142 Cybersecurity Analysts jobs in Chennai
Information Security Analyst
Posted 2 days ago
Job Viewed
Job Description
About the company
Lexitas is a high growth company. The Company is built on a belief that having strong personal relationships with our clients, and providing reliable, accurate and professional services, is the driving force of our success.
Lexitas offers an array of services including local and national court reporting, medical record retrieval, process service, registered agent services and legal talent outsourcing. Our reach is truly national as well as international.
Lexitas is a MNC Company that has set up a subsidiary in Chennai, India – Lexitas India Pvt. Ltd. This Indian company will be the Lexitas Global Capability Center, helping build a world class IT development team, and over time serve as a Shared Services hub for several of the corporate functions.
For More Information -
This is a Full-Time Job located in Chennai, India.
Summary:
This position supports information security, privacy, risk and compliance programs and activities under the direction of the VP of Information Security or designated Information Security Manager. The position assists in developing and maintaining a comprehensive security program for Lexitas. Providing functional and technical support is important to maintain security posture and protection of electronically and physically stored information assets across our systems. Tasks include supporting design, implementation, configuration, documentation, and maintenance to mitigate risk to the business and its computing resources and assets, as well as collaborating with applicable providers, managing and monitoring tools, and facilitating applicable processes and procedures.
Key Roles and Responsibilities :
- Supports IT security, privacy, risk and compliance systems, processes, supporting activities, with the ability to lead activities and programs.
- Monitors computer networks and associated tools and provider services for security, privacy, risk and compliance issues
- Supports the project management, tracking, and documentation of Information, Privacy, Risk, and Compliance programs, processes, and activities
- Investigate security breaches and cybersecurity incidents.
- Documents security breaches and assesses impact.
- Performs and/or supports security tests, risk assessments, and audits to uncover network, application, and process vulnerabilities and provides guidance and training to ensure violations do not persist.
- Tracks and facilitates the mitigation of vulnerabilities to maintain a high security standard.
- Supports best practices for IT security, privacy and compliance.
- Performs and supports 3rd party vulnerability management and penetration testing.
- Research security enhancements and makes recommendations to management.
- Stays current on information technology trends and security standards.
- Prepares reports that detail security, privacy, and compliance risk assessment findings.
- Supports Security Operations Center functions including monitoring and supporting Incident Response activities.
- Supports all related IT Security, Privacy, Risk and Compliance policies and provides guidance to the business.
- Other Information Security, Privacy, Risk, and Compliance duties as required.
Skills and Abilities:
- Experience with computer network and application vulnerability management and penetration testing, and techniques.
- Solid understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts
- Ability to identify and mitigate network and application vulnerabilities.
- Good understanding of patch management
- Proficient with various OS
- Excellent written and verbal communication skills
- Knowledge of firewalls, antivirus, and intrusion detection system concepts
- Ability to support and document areas of Information Security, Privacy, Risk, and compliance processes and programs.
- Ability to support incident response process.
- Experience directing 3rd Party providers in the areas of Information Security, Privacy, Risk and Compliance
- Support information security controls including physical and data security protecting the confidentiality, integrity and availability of information systems data.
- Preferred KSA’s:
- Strong working knowledge and experience with primary Information Security, Privacy, Risk, and compliance standards and frameworks such as NIST, SOC 2, HIPAA, PCI DSS, GDPR, etc.
- Experience administering information security software and controls.
- Experience supporting process for managing network and application security.
- Network and system administration experience a plus.
- Good understanding of Standard Information Security Baseline Frameworks, Business Continuity, and Disaster Recovery protocols and best practices.
- Exposure to ITIL (Incident/Change Management) – ITIL v3F preferred.
- Learns and monitors the business processes for the areas of primary support responsibility.
- Support annual Security Baseline Audits and execution of recommendations.
- As part of the technology team, performs “Help Desk” day-to-day tasks in support of Information Security, Privacy, Risk, and Compliance.
Education and Experience:
- Bachelor’s degree in computer science or related field strongly preferred.
- IAT Level-2 technical certification strongly preferred (Comp TIA Security+ or CISSP) or ability to obtain within first 90 days of hire.
- 5+ years’ experience performing role of Information Security Analyst or SOC
- Demonstrated experience in responding to, managing, and resolving security incidents.
- Experience with LAN/WAN networking concepts, IP addressing and routing concepts, Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
- Experience with Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
- Experience working with Security Information and Even Management (SIEM) system is a plus.
Information Security Analyst
Posted today
Job Viewed
Job Description
- An Information Security Analyst monitors and protects an organization's computer networks and systems from cyber threats and data breaches. Key responsibilities include implementing security software like firewalls and encryption, conducting vulnerability assessments and penetration tests, responding to and mitigating security incidents, developing security policies and best practices, creating disaster recovery plans, and educating employees on security awareness. They stay current with emerging threats and often collaborate with IT staff and management to enhance overall security posture.
- Key Responsibilities Monitoring and Detection: Continuously monitor networks for suspicious activity, potential breaches, and viruses.
- Vulnerability Assessment: Identify weaknesses in systems and networks through testing and analysis to prevent unauthorized access. .
- Incident Response: Investigate, respond to, and mitigate security incidents and cyberattacks to minimize damage.
- Implementation of Security Measures: Install and maintain security safeguards, including firewalls, encryption software, and antivirus programs.
- Policy Development: Create and enforce security policies, standards, and best practices for the organization. .Reporting: Prepare detailed reports on attempted attacks, security breaches, and security metrics for management and stakeholders.
- Disaster Recovery: Develop and help implement disaster recovery plans to ensure continued IT operations during emergencies.
- Employee Education: Train employees on cybersecurity awareness, proper security procedures, and best practices to prevent attacks.
- Research and Awareness: Stay updated on the latest cybersecurity trends, technologies, and emerging threats by consulting external sources and industry publications.
- Essential Skills
- Technical Proficiency: Deep knowledge of computer networks, operating systems, security tools, and programming languages like Python and JavaScript.
- Analytical Skills: Ability to quickly process large datasets to identify security vulnerabilities and patterns.
- Communication Skills: Strong ability to explain complex technical information clearly to both technical and non-technical audiences.
- Problem-Solving: Aptitude for diagnosing issues and developing effective mitigation techniques for security threats.
- Attention to Detail: Meticulous in monitoring systems and reviewing security measures for potential gaps.
- Tamil candidates only
Job Type: Full-time
Pay: ₹340, ₹1,167,607.61 per year
Benefits:
- Food provided
Work Location: In person
Information Security Analyst
Posted today
Job Viewed
Job Description
Information Security Analyst
ROLE DESCRIPTION SUMMARY
SES's Cyber Security Center Teamis focused on improving SES's security posture through security monitoring, vulnerability management, monitoring and analytic tools, and actively seeking out and addressing security concerns. An Information Security Analyst must be aware of the enterprise's security goals, policies, procedures, and guidelines, and be actively working towards upholding those goals.
PRIMARY RESPONSIBILITIES / KEY RESULT AREAS
- Monitor and analyze security logs, system logs, and network traffic for security events.
- Assist various teams in configuring diverse devices for logging.
- Perform in-depth root cause investigation and analysis.
- Conduct incident response to security events and incidents.
- Address security concerns in a way that is consistent with applicable policies, plans, and processes.
- Analyze, triage, aggregate, escalate, and report on security events, including investigation of anomalous activity and responses to cyber incidents.
- Document security processes to create playbooks and other documentation based on best practices and policy.
- Research and suggest improvements for the corporate security posture.
- Present security-related material in meetings.
- Work to ensure assigned tasks and projects are completed on time.
COMPETENCIES
- Having good organizational skills and able to manage multiple tasks.
- A willingness to engage and coordinate with others in the Threat Management team.
- Employing good communication skills to coordinate with your team and others at SES.
- Having a willingness to dig into details and seemingly unglamorous tasks.
- Have strong logical analysis skills focused on details.
- Strong critical thinking/analytic skills, creativity, and a personal desire for quality.
QUALIFICATIONS & EXPERIENCE
Must Have
Two-year college degree in a technical field of study or equivalent work experience
- Technical knowledge and practical experience in networking, remote network access, network connected devices, network service software, and troubleshooting techniques.
- Experience working in a SOC or similar environment.
- Experience with reviewing IDS/IPS, EDR, firewall, OS, application, and other logs for security purposes.
- Competence in data sorting, manipulation, and correlation.
- Experience utilizing a Security Information and Event Management (SIEM) system to identify security issues for remediation, make rule modifications, make improvements in log handling, and perform data extraction for further analysis.
- Experience with threat and vulnerability management, penetration testing, vulnerability assessments, and vulnerability mitigation.
Conduct comprehensive analysis of threat data obtained from proprietary and open-source threat intelligence resources for potential and known.
Nice to Have
Experience in the with using various aspects of enterprise security architecture including SIEMs, EDR, and similar software.
- Familiarity with a variety of OSes including Microsoft Windows, Linux, and network appliance operating systems.
- Experience manipulating data with Microsoft Excel and document writing in Microsoft Word.
- Knowledge of a scripting language such as BASH, PowerShell, Python, etc.
- One or more of the following security certifications: Security+, CEH, CYSA+, GCIA, GSEC, GCIA, GMON and GCDA.
SES and its Affiliated Companies are committed to providing fair and equal employment opportunities to all. We are an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, gender, pregnancy, sex, sexual orientation, gender identity, national origin, age, genetic information, protected veteran status, disability, or any other basis protected by local, state, or federal law.
For more information on SES, click here.
Information Security Analyst
Posted 7 days ago
Job Viewed
Job Description
Key responsibilities include: monitoring network and system logs for suspicious activity and potential security breaches; conducting vulnerability assessments and penetration testing to identify weaknesses; implementing and managing security controls, firewalls, intrusion detection/prevention systems, and endpoint security solutions; developing and maintaining security policies, procedures, and standards; responding to and investigating security incidents, including malware analysis and forensic investigation; providing security awareness training to employees; staying current with the latest cybersecurity threats, trends, and technologies; collaborating with IT teams to ensure secure system configurations and deployments; recommending and implementing security enhancements to protect against evolving threats; participating in security audits and compliance activities. The successful candidate will possess strong technical skills in areas such as network security, cryptography, and operating system security. Excellent communication and analytical skills are crucial for documenting findings, reporting on security posture, and working effectively with various teams. This is a dynamic opportunity to contribute significantly to protecting an organization's critical information assets in the vibrant tech hub of Chennai.
Qualifications:
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Minimum of 3 years of experience in information security or cybersecurity.
- Strong knowledge of security principles, best practices, and frameworks (e.g., NIST, ISO 27001).
- Experience with security tools such as SIEM, IDS/IPS, firewalls, and antivirus solutions.
- Understanding of network protocols, operating systems, and application security.
- Experience in incident response and forensic analysis is a plus.
- Relevant certifications such as CompTIA Security+, CEH, or CISSP are highly desirable.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong written and verbal communication skills.
- Ability to work effectively both independently and as part of a collaborative team.
Information security analyst
Posted today
Job Viewed
Job Description
Information security analyst
Posted today
Job Viewed
Job Description
Information Security Analyst
Posted today
Job Viewed
Job Description
About the company
Lexitas is a high growth company. The Company is built on a belief that having strong personal relationships with our clients, and providing reliable, accurate and professional services, is the driving force of our success.
Lexitas offers an array of services including local and national court reporting, medical record retrieval, process service, registered agent services and legal talent outsourcing. Our reach is truly national as well as international.
Lexitas is a MNC Company that has set up a subsidiary in Chennai, India – Lexitas India Pvt. Ltd. This Indian company will be the Lexitas Global Capability Center, helping build a world class IT development team, and over time serve as a Shared Services hub for several of the corporate functions.
For More Information -
This is a Full-Time Job located in Chennai, India.
Summary:
This position supports information security, privacy, risk and compliance programs and activities under the direction of the VP of Information Security or designated Information Security Manager. The position assists in developing and maintaining a comprehensive security program for Lexitas. Providing functional and technical support is important to maintain security posture and protection of electronically and physically stored information assets across our systems. Tasks include supporting design, implementation, configuration, documentation, and maintenance to mitigate risk to the business and its computing resources and assets, as well as collaborating with applicable providers, managing and monitoring tools, and facilitating applicable processes and procedures.
Key Roles and Responsibilities :
- Supports IT security, privacy, risk and compliance systems, processes, supporting activities, with the ability to lead activities and programs.
- Monitors computer networks and associated tools and provider services for security, privacy, risk and compliance issues
- Supports the project management, tracking, and documentation of Information, Privacy, Risk, and Compliance programs, processes, and activities
- Investigate security breaches and cybersecurity incidents.
- Documents security breaches and assesses impact.
- Performs and/or supports security tests, risk assessments, and audits to uncover network, application, and process vulnerabilities and provides guidance and training to ensure violations do not persist.
- Tracks and facilitates the mitigation of vulnerabilities to maintain a high security standard.
- Supports best practices for IT security, privacy and compliance.
- Performs and supports 3rd party vulnerability management and penetration testing.
- Research security enhancements and makes recommendations to management.
- Stays current on information technology trends and security standards.
- Prepares reports that detail security, privacy, and compliance risk assessment findings.
- Supports Security Operations Center functions including monitoring and supporting Incident Response activities.
- Supports all related IT Security, Privacy, Risk and Compliance policies and provides guidance to the business.
- Other Information Security, Privacy, Risk, and Compliance duties as required.
Skills and Abilities:
- Experience with computer network and application vulnerability management and penetration testing, and techniques.
- Solid understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts
- Ability to identify and mitigate network and application vulnerabilities.
- Good understanding of patch management
- Proficient with various OS
- Excellent written and verbal communication skills
- Knowledge of firewalls, antivirus, and intrusion detection system concepts
- Ability to support and document areas of Information Security, Privacy, Risk, and compliance processes and programs.
- Ability to support incident response process.
- Experience directing 3rd Party providers in the areas of Information Security, Privacy, Risk and Compliance
- Support information security controls including physical and data security protecting the confidentiality, integrity and availability of information systems data.
- Preferred KSA’s:
- Strong working knowledge and experience with primary Information Security, Privacy, Risk, and compliance standards and frameworks such as NIST, SOC 2, HIPAA, PCI DSS, GDPR, etc.
- Experience administering information security software and controls.
- Experience supporting process for managing network and application security.
- Network and system administration experience a plus.
- Good understanding of Standard Information Security Baseline Frameworks, Business Continuity, and Disaster Recovery protocols and best practices.
- Exposure to ITIL (Incident/Change Management) – ITIL v3F preferred.
- Learns and monitors the business processes for the areas of primary support responsibility.
- Support annual Security Baseline Audits and execution of recommendations.
- As part of the technology team, performs “Help Desk” day-to-day tasks in support of Information Security, Privacy, Risk, and Compliance.
Education and Experience:
- Bachelor’s degree in computer science or related field strongly preferred.
- IAT Level-2 technical certification strongly preferred (Comp TIA Security+ or CISSP) or ability to obtain within first 90 days of hire.
- 5+ years’ experience performing role of Information Security Analyst or SOC
- Demonstrated experience in responding to, managing, and resolving security incidents.
- Experience with LAN/WAN networking concepts, IP addressing and routing concepts, Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
- Experience with Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
- Experience working with Security Information and Even Management (SIEM) system is a plus.
Be The First To Know
About the latest Cybersecurity analysts Jobs in Chennai !
Lead Information Security Analyst
Posted 1 day ago
Job Viewed
Job Description
Senior Information Security Analyst
Posted 1 day ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor and analyze security alerts and logs from various security systems (SIEM, IDS/IPS, firewalls, endpoint protection).
- Investigate security incidents, conduct forensic analysis, and develop remediation plans.
- Perform regular vulnerability assessments and penetration testing, identifying and prioritizing security weaknesses.
- Develop, implement, and maintain security policies, procedures, and best practices.
- Design and manage security controls to protect information assets.
- Stay current with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
- Provide expert guidance on security best practices to IT staff and end-users.
- Participate in security awareness training initiatives.
- Collaborate with IT teams to ensure secure system configurations and deployments.
- Develop and maintain security documentation and incident response playbooks.
- Evaluate and recommend new security technologies and solutions.
- Contribute to the development and maintenance of the organization's Security Operations Center (SOC) capabilities.
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Minimum of 5 years of experience in information security, cybersecurity operations, or incident response.
- In-depth knowledge of cybersecurity principles, network security, and common attack vectors.
- Hands-on experience with SIEM tools, intrusion detection/prevention systems, firewalls, and endpoint security solutions.
- Proficiency in vulnerability assessment and penetration testing methodologies.
- Understanding of security frameworks (e.g., NIST, ISO 27001).
- Relevant certifications such as CISSP, CISM, CEH, or GIAC are highly desirable.
- Strong analytical, problem-solving, and investigative skills.
- Excellent written and verbal communication abilities.
- Ability to work independently and as part of a remote team.
- Experience with scripting languages (e.g., Python, PowerShell) for automation is a plus.