6,686 Cybersecurity Engineers jobs in India

Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)

Kolkata, West Bengal ITC Infotech

Posted 19 days ago

Job Viewed

Tap Again To Close

Job Description

Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)


Location : Kolkata

Mode : Fulltime Work from Office (6 Days)

Shift : General


Job Description:

ITCI is hiring seasoned Senior Cybersecurity Engineers to fortify our enterprise security landscape. The role involves deep technical expertise in Endpoint Protection, DLP, IAM, and Email Security. Engineers will work within an 8x5 framework, driving proactive security management and incident response across critical enterprise systems.


Key Responsibilities:

  1. Lead the administration of endpoint security across all enterprise devices using Trend Micro solutions.
  2. Define, configure, and maintain security policies to detect threats and automate appropriate responses.
  3. Actively engage in threat hunting, analyse incidents, and deliver actionable security reports.
  4. Develop and implement effective DLP policies to protect sensitive business data.
  5. Continuously monitor and assess DLP alerts, ensuring timely escalation and resolution of genuine threats.
  6. Fine-tune DLP configurations to reduce noise, improve detection, and support business continuity.
  7. Manage user identity lifecycles including onboarding, offboarding, and access governance.
  8. Enforce strong access controls using least privilege and zero trust principles across critical systems.
  9. Integrate identity services with enterprise platforms like Azure AD and Entra ID for seamless authentication.
  10. Configure and maintain email security policies for filtering, anti-phishing, and malware defense.
  11. Proactively monitor email alerts, investigating and mitigating phishing, spoofing, and other email-based attacks.
  12. Work closely with SOC and Incident Response teams to address and contain email-borne threats effectively.


Required Skills & Qualifications:

  • Minimum 10 years of dedicated experience in Cybersecurity Engineering .
  • In-depth expertise in:
  • Trend Micro Apex one /CrowdStrike Falcon or equivalent.
  • DLP platforms (Forcepoint, Microsoft Purview, Symantec, etc.).
  • IAM systems (Azure AD, Entra ID, MIM, or similar).
  • Microsoft Defender for Office 365 (ATP)/ Proof Point/Mimecast .
  • Strong understanding of enterprise security frameworks (e.g., NIST, ISO 27001).
  • Experience with incident management, threat hunting, and policy enforcement.
  • CEH, CISSP, CISM, Microsoft SC-200/SC-300, or equivalent (optional but preferred).
  • Experience with ITSM tools, SIEM platforms (e.g. Wazuh, Microsoft Sentinel, Splunk) is a plus.
  • Maintain incident logs, root cause analysis reports, and change documentation.
  • Must work in close coordination with SOC, Infra, and Application teams.
This advertiser has chosen not to accept applicants from your region.

Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)

Kolkata, West Bengal ITC Infotech

Posted 5 days ago

Job Viewed

Tap Again To Close

Job Description

Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)

Location : Kolkata

Mode : Fulltime Work from Office (6 Days)

Shift : General

Job Description:

ITCI is hiring seasoned Senior Cybersecurity Engineers to fortify our enterprise security landscape. The role involves deep technical expertise in Endpoint Protection, DLP, IAM, and Email Security. Engineers will work within an 8x5 framework, driving proactive security management and incident response across critical enterprise systems.

Key Responsibilities:

  • Lead the administration of endpoint security across all enterprise devices using Trend Micro solutions.
  • Define, configure, and maintain security policies to detect threats and automate appropriate responses.
  • Actively engage in threat hunting, analyse incidents, and deliver actionable security reports.
  • Develop and implement effective DLP policies to protect sensitive business data.
  • Continuously monitor and assess DLP alerts, ensuring timely escalation and resolution of genuine threats.
  • Fine-tune DLP configurations to reduce noise, improve detection, and support business continuity.
  • Manage user identity lifecycles including onboarding, offboarding, and access governance.
  • Enforce strong access controls using least privilege and zero trust principles across critical systems.
  • Integrate identity services with enterprise platforms like Azure AD and Entra ID for seamless authentication.
  • Configure and maintain email security policies for filtering, anti-phishing, and malware defense.
  • Proactively monitor email alerts, investigating and mitigating phishing, spoofing, and other email-based attacks.
  • Work closely with SOC and Incident Response teams to address and contain email-borne threats effectively.

Required Skills & Qualifications:

  • Minimum 10 years of dedicated experience in Cybersecurity Engineering.
  • In-depth expertise in:
  • Trend Micro Apex one /CrowdStrike Falcon or equivalent.
  • DLP platforms (Forcepoint, Microsoft Purview, Symantec, etc.).
  • IAM systems (Azure AD, Entra ID, MIM, or similar).
  • Microsoft Defender for Office 365 (ATP)/ Proof Point/Mimecast.
  • Strong understanding of enterprise security frameworks (e.g., NIST, ISO 27001).
  • Experience with incident management, threat hunting, and policy enforcement.
  • CEH, CISSP, CISM, Microsoft SC-200/SC-300, or equivalent (optional but preferred).
  • Experience with ITSM tools, SIEM platforms (e.g. Wazuh, Microsoft Sentinel, Splunk) is a plus.
  • Maintain incident logs, root cause analysis reports, and change documentation.
  • Must work in close coordination with SOC, Infra, and Application teams.
This advertiser has chosen not to accept applicants from your region.

Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)

ITC Infotech

Posted today

Job Viewed

Tap Again To Close

Job Description

Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)

Location : Kolkata

Mode : Fulltime Work from Office (6 Days)

Shift : General

Job Description:

ITCI is hiring seasoned Senior Cybersecurity Engineers to fortify our enterprise security landscape. The role involves deep technical expertise in Endpoint Protection, DLP, IAM, and Email Security. Engineers will work within an 8x5 framework, driving proactive security management and incident response across critical enterprise systems.

Key Responsibilities:

  1. Lead the administration of endpoint security across all enterprise devices using Trend Micro solutions.
  2. Define, configure, and maintain security policies to detect threats and automate appropriate responses.
  3. Actively engage in threat hunting, analyse incidents, and deliver actionable security reports.
  4. Develop and implement effective DLP policies to protect sensitive business data.
  5. Continuously monitor and assess DLP alerts, ensuring timely escalation and resolution of genuine threats.
  6. Fine-tune DLP configurations to reduce noise, improve detection, and support business continuity.
  7. Manage user identity lifecycles including onboarding, offboarding, and access governance.
  8. Enforce strong access controls using least privilege and zero trust principles across critical systems.
  9. Integrate identity services with enterprise platforms like Azure AD and Entra ID for seamless authentication.
  10. Configure and maintain email security policies for filtering, anti-phishing, and malware defense.
  11. Proactively monitor email alerts, investigating and mitigating phishing, spoofing, and other email-based attacks.
  12. Work closely with SOC and Incident Response teams to address and contain email-borne threats effectively.

Required Skills & Qualifications:

  • Minimum 10 years of dedicated experience in Cybersecurity Engineering .
  • In-depth expertise in:
  • Trend Micro Apex one /CrowdStrike Falcon or equivalent.
  • DLP platforms (Forcepoint, Microsoft Purview, Symantec, etc.).
  • IAM systems (Azure AD, Entra ID, MIM, or similar).
  • Microsoft Defender for Office 365 (ATP)/ Proof Point/Mimecast .
  • Strong understanding of enterprise security frameworks (e.g., NIST, ISO 27001).
  • Experience with incident management, threat hunting, and policy enforcement.
  • CEH, CISSP, CISM, Microsoft SC-200/SC-300, or equivalent (optional but preferred).
  • Experience with ITSM tools, SIEM platforms (e.g. Wazuh, Microsoft Sentinel, Splunk) is a plus.
  • Maintain incident logs, root cause analysis reports, and change documentation.
  • Must work in close coordination with SOC, Infra, and Application teams.

This advertiser has chosen not to accept applicants from your region.

Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)

West Bengal, West Bengal ITC Infotech

Posted 16 days ago

Job Viewed

Tap Again To Close

Job Description

Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)


Location : Kolkata

Mode : Fulltime Work from Office (6 Days)

Shift : General


Job Description:

ITCI is hiring seasoned Senior Cybersecurity Engineers to fortify our enterprise security landscape. The role involves deep technical expertise in Endpoint Protection, DLP, IAM, and Email Security. Engineers will work within an 8x5 framework, driving proactive security management and incident response across critical enterprise systems.


Key Responsibilities:

  • Lead the administration of endpoint security across all enterprise devices using Trend Micro solutions.
  • Define, configure, and maintain security policies to detect threats and automate appropriate responses.
  • Actively engage in threat hunting, analyse incidents, and deliver actionable security reports.
  • Develop and implement effective DLP policies to protect sensitive business data.
  • Continuously monitor and assess DLP alerts, ensuring timely escalation and resolution of genuine threats.
  • Fine-tune DLP configurations to reduce noise, improve detection, and support business continuity.
  • Manage user identity lifecycles including onboarding, offboarding, and access governance.
  • Enforce strong access controls using least privilege and zero trust principles across critical systems.
  • Integrate identity services with enterprise platforms like Azure AD and Entra ID for seamless authentication.
  • Configure and maintain email security policies for filtering, anti-phishing, and malware defense.
  • Proactively monitor email alerts, investigating and mitigating phishing, spoofing, and other email-based attacks.
  • Work closely with SOC and Incident Response teams to address and contain email-borne threats effectively.


Required Skills & Qualifications:

  • Minimum 10 years of dedicated experience in Cybersecurity Engineering .
  • In-depth expertise in:
  • Trend Micro Apex one /CrowdStrike Falcon or equivalent.
  • DLP platforms (Forcepoint, Microsoft Purview, Symantec, etc.).
  • IAM systems (Azure AD, Entra ID, MIM, or similar).
  • Microsoft Defender for Office 365 (ATP)/ Proof Point/Mimecast .
  • Strong understanding of enterprise security frameworks (e.g., NIST, ISO 27001).
  • Experience with incident management, threat hunting, and policy enforcement.
  • CEH, CISSP, CISM, Microsoft SC-200/SC-300, or equivalent (optional but preferred).
  • Experience with ITSM tools, SIEM platforms (e.g. Wazuh, Microsoft Sentinel, Splunk) is a plus.
  • Maintain incident logs, root cause analysis reports, and change documentation.
  • Must work in close coordination with SOC, Infra, and Application teams.
This advertiser has chosen not to accept applicants from your region.

Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)

Kolkata, West Bengal ITC Infotech

Posted today

Job Viewed

Tap Again To Close

Job Description

Senior Cybersecurity Engineers - (DLP, Email Security, Endpoint Security)


Location : Kolkata

Mode : Fulltime Work from Office (6 Days)

Shift : General


Job Description:

ITCI is hiring seasoned Senior Cybersecurity Engineers to fortify our enterprise security landscape. The role involves deep technical expertise in Endpoint Protection, DLP, IAM, and Email Security. Engineers will work within an 8x5 framework, driving proactive security management and incident response across critical enterprise systems.


Key Responsibilities:

  1. Lead the administration of endpoint security across all enterprise devices using Trend Micro solutions.
  2. Define, configure, and maintain security policies to detect threats and automate appropriate responses.
  3. Actively engage in threat hunting, analyse incidents, and deliver actionable security reports.
  4. Develop and implement effective DLP policies to protect sensitive business data.
  5. Continuously monitor and assess DLP alerts, ensuring timely escalation and resolution of genuine threats.
  6. Fine-tune DLP configurations to reduce noise, improve detection, and support business continuity.
  7. Manage user identity lifecycles including onboarding, offboarding, and access governance.
  8. Enforce strong access controls using least privilege and zero trust principles across critical systems.
  9. Integrate identity services with enterprise platforms like Azure AD and Entra ID for seamless authentication.
  10. Configure and maintain email security policies for filtering, anti-phishing, and malware defense.
  11. Proactively monitor email alerts, investigating and mitigating phishing, spoofing, and other email-based attacks.
  12. Work closely with SOC and Incident Response teams to address and contain email-borne threats effectively.


Required Skills & Qualifications:

  • Minimum 10 years of dedicated experience in Cybersecurity Engineering .
  • In-depth expertise in:
  • Trend Micro Apex one /CrowdStrike Falcon or equivalent.
  • DLP platforms (Forcepoint, Microsoft Purview, Symantec, etc.).
  • IAM systems (Azure AD, Entra ID, MIM, or similar).
  • Microsoft Defender for Office 365 (ATP)/ Proof Point/Mimecast .
  • Strong understanding of enterprise security frameworks (e.g., NIST, ISO 27001).
  • Experience with incident management, threat hunting, and policy enforcement.
  • CEH, CISSP, CISM, Microsoft SC-200/SC-300, or equivalent (optional but preferred).
  • Experience with ITSM tools, SIEM platforms (e.g. Wazuh, Microsoft Sentinel, Splunk) is a plus.
  • Maintain incident logs, root cause analysis reports, and change documentation.
  • Must work in close coordination with SOC, Infra, and Application teams.
This advertiser has chosen not to accept applicants from your region.

Sr Information Security Architect

Noida, Uttar Pradesh UKG (Ultimate Kronos Group)

Posted 17 days ago

Job Viewed

Tap Again To Close

Job Description

Company Overview
With 80,000 customers across 150 countries, UKG is the largest U.S.-based private software company in the world. And we're only getting started. Ready to bring your bold ideas and collaborative mindset to an organization that still has so much more to build and achieve? Read on.
At UKG, you get more than just a job. You get to work with purpose. Our team of U Krewers are on a mission to inspire every organization to become a great place to work through our award-winning HR technology built for all.
Here, we know that you're more than your work. That's why our benefits help you thrive personally and professionally, from wellness programs and tuition reimbursement to U Choose - a customizable expense reimbursement program that can be used for more than 200+ needs that best suit you and your family, from student loan repayment, to childcare, to pet insurance. Our inclusive culture, active and engaged employee resource groups, and caring leaders value every voice and support you in doing the best work of your career. If you're passionate about our purpose - people -then we can't wait to support whatever gives you purpose. We're united by purpose, inspired by you.
About the Role
Job Location: Noida
As a Proactive Security - Security Architect, you will be part of UKG's forward-thinking Global Security team, focused on continuously strengthening our security posture through innovation and collaboration. This global role is dedicated to proactive security identifying gaps before adversaries do-leveraging advanced techniques like breach and attack simulation, technical control validation , threat intelligence, and proactive detection strategies to stay ahead of evolving threats. Work cross-functionally to simulate, assess, and harden defenses, enabling secure-by-design principles across our enterprise.
We're not just defending-we're redefining what proactive security looks like in the HCM SaaS space. With your analytical mindset and collaborative spirit, you'll help us lead the way in building a security-first culture that protects our customers and empowers innovation.
Key Responsibilities
- Proactively Anticipate Threats - Conduct proactive threat hunting and analysis using threat intelligence, tactics, techniques and procedures (TTPs) as per MITRE ATT&CK framework. Also if needed collaborate with Threat Intel teams to emulate MITRE ATT&CK and threat actor behaviors relevant to the organization /business environment.
- Proactively validate Defenses and Technical Security Controls with Adversary-Informed Testing - Lead and execute Breach and Attack Simulations (BAS) end to end using industry-leading BAS platforms such as SafeBreach, Mandiant Security Validation , AttackIQ, Picus Security, or custom-built scripts to test control efficacy.
- Map defenses and detections to MITRE ATT&CK to uncover blind spots and improve control resiliency.
- Integrate BAS outcomes with EDR, SIEM, SOAR, Identity, Cloud layers and security telemetry to validate detection capabilities and security stack effectiveness.
- Analyze BAS results to identify control gaps and ensure timely mitigation or remediation via required tools.
- Proactive Remediation via Engineering and Hardening - Further, recommend control enhancements and help harden detection rules, prevention policies, response playbooks, and security configurations.
- Work Cross functionally and collaborate with teams including SOC, Identity & Access Management, Detection Engineering, Security Architecture, Infrastructure, and Application teams to validate technical controls and enhance detection and response capabilities against simulated threats and draft playbooks.
- Automate false positive reduction in BAS Tool and evolve detection logic based on real-world threat trends.
- Provide strategic input in secure architecture controls validation, completeness and incident response planning across cloud, on-prem, and hybrid infrastructure.
- Lead implementation and optimization of tools across endpoint, network, identity, and cloud security domains basis BAS or purple teaming outcomes.
- Drive BAS results remediation end to end for identified detection, prevention, and response control gaps.
- Proactive Security Metrics, Reporting & Communication- Define and track metrics/KPIs (for e.g. - % MITRE ATT&CK techniques validated, detection coverage improvements before and after, control drift remediation rate etc.) and prepare reports to track-attack surface coverage, control completeness, effectiveness, and detection gaps closed.
- Stay current with emerging threats, vulnerabilities, and industry trends.
Required Skills & Qualifications
- Bachelor's degree in Computer Science, Information Security, or a related field.
- 8+ years of professional experience in cybersecurity, with a focus on:
o MITRE ATT&CK Framework and TTPs
o Security Operations Center (SOC)
o Threat Intelligence, Detection Engineering
o Breach and Attack Simulation (BAS) tools, Purple Teaming
o Endpoint Detection and Response (EDR)
o Security Information and Event Management (SIEM), SOAR
o Vulnerability Management
o Identity and Access Management (IAM)
o Information Security Architecture
- Experience with threat hunting, log analysis, alert tuning, and BAS tools.
- In depth knowledge of attack lifecycle, MITRE ATT&CK, cyber kill chain, and modern threat actors.
- Deep understanding of enterprise security architecture, including cloud (AWS/Azure/GCP) and hybrid environments.
- Proficiency with tools like Splunk, Sentinel, CrowdStrike, EDR/XDR platforms, Network NDR , Firewall , WAF and security APIs.
- Excellent verbal and written communication skills, stakeholder management skills with the ability to convey complex technical concepts to diverse audiences across.
- Share knowledge, mentor others, and help drive a culture of curiosity, technical depth, and continuous improvement.
- Strong scripting skills in Python, PowerShell, or Bash and Exposure to Agile, CI/CD, or IaC pipelines are a plus.
Preferred Certifications (Not Mandatory)
- CISSP (Certified Information Systems Security Professional)
- OSCP/OSCE/Red/Purple Team certifications
- GIAC, CCSP, or other relevant cybersecurity certifications
- Vendor-specific: Mandiant (MSV) Certified Professional, SafeBreach Certified, MITRE ATT&CK Defender credentials.
Why This Role is Different - What You'll Gain:
- Global Impact: Your work will directly harden defenses across a complex, distributed enterprise.
- Innovation Playground: You'll work with bleeding-edge BAS tools, detection frameworks, and automation platforms.
- Strategic Visibility: Your threat findings will shape executive decision-making and security investment.
- Trusted Seat at the Table: Be part of a high-credibility security team that advises architecture, engineering, and leadership.
Where we're going
UKG is on the cusp of something truly special. Worldwide, we already hold the #1 market share position for workforce management and the #2 position for human capital management. Tens of millions of frontline workers start and end their days with our software, with billions of shifts managed annually through UKG solutions today. Yet it's our AI-powered product portfolio designed to support customers of all sizes, industries, and geographies that will propel us into an even brighter tomorrow!
UKG is proud to be an equal opportunity employer and is committed to promoting diversity and inclusion in the workplace, including the recruitment process.
Disability Accommodation in the Application and Interview Process
For individuals with disabilities that need additional assistance at any point in the application and interview process, please email
NOTICE ON HIRING SCAMS
UKG will never ask you for a copy of your driver's license, social security card, or passport during a job interview. For new hires, we do not ask for payment for equipment purchase, cost for training, or to receive onboarding documents. UKG does not make job offers outside of our formal hiring process. To help protect yourself against potential hiring scams, learn more about our formal hiring process, outlined here ( .
ABOUT OUR JOB DESCRIPTIONS
All job descriptions are written to accurately reflect the open job and include general work responsibilities. They do not present a comprehensive, detailed inventory of all duties, responsibilities, and qualifications required for the job. Management reserves the right to revise the job or require that other or different tasks be performed if or when circumstances change.
It is the policy of Ultimate Software to promote and assure equal employment opportunity for all current and prospective Peeps without regard to race, color, religion, sex, age, disability, marital status, familial status, sexual orientation, pregnancy, genetic information, gender identity, gender expression, national origin, ancestry, citizenship status, veteran status, and any other legally protected status entitled to protection under federal, state, or local anti-discrimination laws. This policy governs all matters related to recruitment, advertising, and initial selection of employment. It shall also apply to all other aspects of employment, including, but not limited to, compensation, promotion, demotion, transfer, lay-offs, terminations, leave of absence, and training opportunities.
This advertiser has chosen not to accept applicants from your region.

Lead Information Security Architect

Noida, Uttar Pradesh UKG (Ultimate Kronos Group)

Posted 17 days ago

Job Viewed

Tap Again To Close

Job Description

Company Overview
With 80,000 customers across 150 countries, UKG is the largest U.S.-based private software company in the world. And we're only getting started. Ready to bring your bold ideas and collaborative mindset to an organization that still has so much more to build and achieve? Read on.
At UKG, you get more than just a job. You get to work with purpose. Our team of U Krewers are on a mission to inspire every organization to become a great place to work through our award-winning HR technology built for all.
Here, we know that you're more than your work. That's why our benefits help you thrive personally and professionally, from wellness programs and tuition reimbursement to U Choose - a customizable expense reimbursement program that can be used for more than 200+ needs that best suit you and your family, from student loan repayment, to childcare, to pet insurance. Our inclusive culture, active and engaged employee resource groups, and caring leaders value every voice and support you in doing the best work of your career. If you're passionate about our purpose - people -then we can't wait to support whatever gives you purpose. We're united by purpose, inspired by you.
About the Role
Job Location: Noida
As a Proactive Security - Lead Security Architect, you will be part of UKG's forward-thinking Global Security team, focused on continuously strengthening our security posture through innovation and collaboration. This global role is dedicated to proactive security identifying gaps before adversaries do-leveraging advanced techniques like breach and attack simulation, technical control validation , threat intelligence, and proactive detection strategies to stay ahead of evolving threats. Work cross-functionally to simulate, assess, and harden defenses, enabling secure-by-design principles across our enterprise.
We're not just defending-we're redefining what proactive security looks like in the HCM SaaS space. With your analytical mindset and collaborative spirit, you'll help us lead the way in building a security-first culture that protects our customers and empowers innovation.
Key Responsibilities
- Proactively Anticipate Threats - Conduct proactive threat hunting and analysis using threat intelligence, tactics, techniques and procedures (TTPs) as per MITRE ATT&CK framework. Also if needed collaborate with Threat Intel teams to emulate MITRE ATT&CK and threat actor behaviors relevant to the organization /business environment.
- Proactively validate Defenses and Technical Security Controls with Adversary-Informed Testing - Lead and execute Breach and Attack Simulations (BAS) end to end using industry-leading BAS platforms such as SafeBreach, Mandiant Security Validation , AttackIQ, Picus Security, or custom-built scripts to test control efficacy.
- Map defenses and detections to MITRE ATT&CK to uncover blind spots and improve control resiliency.
- Integrate BAS outcomes with EDR, SIEM, SOAR, Identity, Cloud layers and security telemetry to validate detection capabilities and security stack effectiveness.
- Analyze BAS results to identify control gaps and ensure timely mitigation or remediation via required tools.
- Proactive Remediation via Engineering and Hardening - Further, recommend control enhancements and help harden detection rules, prevention policies, response playbooks, and security configurations.
- Work Cross functionally and collaborate with teams including SOC, Identity & Access Management, Detection Engineering, Security Architecture, Infrastructure, and Application teams to validate technical controls and enhance detection and response capabilities against simulated threats and draft playbooks.
- Automate false positive reduction in BAS Tool and evolve detection logic based on real-world threat trends.
- Provide strategic input in secure architecture controls validation, completeness and incident response planning across cloud, on-prem, and hybrid infrastructure.
- Lead implementation and optimization of tools across endpoint, network, identity, and cloud security domains basis BAS or purple teaming outcomes.
- Drive BAS results remediation end to end for identified detection, prevention, and response control gaps.
- Proactive Security Metrics, Reporting & Communication- Define and track metrics/KPIs (for e.g. - % MITRE ATT&CK techniques validated, detection coverage improvements before and after, control drift remediation rate etc.) and prepare reports to track-attack surface coverage, control completeness, effectiveness, and detection gaps closed.
- Stay current with emerging threats, vulnerabilities, and industry trends.
Required Skills & Qualifications
- Bachelor's degree in Computer Science, Information Security, or a related field.
- 8+ years of professional experience in cybersecurity, with a focus on:
o MITRE ATT&CK Framework and TTPs
o Security Operations Center (SOC)
o Threat Intelligence, Detection Engineering
o Breach and Attack Simulation (BAS) tools, Purple Teaming
o Endpoint Detection and Response (EDR)
o Security Information and Event Management (SIEM), SOAR
o Vulnerability Management
o Identity and Access Management (IAM)
o Information Security Architecture
- Experience with threat hunting, log analysis, alert tuning, and BAS tools.
- In depth knowledge of attack lifecycle, MITRE ATT&CK, cyber kill chain, and modern threat actors.
- Deep understanding of enterprise security architecture, including cloud (AWS/Azure/GCP) and hybrid environments.
- Proficiency with tools like Splunk, Sentinel, CrowdStrike, EDR/XDR platforms, Network NDR , Firewall , WAF and security APIs.
- Excellent verbal and written communication skills, stakeholder management skills with the ability to convey complex technical concepts to diverse audiences across.
- Share knowledge, mentor others, and help drive a culture of curiosity, technical depth, and continuous improvement.
- Strong scripting skills in Python, PowerShell, or Bash and Exposure to Agile, CI/CD, or IaC pipelines are a plus.
Preferred Certifications (Not Mandatory)
- CISSP (Certified Information Systems Security Professional)
- OSCP/OSCE/Red/Purple Team certifications
- GIAC, CCSP, or other relevant cybersecurity certifications
- Vendor-specific: Mandiant (MSV) Certified Professional, SafeBreach Certified, MITRE ATT&CK Defender credentials.
Why This Role is Different - What You'll Gain:
- Global Impact: Your work will directly harden defenses across a complex, distributed enterprise.
- Innovation Playground: You'll work with bleeding-edge BAS tools, detection frameworks, and automation platforms.
- Strategic Visibility: Your threat findings will shape executive decision-making and security investment.
- Trusted Seat at the Table: Be part of a high-credibility security team that advises architecture, engineering, and leadership.
Where we're going
UKG is on the cusp of something truly special. Worldwide, we already hold the #1 market share position for workforce management and the #2 position for human capital management. Tens of millions of frontline workers start and end their days with our software, with billions of shifts managed annually through UKG solutions today. Yet it's our AI-powered product portfolio designed to support customers of all sizes, industries, and geographies that will propel us into an even brighter tomorrow!
UKG is proud to be an equal opportunity employer and is committed to promoting diversity and inclusion in the workplace, including the recruitment process.
Disability Accommodation in the Application and Interview Process
For individuals with disabilities that need additional assistance at any point in the application and interview process, please email
NOTICE ON HIRING SCAMS
UKG will never ask you for a copy of your driver's license, social security card, or passport during a job interview. For new hires, we do not ask for payment for equipment purchase, cost for training, or to receive onboarding documents. UKG does not make job offers outside of our formal hiring process. To help protect yourself against potential hiring scams, learn more about our formal hiring process, outlined here ( .
ABOUT OUR JOB DESCRIPTIONS
All job descriptions are written to accurately reflect the open job and include general work responsibilities. They do not present a comprehensive, detailed inventory of all duties, responsibilities, and qualifications required for the job. Management reserves the right to revise the job or require that other or different tasks be performed if or when circumstances change.
It is the policy of Ultimate Software to promote and assure equal employment opportunity for all current and prospective Peeps without regard to race, color, religion, sex, age, disability, marital status, familial status, sexual orientation, pregnancy, genetic information, gender identity, gender expression, national origin, ancestry, citizenship status, veteran status, and any other legally protected status entitled to protection under federal, state, or local anti-discrimination laws. This policy governs all matters related to recruitment, advertising, and initial selection of employment. It shall also apply to all other aspects of employment, including, but not limited to, compensation, promotion, demotion, transfer, lay-offs, terminations, leave of absence, and training opportunities.
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cybersecurity engineers Jobs in India !

Information Security Architect I

Bangalore, Karnataka Arrow Electronics

Posted 17 days ago

Job Viewed

Tap Again To Close

Job Description

**Position:**
Information Security Architect I
**Job Description:**
We are seeking a highly experienced SOC Architect, Lead Analyst, to join our global Cyber Operations team. This role involves leading and enhancing our security operations capabilities across various environments, including cloud and on-premises systems. The ideal candidate will have a deep background in SOC operations, incident response, and advanced threat management, with a focus on automation and integration of cutting-edge security technologies.
**What you will be doing:**
**Leading SOC Operations:**
+ Implement, and optimize SOC architectures and processes to effectively detect and respond to cyber threats.
+ Develop and manage advanced security monitoring and SOC response frameworks, leveraging tools such as Microsoft Sentinel and other cloud-native SOC platforms.
**Case Management and Response:**
+ Lead and manage critical security events, including complex investigations and forensic analysis.
+ Develop and refine SOC playbooks and procedures to ensure efficient and effective resolution or escalation of security events.
**Automation and Integration:**
+ Implement and manage Security Orchestration, Automation, and Response (SOAR) solutions to streamline SOC operations.
+ Create and optimize automation rules and workflows to enhance incident detection and response capabilities.
+ Integrate SOC tools and platforms to ensure seamless data flow and operational efficiency.
**Threat Intelligence and Hunting:**
+ Analyze threat intelligence data to identify emerging threats and vulnerabilities and integrate this intelligence into SOC operations.
+ Conduct advanced threat hunting activities and develop strategies to proactively identify and mitigate potential threats.
**Team Leadership and Development:**
+ Mentor and guide SOC team members, including SOC Level 1 Analysts, providing leadership on complex incidents and security challenges.
+ Collaborate with other teams and departments to ensure cohesive and coordinated security efforts across the organization.
**Continuous Improvement:**
+ Stay current with the latest cybersecurity trends, threats, and technologies to continuously enhance SOC operations.
+ Contribute to the development of new use cases, dashboards, and reporting templates to improve SOC performance and visibility.
**Key Accountabilities:**
+ Shift Lead for SOC in maintaining security operations across private, hybrid, and public cloud environments.
+ Ensure timely and effective resolution of security events and escalate complex issues as necessary.
+ Ensure SOC capabilities with training and skill development that aligns with continuous improvement to handle complex and evolving cyber threats.
+ Develop custom parsers and enrichments for improved alert handling.
+ Collaborate with vendors and internal teams to resolve security issues and enhance SOC capabilities.
+ Maintain compliance with legal, regulatory, and industry standards.
**What we are looking for :**
**Experience:**
+ 7-15 years of experience in SOC roles, with a strong focus on SOC event management, threat management, and SOC architecture.
+ Proven track record of managing large-scale SOC operations in global environments. Must be a self-starter and motivated to bring more to this role and team than what is directed.
**Technical Skills:**
+ In depth experience with cloud-native security tools, including Microsoft Sentinel, Microsoft 365 Defender, and Microsoft Defender for Cloud.
+ In depth experience with endpoint detection and response (EDR) including Microsoft Defender for Endpoint.
+ In depth experience with identity concepts, including multifactor authentication, authentication protocols, user behaviors.
+ In-depth understanding of cloud and endpoint, including malware forensics, browser forensics, cloud forensics, mobile device forensics.
+ Experience with network security tools, including Palo Alto and web application firewalls (WAFs) like Akamai, Cloudflare and Azure WAF.
+ Advanced knowledge of scripting and automation using languages.
+ Experience with SOAR platforms and security automation.
**Certifications:**
+ Relevant certifications such as CISSP, CISM, CCSP, GCIH, or GIAC Security Operations Certified (GSOC) are highly desirable.
+ Additional certifications in cloud security or incident response are a plus.
**Soft Skills:**
+ Strong analytical and problem-solving skills with the ability to handle complex security events.
+ Excellent communication skills to articulate security concepts to both technical and non-technical stakeholders.
+ Highly organized, detail-oriented, and capable of working under pressure in a dynamic environment.
**Shift Coverage:** Rotational 24x7 shifts.
**Arrow Electronics, Inc. (NYSE: ARW),** an award-winning Fortune 133 and one of Fortune Magazine's Most Admired Companies. Arrow guides innovation forward for over 220,000 leading technology manufacturers and service providers. With 2024 sales of USD $27.9 billion, Arrow develops technology solutions that improve business and daily life. Our broad portfolio that spans the entire technology landscape helps customers create, make and manage forward-thinking products that make the benefits of technology accessible to as many people as possible. Learn more at .
Our strategic direction of guiding innovation forward is expressed as Five Years Out, a way of thinking about the tangible future to bridge the gap between what's possible and the practical technologies to make it happen. Learn more at .
**Location:**
IN-KA-Bangalore, India (SKAV Seethalakshmi) GESC
**Time Type:**
Full time
**Job Category:**
Information Technology
Arrow Electronics, Inc.'s policy is to provide equal employment opportunities to all qualified employees and applicants without regard to race, color, religion, age, sex, marital status, gender identity or expression, sexual orientation, national origin, disability, citizenship, veran status, genetic information, or any other characteristics protected by applicable state, federal or local laws. Our policy of equal employment opportunity and affirmative action applies to all employment decisions personnel policies and practices, or programs.
This advertiser has chosen not to accept applicants from your region.

Information Security Architect I

Vijayanagar, Karnataka Arrow Electronics

Posted today

Job Viewed

Tap Again To Close

Job Description

Description

:

We are seeking a highly experienced SOC Architect, Lead Analyst, to join our global Cyber Operations team. This role involves leading and enhancing our security operations capabilities across various environments, including cloud and on-premises systems. The ideal candidate will have a deep background in SOC operations, incident response, and advanced threat management, with a focus on automation and integration of cutting-edge security technologies.

What you will be doing:

Leading SOC Operations:

  • Implement, and optimize SOC architectures and processes to effectively detect and respond to cyber threats.
  • Develop and manage advanced security monitoring and SOC response frameworks, leveraging tools such as Microsoft Sentinel and other cloud-native SOC platforms.
  • Case Management and Response:

  • Lead and manage critical security events, including complex investigations and forensic analysis.
  • Develop and refine SOC playbooks and procedures to ensure efficient and effective resolution or escalation of security events.
  • Automation and Integration:

  • Implement and manage Security Orchestration, Automation, and Response (SOAR) solutions to streamline SOC operations.
  • Create and optimize automation rules and workflows to enhance incident detection and response capabilities.
  • Integrate SOC tools and platforms to ensure seamless data flow and operational efficiency.
  • Threat Intelligence and Hunting:

  • Analyze threat intelligence data to identify emerging threats and vulnerabilities and integrate this intelligence into SOC operations.
  • Conduct advanced threat hunting activities and develop strategies to proactively identify and mitigate potential threats.
  • Team Leadership and Development:

  • Mentor and guide SOC team members, including SOC Level 1 Analysts, providing leadership on complex incidents and security challenges.
  • Collaborate with other teams and departments to ensure cohesive and coordinated security efforts across the organization.
  • Continuous Improvement:

  • Stay current with the latest cybersecurity trends, threats, and technologies to continuously enhance SOC operations.
  • Contribute to the development of new use cases, dashboards, and reporting templates to improve SOC performance and visibility.
  • Key Accountabilities:

  • Shift Lead for SOC in maintaining security operations across private, hybrid, and public cloud environments.
  • Ensure timely and effective resolution of security events and escalate complex issues as necessary.
  • Ensure SOC capabilities with training and skill development that aligns with continuous improvement to handle complex and evolving cyber threats.
  • Develop custom parsers and enrichments for improved alert handling.
  • Collaborate with vendors and internal teams to resolve security issues and enhance SOC capabilities.
  • Maintain compliance with legal, regulatory, and industry standards.
  • What we are looking for :

    Experience:

  • 7-15 years of experience in SOC roles, with a strong focus on SOC event management, threat management, and SOC architecture.
  • Proven track record of managing large-scale SOC operations in global environments. Must be a self-starter and motivated to bring more to this role and team than what is directed. 
  • Technical Skills:

  • In depth experience with cloud-native security tools, including Microsoft Sentinel, Microsoft 365 Defender, and Microsoft Defender for Cloud.
  • In depth experience with endpoint detection and response (EDR) including Microsoft Defender for Endpoint.
  • In depth experience with identity concepts, including multifactor authentication, authentication protocols, user behaviors.
  • In-depth understanding of cloud and endpoint, including malware forensics, browser forensics, cloud forensics, mobile device forensics.
  • Experience with network security tools, including Palo Alto and web application firewalls (WAFs) like Akamai, Cloudflare and Azure WAF.
  • Advanced knowledge of scripting and automation using languages.
  • Experience with SOAR platforms and security automation.
  • Certifications:

  • Relevant certifications such as CISSP, CISM, CCSP, GCIH, or GIAC Security Operations Certified (GSOC) are highly desirable.
  • Additional certifications in cloud security or incident response are a plus.
  • Soft Skills:

  • Strong analytical and problem-solving skills with the ability to handle complex security events.
  • Excellent communication skills to articulate security concepts to both technical and non-technical stakeholders.
  • Highly organized, detail-oriented, and capable of working under pressure in a dynamic environment.
  • Shift Coverage: Rotational 24x7 shifts.

    Arrow Electronics, Inc. (NYSE: ARW), an award-winning Fortune 133 and one of Fortune Magazine’s Most Admired Companies. Arrow guides innovation forward for over 220,000 leading technology manufacturers and service providers. With 2024 sales of USD $27.9 billion, Arrow develops technology solutions that improve business and daily life. Our broad portfolio that spans the entire technology landscape helps customers create, make and manage forward-thinking products that make the benefits of technology accessible to as many people as possible. Learn more at .

    Our strategic direction of guiding innovation forward is expressed as Five Years Out, a way of thinking about the tangible future to bridge the gap between what's possible and the practical technologies to make it happen. Learn more at . 

    Location:

    IN-KA-Bangalore, India (SKAV Seethalakshmi) GESC

    Time Type:

    Full time

    Job Category:

    Information Technology
    This advertiser has chosen not to accept applicants from your region.

    Information Security Architect - Principal - IND

    Deluxe

    Posted 12 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    As a Principal Information Security Architect you will utilize your extensive cybersecurity knowledge including threat modeling, risk assessment, and security controls; expertise in secure software architecture design and security governance frameworks; proficiency in programming languages and security assessment tools.
    Job Functions:
    + Develop and communicate a strategic security vision and roadmap aligned with the organization's business objectives.
    + Ensure that the security strategy guides security initiatives, technology choices, and risk management efforts.
    + Design secure architectures for software systems and infrastructure, including threat modeling, security controls, and secure coding practices.
    + Ensure that security designs are implemented consistently and meet industry best practices.
    + Ensure compliance with industry regulations, standards, and internal security policies. Monitor and report on security compliance.
    + Develop risk mitigation strategies, including security controls, incident response plans, and disaster recovery procedures.
    + Ensure that the organization's workforce is educated about security risks and best practices.
    + Lead and coordinate responses to security incidents, ensuring lessons learned are incorporated into security improvements.
    Basic Qualifications:
    + Bachelor's degree in a related field, such as computer science, information security, cybersecurity, or a related discipline
    + 10 years of related experience in Information Security
    Preferred Qualifications
    + Master's degree in IT, Computer Science, information security, cybersecurity, or related field
    + 12 years of related experience in Information Security
    + Certification in relevant security domains (e.g., GDSA, CISSP-ISSAP, CISM, CISA)
    Must be 18 years of age or older
    Benefits
    In line with our commitment to employee wellbeing, our total rewards benefits package is designed to support the physical, financial, and emotional health of our employees, tailored to meet their unique and evolving needs. Our approach considers our employees' whole selves, ensuring they can thrive both in and outside of work. Here are some of the benefits we offer, which may vary based on role, location, or hours worked:
    + Healthcare (Medical, Dental, Vision)
    + Paid Time Off, Volunteer Time Off, and Holidays
    + Employer-Matched Retirement Plan
    + Employee Stock Purchase Plan
    + Short-Term and Long-Term Disability
    + Infertility Treatment, Adoption and Surrogacy Assistance
    + Tuition Reimbursement
    These benefits are designed to enhance the health, protect the financial security, and provide peace of mind to our employees and their families.
    Deluxe Corporation is an Equal Employment Opportunity employer: All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, disability, sex, age, ethnic or national origin, marital status, sexual orientation, gender identity or presentation, pregnancy, genetics, veteran status or any other status protected by state or federal law.
    Please view the electronic EEO is the Law Poster ( which serves to inform you of your equal employment opportunity protections as part of the application process.
    Reasonable Accommodation for Job Seekers with a Disability: If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please direct your inquiries to .
    This advertiser has chosen not to accept applicants from your region.
     

    Nearby Locations

    Other Jobs Near Me

    Industry

    1. request_quote Accounting
    2. work Administrative
    3. eco Agriculture Forestry
    4. smart_toy AI & Emerging Technologies
    5. school Apprenticeships & Trainee
    6. apartment Architecture
    7. palette Arts & Entertainment
    8. directions_car Automotive
    9. flight_takeoff Aviation
    10. account_balance Banking & Finance
    11. local_florist Beauty & Wellness
    12. restaurant Catering
    13. volunteer_activism Charity & Voluntary
    14. science Chemical Engineering
    15. child_friendly Childcare
    16. foundation Civil Engineering
    17. clean_hands Cleaning & Sanitation
    18. diversity_3 Community & Social Care
    19. construction Construction
    20. brush Creative & Digital
    21. currency_bitcoin Crypto & Blockchain
    22. support_agent Customer Service & Helpdesk
    23. medical_services Dental
    24. medical_services Driving & Transport
    25. medical_services E Commerce & Social Media
    26. school Education & Teaching
    27. electrical_services Electrical Engineering
    28. bolt Energy
    29. local_mall Fmcg
    30. gavel Government & Non Profit
    31. emoji_events Graduate
    32. health_and_safety Healthcare
    33. beach_access Hospitality & Tourism
    34. groups Human Resources
    35. precision_manufacturing Industrial Engineering
    36. security Information Security
    37. handyman Installation & Maintenance
    38. policy Insurance
    39. code IT & Software
    40. gavel Legal
    41. sports_soccer Leisure & Sports
    42. inventory_2 Logistics & Warehousing
    43. supervisor_account Management
    44. supervisor_account Management Consultancy
    45. supervisor_account Manufacturing & Production
    46. campaign Marketing
    47. build Mechanical Engineering
    48. perm_media Media & PR
    49. local_hospital Medical
    50. local_hospital Military & Public Safety
    51. local_hospital Mining
    52. medical_services Nursing
    53. local_gas_station Oil & Gas
    54. biotech Pharmaceutical
    55. checklist_rtl Project Management
    56. shopping_bag Purchasing
    57. home_work Real Estate
    58. person_search Recruitment Consultancy
    59. store Retail
    60. point_of_sale Sales
    61. science Scientific Research & Development
    62. wifi Telecoms
    63. psychology Therapy
    64. pets Veterinary
    View All Cybersecurity Engineers Jobs