1,432 Threat Management jobs in India
Information Protection Lead (Insider Threat/Risk Management Expert)
Posted today
Job Viewed
Job Description
ZS is a place where passion changes lives. As a management consulting and technology firm focused on improving life and how we live it, our most valuable asset is our people. Here you’ll work side-by-side with a powerful collective of thinkers and experts shaping life-changing solutions for patients, caregivers and consumers, worldwide. ZSers drive impact by bringing a client first mentality to each and every engagement. We partner collaboratively with our clients to develop custom solutions and technology products that create value and deliver company results across critical areas of their business. Bring your curiosity for learning; bold ideas; courage and passion to drive life-changing impact to ZS.
Our most valuable asset is our people .
At ZS we honor the visible and invisible elements of our identities, personal experiences and belief systems—the ones that comprise us as individuals, shape who we are and
make us unique. We believe your personal interests, identities, and desire to learn are part of your success here. about our diversity, equity, and inclusion efforts and the networks ZS supports to assist our ZSers in cultivating community spaces, obtaining the resources they need to thrive, and sharing the messages they are passionate about.
Information Protection Lead
We are seeking a highly motivated and experienced professional to build and lead our Insider Threat & Risk Management team within the Information Security group. This role is critical in identifying, assessing, and mitigating insider risks to protect our firm’s critical data, intellectual property, and operational integrity.
The Lead will develop and execute an insider threat program, leveraging behavioral analytics, security tools, and cross-functional collaboration to proactively detect and respond to threats.
What You'll Do:
What You'll Bring:
Security Analyst
Posted 4 days ago
Job Viewed
Job Description
As a member of the incident/Workorder/Change handling team , you will have the following accountabilities:
+ Will be working as an SME for Zscaler Support in Operations for ZIA, ZPA and ZDX.
+ Assess and orchestrate the current and planned security posture for NTT data's Security infrastructure, providing recommendations for improvement and risk reduction.
+ Identify and propose process improvements and identify opportunities for new processes and procedures to reduce risk.
+ Support security incident response as required; First line responder to reported or detected incidents.
+ Perform security research, analysis, security vulnerability assessments and penetration tests.
+ Provide security audit and investigation support
+ Monitor and track security systems for Vulnerability and respond to potential security Vulnerability.
+ Provide support for the Vulnerability management program.
+ Provide 24x7 support as operations team working in shifts.
+ Participate in on-call system administration support including but not limited to weekends, holidays and after-business hours as required to service the needs of the business.
**Skills and Experience**
+ 4 to 5 years+ in Information Security space.
+ Strong experiance in Service Now Ticketing tool, Dashboards and Integration.
+ Strong experience with Zscaler ZIA, ZPA and ZDX.
+ Strong experience with Vulnerability Management Program.
+ Strong experience with Qualys Vulnerability Management Tool.
+ Some good to have Experience with Crowdstrike EDR and SIEM.
+ Strong experience with multiple network operating systems, including two or more of the following: Cisco iOS, Juniper ScreenOS or Junos, Fortinet FortiOS, CheckPoint GAiA, or Palo Alto Networks PAN-OS; Tanium, Rapid 7, Nessus, Nitro ESM, Symantec SEP, Symantec Message labs, Thales encryption, Allgress, Forecpoint, Blue coat, Firepower, Cisco ISE, Carbon Black, Titus, Encase
+ Strong oral, written, and presentation abilities.
+ Experiance with M365 Copilot.
+ Some experience with Unix/Linux system administration.
+ Strong experience with logging and alerting platforms, including SIEM integration.
+ Current understanding of Industry trends and emerging threats; and Working Knowledge of incident response methodologies and technologies.
**Desirable**
+ Zscaler Certifications Associate and Professional for ZIA, ZPA and ZDX.
+ Excellent Experiance in Zscaler ZIA, ZPA and ZDX.
+ Experiance in Vulnerability Management Program.
+ Experiance in Qualys Vulnerability Management Tool.
+ Well-rounded background in network, host, database, and application security.
+ Experience implementing security controls in a bi-modal IT environment.
+ Experience driving a culture of security awareness.
+ Experience administering network devices, databases, and/or web application servers.
+ Professional IT Accreditations (CISM, CCSA, CCSE, JNCIA, CCNA, CISSP, CompTIA Security) Good to have.
**Abilities**
+ Non customer facing role but an ability to build strong relationships with internal teams, and security leadership, is essential act as Incident co-ordinator, for reviewing all security tools, ingesting incident data, tracking incident status, coordinating with internal and external assets to fulfill information requirements, and initiating escalation procedures.
+ Document daily work and new processes.
+ Embrace a culture of continuous service improvement and service excellence.
+ Stay up to date on security industry trends.
Security Analyst
Posted 4 days ago
Job Viewed
Job Description
As a member of the incident/Workorder/Change handling team , you will have the following accountabilities:
+ Will be working as an SME for Zscaler Support in Operations for ZIA, ZPA and ZDX.
+ Assess and orchestrate the current and planned security posture for NTT data's Security infrastructure, providing recommendations for improvement and risk reduction.
+ Identify and propose process improvements and identify opportunities for new processes and procedures to reduce risk.
+ Support security incident response as required; First line responder to reported or detected incidents.
+ Perform security research, analysis, security vulnerability assessments and penetration tests.
+ Provide security audit and investigation support
+ Monitor and track security systems for Vulnerability and respond to potential security Vulnerability.
+ Provide support for the Vulnerability management program.
+ Provide 24x7 support as operations team working in shifts.
+ Participate in on-call system administration support including but not limited to weekends, holidays and after-business hours as required to service the needs of the business.
**Skills and Experience**
+ 4 to 5 years+ in Information Security space.
+ Strong experiance in Service Now Ticketing tool, Dashboards and Integration.
+ Strong experience with Zscaler ZIA, ZPA and ZDX.
+ Strong experience with Vulnerability Management Program.
+ Strong experience with Qualys Vulnerability Management Tool.
+ Some good to have Experience with Crowdstrike EDR and SIEM.
+ Strong experience with multiple network operating systems, including two or more of the following: Cisco iOS, Juniper ScreenOS or Junos, Fortinet FortiOS, CheckPoint GAiA, or Palo Alto Networks PAN-OS; Tanium, Rapid 7, Nessus, Nitro ESM, Symantec SEP, Symantec Message labs, Thales encryption, Allgress, Forecpoint, Blue coat, Firepower, Cisco ISE, Carbon Black, Titus, Encase
+ Strong oral, written, and presentation abilities.
+ Experiance with M365 Copilot.
+ Some experience with Unix/Linux system administration.
+ Strong experience with logging and alerting platforms, including SIEM integration.
+ Current understanding of Industry trends and emerging threats; and Working Knowledge of incident response methodologies and technologies.
**Desirable**
+ Zscaler Certifications Associate and Professional for ZIA, ZPA and ZDX.
+ Excellent Experiance in Zscaler ZIA, ZPA and ZDX.
+ Experiance in Vulnerability Management Program.
+ Experiance in Qualys Vulnerability Management Tool.
+ Well-rounded background in network, host, database, and application security.
+ Experience implementing security controls in a bi-modal IT environment.
+ Experience driving a culture of security awareness.
+ Experience administering network devices, databases, and/or web application servers.
+ Professional IT Accreditations (CISM, CCSA, CCSE, JNCIA, CCNA, CISSP, CompTIA Security) Good to have.
**Abilities**
+ Non customer facing role but an ability to build strong relationships with internal teams, and security leadership, is essential act as Incident co-ordinator, for reviewing all security tools, ingesting incident data, tracking incident status, coordinating with internal and external assets to fulfill information requirements, and initiating escalation procedures.
+ Document daily work and new processes.
+ Embrace a culture of continuous service improvement and service excellence.
+ Stay up to date on security industry trends.
Security Analyst
Posted 1 day ago
Job Viewed
Job Description
Job Description
Global - Risk & Compliance - Senior Security Analyst will play a significant role in our SOX Compliance
Department to standardize and operationalize our Regulatory and internal Compliance framework.
Job Details:
- Role: Global - Risk & Compliance - Senior Security Analyst
- Work Location: Pune
- Work Type: Work From Office
Responsibilities:
- Collaborate with internal stakeholders to facilitate and review documentation for certifications like ISO 27001, PCI, SOC, and HiTrust.
- Own and Initiate process improvement to Streamline Internal Assurance Process
- Point of Contact for Client Security Questionnaires and RFP/RFI responses
- Create and maintain Security Control documentation and knowledge repository
- Develop, Contribute and participate in internal controls awareness within the organization
Security Analyst
Posted 6 days ago
Job Viewed
Job Description
Job Title
Security Analyst
Location
Delhi & Bangalore
Employment Type
Full-time
Position Summary
Softcell Global Technologies Pvt. Ltd. is looking for a passionate and skilled Security Analyst with at least 2-3 years of experience in vulnerability assessment, penetration testing and code review. The ideal candidate should have a foundational understanding of cybersecurity, good hands-on skills with security tools, and hold certifications such as OSCP, CRTP, eJPT, CPENT, CEH or equivalents. The role involves supporting offensive security operations, assisting in analysis and reporting, and collaborating with senior analysts during engagements.
Key Responsibilities
- Hands-on Technical Assessment & Exploitation
- Conduct in-depth penetration tests on web apps, APIs, networks, cloud, AD and OT environments.
- Conduct comprehensive manual reviews to identify security flaws, insecure patterns, and logical vulnerabilities – SAST and DAST.
- Chain vulnerabilities to simulate end-to-end real-world attack scenarios and provide POCs.
- Act as a collaborator for VAPT projects, ensuring timely delivery and quality assurance.
- Interface directly with clients to present findings and suggest remediation strategies.
- Collaborate to manage testing schedules, reporting timelines, and workflows to ensure on-time delivery.
- Draft detailed vulnerability reports with actionable remediation.
Mandatory Requirements
- Minimum 2-3 years of experience in vulnerability assessment and penetration testing support.
- Strong grasp of OWASP Top 10, MITRE ATT&CK, and real-world threat simulation.
- Scripting proficiency in Python, PowerShell, or Bash.
- Exposure to tools like Nmap, Wireshark, Burp Suite, Metasploit, BloodHound, SonarQube, Checkmarx, etc
- Bachelor’s degree in Computer Science, Cybersecurity, or related field.
- Excellent communication, documentation, and collaboration skills.
Additional Details
- Immediate Joiners Preferred
- Practical Skills are a Must
- Location: Delhi and Bangalore (Onsite Only)
- Bonus points for published CVEs, bug bounty recognition, open-source security tools, research contributions, or participation in industry events, workshops, and communities.
Preferred Certifications
- OSCP – Offensive Security Certified Professional
- OSWE – Offensive Security Web Expert
- CRTP – Certified Red Team Professional
- CRTE – Certified Red Team Expert
- CPENT – Certified Penetration Testing Professional
- CEH – Certified Ethical Hacker
- eJPT, eCPTX, CBBH, PNPT – or equivalent certifications in advanced adversarial simulation.
Why Join Softcell?
- Be part of a CERT-In empaneled cybersecurity team delivering critical security services.
- Get exposure to real-world attack simulations, internal security assessments, and VAPT projects.
- Learn and grow under certified red teamers and penetration testers.
- Access lab environments, tools, and mentoring to grow your skills.
About Softcell
Softcell Global Technologies Pvt. Ltd. is a leading IT services provider with over 30 years of experience in infrastructure solutions, cybersecurity, cloud, and engineering. Trusted by top banks, enterprises, and government institutions, Softcell is a CERT-In empaneled organization at the forefront of cybersecurity service delivery.
Regards
HR Team
Security Analyst
Posted 6 days ago
Job Viewed
Job Description
Greetings !
We are looking for a skilled Splunk Administrator with hands-on experience in deploying and managing Splunk Enterprise and Splunk Cloud. The ideal candidate should have experience in Splunk Enterprise Security (ES), Splunk UBA, and IT Service Intelligence (ITSI). This role requires strong technical skills, along with the ability to communicate effectively with customers.
Roles & Responsibilities:
Splunk Deployment & Administration:
- Install, configure, and manage Splunk Enterprise and Splunk Cloud.
- Handle indexers, search heads, forwarders, and clustering.
- Optimize Splunk performance, storage, and scalability.
Security & Splunk Monitoring Solutions:
- Implement and manage Splunk Enterprise Security (ES), Splunk UBA, and ITSI.
- Configure correlation searches, threat intelligence feeds, risk-based alerting (RBA), and dashboards.
- Troubleshoot security-related issues within Splunk.
Customer Interaction & Troubleshooting:
- Engage with customers to understand their requirements and provide technical guidance.
- Troubleshoot and resolve Splunk-related issues, logs ingestion, parsing, and data onboarding.
Splunk Architecture & Implementation:
- Design, deploy, and optimize Splunk Enterprise and Splunk Cloud environments.
- Lead end-to-end Splunk implementations, migrations, and upgrades.
- Manage search head clustering, indexer clustering, and data retention policies.
Security & Observability Solutions:
- Architect and configure Splunk Enterprise Security (ES), Splunk UBA, and ITSI.
- Implement risk-based alerting (RBA), custom correlation searches, and advanced analytics.
- Integrate Splunk with SOAR, cloud platforms (AWS, Azure, GCP), and third-party security tools.
Team Leadership & Customer Engagement:
- Lead and mentor a team of Splunk Administrators & Engineers.
- Interact with customers to gather requirements, design solutions, and conduct workshops etc.
- Review and improve Splunk use cases, dashboards, and data models.
Optimization & Automation:
- Develop custom scripts (Python, Bash, PowerShell) for automation and orchestration.
- Tune Splunk performance, search queries, and indexing strategies.
- Implement best practices for data onboarding, parsing, and CIM compliance.
Interested can share their updated resume to along with the below mentioned details.
Current CTC:
Expected CTC:
Notice Period:
Security Analyst
Posted 6 days ago
Job Viewed
Job Description
Role: Security Analyst
Experience: 8-12 yrs
Skills:
- Vulnerability management,
- Incident Response, Monitoring
- SIEM, EDR, Firewall Analysis
- L2 support
- Logs and Remediation
Security Analyst/ Engineer
As a Security Analyst/Engineer, you will be responsible for supporting the security
operations of our organization by assisting in the monitoring, detection, and response to
security incidents. This role offers a blend of security analysis and engineering tasks. This
position offers a progression from foundational knowledge to more advanced
responsibilities, allowing you to contribute significantly to the organization's cybersecurity
efforts.
Key Responsibilities:
Security monitoring and analysis
• You assist in monitoring security events and alerts from various sources such as
SIEM, IDS/IPS, antivirus systems, and endpoint detection platforms
• You conduct initial analysis of security events to determine their nature and
potential impact on the organization
• You collaborate with senior analysts to investigate and respond to security
incidents, including malware infections, phishing attempts, and unauthorized
access attempts.
Incident response
• You contribute to incident response activities by providing technical assistance
during security incidents, including containment, eradication, and recovery efforts
• You document incident response procedures, develop post-incident reports, and
conduct lessons learned sessions to improve incident handling capabilities
• You implement proactive measures to enhance incident detection and response
capabilities, such as developing playbooks for common attack scenarios.
Vulnerability management
• You support the vulnerability management process by assisting in vulnerability
scanning, assessment, and remediation efforts
• You help prioritize and track the resolution of identified vulnerabilities in systems
and applications
• You collaborate with system owners and IT teams to ensure timely patching and
mitigation of identified vulnerabilities, leveraging automation and orchestration
where possible
• You conduct security assessments and penetration tests to identify weaknesses in
systems, applications, and network infrastructure.
Security tool
• You assist in the administration and configuration of security tools and
technologies, such as firewalls, intrusion detection/prevention systems, and
endpoint security solutions
• You participate in the evaluation and testing of new security technologies to
enhance the organization's security posture
• You optimize the configuration and tuning of security tools and technologies to
improve detection accuracy, reduce false positives, and enhance overall
effectiveness
• You evaluate emerging security technologies and solutions, recommending and
implementing enhancements to the security toolset based on industry best
practices and organizational requirements.
Security awareness and training
• You support security awareness and training initiatives by assisting in the
development of educational materials and delivering security awareness briefings
to staff.
Qualifications and Skills:
• Bachelor's degree in computer science, Information Security, or related field
• Minimum 8 years of experience in a cybersecurity role with progressively increasing
responsibilities
• Strong understanding of cybersecurity principles, threat landscape, and attack
methodologies
• Proficiency in security tools and technologies such as SIEM, EDR, IDS/IPS, firewalls,
and vulnerability scanners
• Excellent analytical, problem-solving, and decision-making skills
• Effective communication and stakeholder management abilities
• Certifications such as CompTIA Security+, CEH (Certified Ethical Hacker), or
equivalent are a plus.
Experience
• Demonstrated experience in conducting security analysis, incident response, and
vulnerability management in a complex environment
• Hands-on experience with security tool optimization, security assessments, and
penetration testing
• Proven track record of incident response efforts and effectively managing security
incidents from detection to resolution.
Be The First To Know
About the latest Threat management Jobs in India !