391 Security Intelligence jobs in India

Incident Response Lead

Ralliant

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

**Position Overview:**
Ralliant is seeking a skilled **Security Operations Lead** based in India to lead international response operations and SOC mission. This role combines **incident command, response coaching** , and **technical depth** across detection and response, with a strong focus on MSSP oversight and continuous improvement. The ideal candidate brings deep experience in incident command, advanced triage/investigation skills, and the ability to communicate and report with clarity and impact.
**Key Responsibilities:**
+ Serve as **global incident commander** , driving incident response lifecycle activities including triage, containment, forensics, recovery, and lessons learned.
+ Lead and coordinate efforts across **multiple MSSP structures** :
+ A **managed defend and respond partner** delivering 24x7 coverage
+ A **staff augmentation-based MSSP** providing tiered security analyst resources.
+ Act as the **chief coach** for analysts across both in-house and partner-sourced teams-guiding investigation depth, alert tuning, and incident retrospectives.
+ Manage and report on **SOC performance metrics, SLAs, and KPIs** -focusing on mean time to detect (MTTD), mean time to respond (MTTR), false positive rates, and threat detection coverage.
+ Drive accountability and continuous improvement through **regular reporting** , operational dashboards, and escalation reviews to security leadership.
+ Leverage deep knowledge of **CrowdStrike Falcon** (EDR, Identity, Forensics) to validate detection effectiveness and lead incident investigations.
+ Support integration, optimization, and effective use of **CrowdStrike SIEM/LogScale** for advanced log correlation, threat hunting, and alert fidelity.
+ Ensure high-quality documentation and communication during incidents-including executive summaries, impact analysis, and regulatory reporting alignment (e.g., SOX, NIST 800-171).
+ Maintain and evolve incident playbooks and threat detection use cases in alignment with MITRE ATT&CK and emerging threat intelligence.
+ Actively participate in global cybersecurity strategy sessions and coordinate with peers across IT, GRC, and engineering to ensure defense-in-depth posture.
**Qualifications:**
+ 8+ years in security operations, incident response, or threat detection roles.
+ 3+ years managing or coordinating workstreams from MSSPs or staff augmentation models.
+ Strong experience in global incident command with a focus on collaboration, triage efficiency, and structured decision-making.
+ Hands-on expertise with **CrowdStrike Falcon** suite and familiarity with **CrowdStrike LogScale/SIEM** highly desirable.
+ Demonstrated ability to develop and track SOC **performance metrics** and drive data-informed decisions.
+ Deep investigative skillset including root cause analysis, endpoint/network forensics, and adversary behavior tracking.
+ Excellent written and verbal communication skills, especially for incident documentation and stakeholder briefings.
+ Familiarity with security frameworks (NIST, MITRE ATT&CK) and compliance domains (SOX, ITAR, NIST 800-171).
**Preferred Certifications:**
+ **CISSP, GCIH, GCFA, GCIA** , or similar relevant credentials.
+ Practical experience with log correlation platforms and case management tools (e.g., ServiceNow, Jira).
**Ralliant Overview**
Every day, engineers transform scientific potential into real-world impact, reshaping how we live and work. At this pivotal moment in technology, Fortive is creating a focused, standalone company poised to capitalize on powerful long-term trends with mission critical technologies advancing an electrified and digital future. Our team of scientists, engineers, and technologists is joining forces to pioneer solutions that will shape the future of industry.
Introducing Ralliant Corporation, a global technology company uniting trusted brands solving tough challenges to speed breakthroughs at leading companies, research institutions, and governments, across the semiconductor/communications/diversified electronics, industrial manufacturing, utilities, and aero, defense, and space industries.
Ralliant is fueled by a global team of changemakers, committed to continuous improvement and a strong culture rooted in disciplined execution. For more information please visit: Corporation Overview**
Ralliant, originally part of Fortive, now stands as a bold, independent public company driving innovation at the forefront of precision technology. With a global footprint and a legacy of excellence, we empower engineers to bring next-generation breakthroughs to life - faster, smarter, and more reliably. Our high-performance instruments, sensors, and subsystems fuel mission-critical advancements across industries, enabling real-world impact where it matters most. At Ralliant we're building the future, together with those driven to push boundaries, solve complex problems, and leave a lasting mark on the world.
**Bonus or Equity**
This position is also eligible for bonus and equity as part of the total compensation package.
This advertiser has chosen not to accept applicants from your region.

Incident Response Analyst

Bengaluru, Karnataka Autodesk

Posted today

Job Viewed

Tap Again To Close

Job Description

Position Overview

The Incident Response Analyst is responsible for monitoring, identifying, assessing, containing, and responding to various information security events in a large and complex environment, as well as analyse, triage, and report on these incidents and investigations. The candidate must have knowledge of system security design, network/cloud security best practices and in-depth knowledge of systems security operations, threat actors frequently used attack vectors, and general user behaviour analytics. The candidate will be part of an established security team and work closely with teams across the company in remediating security issues and driving Incident Response. The candidate should have a strong passion for security and growth and be willing to accept challenging projects and incidents.

Responsibilities
 

  • Responsible for handling day-to day operations to monitor, identity, triage and investigate security events from various Endpoint (EDR), Network and Cloud security tools and detect anomalies, and report remediation actions

  • Analyze firewall logs, server, and application logs to investigate events and incidents for anomalous activity and produce reports of findings

  • Conduct reviews and analysis of proxy logs, Microsoft Windows and Active Directory logs, and malicious code to identify, contain, eradicate, and ensure recovery from incidents

  • Help create and maintain process tools and documentation

  • Perform all stage of incident response from detection to postmortem

  • Collaborate with stakeholders in building and improving our Security Orchestration Platform

  • Clearly document notes for incidents in our case management solution

  • Perform basic forensics and malware analysis based on our playbooks and procedures

  • Responsible for working in a 24/7 environment including night shifts and the shifts are decided based on the business requirement

  • Maintain a high level of confidentiality and Integrity

  • Minimum Qualifications
     

  • BS in Computer Science, Information Security, or equivalent professional experience

  • 2+ years of cyber security experience in incident response

  • Technical depth in one or more specialties including: Malware analysis, Host analysis and Digital forensics

  • Strong understanding of Security Operations and Incident Response process and practices

  • Experience performing security monitoring, response capabilities, log analysis and forensic tools

  • Strong understanding of operating systems including Windows, Linux and OSX

  • Experience with SIEM, SOAR, EDR, Network, AWS, and Azure security tools

  • Excellent critical thinking and analytical skills, organizational skills, and the ability to work as part of a team

  • Excellent verbal and written communication skills

  • Ability to design playbooks for responding to security incidents

  • Ability to support off-hours, weekends, and holidays if needed in support of incident response

  • Preferred Qualifications
     

  • Advanced interpersonal skills to effectively promote ideas and collaboration at various levels of the organization

  • One or more security-related certifications from any of the following organizations: GCIH, GCFE, GCFA, AWS, Azure Cloud security Certifications or equivalent is desired

  • #LI-PJ1

    Learn More

    About Autodesk

    Welcome to Autodesk! Amazing things are created every day with our software – from the greenest buildings and cleanest cars to the smartest factories and biggest hit movies. We help innovators turn their ideas into reality, transforming not only how things are made, but what can be made.

    We take great pride in our culture here at Autodesk – it’s at the core of everything we do. Our culture guides the way we work and treat each other, informs how we connect with customers and partners, and defines how we show up in the world.

    When you’re an Autodesker, you can do meaningful work that helps build a better world designed and made for all. Ready to shape the world and your future? Join us!

    Salary transparency

    Salary is one part of Autodesk’s competitive compensation package. Offers are based on the candidate’s experience and geographic location. In addition to base salaries, our compensation package may include annual cash bonuses, commissions for sales roles, stock grants, and a comprehensive benefits package.

    Diversity & Belonging
    We take pride in cultivating a culture of belonging where everyone can thrive. Learn more here:

    Are you an existing contractor or consultant with Autodesk?

    Please search for open jobs and apply internally (not on this external site).

    This advertiser has chosen not to accept applicants from your region.

    Incident Response Analyst

    Pune, Maharashtra Black & Veatch

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Job Summary

    The Incident Response Analyst in the computer security incident response team will be responsible for developing and executing standards, procedures, and processes to uncover, resist and recover from security incidents. This position is for an early career analyst that will learn and grow throughout their security career. This is a very technically challenging career track in cyber security and technical acumen, passion, and determination will be highlighted in the interview process.

    Key Responsibilities

    • The Incident Response Analyst fulfills the following tasks:

      • Responds to computer security incidents according to the computer security incident response policy and procedures.
      • Provides technical guidance to first responders for handling cybersecurity incidents.
      • Provides timely and relevant updates to appropriate stakeholders and decision makers.
      • Communicates investigation findings to relevant business units to help improve the cybersecurity posture.
      • Validates and maintains incident response plans and processes to address potential threats.
      • Compiles and analyzes data for management reporting and metrics.
      • Analyzes potential impact of new threats and communicates risks back to detection engineering functions.
      • Performs root-cause analysis to document findings and participate in root-cause elimination activities as required.
      • Triages and assesses the risk of incidents, performing real-time analysis and managing workload during investigations/incidents.
      • Creates runbooks for frequently occurring incidents to automate or at least assist with the resolution of those cases.

    Management Responsibilities

    Individual Contributor

    Preferred Qualifications

    A successful Incident Response Analyst candidate will have the expertise and skills described below.

    Education, Training and Past Experience

    Candidates will be evaluated primarily on their ability to demonstrate the competencies required to be successful in the role, as described above.

    • BE/BTech, BS or MA in computer science, information security or a related field.

      Bachelor's Degree (in Business, Technology, Computer Science or related field), preferred or equivalent experience.

    • Candidate must have 5 years of experience in incident response.
    • Familiarity with incident response frameworks and methodologies, including frameworks like NIST 800-61 and MITRE ATT&CK.
    • Experience with incident response tools and technologies, including tools for security information and event management (SIEM), forensics, and/or threat intelligence even in a lab environment is beneficial.
    • Experience with reporting and communicating incident details, improving incident response processes and recovering from security incidents is beneficial.

    Minimum Qualifications

    Candidates will be evaluated based on their ability to perform the duties listed above while demonstrating the skills and competencies necessary to be highly effective in the role. These skills and competencies include:

    • Ability to communicate complex and technical issues to diverse audiences, orally and in writing, in an easily understood, authoritative and actionable manner.
    • Understands organizational mission, values, goals, and consistent application of this knowledge.
    • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
    • Ability to effectively influence others to modify their opinions, plans, or behaviors.
    • A team-focused mentality, with the proven ability to work effectively with diverse stakeholders.
    • Strong problem-solving and troubleshooting skills.

    All applicants must be able to complete pre-employment onboarding requirements (if selected) which may include any/all of the following: criminal/civil background check, drug screen, and motor vehicle records search, in compliance with any applicable laws and regulations.

    #LI-IB2

    Certifications

    Contact Compensation

    Work Environment/Physical Demands

    Typical office environment

    Competencies

    Salary Plan

    ITS: Information Technology Service

    Job Grade

    004

    BVH, Inc., its subsidiaries and its affiliated companies, complies with all Equal Employment Opportunity (EEO) affirmative action laws and regulations. Black & Veatch does not discriminate on the basis of age, race, religion, color, sex, national origin, marital status, genetic information, sexual orientation, gender Identity and expression, disability, veteran status, pregnancy status or other status protected by law.

    Black & Veatch is committed to being an employer of choice by creating a valuable work experience that keeps our people engaged, productive, safe and healthy. We offer professionals an array of health and welfare benefits that vary based on their geographic region and employment status. This may include health, life accident and disability insurances, paid time off, financial programs and more. Professionals may also be eligible for a performance-based bonus program.

    By valuing diverse voices and perspectives, we cultivate an authentically inclusive environment for professionals and are able to provide innovative and effective solutions for clients.

    This advertiser has chosen not to accept applicants from your region.

    Security Incident Response

    Bengaluru, Karnataka Confidential

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Roles & Responsibilities:

    • Have over 10+ years of rich experience in information security domain and at least 6-8 years of dedicated experience in Security Incident Response.
    • Hands on experience in implementing and operationalizing SIEM/SOAR tools such as Sentinel, ArcSight etc.
    • Experience in defining and reporting KPIs for Security Incident response.
    • Familiarity with advanced SOC monitoring technologies, risk, threat and security measures.
    • Knowledge across the SOC domains including governance, control frameworks, policies, compliance management, risk management and incident response etc.
    • Comprehensive knowledge of regulatory and compliance requirements and how they influence the bank's Information Security strategy.
    • Preferably worked in BFSI domain with proven experience in SOC function.
    • Strong understanding of key security standards and regulations such as NIST 800-61, CERT/CC, PCI, ISO 27035 etc.

    Skills and Application

    • Leads the development and implementation of comprehensive Security Governance strategies that address identified risks and compliance requirements, incorporating advanced technologies and methodologies to enhance security posture.
    • Deep understanding of Security Incident response frameworks and their application in creating robust policies.
    • Automate potential resilient security processes to ensure continuous compliance with security best practices.
    • Maintaining up-to-date knowledge of security trends, threats, and countermeasures
    • Assess and design security posture determination processes, tools and methodologies
    • Reviewing and approving use cases/playbooks for SIEM/SOAR tools
    • Continuously monitor security hygiene and performance using tools and processes
    • Collaborate with other IS teams, Ops and tech teams on enhancing security incident response resilience

    Other

    • Knowledge of evolving advanced tech stacks and related control and risk universe from a SOC perspective.
    • Knowledge and expertise in conducting risk assessment and management.
    • The ideal candidate will have a technical or computer science degree.
    • Professional certifications: GCIH, CISSP, CEH, FOR608, CISM etc.

    Skills Required
    sentinel , Arcsight, security incident response
    This advertiser has chosen not to accept applicants from your region.

    Incident Response Engineer

    Chennai, Tamil Nadu Confidential

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Centific is a frontier AI data foundry that curates diverse, high-quality data, using our purpose-built technology platforms to empower the Magnificent Seven and our enterprise clients with safe, scalable AI deployment. Our team includes more than 150 PhDs and data scientists, along with more than 4,000 AI practitioners and engineers. We harness the power of an integrated solution ecosystem—comprising industry-leading partnerships and 1.8 million vertical domain experts in more than 230 markets—to create contextual, multilingual, pre-trained datasets; fine-tuned, industry-specific LLMs; and RAG pipelines supported by vector databases. Our zero-distance innovation™ solutions for GenAI can reduce GenAI costs by up to 80% and bring solutions to market 50% faster.

    Our mission is to bridge the gap between AI creators and industry leaders by bringing best practices in GenAI to unicorn innovators and enterprise customers. We aim to help these organizations unlock significant business value by deploying GenAI at scale, helping to ensure they stay at the forefront of technological advancement and maintain a competitive edge in their respective markets.

    About Job

    • Role Title: Incident Response Engineer
    • Role Overview: As an Incident Response Engineer at Centific, you will be responsible for handling and mitigating critical system incidents, ensuring minimal downtime and rapid recovery of services. This role involves working with cross-functional teams to detect, analyze, and resolve incidents efficiently. You will be required to improve incident handling processes, develop automated response strategies, and maintain documentation of all incidents and resolutions. Your expertise in managing real-time operational incidents and post-incident analysis will play a critical role in maintaining system stability and business continuity.
    • This is a hands-on role that requires deep knowledge of incident response frameworks, system troubleshooting, security monitoring, and automated remediation.
    • Key Responsibilities:
    • Incident Detection & Monitoring:
    • Implement real-time incident detection using tools like PagerDuty/Opsgenie/VictorOps for on-call alerting and escalations.
    • Monitor system health, logs, and telemetry using Splunk/Elastic Stack (ELK)/Sentry/Grafana Loki to identify early warning signs of system failures.
    • Configure and fine-tune SIEM solutions (Splunk/Graylog/Wazuh) for log-based security and operational threat detection.

    Why Join Centific

    • High-Impact Role: Be at the forefront of mitigating critical system incidents and ensuring business continuity.
    • Cutting-Edge Technology: Work with modern automation, monitoring, and security tools.
    • Global Exposure: Collaborate with teams supporting enterprise-scale infrastructure worldwide.
    • Career Growth: Access to security certifications, SRE training, and industry-leading upskilling programs.
    • Work-Life Balance: Hybrid work model, shift flexibility, and wellness programs.
    • Skills:
    • Ability to remain calm under pressure and manage incidents in high-stress environments.
    • Ownership and accountability in resolving incidents from detection to closure, including post-mortem analysis.
    • Strong coordination skills to communicate incident status clearly with engineers, leadership, and external teams.
    • Process-oriented thinking to follow structured incident response playbooks and continuously improve workflows.
    • Ability to make rapid decisions in time-sensitive scenarios to minimize downtime and mitigate risks.
    • Good-to-have Qualifications:
    • Certifications: GIAC Certified Incident Handler (GCIH), AWS Certified Security Specialist, or Certified Information Systems Security Professional (CISSP).
    • Threat Hunting & Detection: Knowledge of MITRE ATT&CK framework and threat intelligence integration.
    • Chaos Engineering: Hands-on experience with Gremlin/LitmusChaos for incident testing and resilience validation.
    • Network Troubleshooting: Understanding of packet analysis, firewall logs, and intrusion detection systems (IDS/IPS).
    • Disaster Recovery Planning: Experience in business continuity planning and disaster recovery (BCP/DR) testing.

    Must-Have Qualifications:

    • Education: Bachelor's or Master's degree in Computer Science, Engineering, or a related field.
    • Experience: 3+ years of hands-on experience in incident response, system monitoring, and operational troubleshooting.
    • Monitoring & Alerting Expertise: Proficiency with PagerDuty/Opsgenie/VictorOps/Splunk/Elastic Stack (ELK)/Sentry/Grafana Loki.
    • Incident Response & RCA: Experience conducting root cause analysis (RCA) and post-mortem reviews.
    • Automation & Scripting: Hands-on experience with Python/Bash/Ansible to develop automation scripts for incident resolution.
    • Security Incident Handling: Familiarity with SIEM tools (Splunk/Graylog/Wazuh) and forensic analysis tools (TheHive/Velociraptor).
    • CI/CD & Incident Remediation: Understanding of automated rollback strategies, self-healing systems, and deployment remediation.

    Collaboration & Training:

    • Coordinate incident response drills and tabletop exercises to improve team readiness.
    • Train operational teams in incident detection, escalation, and response best practices.
    • Work closely with SRE, DevOps, and Observability Engineers to optimize response workflows and improve system observability.
    • Ensure compliance such as GDPR, HIPAA, and ISO 27001 standards in incident handling and logging.
    • Implement threat intelligence feeds to stay ahead of emerging security threats.
    • Security Incident Response & Compliance:
    • Work with security teams to investigate and mitigate security-related incidents.
    • Conduct forensic analysis on compromised systems and logs using TheHive/Velociraptor/Splunk SOAR.
    • Automated Remediation & Incident Prevention:
    • Develop self-healing automation using Ansible/Python/Bash to proactively remediate common failures.
    • Implement automated rollback and recovery mechanisms within CI/CD pipelines to reduce impact during deployments.
    • Integrate AI-driven anomaly detection to proactively detect and prevent potential failures before they escalate.
    • Test and deploy chaos engineering tools (Gremlin/LitmusChaos) to validate system resilience under stress conditions.
    • Root Cause Analysis & Post-Incident Review:
    • Conduct post-mortem analysis and root cause analysis (RCA) for all major incidents.
    • Work closely with SRE and security teams to identify persistent failure patterns and recommend long-term fixes.
    • Document all incident reports, mitigation steps, and RCA findings to enhance organizational learning and incident prevention.
    • Improve incident classification to differentiate between operational failures, security breaches, and performance degradation.
    • Incident Response & Mitigation:
    • Respond to critical incidents in a 24/7 shift rotation, ensuring minimal downtime and quick service recovery.
    • Follow standardized Incident Response Playbooks to handle various system failures, security incidents, and infrastructure outages.
    • Develop and maintain incident triage and escalation processes, ensuring clear handoffs between teams.
    • Implement runbook automation to execute predefined mitigation steps for common incidents.

    Skills Required
    Automation Scripting, System Monitoring
    This advertiser has chosen not to accept applicants from your region.

    Analyst/Incident Response

    Noida, Uttar Pradesh Anicalls (Pty) Ltd

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    • Splunk experience
    • EDR: Crowdstrike or Carbon Black
    • Scripting or basic programming (Java, HTML, Powershell, bash)
    • Entry-level certifications or higher
    This advertiser has chosen not to accept applicants from your region.

    Cyber Incident Response - Junior Incident

    Thiruvananthapuram, Kerala EY

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.

    **Cyber & Investigative Services - Junior Incident Coordinator**

    **EY Technology**:
    Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 250,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day. Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients. Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization.

    **EY Technology **supports our technology needs through three business units:
    **Client Technology (CT)** - focuses on developing new technology services for our clients. It enables EY to identify new technology-based opportunities faster and pursue those opportunities more rapidly.
    **Enterprise Workplace Technology (EWT)** - EWT supports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services. EWT will also support our internal technology needs by focusing on a better user experience.
    **Information Security (InfoSec)**:

    - InfoSec prevents, detects, responds and mitigates cyber-risk, protecting EY and client data, and our information management systems.

    **The opportunity**

    **Your key responsibilities**
    - Coordinate response efforts to cyber incidents caused by external threats that may involve nontraditional working hours
    - Serve as a liaison to different businesses and interface with fellow team members and colleagues on other security teams. As-needed, manage relationships with business partners, management, vendors, and external parties
    - Drive integration with other corporate incident management programs to ensure consistency and alignment with peer support teams within IT
    - Help lead small to medium sized projects as directed by leadership
    - Be a champion for process and documentation. Develop and document processes to ensure consistent and scalable response operations, and ensure continuous improvement to the company’s incident response plan
    - As requested, develop and deliver metrics to leadership
    - Create ready-to-go draft communications and ensure timely reports/updates to leadership during and after an event
    - Own and manage the teams internal action playbooks and knowledgebase
    - Must be willing to be on-call off hours in rotation with other team members (required)

    **Skills and attributes for success**
    - Resolution of security incidents by validating root cause and solutions
    - Analyze findings in investigative matters, and develop fact-based reports
    - Ability to identify and articulate opportunities for improvement while helping drive lessons learned activities
    - Demonstrated integrity and judgment within a professional environment
    - Inquisitive approach to analysis and peer review
    - Application of emotional intelligence and calm under pressure
    - Ability to appropriately balance work/personal priorities

    **To qualify for the role, you must have**
    - ** Education**:

    - Bachelors or Masters Degree in Computer Science, Information Systems, Engineering, a related field, or equivalent experience
    - **
    Experience**:

    - 5+ years’ experience in at least two of the following roles:

    - Member of a Security Operations Center (SOC)
    - Security Incident Response Analyst or supporting function (2 years minimum)
    - eDiscovery or related role performing forensic functions
    - Deep understanding of security threats, vulnerabilities, and incident response
    - Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis
    - Be familiar with a basic understanding of legalities surrounding electronic discovery and analysis
    - Understanding of regulatory stipulations regarding security incidents
    - Experience with SIEM technologies (i.e. Splunk)
    - Deep understanding of both Windows and Unix/Linux based operating systems

    **Ideally, you’ll also**

    **What we look for**
    - Demonstrated integrity in a professional environment
    - Ability to work independently
    - Have a global mind-set for working with different cultures and backgrounds
    - Knowledgeable in business industry standard security incident response process, procedures, and life-cycle
    - Excellent organizational skills and strong
    This advertiser has chosen not to accept applicants from your region.
    Be The First To Know

    About the latest Security intelligence Jobs in India !

    Major Incident Response Analyst

    Bengaluru, Karnataka Astellas Pharma

    Posted 3 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    **Purpose and Scope:**
    We are looking for a detail-oriented and proactive Major Incident Response Analyst to join our incident response team. The ideal candidate will be responsible for analyzing and managing major incidents that affect our operations, ensuring timely resolution and minimizing impact on the business. This role requires strong analytical skills, effective communication, and the ability to work collaboratively in a fast-paced environment.
    **Responsibilities and Accountabilities:**
    + Proactively monitor and analyze incidents to identify major incidents that require immediate attention and escalation.
    + Collaborate with End User Technology Support, the Digital Desk, Security Operations, and other relevant teams to support effective response and resolution of major incidents.
    + Assist in investigations of major incidents to determine root causes and impact on business operations.
    + Maintain detailed incident records, including timelines, actions taken, communications, and resolution outcomes to support reporting and analysis.
    + Maintain and update the Major Incident Management process, including policies, procedures, knowledge base with critical contacts and best practices.
    + Organise and participate in post-incident reviews to identify lessons learned and recommend improvements to incident management processes.
    + Maintain and update incident management tools and documentation to ensure accurate tracking and reporting of major incidents.
    + Provide support and guidance to team members during major incidents, ensuring adherence to established processes and protocols.
    + Stay informed about industry trends, latest security threats, and best practices related to incident response and management.
    + Contribute to a culture of preparedness across Service Enablement, TechX and DigitalX.
    + Work closely with End User Technology Support, SecOps & Incident Response and the Digital Desk
    + Capable of identifying potential signs of external threat actor involvement which could indicate a security incident.
    + Stay current with industry trends, threats, and best practices related to incident management
    **Required Qualifications:**
    + Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
    + Atleast 3 years of experience in incident management, with a focus on major incidents in a complex global environment.
    + Strong understanding of IT service management (ITSM) frameworks, such as ITIL.
    + Excellent leadership and team management skills, with the ability to motivate and guide cross-functional teams.
    + Strong analytical and problem-solving abilities, with a focus on root cause analysis and continuous improvement.
    + Exceptional communication skills, both written and verbal, with the ability to convey complex information to diverse audiences.
    + Relevant certifications (e.g., ITIL, CISSP, CISM) are a plus.
    **Preferred Qualifications:**
    + Experience in managing IT budgets and vendor relationships.
    + Relevant certifications, such as ITIL, PMP, or AWS, are a plus
    **Working Environment**
    **Astellas' Global Capability Centres - Overview**
    _Astellas' Global Capability Centres (GCCs) are strategically located sites that give Astellas the ability to access talent across various functions in the value chain and to co-locate core capabilities that are currently dispersed._ __ _Our three GCCs are located in India, Poland and Mexico._ __
    __ _The GCCs will enhance our operational efficiency, resilience and innovation potential, enabling a timely response to changing business demands._ __
    __ _Our GCCs are an integral part of Astellas, guided by our shared values and behaviors, and are critical enablers of the company's strategic priorities, sustainable growth, and commitment to turn innovative science into VALUE for patients._
    Category
    Astellas is committed to equality of opportunity in all aspects of employment.
    EOE including Disability/Protected Veterans
    This advertiser has chosen not to accept applicants from your region.
     

    Nearby Locations

    Other Jobs Near Me

    Industry

    1. request_quote Accounting
    2. work Administrative
    3. eco Agriculture Forestry
    4. smart_toy AI & Emerging Technologies
    5. school Apprenticeships & Trainee
    6. apartment Architecture
    7. palette Arts & Entertainment
    8. directions_car Automotive
    9. flight_takeoff Aviation
    10. account_balance Banking & Finance
    11. local_florist Beauty & Wellness
    12. restaurant Catering
    13. volunteer_activism Charity & Voluntary
    14. science Chemical Engineering
    15. child_friendly Childcare
    16. foundation Civil Engineering
    17. clean_hands Cleaning & Sanitation
    18. diversity_3 Community & Social Care
    19. construction Construction
    20. brush Creative & Digital
    21. currency_bitcoin Crypto & Blockchain
    22. support_agent Customer Service & Helpdesk
    23. medical_services Dental
    24. medical_services Driving & Transport
    25. medical_services E Commerce & Social Media
    26. school Education & Teaching
    27. electrical_services Electrical Engineering
    28. bolt Energy
    29. local_mall Fmcg
    30. gavel Government & Non Profit
    31. emoji_events Graduate
    32. health_and_safety Healthcare
    33. beach_access Hospitality & Tourism
    34. groups Human Resources
    35. precision_manufacturing Industrial Engineering
    36. security Information Security
    37. handyman Installation & Maintenance
    38. policy Insurance
    39. code IT & Software
    40. gavel Legal
    41. sports_soccer Leisure & Sports
    42. inventory_2 Logistics & Warehousing
    43. supervisor_account Management
    44. supervisor_account Management Consultancy
    45. supervisor_account Manufacturing & Production
    46. campaign Marketing
    47. build Mechanical Engineering
    48. perm_media Media & PR
    49. local_hospital Medical
    50. local_hospital Military & Public Safety
    51. local_hospital Mining
    52. medical_services Nursing
    53. local_gas_station Oil & Gas
    54. biotech Pharmaceutical
    55. checklist_rtl Project Management
    56. shopping_bag Purchasing
    57. home_work Real Estate
    58. person_search Recruitment Consultancy
    59. store Retail
    60. point_of_sale Sales
    61. science Scientific Research & Development
    62. wifi Telecoms
    63. psychology Therapy
    64. pets Veterinary
    View All Security Intelligence Jobs