2,444 Security Monitoring jobs in India

Sr Engineer( Network Security Monitoring) - Target India

Bangalore, Karnataka Target

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

**About us:**
As a Fortune 50 company with more than 400,000 team members worldwide, Target is an iconic brand and one of America's leading retailers.
Joining Target means promoting a culture of mutual care and respect and striving to make the most meaningful and positive impact. Becoming a Target team member means joining a community that values different voices and lifts each other up. Here, we believe your unique perspective is important, and you'll build relationships by being authentic and respectful.
**Overview about TII**
At Target, we have a timeless purpose and a proven strategy. And that hasn't happened by accident. Some of the best minds from different backgrounds come together at Target to redefine retail in an inclusive learning environment that values people and delivers world-class outcomes. That winning formula is especially apparent in Bengaluru, where Target in India operates as a fully integrated part of Target's global team and has more than 4,000 team members supporting the company's global strategy and operations.
**(Pyramid overview)**
Network Security Monitoring (NSM) Position About Network Security Monitoring: Target's Network Security Monitoring (NSM) team builds and maintains a fleet of over 2000 network sensors across the globe, providing network visibility and advanced monitoring capabilities to our Cyber Defense organization. We build scalable and maintainable infrastructure with full end-to-end ownership of both the hardware and software lifecycle. Our work enables timely detection and response of adversaries by delivering reliable network visibility through a resilient sensor grid and advanced monitoring capability.
**Team Overview**
NSM team members regularly: - Collaborate with Networking partners on network design and network sensor placement - Build, deploy, and upgrade network sensors (servers) globally - Design and implement network traffic analysis solutions using engines like Zeek and Suricata - Leverage Salt for configuration management, deployment automation, and infrastructure-as-code implementation - Partner with Cyber Defense to build network-based detections and consult in response scenarios - Develop performance monitoring solutions to track data quality and sensor health to ensure grid health and data fidelity
**Position Overview**
Expect to: - Configure, troubleshoot, and optimize network sensors across diverse environments
- Debug complex networking issues and perform packet-level analysis to ensure proper traffic visibility.
- Build and maintain Salt-based automation for configuration management and deployment.
- Analyze monitoring data to identify system improvements and validate detection coverage.
- Develop and automate testing to ensure results and outcomes are as expected.
- Participate in on-call rotations to support the global sensor grid and respond to critical issues.
- Collaborate cross-functionally with teams throughout Cyber Defense and IT - Document operational procedures for sensor management best practices - Research new network security monitoring technologies and evaluate their potential implementation.
- Contribute to capacity planning and architectural design of monitoring infrastructure.
- Manage and maintain Linux/Unix-based systems that host Zeek sensors, ensuring high availability, performance, and security.
- Perform OS-level troubleshooting, patching, and hardening of sensor infrastructure.
- Automate server provisioning and configuration using tools like Salt, shell scripting, and Python.
- Monitor system logs and metrics to proactively identify and resolve issues affecting sensor performance.
**About you:**
**-** Bachelor's degree in Networking, Computer Science, or related field (or equivalent experience).
- 4+ years of experience in network administration, network security, or related roles, with a deep knowledge of network protocols and packet analysis.
- Experience with network security monitoring tools, including Zeek and Suricata.
- Strong foundation in automation and infrastructure as code, Salt experience preferred.
- You understand CI/CD principles and can implement pipelines for testing and deploying code and configuration changes.
- Proficient in Linux/Unix systems administration, including shell scripting, system tuning, and troubleshooting.
- Hands-on experience managing server infrastructure in production environments, including patching, upgrades, and performance tuning.
- Practical experience with packet capture technologies and traffic analysis tools.
- Proven ability to troubleshoot complex distributed systems and methodically diagnose network issues.
- You appreciate the importance of dev/prod parity and can design for consistent environments across dev and prod.
- Experience writing custom detection rules and understanding their performance implications.
- Familiarity with technologies such as Zabbix, Prometheus, Nagios, Grafana, Elastic, Kibana
**Useful Links-**
**Life at Target-** ** ** Link:** **
This advertiser has chosen not to accept applicants from your region.

Incident Response Analyst

Bengaluru, Karnataka Autodesk

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

**Job Requisition ID #**
25WD92064
**Position Overview**
The Incident Response Analyst is responsible for monitoring, identifying, assessing, containing, and responding to various information security events in a large and complex environment, as well as analyse, triage, and report on these incidents and investigations. The candidate must have knowledge of system security design, network/cloud security best practices and in-depth knowledge of systems security operations, threat actors frequently used attack vectors, and general user behaviour analytics. The candidate will be part of an established security team and work closely with teams across the company in remediating security issues and driving Incident Response. The candidate should have a strong passion for security and growth and be willing to accept challenging projects and incidents.
**Responsibilities**
+ Responsible for handling day-to day operations to monitor, identity, triage and investigate security events from various Endpoint (EDR), Network and Cloud security tools and detect anomalies, and report remediation actions
+ Analyze firewall logs, server, and application logs to investigate events and incidents for anomalous activity and produce reports of findings
+ Conduct reviews and analysis of proxy logs, Microsoft Windows and Active Directory logs, and malicious code to identify, contain, eradicate, and ensure recovery from incidents
+ Help create and maintain process tools and documentation
+ Perform all stage of incident response from detection to postmortem
+ Collaborate with stakeholders in building and improving our Security Orchestration Platform
+ Clearly document notes for incidents in our case management solution
+ Perform basic forensics and malware analysis based on our playbooks and procedures
+ Responsible for working in a 24/7 environment including night shifts and the shifts are decided based on the business requirement
+ Maintain a high level of confidentiality and Integrity
**Minimum Qualifications**
+ BS in Computer Science, Information Security, or equivalent professional experience
+ 2+ years of cyber security experience in incident response
+ Technical depth in one or more specialties including: Malware analysis, Host analysis and Digital forensics
+ Strong understanding of Security Operations and Incident Response process and practices
+ Experience performing security monitoring, response capabilities, log analysis and forensic tools
+ Strong understanding of operating systems including Windows, Linux and OSX
+ Experience with SIEM, SOAR, EDR, Network, AWS, and Azure security tools
+ Excellent critical thinking and analytical skills, organizational skills, and the ability to work as part of a team
+ Excellent verbal and written communication skills
+ Ability to design playbooks for responding to security incidents
+ Ability to support off-hours, weekends, and holidays if needed in support of incident response
**Preferred Qualifications**
+ Advanced interpersonal skills to effectively promote ideas and collaboration at various levels of the organization
+ One or more security-related certifications from any of the following organizations: GCIH, GCFE, GCFA, AWS, Azure Cloud security Certifications or equivalent is desired
#LI-PJ1
**Learn More**
**About Autodesk**
Welcome to Autodesk! Amazing things are created every day with our software - from the greenest buildings and cleanest cars to the smartest factories and biggest hit movies. We help innovators turn their ideas into reality, transforming not only how things are made, but what can be made.
We take great pride in our culture here at Autodesk - it's at the core of everything we do. Our culture guides the way we work and treat each other, informs how we connect with customers and partners, and defines how we show up in the world.
When you're an Autodesker, you can do meaningful work that helps build a better world designed and made for all. Ready to shape the world and your future? Join us!
**Salary transparency**
Salary is one part of Autodesk's competitive compensation package. Offers are based on the candidate's experience and geographic location. In addition to base salaries, our compensation package may include annual cash bonuses, commissions for sales roles, stock grants, and a comprehensive benefits package.
**Diversity & Belonging**
We take pride in cultivating a culture of belonging where everyone can thrive. Learn more here: you an existing contractor or consultant with Autodesk?**
Please search for open jobs and apply internally (not on this external site).
This advertiser has chosen not to accept applicants from your region.

Senior Security Monitoring and Response Analyst - Business Continuity, Operational Resilience

Pune, Maharashtra Mastercard

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

**Our Purpose**
_Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential._
**Title and Summary**
Senior Security Monitoring and Response Analyst - Business Continuity, Operational Resilience
Who is Mastercard?
Mastercard is a global technology company in the payments industry. Our mission is to connect and power an inclusive, digital economy that benefits everyone, everywhere by making transactions safe, simple, smart, and accessible. Using secure data and networks, partnerships and passion, our innovations and solutions help individuals, financial institutions, governments, and businesses realize their greatest potential.
Our decency quotient, or DQ, drives our culture and everything we do inside and outside of our company. With connections across more than 210 countries and territories, we are building a sustainable world that unlocks priceless possibilities for all.
Mission First, People Always
As Corporate Security, we are responsible for keeping Mastercard safe and secure from cyber and physical threats, and it is our people on the frontlines who make this happen every day.
By taking care of our people, their wellbeing, and career development, we provide them the necessary tools and environment to ensure the success of our mission.
Overview
The Enterprise Resilience Team is looking for a Senior Analyst primarily responsible for supporting the resiliency of the organization's technical operations globally (Technology Recovery) while familiar with all other aspects of Business Continuity.
- Have you ever been responsible for planning or supporting a major data center outage?
- Do you possess strong analytical capabilities, written and oral communication skills?
- Do you enjoy discovering ways to improve processes through automation and working with cross-functional teams?
Role
- Have extensive knowledge of Technology Recovery principles
- Have a high level of understanding and comprehension of Business Continuity, Crisis Management and Operational Resilience
- Partner with team members within the Resilience Planning (RP) function to support regulatory compliance for all jurisdictions
- Have an awareness of jurisdiction regulation and guidelines (e.g., DORA).
- Train business partners on the program's roles and responsibilities and ensure all staff within the entity are knowledgeable of our requirements.
- Facilitate cross-functional review sessions to promote technology recovery requirements and annual cycle requirements, with the ability to provide guidance and direction to obtain a successful recovery strategy.
- Create documentation according to methodology and formats based on the department standards.
- Monitor schedules and plans to ensure achievement of project results (project objectives, tasks, testing and documentation) in a timely manner.
- Facilitate exercise execution with all recovery team members while ensuring production operations are protected.
- Open and timely communication with project team and management regarding progress and planning.
- Manage recovery documentation, coordination and tracking of issues to closure/resolution.
- Escalate issues to management when necessary.
- Identify opportunities to improve and streamline processes involving the response to technology recovery.
All About You
- Excellent written and spoken English language communication skills are a core requirement.
- Discipline relevant bachelor's degree or equivalent combination of experience and formal education
- Minimum of three years' experience in a similar role
- Certified Business Continuity Planner (CBCP) preferred / comparable certification.
- Fusion Risk Management Business Continuity software experience advantageous
- Strong analytical background with the ability to identify deficiencies in recovery strategies, plans and internal processes.
- Ability to communicate user and technical information, both orally and in written form.
- Ability to work with all levels of management and technical staff.
- Ability to define and implement solutions based on strategic direction.
- Ability to drive consistent and repeatable results with limited supervision.
- Ability to manage large complex projects and multiple assignments, which may require prioritization of assignments with ability to multi-task with sense of urgency.
- Excellent oral and written communication and presentation skills.
- High level of self-motivation and superior time management
- Confident decision maker and demonstrates task and objective ownership.
- High attention to detail, accurate and consistent (on time) delivery
- Passion for personal development and learning
NICE Framework references
This Mastercard role shares knowledge, skills, and abilities with related NICE work roles.
- OV-MGT-002 Provides leadership, management, direction, or development and advocacy so the organization can conduct resilience work.
Corporate Security Responsibility
Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must:
- Abide by Mastercard's security policies and practices;
- Ensure the confidentiality and integrity of the information being accessed;
- Report any suspected information security violation or breach, and
- Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.
**Corporate Security Responsibility**
All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must:
+ Abide by Mastercard's security policies and practices;
+ Ensure the confidentiality and integrity of the information being accessed;
+ Report any suspected information security violation or breach, and
+ Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.
This advertiser has chosen not to accept applicants from your region.

Major Incident Response Analyst

Bengaluru, Karnataka Astellas Pharma

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

**Purpose and Scope:**
We are looking for a detail-oriented and proactive Major Incident Response Analyst to join our incident response team. The ideal candidate will be responsible for analyzing and managing major incidents that affect our operations, ensuring timely resolution and minimizing impact on the business. This role requires strong analytical skills, effective communication, and the ability to work collaboratively in a fast-paced environment.
**Responsibilities and Accountabilities:**
+ Proactively monitor and analyze incidents to identify major incidents that require immediate attention and escalation.
+ Collaborate with End User Technology Support, the Digital Desk, Security Operations, and other relevant teams to support effective response and resolution of major incidents.
+ Assist in investigations of major incidents to determine root causes and impact on business operations.
+ Maintain detailed incident records, including timelines, actions taken, communications, and resolution outcomes to support reporting and analysis.
+ Maintain and update the Major Incident Management process, including policies, procedures, knowledge base with critical contacts and best practices.
+ Organise and participate in post-incident reviews to identify lessons learned and recommend improvements to incident management processes.
+ Maintain and update incident management tools and documentation to ensure accurate tracking and reporting of major incidents.
+ Provide support and guidance to team members during major incidents, ensuring adherence to established processes and protocols.
+ Stay informed about industry trends, latest security threats, and best practices related to incident response and management.
+ Contribute to a culture of preparedness across Service Enablement, TechX and DigitalX.
+ Work closely with End User Technology Support, SecOps & Incident Response and the Digital Desk
+ Capable of identifying potential signs of external threat actor involvement which could indicate a security incident.
+ Stay current with industry trends, threats, and best practices related to incident management
**Required Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
+ Atleast 3 years of experience in incident management, with a focus on major incidents in a complex global environment.
+ Strong understanding of IT service management (ITSM) frameworks, such as ITIL.
+ Excellent leadership and team management skills, with the ability to motivate and guide cross-functional teams.
+ Strong analytical and problem-solving abilities, with a focus on root cause analysis and continuous improvement.
+ Exceptional communication skills, both written and verbal, with the ability to convey complex information to diverse audiences.
+ Relevant certifications (e.g., ITIL, CISSP, CISM) are a plus.
**Preferred Qualifications:**
+ Experience in managing IT budgets and vendor relationships.
+ Relevant certifications, such as ITIL, PMP, or AWS, are a plus
**Working Environment**
**Astellas' Global Capability Centres - Overview**
_Astellas' Global Capability Centres (GCCs) are strategically located sites that give Astellas the ability to access talent across various functions in the value chain and to co-locate core capabilities that are currently dispersed._ __ _Our three GCCs are located in India, Poland and Mexico._ __
__ _The GCCs will enhance our operational efficiency, resilience and innovation potential, enabling a timely response to changing business demands._ __
__ _Our GCCs are an integral part of Astellas, guided by our shared values and behaviors, and are critical enablers of the company's strategic priorities, sustainable growth, and commitment to turn innovative science into VALUE for patients._
Category
Astellas is committed to equality of opportunity in all aspects of employment.
EOE including Disability/Protected Veterans
This advertiser has chosen not to accept applicants from your region.

Senior Incident Response Specialist

462001 Bhopal, Madhya Pradesh ₹1000000 Annually WhatJobs

Posted 6 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is actively seeking a highly skilled and dedicated Senior Incident Response Specialist to join their elite cybersecurity team. This is a critical, fully remote role where you will be at the forefront of defending the organization against cyber threats. Your primary responsibility will be to lead and manage the response to security incidents, minimizing their impact and preventing recurrence. This involves conducting thorough investigations, analyzing security events, identifying root causes, and implementing effective containment and eradication strategies. You will work with sophisticated tools and technologies to detect, analyze, and respond to a wide range of security incidents across the enterprise.

Key responsibilities include:
  • Leading and coordinating the response to cybersecurity incidents 24/7, ensuring swift and effective action.
  • Conducting in-depth forensic investigations of security breaches to determine scope, impact, and root cause.
  • Analyzing security logs, network traffic, and endpoint data to detect malicious activity.
  • Developing and implementing containment, eradication, and recovery strategies for security incidents.
  • Documenting all aspects of incident response activities, including timelines, findings, and recommendations.
  • Creating comprehensive incident reports for technical teams and senior management.
  • Developing and refining incident response playbooks and procedures.
  • Staying current with the latest threat intelligence, attack vectors, and mitigation techniques.
  • Collaborating with internal teams (IT, Legal, Communications) and external agencies during incident response.
  • Conducting post-incident reviews to identify lessons learned and areas for improvement.
  • Maintaining and enhancing the incident response toolkit and infrastructure.
  • Providing expertise and guidance on security best practices to prevent future incidents.
  • Performing threat hunting activities to proactively identify potential security risks.
  • Contributing to security awareness training for employees.
The ideal candidate will possess a Bachelor's degree in Computer Science, Cybersecurity, or a related field, with a minimum of 6-8 years of experience in incident response, digital forensics, or a similar cybersecurity role. Hands-on experience with SIEM tools (e.g., Splunk, QRadar), EDR solutions, and forensic analysis tools is essential. A strong understanding of various attack methodologies (e.g., MITRE ATT&CK framework) and malware analysis is required. Industry certifications such as GCIH, GCFA, OSCP, or CISSP are highly preferred. Excellent analytical, problem-solving, and communication skills are critical for effectively managing high-pressure situations and communicating complex technical information clearly. This position is 100% remote, allowing you to work from anywhere.
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Analyst (Incident Response)

570001 Mysore, Karnataka ₹80000 Monthly WhatJobs

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a highly skilled Cybersecurity Analyst specializing in Incident Response to join their security operations team in Mysuru, Karnataka, IN . This critical role involves defending the organization against cyber threats, detecting security breaches, and orchestrating swift and effective responses to incidents. The ideal candidate will possess a deep understanding of threat landscapes, forensic investigation techniques, and security tools. This is a remote position, requiring a self-motivated individual with excellent analytical and problem-solving skills.

Responsibilities:
  • Monitor security alerts and events from various sources, including SIEM, IDS/IPS, and endpoint detection systems.
  • Investigate potential security incidents, determine their scope, impact, and root cause.
  • Develop and execute incident response plans and playbooks.
  • Conduct digital forensic investigations to collect and preserve evidence.
  • Analyze malware and identify attack vectors.
  • Contain and eradicate security threats from affected systems.
  • Coordinate with internal teams (IT, Legal, PR) and external stakeholders during incident response.
  • Document incident details, actions taken, and lessons learned.
  • Develop and recommend security enhancements to prevent future incidents.
  • Stay current with emerging threats, vulnerabilities, and cybersecurity best practices.
  • Participate in threat hunting activities.
  • Provide technical guidance and support to other security team members.
  • Develop and deliver security awareness training as needed.
  • Maintain and improve incident response tools and technologies.

Qualifications:
  • Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
  • 3-5 years of experience in cybersecurity, with a focus on incident response and digital forensics.
  • Hands-on experience with SIEM tools (e.g., Splunk, QRadar), IDS/IPS, and EDR solutions.
  • Proficiency in forensic analysis tools (e.g., FTK, EnCase) and techniques.
  • Strong understanding of network protocols, operating systems (Windows, Linux), and common attack vectors.
  • Experience with malware analysis is a significant advantage.
  • Relevant certifications such as CompTIA Security+, CEH, GIAC GCIH, or similar are highly desirable.
  • Excellent analytical, problem-solving, and critical thinking skills.
  • Strong written and verbal communication skills, with the ability to articulate technical issues clearly.
  • Ability to work under pressure and manage multiple incidents simultaneously.
  • Willingness to be on-call as needed.

This role is based in Mysuru, Karnataka, IN , but is a fully remote position. Our client offers a challenging and dynamic work environment with opportunities for professional growth in the rapidly evolving field of cybersecurity.
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Analyst - Threat Detection & Incident Response

226002 Lucknow, Uttar Pradesh ₹110000 Annually WhatJobs

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
A prominent financial institution in Lucknow, Uttar Pradesh, IN is seeking a highly skilled Senior Information Security Analyst to bolster its cybersecurity defenses. This crucial role focuses on advanced threat detection, rapid incident response, and proactive security measures to safeguard sensitive corporate data and systems. The ideal candidate will possess deep expertise in cybersecurity principles, network security, endpoint security, and vulnerability management. You will be responsible for monitoring security alerts, analyzing potential threats, investigating security incidents, and developing effective remediation strategies. This includes conducting forensic analysis, developing playbooks for incident response, and coordinating with internal teams and external stakeholders during security breaches. A strong understanding of security frameworks, compliance regulations (e.g., GDPR, PCI DSS), and threat intelligence is essential. We are looking for a proactive, analytical individual with exceptional problem-solving skills and the ability to operate effectively under pressure. The Senior Information Security Analyst will also contribute to security awareness training, policy development, and continuous improvement of the organization's security posture. This is an excellent opportunity for a seasoned security professional to make a significant impact in a critical sector.

Responsibilities:
  • Monitor and analyze security alerts from various systems (SIEM, IDS/IPS, EDR) to detect potential threats and anomalies.
  • Investigate security incidents, perform root cause analysis, and develop effective remediation plans.
  • Lead and coordinate incident response activities, ensuring timely and efficient resolution of security breaches.
  • Conduct forensic analysis of compromised systems and digital evidence.
  • Develop and maintain incident response playbooks and procedures.
  • Stay current with the latest cybersecurity threats, vulnerabilities, and attack vectors.
  • Proactively identify and assess security risks within the organization's IT infrastructure.
  • Contribute to the development and enforcement of information security policies and standards.
  • Collaborate with IT operations and development teams to implement security controls and best practices.
  • Participate in security awareness training initiatives for employees.
  • Prepare detailed reports on security incidents, investigations, and mitigation efforts.

Qualifications:
  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • Minimum of 6-8 years of experience in information security, with a focus on threat detection and incident response.
  • Proven experience with Security Information and Event Management (SIEM) tools.
  • Strong understanding of networking protocols, operating systems (Windows, Linux), and common attack techniques.
  • Hands-on experience with forensic tools and techniques.
  • Knowledge of cybersecurity frameworks (e.g., NIST, ISO 27001) and relevant compliance regulations.
  • Relevant security certifications such as CISSP, CEH, OSCP, or SANS certifications are highly desirable.
  • Excellent analytical, problem-solving, and critical thinking skills.
  • Strong communication and interpersonal skills, with the ability to explain technical concepts to non-technical audiences.
  • Ability to work effectively under pressure and manage multiple priorities.
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Security monitoring Jobs in India !

Lead Information Security Analyst - SIEM & Incident Response

390007 Vadodara, Gujarat ₹1400000 Annually WhatJobs

Posted 14 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client, a prominent player in the financial services industry, is seeking an experienced and dynamic Lead Information Security Analyst to bolster their security operations. This crucial role involves overseeing the security posture, managing Security Information and Event Management (SIEM) systems, and leading incident response efforts. The ideal candidate will possess extensive knowledge of cybersecurity threats, vulnerabilities, and mitigation strategies. Responsibilities include developing and implementing security policies and procedures, conducting regular security assessments, managing security tools and technologies, and acting as a primary point of contact during security incidents. You will be instrumental in detecting, analyzing, and responding to security breaches, ensuring minimal impact on the organization. Experience with various SIEM platforms (e.g., Splunk, QRadar, ELK Stack) and a strong understanding of log analysis and threat hunting techniques are paramount. This role also involves mentoring junior security analysts and contributing to the continuous improvement of the security program. The candidate should have a deep understanding of network security, endpoint security, cloud security, and cryptography. Excellent communication skills are required to liaise with IT teams, management, and potentially external auditors. This position is based in **Vadodara, Gujarat, IN**, with a hybrid work arrangement that balances remote flexibility with essential in-office collaboration. A minimum of 7 years of progressive experience in information security, with at least 3 years in a lead or senior analyst role. Proven expertise in SIEM administration, configuration, and utilization for threat detection. Hands-on experience in incident response, including containment, eradication, and recovery. Strong understanding of security frameworks (e.g., NIST, ISO 27001) and regulatory compliance. Relevant certifications such as CISSP, CISM, GIAC, or equivalent are highly preferred. Bachelor's or Master's degree in Cybersecurity, Computer Science, or a related field. Ability to perform under pressure and make critical decisions during security incidents. Strong analytical and problem-solving capabilities.
This advertiser has chosen not to accept applicants from your region.

Senior Information Security Analyst - SIEM & Incident Response

122001 Gurgaon, Haryana ₹1500000 Annually WhatJobs

Posted 20 days ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a highly skilled and experienced Senior Information Security Analyst with expertise in SIEM (Security Information and Event Management) and Incident Response to join their cybersecurity team. This Hybrid role involves protecting our organization's digital assets by monitoring security alerts, investigating potential threats, and responding to security incidents effectively. You will play a crucial role in enhancing our security posture, developing robust incident response procedures, and ensuring compliance with industry best practices and regulations. The ideal candidate is proactive, detail-oriented, and possesses strong analytical and problem-solving skills, with the ability to work both independently and collaboratively in a team environment.

Key Responsibilities:
  • Monitor and analyze security alerts generated by SIEM tools (e.g., Splunk, QRadar, LogRhythm) to detect and investigate potential security incidents.
  • Lead and coordinate the response to security incidents, including containment, eradication, and recovery efforts.
  • Develop, refine, and document incident response playbooks and procedures.
  • Perform forensic analysis of security incidents to determine root cause and impact.
  • Conduct threat hunting activities to proactively identify and neutralize emerging threats.
  • Configure and tune SIEM rules, correlation searches, and dashboards to improve threat detection capabilities.
  • Collaborate with IT operations, network teams, and other departments to implement security controls and remediate vulnerabilities.
  • Stay current with the latest threat intelligence, attack vectors, and cybersecurity trends.
  • Participate in security awareness training and educate employees on security best practices.
  • Assist in security audits and ensure compliance with relevant regulations (e.g., GDPR, ISO 27001).
  • Manage and maintain security tools and technologies.
  • Contribute to the development and improvement of the overall information security strategy.
Qualifications:
  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • 5+ years of experience in information security, with a focus on SIEM and incident response.
  • Hands-on experience with SIEM platforms (e.g., Splunk, QRadar, ArcSight, LogRhythm).
  • Strong understanding of common attack vectors, malware analysis, and threat intelligence.
  • Experience with forensic investigation tools and techniques.
  • Proficiency in scripting languages (e.g., Python, PowerShell) for automation is a plus.
  • Knowledge of network protocols, operating systems (Windows, Linux), and cloud security principles.
  • Excellent analytical, problem-solving, and critical thinking skills.
  • Strong communication and interpersonal skills, with the ability to work effectively in a team.
  • Relevant security certifications such as CISSP, GCIH, GCIA, CEH are highly desirable.
This is a challenging and rewarding opportunity to contribute significantly to an organization's security resilience.Job Location: This is a Hybrid role. Employees are expected to work from the office a few days a week, with the flexibility to work remotely on other days. The primary office location for this position is in Gurugram, Haryana, IN .
This advertiser has chosen not to accept applicants from your region.

Senior Global Incident Response Analyst

Bangalore, Karnataka Vontier

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

As the Information Security Senior Global Incident Response Analyst, you will play a critical role in the organization's cybersecurity efforts. The position is responsible for acting as a senior analyst during security incidents, coordinating efforts with various members of the Incident Response Team, ensuring Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned. This position will work closely with business owners, IT teams, Privacy/Legal, and other members of the Information Security Team to protect the confidentiality, integrity, and availability of the organization's data and systems.
In this role, you will be responsible for the following:
- Incident Response Command
Participate and occasionally lead the response to high-impact cybersecurity incidents.
Coordinate cross-functional teams globally to ensure timely containment, eradication, and recovery.
Act as a first-level decision-maker during incidents, escalating to Managers/Directors, coordinating with InfoSec Comms, and following established response protocols.
- Process & Procedure Improvement
Develop, maintain, and continuously improve global incident response playbooks, runbooks, and workflows.
Participate in regular incident simulations and tabletop exercises to evaluate and enhance response readiness.
Analyze incident post-mortems to identify root causes and implement corrective actions.
- Collaboration & Stakeholder Management
Work closely with IT, Security Operations, Legal, Communications, and business units worldwide to ensure alignment during incidents.
Work with Security Awareness function to assist in improving user security awareness stemming from security incidents.
Act as a liaison between technical teams and senior leadership to provide clear incident updates and risk assessments.
- Reporting & Compliance
Maintain incident documentation and reporting in accordance with regulatory and compliance requirements.
Track key incident metrics and produce reports to inform security strategy and executive leadership.
At a minimum, we would like you to have:
- Bachelor's degree in Information Security, Information Technology, Computer Science, or a related field or equivalent work experience.
- Proven experience (5 years) in cybersecurity (operations, vulnerability management, engineering, or related roles) with at least 1 year of experience coordinating incident response actions/activities
- Advanced knowledge of security concepts and principles
- Experience coordinating global, cross-functional teams in high-pressure situations
- Excellent communication and stakeholder management skills
- Familiarity with common security tools such as SIEM, EDR, forensics, and incident management platforms
- Strong analytical and problem-solving skills.
- Robust attention to detail.
- Obtain relevant certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), etc.
Career Development:
- This position serves a mid-level individual contributor role in information security. As the Senior Global Incident Response Analyst gains experience and certifications, they can advance to higher-level roles such as Incident Response Lead and/or Manager. Continuing education and professional development are essential for career growth in this field.
**WHO IS VONTIER**
Vontier (NYSE: VNT) is a global industrial technology company uniting productivity, automation and multi-energy technologies to meet the needs of a rapidly evolving, more connected mobility ecosystem. Leveraging leading market positions, decades of domain expertise and unparalleled portfolio breadth, Vontier enables the way the world moves - delivering smart, safe and sustainable solutions to our customers and the planet. Vontier has a culture of continuous improvement and innovation built upon the foundation of the Vontier Business System and embraced by colleagues worldwide. Additional information about Vontier is available on the Company's website at .
**At Vontier, we empower you to steer your career in the direction of success with a dynamic, innovative, and inclusive environment.**
Our commitment to personal growth, work-life balance, and collaboration fuels a culture where your contributions drive meaningful change. We provide the roadmap for continuous learning, allowing creativity to flourish and ideas to accelerate into impactful solutions that contribute to a sustainable future.
Join our community of passionate people who work together to navigate challenges and seize opportunities. At Vontier, you are not on this journey alone-we are dedicated to equipping you with the tools and support needed to fuel your innovation, lead with impact, and thrive both personally and professionally.
**Together, let's enable the way the world moves!**
The company in which you have expressed employment interest is a subsidiary or affiliate of Vontier Corporation. The subsidiary or affiliate is referred to as a Vontier Company. Vontier Corporation and all Vontier Companies are equal opportunity employers that evaluate qualified applicants without regard to race, color, national origin, religion, ancestry, sex (including pregnancy, childbirth and related medical conditions), age, marital status, disability, veteran status, citizenship status, sexual orientation, gender identity or expression, and other characteristics protected by law. The "EEO is the Law" poster is available at: Individuals who need a reasonable accommodation because of a disability for any part of the employment process should call or e-mail to request accommodation.
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Monitoring Jobs