6,686 Cybersecurity Engineers jobs in India
Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)
Posted 19 days ago
Job Viewed
Job Description
Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)
Location : Kolkata
Mode : Fulltime Work from Office (6 Days)
Shift : General
Job Description:
ITCI is hiring seasoned Senior Cybersecurity Engineers to fortify our enterprise security landscape. The role involves deep technical expertise in Endpoint Protection, DLP, IAM, and Email Security. Engineers will work within an 8x5 framework, driving proactive security management and incident response across critical enterprise systems.
Key Responsibilities:
- Lead the administration of endpoint security across all enterprise devices using Trend Micro solutions.
- Define, configure, and maintain security policies to detect threats and automate appropriate responses.
- Actively engage in threat hunting, analyse incidents, and deliver actionable security reports.
- Develop and implement effective DLP policies to protect sensitive business data.
- Continuously monitor and assess DLP alerts, ensuring timely escalation and resolution of genuine threats.
- Fine-tune DLP configurations to reduce noise, improve detection, and support business continuity.
- Manage user identity lifecycles including onboarding, offboarding, and access governance.
- Enforce strong access controls using least privilege and zero trust principles across critical systems.
- Integrate identity services with enterprise platforms like Azure AD and Entra ID for seamless authentication.
- Configure and maintain email security policies for filtering, anti-phishing, and malware defense.
- Proactively monitor email alerts, investigating and mitigating phishing, spoofing, and other email-based attacks.
- Work closely with SOC and Incident Response teams to address and contain email-borne threats effectively.
Required Skills & Qualifications:
- Minimum 10 years of dedicated experience in Cybersecurity Engineering .
- In-depth expertise in:
- Trend Micro Apex one /CrowdStrike Falcon or equivalent.
- DLP platforms (Forcepoint, Microsoft Purview, Symantec, etc.).
- IAM systems (Azure AD, Entra ID, MIM, or similar).
- Microsoft Defender for Office 365 (ATP)/ Proof Point/Mimecast .
- Strong understanding of enterprise security frameworks (e.g., NIST, ISO 27001).
- Experience with incident management, threat hunting, and policy enforcement.
- CEH, CISSP, CISM, Microsoft SC-200/SC-300, or equivalent (optional but preferred).
- Experience with ITSM tools, SIEM platforms (e.g. Wazuh, Microsoft Sentinel, Splunk) is a plus.
- Maintain incident logs, root cause analysis reports, and change documentation.
- Must work in close coordination with SOC, Infra, and Application teams.
Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)
Posted 5 days ago
Job Viewed
Job Description
Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)
Location : Kolkata
Mode : Fulltime Work from Office (6 Days)
Shift : General
Job Description:
ITCI is hiring seasoned Senior Cybersecurity Engineers to fortify our enterprise security landscape. The role involves deep technical expertise in Endpoint Protection, DLP, IAM, and Email Security. Engineers will work within an 8x5 framework, driving proactive security management and incident response across critical enterprise systems.
Key Responsibilities:
- Lead the administration of endpoint security across all enterprise devices using Trend Micro solutions.
- Define, configure, and maintain security policies to detect threats and automate appropriate responses.
- Actively engage in threat hunting, analyse incidents, and deliver actionable security reports.
- Develop and implement effective DLP policies to protect sensitive business data.
- Continuously monitor and assess DLP alerts, ensuring timely escalation and resolution of genuine threats.
- Fine-tune DLP configurations to reduce noise, improve detection, and support business continuity.
- Manage user identity lifecycles including onboarding, offboarding, and access governance.
- Enforce strong access controls using least privilege and zero trust principles across critical systems.
- Integrate identity services with enterprise platforms like Azure AD and Entra ID for seamless authentication.
- Configure and maintain email security policies for filtering, anti-phishing, and malware defense.
- Proactively monitor email alerts, investigating and mitigating phishing, spoofing, and other email-based attacks.
- Work closely with SOC and Incident Response teams to address and contain email-borne threats effectively.
Required Skills & Qualifications:
- Minimum 10 years of dedicated experience in Cybersecurity Engineering.
- In-depth expertise in:
- Trend Micro Apex one /CrowdStrike Falcon or equivalent.
- DLP platforms (Forcepoint, Microsoft Purview, Symantec, etc.).
- IAM systems (Azure AD, Entra ID, MIM, or similar).
- Microsoft Defender for Office 365 (ATP)/ Proof Point/Mimecast.
- Strong understanding of enterprise security frameworks (e.g., NIST, ISO 27001).
- Experience with incident management, threat hunting, and policy enforcement.
- CEH, CISSP, CISM, Microsoft SC-200/SC-300, or equivalent (optional but preferred).
- Experience with ITSM tools, SIEM platforms (e.g. Wazuh, Microsoft Sentinel, Splunk) is a plus.
- Maintain incident logs, root cause analysis reports, and change documentation.
- Must work in close coordination with SOC, Infra, and Application teams.
Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)
Posted today
Job Viewed
Job Description
Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)
Location : Kolkata
Mode : Fulltime Work from Office (6 Days)
Shift : General
Job Description:
ITCI is hiring seasoned Senior Cybersecurity Engineers to fortify our enterprise security landscape. The role involves deep technical expertise in Endpoint Protection, DLP, IAM, and Email Security. Engineers will work within an 8x5 framework, driving proactive security management and incident response across critical enterprise systems.
Key Responsibilities:
- Lead the administration of endpoint security across all enterprise devices using Trend Micro solutions.
- Define, configure, and maintain security policies to detect threats and automate appropriate responses.
- Actively engage in threat hunting, analyse incidents, and deliver actionable security reports.
- Develop and implement effective DLP policies to protect sensitive business data.
- Continuously monitor and assess DLP alerts, ensuring timely escalation and resolution of genuine threats.
- Fine-tune DLP configurations to reduce noise, improve detection, and support business continuity.
- Manage user identity lifecycles including onboarding, offboarding, and access governance.
- Enforce strong access controls using least privilege and zero trust principles across critical systems.
- Integrate identity services with enterprise platforms like Azure AD and Entra ID for seamless authentication.
- Configure and maintain email security policies for filtering, anti-phishing, and malware defense.
- Proactively monitor email alerts, investigating and mitigating phishing, spoofing, and other email-based attacks.
- Work closely with SOC and Incident Response teams to address and contain email-borne threats effectively.
Required Skills & Qualifications:
- Minimum 10 years of dedicated experience in Cybersecurity Engineering .
- In-depth expertise in:
- Trend Micro Apex one /CrowdStrike Falcon or equivalent.
- DLP platforms (Forcepoint, Microsoft Purview, Symantec, etc.).
- IAM systems (Azure AD, Entra ID, MIM, or similar).
- Microsoft Defender for Office 365 (ATP)/ Proof Point/Mimecast .
- Strong understanding of enterprise security frameworks (e.g., NIST, ISO 27001).
- Experience with incident management, threat hunting, and policy enforcement.
- CEH, CISSP, CISM, Microsoft SC-200/SC-300, or equivalent (optional but preferred).
- Experience with ITSM tools, SIEM platforms (e.g. Wazuh, Microsoft Sentinel, Splunk) is a plus.
- Maintain incident logs, root cause analysis reports, and change documentation.
- Must work in close coordination with SOC, Infra, and Application teams.
Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)
Posted 16 days ago
Job Viewed
Job Description
Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)
Location : Kolkata
Mode : Fulltime Work from Office (6 Days)
Shift : General
Job Description:
ITCI is hiring seasoned Senior Cybersecurity Engineers to fortify our enterprise security landscape. The role involves deep technical expertise in Endpoint Protection, DLP, IAM, and Email Security. Engineers will work within an 8x5 framework, driving proactive security management and incident response across critical enterprise systems.
Key Responsibilities:
- Lead the administration of endpoint security across all enterprise devices using Trend Micro solutions.
- Define, configure, and maintain security policies to detect threats and automate appropriate responses.
- Actively engage in threat hunting, analyse incidents, and deliver actionable security reports.
- Develop and implement effective DLP policies to protect sensitive business data.
- Continuously monitor and assess DLP alerts, ensuring timely escalation and resolution of genuine threats.
- Fine-tune DLP configurations to reduce noise, improve detection, and support business continuity.
- Manage user identity lifecycles including onboarding, offboarding, and access governance.
- Enforce strong access controls using least privilege and zero trust principles across critical systems.
- Integrate identity services with enterprise platforms like Azure AD and Entra ID for seamless authentication.
- Configure and maintain email security policies for filtering, anti-phishing, and malware defense.
- Proactively monitor email alerts, investigating and mitigating phishing, spoofing, and other email-based attacks.
- Work closely with SOC and Incident Response teams to address and contain email-borne threats effectively.
Required Skills & Qualifications:
- Minimum 10 years of dedicated experience in Cybersecurity Engineering .
- In-depth expertise in:
- Trend Micro Apex one /CrowdStrike Falcon or equivalent.
- DLP platforms (Forcepoint, Microsoft Purview, Symantec, etc.).
- IAM systems (Azure AD, Entra ID, MIM, or similar).
- Microsoft Defender for Office 365 (ATP)/ Proof Point/Mimecast .
- Strong understanding of enterprise security frameworks (e.g., NIST, ISO 27001).
- Experience with incident management, threat hunting, and policy enforcement.
- CEH, CISSP, CISM, Microsoft SC-200/SC-300, or equivalent (optional but preferred).
- Experience with ITSM tools, SIEM platforms (e.g. Wazuh, Microsoft Sentinel, Splunk) is a plus.
- Maintain incident logs, root cause analysis reports, and change documentation.
- Must work in close coordination with SOC, Infra, and Application teams.
Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)
Posted today
Job Viewed
Job Description
Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)
Location : Kolkata
Mode : Fulltime Work from Office (6 Days)
Shift : General
Job Description:
ITCI is hiring seasoned Senior Cybersecurity Engineers to fortify our enterprise security landscape. The role involves deep technical expertise in Endpoint Protection, DLP, IAM, and Email Security. Engineers will work within an 8x5 framework, driving proactive security management and incident response across critical enterprise systems.
Key Responsibilities:
- Lead the administration of endpoint security across all enterprise devices using Trend Micro solutions.
- Define, configure, and maintain security policies to detect threats and automate appropriate responses.
- Actively engage in threat hunting, analyse incidents, and deliver actionable security reports.
- Develop and implement effective DLP policies to protect sensitive business data.
- Continuously monitor and assess DLP alerts, ensuring timely escalation and resolution of genuine threats.
- Fine-tune DLP configurations to reduce noise, improve detection, and support business continuity.
- Manage user identity lifecycles including onboarding, offboarding, and access governance.
- Enforce strong access controls using least privilege and zero trust principles across critical systems.
- Integrate identity services with enterprise platforms like Azure AD and Entra ID for seamless authentication.
- Configure and maintain email security policies for filtering, anti-phishing, and malware defense.
- Proactively monitor email alerts, investigating and mitigating phishing, spoofing, and other email-based attacks.
- Work closely with SOC and Incident Response teams to address and contain email-borne threats effectively.
Required Skills & Qualifications:
- Minimum 10 years of dedicated experience in Cybersecurity Engineering .
- In-depth expertise in:
- Trend Micro Apex one /CrowdStrike Falcon or equivalent.
- DLP platforms (Forcepoint, Microsoft Purview, Symantec, etc.).
- IAM systems (Azure AD, Entra ID, MIM, or similar).
- Microsoft Defender for Office 365 (ATP)/ Proof Point/Mimecast .
- Strong understanding of enterprise security frameworks (e.g., NIST, ISO 27001).
- Experience with incident management, threat hunting, and policy enforcement.
- CEH, CISSP, CISM, Microsoft SC-200/SC-300, or equivalent (optional but preferred).
- Experience with ITSM tools, SIEM platforms (e.g. Wazuh, Microsoft Sentinel, Splunk) is a plus.
- Maintain incident logs, root cause analysis reports, and change documentation.
- Must work in close coordination with SOC, Infra, and Application teams.
Sr Information Security Architect

Posted 17 days ago
Job Viewed
Job Description
With 80,000 customers across 150 countries, UKG is the largest U.S.-based private software company in the world. And we're only getting started. Ready to bring your bold ideas and collaborative mindset to an organization that still has so much more to build and achieve? Read on.
At UKG, you get more than just a job. You get to work with purpose. Our team of U Krewers are on a mission to inspire every organization to become a great place to work through our award-winning HR technology built for all.
Here, we know that you're more than your work. That's why our benefits help you thrive personally and professionally, from wellness programs and tuition reimbursement to U Choose - a customizable expense reimbursement program that can be used for more than 200+ needs that best suit you and your family, from student loan repayment, to childcare, to pet insurance. Our inclusive culture, active and engaged employee resource groups, and caring leaders value every voice and support you in doing the best work of your career. If you're passionate about our purpose - people -then we can't wait to support whatever gives you purpose. We're united by purpose, inspired by you.
About the Role
Job Location: Noida
As a Proactive Security - Security Architect, you will be part of UKG's forward-thinking Global Security team, focused on continuously strengthening our security posture through innovation and collaboration. This global role is dedicated to proactive security identifying gaps before adversaries do-leveraging advanced techniques like breach and attack simulation, technical control validation , threat intelligence, and proactive detection strategies to stay ahead of evolving threats. Work cross-functionally to simulate, assess, and harden defenses, enabling secure-by-design principles across our enterprise.
We're not just defending-we're redefining what proactive security looks like in the HCM SaaS space. With your analytical mindset and collaborative spirit, you'll help us lead the way in building a security-first culture that protects our customers and empowers innovation.
Key Responsibilities
- Proactively Anticipate Threats - Conduct proactive threat hunting and analysis using threat intelligence, tactics, techniques and procedures (TTPs) as per MITRE ATT&CK framework. Also if needed collaborate with Threat Intel teams to emulate MITRE ATT&CK and threat actor behaviors relevant to the organization /business environment.
- Proactively validate Defenses and Technical Security Controls with Adversary-Informed Testing - Lead and execute Breach and Attack Simulations (BAS) end to end using industry-leading BAS platforms such as SafeBreach, Mandiant Security Validation , AttackIQ, Picus Security, or custom-built scripts to test control efficacy.
- Map defenses and detections to MITRE ATT&CK to uncover blind spots and improve control resiliency.
- Integrate BAS outcomes with EDR, SIEM, SOAR, Identity, Cloud layers and security telemetry to validate detection capabilities and security stack effectiveness.
- Analyze BAS results to identify control gaps and ensure timely mitigation or remediation via required tools.
- Proactive Remediation via Engineering and Hardening - Further, recommend control enhancements and help harden detection rules, prevention policies, response playbooks, and security configurations.
- Work Cross functionally and collaborate with teams including SOC, Identity & Access Management, Detection Engineering, Security Architecture, Infrastructure, and Application teams to validate technical controls and enhance detection and response capabilities against simulated threats and draft playbooks.
- Automate false positive reduction in BAS Tool and evolve detection logic based on real-world threat trends.
- Provide strategic input in secure architecture controls validation, completeness and incident response planning across cloud, on-prem, and hybrid infrastructure.
- Lead implementation and optimization of tools across endpoint, network, identity, and cloud security domains basis BAS or purple teaming outcomes.
- Drive BAS results remediation end to end for identified detection, prevention, and response control gaps.
- Proactive Security Metrics, Reporting & Communication- Define and track metrics/KPIs (for e.g. - % MITRE ATT&CK techniques validated, detection coverage improvements before and after, control drift remediation rate etc.) and prepare reports to track-attack surface coverage, control completeness, effectiveness, and detection gaps closed.
- Stay current with emerging threats, vulnerabilities, and industry trends.
Required Skills & Qualifications
- Bachelor's degree in Computer Science, Information Security, or a related field.
- 8+ years of professional experience in cybersecurity, with a focus on:
o MITRE ATT&CK Framework and TTPs
o Security Operations Center (SOC)
o Threat Intelligence, Detection Engineering
o Breach and Attack Simulation (BAS) tools, Purple Teaming
o Endpoint Detection and Response (EDR)
o Security Information and Event Management (SIEM), SOAR
o Vulnerability Management
o Identity and Access Management (IAM)
o Information Security Architecture
- Experience with threat hunting, log analysis, alert tuning, and BAS tools.
- In depth knowledge of attack lifecycle, MITRE ATT&CK, cyber kill chain, and modern threat actors.
- Deep understanding of enterprise security architecture, including cloud (AWS/Azure/GCP) and hybrid environments.
- Proficiency with tools like Splunk, Sentinel, CrowdStrike, EDR/XDR platforms, Network NDR , Firewall , WAF and security APIs.
- Excellent verbal and written communication skills, stakeholder management skills with the ability to convey complex technical concepts to diverse audiences across.
- Share knowledge, mentor others, and help drive a culture of curiosity, technical depth, and continuous improvement.
- Strong scripting skills in Python, PowerShell, or Bash and Exposure to Agile, CI/CD, or IaC pipelines are a plus.
Preferred Certifications (Not Mandatory)
- CISSP (Certified Information Systems Security Professional)
- OSCP/OSCE/Red/Purple Team certifications
- GIAC, CCSP, or other relevant cybersecurity certifications
- Vendor-specific: Mandiant (MSV) Certified Professional, SafeBreach Certified, MITRE ATT&CK Defender credentials.
Why This Role is Different - What You'll Gain:
- Global Impact: Your work will directly harden defenses across a complex, distributed enterprise.
- Innovation Playground: You'll work with bleeding-edge BAS tools, detection frameworks, and automation platforms.
- Strategic Visibility: Your threat findings will shape executive decision-making and security investment.
- Trusted Seat at the Table: Be part of a high-credibility security team that advises architecture, engineering, and leadership.
Where we're going
UKG is on the cusp of something truly special. Worldwide, we already hold the #1 market share position for workforce management and the #2 position for human capital management. Tens of millions of frontline workers start and end their days with our software, with billions of shifts managed annually through UKG solutions today. Yet it's our AI-powered product portfolio designed to support customers of all sizes, industries, and geographies that will propel us into an even brighter tomorrow!
UKG is proud to be an equal opportunity employer and is committed to promoting diversity and inclusion in the workplace, including the recruitment process.
Disability Accommodation in the Application and Interview Process
For individuals with disabilities that need additional assistance at any point in the application and interview process, please email
NOTICE ON HIRING SCAMS
UKG will never ask you for a copy of your driver's license, social security card, or passport during a job interview. For new hires, we do not ask for payment for equipment purchase, cost for training, or to receive onboarding documents. UKG does not make job offers outside of our formal hiring process. To help protect yourself against potential hiring scams, learn more about our formal hiring process, outlined here ( .
ABOUT OUR JOB DESCRIPTIONS
All job descriptions are written to accurately reflect the open job and include general work responsibilities. They do not present a comprehensive, detailed inventory of all duties, responsibilities, and qualifications required for the job. Management reserves the right to revise the job or require that other or different tasks be performed if or when circumstances change.
It is the policy of Ultimate Software to promote and assure equal employment opportunity for all current and prospective Peeps without regard to race, color, religion, sex, age, disability, marital status, familial status, sexual orientation, pregnancy, genetic information, gender identity, gender expression, national origin, ancestry, citizenship status, veteran status, and any other legally protected status entitled to protection under federal, state, or local anti-discrimination laws. This policy governs all matters related to recruitment, advertising, and initial selection of employment. It shall also apply to all other aspects of employment, including, but not limited to, compensation, promotion, demotion, transfer, lay-offs, terminations, leave of absence, and training opportunities.
Lead Information Security Architect

Posted 17 days ago
Job Viewed
Job Description
With 80,000 customers across 150 countries, UKG is the largest U.S.-based private software company in the world. And we're only getting started. Ready to bring your bold ideas and collaborative mindset to an organization that still has so much more to build and achieve? Read on.
At UKG, you get more than just a job. You get to work with purpose. Our team of U Krewers are on a mission to inspire every organization to become a great place to work through our award-winning HR technology built for all.
Here, we know that you're more than your work. That's why our benefits help you thrive personally and professionally, from wellness programs and tuition reimbursement to U Choose - a customizable expense reimbursement program that can be used for more than 200+ needs that best suit you and your family, from student loan repayment, to childcare, to pet insurance. Our inclusive culture, active and engaged employee resource groups, and caring leaders value every voice and support you in doing the best work of your career. If you're passionate about our purpose - people -then we can't wait to support whatever gives you purpose. We're united by purpose, inspired by you.
About the Role
Job Location: Noida
As a Proactive Security - Lead Security Architect, you will be part of UKG's forward-thinking Global Security team, focused on continuously strengthening our security posture through innovation and collaboration. This global role is dedicated to proactive security identifying gaps before adversaries do-leveraging advanced techniques like breach and attack simulation, technical control validation , threat intelligence, and proactive detection strategies to stay ahead of evolving threats. Work cross-functionally to simulate, assess, and harden defenses, enabling secure-by-design principles across our enterprise.
We're not just defending-we're redefining what proactive security looks like in the HCM SaaS space. With your analytical mindset and collaborative spirit, you'll help us lead the way in building a security-first culture that protects our customers and empowers innovation.
Key Responsibilities
- Proactively Anticipate Threats - Conduct proactive threat hunting and analysis using threat intelligence, tactics, techniques and procedures (TTPs) as per MITRE ATT&CK framework. Also if needed collaborate with Threat Intel teams to emulate MITRE ATT&CK and threat actor behaviors relevant to the organization /business environment.
- Proactively validate Defenses and Technical Security Controls with Adversary-Informed Testing - Lead and execute Breach and Attack Simulations (BAS) end to end using industry-leading BAS platforms such as SafeBreach, Mandiant Security Validation , AttackIQ, Picus Security, or custom-built scripts to test control efficacy.
- Map defenses and detections to MITRE ATT&CK to uncover blind spots and improve control resiliency.
- Integrate BAS outcomes with EDR, SIEM, SOAR, Identity, Cloud layers and security telemetry to validate detection capabilities and security stack effectiveness.
- Analyze BAS results to identify control gaps and ensure timely mitigation or remediation via required tools.
- Proactive Remediation via Engineering and Hardening - Further, recommend control enhancements and help harden detection rules, prevention policies, response playbooks, and security configurations.
- Work Cross functionally and collaborate with teams including SOC, Identity & Access Management, Detection Engineering, Security Architecture, Infrastructure, and Application teams to validate technical controls and enhance detection and response capabilities against simulated threats and draft playbooks.
- Automate false positive reduction in BAS Tool and evolve detection logic based on real-world threat trends.
- Provide strategic input in secure architecture controls validation, completeness and incident response planning across cloud, on-prem, and hybrid infrastructure.
- Lead implementation and optimization of tools across endpoint, network, identity, and cloud security domains basis BAS or purple teaming outcomes.
- Drive BAS results remediation end to end for identified detection, prevention, and response control gaps.
- Proactive Security Metrics, Reporting & Communication- Define and track metrics/KPIs (for e.g. - % MITRE ATT&CK techniques validated, detection coverage improvements before and after, control drift remediation rate etc.) and prepare reports to track-attack surface coverage, control completeness, effectiveness, and detection gaps closed.
- Stay current with emerging threats, vulnerabilities, and industry trends.
Required Skills & Qualifications
- Bachelor's degree in Computer Science, Information Security, or a related field.
- 8+ years of professional experience in cybersecurity, with a focus on:
o MITRE ATT&CK Framework and TTPs
o Security Operations Center (SOC)
o Threat Intelligence, Detection Engineering
o Breach and Attack Simulation (BAS) tools, Purple Teaming
o Endpoint Detection and Response (EDR)
o Security Information and Event Management (SIEM), SOAR
o Vulnerability Management
o Identity and Access Management (IAM)
o Information Security Architecture
- Experience with threat hunting, log analysis, alert tuning, and BAS tools.
- In depth knowledge of attack lifecycle, MITRE ATT&CK, cyber kill chain, and modern threat actors.
- Deep understanding of enterprise security architecture, including cloud (AWS/Azure/GCP) and hybrid environments.
- Proficiency with tools like Splunk, Sentinel, CrowdStrike, EDR/XDR platforms, Network NDR , Firewall , WAF and security APIs.
- Excellent verbal and written communication skills, stakeholder management skills with the ability to convey complex technical concepts to diverse audiences across.
- Share knowledge, mentor others, and help drive a culture of curiosity, technical depth, and continuous improvement.
- Strong scripting skills in Python, PowerShell, or Bash and Exposure to Agile, CI/CD, or IaC pipelines are a plus.
Preferred Certifications (Not Mandatory)
- CISSP (Certified Information Systems Security Professional)
- OSCP/OSCE/Red/Purple Team certifications
- GIAC, CCSP, or other relevant cybersecurity certifications
- Vendor-specific: Mandiant (MSV) Certified Professional, SafeBreach Certified, MITRE ATT&CK Defender credentials.
Why This Role is Different - What You'll Gain:
- Global Impact: Your work will directly harden defenses across a complex, distributed enterprise.
- Innovation Playground: You'll work with bleeding-edge BAS tools, detection frameworks, and automation platforms.
- Strategic Visibility: Your threat findings will shape executive decision-making and security investment.
- Trusted Seat at the Table: Be part of a high-credibility security team that advises architecture, engineering, and leadership.
Where we're going
UKG is on the cusp of something truly special. Worldwide, we already hold the #1 market share position for workforce management and the #2 position for human capital management. Tens of millions of frontline workers start and end their days with our software, with billions of shifts managed annually through UKG solutions today. Yet it's our AI-powered product portfolio designed to support customers of all sizes, industries, and geographies that will propel us into an even brighter tomorrow!
UKG is proud to be an equal opportunity employer and is committed to promoting diversity and inclusion in the workplace, including the recruitment process.
Disability Accommodation in the Application and Interview Process
For individuals with disabilities that need additional assistance at any point in the application and interview process, please email
NOTICE ON HIRING SCAMS
UKG will never ask you for a copy of your driver's license, social security card, or passport during a job interview. For new hires, we do not ask for payment for equipment purchase, cost for training, or to receive onboarding documents. UKG does not make job offers outside of our formal hiring process. To help protect yourself against potential hiring scams, learn more about our formal hiring process, outlined here ( .
ABOUT OUR JOB DESCRIPTIONS
All job descriptions are written to accurately reflect the open job and include general work responsibilities. They do not present a comprehensive, detailed inventory of all duties, responsibilities, and qualifications required for the job. Management reserves the right to revise the job or require that other or different tasks be performed if or when circumstances change.
It is the policy of Ultimate Software to promote and assure equal employment opportunity for all current and prospective Peeps without regard to race, color, religion, sex, age, disability, marital status, familial status, sexual orientation, pregnancy, genetic information, gender identity, gender expression, national origin, ancestry, citizenship status, veteran status, and any other legally protected status entitled to protection under federal, state, or local anti-discrimination laws. This policy governs all matters related to recruitment, advertising, and initial selection of employment. It shall also apply to all other aspects of employment, including, but not limited to, compensation, promotion, demotion, transfer, lay-offs, terminations, leave of absence, and training opportunities.
Be The First To Know
About the latest Cybersecurity engineers Jobs in India !
Information Security Architect I

Posted 17 days ago
Job Viewed
Job Description
Information Security Architect I
**Job Description:**
We are seeking a highly experienced SOC Architect, Lead Analyst, to join our global Cyber Operations team. This role involves leading and enhancing our security operations capabilities across various environments, including cloud and on-premises systems. The ideal candidate will have a deep background in SOC operations, incident response, and advanced threat management, with a focus on automation and integration of cutting-edge security technologies.
**What you will be doing:**
**Leading SOC Operations:**
+ Implement, and optimize SOC architectures and processes to effectively detect and respond to cyber threats.
+ Develop and manage advanced security monitoring and SOC response frameworks, leveraging tools such as Microsoft Sentinel and other cloud-native SOC platforms.
**Case Management and Response:**
+ Lead and manage critical security events, including complex investigations and forensic analysis.
+ Develop and refine SOC playbooks and procedures to ensure efficient and effective resolution or escalation of security events.
**Automation and Integration:**
+ Implement and manage Security Orchestration, Automation, and Response (SOAR) solutions to streamline SOC operations.
+ Create and optimize automation rules and workflows to enhance incident detection and response capabilities.
+ Integrate SOC tools and platforms to ensure seamless data flow and operational efficiency.
**Threat Intelligence and Hunting:**
+ Analyze threat intelligence data to identify emerging threats and vulnerabilities and integrate this intelligence into SOC operations.
+ Conduct advanced threat hunting activities and develop strategies to proactively identify and mitigate potential threats.
**Team Leadership and Development:**
+ Mentor and guide SOC team members, including SOC Level 1 Analysts, providing leadership on complex incidents and security challenges.
+ Collaborate with other teams and departments to ensure cohesive and coordinated security efforts across the organization.
**Continuous Improvement:**
+ Stay current with the latest cybersecurity trends, threats, and technologies to continuously enhance SOC operations.
+ Contribute to the development of new use cases, dashboards, and reporting templates to improve SOC performance and visibility.
**Key Accountabilities:**
+ Shift Lead for SOC in maintaining security operations across private, hybrid, and public cloud environments.
+ Ensure timely and effective resolution of security events and escalate complex issues as necessary.
+ Ensure SOC capabilities with training and skill development that aligns with continuous improvement to handle complex and evolving cyber threats.
+ Develop custom parsers and enrichments for improved alert handling.
+ Collaborate with vendors and internal teams to resolve security issues and enhance SOC capabilities.
+ Maintain compliance with legal, regulatory, and industry standards.
**What we are looking for :**
**Experience:**
+ 7-15 years of experience in SOC roles, with a strong focus on SOC event management, threat management, and SOC architecture.
+ Proven track record of managing large-scale SOC operations in global environments. Must be a self-starter and motivated to bring more to this role and team than what is directed.
**Technical Skills:**
+ In depth experience with cloud-native security tools, including Microsoft Sentinel, Microsoft 365 Defender, and Microsoft Defender for Cloud.
+ In depth experience with endpoint detection and response (EDR) including Microsoft Defender for Endpoint.
+ In depth experience with identity concepts, including multifactor authentication, authentication protocols, user behaviors.
+ In-depth understanding of cloud and endpoint, including malware forensics, browser forensics, cloud forensics, mobile device forensics.
+ Experience with network security tools, including Palo Alto and web application firewalls (WAFs) like Akamai, Cloudflare and Azure WAF.
+ Advanced knowledge of scripting and automation using languages.
+ Experience with SOAR platforms and security automation.
**Certifications:**
+ Relevant certifications such as CISSP, CISM, CCSP, GCIH, or GIAC Security Operations Certified (GSOC) are highly desirable.
+ Additional certifications in cloud security or incident response are a plus.
**Soft Skills:**
+ Strong analytical and problem-solving skills with the ability to handle complex security events.
+ Excellent communication skills to articulate security concepts to both technical and non-technical stakeholders.
+ Highly organized, detail-oriented, and capable of working under pressure in a dynamic environment.
**Shift Coverage:** Rotational 24x7 shifts.
**Arrow Electronics, Inc. (NYSE: ARW),** an award-winning Fortune 133 and one of Fortune Magazine's Most Admired Companies. Arrow guides innovation forward for over 220,000 leading technology manufacturers and service providers. With 2024 sales of USD $27.9 billion, Arrow develops technology solutions that improve business and daily life. Our broad portfolio that spans the entire technology landscape helps customers create, make and manage forward-thinking products that make the benefits of technology accessible to as many people as possible. Learn more at .
Our strategic direction of guiding innovation forward is expressed as Five Years Out, a way of thinking about the tangible future to bridge the gap between what's possible and the practical technologies to make it happen. Learn more at .
**Location:**
IN-KA-Bangalore, India (SKAV Seethalakshmi) GESC
**Time Type:**
Full time
**Job Category:**
Information Technology
Arrow Electronics, Inc.'s policy is to provide equal employment opportunities to all qualified employees and applicants without regard to race, color, religion, age, sex, marital status, gender identity or expression, sexual orientation, national origin, disability, citizenship, veran status, genetic information, or any other characteristics protected by applicable state, federal or local laws. Our policy of equal employment opportunity and affirmative action applies to all employment decisions personnel policies and practices, or programs.
Information Security Architect I
Posted today
Job Viewed
Job Description
Description
:We are seeking a highly experienced SOC Architect, Lead Analyst, to join our global Cyber Operations team. This role involves leading and enhancing our security operations capabilities across various environments, including cloud and on-premises systems. The ideal candidate will have a deep background in SOC operations, incident response, and advanced threat management, with a focus on automation and integration of cutting-edge security technologies.
What you will be doing:
Leading SOC Operations:
Case Management and Response:
Automation and Integration:
Threat Intelligence and Hunting:
Team Leadership and Development:
Continuous Improvement:
Key Accountabilities:
What we are looking for :
Experience:
Technical Skills:
Certifications:
Soft Skills:
Shift Coverage: Rotational 24x7 shifts.
Arrow Electronics, Inc. (NYSE: ARW), an award-winning Fortune 133 and one of Fortune Magazine’s Most Admired Companies. Arrow guides innovation forward for over 220,000 leading technology manufacturers and service providers. With 2024 sales of USD $27.9 billion, Arrow develops technology solutions that improve business and daily life. Our broad portfolio that spans the entire technology landscape helps customers create, make and manage forward-thinking products that make the benefits of technology accessible to as many people as possible. Learn more at .
Our strategic direction of guiding innovation forward is expressed as Five Years Out, a way of thinking about the tangible future to bridge the gap between what's possible and the practical technologies to make it happen. Learn more at .
Location:
IN-KA-Bangalore, India (SKAV Seethalakshmi) GESCTime Type:
Full timeJob Category:
Information TechnologyInformation Security Architect - Principal - IND
Posted 12 days ago
Job Viewed
Job Description
Job Functions:
+ Develop and communicate a strategic security vision and roadmap aligned with the organization's business objectives.
+ Ensure that the security strategy guides security initiatives, technology choices, and risk management efforts.
+ Design secure architectures for software systems and infrastructure, including threat modeling, security controls, and secure coding practices.
+ Ensure that security designs are implemented consistently and meet industry best practices.
+ Ensure compliance with industry regulations, standards, and internal security policies. Monitor and report on security compliance.
+ Develop risk mitigation strategies, including security controls, incident response plans, and disaster recovery procedures.
+ Ensure that the organization's workforce is educated about security risks and best practices.
+ Lead and coordinate responses to security incidents, ensuring lessons learned are incorporated into security improvements.
Basic Qualifications:
+ Bachelor's degree in a related field, such as computer science, information security, cybersecurity, or a related discipline
+ 10 years of related experience in Information Security
Preferred Qualifications
+ Master's degree in IT, Computer Science, information security, cybersecurity, or related field
+ 12 years of related experience in Information Security
+ Certification in relevant security domains (e.g., GDSA, CISSP-ISSAP, CISM, CISA)
Must be 18 years of age or older
Benefits
In line with our commitment to employee wellbeing, our total rewards benefits package is designed to support the physical, financial, and emotional health of our employees, tailored to meet their unique and evolving needs. Our approach considers our employees' whole selves, ensuring they can thrive both in and outside of work. Here are some of the benefits we offer, which may vary based on role, location, or hours worked:
+ Healthcare (Medical, Dental, Vision)
+ Paid Time Off, Volunteer Time Off, and Holidays
+ Employer-Matched Retirement Plan
+ Employee Stock Purchase Plan
+ Short-Term and Long-Term Disability
+ Infertility Treatment, Adoption and Surrogacy Assistance
+ Tuition Reimbursement
These benefits are designed to enhance the health, protect the financial security, and provide peace of mind to our employees and their families.
Deluxe Corporation is an Equal Employment Opportunity employer: All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, disability, sex, age, ethnic or national origin, marital status, sexual orientation, gender identity or presentation, pregnancy, genetics, veteran status or any other status protected by state or federal law.
Please view the electronic EEO is the Law Poster ( which serves to inform you of your equal employment opportunity protections as part of the application process.
Reasonable Accommodation for Job Seekers with a Disability: If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please direct your inquiries to .