What Jobs are available for Incident Responder in India?

Showing 2264 Incident Responder jobs in India

Lead Incident Responder

Haryana, Uttar Pradesh Sprinklr

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Sprinklr is the definitive, AI-native platform for Unified Customer Experience Management (Unified-CXM), empowering brands to deliver extraordinary experiences at scale - across every customer touchpoint.
By combining human instinct with the speed and efficiency of AI, Sprinklr helps brands earn trust and loyalty through personalized, seamless, and efficient customer interactions. Sprinklr's unified platform provides powerful solutions for every customer-facing team - spanning social media management, marketing, advertising, customer feedback, and omnichannel contact center management - enabling enterprises to unify data, break down silos, and act on real-time insights.
Today, 1,900+ enterprises and 60% of the Fortune 100 rely on Sprinklr to help them deliver consistent, trusted customer experiences worldwide.
**Job Description**
**Job Description**
Members of the Security Incident Response Team (SIRT) are hands-on frontline SMEs with deep technical and operational expertise in information security domain and, work to create and maintain a safe and secure operating environment for the organization and its customers, and responds to any suspected security incidents.
As a Lead Incident Responder on SIRT, you will use and maintain the tools we use to detect and respond to emerging threats in efficient and scalable ways, respond to security incidents and as an Incident Commander drives them to resolution. This leader also collaborates directly and deeply with IT, R&D, Legal, and other stakeholder teams to develop and deploy preventative security measures for the Sprinklr organization.
**Responsibilities**
+ Detect and respond to company-wide security incidents, coordinating cross-functional teams to mitigate and eradicate threats.
+ Monitor and analyze emerging threats, vulnerabilities, and exploits.
+ Methodically and comprehensively document all relevant details of any security investigation or incident
+ Contribute to the development and implementation of scalable preventative security measures (detection, monitoring, exploitation)
+ Incorporate current security trends, advisories, publications, and academic research.
+ Communicate risks and mitigations across multiple audiences.
+ Experience with operating system internals and hardening, web application and browser security, and monitoring and intrusion detection.
+ Detect and independently respond to security incidents across an organization.
+ Conduct proactive threat hunting based on threat intel.
+ Perform forensic analysis of infected hosts independently.
+ Analyze network traffic and identify attacker activity.
+ Mentor other members of the Security Incident Response Team.
+ Build and maintain scalable log ingestion and analytics platforms and tooling.
+ Perform a Postmortem root cause analysis (RCA) and incident reviews.
+ Work projects to completion across multiple teams, engineering, IT, development, communications, audit, legal.
**Requirements**
+ A minimum of 5 years' experience working with incident response.
+ 3+ years of demonstrated experience in digital forensics, log analysis, and systems analysis.
+ Demonstrated experience leading security incidents
+ 3+ years working in AWS, GCP or, Azure cloud environments.
+ 5+ years with strong knowledge of cloud computing technologies and concepts.
+ Capability to build working relationships with key stakeholders.
+ Demonstrated written and verbal communication skills especially in a fast, evolving, and technically complex scenarios
+ Experience with operating system internals and hardening, web application and browser security, and monitoring and intrusion detection.
**We focus on our mission** : Sprinklr was founded in 2009 to solve a big problem: growing enterprise complexity that separated brands from their customers. Our vision was clear: to unify fragmented teams, tools and data - helping large organizations build deeper, more meaningful connections with the people they serve. Today, Sprinklr has a unified, AI-native platform for four product suites: Sprinklr Service, Sprinklr Social, Sprinklr Marketing and Sprinklr Insights. Sprinklr is here to do three things:
+ Lead a new category of enterprise software that we call Unified-CXM.
+ Empower companies to deliver next generation, unified engagement journeys that reimagine the customer experience.
+ Create a culture of customer obsession, with trust, teamwork and accountability.
**We believe in our product** : Customers who value exceptional customer experiences have what they need on our single unified platform built with an operating system approach on a single codebase. That means that everything - and everyone - can work together to service, respond, sell, and market to customers on the channels they prefer. While Unified Customer Experience Management (Unified-CXM) as a category is just getting started, we are well on our way to creating a no-compromise, unified approach to better customer experiences for the world's leading enterprise brands.
**We invest in our people** : We offer a comprehensive suite of benefits designed to help each member of our team thrive. Sprinklr believes that you should be able to get the type of care you need for your personal well-being when you need it. We offer you and your family voluntary healthcare coverage in countries where applicable. We believe it is important to take time off - it is essential for your mental and physical wellbeing. We provide Sprinklrites with paid time off to recharge and spend time with loved ones. We want to grow our talent with purpose. Our open Mentoring Program is designed to create meaningful connections that support growth and amplify our focus.
To learn more about employee benefits by region, click here ( .
To learn more about all-things-Sprinklr, visit our candidate resource hub here ( .
**Why You'll Love Sprinklr:**
We're committed to creating a culture where you feel like you belong, are happier today than you were yesterday, and your contributions matter. At Sprinklr, we passionately, genuinely care. For full-time employees, we provide a range of comprehensive health plans, leading well-being programs, and financial protection for you and your family through a range of global and localized plans throughout the world.
For more information on Sprinklr Benefits around the world, head to to browse our country-specific benefits guides.
**We focus on our mission:** We founded Sprinklr with one mission: to enable every organization on the planet to make their customers happier. Our vision is to be the world's most loved enterprise software company, ever.
We believe in our product: Sprinklr was built from the ground up to enable a brand's digital transformation. Its platform provides every customer-facing team with the ability to reach, engage, and listen to customers around the world. At Sprinklr, we have many of the world's largest brands as our clients, and our employees have the opportunity to work closely alongside them.
**We invest in our people:** At Sprinklr, we believe every human has the potential to be amazing. We empower each Sprinklrite in the journey toward achieving their personal and professional best. For wellbeing, this includes daily meditation breaks and virtual fitness. We have continuous learning opportunities available with LinkedIn Learning and more.
**EEO - Our philosophy** : Our goal is to ensure every employee feels like they belong and are operating in a collaborative environment. We fervently believe every employee matters and should be respected and heard. We believe we are stronger when we belong because collectively, we're more innovative, creative, and successful. 
Sprinklr is proud to be an equal-opportunity workplace and complies with all applicable federal, state, and local fair employment practices laws. We are committed to equal employment opportunity regardless of race, color, religion, creed, national origin or ancestry, ethnicity, sex (including gender, pregnancy, sexual orientation, and gender identity), age, physical or mental disability, citizenship, past, current, or prospective service in the uniformed services, genetic information, or any other characteristic protected under applicable law.
Reasonable accommodations are available upon request during the interview process. To request an accommodation, please work directly with your recruitment coordinator or recruiter.
**Warning about Recruiting Scams:** Please be vigilant for recruiting scams impersonating Sprinklr. Sprinklr will never ask you for money, to pay for equipment, or for unnecessary personal information during the interview process. Sprinklr will also never pay in Bitcoin or send email communications from our executives. Please review ( the Federal Trade Commission's advice to avoid these types of scams.
If you are contacted by someone whom you suspect may not be appropriately representing Sprinklr, please do not engage and block their email or phone number immediately.
External Field
We're excited that you're interested in joining Sprinklr!
Please check back frequently to follow up on the progress of your application and continue to update your contact information as appropriate.
Here at Sprinklr, we're on a mission to help every organization on the planet create unified experiences that make customers happier. That customer obsession mirrors our commitment to our own people - to treating them like family, and to sharing a culture that reflects our values.
Our goal is to ensure every employee feels like they belong and are operating in a judgment-free zone regardless of gender, race, ethnicity, age, and lifestyle preference, among others. We value and celebrate diversity and fervently believe every employee matters and should be respected and heard. We believe we are stronger when we belong because collectively, we're more innovative, creative, and successful.
Sprinklr is proud to be an equal employment opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status.
See Sprinklr's EEO Policy and Equal Employment Opportunity is the Law notice.
Reasonable accommodations are available upon request during the interview process. To request an accommodation, please work directly with your recruitment coordinator or recruiter.
Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.

Security Operations Manager

Tradeweb

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

**Company Description**
Tradeweb Markets is a world leader in the evolution of electronic trading. A fintech company serving approximately 2,500 clients - including the world's largest banks, asset managers, hedge funds, insurance companies, wealth managers and retail clients -- in more than 65 countries across the globe. Since our first trade in 1998, we have helped transform and electronify the fixed income markets. Tradeweb is a culture built on innovation, creativity and collaboration. Through a combination of very talented and driven people, innovative products and solutions, cutting-edge technology, market data, and a vast network of clients, we continue to work together to improve the way financial markets trade.
Mission: Move first and never stop. Collaborate with clients to create and build solutions that drive efficiency, connectivity, and transparency in electronic trading.
Tradeweb Markets LLC ("Tradeweb") is proud to be an EEO Minorities/Females/Protected Veterans/Disabled/Affirmative Action Employer.
Details**
Tradeweb's Security Operations team is on the front lines, protecting Tradeweb's clients and employees from the constantly evolving threat landscape. This role will help support and enhance our existing Security Operations program as part of our transformation into a hybrid operating model. The ideal candidate will have a combination of hands-on, technical experience and excellent written and verbal communication skills to explain complex issues in non-technical terms. The role will also have a chance to work with subject matter experts within cyber security, across infrastructure, data analytics, application development, and business teams.   
**Job Responsibilities**
- Reporting to the Director of Security Operations, this role will oversee a team of security operations (SOC) engineers that provide 24x7x365 detection and response capabilities for Tradeweb.
- Mature existing processes to provide measurable results across SecOps OKRs.
- As a member of Tradeweb's technical incident response team, you will be responsible for executing Tradeweb's technical incident response process focusing on disk/memory forensics, log analysis, evidence handling and formal report creation.
- Collaborate with Tradeweb's Cyber Threat Intelligence teams to ensure operations engineers are aware of current threat actor tools, techniques and procedures (TTPs).
- Manage relationships with critical security vendors in local regions to ensure they are providing a level of excellence in line with Tradeweb standards.
- Train and mentor security engineers, primarily focused on incident response, threat hunting, and security automation.
- Build internal partnerships with key business stakeholders, particularly those in our Compliance, Infrastructure, and Risk organizations.
- Publish related metrics, key performance indicators (KPIs) and key risk indicators (KRIs) as well as providing regular updates to the senior management.
**Qualifications**
- Minimum of 10 years of combined experience in information security and related technical disciplines, with at least 6 years focusing on security operations, incident response or cyber threat investigations.
- In-depth experience with Windows and Unix operating environments with a focus on disk and memory forensic analysis.
- Demonstrated experience leading and maturing security teams with a deep technical focus.
- Strong knowledge of SIEM technologies and hands-on experience with at least one of the following technologies: Splunk, ELK, XSIAM, QRadar.
- Ability to translate and operationalize technical, legal, and compliance requirements in a heavily regulated environment.
- Clear and concise communicator, can articulate cyber risk and impact across a wide range of audiences, to ensure decision makers have the information they need.
- Deep knowledge of network security architecture, internet protocols and web service technologies.
- Financial services experience is preferable, or experience in the financial technology (FinTech) area
- CISSP, CISM or equivalent qualifications preferred.
Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.

Lead Security Operations Analyst

Bengaluru, Karnataka Smarsh

Posted 9 days ago

Job Viewed

Tap Again To Close

Job Description

Smarsh is the leader in communications compliance, archiving, and analytics. We provide compliance across the broadest set of communications channels with insights on what’s being captured. Smarsh customers manage over 500 million daily conversations across 80 channels and growing. Customers include the top 10 U.S., top 8 European, top 5 Canadian, and top 3 Asian banks. The Smarsh advantage is customers stay ahead of compliance and uncover patterns and relationships hidden within their data.


At Smarsh , we’ve been helping our customers manage new forms of communication since 1998. We work closely with regulators including the SEC, FINRA, IIROC, and the PRA and FCA, and with our customers, to ensure that they understand the capabilities of today’s technology and that our platform meets their most stringent requirements. Our products include Connected Capture, Connected Archive, Web Archive & Business Solutions.


About the team:

The Lead Security Operations Analyst - plays a critical role in the Security Operations Center (SOC) by handling escalated incidents from the analysts. This role involves in-depth analysis, incident response coordination, mentoring of analysts, real time security monitoring, threat hunting and ensuring compliance with the Security policies and standards.

Skills and Experience:

  • Experience: 10 plus years of experience in cybersecurity, particularly in security operations.
  • Cybersecurity Expertise: Advanced knowledge of cybersecurity threats, vulnerabilities, malware investigation and incident response, evidence collection, communication and documentation
  • Technical Proficiency: Proficiency in operational support, Security Architecture of SIEM, SOAR, EDR, XDR, Firewalls and other security tools.
  • Analytical Skills: Strong analytical, investigative, and problem-solving skills.
  • Forensic Analysis: Experience with forensic analysis and malware analysis.
  • Certifications: Relevant certifications such as CFCE, CISSP, GCIH, or GCIA.
  • Language Skills: Excellent verbal and writing skills in English.
  • On Call Support: Rotational on call support for high severity incidents in a 24x7 environment.


Roles and Responsibilities

  • Incident Analysis: Conduct detailed analysis of escalated security incidents. Coordination of end-to-end Security Incident management on escalated incidents, ensuring timely updates to stakeholders and efficient resolution of incidents.
  • Incident Response: Lead the development and implementation of incident response plans.
  • Threat Monitoring and Analysis: Monitor security alerts and events using SIEM and other security tools. Lead and coordinate proactive threat hunting to identify potential risks and vulnerabilities. Analyze and integrate threat intelligence feeds to the platforms and stay updated on emerging threats.
  • Mentorship: Mentor and provide guidance to Security analysts on incident handling. Foster a culture of continuous improvement and learning.
  • Forensic Analysis: Perform forensic analysis and malware analysis of Computers, Cloud, Networks, Mobile devices and other digital medias
  • Architecture Design: Develop and refine architecture of Security Tools and platforms
  • Collaboration: Creatively solve problems collaborating with SecOps, Platform, Delivery, IT and Engineering team members.


Qualifications:

  • Education: Bachelor’s degree in computer science, Cybersecurity, or a related field.
  • Certifications: Advanced certifications such as CISSP, OSCP, GCIH, GSOC or GCIA.
  • Incident Response Experience: 7+ years of experience in Cyber Incident response and investigations.
  • Leadership Skills: Strong leadership and communication skills.


Why Smarsh?

Smarsh hires lifelong learners with a passion for innovating with purpose, humility and humor. Collaboration is at the heart of everything we do. We work closely with the most popular communications platforms and the world’s leading cloud infrastructure platforms. We use the latest in AI/ML technology to help our customers break new ground at scale. We are a global organization that values diversity, and we believe that providing opportunities for everyone to be their authentic self is key to our success. Smarsh leadership, culture, and commitment to developing our people have all garnered Comparably.com Best Places to Work Awards. Come join us and find out what the best work of your career looks like

Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.

Lead Security Operations Analyst

Bengaluru, Karnataka Smarsh

Posted 13 days ago

Job Viewed

Tap Again To Close

Job Description

Company Description

Smarsh is the leader in Communications Compliance, Archiving, and Analytics. We provide compliance across the broadest set of communications channels with insights on what’s being captured. Smarsh customers manage over 500 million daily conversations across 80 channels - and it’s still growing. Our customers include the top 10 U.S., top 8 European, top 5 Canadian, and top 3 Asian banks.

At Smash, we’ve been helping our customers manage new forms of communication since 1998. We work closely with regulators including the SEC, FINRA, IIROC, PRA, FCA, and with our customers, to ensure that they understand the capabilities of today’s technology and that our platform meets their most stringent requirements.


Job Description:

The Senior Security Operations Analyst is an expert-level role in the Security Operations Center (SOC), responsible for handling the most complex and critical security incidents. This role involves advanced threat analysis, incident response, and proactive threat hunting. The Senior Security Operations Analyst also contributes to the strategic improvement of the organization's security posture.


Skills and Experience :

  • Experience: 8 plus years of experience in cybersecurity, particularly in security operations.
  • Cybersecurity Expertise: Advanced knowledge of cybersecurity threats, vulnerabilities, malware investigation and incident response, evidence collection, communication and documentation
  • Technical Proficiency: Proficiency in operational support, Security Architecture of SIEM, SOAR, EDR, XDR, Firewalls and other security tools.
  • Analytical Skills: Strong analytical, investigative, and problem-solving skills.
  • Forensic Analysis: Experience with forensic analysis and malware analysis.
  • Certifications: Relevant certifications such as CFCE, CISSP, GCIH, or GCIA.
  • Language Skills: Excellent verbal and writing skills in English.
  • On Call Support: Rotational on call support for high severity incidents in a 24x7 environment.


Typical Tasks:

  • Incident Analysis: Conduct detailed analysis of escalated security incidents. Coordination of end-to-end Security Incident management on escalated incidents, ensuring timely updates to stakeholders and efficient resolution of incidents.
  • Incident Response: Lead the development and implementation of incident response plans.
  • Threat Monitoring and Analysis: Monitor security alerts and events using SIEM and other security tools. Lead and coordinate proactive threat hunting to identify potential risks and vulnerabilities. Analyze and integrate threat intelligence feeds to the platforms and stay updated on emerging threats.
  • Mentorship: Mentor and provide guidance to Security analysts on incident handling. Foster a culture of continuous improvement and learning.
  • Forensic Analysis: Perform forensic analysis and malware analysis of Computers, Cloud, Networks, Mobile devices and other digital medias
  • Architecture Design: Develop and refine architecture of Security Tools and platforms
  • Collaboration: Creatively solve problems collaborating with SecOps, Platform, Delivery, IT and Engineering team members.


Qualifications:

  • Education: Bachelor’s degree in computer science, Cybersecurity, or a related field.
  • Certifications: Advanced certifications such as CISSP, OSCP, GCIH, GSOC or GCIA.
  • Incident Response Experience: 8+ years of experience in Cyber Incident response and investigations.
  • Leadership Skills: Strong leadership and communication skills.


Why Smarsh?

Smarsh hires lifelong learners with a passion for innovating with purpose, humility and humour. Collaboration is at the heart of everything we do. We work closely with the most popular communications platforms and the world’s leading cloud infrastructure platforms. We use the latest in AI/ML technology to help our customers break new ground at scale. We are a global organization that values diversity, and we believe that providing opportunities for everyone to be their authentic self is key to our success. Smarsh leadership, culture, and commitment to developing our people have all garnered Comparably.com Best Places to Work Awards. Come join us and find out what the best work of your career looks like.

Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.

Senior Security Operations Analyst

695001 Thiruvananthapuram, Kerala ₹1200000 Annually WhatJobs Direct

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is at the forefront of digital security and is seeking a highly experienced Senior Security Operations Analyst to join their dedicated, fully remote Security Operations Center (SOC). In this critical role, you will be responsible for monitoring, detecting, analyzing, and responding to cybersecurity threats and incidents across the organization's global infrastructure. You will play a key part in safeguarding sensitive data and ensuring the resilience of our client's digital assets. This position requires a deep understanding of threat landscapes, security technologies, and incident response methodologies.

Responsibilities:
  • Monitor security alerts from various sources, including SIEM, IDS/IPS, EDR, and threat intelligence platforms.
  • Analyze security events to identify potential threats, vulnerabilities, and incidents.
  • Perform in-depth investigations into security incidents, determining scope, impact, and root cause.
  • Develop and execute incident response plans, coordinating efforts with relevant stakeholders.
  • Conduct threat hunting activities to proactively identify and mitigate emerging threats.
  • Analyze malware samples and develop detection signatures.
  • Stay current with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
  • Contribute to the development and refinement of SOC playbooks and standard operating procedures (SOPs).
  • Mentor junior analysts, providing guidance on incident analysis and response.
  • Collaborate with IT and engineering teams to implement security enhancements and remediation actions.
  • Participate in security awareness training initiatives.
  • Generate regular reports on security incidents, trends, and key performance indicators (KPIs).
  • Evaluate and recommend new security tools and technologies to enhance SOC capabilities.

Qualifications:
  • Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
  • Minimum of 5 years of experience in security operations, incident response, or threat analysis.
  • In-depth knowledge of security principles, networking protocols, and common attack vectors.
  • Hands-on experience with SIEM tools (e.g., Splunk, QRadar), EDR solutions, and IDS/IPS.
  • Proficiency in analyzing logs, network traffic, and endpoint data.
  • Familiarity with scripting languages (e.g., Python, PowerShell) for automation is a plus.
  • Relevant security certifications such as CISSP, CEH, GCIH, or OSCP are highly desirable.
  • Strong analytical and problem-solving skills.
  • Excellent communication and documentation skills, essential for remote collaboration.
  • Ability to work independently and as part of a distributed team under pressure.
  • Experience with cloud security concepts (AWS, Azure, GCP) is beneficial.

This is an exciting opportunity to join a leading cybersecurity firm in a fully remote capacity. If you are passionate about protecting organizations from cyber threats and possess a strong analytical mindset, we encourage you to apply.
Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.

Senior Security Operations Analyst

201310 Ghaziabad, Uttar Pradesh ₹75000 Annually WhatJobs Direct

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a highly skilled and experienced Senior Security Operations Analyst to join their cybersecurity team in Ghaziabad, Uttar Pradesh . This role will be a hybrid position, offering a blend of remote flexibility and in-office collaboration. You will be responsible for monitoring, detecting, analyzing, and responding to cybersecurity threats and incidents. The ideal candidate will possess a deep understanding of network security, threat intelligence, incident response, and security tools such as SIEM, IDS/IPS, and endpoint detection and response (EDR) solutions. Your duties will include analyzing security alerts, performing forensic investigations, developing and refining security playbooks, and contributing to the continuous improvement of the Security Operations Center (SOC) capabilities. You will also play a key role in threat hunting, vulnerability management, and staying abreast of the latest cybersecurity threats and trends. We are looking for a proactive individual with strong analytical and problem-solving skills, excellent communication abilities, and the capacity to work effectively under pressure. This position offers a challenging and rewarding environment where you can utilize your expertise to protect critical information assets. If you are passionate about cybersecurity and possess a proven track record in security operations, we encourage you to apply.
Responsibilities:
  • Monitor security alerts and logs from various sources (SIEM, IDS/IPS, EDR) to detect potential threats.
  • Analyze security incidents, perform root cause analysis, and provide timely incident response.
  • Develop, maintain, and execute security playbooks and standard operating procedures.
  • Conduct threat hunting activities to proactively identify and mitigate emerging threats.
  • Participate in forensic investigations to gather evidence and understand the scope of security breaches.
  • Stay current with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
  • Collaborate with internal teams and external partners to share threat intelligence and coordinate response efforts.
  • Contribute to the improvement of security tools and technologies.
  • Perform vulnerability assessments and assist in remediation efforts.
  • Generate reports on security incidents, trends, and SOC performance.
  • Participate in on-call rotation for incident response.
Qualifications:
  • Bachelor's degree in Computer Science, Cybersecurity, or a related field, or equivalent practical experience.
  • Minimum of 5 years of experience in Security Operations Center (SOC) analysis or incident response.
  • In-depth knowledge of SIEM, IDS/IPS, EDR, and other security monitoring tools.
  • Strong understanding of network protocols, operating systems, and common attack vectors.
  • Experience with threat intelligence platforms and methodologies.
  • Proficiency in scripting languages (e.g., Python, PowerShell) is a plus.
  • Excellent analytical, problem-solving, and critical thinking skills.
  • Strong communication and documentation skills.
  • Ability to work effectively in a fast-paced, high-pressure environment.
  • Relevant security certifications (e.g., CISSP, Security+, GIAC) are highly desirable.
Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.

Senior Security Operations Analyst

201001 Noida, Uttar Pradesh ₹90000 Annually WhatJobs Direct

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a seasoned Senior Security Operations Analyst to join their cutting-edge information security team. This role, which can be performed entirely remotely, is responsible for safeguarding the organization's digital assets and ensuring the confidentiality, integrity, and availability of information systems. You will be at the forefront of threat detection, incident response, and vulnerability management. Key responsibilities include monitoring security alerts from various tools (SIEM, IDS/IPS, EDR), analyzing potential security incidents, and conducting thorough investigations to identify root causes and recommend remediation steps. You will develop and refine security playbooks, contribute to security awareness training, and stay current with emerging threats and security technologies. The ideal candidate will possess a strong understanding of network security principles, operating systems, and common attack vectors. Experience with security frameworks (e.g., NIST, ISO 27001) and relevant certifications (e.g., CISSP, CompTIA Security+) is highly desirable. You will collaborate with IT infrastructure teams, application developers, and business units to implement and maintain robust security controls. This position requires excellent analytical skills, a keen eye for detail, and the ability to make sound decisions under pressure. Strong written and verbal communication skills are essential for documenting incidents and communicating findings to various stakeholders. As a remote employee, you will need to be self-motivated, disciplined, and adept at managing your workload independently while actively participating in virtual team discussions and collaborations. This is an excellent opportunity for a dedicated security professional to contribute to a secure digital environment and grow their expertise.
Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Incident responder Jobs in India !

Senior Security Operations Analyst

160001 Chandigarh, Chandigarh ₹1800000 Annually WhatJobs Direct

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is a leading cybersecurity firm dedicated to protecting organizations from evolving digital threats. We are expanding our global Security Operations Center (SOC) and seeking a Senior Security Operations Analyst to join our fully remote team. This role is critical in identifying, analyzing, and responding to security incidents across our clients' environments. You will leverage advanced security tools and threat intelligence to safeguard critical assets and minimize risk. As a remote-first position, you'll have the opportunity to work from anywhere while contributing to a vital mission.

Responsibilities:
  • Monitor security alerts and logs from various sources, including SIEM, IDS/IPS, EDR, and firewalls, to detect and investigate potential security incidents.
  • Perform in-depth analysis of security events to determine the scope, impact, and root cause of incidents.
  • Develop and execute incident response plans, coordinating efforts with internal teams and external stakeholders.
  • Conduct threat hunting activities to proactively identify advanced persistent threats (APTs) and other sophisticated attacks.
  • Analyze threat intelligence feeds and reports to understand emerging threats and vulnerabilities relevant to our clients.
  • Develop and refine security monitoring rules, detection logic, and alerting mechanisms.
  • Create detailed incident reports and post-incident reviews, providing recommendations for security improvements.
  • Stay up-to-date with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
  • Contribute to the continuous improvement of SOC processes, tools, and procedures.
  • Mentor junior analysts and share knowledge within the SOC team.
Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field, or equivalent practical experience.
  • 5+ years of experience in a Security Operations Center (SOC) or incident response role.
  • Proven expertise in SIEM platforms (e.g., Splunk, QRadar, LogRhythm), IDS/IPS, EDR, and network security monitoring tools.
  • Strong understanding of common attack vectors, malware analysis, and incident response methodologies (e.g., NIST).
  • Experience with threat intelligence platforms and frameworks.
  • Proficiency in scripting languages (e.g., Python, PowerShell) for automation is highly desirable.
  • Excellent analytical, problem-solving, and critical thinking skills.
  • Ability to work independently and collaboratively in a fast-paced, remote environment.
  • Strong communication skills, both written and verbal, for clear incident reporting and stakeholder communication.
  • Relevant certifications such as CISSP, GCIA, GCIH, or CEH are a plus.
Join our dedicated team and play a crucial role in defending against cyber threats in a flexible, remote work setting. We offer a competitive salary, comprehensive benefits, and opportunities for career advancement in the cybersecurity field.
Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.

Senior Security Operations Analyst

695001 Thiruvananthapuram, Kerala ₹1000000 Annually WhatJobs Direct

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is actively recruiting a Senior Security Operations Analyst to bolster their cybersecurity defenses. This position, located in the tech-forward city of Thiruvananthapuram, Kerala , offers a flexible remote work arrangement. You will be a critical member of the Security Operations Center (SOC), responsible for monitoring, detecting, analyzing, and responding to cybersecurity threats and incidents. This involves leveraging advanced security tools and technologies to identify malicious activities, perform forensic analysis, and develop containment and eradication strategies. The ideal candidate will possess a deep understanding of threat landscapes, attack vectors, and security best practices. You should have hands-on experience with SIEM tools, IDS/IPS, endpoint detection and response (EDR) solutions, and vulnerability management platforms. Strong analytical and investigative skills are crucial, along with the ability to work under pressure and make critical decisions during security incidents. Responsibilities include developing and refining security monitoring procedures, conducting threat hunting exercises, documenting incident response activities, and contributing to the continuous improvement of the SOC's capabilities. You will also collaborate with other IT and security teams to implement security controls and address identified vulnerabilities. A Bachelor's degree in Computer Science, Information Technology, or a related field, coupled with at least 5-7 years of experience in security operations, incident response, or a similar cybersecurity role, is required. Relevant security certifications such as CISSP, GIAC, or Security+ are highly valued.
Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.

Senior Security Operations Analyst

248001 Dehradun, Uttarakhand ₹60000 Monthly WhatJobs Direct

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a highly vigilant and experienced Senior Security Operations Analyst to join their dedicated Information Security team. This critical role involves monitoring, detecting, and responding to cyber threats to protect the organization's digital assets. You will be at the forefront of cybersecurity, analyzing security alerts, investigating potential incidents, and implementing countermeasures to mitigate risks. This position is integral to safeguarding sensitive data and maintaining the integrity of our IT infrastructure. You will work extensively with security information and event management (SIEM) systems, intrusion detection/prevention systems (IDPS), and other security tools to ensure comprehensive threat coverage.

The ideal candidate possesses a deep understanding of common attack vectors, threat landscapes, and incident response methodologies. You should have a proven ability to perform in-depth forensic analysis, identify vulnerabilities, and recommend remediation strategies. Excellent analytical and problem-solving skills are paramount, as is the ability to remain calm and effective under pressure. You will collaborate with internal IT teams, business units, and potentially external agencies during incident response. This role requires a proactive approach to security, staying updated on the latest threat intelligence and security best practices. Experience in developing and refining security policies and procedures is highly desirable. The successful candidate will contribute significantly to the overall security posture of the organization in the **information security domain, located in Dehradun, Uttarakhand, IN**. If you are a security-minded professional with a passion for defending against cyber threats, this is an excellent opportunity to make a significant impact.

Responsibilities:
  • Monitor security alerts and events from various security tools (SIEM, IDPS, EDR).
  • Investigate security incidents, perform forensic analysis, and determine root causes.
  • Respond to security incidents, develop containment strategies, and execute remediation plans.
  • Analyze threat intelligence and vulnerabilities to proactively identify and mitigate risks.
  • Develop and maintain security operational procedures and documentation.
  • Collaborate with IT teams to implement security controls and best practices.
  • Conduct regular security audits and vulnerability assessments.
  • Prepare incident reports and provide regular updates to management.
  • Stay current with emerging threats, vulnerabilities, and security technologies.
  • Contribute to the development and improvement of the Security Operations Center (SOC) capabilities.
Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, or a related field.
  • 3-5 years of experience in Security Operations or Incident Response.
  • Strong knowledge of SIEM, IDPS, EDR, and other security technologies.
  • Experience with network protocols, operating systems (Windows, Linux), and cybersecurity frameworks.
  • Proficiency in security incident handling and forensic analysis.
  • Excellent analytical, problem-solving, and critical thinking skills.
  • Relevant certifications such as CompTIA Security+, CEH, or GIAC are a plus.
  • Ability to work effectively in a team environment and communicate technical information clearly.
Is this job a match or a miss?
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Incident Responder Jobs