3+ IPS Jobs in India
Apply to 3+ IPS Jobs on CutShort.io. Find your next job, effortlessly. Browse IPS Jobs and apply today!

Job Title : Security Operations Centre (SOC) Analyst (L2/L3)
Experience : 6.5 to 9 Years
Location : Gurgaon (Hybrid – 3 Days Office / 2 Days WFH)
Budget : Up to ₹22 LPA
Joining : Immediate to 15–20 Days (Buyout Available)
Drive Date : Virtual Drive on 19th June
Note : Preference for candidates from Delhi NCR. North India-based candidates must be open to relocate to Gurgaon. No remote option available.
About the Role :
We are hiring a skilled SOC Analyst to join our Security Operations Centre (SOC).
The role involves proactive threat monitoring, incident response, forensic investigations, SIEM management, and collaboration across IT security domains to strengthen our cyber defense posture.
Mandatory Skills : SOC/NOC operations, SIEM tools (e.g., Splunk/QRadar), network security, malware analysis, vulnerability assessment, log analysis, Windows/Linux OS, packet capture tools (Wireshark/Netmon), firewalls, EDR, IDS/IPS, DLP, AV solutions.
🎯 Key Responsibilities :
- Monitor and analyze security events to identify threats across networks and endpoints.
- Perform threat detection, triage, investigation, and escalation of cybersecurity incidents.
- Execute forensic analysis and malware containment processes.
- Manage SIEM (health checks, alerting rules, integrations, vendor coordination).
- Conduct vulnerability assessments, patch impact analysis, and ensure timely remediation.
- Collaborate with internal IT teams for secure implementation of new initiatives.
- Analyze logs from security tools like SIEM, DLP, AV, EDR, etc.
- Prepare and maintain security documentation, SOPs, and incident reports.
🛠 Required Skills :
- 3 to 5 Years’ hands-on experience in a SOC/NOC environment.
- Expertise in SIEM solutions, firewalls, EDR, IDS/IPS, AV, DLP, and vulnerability scanners.
- Strong knowledge of Linux/Windows OS, system logs, and hardening practices.
- Proficient in packet capture analysis tools like Wireshark or Netmon.
- Excellent problem-solving and communication skills.
- Experience in security impact analysis for patches and third-party advisories.
✅ Preferred Certifications :
- CEH – Certified Ethical Hacker
- GIAC – GCIH / GCIA / GCED (or equivalent)
Network Security Engineer – 10+ Years of Experience
(Males & Immediate Joiners only)
Mandatory Skills:
- 10+ years of experience in network security with a strong focus on data center security, cloud security, and container security.
- In-depth knowledge of firewalls, intrusion detection/prevention systems (IDS/IPS), and other security tools like anti-virus and endpoint protection.
- Experience with cloud security solutions and securing cloud-native applications.
- Strong experience with vulnerability management, penetration testing, and disaster recovery planning.
- Advanced knowledge of network protocols, network security design, and defense against common attack vectors (e.g., DDoS, SQL injection, phishing).
- Familiarity with security frameworks such as NIST, ISO 27001, and other relevant security standards.
- Excellent analytical, problem-solving, and critical thinking skills, with a strong attention to detail.
- Strong communication and interpersonal skills, with the ability to train staff and consult with management on security matters.
We are looking for an experienced Network Security Engineer with 8+ years of experience in managing and securing network infrastructures, including data center and cloud security solutions, as well as container security. If you have a strong background in firewall solutions, vulnerability management, and a passion for securing modern IT environments, this role is for you!
---
Role Purpose:
As a Network Security Engineer, you will be responsible for ensuring the security, integrity, and confidentiality of the organization's network and systems. You will focus on installing, administering, and troubleshooting network security solutions, working with a variety of security tools and platforms, including firewalls, cloud security, containers, and endpoint protection.
---
Key Responsibilities:
Security Solutions Management:
- Install, configure, and administer network security solutions, including firewalls and cloud security tools.
- Update software and firmware for network security systems with the latest security patches, ensuring defenses are up-to-date.
- Configure and support security systems such as firewalls, anti-virus software, and intrusion detection/prevention systems.
- Implement container security solutions to secure applications and services in cloud environments.
Vulnerability & Penetration Testing:
- Conduct vulnerability assessments and penetration testing to identify potential threats and vulnerabilities.
- Develop and implement disaster recovery plans to mitigate the impact of potential security breaches.
- Monitor network traffic for signs of suspicious activity, perform threat analysis, and recommend improvements to reduce risk.
Security Policy & Access Control:
- Create and enforce network security policies, including access controls, authorization roles, and defenses against unauthorized access, modifications, and data destruction.
- Ensure network resources are properly configured to defend against unauthorized or malicious activities.
- Provide expert advice and support to staff, managers, and executives on security best practices.
Security Monitoring & Incident Response:
- Actively monitor network and application traffic for suspicious behavior and respond to potential security incidents.
- Identify, analyze, and respond to security breaches, providing clear documentation and resolution strategies.
- Ensure the effectiveness of security controls and defenses by reviewing security alerts and incidents.
Training & Consultation:
- Train staff and end-users on security protocols and best practices to raise awareness and reduce human error.
- Provide technical consultations and guidance on improving security measures across all departments.
- Offer continuous education on new threats and security solutions to enhance overall organizational security posture.
---
Role: SOC Analyst
Job Type: Full Time, Permanent
Location: Onsite – Delhi
Experience Required: 1-3 Yrs
Skills Required:
1) Working knowledge across various security appliances (e.g., Firewall, WAF, Web Security Appliance, Email Security Appliance, Antivirus).
2) Experience with SOC Operations tools like SIEM, NDR, EDR, UEBA, SOAR, etc.
3) Strong analytical and problem-solving skills, with a deep understanding of cybersecurity principles, attack vectors, and threat intelligence.
4) Knowledge of network protocols, security technologies, and the ability to analyze and interpret security logs and events to identify potential threats.
5) Scripting skills (e.g., Python, Bash, PowerShell) for automation and analysis purposes.
6) Skilled in evaluating and integrating inputs from people, processes, and technologies to identify effective solutions.
7) Demonstrate a thorough understanding of the interdependencies between these elements and leverages this knowledge to develop comprehensive, efficient, and sustainable problem-solving strategies.
8) Excellent communication skills to articulate complex technical concepts to non-technical stakeholders and collaborate effectively with team members.
9) Ability to prioritize and manage multiple tasks in a dynamic environment.
10) Willingness to stay updated with the latest cybersecurity trends and technologies.
Job Responsibilities:
1) Continuously monitor and Analyze security alerts and logs to identify potential incidents. Analyze network traffic patterns to detect anomalies and identify potential security breaches.
2) Implement correlation rules and create playbooks as per requirements. Continuously update and suggest new rules and playbooks based on the latest attack vectors and insights from public articles and cybersecurity reports.
3) Use security compliance and scanning solutions to conduct assessments and validate the effectiveness of security controls and policies. Suggest improvements to enhance the overall security posture.
4) Utilize deception security solutions to deceive and detect potential attackers within the network.
5) Leverage deep expertise in networking, system architecture, operating systems, virtual machines (VMs), servers, and applications to enhance cybersecurity operations.
6) Work effectively with cross-functional teams to implement and maintain robust security measures. Conduct thorough forensic analysis of security incidents to determine root causes and impact.
7) Assist with all phases of incident response. Develop and refine incident response strategies and procedures to address emerging cyber threats.
8) Perform digital forensics to understand attack vectors and impact. Swiftly respond to and mitigate security threats, ensuring the integrity and security of organizational systems and data.
9) Professionally communicate and report technical findings, security incidents, and mitigation recommendations to clients.
About Company
Innspark is the fastest-growing Deep-tech Solutions company that provides next-generation products and services in Cybersecurity and Telematics. The Cybersecurity segment provides out-of-the-box solutions to detect and respond to sophisticated cyber incidents, threats, and attacks. The solutions are powered by advanced Threat Intelligence, Machine Learning, and Artificial Intelligence that provides deep visibility of the enterprise’s security.
We have developed and implemented solutions for a wide range of customers with highly complex environments including Government Organizations, Banks & Financial institutes, PSU, Healthcare Providers, Private Enterprises.
Website: https://innspark.in/