3,128 Cyber Defense jobs in India

Cyber Defense

Mumbai, Maharashtra KPMG India

Posted today

Job Viewed

Tap Again To Close

Job Description

About KPMG in India

KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant with local laws, regulations, markets and competition. KPMG has offices across India in Ahmedabad, Bengaluru, Chandigarh, Chennai, Gurugram, Jaipur, Hyderabad, Jaipur, Kochi, Kolkata, Mumbai, Noida, Pune, Vadodara and Vijayawada.

KPMG entities in India offer services to national and international clients in India across sectors. We strive to provide rapid, performance-based, industry-focused and technology-enabled services, which reflect a shared knowledge of global and local industries and our experience of the Indian business environment.
-

Equal employment opportunity information

KPMG India has a policy of providing equal opportunity for all applicants and employees regardless of their color, caste, religion, age, sex/gender, national origin, citizenship, sexual orientation, gender identity or expression, disability or other legally protected status. KPMG India values diversity and we request you to submit the details below to support us in our endeavor for diversity. Providing the below information is voluntary and refusal to submit such information will not be prejudicial to you.
-
This advertiser has chosen not to accept applicants from your region.

Cyber Defense

Bengaluru, Karnataka KPMG India

Posted today

Job Viewed

Tap Again To Close

Job Description

About KPMG in India

KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant with local laws, regulations, markets and competition. KPMG has offices across India in Ahmedabad, Bengaluru, Chandigarh, Chennai, Gurugram, Jaipur, Hyderabad, Jaipur, Kochi, Kolkata, Mumbai, Noida, Pune, Vadodara and Vijayawada.

KPMG entities in India offer services to national and international clients in India across sectors. We strive to provide rapid, performance-based, industry-focused and technology-enabled services, which reflect a shared knowledge of global and local industries and our experience of the Indian business environment.
-

Equal employment opportunity information

KPMG India has a policy of providing equal opportunity for all applicants and employees regardless of their color, caste, religion, age, sex/gender, national origin, citizenship, sexual orientation, gender identity or expression, disability or other legally protected status. KPMG India values diversity and we request you to submit the details below to support us in our endeavor for diversity. Providing the below information is voluntary and refusal to submit such information will not be prejudicial to you.
-
This advertiser has chosen not to accept applicants from your region.

Consultant - Cyber Defense

Mumbai, Maharashtra KPMG India

Posted today

Job Viewed

Tap Again To Close

Job Description

About KPMG in India

KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant with local laws, regulations, markets and competition. KPMG has offices across India in Ahmedabad, Bengaluru, Chandigarh, Chennai, Gurugram, Jaipur, Hyderabad, Jaipur, Kochi, Kolkata, Mumbai, Noida, Pune, Vadodara and Vijayawada.

KPMG entities in India offer services to national and international clients in India across sectors. We strive to provide rapid, performance-based, industry-focused and technology-enabled services, which reflect a shared knowledge of global and local industries and our experience of the Indian business environment.

Preferred Certifications: CEH, ECSA, OSCP, CISSP, CCSK, OCSE, CCSP, AWS Security

Desired skill set:

1. Strong understanding of IT security standards and frameworks (OWASP, NIST, CIS)

2. Strong understanding of security risks in networks and application platforms

3. Strong understanding of network security, infrastructure security and application security

4. Strong understanding of OSI, TCP/IP model and network basics

5. Demonstrate technical penetration testing skills on IT infrastructure, web applications, mobile platforms and Red teaming

6. Strong technical skills: Information security, network security, Windows security, UNIX/Linux security, web and mobile application security, Cloud platforms

7. Broad knowledge of security technologies for applications, databases, networks, servers, and desktops

8. Solid technical skills in both information security architecture and penetration testing and ability to assess testing tools and deploy the right ones.

9. Scripting and programming experience is beneficial

10. Ability to perform manual penetration testing

11. Experience in Application Security Testing (Web, Mobile & ERP (SAP)), or related functions Vulnerability Assessment, Penetration testing

12. Perform penetration testing of various thick client software, web applications, and communications infrastructure to assist in hardening the cybersecurity posture against malicious actors

13. Conduct security research on the latest emerging advanced persistent threats (APTs), malware, and other security developments to assist in enterprise security efforts. Apply this security research into assessments.

14. Perform technical writing to communicate the preparation, testing, and recommendation phases for various security tests. Work with stakeholders to remediate system vulnerabilities.

15. Train team members and colleagues on the latest cybersecurity tactics, techniques, and procedures (TTPs) to grow the skill of the firm

16. Understanding of various security technologies including end point security, perimeter security, advanced threat protection, malware defense and security management

17. Expertise in the phases of penetration testing. Familiarity with Kali Linux distribution and the associated penetration testing tools suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag exercises considered a plus.

18. Good Understanding of OWASP top 10 and mitigation techniques

19. Experience in performing web application security assessments using hands on techniques for identifying SQL injections, XSS, Security Misconfiguration, CSRF, authentication/ authorization issues

20. Database testing: MySQL, Oracle, NoSQL

21. Understanding of cyber security management, cyber analytics, security intelligence platforms and threat intelligence frameworks

22. Writing business proposals and response to client RFP/ RFIs

23. Identifying business opportunities and lead delivery and program management for large cyber security programs

24. Delivery team and client relationship management

25. Experience on both commercial, open source tools and frameworks but not limited: Burpsuite, Metasploit, Core-Impact, Kali-Linux, AppScan, WebInspect, SSLScan, Soap UI Pro, SonarQube, Qualys, Nikto, Nessus, nmap, sqlmap, OWASP ZAP .


Equal employment opportunity information

KPMG India has a policy of providing equal opportunity for all applicants and employees regardless of their color, caste, religion, age, sex/gender, national origin, citizenship, sexual orientation, gender identity or expression, disability or other legally protected status. KPMG India values diversity and we request you to submit the details below to support us in our endeavor for diversity. Providing the below information is voluntary and refusal to submit such information will not be prejudicial to you.
BE/ BTech
This advertiser has chosen not to accept applicants from your region.

Analyst - Cyber Defense

Mumbai, Maharashtra KPMG India

Posted today

Job Viewed

Tap Again To Close

Job Description

About KPMG in India

KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant with local laws, regulations, markets and competition. KPMG has offices across India in Ahmedabad, Bengaluru, Chandigarh, Chennai, Gurugram, Hyderabad, Jaipur, Kochi, Kolkata, Mumbai, Noida, Pune, Vadodara and Vijayawada.

KPMG entities in India offer services to national and international clients in India across sectors. We strive to provide rapid, performance-based, industry-focused and technology-enabled services, which reflect a shared knowledge of global and local industries and our experience of the Indian business environment.Equal employment opportunity information

KPMG India has a policy of providing equal opportunity for all applicants and employees regardless of their color, caste, religion, age, sex/gender, national origin, citizenship, sexual orientation, gender identity or expression, disability or other legally protected status. KPMG India values diversity and we request you to submit the details below to support us in our endeavor for diversity. Providing the below information is voluntary and refusal to submit such information will not be prejudicial to you.
  • Monthly VAPT planning, scan scheduling, scanning and reporting.
  • Review of VAPT report and provided necessary comments
  • Conduct vulnerability Compliance check/Revalidation
  • Track vulnerabilities in all technologies on a continuous basis in view of the Cyber Security Advisories.
  • VA reporting, remediation support, tracking and dashboard reporting.
  • Monitoring the progress of scanning and troubleshooting the failed scans in coordination with PIM/ server admin/app admin teams.
  • Coordination with application and infra teams to provide continuous inputs. 8. Timely communicate to hardware and software teams the MIS reporting of vulnerabilities along with recommendation
  • False positive review and exception management.
  • Adhoc request handling, management and Vulnerability Management reporting.
  • Availability of resources, as per the VA and patching schedule, for off office hours as well as weekends as per program requirement.
  • Periodical review and updation of details of servers/devices
  • Maintain an up-to date plan for deploying and managing patch management
  • Implement patches as per approved deployment strategy
  • Regularly patch the infrastructure and software in order to be complaint to the Client's policy and guidelines, and advisories from regulatory, information security and statutory authorities
  • Notify sufficiently in advance about patching (including emergency patching) and seek approval from the Client, such that there is no disruption in services to the Client and its customers
  • The vulnerabilities reported/ identified during the project/ application go-live to be remediated as per the Information Security policy of the Client
  • Carry out patch governance, ongoing deployment tracking and compliance thereof
  • Carry out VAPT remediation including configuration and hardening level changes, security updates and patching
  • Conduct continuous review and collection of patches released and vulnerabilities identified including zero day vulnerabilities, and its applicability with respect to the Asset Inventory
  • Review existing patch management process and provide recommendations
  • Prepare Patch plan for OS/DB Server/End points, its execution and reporting, attend to hotfix
  • Identification of Top 10 critical & high patches for OS and application software 11
  • Plan, prioritize (on the basis of criticality of application, tier rating etc )schedule and carryout continuous patching/ support for Windows, Linux and AIX platform, Database, Middleware and all other various software components and Development tools where vulnerabilities are reported during VAPT scanning in close co-ordination and follow-up with respective Application, Infra, Network and Security teams
  • Help in implementing workaround provided by respective OEM for the reported vulnerability
  • Coordination for downtime to complete the schedule patching
  • Take necessary approval from Client for shutdown, if required, for patch or update implementation
  • Schedule shutdown of production system and inform respective application users
  • Implement patches as per approved deployment strategy
  • Testing of patches before rollout and provide observations
  • Rollback efforts in case of issues
  • A practical and up-to date roll back plan has to be adopted in case of failures
  • Follow up and co-ordinate with OEM/3rd party support vendors for patch deployment
  • Coordination with OEM/ Vendor in case of any dependency
  • Coordination and patching of app related vulnerabilities with App Support
  • The technical resources should be competent to Handle/ Integrate/Implement/Test patches within Client's stipulated time 22
  • Catalogue updation for different flavors of operating systems like Windows/RHEL/AIX/SOLARIS and all other supporting software's
  • Assist, Develop, Manage and Monitor suitable Policies, Procedures and deployment strategy for Patch Management
  • Raise Change Management for deployment of patches or updates
  • Capability to identify the devices where patches are applied but not yet activated (pending restart) And carrying out other related activities
  • Prepare and maintain Standard Operating Procedure (SOP) document pertaining to the remidiation services
  • This advertiser has chosen not to accept applicants from your region.

    Executive - Cyber Defense

    Mumbai, Maharashtra KPMG India

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    About KPMG in India

    KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant with local laws, regulations, markets and competition. KPMG has offices across India in Ahmedabad, Bengaluru, Chandigarh, Chennai, Gurugram, Hyderabad, Jaipur, Kochi, Kolkata, Mumbai, Noida, Pune, Vadodara and Vijayawada.

    KPMG entities in India offer services to national and international clients in India across sectors. We strive to provide rapid, performance-based, industry-focused and technology-enabled services, which reflect a shared knowledge of global and local industries and our experience of the Indian business environment.Equal employment opportunity information

    KPMG India has a policy of providing equal opportunity for all applicants and employees regardless of their color, caste, religion, age, sex/gender, national origin, citizenship, sexual orientation, gender identity or expression, disability or other legally protected status. KPMG India values diversity and we request you to submit the details below to support us in our endeavor for diversity. Providing the below information is voluntary and refusal to submit such information will not be prejudicial to you.
  • Strong understanding of IT security standards and frameworks (OWASP, NIST, CIS)
  • Strong understanding of security risks in networks and application platforms
  • Strong understanding of network security, infrastructure security and application security
  • Strong understanding of OSI, TCP/IP model and network basics
  • Demonstrate technical penetration testing skills on IT infrastructure, web applications, mobile platforms and Red teaming
  • Strong technical skills: Information security, network security, Windows security, UNIX/Linux security, web and mobile application security, Cloud platforms
  • Broad knowledge of security technologies for applications, databases, networks, servers, and desktops
  • Solid technical skills in both information security architecture and penetration testing and ability to assess testing tools and deploy the right ones.
  • Scripting and programming experience is beneficial
  • Ability to perform manual penetration testing
  • Experience in Application Security Testing (Web, Mobile & ERP (SAP)), or related functions Vulnerability Assessment, Penetration testing
  • Perform penetration testing of various thick client software, web applications, and communications infrastructure to assist in hardening the cybersecurity posture against malicious actors
  • Conduct security research on the latest emerging advanced persistent threats (APTs), malware, and other security developments to assist in enterprise security efforts. Apply this security research into assessments.
  • Perform technical writing to communicate the preparation, testing, and recommendation phases for various security tests. Work with stakeholders to remediate system vulnerabilities.
  • Train team members and colleagues on the latest cybersecurity tactics, techniques, and procedures (TTPs) to grow the skill of the firm
  • Understanding of various security technologies including end point security, perimeter security, advanced threat protection, malware defense and security management
  • Expertise in the phases of penetration testing. Familiarity with Kali Linux distribution and the associated penetration testing tools suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag exercises considered a plus.
  • Good Understanding of OWASP top 10 and mitigation techniques
  • Experience in performing web application security assessments using hands on techniques for identifying SQL injections, XSS, Security Misconfiguration, CSRF, authentication/ authorization issues
  • Database testing: MySQL, Oracle, NoSQL
  • Understanding of cyber security management, cyber analytics, security intelligence platforms and threat intelligence frameworks
  • Writing business proposals and response to client RFP/ RFIs
  • Identifying business opportunities and lead delivery and program management for large cyber security programs
  • Delivery team and client relationship management
  • Experience on both commercial, open source tools and frameworks but not limited: Burpsuite, Metasploit, Core-Impact, Kali-Linux, AppScan, WebInspect, SSLScan, Soap UI Pro, SonarQube, Qualys, Nikto, Nessus, nmap, sqlmap, OWASP ZAP .
  • This advertiser has chosen not to accept applicants from your region.

    Executive - Cyber Defense

    Gurugram, Uttar Pradesh KPMG India

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    About KPMG in India

    KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant with local laws, regulations, markets and competition. KPMG has offices across India in Ahmedabad, Bengaluru, Chandigarh, Chennai, Gurugram, Jaipur, Hyderabad, Jaipur, Kochi, Kolkata, Mumbai, Noida, Pune, Vadodara and Vijayawada.

    KPMG entities in India offer services to national and international clients in India across sectors. We strive to provide rapid, performance-based, industry-focused and technology-enabled services, which reflect a shared knowledge of global and local industries and our experience of the Indian business environment.

    Job Summary:

    We are seeking a skilled and motivated Associate Consultant specializing in Vulnerability Assessment and Penetration Testing (VAPT). The ideal candidate will have a strong technical background in cybersecurity, hands-on experience with VAPT tools and methodologies, and a passion for identifying and mitigating security vulnerabilities.

    Key Responsibilities:

    • Conduct comprehensive vulnerability assessments and penetration testing on web applications, mobile applications, networks, and systems.

    • Identify, analyze, and report security vulnerabilities, providing actionable recommendations for remediation.

    • Perform manual and automated testing to uncover security flaws and weaknesses.

    • Develop and maintain detailed documentation, including test plans, reports, and remediation guidelines.

    • Stay updated on the latest security trends, vulnerabilities, and attack methodologies.

    • Assist in the development and implementation of security policies, procedures, and guidelines.

    • Provide technical support and guidance to clients on security-related matters.

    Technical Qualifications:

    • Proficiency in VAPT tools such as Burp Suite, Nessus, Metasploit, Nmap, Wireshark, and OWASP ZAP.

    • Strong understanding of OWASP Top 10 vulnerabilities and their mitigation strategies.

    • Knowledge of secure coding practices and application security testing.

    • Familiarity with network security concepts, including firewalls, IDS/IPS, and VPNs.

    • Experience with cloud security assessments (AWS, Azure, or GCP) is a plus.

    Professional Qualifications:

    • , , , Bachelor's degree in Computer Science, Information Technology, or a related field.

    • Relevant certifications such as CEH, OSCP, or equivalent are highly desirable.

    • Strong analytical and problem-solving skills.

    • Excellent communication and interpersonal skills to interact with clients and team members effectively.

    • Ability to work independently and manage multiple projects simultaneously


    Equal employment opportunity information

    KPMG India has a policy of providing equal opportunity for all applicants and employees regardless of their color, caste, religion, age, sex/gender, national origin, citizenship, sexual orientation, gender identity or expression, disability or other legally protected status. KPMG India values diversity and we request you to submit the details below to support us in our endeavor for diversity. Providing the below information is voluntary and refusal to submit such information will not be prejudicial to you.
    , , , Bachelor's degree in Computer Science, Information Technology, or a related field.
    This advertiser has chosen not to accept applicants from your region.

    Analyst - Cyber Defense

    Pune, Maharashtra KPMG India

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    About KPMG in India

    KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant with local laws, regulations, markets and competition. KPMG has offices across India in Ahmedabad, Bengaluru, Chandigarh, Chennai, Gurugram, Jaipur, Hyderabad, Jaipur, Kochi, Kolkata, Mumbai, Noida, Pune, Vadodara and Vijayawada.

    KPMG entities in India offer services to national and international clients in India across sectors. We strive to provide rapid, performance-based, industry-focused and technology-enabled services, which reflect a shared knowledge of global and local industries and our experience of the Indian business environment.

    Preferred Certifications: CEH, ECSA, OSCP, CISSP, CCSK, OCSE, CCSP, AWS Security

    • Desired skill set:

    1. Strong understanding of IT security standards and frameworks (OWASP, NIST, CIS)

    2. Strong understanding of security risks in networks and application platforms

    3. Strong understanding of network security, infrastructure security and application security

    4. Strong understanding of OSI, TCP/IP model and network basics

    5. Demonstrate technical penetration testing skills on IT infrastructure, web applications, mobile platforms and Red teaming

    6. Strong technical skills: Information security, network security, Windows security, UNIX/Linux security, web and mobile application security, Cloud platforms

    7. Broad knowledge of security technologies for applications, databases, networks, servers, and desktops

    8. Solid technical skills in both information security architecture and penetration testing and ability to assess testing tools and deploy the right ones.

    9. Scripting and programming experience is beneficial

    10. Ability to perform manual penetration testing

    11. Experience in Application Security Testing (Web, Mobile & ERP (SAP)), or related functions Vulnerability Assessment, Penetration testing

    12. Perform penetration testing of various thick client software, web applications, and communications infrastructure to assist in hardening the cybersecurity posture against malicious actors

    13. Conduct security research on the latest emerging advanced persistent threats (APTs), malware, and other security developments to assist in enterprise security efforts. Apply this security research into assessments.

    14. Perform technical writing to communicate the preparation, testing, and recommendation phases for various security tests. Work with stakeholders to remediate system vulnerabilities.

    15. Train team members and colleagues on the latest cybersecurity tactics, techniques, and procedures (TTPs) to grow the skill of the firm

    16. Understanding of various security technologies including end point security, perimeter security, advanced threat protection, malware defense and security management

    17. Expertise in the phases of penetration testing. Familiarity with Kali Linux distribution and the associated penetration testing tools suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag exercises considered a plus.

    18. Good Understanding of OWASP top 10 and mitigation techniques

    19. Experience in performing web application security assessments using hands on techniques for identifying SQL injections, XSS, Security Misconfiguration, CSRF, authentication/ authorization issues

    20. Database testing: MySQL, Oracle, NoSQL

    21. Understanding of cyber security management, cyber analytics, security intelligence platforms and threat intelligence frameworks

    22. Writing business proposals and response to client RFP/ RFIs

    23. Identifying business opportunities and lead delivery and program management for large cyber security programs

    24. Delivery team and client relationship management

    25. Experience on both commercial, open source tools and frameworks but not limited: Burpsuite, Metasploit, Core-Impact, Kali-Linux, AppScan, WebInspect, SSLScan, Soap UI Pro, SonarQube, Qualys, Nikto, Nessus, nmap, sqlmap, OWASP ZAP .


    Equal employment opportunity information

    KPMG India has a policy of providing equal opportunity for all applicants and employees regardless of their color, caste, religion, age, sex/gender, national origin, citizenship, sexual orientation, gender identity or expression, disability or other legally protected status. KPMG India values diversity and we request you to submit the details below to support us in our endeavor for diversity. Providing the below information is voluntary and refusal to submit such information will not be prejudicial to you.
    /
    This advertiser has chosen not to accept applicants from your region.
    Be The First To Know

    About the latest Cyber defense Jobs in India !

    Cyber Defense & IR

    Gurugram, Uttar Pradesh Talent Worx

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    >> JOB DESCRIPTION    

    Experience: 3+ years with at-least 2-3 years in client facing advisory consulting role and managing a medium sized team 

    Preferred Certifications: CEH, ECSA, OSCP, CISSP, CCSK, OCSE, CCSP, AWS Security

    • Desired skill set:
    1. Strong understanding of IT security standards and frameworks (OWASP, NIST, CIS)
    2. Strong understanding of security risks in networks and application platforms
    3. Strong understanding of network security, infrastructure security and application security
    4. Strong understanding of OSI, TCP/IP model and network basics
    5. Demonstrate technical penetration testing skills on IT infrastructure, web applications, mobile platforms and Red teaming
    6. Strong technical skills: Information security, network security, Windows security, UNIX/Linux security, web and mobile application security, Cloud platforms
    7. Broad knowledge of security technologies for applications, databases, networks, servers, and desktops 
    8. Solid technical skills in both information security architecture and penetration testing and ability to assess testing tools and deploy the right ones.
    9. Scripting and programming experience is beneficial
    10. Ability to perform manual penetration testing
    11. Experience in Application Security Testing (Web, Mobile & ERP (SAP)), or related functions Vulnerability Assessment, Penetration testing
    12. Perform penetration testing of various thick client software, web applications, and communications infrastructure to assist in hardening the cybersecurity posture against malicious actors
    13. Conduct security research on the latest emerging advanced persistent threats (APTs), malware, and other security developments to assist in enterprise security efforts. Apply this security research into assessments.
    14. Perform technical writing to communicate the preparation, testing, and recommendation phases for various security tests. Work with stakeholders to remediate system vulnerabilities.
    15. Train team members and colleagues on the latest cybersecurity tactics, techniques, and procedures (TTPs) to grow the skill of the firm
    16. Understanding of various security technologies including end point security, perimeter security, advanced threat protection, malware defense and security management
    17. Expertise in the phases of penetration testing. Familiarity with Kali Linux distribution and the associated penetration testing tools suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag exercises considered a plus.
    18. Good Understanding of OWASP top 10 and mitigation techniques
    19. Experience in performing web application security assessments using hands on techniques for identifying SQL injections, XSS, Security Misconfiguration, CSRF, authentication/ authorization issues
    20. Database testing: MySQL, Oracle, NoSQL 
    21. Understanding of cyber security management, cyber analytics, security intelligence platforms and threat intelligence frameworks
    22. Writing business proposals and response to client RFP/ RFIs
    23. Identifying business opportunities and lead delivery and program management for large cyber security programs
    24. Delivery team and client relationship management
    25. Experience on both commercial, open source tools and frameworks but not limited: Burpsuite, Metasploit, Core-Impact,  Kali-Linux, AppScan, WebInspect, SSLScan, Soap UI Pro, SonarQube, Qualys, Nikto, Nessus, nmap, sqlmap, OWASP ZAP .

    Benefits

    Work with one of the Big 4's in India

    Healthy work Environment

    Work-Life Balance

    This advertiser has chosen not to accept applicants from your region.

    Lead Analyst, Cyber Defense

    Bengaluru, Karnataka News Corp

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Job Description

    :

    Job Title: Lead Analyst, Cyber Defense

    Job Location: Bengaluru, Karnataka

    Work Arrangement: Hybrid (3 days per week in office)

    Shifts: Rotational shifts

    About News Corp

    News Corp is a global diversified media and information services company focused on creating and distributing authoritative and engaging content to consumers and businesses throughout the world. The company comprises global businesses across various media, including news and information services, book publishing, digital real estate services, cable network programming in Australia, and pay-TV distribution in Australia.

    The Role:

    We are looking for a Lead Cyber Defense analyst responsible for monitoring and working on active alerts on various security tools (SIEM/XSOAR). The individual in this role is expected to have meticulous attention to detail, outstanding problem-solving skills, work comfortably under pressure, and deliver on tight deadlines.

    This position demands someone willing to use a network of sensors, security tools, and monitoring equipment to proactively identify, evaluate, and remediate potential cybersecurity threats. Based on an understanding of “normal” network activity, SOC analysts use tools and processes to detect anomalous activity, providing 24/7/365 detection and response capabilities.

    The person can multitask, work independently, and work collaboratively with teams, some of which may be geographically distributed.

    Key Responsibilities

    Security Operations Centre (SOC) Analysis and Monitoring:

    Lead the day-to-day operations of the SOC, overseeing security incident monitoring, and detection, analysis, and response activities.

    Develop and maintain SOC playbooks, standard operating procedures (SOPs), and response plans to ensure efficient and effective incident response.

    Investigate security incidents and alerts, perform root cause analysis, and provide recommendations to prevent future occurrences.

    Incident Response and Threat Intelligence:

    Stay up to date with the latest security threats, vulnerabilities, and attack vectors related to various tools and platforms.

    Monitor threat intelligence sources and collaborate with external partners to proactively identify and mitigate potential security risks.

    Lead incident response efforts during security breaches or cyber incidents, coordinating with internal teams and external stakeholders to contain and resolve incidents in a timely manner.

    Conduct post-incident reviews and lessons learned sessions to improve incident response processes and enhance overall security posture.

    Security Operations Center: Managing Operations

    Manage ticket queues including escalation of outstanding tickets, tickets requiring updates, and escalation of open tickets where necessary

    Ensure quality standards are being met by doing ticket audits and reviewing and completing shift turnover logs

    Develop and mentor staff by providing opportunity of growth through delegation, training and assignment of various projects.

    Manage PTO requests and other schedule issues that impact SOC operations

    Point of escalation for operations/security issues

    Identify opportunities for continuous improvement in security operations

    Actively seek self-improvement through continuous learning and pursuing advancement to a SOC Manager

    Required Skills and Qualifications

    7+ years of information security experience

    Advanced knowledge of Cyber Defense, Security Operations Center (SOC) operations, incident response, and security monitoring practices.

    Prioritize and escalate any issues that could put business objectives, results, or processes at risk.

    In-depth knowledge and experience with current cyber threats and landscape to enterprise environments

    Ability to architect and drive implementation of large-scale cross-company initiatives

    Previous experience with the following tools is required: Splunk, EDR Solutions, Atlassian, ServiceNow, GitHub, Okta, and Microsoft Security products

    Familiarity with incident response frameworks and methodologies, such as the NIST Incident Response Framework or the SANS Incident Response Process, to guide efficient and effective incident handling.

    Strong knowledge of network protocols, network traffic analysis, and network security principles to detect and respond to network-based threats.

    Windows, Linux, and UNIX operating systems

    Communication skills, both verbal and written

    Desired Qualifications:

    Experience with incident response in cloud platforms (AWS, GCP, etc)

    Incident Response specific or other relevant certifications (ex. CISSP, GCFA, GCIH, GNFA, GREM, CEH, etc.)

    Excellent verbal, written, and interpersonal communication skills

    Strong analytical skills with high attention to detail and accuracy

    Able to handle confidential material in a professional manner

    Able to transform complex data into meaningful and prioritised action

    This job is posted with NTS Technology Services Pvt. Ltd.

    Job Category:

    News Corp is a global, diversified media and information services company focused on creating and distributing authoritative and engaging content to consumers throughout the world. The company comprises businesses across a range of media, including: news and information services, book publishing, digital real estate services, cable network programming in Australia, and pay-tv distribution in Australia.

    Headquartered in New York, the activities of News Corp are conducted primarily in the United States, Australia, and the United Kingdom.

    This advertiser has chosen not to accept applicants from your region.

    Cyber Defense - Cyber Triage and Forensic Analyst

    Thiruvananthapuram, Kerala EY

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    The opportunity

    The Senior Security Analyst in Cyber Defense CTF (Cyber Triage and Forensics) plays a

    pivotal role in enhancing EY’s security posture by vigilantly monitoring, assessing, and managing incidents effectively. In collaboration with the team and leadership, to ensure strong security oversight and contribute to joint security monitoring and incident response initiatives.
    Key duties include triage, detailed investigations, clear communication, and comprehensive reporting, all contributing to the integrity and resilience of the EY’s cyber defenses.

    Essential Functions of the Job :

  • You will work collaboratively to detect and respond to information security incidents, develop, maintain, and follow procedures for security event alerting, and participate in security investigations.
  • Engage in proactive threat hunting and provide expert security assessments, utilizing EDR, SIEM, and other tools to understand and counteract the cybercrime landscape
  • Communicate with IT stakeholders during incident response activities, ensuring effective containment, remediation, and accurate identification of compromise indicators
  • Report on incident metrics, analyse findings, and develop reports to ensure comprehensive resolution and understanding of security events
  • Act as an escalation point for incident response, shift lead, mentor junior team members, and contribute to team skill enhancement
  • Analyse security events, provide feedback on security controls, and drive process improvements to strengthen the organization's security posture
  • Maintain and improve security incident processes, protocols, and standard operating procedures to reflect best practices in security incident response
  • Skills and attributes for success

  • Proficient in Cyber investigation including evidence management in line with best practices and using advanced tools for threat detection and incident management including advanced querying with KQL
  • Proficient in analyzing varied data sets, identifying malware, and conducting comprehensive security event analysis from network traffic attributes and host-based attributes to detect information security incidents and latent threats.
  • Proficient in conducting detailed forensic investigations across various operating systems, with a keen eye for obfuscation and the ability to clearly communicate findings
  • In-depth understanding of Active Directory security, with strong scripting abilities to automate response measures and improve operational effectiveness
  • To qualify for the role, you must have

  • Undergraduate or Postgraduate Degree in Computer Science, Engineering, or a related field (MCA/MTech/BTech/BCA/BSc CS or BSc IT)
  • At least 7 years of overall experience with a minimum of 5 years specialized in incident response, computer forensics, and Security Operations.
  • Proficiency in operating within a Security Monitoring/Security Operations Center (SOC) environment, including experience with CSIRT and CERT operations
  • Demonstrated experience in investigating security events, threats, and vulnerabilities
  • Strong understanding of electronic investigation and forensic methodologies, including log correlation, electronic data handling, investigative processes, and malware analysis
  • In-depth knowledge of Windows and Unix/Linux operating systems, and experience with EDR solutions for threat detection and response
  • Ideally, you’ll also

  • Desired certifications such as SSCP, CEH, GCIH, GCFA, GCIA, GSEC, GIAC, Security+.
  • Experience with security incident response in cloud environments, including Azure.
  • Knowledge of legal considerations in electronic discovery and analysis
  • Proficiency in scripting or programming (, Shell scripting, PowerShell, C, C#, Python)
  • Solid understanding of security best practices for network architecture and server configuration
  • What we look for

  • Demonstrates integrity in a professional environment
  • Strong ethical behavior
  • Ability to work independently
  • Possesses a global mindset for working with diverse cultures and backgrounds
  • Knowledgeable in industry-standard security incident response processes, procedures, and lifecycle
  • Positive attitude and Excellent teaming skills
  • Excellent social, communication, and writing skills
  • Good presentation skills
  • Excellent investigative, analytical, and problem-solving skills
  • Supervising Responsibilities:

  • Coordinate escalations and collaborate with internal technology teams to ensure timely resolution of issues
  • Provide mentoring and training to other team members as required, supporting their development and ensuring consistent team performance
  • Other Requirements:

  • Should be willing to work in shifts
  • What we offer

    As part of this role, you will work in a highly coordinated, globally diverse team with the opportunity and tools to grow, develop and drive your career forward. Here, you can combine global opportunity with flexible working. The EY benefits package goes above and beyond too, focusing on your physical, emotional, financial and social well-being. Your recruiter can talk to you about the benefits available in your country. Here’s a snapshot of what we offer:

  • Continuous learning: You will develop the mindset and skills to navigate whatever comes next.
  • Success as defined by you: We will provide the tools and flexibility, so you can make a significant impact, your way.
  • Transformative leadership: We will give you the insights, coaching and confidence to be the leader the world needs.
  • Diverse and inclusive culture: You will be accepted for who you are and empowered to use your voice to help others find theirs.
  • We ensure that individuals with disabilities are provided reasonable accommodations to participate in the job application or interview process, to perform essential job functions and to receive other benefits and privileges of employment. Please contact us to request accommodation.

    EY is committed to being an inclusive employer, and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance.

    This advertiser has chosen not to accept applicants from your region.
     

    Nearby Locations

    Other Jobs Near Me

    Industry

    1. request_quote Accounting
    2. work Administrative
    3. eco Agriculture Forestry
    4. smart_toy AI & Emerging Technologies
    5. school Apprenticeships & Trainee
    6. apartment Architecture
    7. palette Arts & Entertainment
    8. directions_car Automotive
    9. flight_takeoff Aviation
    10. account_balance Banking & Finance
    11. local_florist Beauty & Wellness
    12. restaurant Catering
    13. volunteer_activism Charity & Voluntary
    14. science Chemical Engineering
    15. child_friendly Childcare
    16. foundation Civil Engineering
    17. clean_hands Cleaning & Sanitation
    18. diversity_3 Community & Social Care
    19. construction Construction
    20. brush Creative & Digital
    21. currency_bitcoin Crypto & Blockchain
    22. support_agent Customer Service & Helpdesk
    23. medical_services Dental
    24. medical_services Driving & Transport
    25. medical_services E Commerce & Social Media
    26. school Education & Teaching
    27. electrical_services Electrical Engineering
    28. bolt Energy
    29. local_mall Fmcg
    30. gavel Government & Non Profit
    31. emoji_events Graduate
    32. health_and_safety Healthcare
    33. beach_access Hospitality & Tourism
    34. groups Human Resources
    35. precision_manufacturing Industrial Engineering
    36. security Information Security
    37. handyman Installation & Maintenance
    38. policy Insurance
    39. code IT & Software
    40. gavel Legal
    41. sports_soccer Leisure & Sports
    42. inventory_2 Logistics & Warehousing
    43. supervisor_account Management
    44. supervisor_account Management Consultancy
    45. supervisor_account Manufacturing & Production
    46. campaign Marketing
    47. build Mechanical Engineering
    48. perm_media Media & PR
    49. local_hospital Medical
    50. local_hospital Military & Public Safety
    51. local_hospital Mining
    52. medical_services Nursing
    53. local_gas_station Oil & Gas
    54. biotech Pharmaceutical
    55. checklist_rtl Project Management
    56. shopping_bag Purchasing
    57. home_work Real Estate
    58. person_search Recruitment Consultancy
    59. store Retail
    60. point_of_sale Sales
    61. science Scientific Research & Development
    62. wifi Telecoms
    63. psychology Therapy
    64. pets Veterinary
    View All Cyber Defense Jobs