1,142 Security Operations jobs in India

Security Operations Analyst

Teradata

Posted today

Job Viewed

Tap Again To Close

Job Description

**Our Company**
At Teradata, we believe that people thrive when empowered with better information. That's why we built the most complete cloud analytics and data platform for AI. By delivering harmonized data, trusted AI, and faster innovation, we uplift and empower our customers-and our customers' customers-to make better, more confident decisions. The world's top companies across every major industry trust Teradata to improve business performance, enrich customer experiences, and fully integrate data across the enterprise.
The Security Operations Analyst is responsible for monitoring, analyzing, and responding to cybersecurity incidents and threats promptly. This role is crucial in protecting the organization's digital infrastructure, data, and assets by supporting daily security operations, investigating alerts, and enhancing the security posture through continuous improvement of detection and response capabilities.
**Work You'll Do**
+ Monitor SIEM and security tools for suspicious activity and potential threats.
+ Triage and analyze security alerts to determine impact and urgency.
+ Investigate and respond to cybersecurity incidents, including malware infections, phishing, unauthorized access, and data exfiltration.
+ Escalate significant incidents to senior analysts or incident response teams as needed.
+ Maintain and tune security tools such as SIEM, EDR, IDS/IPS, and firewalls.
+ Assist in rule creation and fine-tuning to reduce false positives and improve detection.
+ Consume and correlate threat intelligence feeds with internal data.
+ Identify indicators of compromise (IOCs) and proactively hunt for threats.
+ Analyze logs from various sources (network, system, application) for anomalies.
+ Correlate events across multiple data sets to uncover patterns and threats.
+ Document incidents, response actions, and findings in incident management systems.
+ Prepare regular reports on security posture, incident metrics, and threat trends.
+ Assist in educating users on secure practices and common threats.
**What Makes You a Qualified Candidate**
+ Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
+ 2-5 years of experience in a security operations or SOC role.
+ Experience with SIEM platforms (e.g., Splunk, Microsoft Sentinel, QRadar, etc.).
+ Hands-on knowledge of security tools (e.g., EDR, IDS, firewalls, threat intelligence platforms).
+ Familiarity with common threat vectors, attack techniques (MITRE ATT&CK), and incident response processes.
+ Working knowledge of TCP/IP, networking concepts, Windows/Linux logs, and cloud security.
#LI-NM1
Why We Think You'll Love Teradata
We prioritize a people-first culture because we know our people are at the very heart of our success. We embrace a flexible work model because we trust our people to make decisions about how, when, and where they work. We focus on well-being because we care about our people and their ability to thrive both personally and professionally. We are committed to actively working to foster an inclusive environment that celebrates people for all of who they are.
This advertiser has chosen not to accept applicants from your region.

Security Operations Analyst

Bangalore, Karnataka Danaher Corporation

Posted today

Job Viewed

Tap Again To Close

Job Description

Bring more to life.
Are you ready to accelerate your potential and make a real difference within life sciences, diagnostics and biotechnology?
At Cytiva, one of Danaher's ( 15+ operating companies, our work saves lives-and we're all united by a shared commitment to innovate for tangible impact.
You'll thrive in a culture of belonging where you and your unique viewpoint matter. And by harnessing Danaher's system of continuous improvement, you help turn ideas into impact - innovating at the speed of life.
Working at Cytiva means being at the forefront of providing new solutions to transform human health. Our incredible customers undertake life-saving activities ranging from fundamental biological research to developing innovative vaccines, new medicines, and cell and gene therapies.
At Cytiva you will be able to continuously improve yourself and us - working on challenges that truly matter with people that care for each other, our customers, and their patients. Take your next step to an altogether life-changing career.
Learn about the Danaher Business System ( which makes everything possible.
The Security Operations Analyst is responsible for monitoring, analyzing, and responding to security incidents to protect the organization's digital assets and infrastructure. By proactively identifying threats and vulnerabilities, they play a critical role in minimizing risk and ensuring business continuity.
This position reports to the Senior Manager, Security Operations and is part of the Information Security Team which operates globally. This will be an on-site role, based at our office in Bangalore working as part of a global team. At Cytiva, our vision is, to advance future therapeutics from discovery to delivery.
What you will do:
+ Perform advanced security incident analysis and digital forensics to identify threats and mitigate risks.
+ Lead complex security investigations, including malware analysis, network traffic analysis, and endpoint detection.
+ Provide guidance to L1 and L2 SOC analysts, improving the quality of information coming into the Security Operations team.
+ Investigate and respond to escalated security incidents in a timely manner.
+ Collaborate with our engineering teams to optimize and fine-tune SIEM (e.g., Splunk, Microsoft Sentinel, Elastic Security) and other security tools.
+ Conduct proactive threat hunting to uncover hidden threats and vulnerabilities within the organization.
+ Partner with other IT and security teams to improve the organization's security posture.
+ Produce detailed reports and recommendations for remediation and security improvements, including hosting post incident reviews with wider technical teams.
Who you are:
+ Minimum 5+ years of experience in a corporate IT environment, with at least 2 years in an L3 or senior analyst role.
+ Deep knowledge of security frameworks such as MITRE ATT&CK, NIST, CIS Controls, and ISO 27001.
+ Experience with SIEM platforms (e.g., Splunk, Sentinel, QRadar, ArcSight) and EDR/XDR solutions. Vendor certifications are a plus.
+ Hands-on experience with incident response, threat hunting, and forensic investigations.
+ Familiarity with cloud security (AWS, Azure, Google Cloud) and modern attack techniques. Certifications such as OSCP, CEH are a plus.
It would be a plus if you also possess previous experience in:
+ Scripting and automation (Python, PowerShell, Bash) to improve SOC processes
+ SME in EDR, SIEM, UBA, DLP or Data Security
+ Operation Technology (OT) environments
Cytiva, a Danaher operating company, offers a broad array of comprehensive, competitive benefit programs that add value to our lives. Whether it's a health care program or paid time off, our programs contribute to life beyond the job. Check out our benefits at Danaher Benefits Info ( .
Join our winning team today. Together, we'll accelerate the real-life impact of tomorrow's science and technology. We partner with customers across the globe to help them solve their most complex challenges, architecting solutions that bring the power of science to life.
For more information, visit .
At Danaher, we value diversity and the existence of similarities and differences, both visible and not, found in our workforce, workplace and throughout the markets we serve. Our associates, customers and shareholders contribute unique and different perspectives as a result of these diverse attributes.
This advertiser has chosen not to accept applicants from your region.

Security Operations Analyst

Pune, Maharashtra ZS

Posted today

Job Viewed

Tap Again To Close

Job Description

ZS is a place where passion changes lives. As a management consulting and technology firm focused on improving life and how we live it, our most valuable asset is our people. Here you’ll work side-by-side with a powerful collective of thinkers and experts shaping life-changing solutions for patients, caregivers and consumers, worldwide. ZSers drive impact by bringing a client first mentality to each and every engagement. We partner collaboratively with our clients to develop custom solutions and technology products that create value and deliver company results across critical areas of their business. Bring your curiosity for learning; bold ideas; courage and passion to drive life-changing impact to ZS.

Our most valuable asset is our people .

At ZS we honor the visible and invisible elements of our identities, personal experiences and belief systems—the ones that comprise us as individuals, shape who we are and make us unique. We believe your personal interests, identities, and desire to learn are part of your success here. about our diversity, equity, and inclusion efforts and the networks ZS supports to assist our ZSers in cultivating community spaces, obtaining the resources they need to thrive, and sharing the messages they are passionate about.

Security Operations Analyst

We are seeking an experienced professional to join our Pune, India office as a Security Operations Analyst with a strong background in Security Information and Event Management (SIEM) platforms, specifically in Microsoft Sentinel and Wiz. The ideal candidate will be responsible for leading advanced threat detection, response, and monitoring activities. This role will be critical in enhancing our cybersecurity posture and ensuring the ZS environment remains secure against emerging threats.

What you’ll do:

  • Monitor Microsoft Sentinel for security alerts and events on a 24x7 basis
  • Perform initial triage and analysis of security events, including prioritization and escalation based on defined incident response procedures
  • Identify potential security incidents, false positives, and provide recommendations for mitigation or escalation to L2 SOC analysts
  • Leverage KQL queries for investigations
  • Document incidents, investigation results, and actions taken in the ticketing system
  • Follow established SOC processes and playbooks for effective incident response
  • Support continuous improvement by identifying gaps in monitoring and detection
  • Monitoring of other security tools such EDR – CrowdStrike, AWS Security Alerts for level 1 analysis based on the defined playbooks
  • Flexible in following updated playbooks as the security landscape changes
  • Candidates must be flexible and willing to work varying 24*7 shifts to ensure consistent coverage
  • What you’ll bring:

  • Strong analytical and problem-solving abilities
  • Excellent communication and interpersonal skills to effectively collaborate with cross-functional teams
  • Proven ability to remain calm and efficient under a high-pressure environment
  • Proficient in using SIEM tools, such as Microsoft Sentinel
  • Experience in Cloud Security Operations and Incident Response platforms such as Wiz
  • In-depth understanding of cyber threats, vulnerabilities, and attack vectors
  • Knowledge in creating KQL queries and custom alerts within Microsoft Sentinel
  • Exposure in incident response and management procedures
  • Experienced in conducting L1 investigations and root cause analysis for incidents
  • Adept at collaborating with stakeholders to resolve complex cybersecurity challenges
  • Knowledge of major cloud platforms (AWS, Azure, GCP), including their security models, IAM roles, virtual private cloud (VPC) configurations, and cloud-native security tools
  • Good to have skills and abilities:

  • Excellent interpersonal (self-motivational, organizational, personal project management) skills
  • Knowledge of vulnerability management and scanning best practices such as CVE database and the CVS System
  • Ability to analyze cyber threats to develop actionable intelligence
  • Flexibility to adapt to changing priorities and shifts
  • Academic Qualifications:

  • Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field (or equivalent experience)
  • 2+ years of experience in a Security Operations Center (SOC) environment, with a focus on SIEM management
  • Hands-on experience with Microsoft Sentinel, including data connectors, KQL queries, analytics rules, and workbooks
  • Exposure in incident response, threat detection, and security monitoring
  • Solid understanding of Windows, Linux, and cloud security concepts
  • Relevant certifications (e.g., CompTIA Security+, Microsoft Certified: Security Operations Analyst, GCIA, GCIH, OSDA, GCFA) are preferred
  • Preferred Security Cloud Certifications: AWS Security Specialty
  • Perks & Benefits:

    ZS offers a comprehensive total rewards package including health and well-being, financial planning, annual leave, personal growth and professional development. Our robust skills development programs, multiple career progression options and internal mobility paths and collaborative culture empowers you to thrive as an individual and global team member.

    We are committed to giving our employees a flexible and connected way of working. A flexible and connected ZS allows us to combine work from home and on-site presence at clients/ZS offices for the majority of our week. The magic of ZS culture and innovation thrives in both planned and spontaneous face-to-face connections.

    Travel:

    Travel is a requirement at ZS for client facing ZSers; business needs of your project and client are the priority. While some projects may be local, all client-facing ZSers should be prepared to travel as needed. Travel provides opportunities to strengthen client relationships, gain diverse experiences, and enhance professional growth by working in different environments and cultures.

    This advertiser has chosen not to accept applicants from your region.

    Security Operations Analyst

    Bengaluru, Karnataka Johnson Controls

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Job Title:  Security Operations Analyst

    Location:  Bangalore, Karnataka, India

    What you will do:

    As a Security Operations Analyst, you will play a critical role in monitoring and responding to security incidents, identifying vulnerabilities, and ensuring compliance with security policies. You will collaborate with various stakeholders to enhance the security posture of our organization and support incident response activities.

    How you will do it:

  • Monitor security alerts and events from various security tools and platforms.
  • Investigate security incidents, perform root cause analysis, and document findings.
  • Assist in the management of security incidents, including containment, eradication, and recovery efforts.
  • Conduct regular security assessments and vulnerability scans to identify potential risks.
  • Collaborate with IT and other departments to remediate vulnerabilities and implement security best practices.
  • Support incident response activities and maintain incident response documentation.
  • Participate in security awareness training and educate staff on security policies and procedures.
  • Stay updated with the latest security trends, threats, and technologies.
  • What we look for:

  • Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • 3-5 years of experience in security operations, incident response, or a related field.
  • Strong understanding of security frameworks and best practices (e.g., NIST, ISO 27001).
  • Experience with security tools such as SIEM, IDS/IPS, and vulnerability management solutions.
  • Knowledge of networking protocols and systems security concepts.
  • Excellent analytical and problem-solving skills.
  • Strong communication skills and the ability to work collaboratively in a team environment.
  • Relevant cybersecurity certifications (e.g., CompTIA Security+, CEH, CISSP) are a plus.
  • This advertiser has chosen not to accept applicants from your region.

    Security Operations Analyst

    Bengaluru, Karnataka ALTERYX

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    We’re looking for problem solvers, innovators, and dreamers who are searching for anything but business as usual. Like us, you’re a high performer who’s an expert at your craft, constantly challenging the status quo. You value inclusivity and want to join a culture that empowers you to show up as your authentic self. You know that success hinges on commitment, that our differences make us stronger, and that the finish line is always sweeter when the whole team crosses together.

    Alteryx is searching for a Security Operations Analyst in India. We’re looking for problem solvers, innovators, and dreamers who are searching for anything but business as usual. Like us, you’re a high performer who’s an expert at your craft, constantly challenging the status quo. You value inclusivity and want to join a culture that empowers you to show up as your authentic self. You know that success hinges on commitment, that our differences make us stronger, and that the finish line is always sweeter when the whole team crosses together.

    Position Overview:

    As a Security Operations team member, you will be on the front line of protecting Alteryx products, infrastructure, and applications. You will partner with internal stakeholders and all parts of the business to execute on security monitoring and response missions, drive through incident response lifecycles, influence positive changes throughout the organization on security postures, and manage and maintain state of art security technologies to protect the company assets and brand.

    Primary Responsibilities :

  • Triage and respond to security alerts and incidents in both on-prem and multi cloud environment for Alteryx enterprise and product environments.
  • Participate in security incident response through in-depth and technical analysis on logs, malware, and network traffic, and perform forensics analysis as necessary.
  • Provide 24x7 on call assistance in responding to security incidents. 
  • Collaborate with internal stakeholders to develop security monitoring and detection use cases to drive risk reduction and operational effectiveness.
  • Support and participate in security automation program to enable security operations team to scale to handle growing workloads.
  • Support internal and external business partners in successful outcomes with respect to security requirements.
  • Requirements:

  • Bachelor’s degree in computer science or related field or equivalent experience/training.Master’s degree in computer science a plus.
  • 3+ years’ experience in security operations or various security roles with experience across the technology stack.
  • Good understanding of security incidents management lifecycle.
  • Ability to analyze and understand system data including security event logs, system logs, application logs, and device logs from on prem and cloud environments
  • Familiar with security best practices in major cloud environments such as AWS, GCP or Azure
  • Strong skills in operating systems such as Windows, Linux and OS X, and corresponding forensics skills a plus.
  • Experience in scripting languages such as Python, Perl, Ruby, PowerShell, or Shell script.
  • Good verbal and written communication skills, including ticket documentation, and incident reporting and escalations.
  • Knowledge of network devices, firewalls, IDS/IPS, TCP/IP protocols, and general network architecture.
  • CISSP/CISM, SANS, CNSE (Palo Alto Networks), CCNP, CCIE, or other Networking and Security certifications a plus.
  • Find yourself checking a lot of these boxes but doubting whether you should apply? At Alteryx, we support a growth mindset for our associates through all stages of their careers. If you meet some of the requirements and you share our values, we encourage you to apply. As part of our ongoing commitment to a diverse, equitable, and inclusive workplace, we’re invested in building teams with a wide variety of backgrounds, identities, and experiences.

    This advertiser has chosen not to accept applicants from your region.

    Security Operations Manager

    Mumbai Metropolitan Region, Maharashtra NTT Global Networks

    Posted 8 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    Senior Manager – Security Operations


    1. JOB DESCRIPTION


    Job Title: Senior Manager – Security Operations

    Department: Engineering and Operations

    Location: Mumbai

    Reporting: Director, Global Security Operations

    Job Type: Full Time

    Shift: US Hours


    1. PRE-REQUISITES
    • Passionate for security
    • Hands-on experience with Security products and technology
    • Strong people management skills
    • Possess customer centric approach with empathy
    • Managed Network Security support experience on global large-scale networks
    • Strong communication, presentation and customer handling skills
    • Ability to offer technical and experience-based advice to executives, colleagues and subordinates
    • Proven ability on security automation
    • Technical expertise in multi-vendor environment
    • Firewall: Palo Alto, Fortinet, Checkpoint
    • VPN: SSL VPN Global Protect, Cisco Anyconnect
    • SASE: Zscaler ZIA, ZPA, ZDX, Palo Alto Prisma
    • NAC: Aruba Clear Pass, Cisco ISE
    • Load Balancers: F5 BigIP LTM/GTM, Juniper, Netscaler
    • SIEM
    • Experience on Cloud Infrastructure: Cloud stack, OpenStack, AWS, Azure and Scripting: PERL, Python or any other scripting language will be an added advantage.


    1. RESPONSIBILITIES
    • Manage Security Operations Center 24x7
    • Security Device management for global enterprise large-scale customers
    • Manage team of security engineers
    • Handle Incident, Problem and Change Management as per ITIL framework
    • Handle technical escalations
    • Manage ticket queue, participate in Severity 1 and Severity 2 tickets, handle customer escalations
    • Create Service Improvement Program
    • Create and Present Root Cause Report for Security Incidents
    • Act as point of contact for large clients
    • Proactively identify risks and vulnerabilities for security devices and drive vulnerability remediation program
    • Lead Patch Management process on all Security devices
    • Act as lead for Security Incidents and owner for investigation as well as follow-up actions
    • Build and Present weekly/monthly/quarterly performance reports and measurement metrics
    • Design and execute security operations processes; identify and measure critical Security Operations metrics; and continually improve the efficiency of the Security Operations function
    • Ensure asset compliance activities such as keeping track of licensing, support contracts, etc.
    • Supervise Security Deployment activities, resource allocation and escalations
    • Mentor and conduct training programs
    • Create and present annual evaluations, performance development plans and KRAs
    • Foster teamwork and show commitment to team objectives; promote collaboration and remove obstacles


    1. TRAINING AND CERTIFICATION
    • PCNSA, PCNSE, CISSP, NSE4, CCIE Security, CEH


    1. EXPERIENCE
    • Minimum 12 years of progressive, relevant experience and proven capability to work in a complex network environment


    1. EDUCATION
    • Bachelor in Engineering - Computers/Electronics/Communication or related field
    • Graduate/Post Graduate in Science/Math/IT or related streams with relevant technology experience
    This advertiser has chosen not to accept applicants from your region.

    Security Operations Specialist

    Noida, Uttar Pradesh HCLTech

    Posted 8 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    JD:


    • Minimum of 7 years of experience in Cyber security.
    • Proficient in Incident Management and Response, handling escalations
    • In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
    • Responsible for working in a 24x7 Security Operation center (SOC) environment and SIEM technologies & Security Event alert Analysis .
    • Provide analysis and trending of security log data from a large number of heterogeneous security devices
    • Provide threat and vulnerability analysis as well as security advisory services
    • Investigate, document, and report on information security issues and emerging trends
    • Guide and share information with other analysts and other teams.
    • Other tasks and responsibilities as assigned.
    • Knowledge of various operating system flavours including but not limited to Windows,
    • Linux, Unix
    • Good Understanding of Malware analysis and Phishing Analysis
    • Good Understanding of Email security
    • Knowledge of TCP/IP Protocols, network analysis, and network/security applications;
    • Knowledge of common Internet protocols and applications
    • Communicate effectively by contributing significantly to the development and delivery of a variety of written and visual documents for diverse audiences
    • Knowledge about various tools like – SIEM, XDR, SSL, Packet Analysis, HIPS/NIPS, Network Monitoring tools, Service Now Ticketing Toolset Web Security, AV, UBEA, Advanced SOC
    • Willingness to work overtime and adjust to reasonable demands from management in case of critical incidents being escalated to L3 for immediate handling.
    • Must have cybersecurity incident discovery and event management, network forensics, IPS/IDS, firewalls, content filtering technology, DLP, configuration management and monitoring, endpoint protection, database security, and log collection and analysis understanding
    • Strong working knowledge of security-relevant data, including network protocols, ports and common services, such as TCP/IP network protocols and application layer protocols (e.g. HTTP/S, DNS, FTP, SMTP, Active Directory etc.)
    • Experience and keen understanding of cybersecurity tools, including SIEM , IDS/IPS, antivirus and endpoint detection & response solutions.
    • Experience with leading security incident response
    • Involvement in threat intelligence and cybersecurity communities
    • Able to multitask and give equal and/or required attention to a variety of functions while under pressure
    • Ability to work independently and take ownership of projects and initiatives.
    • Excellent written and verbal communication skills required. Must be able to communicate technical details clearly.
    • Experience in developing and maintaining Play/Runbooks and/or Standard Operating Procedures in a SOC environment
    • Strong troubleshooting, reasoning, and analytical problem-solving skills
    • Ability to communicate technical details effectively in writing and verbally to junior IT personnel and management.
    • Team player with the ability to work autonomously.
    • Security Event Correlation as received from L2 SOC or Incident Response staff or relevant sources to determine increased risk to the business.
    • Recognize potential, successful, and unsuccessful intrusion attempts/compromises thorough review and analysis of relevant event detail and summary information.
    • Development and execution of SOC procedures
    • Triage security events and incidents, detect anomalies, and report/direct remediation actions.
    • Ensure confidentiality and protection of sensitive data.
    • Analysis of phishing emails reported by internal end users.
    • Working with remediation (IT Infra & Ops) teams on events and incident mitigation
    • Follow up on remediation activities.
    This advertiser has chosen not to accept applicants from your region.
    Be The First To Know

    About the latest Security operations Jobs in India !

     

    Nearby Locations

    Other Jobs Near Me

    Industry

    1. request_quote Accounting
    2. work Administrative
    3. eco Agriculture Forestry
    4. smart_toy AI & Emerging Technologies
    5. school Apprenticeships & Trainee
    6. apartment Architecture
    7. palette Arts & Entertainment
    8. directions_car Automotive
    9. flight_takeoff Aviation
    10. account_balance Banking & Finance
    11. local_florist Beauty & Wellness
    12. restaurant Catering
    13. volunteer_activism Charity & Voluntary
    14. science Chemical Engineering
    15. child_friendly Childcare
    16. foundation Civil Engineering
    17. clean_hands Cleaning & Sanitation
    18. diversity_3 Community & Social Care
    19. construction Construction
    20. brush Creative & Digital
    21. currency_bitcoin Crypto & Blockchain
    22. support_agent Customer Service & Helpdesk
    23. medical_services Dental
    24. medical_services Driving & Transport
    25. medical_services E Commerce & Social Media
    26. school Education & Teaching
    27. electrical_services Electrical Engineering
    28. bolt Energy
    29. local_mall Fmcg
    30. gavel Government & Non Profit
    31. emoji_events Graduate
    32. health_and_safety Healthcare
    33. beach_access Hospitality & Tourism
    34. groups Human Resources
    35. precision_manufacturing Industrial Engineering
    36. security Information Security
    37. handyman Installation & Maintenance
    38. policy Insurance
    39. code IT & Software
    40. gavel Legal
    41. sports_soccer Leisure & Sports
    42. inventory_2 Logistics & Warehousing
    43. supervisor_account Management
    44. supervisor_account Management Consultancy
    45. supervisor_account Manufacturing & Production
    46. campaign Marketing
    47. build Mechanical Engineering
    48. perm_media Media & PR
    49. local_hospital Medical
    50. local_hospital Military & Public Safety
    51. local_hospital Mining
    52. medical_services Nursing
    53. local_gas_station Oil & Gas
    54. biotech Pharmaceutical
    55. checklist_rtl Project Management
    56. shopping_bag Purchasing
    57. home_work Real Estate
    58. person_search Recruitment Consultancy
    59. store Retail
    60. point_of_sale Sales
    61. science Scientific Research & Development
    62. wifi Telecoms
    63. psychology Therapy
    64. pets Veterinary
    View All Security Operations Jobs