1,135 Security Monitoring jobs in India

Cloud Security & Monitoring Engineer

Trigent Software Private Limited

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Summary

We are seeking a highly skilled Cloud Security & Monitoring Engineer with over 7 years of experience in cloud platforms (Azure and AWS), firewall technologies, and Splunk. The ideal candidate will be responsible for securing cloud environments, implementing robust monitoring solutions, and ensuring compliance across infrastructure.

Key Responsibilities
  • Design, implement, and manage secure cloud architectures on Azure and AWS

  • Configure and maintain Splunk for log aggregation, threat detection, and incident response

  • Deploy, manage, and troubleshoot firewall solutions across hybrid environments

  • Develop dashboards and alerts in Splunk to monitor system health and security events

  • Collaborate with DevOps and Security teams to integrate security controls into CI/CD pipelines

  • Ensure compliance with industry standards and internal security policies

  • Conduct regular vulnerability assessments and penetration testing

  • Document architecture, configurations, and incident response procedures

Required Skills
  • Strong expertise in Azure or AWS cloud services

  • Deep understanding of firewall technologies and network security principles

  • Proficiency in Splunk configuration, SPL queries, and dashboard creation

  • Experience with cloud-native security tools such as AWS GuardDuty and Azure Security Center

  • Familiarity with SIEM integration and log source onboarding

  • Solid grasp of TCP/IP, DNS, VPN, and routing protocols

  • Excellent problem-solving and communication skills

This advertiser has chosen not to accept applicants from your region.

Cyber/System Security Monitoring

Noida, Uttar Pradesh Anicalls (Pty) Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

• Experience and talent in data visualization
• Experience creating Dashboards and Analytics within SEIM (Security Information and Event Management) Tool.
• Experience creating workflows for Incident Response within a SEIM (Security Information and Event Management) Tool.
• GIAC Cyber Threat Intelligence Certification.
• Experience with the following StealthWatch, TripWire, Zenoss, ArcSight, Splunk.
• CISSP Certification.
• GIAC Certified Incident Handler Certification.
This advertiser has chosen not to accept applicants from your region.

24257 - Sr.Analyst - Security Monitoring - Chennai

Chennai, Tamil Nadu CGI

Posted today

Job Viewed

Tap Again To Close

Job Description

Position Description:

Responsibilities









Direct Responsibilities


• Operate the log collection platforms: Monitoring of performance and capacity Monitoring of log collection coverage of various sources Update and patching of all components of the collection environment.
• Working with IT Production teams in case of Incidents to ensure the continuous delivery of log data
• Monitoring of the pipelines sending log data to the SIEM environments
• Alignment with Asset Management teams to keep logging baseline up to date.
• Build and regular update of operational KPI’s




Contributing Responsibilities
Support CSIRT team in investigations in case local log data is needed
















Technical & Behavioral Competencies




Technical Skills


• Proven expertise of all components of the Elastic stack – Kafka, Elastic search, Log stash
• Expertise in Linux server administration and load balancer
• Familiarity with security tools and technologies such as SIEM, IDS / IPS, firewalls and antivirus

systems.

• Ability to interpret and analyze logs generated by various systems, applications, and devices to detect.

anomalies, security incidents, and unauthorized activities.

• Familiarity with incident response procedures and methodologies.
• Proficiency in using vulnerability scanning tools such as Nessus, Qualys, or OpenVAS to identify and

prioritize security vulnerabilities in systems and networks.

• Proficiency in deploying, configuring, and managing IDS/IPS solutions to detect and prevent intrusion.

and malicious activities on networks.




Specific Qualifications (if required)






Skills Referential



Behavioural Skills: (Please select up to 4 skills)



Attention to detail / rigor



Ability to collaborate / Teamwork



Ability to deliver / Results driven



Client focused



Transversal Skills: (Please select up to 5 skills)





Analytical Ability



Ability to develop and adapt a process



Ability to understand, explain and support change



Ability to set up relevant performance indicators



Ability to develop and adapt a process



Education Level:







Bachelor Degree or equivalent




Experience Level

At least 5 years



Other/Specific Qualifications (if required)



Certification like CEH,
CompTIA Security+,
CISSP could be added advantage

Skills:

  • Linux
  • Nessus
  • This advertiser has chosen not to accept applicants from your region.

    Technology Lead- Security Monitoring - Bangalore

    Bengaluru, Karnataka Broadridge

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    At Broadridge, we've built a culture where the highest goal is to empower others to accomplish more. If you’re passionate about developing your career, while helping others along the way, come join the Broadridge team.

    We are seeking a highly skilled Syslog Engineer & Splunk Implementation Specialist with practical experience in deploying, configuring, and maintaining enterprise-wide logging solutions in hybrid environments. The ideal candidate will focus on hands-on implementation of syslog-based log aggregation pipelines, ensuring integration with SIEM, cloud logging, and security monitoring tools.

    Key Responsibilities

  • Design, implement, and manage Splunk solutions, including architecting and scaling Splunk infrastructure in hybrid environment (AWS, Onprem, Azure).
  • Demonstrated proficiency in implementing Splunk Common Information Model (CIM) normalization, ensuring consistent data formatting and enabling advanced correlation, reporting, and analysis within the Splunk platform.
  • Implement and manage infrastructure automation using Terraform and Chef cookbooks to support scalable and reliable deployment environments.
  • Engineer and design centralized log aggregation solutions using syslog (Logstash, Fluentd, Filebeat, etc.) and related technologies.
  • Develop and maintain secure, efficient, and scalable logging architectures across both Linux and Windows operating systems.
  • Administer end-to-end log management processes, including centralized aggregation, long-term archival, and swift retrieval for analysis and auditing purposes.
  • Develop automation scripts to optimize log ingestion, parsing, and reporting (using Phython, bash etc).
  • Serve as a key member of the Security Operations Center (SOC), monitoring, analyzing, and responding to security events and incidents.
  • Collaborate with cross-functional teams to ensure comprehensive log coverage and compliance with security policies.
  • Document architecture, policies, and procedures related to logging and security event management.
  • Required Skills and Qualifications

  • Proven hands-on experience with Splunk architecture and SIEM engineering.
  • Hands-on experience with DevOps tools and automation frameworks, including Terraform for infrastructure as code and Chef cookbooks for configuration management.
  • Expertise in implementing large scale log management, syslog engineering and log aggregation techniques.
  • Experience with Logstash, AWS OpenSearch or related technology.
  • Expertise in Devops, deploying SIEM infrastructure through IaC(Terraform, Chef, Jenkins).
  • Proficiency in Python and shell scripting for automation.
  • Strong operating system knowledge – both Linux and Windows environments.
  • Good to have at least 3 years as a SOC Analyst or similar security monitoring role.
  • Ability to troubleshoot, optimize, and maintain large-scale log management solutions.
  • Strong communication and documentation skills.
  • We are dedicated to fostering a collaborative, engaging, and inclusive environment and are committed to providing a workplace that empowers associates to be authentic and bring their best to work. We believe that associates do their best when they feel safe, understood, and valued, and we work diligently and collaboratively to ensure Broadridge is a company—and ultimately a community—that recognizes and celebrates everyone’s unique perspective. 

    This advertiser has chosen not to accept applicants from your region.

    Technology Lead- Security Monitoring - Bangalore

    Broadridge

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    At Broadridge, we've built a culture where the highest goal is to empower others to accomplish more. If you’re passionate about developing your career, while helping others along the way, come join the Broadridge team.

    We are seeking a highly skilled Syslog Engineer & Splunk Implementation Specialist with practical experience in deploying, configuring, and maintaining enterprise-wide logging solutions in hybrid environments. The ideal candidate will focus on hands-on implementation of syslog-based log aggregation pipelines, ensuring integration with SIEM, cloud logging, and security monitoring tools.

    Key Responsibilities

  • Design, implement, and manage Splunk solutions, including architecting and scaling Splunk infrastructure in hybrid environment (AWS, Onprem, Azure).
  • Demonstrated proficiency in implementing Splunk Common Information Model (CIM) normalization, ensuring consistent data formatting and enabling advanced correlation, reporting, and analysis within the Splunk platform.
  • Implement and manage infrastructure automation using Terraform and Chef cookbooks to support scalable and reliable deployment environments.
  • Engineer and design centralized log aggregation solutions using syslog (Logstash, Fluentd, Filebeat, etc.) and related technologies.
  • Develop and maintain secure, efficient, and scalable logging architectures across both Linux and Windows operating systems.
  • Administer end-to-end log management processes, including centralized aggregation, long-term archival, and swift retrieval for analysis and auditing purposes.
  • Develop automation scripts to optimize log ingestion, parsing, and reporting (using Phython, bash etc).
  • Serve as a key member of the Security Operations Center (SOC), monitoring, analyzing, and responding to security events and incidents.
  • Collaborate with cross-functional teams to ensure comprehensive log coverage and compliance with security policies.
  • Document architecture, policies, and procedures related to logging and security event management.
  • Required Skills and Qualifications

  • Proven hands-on experience with Splunk architecture and SIEM engineering.
  • Hands-on experience with DevOps tools and automation frameworks, including Terraform for infrastructure as code and Chef cookbooks for configuration management.
  • Expertise in implementing large scale log management, syslog engineering and log aggregation techniques.
  • Experience with Logstash, AWS OpenSearch or related technology.
  • Expertise in Devops, deploying SIEM infrastructure through IaC(Terraform, Chef, Jenkins).
  • Proficiency in Python and shell scripting for automation.
  • Strong operating system knowledge – both Linux and Windows environments.
  • Good to have at least 3 years as a SOC Analyst or similar security monitoring role.
  • Ability to troubleshoot, optimize, and maintain large-scale log management solutions.
  • Strong communication and documentation skills.
  • We are dedicated to fostering a collaborative, engaging, and inclusive environment and are committed to providing a workplace that empowers associates to be authentic and bring their best to work. We believe that associates do their best when they feel safe, understood, and valued, and we work diligently and collaboratively to ensure Broadridge is a company—and ultimately a community—that recognizes and celebrates everyone’s unique perspective. 

    This advertiser has chosen not to accept applicants from your region.

    Cyber/System Security Monitoring as...

    Hyderabad, Andhra Pradesh Anicalls (Pty) Ltd

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    • Experience and talent in data visualization
    • Experience creating Dashboards and Analytics within SEIM (Security Information and Event Management) Tool.
    • Experience creating workflows for Incident Response within a SEIM (Security Information and Event Management) Tool.
    • GIAC Cyber Threat Intelligence Certification.
    • Experience with the following StealthWatch, TripWire, Zenoss, ArcSight, Splunk.
    • CISSP Certification.
    • GIAC Certified Incident Handler Certification.
    This advertiser has chosen not to accept applicants from your region.

    Senior Service Desk Representative(Security Monitoring)

    Hyderabad, Andhra Pradesh Diebold Nixdorf

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Expect more. Connect more. Be more at Diebold Nixdorf. Our teams automate, digitize, and transform the way more than 75 million people around the globe bank and shop in this hyper-connected, consumer-centric world. Join us in connecting people to commerce in this vital, rewarding role.

    Provides proactive user helpdesk services to inbound customer service requests. Diagnoses and resolves hardware and software issues, performs software distribution, creates and updates tickets to reflect changes and works with customers to ensure appropriate levels of engagement and communication. Uses available tools and resources, including remote tools, to accomplish tasks.

    This advertiser has chosen not to accept applicants from your region.
    Be The First To Know

    About the latest Security monitoring Jobs in India !

    Incident Response Lead

    Ralliant

    Posted 5 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    **Position Overview:**
    Ralliant is seeking a skilled **Security Operations Lead** based in India to lead international response operations and SOC mission. This role combines **incident command, response coaching** , and **technical depth** across detection and response, with a strong focus on MSSP oversight and continuous improvement. The ideal candidate brings deep experience in incident command, advanced triage/investigation skills, and the ability to communicate and report with clarity and impact.
    **Key Responsibilities:**
    + Serve as **global incident commander** , driving incident response lifecycle activities including triage, containment, forensics, recovery, and lessons learned.
    + Lead and coordinate efforts across **multiple MSSP structures** :
    + A **managed defend and respond partner** delivering 24x7 coverage
    + A **staff augmentation-based MSSP** providing tiered security analyst resources.
    + Act as the **chief coach** for analysts across both in-house and partner-sourced teams-guiding investigation depth, alert tuning, and incident retrospectives.
    + Manage and report on **SOC performance metrics, SLAs, and KPIs** -focusing on mean time to detect (MTTD), mean time to respond (MTTR), false positive rates, and threat detection coverage.
    + Drive accountability and continuous improvement through **regular reporting** , operational dashboards, and escalation reviews to security leadership.
    + Leverage deep knowledge of **CrowdStrike Falcon** (EDR, Identity, Forensics) to validate detection effectiveness and lead incident investigations.
    + Support integration, optimization, and effective use of **CrowdStrike SIEM/LogScale** for advanced log correlation, threat hunting, and alert fidelity.
    + Ensure high-quality documentation and communication during incidents-including executive summaries, impact analysis, and regulatory reporting alignment (e.g., SOX, NIST 800-171).
    + Maintain and evolve incident playbooks and threat detection use cases in alignment with MITRE ATT&CK and emerging threat intelligence.
    + Actively participate in global cybersecurity strategy sessions and coordinate with peers across IT, GRC, and engineering to ensure defense-in-depth posture.
    **Qualifications:**
    + 8+ years in security operations, incident response, or threat detection roles.
    + 3+ years managing or coordinating workstreams from MSSPs or staff augmentation models.
    + Strong experience in global incident command with a focus on collaboration, triage efficiency, and structured decision-making.
    + Hands-on expertise with **CrowdStrike Falcon** suite and familiarity with **CrowdStrike LogScale/SIEM** highly desirable.
    + Demonstrated ability to develop and track SOC **performance metrics** and drive data-informed decisions.
    + Deep investigative skillset including root cause analysis, endpoint/network forensics, and adversary behavior tracking.
    + Excellent written and verbal communication skills, especially for incident documentation and stakeholder briefings.
    + Familiarity with security frameworks (NIST, MITRE ATT&CK) and compliance domains (SOX, ITAR, NIST 800-171).
    **Preferred Certifications:**
    + **CISSP, GCIH, GCFA, GCIA** , or similar relevant credentials.
    + Practical experience with log correlation platforms and case management tools (e.g., ServiceNow, Jira).
    **Ralliant Overview**
    Every day, engineers transform scientific potential into real-world impact, reshaping how we live and work. At this pivotal moment in technology, Fortive is creating a focused, standalone company poised to capitalize on powerful long-term trends with mission critical technologies advancing an electrified and digital future. Our team of scientists, engineers, and technologists is joining forces to pioneer solutions that will shape the future of industry.
    Introducing Ralliant Corporation, a global technology company uniting trusted brands solving tough challenges to speed breakthroughs at leading companies, research institutions, and governments, across the semiconductor/communications/diversified electronics, industrial manufacturing, utilities, and aero, defense, and space industries.
    Ralliant is fueled by a global team of changemakers, committed to continuous improvement and a strong culture rooted in disciplined execution. For more information please visit: Corporation Overview**
    Ralliant, originally part of Fortive, now stands as a bold, independent public company driving innovation at the forefront of precision technology. With a global footprint and a legacy of excellence, we empower engineers to bring next-generation breakthroughs to life - faster, smarter, and more reliably. Our high-performance instruments, sensors, and subsystems fuel mission-critical advancements across industries, enabling real-world impact where it matters most. At Ralliant we're building the future, together with those driven to push boundaries, solve complex problems, and leave a lasting mark on the world.
    **Bonus or Equity**
    This position is also eligible for bonus and equity as part of the total compensation package.
    This advertiser has chosen not to accept applicants from your region.

    Incident Response, Cybersecurity

    Bengaluru, Karnataka Carrier

    Posted 5 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    **Job Description**
    **Role:** Incident Response Analyst
    **Location:** Bangalore
    **Full/ Part time:** Full time
    **Build a career with confidence**
    Carrier Global Corporation, global leader in intelligent climate and energy solutions is committed to creating solutions that matter for people and our planet for generations to come. From the beginning, we've led in inventing new technologies and entirely new industries. Today, we continue to lead because we have a world-class, diverse workforce that puts the customer at the center of everything we do
    **About the Role:**
    The Incident Response Analyst will play a critical role in safeguarding Carrier by swiftly identifying, investigating, and responding to cybersecurity incidents. Utilizing a strong understanding of threat detection and incident handling, the analyst will collaborate closely with other stakeholders to contain threats, minimize damage, implement preventive measures, and use lessons learned to enhance Carrier's security posture.
    **Key Responsibilities**
    + Respond to security incidents promptly and effectively, following established incident response procedures.
    + Monitor and analyze security events and alerts to identify potential security incidents.
    + Conduct thorough investigations of security incidents to determine the root cause and impact.
    + Collaborate with other teams to contain and remediate security incidents.
    + Document and report on security incidents, including the actions taken and lessons learned.
    + Perform regular threat hunting activities to identify potential security threats and vulnerabilities.
    + Stay current with the latest cybersecurity trends, threats, and technologies.
    + Create and maintain documentation, training, playbooks, and work products.
    + Drive continuous improvement using Carrier Excellence.
    **Requirements**
    + Bachelor's degree in Computer Science, Information Security, or a related field.
    + 10+ years of experience in a cybersecurity or incident response role.
    **Preferred Qualifications**
    + Strong knowledge of tools and technologies (e.g., SIEM, IDS/IPS, EDR, firewall).
    + Experience with log analysis.
    + Experience with incident response methodologies and frameworks (e.g., NIST, SANS).
    + Familiarity with common attack vectors and techniques (e.g., phishing, malware, ransomware).
    + Excellent analytical and problem-solving skills.
    + Strong communication and interpersonal skills.
    + Ability to work independently and as part of a team.
    + Understanding of the Lockheed Martin Cyber Kill Chain and Mitre Att&CK framework
    + Experience with digital forensics and malware analysis.
    + Knowledge of network protocols and security architecture.
    + Familiarity with cloud security and incident response in cloud environments.
    + Experience with scripting and automation (e.g., Python, PowerShell, BASH).
    + One of the following certifications: CompTIA CSCP|CNSP; GCIH, GCIA, GCFA, GMON
    **Benefits**
    We are committed to offering competitive benefits programs for all of our employees, and enhancing our programs when necessary.
    + Make yourself a priority with flexible schedules, parental leave
    + Drive forward your career through professional development opportunities
    + Achieve your personal goals with our Employee Assistance Programme
    **Our commitment to you**
    Our greatest assets are the expertise, creativity and passion of our employees. We strive to provide a great place to work that attracts, develops and retains the best talent, promotes employee engagement, fosters teamwork and ultimately drives innovation for the benefit of our customers. We strive to create
    an environment where you feel that you belong, with diversity and inclusion as the engine to growth and innovation. We develop and deploy best-in-class programs and practices, providing enriching career opportunities, listening to employee feedback and always challenging ourselves to do better. This is The Carrier Way.
    Join us and make a difference.
    Apply Now!
    .
    **Carrier is An Equal** **Opportunity/Affirmative** **Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class.**
    **Job Applicant's Privacy Notice:**
    Click on this link ( to read the Job Applicant's Privacy Notice
    This advertiser has chosen not to accept applicants from your region.

    Incident Response Analyst

    Bengaluru, Karnataka Autodesk

    Posted 5 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    **Job Requisition ID #**
    25WD90131
    **Position Overview**
    The Incident Response Analyst is responsible for monitoring, identifying, assessing, containing, and responding to various information security events in a large and complex environment, as well as analyse, triage, and report on these incidents and investigations. The candidate must have knowledge of system security design, network/cloud security best practices and in-depth knowledge of systems security operations, threat actors frequently used attack vectors, and general user behaviour analytics. The candidate will be part of an established security team and work closely with teams across the company in remediating security issues and driving Incident Response. The candidate should have a strong passion for security and growth and be willing to accept challenging projects and incidents.
    **Responsibilities:**
    + Responsible for handling day-to day operations to monitor, identity, triage and investigate security events from various Endpoint (EDR), Network and Cloud security tools and detect anomalies, and report remediation actions
    + Analyze firewall logs, server, and application logs to investigate events and incidents for anomalous activity and produce reports of findings
    + Conduct reviews and analysis of proxy logs, Microsoft Windows and Active Directory logs, and malicious code to identify, contain, eradicate, and ensure recovery from incidents
    + Help create and maintain process tools and documentation
    + Perform all stage of incident response from detection to postmortem
    + Collaborate with stakeholders in building and improving our Security Orchestration Platform
    + Clearly document notes for incidents in our case management solution
    + Perform basic forensics and malware analysis based on our playbooks and procedures
    + Responsible for working in a 24/7 environment including night shifts and the shifts are decided based on the business requirement
    + Maintain a high level of confidentiality and Integrity
    **Minimum Qualifications:**
    + BS in Computer Science, Information Security, or equivalent professional experience
    + 2+ years of cyber security experience in incident response
    + Technical depth in one or more specialties including: Malware analysis, Host analysis and Digital forensics
    + Strong understanding of Security Operations and Incident Response process and practices
    + Experience performing security monitoring, response capabilities, log analysis and forensic tools
    + Strong understanding of operating systems including Windows, Linux and OSX
    + Experience with SIEM, SOAR, EDR, Network, AWS, and Azure security tools
    + Excellent critical thinking and analytical skills, organizational skills, and the ability to work as part of a team
    + Excellent verbal and written communication skills
    + Ability to design playbooks for responding to security incidents
    + Ability to support off-hours, weekends, and holidays if needed in support of incident response
    **Preferred Qualifications:**
    + Advanced interpersonal skills to effectively promote ideas and collaboration at various levels of the organization
    + One or more security-related certifications from any of the following organizations: GCIH, GCFE, GCFA, AWS, Azure Cloud security Certifications or equivalent is desired
    #LI-PJ1
    **Learn More**
    **About Autodesk**
    Welcome to Autodesk! Amazing things are created every day with our software - from the greenest buildings and cleanest cars to the smartest factories and biggest hit movies. We help innovators turn their ideas into reality, transforming not only how things are made, but what can be made.
    We take great pride in our culture here at Autodesk - it's at the core of everything we do. Our culture guides the way we work and treat each other, informs how we connect with customers and partners, and defines how we show up in the world.
    When you're an Autodesker, you can do meaningful work that helps build a better world designed and made for all. Ready to shape the world and your future? Join us!
    **Salary transparency**
    Salary is one part of Autodesk's competitive compensation package. Offers are based on the candidate's experience and geographic location. In addition to base salaries, our compensation package may include annual cash bonuses, commissions for sales roles, stock grants, and a comprehensive benefits package.
    **Diversity & Belonging**
    We take pride in cultivating a culture of belonging where everyone can thrive. Learn more here: you an existing contractor or consultant with Autodesk?**
    Please search for open jobs and apply internally (not on this external site).
    This advertiser has chosen not to accept applicants from your region.
     

    Nearby Locations

    Other Jobs Near Me

    Industry

    1. request_quote Accounting
    2. work Administrative
    3. eco Agriculture Forestry
    4. smart_toy AI & Emerging Technologies
    5. school Apprenticeships & Trainee
    6. apartment Architecture
    7. palette Arts & Entertainment
    8. directions_car Automotive
    9. flight_takeoff Aviation
    10. account_balance Banking & Finance
    11. local_florist Beauty & Wellness
    12. restaurant Catering
    13. volunteer_activism Charity & Voluntary
    14. science Chemical Engineering
    15. child_friendly Childcare
    16. foundation Civil Engineering
    17. clean_hands Cleaning & Sanitation
    18. diversity_3 Community & Social Care
    19. construction Construction
    20. brush Creative & Digital
    21. currency_bitcoin Crypto & Blockchain
    22. support_agent Customer Service & Helpdesk
    23. medical_services Dental
    24. medical_services Driving & Transport
    25. medical_services E Commerce & Social Media
    26. school Education & Teaching
    27. electrical_services Electrical Engineering
    28. bolt Energy
    29. local_mall Fmcg
    30. gavel Government & Non Profit
    31. emoji_events Graduate
    32. health_and_safety Healthcare
    33. beach_access Hospitality & Tourism
    34. groups Human Resources
    35. precision_manufacturing Industrial Engineering
    36. security Information Security
    37. handyman Installation & Maintenance
    38. policy Insurance
    39. code IT & Software
    40. gavel Legal
    41. sports_soccer Leisure & Sports
    42. inventory_2 Logistics & Warehousing
    43. supervisor_account Management
    44. supervisor_account Management Consultancy
    45. supervisor_account Manufacturing & Production
    46. campaign Marketing
    47. build Mechanical Engineering
    48. perm_media Media & PR
    49. local_hospital Medical
    50. local_hospital Military & Public Safety
    51. local_hospital Mining
    52. medical_services Nursing
    53. local_gas_station Oil & Gas
    54. biotech Pharmaceutical
    55. checklist_rtl Project Management
    56. shopping_bag Purchasing
    57. home_work Real Estate
    58. person_search Recruitment Consultancy
    59. store Retail
    60. point_of_sale Sales
    61. science Scientific Research & Development
    62. wifi Telecoms
    63. psychology Therapy
    64. pets Veterinary
    View All Security Monitoring Jobs