949 Incident Responder jobs in India
Cyber Incident Responder
Posted today
Job Viewed
Job Description
Organization: At CommBank, we never lose sight of the role we play in other people’s financial wellbeing. Our focus is to help people and businesses move forward to progress. To make the right financial decisions and achieve their dreams, targets, and aspirations. Regardless of where you work within our organisation, your initiative, talent, ideas, and energy all contribute to the impact that we can make with our work. Together we can achieve great things.
Job Title: Cyber Incident Responder
Location: Bangalore-Manyata Tech Park
Business & Team: The Cyber Attack Response Team (CART) enables the Group to respond to cyber security events and incidents. The team serves as the Tier 2 cyber incident response function and is responsible for investigation, remediation and post-incident activities.
Impact &contribution: As a Cyber Security Incident Responder you will be responsible for responding to cyber attacks through preparation, investigation, remediation, and post-incident activities. The role involves working closely with various departments to ensure the organisation's ability to prevent, detect, and respond to cyber security incidents is continuously improved.
Roles & responsibilities:
As a Cyber Security Incident Responder, you will:
Essential skills:
Education Qualification: Bachelor’s degree or Master’s degree in Engineering in Computer Science/Information Technology
If you're already part of the Commonwealth Bank Group (including Bankwest, x15ventures), you'll need to apply through to submit a valid application. We’re keen to support you with the next step in your career.
We're aware of some accessibility issues on this site, particularly for screen reader users. We want to make finding your dream job as easy as possible, so if you require additional support please contact HR Direct on 1800 989 696.
Advertising End Date: 29/07/2025Cyber Incident Responder
Posted today
Job Viewed
Job Description
Job Description
Who are we?
Accenture is a global professional services company with leading capabilities in digital, cloud and security. Find out more about us at ***.
Accenture Security
Our cybersecurity business is rapidly growing, and we are hiring Junior-mid level security professionals within a range of disciplines to support our goal and mission of doing our part to secure the most critical systems and organisations for our way of life to thrive in Australia.
As a member of the Threat Analysis and Response Team within the global Cyber Incident Response (CIRT) Tower, you will play a key role in investigating security incidents identified through infrastructure monitoring. This includes addressing potential hacking attempts, intrusions, malware infections, information mishandling, and other security threats that could negatively impact Accenture. You will also provide support during major incidents and investigations, as well as engage in threat hunting activities.
Key Responsibilities:
- Conduct investigations of security incidents, providing analysis and recommending corrective actions to address identified threats.
- Participate in threat hunting activities to proactively identify and neutralize potential security threats.
- Coordinate with internal teams to support a comprehensive security response.
- Operate endpoint security and SIEM solutions to detect, analyze, and respond to cyber threats.
Working Arrangements: Flexible (Location should be one of the base locations of Accenture)
Travel requirements: 0-5%. Industry-relevant trainings and certifications provided.
Relationships:
Reports to: Threat Analysis and Response Lead External relationships
Qualification
Security vendors Requirements:
- Solid understanding of computer operating systems, including server operating systems (Windows & Linux)
- Solid understanding of cloud infrastructure (Amazon, Microsoft Azure, Google)
- Familiarity with MITRE ATT&CK® Framework Proficient with EDR and SIEM platforms
- Security analysis skills (logfile analysis and analysis of mixed data sources/types)
- Ability to manipulate and present data
- Solid understanding of network protocols & architecture
- Ability to multi-task and prioritize workload
- Strong problem-solving skills
- Strong sense of ethics & values, ability to handle confidential situations with discretion
- Strong willingness to learn and grow within the role
- Excellent oral and written communication skills in English
Nice to Have:
- Experience incident response or in other operational security roles
- IT Security certifications such as CEH, Security+, BTL1, BTL2, GCIH, GCIA, GCIA, GCFA, CISSP
- Knowledge of one or more common programming languages
- Education: In course or advanced studies in Computer Sciences, Systems Engineering or related careers
Benefits of working at Accenture:
· 18 weeks paid parental leave
· Long & short-term career break opportunities
· Structured career development program
· Local and international career opportunities.
· Certified as a Family Inclusive Workplace™
· Flexible Work Arrangements - centered around Accenture’s Truly Human ethos and our commitment to supporting the health and wellbeing of our people.
· We are proud to be in the top 3 of last year’s Diversity & Inclusion Index!
We are a WORK180 Endorsed Employer, to see our benefits and policies click here
All our consulting professionals receive comprehensive training covering business acumen, technical and professional skills development. You’ll also have opportunities to hone your functional skills and expertise in an area of specialization. We offer a variety of formal and informal training programs at every level to help you acquire and build specialized skills faster. Learning takes place both on the job and through formal training conducted online, in the classroom, or in collaboration with teammates. The sheer variety of work we do, and the experience it offers, provide an unbeatable platform from which to build a career.
Accenture is a an EEO and Affirmative Action Employee of Females/Minorities/Veterans/Individuals with Disabilities.
Equal Employment Opportunity Statement for Australia:
At Accenture, we recognise that our people are multi-dimensional, and we create a work environment where all people feel like they can bring their authentic selves to work, every day.
Our unwavering commitment to inclusion and diversity unleashes innovation and creates a culture where everyone feels they have equal opportunity. Our range of progressive policies support flexibility in ‘where’, ‘when’ and ‘how’ our people work to ensure that Accenture is an organisation where you can strive for more, achieve great things and maintain the balance and wellbeing you need.
We encourage applications from all people, and we are committed to removing barriers to the recruitment process and employee lifecycle. All employment decisions shall be made without regard to age, disability status, ethnicity, gender, gender identity or expression, religion or sexual orientation and we do not tolerate discrimination. If you require adjustments to the recruitment process or have a preferred communication method, please email *** and cite the relevant Job Number, or contact us on +61 ***.
To ensure our workplace is inclusive and diverse we are setting bold goals and taking comprehensive action. To achieve these goals, we collect information that allows us to track the effectiveness of our Inclusion and Diversity programs. Learn how Accenture protects your personal data and know your rights in relation to your personal data. Read more about our Privacy Statement.
#LI_GM
Locations
Melbourne
Sydney
Additional Information
Equal Employment Opportunity Statement for Australia
At Accenture, we recognise that our people are multi-dimensional, and we create a work environment where all people feel like they can bring their authentic selves to work, every day.
Our unwavering commitment to inclusion and diversity unleashes innovation and creates a culture where everyone feels they have equal opportunity. Our range of progressive policies support flexibility in ‘where’, ‘when’ and ‘how’ our people work to ensure that Accenture is an organisation where you can strive for more, achieve great things and maintain the balance and wellbeing you need.
We encourage applications from all people, and we are committed to removing barriers to the recruitment process and employee lifecycle. All employment decisions shall be made without regard to age, disability status, ethnicity, gender, gender identity or expression, religion or sexual orientation and we do not tolerate discrimination. If you require adjustments to the recruitment process or have a preferred communication method, please email *** and cite the relevant Job Number, or contact us on +61 ***.
To ensure our workplace is inclusive and diverse we are setting bold goals and taking comprehensive action. To achieve these goals, we collect information that allows us to track the effectiveness of our Inclusion and Diversity programs. Learn how Accenture protects your personal data and know your rights in relation to your personal data. Read more about our Privacy Statement.
About Accenture
We work with one shared purpose: to deliver on the promise of technology and human ingenuity. Every day, more than 775,000 of us help our stakeholders continuously reinvent. Together, we drive positive change and deliver value to our clients, partners, shareholders, communities, and each other.
We believe that delivering value requires innovation, and innovation thrives in an inclusive and diverse environment. We actively foster a workplace free from bias, where everyone feels a sense of belonging and is respected and empowered to do their best work.
At Accenture, we see well-being holistically, supporting our people’s physical, mental, and financial health. We also provide opportunities to keep skills relevant through certifications, learning, and diverse work experiences. We’re proud to be consistently recognized as one of the World’s Best Workplaces™.
Join Accenture to work at the heart of change. Visit us at ***.
Security Incident Responder-Coralogix
Posted today
Job Viewed
Job Description
Job Description
Snowbit is looking for an experienced Security Incident Responder to join our Managed Detection and Response (MDR) team. This role requires expertise in incident response, threat hunting, and forensic investigations, with a strong emphasis on cloud environments and Kubernetes. You will lead efforts to protect our customers from advanced cyber threats while contributing to the continuous improvement of Snowbit's methodologies, processes, and technology stack.
What You'll Do:
- Leverage Snowbit's advanced MDR platform to lead large-scale incident response investigations and proactive threat-hunting initiatives.
- Conduct log analysis, and cloud artifact reviews using EDR and similar tools depending on availability, to support incident resolution and root-cause investigations.
- Investigate and respond to security incidents in containerized environments, with a specific focus on Kubernetes security and architecture.
- Research evolving cyberattack tactics, techniques, and procedures (TTPs) to strengthen customer defenses and codify insights for our services.
- Provide technical and executive briefings to customers, including recommendations to mitigate risk and enhance cybersecurity posture.
- Collaborate with internal teams, including engineering and research, to enhance Snowbit's MDR and incident response capabilities.
- Partner with customer teams (IT, DevOps, and Security) to ensure seamless integration and adoption of Snowbit's MDR services.
- Share expertise through presentations, research publications, and participation in the global cybersecurity community.
Experience:
- 3-5 years in incident response, threat hunting with strong experience in cloud security (AWS, Azure, GCP) and Kubernetes environments.
- Proven Incident response experience in complex environments.
Technical Skills:
- Demonstrates strong expertise in understanding adversary tactics and techniques, translating them into actionable investigation tasks, conducting in-depth analysis, and accurately assessing the impact.
- Familiarity with attack vectors, malware families, and campaigns.
- Deep understanding of network architecture, protocols, and operating system internals (Windows, Linux, Unix).
- Expertise in Kubernetes security, including container orchestration, workload isolation, and cluster hardening.
- Experience securing Kubernetes infrastructure, runtime security, and security monitoring.
Problem-Solving:
- Ability to work independently and collaboratively in dynamic, fast-paced environments.
Communication:
- Excellent written and verbal communication skills to interact with technical and non-technical stakeholders.
Preferred Skills:
- Scripting skills (e.g., Python, PowerShell)
- Experience with Red Team operations, penetration testing, or cyber operations.
- Hands-on knowledge of attack frameworks (e.g., MITRE ATT&CK, Metasploit, Cobalt Strike).
- Proficiency in host forensics, memory forensics, and malware analysis.
Cyber Security Incident Responder (Csir)
Posted today
Job Viewed
Job Description
- Full Time
- C++
Experience
**02.0 - 05.0 Years**
Offered Salary
**3.00 - 8.00 Lakh**
Notice Period
**Not Disclosed**
**Sequretek** is one of the very few cybersecurity companies in the world, to offer their own AI-based security products around endpoint security, user access governance, and security monitoring. Sequretek has its 5 offices across US (New Jersey, Arkansas) and India (Mumbai, Delhi, Bangalore) regions. Sequretek’ s products are covered by technology influencers like Gartner, ICSA Labs, NASSCOM, and have strategic partnerships with Intel, Ingram Micro and FIS.
The company has received recognitions from several government bodies, startup entities as well as media houses over these past several years. Very recently, Sequretek was announced “Winners of National Startup Awards 2021” by the Prime Minister's office (Govt. of India) for demonstrating its innovative use of AI in cybersecurity. Similarly, Sequretek was also announced as NASSCOM Emerge 50 Winner along with winning “Startup of the Year” by Data Security Council of India.
The solutions offered by Sequretek leverage next generation technologies like AI, ML, Deep Learning, SOAR and Big data Analytics. Sequretek’ s cutting-edge solutions ensure increased efficiency in threat detection as the element of human dependency to write rules to detect are eliminated.
Innovation has been core to Sequretek, and it highly invests in Research & Development, Malware Research, and Product Development and Engineering departments to keep up pace with the continuously evolving threat landscape.
**Why Sequretek?**
Work on cutting-edge technology and next-generation products across trending domains of Extended Detection and Response (XDR), Identity Governance and Administration (IGA) and Endpoint Security (EDR)
- Experience high performance and high growth culture
- Be a part of a young, dynamic, and trusted team of security professionals
- Be directly associated with the core cybersecurity product/s and get an exposure to collaborate alongside thought leaders & domain experts
**JOB Description**:
**Responsibilities**:
- Demonstrated understanding of information security control domains and end-to-end life-cycle cyber security incident response
- Worked on SLA based and do closure within timeline.
- Track all incident and closure of pending incident.
- MIS reporting
- Quick and able to understanding of incident.
- Proactive to showcase related incident details to seniors and client.
- Integration of devices and log forwarding.
- Working knowledge of common attack vectors and penetration techniques.
- Ability to establish, maintain and execute all components of an incident response plan, from incident intake through root cause analysis, technical remediation analysis, and reporting
- Ability to effectively triage reported cyber security events including events based on sparse symptom detail
- Ability to quickly assess ownership or requirement to transfer response execution according to incident particulars and organizational domains of responsibility.
- Ability to clearly and effectively communicate, both orally and in writing, at all levels throughout the duration of a cyber security incident.
- Ability to provide end-to-end respond adhering to global legal, regulatory and organizational requirements
- Ability to identify source, types and applicable concerns/laws as it relates to all elements of data privacy;
- Ability to adhere to regulatory reporting requirements and practices.
- Ability to have a working applied knowledge of the scope and authority of oversight agencies
- Ability to define, document, and communicate root cause analysis and security control (people, process, technology) recommendations to minimize future incident occurrence
- Ability to maintain, advance, and report meaningful incident metrics
Work Location
- Mumbai
**Required Knowledge, Skills, and Abilities**:
- C++
Cyber Security Incident Responder (Csir)
Posted today
Job Viewed
Job Description
- Full Time
- C++
Experience
**02.0 - 05.0 Years**
Offered Salary
**3.00 - 8.00 Lakh**
Notice Period
**Not Disclosed**
**Sequretek** is one of the very few cybersecurity companies in the world, to offer their own AI-based security products around endpoint security, user access governance, and security monitoring. Sequretek has its 5 offices across US (New Jersey, Arkansas) and India (Mumbai, Delhi, Bangalore) regions. Sequretek’ s products are covered by technology influencers like Gartner, ICSA Labs, NASSCOM, and have strategic partnerships with Intel, Ingram Micro and FIS.
The company has received recognitions from several government bodies, startup entities as well as media houses over these past several years. Very recently, Sequretek was announced “Winners of National Startup Awards 2021” by the Prime Minister's office (Govt. of India) for demonstrating its innovative use of AI in cybersecurity. Similarly, Sequretek was also announced as NASSCOM Emerge 50 Winner along with winning “Startup of the Year” by Data Security Council of India.
The solutions offered by Sequretek leverage next generation technologies like AI, ML, Deep Learning, SOAR and Big data Analytics. Sequretek’ s cutting-edge solutions ensure increased efficiency in threat detection as the element of human dependency to write rules to detect are eliminated.
Innovation has been core to Sequretek, and it highly invests in Research & Development, Malware Research, and Product Development and Engineering departments to keep up pace with the continuously evolving threat landscape.
**Why Sequretek?**
Work on cutting-edge technology and next-generation products across trending domains of Extended Detection and Response (XDR), Identity Governance and Administration (IGA) and Endpoint Security (EDR)
- Experience high performance and high growth culture
- Be a part of a young, dynamic, and trusted team of security professionals
- Be directly associated with the core cybersecurity product/s and get an exposure to collaborate alongside thought leaders & domain experts
**JOB Description**:
**Responsibilities**:
- Demonstrated understanding of information security control domains and end-to-end life-cycle cyber security incident response
- Worked on SLA based and do closure within timeline.
- Track all incident and closure of pending incident.
- MIS reporting
- Quick and able to understanding of incident.
- Proactive to showcase related incident details to seniors and client.
- Integration of devices and log forwarding.
- Working knowledge of common attack vectors and penetration techniques.
- Ability to establish, maintain and execute all components of an incident response plan, from incident intake through root cause analysis, technical remediation analysis, and reporting
- Ability to effectively triage reported cyber security events including events based on sparse symptom detail
- Ability to quickly assess ownership or requirement to transfer response execution according to incident particulars and organizational domains of responsibility.
- Ability to clearly and effectively communicate, both orally and in writing, at all levels throughout the duration of a cyber security incident.
- Ability to provide end-to-end respond adhering to global legal, regulatory and organizational requirements
- Ability to identify source, types and applicable concerns/laws as it relates to all elements of data privacy;
- Ability to adhere to regulatory reporting requirements and practices.
- Ability to have a working applied knowledge of the scope and authority of oversight agencies
- Ability to define, document, and communicate root cause analysis and security control (people, process, technology) recommendations to minimize future incident occurrence
- Ability to maintain, advance, and report meaningful incident metrics
Work Location
- Mumbai
**Required Knowledge, Skills, and Abilities**:
- C++
Security Analyst

Posted today
Job Viewed
Job Description
Our mission is to be the one trusted partner to manage revenue, so providers and patients can focus on what matters most. Our priority is to always do what is best for our clients, patients and each other. With our proven and scalable operating model, we complement a healthcare organization's infrastructure, quickly driving sustainable improvements to net patient revenue and cash flows while reducing operating costs and enhancing the patient experience.
We are looking for a self-motivated Cybersecurity Analyst to join the R1 Cybersecurity Operations Team. We have a relentless focus on driving results for our customers and enabling them to invest more in patient care; in turn, this allows us to continue to grow our company and your career.
The successful candidate must be well-versed in security operations, cyber security tools, intrusion detection, and secured networks. They will serve as an expert and be responsible for providing network and security operations technical analysis, assessment, and recommendations in the areas of real-time security situational awareness, operational network system and applications systems security monitoring.
**Responsibilities** :
+ Monitoring various security tools (e.g., Crowdstrike, Proofpoint, MS Sentinel, Azure VM ) to identify potential incidents, network intrusions, and malware events, etc. to ensure confidentiality, integrity, and availability of R1's architecture and information systems are protected
+ Reviewing and analyzing log files to report any unusual or suspect activities.
+ Utilize incident response use-case workflows to follow established and repeatable processes for triaging and escalating.
+ Generating trouble tickets and performing initial validation and triage to determine whether incidents are security events using open-source intelligence (OSINT)
+ Following established incident response procedures to ensure proper escalation, analysis and resolution of security incidents.
+ Analyzing and correlating incident event data to develop preliminary root cause and corresponding remediation strategy.
+ Providing technical support for new detection capabilities, recommendations to improve upon existing tools/capabilities to protect the R1's network, and assessments for High Value Assets.
+ In this role, the successful candidate will maintain and monitor compliance with enterprise change management policies and procedures.
+ Develop and maintain metrics & reports on the status of the R1 cyber security operations program.
+ Attend and participate in Cyber security projects and the change management process. This includes interacting with business units and technical teams to understand what is coming and how their projects can be more secure from the beginning.
+ As part of the overall Cybersecurity Operations Team, work in tandem with the security operations center (SOC), incident responders (when anomalous activity and host compromise occurs), and technology infrastructure and development team members.
+ Participate in established incident response procedures to ensure proper escalation,?analysis?and resolution of security events and incidents.
+ Managing and maintaining change detection and auditing tools
+ Researching technology and application processing environments, operation, and associated user workflow to design, build, configure, implement, and document change compliance and audit rules within designated technologies.
+ Reconciling changes detected by the system to authorized changes documented in service desk and change management applications.
+ Analyzing large volumes of security event data from a variety of sources to identify suspicious and malicious activity.
+ Documenting, logging and investigating security incidents.
+ Performing case management throughout the incident lifecycle for moderately complex security incidents
+ Design, build, and documenting security technology standards, processes, and operational workflows
+ Operating and maintaining physical security monitoring systems
+ Review, investigate, track, and monitor viruses and malware propagation and eradication throughout the enterprise.
+ Monitoring compliance with enterprise security, compliance, and change management programs, policies, and processes
+ Researching Threat Intelligence sources on the latest malware, trends, patches in order to keep the Security Program up-to-date.
+ Providing metrics & reports on the status of tools, environments, and assets within the organization.
+ Database and Application security to prevent attacks via Input Validation, Cross-Site Scripting, Buffer Overflow.etc
**Required Qualifications** :
+ A minimum of 4 years of professional experience in an IT-related field
+ Intermediate knowledge of security, monitoring, and networking technologies, tools, protocols and standards
+ Knowledge of security policy, programs, process, and metrics
+ CompTIA Security+ certification or equivalent professional experience in security operations
+ Intermediate or advanced security, networking, or audit certification
+ Recent experience with static and/or dynamic code review process
+ Strong drive and passion to deliver distinctive end-products, a quick learner with a strong attention to detail and quality.
+ Excellent interpersonal and communication skills
**Desired Qualifications:**
+ A Bachelor's degree in a technical discipline (e.g., Computer Science, Business Analyst, etc.)
+ Certification (or ability to obtain certification) in at least one of the following areas: General Security (CISSP), Incident Handling (GCIH), Cloud Security (GCLD, Cloud+, CCSK), and Ethical Hacking (CEH)
+ Experience with advanced cyber security tools, network topologies, intrusion detection, and secured networks
+ In-depth understanding of NIST SP 800-61,?SOC 2 AICPA controls and frameworks.
Working in an evolving healthcare setting, we use our shared expertise to deliver innovative solutions. Our fast-growing team has opportunities to learn and grow through rewarding interactions, collaboration and the freedom to explore professional interests.
Our associates are given valuable opportunities to contribute, to innovate and create meaningful work that makes an impact in the communities we serve around the world. We also offer a culture of excellence that drives customer success and improves patient care. We believe in giving back to the community and offer a competitive benefits package. To learn more, visit: R1RCM.com .
R1 RCM Inc. ("the Company") is committed to the principles of equal employment opportunity. The Company's practices and employment decisions, including those regarding recruitment, hiring, assignment, promotion, compensation, benefits, training, discipline, and termination shall not be based on any person's age, color, national origin, citizenship status, physical or mental disability, medical condition, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status or any other characteristic protected by federal, state or local law. Furthermore, the Company is committed to providing a workplace free from harassment based on any of the foregoing protected categories.
Working in an evolving healthcare setting, we use our shared expertise to deliver innovative solutions. Our fast-growing team has opportunities to learn and grow through rewarding interactions, collaboration and the freedom to explore professional interests.
Our associates are given valuable opportunities to contribute, to innovate and create meaningful work that makes an impact in the communities we serve around the world. We also offer a culture of excellence that drives customer success and improves patient care. We believe in giving back to the community and offer a competitive benefits package. To learn more, visit: r1rcm.com
Visit us on Facebook ( is the leading provider of technology-driven solutions that transform the patient experience and financial performance of hospitals, health systems and medical groups. We are the one company that combines the deep expertise of a global workforce of revenue cycle professionals with the industry's most advanced technology platform, encompassing sophisticated analytics, AI, intelligent automation and workflow orchestration.
Headquartered near Salt Lake City, Utah, R1 employs over 29,000 people globally.
Security Analyst
Posted 3 days ago
Job Viewed
Job Description
We are looking for a highly curious and logical thinker who understands how modern web and application-level architectures work. This role is perfect for someone who loves breaking things to understand how they work — and then reporting it clearly.
You don’t need certifications — we value real skills, out-of-the-box thinking, and hands-on experience with the latest attack vectors and tools.
- Perform manual and automated application penetration testing on web apps, mobile apps, APIs, and thick clients
- Understand application logic deeply to identify business logic flaws
- Stay updated with the latest OWASP Top 10, SANS 25, and emerging attack vectors like SSRF chaining, prototype pollution, cloud misconfigurations, and more
- Write custom scripts and automate repeatable tasks to improve testing efficiency
- Clearly document vulnerabilities and communicate them effectively to customers, including risk impact and mitigation strategies
- Work closely with developers and customers to validate fixes and provide secure design suggestions
- Strong understanding of web application architecture (frontend, backend, APIs, authentication/authorization flows)
- Ability to identify and exploit application-level vulnerabilities beyond scanners
- Knowledge of modern attack techniques (SSRF, IDOR, OAuth misconfig, JWT attacks, etc.)
- Familiarity with tools like Burp Suite, Postman, custom scripts (Python/bash), and automation frameworks
- Strong communication skills to report findings professionally and clearly
- Logical thinking, curiosity, and problem-solving mindset
Be The First To Know
About the latest Incident responder Jobs in India !