Cutshort logo
Stratogent Technology Services's logo

Security Manager

Meera KS's profile picture
Posted by Meera KS
10 - 15 yrs
₹15L - ₹25L / yr
Bengaluru (Bangalore)
Skills
Security Information and Event Management (SIEM)
IT security
Splunk
ArcSight
ITIL
ITIL management
Project Management

Position Title: Manager – Security Operations Organization /Function: Manager is responsible for day to day operational and project delivery for a set of customers Relevant Experience: 10+ years of experience in security area and at least 2 years as Security manager Educational Qualification: BE/B.Tech/ME/M.Tech/Graduate/Master in any stream with excellent academic record

Must-have Skills: • Must know common security policy frameworks and possess knowledge of how security programs are run at mid to large scale companies • Must have managed a team to deliver “Managed Security Service” or “Security Operations Center” • Prior working Background in either SIEM tools (Splunk, ArcSight, QRadar, DNIF etc.) or Vulnerability assessment and Management tool (Qualys/Rapid7) and process • Has broader context and understanding of managed security services • Must have service mindset and empathy. Must deal with a level of ambiguity, chaos and apparent stubbornness from customers, and manage around it by thinking through the issue or request from the customer’s perspective to drive to a reasonable conclusion • Must have prior experience on Project Management • Must have prior experience of onsite-offshore delivery model and should have directly worked with US/European customers or colleagues • Must have ITIL process knowledge

Read more
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos

About Stratogent Technology Services

Founded :
2008
Type
Size :
100-1000
Stage :
Profitable
About
Stratogent Technology Services Pvt. Ltd is a subsidiary of Stratogent Corporation, USA, providing infrastructure building and management services across on-premise, datacenters, and clouds. They offer monitoring, backup, and security services to ensure customers' infrastructure is secure and functional, allowing them to focus on business-level projects. Stratogent services mid-market enterprises, providing flexibility and quick actions to solve their problems.
Read more
Company social profiles
N/A

Similar jobs

Bengaluru (Bangalore)
6 - 10 yrs
₹18L - ₹25L / yr
Security Information and Event Management (SIEM)
DLP
Security operations
Cyber Security
EDR
+1 more

1.Triage of security alerts that includes but not limited to malware, denial of service, unauthorized access, etc.

2. Conduct incident investigations on SIEM tools.

3. Perform threat hunting on networks to detect and isolate threats.

4. Knowledge of various security methodologies and processes, and technical security solutions (firewall, packet analysis, SIEM and intrusion detection systems)

5. Continuous optimization, tuning and monitoring of SIEM solution

6. Hands on experience around administrating and threat hunting on EDR, XDR, DLP and SIEM tools.

7. Ability to analyze endpoint, network, and application logs

8. Identify false positives, analyse reported spam, phishing, and suspicious emails and understanding of email security concepts: SPF, DMARC, DKIM

9. Immediate Joiners

Read more
New Era India
at New Era India
10 recruiters
Garima Rajput
Posted by Garima Rajput
Chennai
7 - 12 yrs
₹10L - ₹15L / yr
Threat analysis
Threat modeling
Security Information and Event Management (SIEM)
Malware analysis

Job Description

Cyber Threat Intelligence & Threat Hunting - Subject Matter Expert (B3-2)

 

Responsibilities:

Perform threat research, create actionable threat advisories, and derive hunting queries based on the evolving threat vectors.

Understand APT groups, Conduct deep dive technical analysis of cyber-attack tools, tactics, and procedures. Create hypothesis and perform active threat hunting.

 

Minimum Requirements:

10+ years of overall experience, 7+ years of experience in cyber threat intelligence, malware analysis (Reverse engineering)

Hands-on experience with writing threat hunting hypothesis & active threat hunting

Experience with YARA rule and OpenIOC signature creation.

Experience with multi-tiered mission-critical systems.

Experience in opensource sandbox and honeypots.

 

Preferred Certification

GIAC Cyber Threat Intelligence (GCTI)

C| TIA (Certified Threat Intelligence Analyst)

CCTIA by the NICCS

Read more
Bengaluru (Bangalore)
4 - 5 yrs
₹13L - ₹14L / yr
Internal audit
Audit
QMS
Information security
IT security
+1 more
Our client is the Health-tech initiative of India's largest business house. Started in 2015, it empowers healthcare providers and consumers in India. All healthcare monitoring services are made available through an app that will help connect doctors, hospitals, pharmacies, laboratories and consumers, enabling preventive and predictive healthcare. It helps the care-givers to track the entire patient journey from the initial appointment and maintaining their records, generating lab test reports to providing virtual consultation and home-care solutions. It is expected that this futuristic guide will strengthen doctor-patient relationship and enhance the in-clinic experience.
 
As a Associate/ Sr Associate-Information Security, you will be responsible for helping the management in creating IT policies and assisting the various processes and the management team to ensure adherence to the adopted policies and established procedures.

What you will do:

  • Working closely with the external auditors to achieve common goals
  • Conducting Enabling Service Audit (HR, Admin, IT) once in 6 months for the verification of ISMS & QMS Standards
  • Performing ISMS and Internal Audit
  • Being part of the external Audits (ISMS, QMS & CMMI)
  • Managing of implementation of ISMS

 

Desired Candidate Profile

What you need to have:

  • Strong communication and team building skills with proficiency at grasping new technical concepts quickly and utilizing the same in a productive manner
  • Experience in ISO27001, Internal Audits, CMMI    

 

Read more
Banyan Data Services
at Banyan Data Services
1 recruiter
Sathish Kumar
Posted by Sathish Kumar
Bengaluru (Bangalore)
4 - 10 yrs
₹8L - ₹20L / yr
Information security
Splunk
Cyber Security
IT risk management
IT security audit
+9 more

Information Security Specialist

Notice Period: 45 days / Immediate Joining

 

Banyan Data Services (BDS) is a US-based data-focused Company that specializes in comprehensive data solutions and services, headquartered in San Jose, California, USA. 

 

We are looking Information Security Specialist who has the expertise and deep knowledge of Information security regulations, compliance, and SIEM tools, and the ability to develop, describe and implement Security Baselines and Policies.

 

It's a once-in-a-lifetime opportunity to join our rocket ship startup run by a world-class executive team. We are looking for candidates that aspire to be a part of the cutting-edge solutions and services we offer that address next-gen data evolution challenges. 

 

Key Qualifications

 

· Design, deploy, and support Information Security Solutions provided by BDS

 

· Assist clients to carry out the IT Risk Management assessment on both on-prem and cloud platforms

 

· Provide subject matter expertise on IT security compliances during the security audits to meet various security governances.

 

· Research and strategic analysis of existing, and evolving all IT and data security technologies

 

· Establish baselines to define required security controls for all infrastructure components and application stack

 

· Follow latest vulnerabilities and threats intelligence updates across a wide range of technologies and make recommendations for improvements in the security baselines.

 

· Overseeing security event monitoring, understand the impact, and coordinate remediation efforts

 

· Create and optimize the SIEM rules to adjust the specification of alerts in responding to incident follow up

 

· Must be able to work a flexible schedule during off-hours

 

Key Skills & Qualification

 

· Minimum of 4 years relevant work experience in information/cyber security, audit, and compliance

 

· Certifications in any of technical security specialty (e.g., CISA, CISSP, CISM)

 

· Experience in managing SIEM products like Arcsight, Qradar, Sumo Logic, RSA NetWitness Suite, ELK, Splunk

 

· Exposure of the security audit tools on public cloud platforms

 

· Solid understanding of the underlying LINUX/UNIX and Windows OS security architecture

 

· Certified Ethical Hacker would be a plus

 

· Handling of Security audits is a must

 

· Proven interpersonal skills while contributing to team effort by accomplishing related results

 

· Passion for learning new technologies and the ability to do so quickly.

http://www.banyandata.com" target="_blank">www.banyandata.com 

Read more
travelopia UK
Bengaluru (Bangalore)
8 - 9 yrs
₹10L - ₹15L / yr
IT security
Network Security
Information security
Cyber Security
Security Information and Event Management (SIEM)
+5 more

What you will be doing:

  • Participate in network and security initiatives, network designs, project plans, and deployments as well as coordinating technical issues with vendors and internal teams
  • Contribute to design, installation, maintenance, vulnerability remediation, and monitoring of network and security systems
  • Responsible for expert-level troubleshooting of any problems relating to global issues - participation in security incident management and response.
  • Providing support and guidance to Technology teams across network and security technologies.
  • Adhere to IT access-management incident response and change control procedures (ITIL)
  • Continuous documentation of the IT network infrastructure including technical specifications, design documents, roll-out, and disaster recovery plans


What we are looking for:

 

A Network Security engineer with a solid comprehensive background in:

  • Ability to manage, supervise and delegate multiple tasks
  • Strong experience with SIEM and log management
  • EDR (Endpoint Detection and Response - especially in Microsoft ATP, Defender or SentinelOne) configuration and management.
  • Vendor management; including SOC (Security Operations Centre) providers
  • Global Security Incident management support
  • Experience in SD-WAN (Meraki) management and troubleshooting
  • Knowledge of network security, hardening network equipment, and vulnerability scans
  • Experience in Microsoft security and endpoint management tooling such as MCAS and MEM
  • Excellent troubleshooting skills. Ability to rapidly identify respond to and resolve issues
  • Proven experience in remote access technologies (ZScaler an advantage)
  • Excellent communication skills (written and verbal).
  • An ability to work under pressure and take ownership of tasks and customer issues.
  • Ability to work individually and as part of a global Infrastructure Technology team with regional teams in India, UK and North America.
Read more
DataMetica
at DataMetica
1 video
7 recruiters
Sumangali Desai
Posted by Sumangali Desai
Pune
6 - 10 yrs
₹10L - ₹20L / yr
Cloud Computing
IT infrastructure
VPN
Firewall
IT security
+8 more

Experience: 6+ years

Location: Pune

 

Lead/support implementation of core cloud components and document critical design and configuration details to support enterprise cloud initiatives. The Cloud Infrastructure Lead will be primarily responsible for utilizing technical skills to coordinate enhancements and deployment efforts and to provide insight and recommendations for implementing client solutions. Leads will work closely with Customer, Cloud Architect, other Cloud teams and other functions.


Job Requirements:

  • Experience in Cloud Foundation setup from the hierarchy of Organization to individual services
  • Experience in Cloud Virtual Network, VPN Gateways, Tunneling, Cloud Load Balancing, Cloud Interconnect, Cloud DNS
  • Experience working with scalable networking technologies such as Load Balancers/Firewalls and web standards (REST APIs, web security mechanisms)
  • Experience working with Identity and access management (MFA, SSO, AD Connect, App Registrations, Service Principals)
  • Familiarity with standard IT security practices such as encryption, certificates and key management.
  • Experience in Deploying and maintaining Applications on Kubernetes
  • Must have worked on one or more configuration tools such an Terraform, Ansible, PowerShell DSC
  • Experience on Cloud Storage services including MS SQL DB, Tables, Files etc
  • Experience on Cloud Monitoring and Alerts mechanism
  • Well versed with Governance and Cloud best practices for Security and Cost optimization 
  • Experience in one or more of the following: Shell scripting, PowerShell, Python or Ruby. 
  • Experience with Unix/Linux operating systems internals and administration (e.g., filesystems, system calls) or networking (e.g., TCP/IP, routing, network topologies and hardware, SDN)
  • Should have strong knowledge of Cloud billing and understand costing of different cloud services 
  • Prior professional experience in IT Strategy, IT Business Management, Cloud & Infrastructure, or Systems Engineering

 

Preferred 

  • Compute: Infrastructure, Platform Sizing, Consolidation, Tiered and Virtualized Storage, Automated Provisioning, Rationalization, Infrastructure Cost Reduction, Thin Provisioning
  • Experience with Operating systems and Software
  • Sound background with Networking and Security 
  • Experience with Open Source: Sizing and Performance Analyses, Selection and Implementation, Platform Design and Selection
  • Experience with Infrastructure-Based Processes: Monitoring, Capacity Planning, Facilities Management, Performance Tuning, Asset Management, Disaster Recovery, Data Center support

 

About Us!

A global Leader in the Data Warehouse Migration and Modernization to the Cloud, we empower businesses by migrating their Data/Workload/ETL/Analytics to the Cloud by leveraging Automation.

 

We have expertise in transforming legacy Teradata, Oracle, Hadoop, Netezza, Vertica, Greenplum along with ETLs like Informatica, Datastage, AbInitio & others, to cloud-based data warehousing with other capabilities in data engineering, advanced analytics solutions, data management, data lake and cloud optimization.

 

Datametica is a key partner of the major cloud service providers - Google, Microsoft, Amazon, Snowflake.

 

We have our own products!

Eagle – Data warehouse Assessment & Migration Planning Product

Raven – Automated Workload Conversion Product

Pelican - Automated Data Validation Product, which helps automate and accelerate data migration to the cloud.

 

Why join us!

Datametica is a place to innovate, bring new ideas to live and learn new things. We believe in building a culture of innovation, growth and belonging. Our people and their dedication over these years are the key factors in achieving our success.

 

Benefits we Provide!

Working with Highly Technical and Passionate, mission-driven people

Subsidized Meals & Snacks

Flexible Schedule

Approachable leadership

Access to various learning tools and programs

Pet Friendly

Certification Reimbursement Policy

 

Check out more about us on our website below!

www.datametica.com

Read more
confidential
Agency job
via OutworX Corporation by Priyanka Arora
Pune
3 - 6 yrs
₹4L - ₹7L / yr
Information security
IBM QRadar
Firewall
ArcSight
QRadar
+1 more
  • Information Security as Security Analyst (SOC)
  • Good understanding of security solutions like Anti-virus, DLP, Proxy, Firewall filtering/monitoring, IPS, Email Security, EPO, WAF etc.
  • Hands on experience withIBM QRadar, ArcSight SIEM tool for logs monitoring and analysis,Service now ticketing tool.
  • Good knowledge on networking concepts including OSI layers,subnet, TCP/IP, ports, DNS, DHCP, firewall monitoring, content filtering, check point etc.

 

Read more
Hyderabad
2 - 3 yrs
₹7L - ₹8.5L / yr
IT security
Security Information and Event Management (SIEM)
WAF
Firewall
security
+3 more
JOB TITLE : INFORMATION SECURITY Engineer

NOTE- we are looking for hose who can join  immediately or within notic period of 15-20days.
location_;Hyderabad
(wfh till pandemic)
JOB DESCRIPTION
• Job Scope
o Analyse incident in our security devices, conducting investigation and finding the
root cause of incidents.
o Managing endpoint detection security system
o Managing, configuration and fine tuning of on-prem firewall and WAF
o Provide and advise IT team on security and IT related issues such as network
configuration, firewall configuration, etc
o Ensuring all utilized cloud services are secured and the configuration comply to best
practices benchmark
o Communicate risk and recommendations to mitigate risk to the senior
administration by communicating in non-technical format
o Assists other department to ensure regulatory compliance to any necessary
compliance
• Minimum Requirements
o At least 2 years of experiences in managing endpoint detection system, WAF and
FW.
o Hands on experience on cloud environment preferably Microsoft Azure.
o Bachelor’s degree of any IT related courses.
o Strong understanding of incident detection and response process and procedure
o Strong knowledge in networking and in operating system such as
Linux/Unix/Windows
Read more
Hyderabad
7 - 12 yrs
₹10L - ₹18L / yr
IT security
Security Information and Event Management (SIEM)
SSL
BCP
Information security
+3 more
Job Description
IT Security Manager- 8-12 Years

NOTE - We are looking for those candidates who can join immediately or within 15-20 days of the notice period.
Key Responsibilities:
• Lead IT security projects including design and implementation of security infrastructure &software
• Experience working with Linux/UNIX administration"

• Define next gen IT security strategy, architecture, and processes for the group
• Analyse business requirements by partnering with key stakeholders across the organization to develop security solutions
• Lead validation of BCP & DR as per the organizational needs
• Experience with framing apolicies, processes and procedures and their implementation of IT Security for both On premise and Cloud infrastructure
• Write or review security-related documents, such as incident reports, proposals, and tactical or strategic initiatives.
• Maintain and manage security for all existing and new IT infrastructure and Applications
• Monitor security performance of information technology systems to drive cost and productivity levels, and to make recommendations for improving & standardization of the IT infrastructure
• Develop strategies for infra and application hardening
• Hands on experience with implementation of various security products & infrastructure
• Testing, troubleshooting, and modifying and ensure no performance impact on the systems so that they operate effectively
• Prepare plan and strategies to ensure security of the organization including both high and low risk events.
• Develop budgets for security operations and new initiatives.
• Coordinate security operations, Audit & Compliance activities along with law enforcement and government agencies.
• Ensure completeness of documentation and have exposure to ISO 27001, ISMS policies
• Work with key IT service providers to ensure industry standard platform, network and endpoint security posture
Key Skills required:
• Critical Infrastructure Management- (Manage SPI, Certification resources and infrastructure)
• WAF – Barracuda, Cloudflare, Akamai
• Cloud Security – AWS and Azure are preferred
• Work with Software and teams in resolving vulnerabilities
• SSL and PKI infrastructure management
• SIEM – Event Management, Endpoint Management, Threat analysis, patch Management
• Anti-Virus (VDC and Global Endpoints)- Web content filtering, Definition updates,
• Time Monitoring – system health checks and resource utilization checks, SIEM log analysis
• Log Monitoring and Log Analysis – collect, alert, store, search, report and share system and WAF logs
• Manage compliance – PCI, ISO
• Ability to work in global environments with teams spread globally
• Multi-tasking and time-management skills, with the ability to prioritize tasks.
• Highly organized and detail oriented.
• Excellent analytical and problem-solving skills.
• Experience with framing policies, processes and procedures and their implementation of IT Security for both On premise and Cloud infrastructure
experience with policies
• blue team (any experience with defending the network)
any experience with vulnerability assessment and PT
Read more
Virtual Engineering Services Pvt Ltd
Abha Sachdeva
Posted by Abha Sachdeva
NCR (Delhi | Gurgaon | Noida)
3 - 5 yrs
₹4L - ₹8L / yr
OWASP
Vulnerability assessment
Web application security
Penetration testing
IT security
+11 more

IT Security Specialist

 

 

Roles and Responsibilities

  • Extensive experience of 2-5 years in Vulnerability Assessment and Penetration testing, Web Application security.
  • An Experience in performing web application security assessments using hands on techniques for identifying SQL injections, XSS, CSRF, authentication/authorization, OWASP top 10 issues.
  • Must have working experience in OWASP Top 10 Vulnerabilities Testing in Web applications.
  • Create policy and standards for developers and testers to secure programming in the organization. (secure code review, static application security testing.
  • Experience on both commercial and open source tools Cenzic Hailstorm, Burpsuite, AppScan, WebInspect, Appspider, sqlmap, OWASP ZAP. Assessing cloud security risk (AWS and Azure) and recommending appropriate security controls.
  • Ability to interact with project teams to understand the security requirements and come up with solutions
  • Extensive knowledge of managing Web Application Firewall (Product) including rules management and product administration
  • Strong understanding of networking concept.

 

Desired Candidate Profile

 

  • Excellent knowledge of Microsoft Windows operating environments and with special attention to security and hardening issues.
  • Able to work independently with minimal supervision.
  • Good knowledge of secure software development standard, process, techniques, cloud security policies and tools.
  • Keep stakeholders updated with communications and weekly reporting.
  • Collaborate with Security Platform and Services teams to build and integrate existing security solutions.
  • Excellent communication skills - written, verbal, presentation and interpersonal.
  • Willing to learn new skills and implement new technologies.
  • Should come with bachelor’s degree in engineering, mathematics or master’s in computer application / programing.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Read more
Why apply to jobs via Cutshort
people_solving_puzzle
Personalized job matches
Stop wasting time. Get matched with jobs that meet your skills, aspirations and preferences.
people_verifying_people
Verified hiring teams
See actual hiring teams, find common social connections or connect with them directly. No 3rd party agencies here.
ai_chip
Move faster with AI
We use AI to get you faster responses, recommendations and unmatched user experience.
21,01,133
Matches delivered
37,12,187
Network size
15,000
Companies hiring
Did not find a job you were looking for?
icon
Search for relevant jobs from 10000+ companies such as Google, Amazon & Uber actively hiring on Cutshort.
companies logo
companies logo
companies logo
companies logo
companies logo
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Users love Cutshort
Read about what our users have to say about finding their next opportunity on Cutshort.
Subodh Popalwar's profile image

Subodh Popalwar

Software Engineer, Memorres
For 2 years, I had trouble finding a company with good work culture and a role that will help me grow in my career. Soon after I started using Cutshort, I had access to information about the work culture, compensation and what each company was clearly offering.
Companies hiring on Cutshort
companies logos