
• At least five years of experience in system support
• Knowledge of current security risks and protocols
• Willingness to work on-call in the event of a security breach or other emergency
• Good analytical and problem solving skills
• Ability to work under close supervision, as well as the ability to take independent initiative when needed

Information Security Specialist Required Skills


• Graduates with a degree in computer science, information technology or a related science subject are well placed to apply.
• They need to have strong IT skills and knowledge including hardware, software and networks.
• A forensic approach to challenges is desirable in this sector as they often deal with complex issues.
•They need to prevent and detect computer crime, and gather evidence in the event of the discovery of an incident.
• It also demands problem solving skills, an analytical mind and the ability to keep calm under pressure.

Our Services Know More About Us

Perception Perfection

CryptoMize is dedicated to ensure a prominent progress to how the world perceives you. We help you to establish your perception to the extent of perfection with our devised strategic plan and techniques.

  • Reputation
  • Reputation Analysis
  • Damage Control
  • Review Optimization
  • Threat Analysis
  • Crisis Management
  • Reputation Monitoring
  • Sentiment
  • Digital Listening
  • Sentiment Analysis
  • Dialogue Control
  • Review Management
  • Trend Management
  • Search Management
  • Promotional Parlance

    CryptoMize introduces you to Promotional Parlance which not only promotes your cause but provides a personalized-edge. Our solutions are tailored in a strategic way that attracts the audience in a way that they are most receptive to.

  • Marketing
  • Buzz Marketing
  • Content Marketing
  • Local Business Marketing
  • Search Engine Marketing
  • Social Media Marketing
  • Black Hat Marketing
  • Outreach
  • Trend Analysis
  • Viral Maketing
  • Link Building
  • Website Traffic
  • SEO
  • Social Media Management
  • Public Relations

    CryptoMize formulates a proactive strategy to amplify your Media Outreach without compromising your reputation. CryptoMize assists you in communicating with your intended audience to achieve a global outreach.

  • Brand
  • Brand Analysis
  • Brand Monitoring
  • Brand Protection
  • Brand Augmentation
  • Competitor Analysis
  • Competition Management
  • Media
  • Content Creation
  • Media Monitoring
  • Local Visibility
  • Mass Communication
  • Influencer Marketing
  • Identity Management
  • Political Catalysis

    We bring efficiency to governance operations through intelligence and strategic thinking. By integrating digital approaches, CryptoMize seeks to improve Campaign Strategies and governance in general.

  • Politics
  • Demography Derivation
  • Constituency Profileration
  • Party Propulsion
  • Candidate Supremacy
  • Competition Management
  • Voter Enticement
  • Consultancy
  • Media Consultancy
  • Marketing Consultancy
  • Political Consultancy
  • IT Consultancy
  • Privacy Consultancy
  • Security Consultancy
  • Policing Phronesis

    CryptoMize, with the help of its special mix of Forensics and Consultancy, aims to handle all sorts of cyber crimes affecting your organisation and provide you with the best guidance for such situations.

  • Intelligence
  • Governance Support
  • Open Source Intelligence
  • Big Data Mining
  • Stretegic Intelligence
  • Operational Intelligence
  • Tactical Intelligence
  • Forensics
  • Mobile Forensics
  • Network Forensics
  • Data Recovery
  • Reverse Engineering
  • Cyber Forensics
  • Cyber Crime Investigation
  • Privacy Enforcement

    CryptoMize is driven by the belief that none of your valuable data should go unprotected. Our experts put concerted effort to preserve your privacy in order to minimize the impact of cybercrime.

  • Privacy
  • Encryption
  • Anonymity
  • Data Privacy
  • Infrastructure Privacy
  • Information Privacy
  • Communication Privacy
  • Security
  • Communication Security
  • Data Security
  • Security Training
  • Website Security
  • Penetration Testing
  • Vulnerability Assessment
  • What Makes Us Different?

    CryptoMize offers a full spectrum of elite services derived with preemptive analysis and strategic planning to our clients. We work efficiently with our proficient and proactive team by utilising extraordinary tools.

    Collaboration with Dignitaries

    We collaborate with highly influential and prominent personalities around the world. Being transcendental and visionary has its own benefits, our supremacy of being omnipresent empowers us to command, control and maneuver information from the internet.

    01

    Powerful Team

    CryptoMize is the combination of a powerful team that works on a supportive, transparent and encouraging platform. With spontaneity and dedication to the advancement of technology, we aspire to be better at what we do for people who trust us with their information and projects.

    02

    Triple-Proof Approach

    We execute a triple-proof approach from conducting thorough research, developing strong strategies, to guaranteeing information security. This proves beneficial for our clients to reach their desired goal.

    03

    Our Core Values

    Trust

    We seek to connect and build relationships with our clients.That is our core principle of our work ethic which we fully-abide to. We works on 3 principles: Respect, Honesty and Transparency.

    Reliability

    Commitment is an act, not a word. We believe in delivering and living up to your expectations. We have grown into a global agency only through our commitment to deliver and our reliability factor.

    Safety

    We are extremely paranoid about protecting our client’s safety of what we do, for whom and how we do it. We maintain absolute non disclosure and confidentiality to ensure that nothing sensitive goes out.

    Passion

    Our passion generates enthusiasm for what we do and how we do it. We inspire, find creative ways and nurture ideas with passion. We strategize based on audience attention.

    Innovation

    We believe in innovation, change and risk taking. With technology, we reinvent ourselves. Innovation is the reason how we are able to eliminate obstacles for cultivating growth.

    Excellence

    We ensure to maintain your eminence by reinventing ourselves with our core values that inspire excellence. We strive for quality in everything we do.

    OUR PRESENCE

    Our Journey So Far

    Our presence is all across the globe. Our impact can be seen in 03+ continents and 30+ countries, we know how to shape people's digital lives. We have a vast range of projects, from running political campaigns, shaping people's perceptions to enforcing privacy, we work with a futuristic approach and always look ahead of time. We never restrict ourselves to specific sectors rather make sure that our services are requisites for any and everybody in the world. With our elite clientele we show supremacy of work and build trustworthy relationships. We believe intelligence is the future and aim towards collective good and growth of all! 3+ Our Presence

    Successfully establishing ourselves globally in 3+ continents.

    70+ Our Services

    Giving us an edge over everyone else who is trying to solve similar problems.

    10+ Years of Experience

    Serving great value to our clients since the past decade.

    NEVERENDING OPPORTUNITIES FOR YOU

    Our Vision

    In the days of yore, gathering intelligence was a matter of sending out spies. Today the world has changed, and intelligence is as much about technology as it is about people. We are redefining what it means to truly protect you and your business. From network security, to cloud recovery, to data recovery, CryptoMize focuses on your technology’s vulnerabilities so you can avoid pitfalls and stay ahead.

  • We have a singular vision – to be the ultimate ‘go-to’ company for digital reputation management. Our approach is holistic, covering reputation management, social media management, and crisis management.
  • We uncover security flaws in your technology, identify new threats, and create proactive measures to protect you.
  • We provide innovative IT solutions to clients of all sizes. Our expertise is in all levels of the information technology stack, including network architecture and cybersecurity.
  • This advertiser has chosen not to accept applicants from your region.

    Information Security Specialist

    Bangalore, Karnataka ZEISS India

    Posted 12 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    Role Summary

    As a member of Global Security Operations Center, you will be responsible for driving the operational activities of SOC and lead complex investigations, conduct advanced threat analysis, and initiate incident responses activities across various business units. He/she is also responsible for process improvement activities, mentoring the team through training initiatives.



    Responsibilities

    • Managing shifts / team in the 24X7 SOC Environment.
    • Act as a first point of escalation for SOC team and assist with handing out work assignments to the team members.
    • Handling escalated security incidents/ issues, Responsible for deep dive analysis of escalated incidents, threat hunting.
    • Highlight potential security risks to SOC Manager and concerned SPOCs.
    • Maintain and optimize security tools and technologies used within the SOC.
    • Support Adhoc investigations on need basis.
    • Identify opportunities for continuous improvement in security operations.
    • Continuously improve threat detection capabilities, use cases and SOPs.
    • Support SOC manager for creating new operational guidelines, processes, and procedures.
    • Mentor and provide guidance to L1 analysts and serves as the POC for escalation issues that may arise.
    • Support rotational 16x5 operational shifts and on call when needed.

    Role Requirements

    Experience

    At least 7+ years prior experience as a SOC Lead/Lead Analyst in SOC environment with hands-on experience in performing security monitoring and response activities, incident handling, alert tracking, and/or cybersecurity case management.


    Process and Technology Skills

    • Proven experience in handling any of the EDR solution such as Defender or Crowdstrike.
    • Configure and optimize EDR settings to enhance security posture and ensure effective threat detection.
    • Analyze threat intelligence and security data to identify trends, patterns, and emerging threats
    • Capability to recognize different security situations and refine recurring security notifications by finetuning.
    • Respond to security incidents promptly, conducting thorough investigations and implementing remediation strategies to mitigate risks.
    • Strong background in incident analysis, evidence collection, documentation, communications, reporting and response.
    • Ability to manage cloud security controls, including firewalls, intrusion detection systems, and encryption protocols.
    • Lead and coordinate incident response efforts for cloud-related security incidents.
    • Collaborate with business and development teams to ensure security best practices are integrated into cloud architecture and deployments.
    • Proven experience with cloud platforms such as AWS, Azure, or Google Cloud.
    • Experience in mentoring and training junior analysts, Provide technical and functional support to L1 Team with analytical feedback.
    • Proven experience in any SIEM tools and/or log management solution
    • Must have good knowledge in firewalls, IDS/IPS, Anti-Virus, EDR, Proxy, DNS, email, AD, etc.
    • Good understanding of mainstream operating systems (Windows, Linux, etc) and security infrastructure
    • Good understanding of log parsing and event analysis (Ability to understand and interpret Windows, Linux OS, firewall, web proxy, DNS log events)
    • Expertise in creation of reports, dashboards, metrics for SOC operations
    • Knowledge in developing use cases for security monitoring, threat management and threat modelling.
    • Knowledge of MITRE or similar frameworks and procedures used by adversaries.
    • Advanced knowledge of malware operation and indicators
    • Good understanding of ITIL processes including Incident Management, Change Management and Problem Management
    • Advanced knowledge of networking fundamentals (OSI Layers, TCP/IP, protocols, and services.)
    • Sound knowledge in Information Security policies, procedures, standards, best practices, and guidelines
    • Involvement in threat intelligence and cybersecurity communities.
    • Deep understanding of Cyber Kill Chain and other applicable analytic models
    • Optionally, experience in at least one of the following: Python, PowerShell, VBscript.


    Other skills

    • Knowledge and understanding of project management methodologies, processes, and tools.
    • Strong analytical skills and ability to solve complex technical problems with high attention to detail and accuracy.
    • Strong team player and ability to work in a challenging and constantly changing environment.
    • Ability to multitask and work independently with minimal direction and maximum accountability.
    • Proficiency in verbal and written communication skills.
    • Proficiency in time management and presentation skills
    • Proficiency in decision-making and problem-solving skills


    Education and Certification

    • Bachelor’s degree in computer information systems or related field or equivalent demonstrated experience & knowledge.
    • Professional certification in Information security like Security+, CCSE, CCSP, AZ900 – AZ500 etc., TICSA, MCSE, CISSP, etc. would be advantageous
    This advertiser has chosen not to accept applicants from your region.
     

    Nearby Locations

    Other Jobs Near Me

    Industry

    1. request_quote Accounting
    2. work Administrative
    3. eco Agriculture Forestry
    4. smart_toy AI & Emerging Technologies
    5. school Apprenticeships & Trainee
    6. apartment Architecture
    7. palette Arts & Entertainment
    8. directions_car Automotive
    9. flight_takeoff Aviation
    10. account_balance Banking & Finance
    11. local_florist Beauty & Wellness
    12. restaurant Catering
    13. volunteer_activism Charity & Voluntary
    14. science Chemical Engineering
    15. child_friendly Childcare
    16. foundation Civil Engineering
    17. clean_hands Cleaning & Sanitation
    18. diversity_3 Community & Social Care
    19. construction Construction
    20. brush Creative & Digital
    21. currency_bitcoin Crypto & Blockchain
    22. support_agent Customer Service & Helpdesk
    23. medical_services Dental
    24. medical_services Driving & Transport
    25. medical_services E Commerce & Social Media
    26. school Education & Teaching
    27. electrical_services Electrical Engineering
    28. bolt Energy
    29. local_mall Fmcg
    30. gavel Government & Non Profit
    31. emoji_events Graduate
    32. health_and_safety Healthcare
    33. beach_access Hospitality & Tourism
    34. groups Human Resources
    35. precision_manufacturing Industrial Engineering
    36. security Information Security
    37. handyman Installation & Maintenance
    38. policy Insurance
    39. code IT & Software
    40. gavel Legal
    41. sports_soccer Leisure & Sports
    42. inventory_2 Logistics & Warehousing
    43. supervisor_account Management
    44. supervisor_account Management Consultancy
    45. supervisor_account Manufacturing & Production
    46. campaign Marketing
    47. build Mechanical Engineering
    48. perm_media Media & PR
    49. local_hospital Medical
    50. local_hospital Military & Public Safety
    51. local_hospital Mining
    52. medical_services Nursing
    53. local_gas_station Oil & Gas
    54. biotech Pharmaceutical
    55. checklist_rtl Project Management
    56. shopping_bag Purchasing
    57. home_work Real Estate
    58. person_search Recruitment Consultancy
    59. store Retail
    60. point_of_sale Sales
    61. science Scientific Research & Development
    62. wifi Telecoms
    63. psychology Therapy
    64. pets Veterinary
    View All Blockchain Security Specialist Jobs