Cutshort logo

6+ IDS Jobs in India

Apply to 6+ IDS Jobs on CutShort.io. Find your next job, effortlessly. Browse IDS Jobs and apply today!

icon
E-Commerce Industry

E-Commerce Industry

Agency job
via Peak Hire Solutions by Dhara Thakkar
Bengaluru (Bangalore)
6 - 10 yrs
₹30L - ₹50L / yr
Security Information and Event Management (SIEM)
Information security governance
ISO/IEC 27001:2005
Systems Development Life Cycle (SDLC)
Software Development
+67 more

SENIOR INFORMATION SECURITY ENGINEER (DEVSECOPS)

Key Skills: Software Development Life Cycle (SDLC), CI/CD

About Company: Consumer Internet / E-Commerce

Company Size: Mid-Sized

Experience Required: 6 - 10 years

Working Days: 5 days/week

Office Location: Bengaluru [Karnataka]


Review Criteria:

Mandatory:

  • Strong DevSecOps profile
  • Must have 5+ years of hands-on experience in Information Security, with a primary focus on cloud security across AWS, Azure, and GCP environments.
  • Must have strong practical experience working with Cloud Security Posture Management (CSPM) tools such as Prisma Cloud, Wiz, or Orca along with SIEM / IDS / IPS platforms
  • Must have proven experience in securing Kubernetes and containerized environments including image security,runtime protection, RBAC, and network policies.
  • Must have hands-on experience integrating security within CI/CD pipelines using tools such as Snyk, GitHub Advanced Security,or equivalent security scanning solutions.
  • Must have solid understanding of core security domains including network security, encryption, identity and access management key management, and security governance including cloud-native security services like GuardDuty, Azure Security Center etc
  • Must have practical experience with Application Security Testing tools including SAST, DAST, and SCA in real production environments
  • Must have hands-on experience with security monitoring, incident response, alert investigation, root-cause analysis (RCA), and managing VAPT / penetration testing activities
  • Must have experience securing infrastructure-as-code and cloud deployments using Terraform, CloudFormation, ARM, Docker, and Kubernetes
  • B2B SaaS Product companies
  • Must have working knowledge of globally recognized security frameworks and standards such as ISO 27001, NIST, and CIS with exposure to SOC2, GDPR, or HIPAA compliance environments


Preferred:

  • Experience with DevSecOps automation, security-as-code, and policy-as-code implementations
  • Exposure to threat intelligence platforms, cloud security monitoring, and proactive threat detection methodologies, including EDR / DLP or vulnerability management tools
  • Must demonstrate strong ownership mindset, proactive security-first thinking, and ability to communicate risks in clear business language


Roles & Responsibilities:

We are looking for a Senior Information Security Engineer who can help protect our cloud infrastructure, applications, and data while enabling teams to move fast and build securely.


This role sits deep within our engineering ecosystem. You’ll embed security into how we design, build, deploy, and operate systems—working closely with Cloud, Platform, and Application Engineering teams. You’ll balance proactive security design with hands-on incident response, and help shape a strong, security-first culture across the organization.


If you enjoy solving real-world security problems, working close to systems and code, and influencing how teams build securely at scale, this role is for you.


What You’ll Do-

Cloud & Infrastructure Security:

  • Design, implement, and operate cloud-native security controls across AWS, Azure, GCP, and Oracle.
  • Strengthen IAM, network security, and cloud posture using services like GuardDuty, Azure Security Center and others.
  • Partner with platform teams to secure VPCs, security groups, and cloud access patterns.


Application & DevSecOps Security:

  • Embed security into the SDLC through threat modeling, secure code reviews, and security-by-design practices.
  • Integrate SAST, DAST, and SCA tools into CI/CD pipelines.
  • Secure infrastructure-as-code and containerized workloads using Terraform, CloudFormation, ARM, Docker, and Kubernetes.


Security Monitoring & Incident Response:

  • Monitor security alerts and investigate potential threats across cloud and application layers.
  • Lead or support incident response efforts, root-cause analysis, and corrective actions.
  • Plan and execute VAPT and penetration testing engagements (internal and external), track remediation, and validate fixes.
  • Conduct red teaming activities and tabletop exercises to test detection, response readiness, and cross-team coordination.
  • Continuously improve detection, response, and testing maturity.


Security Tools & Platforms:

  • Manage and optimize security tooling including firewalls, SIEM, EDR, DLP, IDS/IPS, CSPM, and vulnerability management platforms.
  • Ensure tools are well-integrated, actionable, and aligned with operational needs.


Compliance, Governance & Awareness:

  • Support compliance with industry standards and frameworks such as SOC2, HIPAA, ISO 27001, NIST, CIS, and GDPR.
  • Promote secure engineering practices through training, documentation, and ongoing awareness programs.
  • Act as a trusted security advisor to engineering and product teams.


Continuous Improvement:

  • Stay ahead of emerging threats, cloud vulnerabilities, and evolving security best practices.
  • Continuously raise the bar on a company's security posture through automation and process improvement.


Endpoint Security (Secondary Scope):

  • Provide guidance on endpoint security tooling such as SentinelOne and Microsoft Defender when required.


Ideal Candidate:

  • Strong hands-on experience in cloud security across AWS and Azure.
  • Practical exposure to CSPM tools (e.g., Prisma Cloud, Wiz, Orca) and SIEM / IDS / IPS platforms.
  • Experience securing containerized and Kubernetes-based environments.
  • Familiarity with CI/CD security integrations (e.g., Snyk, GitHub Advanced Security, or similar).
  • Solid understanding of network security, encryption, identity, and access management.
  • Experience with application security testing tools (SAST, DAST, SCA).
  • Working knowledge of security frameworks and standards such as ISO 27001, NIST, and CIS.
  • Strong analytical, troubleshooting, and problem-solving skills.


Nice to Have:

  • Experience with DevSecOps automation and security-as-code practices.
  • Exposure to threat intelligence and cloud security monitoring solutions.
  • Familiarity with incident response frameworks and forensic analysis.
  • Security certifications such as CISSP, CISM, CCSP, or CompTIA Security+.


Perks, Benefits and Work Culture:

A wholesome opportunity in a fast-paced environment that will enable you to juggle between concepts, yet maintain the quality of content, interact and share your ideas and have loads of learning while at work. Work with a team of highly talented young professionals and enjoy the comprehensive benefits that company offers.

Read more
NeoGenCode Technologies Pvt Ltd
Gurugram
6.5 - 12 yrs
₹10L - ₹22L / yr
Security operations
SOC Analyst
Security Operations Centre (SOC) Analyst
Security Information and Event Management (SIEM)
Splunk
+16 more

Job Title : Security Operations Centre (SOC) Analyst (L2/L3)

Experience : 6.5 to 9 Years

Location : Gurgaon (Hybrid – 3 Days Office / 2 Days WFH)

Budget : Up to ₹22 LPA

Joining : Immediate to 15–20 Days (Buyout Available)

Drive Date : Virtual Drive on 19th June


Note : Preference for candidates from Delhi NCR. North India-based candidates must be open to relocate to Gurgaon. No remote option available.


About the Role :

We are hiring a skilled SOC Analyst to join our Security Operations Centre (SOC).

The role involves proactive threat monitoring, incident response, forensic investigations, SIEM management, and collaboration across IT security domains to strengthen our cyber defense posture.


Mandatory Skills : SOC/NOC operations, SIEM tools (e.g., Splunk/QRadar), network security, malware analysis, vulnerability assessment, log analysis, Windows/Linux OS, packet capture tools (Wireshark/Netmon), firewalls, EDR, IDS/IPS, DLP, AV solutions.


🎯 Key Responsibilities :

  • Monitor and analyze security events to identify threats across networks and endpoints.
  • Perform threat detection, triage, investigation, and escalation of cybersecurity incidents.
  • Execute forensic analysis and malware containment processes.
  • Manage SIEM (health checks, alerting rules, integrations, vendor coordination).
  • Conduct vulnerability assessments, patch impact analysis, and ensure timely remediation.
  • Collaborate with internal IT teams for secure implementation of new initiatives.
  • Analyze logs from security tools like SIEM, DLP, AV, EDR, etc.
  • Prepare and maintain security documentation, SOPs, and incident reports.

🛠 Required Skills :

  • 3 to 5 Years’ hands-on experience in a SOC/NOC environment.
  • Expertise in SIEM solutions, firewalls, EDR, IDS/IPS, AV, DLP, and vulnerability scanners.
  • Strong knowledge of Linux/Windows OS, system logs, and hardening practices.
  • Proficient in packet capture analysis tools like Wireshark or Netmon.
  • Excellent problem-solving and communication skills.
  • Experience in security impact analysis for patches and third-party advisories.

Preferred Certifications :

  • CEH – Certified Ethical Hacker
  • GIAC – GCIH / GCIA / GCED (or equivalent)
Read more
Watsoo Express
Diptimayee Behera
Posted by Diptimayee Behera
Mumbai
10 - 30 yrs
₹25L - ₹40L / yr
DDOS
NIST
ISO/IEC 27001:2005
IDS
IPS
+3 more

Network Security Engineer – 10+ Years of Experience

(Males & Immediate Joiners only)


Mandatory Skills:


- 10+ years of experience in network security with a strong focus on data center security, cloud security, and container security.

- In-depth knowledge of firewalls, intrusion detection/prevention systems (IDS/IPS), and other security tools like anti-virus and endpoint protection.

- Experience with cloud security solutions and securing cloud-native applications.

- Strong experience with vulnerability management, penetration testing, and disaster recovery planning.

- Advanced knowledge of network protocols, network security design, and defense against common attack vectors (e.g., DDoS, SQL injection, phishing).

- Familiarity with security frameworks such as NIST, ISO 27001, and other relevant security standards.

- Excellent analytical, problem-solving, and critical thinking skills, with a strong attention to detail.

- Strong communication and interpersonal skills, with the ability to train staff and consult with management on security matters.


We are looking for an experienced Network Security Engineer with 8+ years of experience in managing and securing network infrastructures, including data center and cloud security solutions, as well as container security. If you have a strong background in firewall solutions, vulnerability management, and a passion for securing modern IT environments, this role is for you!


---


 Role Purpose:

As a Network Security Engineer, you will be responsible for ensuring the security, integrity, and confidentiality of the organization's network and systems. You will focus on installing, administering, and troubleshooting network security solutions, working with a variety of security tools and platforms, including firewalls, cloud security, containers, and endpoint protection. 


---


 Key Responsibilities:


 Security Solutions Management:

- Install, configure, and administer network security solutions, including firewalls and cloud security tools.

- Update software and firmware for network security systems with the latest security patches, ensuring defenses are up-to-date.

- Configure and support security systems such as firewalls, anti-virus software, and intrusion detection/prevention systems.

- Implement container security solutions to secure applications and services in cloud environments.


 Vulnerability & Penetration Testing:

- Conduct vulnerability assessments and penetration testing to identify potential threats and vulnerabilities.

- Develop and implement disaster recovery plans to mitigate the impact of potential security breaches.

- Monitor network traffic for signs of suspicious activity, perform threat analysis, and recommend improvements to reduce risk.


 Security Policy & Access Control:

- Create and enforce network security policies, including access controls, authorization roles, and defenses against unauthorized access, modifications, and data destruction.

- Ensure network resources are properly configured to defend against unauthorized or malicious activities.

- Provide expert advice and support to staff, managers, and executives on security best practices.


 Security Monitoring & Incident Response:

- Actively monitor network and application traffic for suspicious behavior and respond to potential security incidents.

- Identify, analyze, and respond to security breaches, providing clear documentation and resolution strategies.

- Ensure the effectiveness of security controls and defenses by reviewing security alerts and incidents.


 Training & Consultation:

- Train staff and end-users on security protocols and best practices to raise awareness and reduce human error.

- Provide technical consultations and guidance on improving security measures across all departments.

- Offer continuous education on new threats and security solutions to enhance overall organizational security posture.


---


 


Read more
Innspark Solutions
Sudesh Pandey
Posted by Sudesh Pandey
Delhi, Gurugram, Noida, Ghaziabad, Faridabad
1 - 3 yrs
₹4L - ₹8L / yr
Security Information and Event Management (SIEM)
SOAR
IDS
IPS
EDR
+8 more

Role: SOC Analyst

Job Type: Full Time, Permanent

Location: Onsite – Delhi

Experience Required: 1-3 Yrs

 

Skills Required:


1) Working knowledge across various security appliances (e.g., Firewall, WAF, Web Security Appliance, Email Security Appliance, Antivirus).

2) Experience with SOC Operations tools like SIEM, NDR, EDR, UEBA, SOAR, etc.

3) Strong analytical and problem-solving skills, with a deep understanding of cybersecurity principles, attack vectors, and threat intelligence.

4) Knowledge of network protocols, security technologies, and the ability to analyze and interpret security logs and events to identify potential threats.

5) Scripting skills (e.g., Python, Bash, PowerShell) for automation and analysis purposes.

6) Skilled in evaluating and integrating inputs from people, processes, and technologies to identify effective solutions.

7) Demonstrate a thorough understanding of the interdependencies between these elements and leverages this knowledge to develop comprehensive, efficient, and sustainable problem-solving strategies.

8) Excellent communication skills to articulate complex technical concepts to non-technical stakeholders and collaborate effectively with team members.

9) Ability to prioritize and manage multiple tasks in a dynamic environment.

10) Willingness to stay updated with the latest cybersecurity trends and technologies.


Job Responsibilities:


1) Continuously monitor and Analyze security alerts and logs to identify potential incidents. Analyze network traffic patterns to detect anomalies and identify potential security breaches.

2) Implement correlation rules and create playbooks as per requirements. Continuously update and suggest new rules and playbooks based on the latest attack vectors and insights from public articles and cybersecurity reports.

3) Use security compliance and scanning solutions to conduct assessments and validate the effectiveness of security controls and policies. Suggest improvements to enhance the overall security posture.

4) Utilize deception security solutions to deceive and detect potential attackers within the network.

5) Leverage deep expertise in networking, system architecture, operating systems, virtual machines (VMs), servers, and applications to enhance cybersecurity operations.

6) Work effectively with cross-functional teams to implement and maintain robust security measures. Conduct thorough forensic analysis of security incidents to determine root causes and impact.

7) Assist with all phases of incident response. Develop and refine incident response strategies and procedures to address emerging cyber threats.

8) Perform digital forensics to understand attack vectors and impact. Swiftly respond to and mitigate security threats, ensuring the integrity and security of organizational systems and data.

9) Professionally communicate and report technical findings, security incidents, and mitigation recommendations to clients.


About Company

Innspark is the fastest-growing Deep-tech Solutions company that provides next-generation products and services in Cybersecurity and Telematics. The Cybersecurity segment provides out-of-the-box solutions to detect and respond to sophisticated cyber incidents, threats, and attacks. The solutions are powered by advanced Threat Intelligence, Machine Learning, and Artificial Intelligence that provides deep visibility of the enterprise’s security.

We have developed and implemented solutions for a wide range of customers with highly complex environments including Government Organizations, Banks & Financial institutes, PSU, Healthcare Providers, Private Enterprises.


Website: https://innspark.in/


Read more
Tech Data
Loyson Masacrenhas
Posted by Loyson Masacrenhas
Bengaluru (Bangalore)
5 - 10 yrs
Best in industry
Network Security
Palo Alto
Fortinet
WAF
Firewall
+1 more

Responsibilities :


  • Determine the scope based on requirements, designing and building security components, and testing efforts, including stating the scope of work, calculating the resources, required in delivering the services and advising the senior system engineer preparing the quotation
  • Install and configure services as per the approved implementation plan
  • Carry out technology, professional and maintenance support services as per scope within the stipulated duration/ timeline.
  • Provide level 1/2 support (basic hardware break-fix & troubleshooting of hardware and software issues) for installed services
  • Provide technical deliverables such as high-level design documents, user acceptance test (UAT) doc and as-built documentation
  • Provide outstanding quality of service and meet predefined customer service level agreements (SLAs)
  • Undergo technical training and obtain technical certifications that are required to meet suppliers' mandatory technical requirements
  • Conduct knowledge transfer training (where required)


Knowledge, Skills and Experience :

  • Minimum 3 years of relevant experience
  • Certified in at least one of the technology domain (Infrastructure hardware and software, network, security)
  • Expertise on any two firewalls Specially - Palo Alto, Checkpoint, Fortinet, WAF
  • Strong technical knowledge on the assigned solution domain/product
  • Expertise in enterprise security products implementation, migration and support.
  • Implements security solutions infrastructure and/or application including the design, configuration, development, testing and deployment of security-related technologies such as Firewalls, WAF, LB , IDS/IP
  • Strong interpersonal skills with a customer-centric attitude; oral and written communication skills
  • Strong attention to technical details, priority management and planning skills
  • Ability to work independently with little to no supervision
  • Results-oriented
  • Security Certifications such as CCNP/CCIE Security or CCSA/CCSE/CCCP/PCNSE/Fortinet NSE1/2/3/4 are desirable


What's In It For You?

  • Elective Benefits: Our programs are tailored to your country to best accommodate your lifestyle.
  • Grow Your Career: Accelerate your path to success (and keep up with the future) with formal programs on leadership and professional development, and many more on-demand courses.
  • Elevate Your Personal Well-Being: Boost your financial, physical, and mental well-being through seminars, events, and our global Life Empowerment Assistance Program.
  • Diversity, Equity & Inclusion: It's not just a phrase to us; valuing every voice is how we succeed. Join us in celebrating our global diversity through inclusive education, meaningful peer-to-peer conversations, and equitable growth and development opportunities.
  • Make the Most of our Global Organization: Network with other new co-workers within your first 30 days through our onboarding program.
  • Connect with Your Community: Participate in internal, peer-led inclusive communities and activities, including business resource groups, local volunteering events, and more environmental and social initiatives
Read more
NCR (Delhi | Gurgaon | Noida), Bengaluru (Bangalore)
4 - 7 yrs
₹6L - ₹9L / yr
Information security
Security Engineer
IT security
Network Security
security
+6 more
Exclusively for candidates who is on a career break of minimum 2 years

· Self-driven individuals with 4 to 7 years of relevant information security experience.
· Should have adequate experience in dealing with disparate teams.
· Previous experience on medium and large platforms, with multiples technologies/vendor.
· Worked under high pressure situations (priority incidents/urgent delivery)

Essential Requirements:
· Hands on experience on NGFW such Cisco, Juniper, CheckPoint, F5/ASM
· Hands on experience on IDS/IPS management, Web Proxy, Application Firewalls; Load Balancers.
· Hands on vulnerability scanning experience.
· Hands on NAC management , Cisco ISE, RSA SecureID experience.
· Knowledge of Information security standards, policies, controls and structures prevalent in the industry.
· Strong technical understanding of network fundamentals(Routing, Switching) and common Internet protocols( HTTP, SNMP, TLS, DNS etc.)
· Experience in regular operational/health check of platforms and applications.
· Experience in writing Operational documents such as system operating guides.

Desirable Requirements:
· Previous working experiences with managing SIEM platform.
· Previous experience in security monitoring and incident response.
· Sound understanding of IT Service Management disciplines in line with IT industry standards and best practices, e.g. ITIL
· Routing, Switching knowledge
· Unix, Windows Operating system knowledge
Read more
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Why apply via Cutshort?
Connect with actual hiring teams and get their fast response. No spam.
Find more jobs
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort