3,010 Incident Responder jobs in India
Cyber Incident Responder
Posted today
Job Viewed
Job Description
Job Description
Who are we?
Accenture is a global professional services company with leading capabilities in digital, cloud and security. Find out more about us at ***.
Accenture Security
Our cybersecurity business is rapidly growing, and we are hiring Junior-mid level security professionals within a range of disciplines to support our goal and mission of doing our part to secure the most critical systems and organisations for our way of life to thrive in Australia.
As a member of the Threat Analysis and Response Team within the global Cyber Incident Response (CIRT) Tower, you will play a key role in investigating security incidents identified through infrastructure monitoring. This includes addressing potential hacking attempts, intrusions, malware infections, information mishandling, and other security threats that could negatively impact Accenture. You will also provide support during major incidents and investigations, as well as engage in threat hunting activities.
Key Responsibilities:
- Conduct investigations of security incidents, providing analysis and recommending corrective actions to address identified threats.
- Participate in threat hunting activities to proactively identify and neutralize potential security threats.
- Coordinate with internal teams to support a comprehensive security response.
- Operate endpoint security and SIEM solutions to detect, analyze, and respond to cyber threats.
Working Arrangements: Flexible (Location should be one of the base locations of Accenture)
Travel requirements: 0-5%. Industry-relevant trainings and certifications provided.
Relationships:
Reports to: Threat Analysis and Response Lead External relationships
Qualification
Security vendors Requirements:
- Solid understanding of computer operating systems, including server operating systems (Windows & Linux)
- Solid understanding of cloud infrastructure (Amazon, Microsoft Azure, Google)
- Familiarity with MITRE ATT&CK® Framework Proficient with EDR and SIEM platforms
- Security analysis skills (logfile analysis and analysis of mixed data sources/types)
- Ability to manipulate and present data
- Solid understanding of network protocols & architecture
- Ability to multi-task and prioritize workload
- Strong problem-solving skills
- Strong sense of ethics & values, ability to handle confidential situations with discretion
- Strong willingness to learn and grow within the role
- Excellent oral and written communication skills in English
Nice to Have:
- Experience incident response or in other operational security roles
- IT Security certifications such as CEH, Security+, BTL1, BTL2, GCIH, GCIA, GCIA, GCFA, CISSP
- Knowledge of one or more common programming languages
- Education: In course or advanced studies in Computer Sciences, Systems Engineering or related careers
Benefits of working at Accenture:
· 18 weeks paid parental leave
· Long & short-term career break opportunities
· Structured career development program
· Local and international career opportunities.
· Certified as a Family Inclusive Workplace™
· Flexible Work Arrangements - centered around Accenture’s Truly Human ethos and our commitment to supporting the health and wellbeing of our people.
· We are proud to be in the top 3 of last year’s Diversity & Inclusion Index!
We are a WORK180 Endorsed Employer, to see our benefits and policies click here
All our consulting professionals receive comprehensive training covering business acumen, technical and professional skills development. You’ll also have opportunities to hone your functional skills and expertise in an area of specialization. We offer a variety of formal and informal training programs at every level to help you acquire and build specialized skills faster. Learning takes place both on the job and through formal training conducted online, in the classroom, or in collaboration with teammates. The sheer variety of work we do, and the experience it offers, provide an unbeatable platform from which to build a career.
Accenture is a an EEO and Affirmative Action Employee of Females/Minorities/Veterans/Individuals with Disabilities.
Equal Employment Opportunity Statement for Australia:
At Accenture, we recognise that our people are multi-dimensional, and we create a work environment where all people feel like they can bring their authentic selves to work, every day.
Our unwavering commitment to inclusion and diversity unleashes innovation and creates a culture where everyone feels they have equal opportunity. Our range of progressive policies support flexibility in ‘where’, ‘when’ and ‘how’ our people work to ensure that Accenture is an organisation where you can strive for more, achieve great things and maintain the balance and wellbeing you need.
We encourage applications from all people, and we are committed to removing barriers to the recruitment process and employee lifecycle. All employment decisions shall be made without regard to age, disability status, ethnicity, gender, gender identity or expression, religion or sexual orientation and we do not tolerate discrimination. If you require adjustments to the recruitment process or have a preferred communication method, please email *** and cite the relevant Job Number, or contact us on +61 ***.
To ensure our workplace is inclusive and diverse we are setting bold goals and taking comprehensive action. To achieve these goals, we collect information that allows us to track the effectiveness of our Inclusion and Diversity programs. Learn how Accenture protects your personal data and know your rights in relation to your personal data. Read more about our Privacy Statement.
#LI_GM
Locations
Melbourne
Sydney
Additional Information
Equal Employment Opportunity Statement for Australia
At Accenture, we recognise that our people are multi-dimensional, and we create a work environment where all people feel like they can bring their authentic selves to work, every day.
Our unwavering commitment to inclusion and diversity unleashes innovation and creates a culture where everyone feels they have equal opportunity. Our range of progressive policies support flexibility in ‘where’, ‘when’ and ‘how’ our people work to ensure that Accenture is an organisation where you can strive for more, achieve great things and maintain the balance and wellbeing you need.
We encourage applications from all people, and we are committed to removing barriers to the recruitment process and employee lifecycle. All employment decisions shall be made without regard to age, disability status, ethnicity, gender, gender identity or expression, religion or sexual orientation and we do not tolerate discrimination. If you require adjustments to the recruitment process or have a preferred communication method, please email *** and cite the relevant Job Number, or contact us on +61 ***.
To ensure our workplace is inclusive and diverse we are setting bold goals and taking comprehensive action. To achieve these goals, we collect information that allows us to track the effectiveness of our Inclusion and Diversity programs. Learn how Accenture protects your personal data and know your rights in relation to your personal data. Read more about our Privacy Statement.
About Accenture
We work with one shared purpose: to deliver on the promise of technology and human ingenuity. Every day, more than 775,000 of us help our stakeholders continuously reinvent. Together, we drive positive change and deliver value to our clients, partners, shareholders, communities, and each other.
We believe that delivering value requires innovation, and innovation thrives in an inclusive and diverse environment. We actively foster a workplace free from bias, where everyone feels a sense of belonging and is respected and empowered to do their best work.
At Accenture, we see well-being holistically, supporting our people’s physical, mental, and financial health. We also provide opportunities to keep skills relevant through certifications, learning, and diverse work experiences. We’re proud to be consistently recognized as one of the World’s Best Workplaces™.
Join Accenture to work at the heart of change. Visit us at ***.
Security Incident Responder-Coralogix
Posted today
Job Viewed
Job Description
Job Description
Snowbit is looking for an experienced Security Incident Responder to join our Managed Detection and Response (MDR) team. This role requires expertise in incident response, threat hunting, and forensic investigations, with a strong emphasis on cloud environments and Kubernetes. You will lead efforts to protect our customers from advanced cyber threats while contributing to the continuous improvement of Snowbit's methodologies, processes, and technology stack.
What You'll Do:
- Leverage Snowbit's advanced MDR platform to lead large-scale incident response investigations and proactive threat-hunting initiatives.
- Conduct log analysis, and cloud artifact reviews using EDR and similar tools depending on availability, to support incident resolution and root-cause investigations.
- Investigate and respond to security incidents in containerized environments, with a specific focus on Kubernetes security and architecture.
- Research evolving cyberattack tactics, techniques, and procedures (TTPs) to strengthen customer defenses and codify insights for our services.
- Provide technical and executive briefings to customers, including recommendations to mitigate risk and enhance cybersecurity posture.
- Collaborate with internal teams, including engineering and research, to enhance Snowbit's MDR and incident response capabilities.
- Partner with customer teams (IT, DevOps, and Security) to ensure seamless integration and adoption of Snowbit's MDR services.
- Share expertise through presentations, research publications, and participation in the global cybersecurity community.
Experience:
- 3-5 years in incident response, threat hunting with strong experience in cloud security (AWS, Azure, GCP) and Kubernetes environments.
- Proven Incident response experience in complex environments.
Technical Skills:
- Demonstrates strong expertise in understanding adversary tactics and techniques, translating them into actionable investigation tasks, conducting in-depth analysis, and accurately assessing the impact.
- Familiarity with attack vectors, malware families, and campaigns.
- Deep understanding of network architecture, protocols, and operating system internals (Windows, Linux, Unix).
- Expertise in Kubernetes security, including container orchestration, workload isolation, and cluster hardening.
- Experience securing Kubernetes infrastructure, runtime security, and security monitoring.
Problem-Solving:
- Ability to work independently and collaboratively in dynamic, fast-paced environments.
Communication:
- Excellent written and verbal communication skills to interact with technical and non-technical stakeholders.
Preferred Skills:
- Scripting skills (e.g., Python, PowerShell)
- Experience with Red Team operations, penetration testing, or cyber operations.
- Hands-on knowledge of attack frameworks (e.g., MITRE ATT&CK, Metasploit, Cobalt Strike).
- Proficiency in host forensics, memory forensics, and malware analysis.
Cyber Security Incident Responder (Csir)
Posted 1 day ago
Job Viewed
Job Description
- Full Time
- C++
Experience
**02.0 - 05.0 Years**
Offered Salary
**3.00 - 8.00 Lakh**
Notice Period
**Not Disclosed**
**Sequretek** is one of the very few cybersecurity companies in the world, to offer their own AI-based security products around endpoint security, user access governance, and security monitoring. Sequretek has its 5 offices across US (New Jersey, Arkansas) and India (Mumbai, Delhi, Bangalore) regions. Sequretek’ s products are covered by technology influencers like Gartner, ICSA Labs, NASSCOM, and have strategic partnerships with Intel, Ingram Micro and FIS.
The company has received recognitions from several government bodies, startup entities as well as media houses over these past several years. Very recently, Sequretek was announced “Winners of National Startup Awards 2021” by the Prime Minister's office (Govt. of India) for demonstrating its innovative use of AI in cybersecurity. Similarly, Sequretek was also announced as NASSCOM Emerge 50 Winner along with winning “Startup of the Year” by Data Security Council of India.
The solutions offered by Sequretek leverage next generation technologies like AI, ML, Deep Learning, SOAR and Big data Analytics. Sequretek’ s cutting-edge solutions ensure increased efficiency in threat detection as the element of human dependency to write rules to detect are eliminated.
Innovation has been core to Sequretek, and it highly invests in Research & Development, Malware Research, and Product Development and Engineering departments to keep up pace with the continuously evolving threat landscape.
**Why Sequretek?**
Work on cutting-edge technology and next-generation products across trending domains of Extended Detection and Response (XDR), Identity Governance and Administration (IGA) and Endpoint Security (EDR)
- Experience high performance and high growth culture
- Be a part of a young, dynamic, and trusted team of security professionals
- Be directly associated with the core cybersecurity product/s and get an exposure to collaborate alongside thought leaders & domain experts
**JOB Description**:
**Responsibilities**:
- Demonstrated understanding of information security control domains and end-to-end life-cycle cyber security incident response
- Worked on SLA based and do closure within timeline.
- Track all incident and closure of pending incident.
- MIS reporting
- Quick and able to understanding of incident.
- Proactive to showcase related incident details to seniors and client.
- Integration of devices and log forwarding.
- Working knowledge of common attack vectors and penetration techniques.
- Ability to establish, maintain and execute all components of an incident response plan, from incident intake through root cause analysis, technical remediation analysis, and reporting
- Ability to effectively triage reported cyber security events including events based on sparse symptom detail
- Ability to quickly assess ownership or requirement to
Primary Technical Incident Responder (Cyber Response Team) Australia / New Zealand - Mid level
Posted today
Job Viewed
Job Description
Job Description
As the Primary Technical Cyber Responser at Accenture, you will be responsible for leading our technical response to cybersecurity incidents. You will play a crucial role in guiding and coordinating incident response efforts, conducting detailed forensic analysis, and implementing effective strategies to manage and mitigate security breaches. Your expertise will drive our incident response capabilities and contribute to our mission of delivering exceptional cybersecurity services to our clients. You will actively lead and own proactive engagements within
Key Responsibilities:
Lead and manage the technical aspects of cybersecurity incident response, including identification, containment, eradication, and recovery efforts.
Develop and oversee incident response strategies, ensuring alignment with client requirements and industry best practices.
Serve as the primary technical expert in DFIR, providing guidance on complex technical issues and leading forensic investigations.
Lead and mentor teams of highly qualified senior incident responders during incident response investigations.
Utilize advanced forensic tools and techniques to analyze and interpret evidence from compromised systems.
Monitor and analyze emerging cyber threats, vulnerabilities, and attack vectors to enhance response strategies and tools.
Leverage threat intelligence to proactively identify potential risks and mitigate their impact.
Maintain detailed documentation of incident response activities, forensic findings, and mitigation efforts.
Prepare and present comprehensive reports and post-incident reviews to clients and senior management.
Lead development and delivery of proactive engagements including threat hunts and Tabletop Exercises.
Qualification
Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or a related field. Advanced degrees or relevant certifications are advantageous:
Deep expertise in digital forensics and incident response
Extensive experience in managing and leading DFIR efforts, with a proven track record of handling complex technical incidents and security breaches.
Strong written and spoken communication skills with ability to communicate highly technical details to a senior executive audience.
Experience leading a team of highly technical team members during engagements.
Must have full working rights in Australia and/or New Zealand. No visa or sponsorship is available for this position.
Desirable:
Knowledge and experience in Cloud based attacks and cloud incident response techniques.
Familiarity with malware analysis techniques.
Ability to travel up to 20%.
Locations
Melbourne
Auckland
Additional Information
Equal Employment Opportunity Statement for Australia
At Accenture, we recognise that our people are multi-dimensional, and we create a work environment where all people feel like they can bring their authentic selves to work, every day.
Our unwavering commitment to inclusion and diversity unleashes innovation and creates a culture where everyone feels they have equal opportunity. Our range of progressive policies support flexibility in ‘where’, ‘when’ and ‘how’ our people work to ensure that Accenture is an organisation where you can strive for more, achieve great things and maintain the balance and wellbeing you need.
We encourage applications from all people, and we are committed to removing barriers to the recruitment process and employee lifecycle. All employment decisions shall be made without regard to age, disability status, ethnicity, gender, gender identity or expression, religion or sexual orientation and we do not tolerate discrimination. If you require adjustments to the recruitment process or have a preferred communication method, please email *** and cite the relevant Job Number, or contact us on +61 ***.
To ensure our workplace is inclusive and diverse we are setting bold goals and taking comprehensive action. To achieve these goals, we collect information that allows us to track the effectiveness of our Inclusion and Diversity programs. Learn how Accenture protects your personal data and know your rights in relation to your personal data. Read more about our Privacy Statement.
About Accenture
We work with one shared purpose: to deliver on the promise of technology and human ingenuity. Every day, more than 775,000 of us help our stakeholders continuously reinvent. Together, we drive positive change and deliver value to our clients, partners, shareholders, communities, and each other.
We believe that delivering value requires innovation, and innovation thrives in an inclusive and diverse environment. We actively foster a workplace free from bias, where everyone feels a sense of belonging and is respected and empowered to do their best work.
At Accenture, we see well-being holistically, supporting our people’s physical, mental, and financial health. We also provide opportunities to keep skills relevant through certifications, learning, and diverse work experiences. We’re proud to be consistently recognized as one of the World’s Best Workplaces™.
Join Accenture to work at the heart of change. Visit us at ***.
Security Analyst
Posted 1 day ago
Job Viewed
Job Description
As a member of the incident/Workorder/Change handling team , you will have the following accountabilities:
+ Will be working as an SME for Zscaler Support in Operations for ZIA, ZPA and ZDX.
+ Assess and orchestrate the current and planned security posture for NTT data's Security infrastructure, providing recommendations for improvement and risk reduction.
+ Identify and propose process improvements and identify opportunities for new processes and procedures to reduce risk.
+ Support security incident response as required; First line responder to reported or detected incidents.
+ Perform security research, analysis, security vulnerability assessments and penetration tests.
+ Provide security audit and investigation support
+ Monitor and track security systems for Vulnerability and respond to potential security Vulnerability.
+ Provide support for the Vulnerability management program.
+ Provide 24x7 support as operations team working in shifts.
+ Participate in on-call system administration support including but not limited to weekends, holidays and after-business hours as required to service the needs of the business.
**Skills and Experience**
+ 4 to 5 years+ in Information Security space.
+ Strong experiance in Service Now Ticketing tool, Dashboards and Integration.
+ Strong experience with Zscaler ZIA, ZPA and ZDX.
+ Strong experience with Vulnerability Management Program.
+ Strong experience with Qualys Vulnerability Management Tool.
+ Some good to have Experience with Crowdstrike EDR and SIEM.
+ Strong experience with multiple network operating systems, including two or more of the following: Cisco iOS, Juniper ScreenOS or Junos, Fortinet FortiOS, CheckPoint GAiA, or Palo Alto Networks PAN-OS; Tanium, Rapid 7, Nessus, Nitro ESM, Symantec SEP, Symantec Message labs, Thales encryption, Allgress, Forecpoint, Blue coat, Firepower, Cisco ISE, Carbon Black, Titus, Encase
+ Strong oral, written, and presentation abilities.
+ Experiance with M365 Copilot.
+ Some experience with Unix/Linux system administration.
+ Strong experience with logging and alerting platforms, including SIEM integration.
+ Current understanding of Industry trends and emerging threats; and Working Knowledge of incident response methodologies and technologies.
**Desirable**
+ Zscaler Certifications Associate and Professional for ZIA, ZPA and ZDX.
+ Excellent Experiance in Zscaler ZIA, ZPA and ZDX.
+ Experiance in Vulnerability Management Program.
+ Experiance in Qualys Vulnerability Management Tool.
+ Well-rounded background in network, host, database, and application security.
+ Experience implementing security controls in a bi-modal IT environment.
+ Experience driving a culture of security awareness.
+ Experience administering network devices, databases, and/or web application servers.
+ Professional IT Accreditations (CISM, CCSA, CCSE, JNCIA, CCNA, CISSP, CompTIA Security) Good to have.
**Abilities**
+ Non customer facing role but an ability to build strong relationships with internal teams, and security leadership, is essential act as Incident co-ordinator, for reviewing all security tools, ingesting incident data, tracking incident status, coordinating with internal and external assets to fulfill information requirements, and initiating escalation procedures.
+ Document daily work and new processes.
+ Embrace a culture of continuous service improvement and service excellence.
+ Stay up to date on security industry trends.
Security Analyst
Posted 1 day ago
Job Viewed
Job Description
As a member of the incident/Workorder/Change handling team , you will have the following accountabilities:
+ Will be working as an SME for Zscaler Support in Operations for ZIA, ZPA and ZDX.
+ Assess and orchestrate the current and planned security posture for NTT data's Security infrastructure, providing recommendations for improvement and risk reduction.
+ Identify and propose process improvements and identify opportunities for new processes and procedures to reduce risk.
+ Support security incident response as required; First line responder to reported or detected incidents.
+ Perform security research, analysis, security vulnerability assessments and penetration tests.
+ Provide security audit and investigation support
+ Monitor and track security systems for Vulnerability and respond to potential security Vulnerability.
+ Provide support for the Vulnerability management program.
+ Provide 24x7 support as operations team working in shifts.
+ Participate in on-call system administration support including but not limited to weekends, holidays and after-business hours as required to service the needs of the business.
**Skills and Experience**
+ 4 to 5 years+ in Information Security space.
+ Strong experiance in Service Now Ticketing tool, Dashboards and Integration.
+ Strong experience with Zscaler ZIA, ZPA and ZDX.
+ Strong experience with Vulnerability Management Program.
+ Strong experience with Qualys Vulnerability Management Tool.
+ Some good to have Experience with Crowdstrike EDR and SIEM.
+ Strong experience with multiple network operating systems, including two or more of the following: Cisco iOS, Juniper ScreenOS or Junos, Fortinet FortiOS, CheckPoint GAiA, or Palo Alto Networks PAN-OS; Tanium, Rapid 7, Nessus, Nitro ESM, Symantec SEP, Symantec Message labs, Thales encryption, Allgress, Forecpoint, Blue coat, Firepower, Cisco ISE, Carbon Black, Titus, Encase
+ Strong oral, written, and presentation abilities.
+ Experiance with M365 Copilot.
+ Some experience with Unix/Linux system administration.
+ Strong experience with logging and alerting platforms, including SIEM integration.
+ Current understanding of Industry trends and emerging threats; and Working Knowledge of incident response methodologies and technologies.
**Desirable**
+ Zscaler Certifications Associate and Professional for ZIA, ZPA and ZDX.
+ Excellent Experiance in Zscaler ZIA, ZPA and ZDX.
+ Experiance in Vulnerability Management Program.
+ Experiance in Qualys Vulnerability Management Tool.
+ Well-rounded background in network, host, database, and application security.
+ Experience implementing security controls in a bi-modal IT environment.
+ Experience driving a culture of security awareness.
+ Experience administering network devices, databases, and/or web application servers.
+ Professional IT Accreditations (CISM, CCSA, CCSE, JNCIA, CCNA, CISSP, CompTIA Security) Good to have.
**Abilities**
+ Non customer facing role but an ability to build strong relationships with internal teams, and security leadership, is essential act as Incident co-ordinator, for reviewing all security tools, ingesting incident data, tracking incident status, coordinating with internal and external assets to fulfill information requirements, and initiating escalation procedures.
+ Document daily work and new processes.
+ Embrace a culture of continuous service improvement and service excellence.
+ Stay up to date on security industry trends.
Security Analyst
Posted 1 day ago
Job Viewed
Job Description
As a member of the incident/Workorder/Change handling team , you will have the following accountabilities:
+ Will be working as an SME for Zscaler Support in Operations for ZIA, ZPA and ZDX.
+ Assess and orchestrate the current and planned security posture for NTT data's Security infrastructure, providing recommendations for improvement and risk reduction.
+ Identify and propose process improvements and identify opportunities for new processes and procedures to reduce risk.
+ Support security incident response as required; First line responder to reported or detected incidents.
+ Perform security research, analysis, security vulnerability assessments and penetration tests.
+ Provide security audit and investigation support
+ Monitor and track security systems for Vulnerability and respond to potential security Vulnerability.
+ Provide support for the Vulnerability management program.
+ Provide 24x7 support as operations team working in shifts.
+ Participate in on-call system administration support including but not limited to weekends, holidays and after-business hours as required to service the needs of the business.
**Skills and Experience**
+ 4 to 5 years+ in Information Security space.
+ Strong experiance in Service Now Ticketing tool, Dashboards and Integration.
+ Strong experience with Zscaler ZIA, ZPA and ZDX.
+ Strong experience with Vulnerability Management Program.
+ Strong experience with Qualys Vulnerability Management Tool.
+ Some good to have Experience with Crowdstrike EDR and SIEM.
+ Strong experience with multiple network operating systems, including two or more of the following: Cisco iOS, Juniper ScreenOS or Junos, Fortinet FortiOS, CheckPoint GAiA, or Palo Alto Networks PAN-OS; Tanium, Rapid 7, Nessus, Nitro ESM, Symantec SEP, Symantec Message labs, Thales encryption, Allgress, Forecpoint, Blue coat, Firepower, Cisco ISE, Carbon Black, Titus, Encase
+ Strong oral, written, and presentation abilities.
+ Experiance with M365 Copilot.
+ Some experience with Unix/Linux system administration.
+ Strong experience with logging and alerting platforms, including SIEM integration.
+ Current understanding of Industry trends and emerging threats; and Working Knowledge of incident response methodologies and technologies.
**Desirable**
+ Zscaler Certifications Associate and Professional for ZIA, ZPA and ZDX.
+ Excellent Experiance in Zscaler ZIA, ZPA and ZDX.
+ Experiance in Vulnerability Management Program.
+ Experiance in Qualys Vulnerability Management Tool.
+ Well-rounded background in network, host, database, and application security.
+ Experience implementing security controls in a bi-modal IT environment.
+ Experience driving a culture of security awareness.
+ Experience administering network devices, databases, and/or web application servers.
+ Professional IT Accreditations (CISM, CCSA, CCSE, JNCIA, CCNA, CISSP, CompTIA Security) Good to have.
**Abilities**
+ Non customer facing role but an ability to build strong relationships with internal teams, and security leadership, is essential act as Incident co-ordinator, for reviewing all security tools, ingesting incident data, tracking incident status, coordinating with internal and external assets to fulfill information requirements, and initiating escalation procedures.
+ Document daily work and new processes.
+ Embrace a culture of continuous service improvement and service excellence.
+ Stay up to date on security industry trends.
Be The First To Know
About the latest Incident responder Jobs in India !
Security Analyst
Posted 1 day ago
Job Viewed
Job Description
As a member of the incident/Workorder/Change handling team , you will have the following accountabilities:
+ Will be working as an SME for Zscaler Support in Operations for ZIA, ZPA and ZDX.
+ Assess and orchestrate the current and planned security posture for NTT data's Security infrastructure, providing recommendations for improvement and risk reduction.
+ Identify and propose process improvements and identify opportunities for new processes and procedures to reduce risk.
+ Support security incident response as required; First line responder to reported or detected incidents.
+ Perform security research, analysis, security vulnerability assessments and penetration tests.
+ Provide security audit and investigation support
+ Monitor and track security systems for Vulnerability and respond to potential security Vulnerability.
+ Provide support for the Vulnerability management program.
+ Provide 24x7 support as operations team working in shifts.
+ Participate in on-call system administration support including but not limited to weekends, holidays and after-business hours as required to service the needs of the business.
**Skills and Experience**
+ 4 to 5 years+ in Information Security space.
+ Strong experiance in Service Now Ticketing tool, Dashboards and Integration.
+ Strong experience with Zscaler ZIA, ZPA and ZDX.
+ Strong experience with Vulnerability Management Program.
+ Strong experience with Qualys Vulnerability Management Tool.
+ Some good to have Experience with Crowdstrike EDR and SIEM.
+ Strong experience with multiple network operating systems, including two or more of the following: Cisco iOS, Juniper ScreenOS or Junos, Fortinet FortiOS, CheckPoint GAiA, or Palo Alto Networks PAN-OS; Tanium, Rapid 7, Nessus, Nitro ESM, Symantec SEP, Symantec Message labs, Thales encryption, Allgress, Forecpoint, Blue coat, Firepower, Cisco ISE, Carbon Black, Titus, Encase
+ Strong oral, written, and presentation abilities.
+ Experiance with M365 Copilot.
+ Some experience with Unix/Linux system administration.
+ Strong experience with logging and alerting platforms, including SIEM integration.
+ Current understanding of Industry trends and emerging threats; and Working Knowledge of incident response methodologies and technologies.
**Desirable**
+ Zscaler Certifications Associate and Professional for ZIA, ZPA and ZDX.
+ Excellent Experiance in Zscaler ZIA, ZPA and ZDX.
+ Experiance in Vulnerability Management Program.
+ Experiance in Qualys Vulnerability Management Tool.
+ Well-rounded background in network, host, database, and application security.
+ Experience implementing security controls in a bi-modal IT environment.
+ Experience driving a culture of security awareness.
+ Experience administering network devices, databases, and/or web application servers.
+ Professional IT Accreditations (CISM, CCSA, CCSE, JNCIA, CCNA, CISSP, CompTIA Security) Good to have.
**Abilities**
+ Non customer facing role but an ability to build strong relationships with internal teams, and security leadership, is essential act as Incident co-ordinator, for reviewing all security tools, ingesting incident data, tracking incident status, coordinating with internal and external assets to fulfill information requirements, and initiating escalation procedures.
+ Document daily work and new processes.
+ Embrace a culture of continuous service improvement and service excellence.
+ Stay up to date on security industry trends.
Security Analyst

Posted 8 days ago
Job Viewed
Job Description
**Req number:**
R6019
**Employment type:**
Full time
**Worksite flexibility:**
Onsite
**Who we are**
CAI is a global technology services firm with over 8,500 associates worldwide and a yearly revenue of $1 billion+. We have over 40 years of excellence in uniting talent and technology to power the possible for our clients, colleagues, and communities. As a privately held company, we have the freedom and focus to do what is right-whatever it takes. Our tailor-made solutions create lasting results across the public and commercial sectors, and we are trailblazers in bringing neurodiversity to the enterprise.
**Job Summary**
We are looking for a motivated Security Analyst ready to take us to the next level! If you understand security monitoring, vulnerability management, and incident response and are looking forward to your next career move, apply now
**Job Description**
We are looking for a **Security Analyst** . **This position will** be **full-time** and **Onsite Gurugram.**
**What You'll Do**
+ Ensure compliance with security standards and frameworks (e.g., ISO 27001).
+ Assist in the development and enforcement of internal security policies and procedures.
+ Conduct regular audits to ensure compliance with established security protocols and guidelines.
+ Coordination with relevant stakeholders to identify, assess, and prioritize security vulnerabilities across systems and networks.
+ Coordinate in performing vulnerability assessments and penetration testing to ensure system defense are robust.
+ Collaborate with IT teams to recommend and implement patches, fixes, or configuration changes to address vulnerabilities.
+ Continuously monitor network traffic, security logs, and systems for any signs of security breaches or irregularities.
+ Maintain and manage security tools (e.g. Next gen AV, EDR, SIEM).
+ Educate employees on information security best practices, including secure password policies and safe internet use.
**What You'll Need**
+ Bachelor's degree in information security, Computer Science, Information Technology, or a related field, or Certifications (Optional)- CEH,CISM,ISO 27001:2022 Lead Auditor.
+ 3+ years of experience in a Security Analyst or related role.
+ Hands-on experience with security monitoring, vulnerability management, and incident response.
+ AV, EDR/XDR, SIEM, Network protocol.
+ Incident Response.
+ Vulnerability Assessment.
+ Familiar with the Secure SDLC Framework.
+ Windows/Linux administration.
**Physical Demands**
+ Sedentary work that involves sitting or remaining stationery most of the time with occasional need to move around the office to attend meetings, etc.
+ Ability to conduct repetitive tasks on a computer, utilizing a mouse, keyboard, and monitor.
**Reasonable accommodation statement**
If you require a reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employment selection process, please direct your inquiries to or (888) 824 - 8111.
Security Analyst
Posted 13 days ago
Job Viewed
Job Description
Job Description
Global - Risk & Compliance - Senior Security Analyst will play a significant role in our SOX Compliance
Department to standardize and operationalize our Regulatory and internal Compliance framework.
Job Details:
- Role: Global - Risk & Compliance - Senior Security Analyst
- Work Location: Pune
- Work Type: Work From Office
Responsibilities:
- Collaborate with internal stakeholders to facilitate and review documentation for certifications like ISO 27001, PCI, SOC, and HiTrust.
- Own and Initiate process improvement to Streamline Internal Assurance Process
- Point of Contact for Client Security Questionnaires and RFP/RFI responses
- Create and maintain Security Control documentation and knowledge repository
- Develop, Contribute and participate in internal controls awareness within the organization