Cutshort logo
My client is a Big4. logo
EDR Security Expert
My client is a Big4.'s logo

EDR Security Expert

3 - 7 yrs
₹5L - ₹15L / yr
Bengaluru (Bangalore)
Network Security
Web application security
Cyber Security
Description :

We are looking for candidates with the below experience.

- Mandatory experience on any of

a) Cylance Protect and Optics

b) Crowdstrike Falcon Insight

c) Sentinel One ActiveEDR

d) Carbon Black EDR

- Hands-on experience in security incident response lifecycle and its phases

- Should have experience in L1 and L2 in EDR

- Hands-on experience in event and log analysis on Windows endpoints

- Overall experience: 3-7 years, Relevant experience: 2+ years

Please note : Candidate should have experience in the below skills must :

- EDR Experience

- EDR Product Worked on and which level of support they are working on

- Incident Response

- Malware Analysis

- Flexible for shifts
Read more
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos

About My client is a Big4.

Company social profiles

Similar jobs

Remote only
15 - 25 yrs
Best in industry
Network Security
+9 more
Analyzing customers' business and technical requirements, assessing the existing environment for Cloud enablement, and advising on Cloud models, technologies, and risk management strategies.
Apply creative thinking/approach to determine technical solutions that further business goals and align with corporate technology strategies
Be a customer advocate with an obsession for excellence delivering measurable success for Intuitive’s customers with secure, scalable, highly available Network & Security Infrastructure
Involved in Enterprise level networking with Routing/Switching configuration/diagnostic experience in Global Network infrastructure design delivery of WAN/SD-WAN, LAN/SDN, Firewall/DFW, and F5/ALF.
Working knowledge of Palo Alto firewalls
Strong understanding of the following Network protocols: BGP, IPSec and IPSec VTI VPN
Work closely with the Network architecture, security and application teams to roll out new designs and perform activities for supporting migration projects.
Implement an automated process for the cloud network environment eliminating manual and repetitive tasks
Implement industry-standard cloud network security practices during build activities and maintain them throughout the lifecycle.
Perform functional testing to verify implementation meets production acceptance standards.
Provide support of cloud network services for complex issues.
Good understanding of Aruba Wireless setup

If ur profile matches the requirements share your resume at anithadotkatintuitivedotcloud
Thanks & Regards,

Anitha. K
TAG Specialist
Read more
Remote, Hyderabad
8 - 12 yrs
₹35L - ₹50L / yr
Web application security
Network Security
Cyber Security
IT security
+7 more

Job Summary:  

The Incident Response (IR) Lead manages a team of experts with diverse skill setsincluding Security Operations Center (SOC), Forensics, and technical Subject Matter Expert (SME) advisory. The IR Lead is specifically tasked with managing all aspects of an Incident Response engagement to include incident validation, monitoring, containment, log analysis, system forensic analysis, and reporting. The Incident Response Lead is also responsible for building the relationship with the client and client’s counsel and ensuring the engagement’s objectives and expectations are met and executed successfully as documented in the statement of work. You will leverage a solid foundation of technical expertise in Cybersecurity, Incident Response, and Digital Forensics to successfully execute your responsibilities.



· Accurately collects information from the client concerning the incident to include but not be limited to the client’s environment, size, technology, and security threats. In addition, the IR Lead is responsible for capturing all client’s expectations and objectives throughout the engagement to ensure successful delivery.

· The main point of contact manages and participates in all communications with the client and the client’s counsel during the engagement. The IR Lead sets the cadence for communications.

· Management and Coordination of all technical efforts for the IR engagement to drive the process forward through; tool deployment, ransomware decryption, restoration, and recovery efforts, system rebuilds, system, application, and network administration tasks.

· Coordinates with the Ransom Specialist when ransom negotiations are needed. Ensures updates regarding ransom status are delivered to the client and counsel in a timely fashion.

· Manages and coordinates the onsite efforts with the Onsite Lead or team ensuring they understand and can execute the objectives for the onsite work. Additional responsibilities with onsite efforts include ensuring communications are frequent and getting the daily onsite update communicating these back to the IR Director and/or IR Ops Associate for their Tiger Team.

· Ensures the Forensic Lead is coordinating the collection of data necessary for the investigation.

· Ensures SentinelOne is deployed on time and adding value.

· Communicates with sales when appropriate for SentinelOne, provide client contact.

· Communicates in tandem with the Forensic Lead pertinent findings to the client during the investigation.

· Follows up with the SOC Lead on SentinelOne alerts and encourages/coordinates client participation with the product.

· Accountable for final report review, ensuring the report is accurate, professional, and meets the objective of client counsel.

· Other duties as assigned.

DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties, and skills required personnel so classified.


 Role Description : Skills & Knowledge

1. Experience leading scoping calls

2. Strong background and practical hands-on experience with Windows or Linux System and Network Administration, Security DevOps, Incident Response and Digital Forensics, or Security Engineering

3. Practical experience performing in a functional role including but not limited to one or more of the following disciplines: computer forensics, Incident Response, data analytics, Security Operations, and Engineering, Digital Investigations

4. Possesses strong verbal and written communication skills


· Bachelor's degree in Computer Science, Computer Engineering, Information Assurance, Forensic Sciences, or related technical field; Graduate degree preferred

· 10+ years experience leading full-cycle incident response investigations and communicating with the client/counsel/carriers

· Must be eligible to work in the US without sponsorship

WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodations may be made to enable people with disabilities to perform the essential functions of this job.



· No physical exertion is required.

· Travel within or outside of the state.

· Light work: Exerting up to 20 pounds of force occasionally, and/or up-to 10 pounds of force as frequently as needed to move objects.

Read more
OSBIndia Private Limited
Ashwini Mamidi
Posted by Ashwini Mamidi
3 - 5 yrs
₹5L - ₹9L / yr
Identity management
Access control
Information security
Cyber Security
+1 more


·        Maximum 5 years of Information Technology/Technology Operations/Information Security experience required.

·        Minimum 3 years of experience in Cybersecurity, Identity & Access Management, Role Based Access Control, and Identity Governance is mandatory.

·        Knowledge on User Life Cycle Management, Access provisioning, Access administration is must.

·        Experience with technologies such as Role-Based Active Control (RBAC) and Attribute Based Access Control (ABAC) is required.

·        Experience in User Access Re-certification activities is mandatory.

·        Working knowledge on Active Directory is must.

·        Working experience on any IAM tool (SailPoint/Okta/OneIdentity/Varonis/MIM) would be added advantage.

·        Knowledge on Identity and Access Management role/processes/tools is must.

·        Prior experience in processing IAM requests (Add/Modify/Delete) is must.

·        Experienced in Incident management & Change Management processes.

·        Knowledge of and the ability to adhere to SAS and SOX audit requirements pertaining to Identity & Access Management job requirements.

·        Experience with work-flow management tools such as ServiceNow.

·        Leveraging creative thinking and problem solving skills, individual initiative, and utilizing MS Office (Word, Excel, Access, and PowerPoint).

·        Understanding personal and team roles; contributing to a positive working environment by building solid relationships with team members; proactively seeking guidance, clarification and feedback.

·        Identifying and addressing business needs: building relationships with Stake Holders; developing an awareness of Firm services; communicating with the business/stake holders in an organized and knowledgeable manner; delivering clear requests for information; demonstrating flexibility in prioritizing and completing tasks; and communicating potential conflicts to a supervisor

·        Experience performing user administration tasks for various in-house and third-party applications.

·        Analyzing, prioritizing, and resolving faults to resolution. Resolve tickets according to SLAs and escalation procedures.

·        Strong analytical, problem solving and organizational skills. Be proactive, dynamic, and flexible.

·        Good Communication skills, able to articulate well with business and stakeholders.


·        Education Qualification : Any graduate/post graduate with Computer Science background.



Read more
at Ongrid
3 recruiters
Pushpendra Singh
Posted by Pushpendra Singh
6 - 15 yrs
₹10L - ₹15L / yr
Information security
Cyber Security
ISO/IEC 27000-series
Role and Responsibilities:-

- Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks
- Routinely performing threat analysis, system checks, and security tests
- Defining and updating information security criteria and validation procedures
- Effectively discuss to understand safety and security and fix the problems along with different stakeholders
- To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.
- To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001
- Assess technical security risks in terms of impact on systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.
- Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response
- Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer
- Operate vulnerability scanning and compliance tools to identify system weaknesses
- Represent IT Security matters at technical and business forums.

Desired candidate profile :

- Relevant experience in the information security field
- Relevant experience working with ISO Policies, and GDPR guidelines.
- Strong knowledge of network architecture and security concepts related to routing
- Exceptional attention to detail
- Excellent analytical and problem-solving skills
- Great team player and able to work efficiently with minimal supervision
- Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks.
- Able to handle and cope with stressful situations and understands the pressures of a start-up environment
Read more
at SynRadar
1 video
2 recruiters
Ashish Rao
Posted by Ashish Rao
Mumbai, Navi Mumbai
2 - 4 yrs
₹4L - ₹8L / yr
Web application security
Cyber Security
Vulnerability assessment
Penetration testing
Information security
+6 more

This profile will include following responsibilities:


- Perform Web Application Security Testing

- Perform Mobile Application Security Testing

- Scan Network for Security Vulnerabilities

- Co-ordinate with the clients for Project related queries

- Undertake meeting with the client teams for discussing security issues and recommendations

- Create detailed security reports

- Keep track of project progress & send regular updates

- Research on Open source security tools & new security topics

- Create Security Knowledge base for the team

The candidate should be we well versed with application security concepts, including the mitigation techniques:
  • Web Application Security – OWASP Top 10
  • Mobile Application Security – Mobile OWASP Top 10
  • Threat Modelling
  • Risk Rating Frameworks
  • Web Traffic Interception (For Web/Mobile apps)
  • SSL
  • Network Concepts
  • Web Development Basics - HTTP/HTML/JavaScript
  • Basic Mobile Application Concepts (either Android or IOS)
Read more
US based company
7 - 13 yrs
₹20L - ₹30L / yr
skill iconAmazon Web Services (AWS)
Cyber Security
Penetration testing
Threat modeling
Computer Security
+1 more

Job Responsibilities:


Experience: 8 Yrs to 12 Yrs


  1. Hands-on expertise on performing Application pen testing (Mobile(Android, IOS),networking, web application pen testing),
  2. Should worked on IOT,AWS,Application Penetration Testing, Reverse Engineering, source code review, CI/CD Pipeline
  3. have done any submission on Bug crowd or Bug Bounty.
  4. have developed tools or scripts for web pen test on GitHub.
  5. Certified on OSCP
  6. Threat Modeling
  7. Network scan in stealth mode or simple scan using Nmap and Burp suite


Implement security measures which monitor and protect sensitive data and systems from infiltration and cyber-attacks.


Developing different ways to solve the existing threats and security issues.


Configuring and implementing intrusion detection systems and firewalls.


Security product development, testing, and implementation.


Responsible for security technology research, penetration testing, and vulnerability scanning.


Please follow the below inputs.


The shift will starts from 03:00 PM to 12 AM (fixed for few months),



OSCP certification(Not mandatory, preferable)


Below are the primary key skills:


Total Application Security Experience:

Total Security Architecture Experience:









Read more
technoforte software pvt. ltd.
Hema Chandwani
Posted by Hema Chandwani
Bengaluru (Bangalore)
5 - 8 yrs
₹9L - ₹15L / yr
Shell Scripting
Cyber Security
Endpoint protection
Web application security
Information security
+1 more

Desired Skills

To have skills:

·       Proven technical expertise in cyber security domains, i.e. endpoint security, application security testing.

·       Knowledge and experience in public cloud solutions.

·       Knowledge on network security, networking concepts and architectural implementations.

·       Knowledge on vulnerability testing and define proper remediation’s.
Experience with application, database, and infrastructure security.

·       Shell scripting experience - Shell/Bash/Python.

·       Working experience of Linux operation.


Desire to have skills:

·       One or more of the following cyber security certifications: CEH, CISSP, OSCP, SSCP  CCSP.

·       Excellent problem solving, and follow-up skills.

·       Ability to convey technical security concepts to non-technical audiences.

Read more
at MNC
Agency job
via Eurka IT SOL by Srikanth a
Bengaluru (Bangalore)
5 - 10 yrs
₹10L - ₹20L / yr
Network Security
MEAN stack
+9 more

Senior Netskope Technology Stack Expert (SWG/CASB/ZTNA)

Duties and Responsibilities:

  • Hands on experience configuring rules and policies across the SWG/CASB/ZTNA platforms.
  • Lead the Deployment and Operationalization of the Netskope Technology stack
  • Defining and implementing procedures and policies to ensure proper maintenance of the environment
  • Implement the process, systems, and technology required to fully maximize the platforms security capabilities
  • Develop strategy, execution roadmap, priorities, and investment plans
  • Partner with the leadership team to define strategic objectives
  • Work closely with IT, Engineering and Security teams to ensure appropriate protections are in place while maintaining a continuity of service
  • Engage Netskope’s technical teams in troubleshooting issues with current or new integrations

Required Experience and Skills:

  • 5 - 7 years of leadership experience leading a team
  • 3 - 5 years of experience hands-on technical design, implementation, and leadership of enterprise deployments
  • Excellent knowledge and prior experience supporting network security technologies including but not limited to Proxies, NG Firewalls, SSL/IPSec, VPN’s, SSO, DLP and Encryption gateways
  • Strategic capability to lead and innovate while thriving in a fast-moving environment
  • A bias for action, results and delivery, with a high quality bar
  • Proven track record of developing people, leading and managing high-performing teams
  • An innate ability to create a sense of loyalty, trust, and positive culture. Ability to energize people and teams and establish cross functional cooperation
  • Forward-thinking and problem-solving mindset; drawn to building off ambiguous and unsolved problems and “making it happen”
  • Demonstrated ability to interface and maintain effective relationships with all levels of employees in a team-oriented environment


Read more
at netmedscom
3 recruiters
Vijay Hemnath
Posted by Vijay Hemnath
5 - 10 yrs
₹10L - ₹30L / yr
Information security
IT security
skill iconDocker
Ethical Hacking
+16 more

We are seeking a Security Program Manager to effectively drive Privacy & Security Programs in collaboration with cross functional teams. You will partner with engineering leadership, product management and development teams to deliver more secure products.


Roles & Responsibilities:

  • Work with multiple stakeholders across various departments such as IT, Engineering, Business, Legal, Finance etc to implement controls defined in policies and processes.
  • Manage projects with security and audit requirements with internal and external teams and serve as a liaison among all stakeholders.
  • Managing penetration tests and security reviews for core applications and APIs.
  • Identify, create and guide on privacy and security requirements considering applicable Data Protection Laws and implement them across software modules developed at Netmeds.
  • Brainstorm with engineering teams to figure out how privacy and security controls can be applied to Netmeds tech stack.
  • Coordination with Infra Teams and Dev Teams on DB and application hardening, standardization of server images / containerization.
  • Assess vendors' security posture before onboarding them and after they qualify, review their security posture at a set frequency.
  • Manage auditors and ensure compliance for ISO 27001 and other data privacy audits.
  • Answer questions or resolve issues reported by the external security researchers & bug bounty hunters.
  • Investigate privacy breaches.
  • Educate employees on data privacy & security.
  • Prioritize security requirements based on their severity of impact and product roadmap.
  • Maintain a balance of security and business values across the organisation.

 Required Skills:

  • Web Application Security, Mobile Application Security, Web Application Firewall, DAST, SAST, Cloud Security (AWS), Docker Security, Manual Penetration Testing.
  • Good hands-on experience in handling tools such as vulnerability scanners, Burp suite, patch management, web filtering & WAF.
  • Familiar with cloud hosting technologies (ex. AWS, Azure). Understanding of IAM, RBAC, NACLs, and KMS.
  • Experience in Log Management, Security Event Correlation, SIEM.
  • Must have strong interpersonal skills and should be able to communicate complex ideas seamlessly in written and verbal communication.


Good to Have Skills:

  • Online Fraud Prevention.
  • Bug Bounty experience.
  • Security Operations Center (SOC) management.
  • Experience with Amazon AWS services (EC2, S3, VPC, RDS, Cloud watch).
  • Experience / Knowledge on tools like Fortify and Nessus.
  • Experience in handling logging tools on docker container images (ex. Fluentd).
Read more
Virtual Engineering Services Pvt Ltd
Abha Sachdeva
Posted by Abha Sachdeva
NCR (Delhi | Gurgaon | Noida)
3 - 5 yrs
₹4L - ₹8L / yr
Vulnerability assessment
Web application security
Penetration testing
IT security
+11 more

IT Security Specialist



Roles and Responsibilities

  • Extensive experience of 2-5 years in Vulnerability Assessment and Penetration testing, Web Application security.
  • An Experience in performing web application security assessments using hands on techniques for identifying SQL injections, XSS, CSRF, authentication/authorization, OWASP top 10 issues.
  • Must have working experience in OWASP Top 10 Vulnerabilities Testing in Web applications.
  • Create policy and standards for developers and testers to secure programming in the organization. (secure code review, static application security testing.
  • Experience on both commercial and open source tools Cenzic Hailstorm, Burpsuite, AppScan, WebInspect, Appspider, sqlmap, OWASP ZAP. Assessing cloud security risk (AWS and Azure) and recommending appropriate security controls.
  • Ability to interact with project teams to understand the security requirements and come up with solutions
  • Extensive knowledge of managing Web Application Firewall (Product) including rules management and product administration
  • Strong understanding of networking concept.


Desired Candidate Profile


  • Excellent knowledge of Microsoft Windows operating environments and with special attention to security and hardening issues.
  • Able to work independently with minimal supervision.
  • Good knowledge of secure software development standard, process, techniques, cloud security policies and tools.
  • Keep stakeholders updated with communications and weekly reporting.
  • Collaborate with Security Platform and Services teams to build and integrate existing security solutions.
  • Excellent communication skills - written, verbal, presentation and interpersonal.
  • Willing to learn new skills and implement new technologies.
  • Should come with bachelor’s degree in engineering, mathematics or master’s in computer application / programing.
















Read more
Why apply to jobs via Cutshort
Personalized job matches
Stop wasting time. Get matched with jobs that meet your skills, aspirations and preferences.
Verified hiring teams
See actual hiring teams, find common social connections or connect with them directly. No 3rd party agencies here.
Move faster with AI
We use AI to get you faster responses, recommendations and unmatched user experience.
Matches delivered
Network size
Companies hiring
Did not find a job you were looking for?
Search for relevant jobs from 10000+ companies such as Google, Amazon & Uber actively hiring on Cutshort.
companies logo
companies logo
companies logo
companies logo
companies logo
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos