Google Secops(L3)
2 weeks ago
L3 Analyst: Google Chronicle / Google SecOps Roles & Responsibilities The associate highly skilled Level 3 Security Analyst with expertise in Google Chronicle and Google SecOps , focusing on Next-Gen SIEM and SOAR capabilities . SIEM Integration of Log Sources: Cloud (GCP, AWS, Azure), endpoints (EDR), identity (AD/Azure AD/Okta), network (FW/Proxy/NDR), SaaS (O365/GWS), app logs (K8s/containers) Content or rules development, New Use case creation and Use Case Fine tuning SOC process & procedures and Incident Response Run book / Play book creation Incident Response, Cyber threat analysis support, research and recommend appropriate remediation and mitigation Incident Response & Automation (Google SecOps SOAR) identification of advanced cyber threat activities, Endpoint Detection & Response, intrusion detection, incident response, malware analysis, and security content development (e.g., signatures, rules etc.); and cyber threat intelligence Maintain and drive the development of new reports of Cyber Threat Intelligence analysis to peers, management, and customer teams for purposes of situational awareness Recommendation of threat mitigation strategies Skills & Experience 7+ years in SOC operations, with 2+ years on Google Chronicle and Google SecOps. Next-Gen SIEM Expertise: Good knowledge and demonstrated experience in Google Secops (Google Chronicle) SOAR Expertise: Playbook development and orchestration in Google SecOps. Good Knowledge in Nextgen Firewalls, Advanced Anti-malware prevention and analysis, Phishing email investigations, Sandbox analysis etc., Automation scripting (Python, JSON). Integration with ticketing systems (ServiceNow, Jira) and EDR tools. Certifications: Google Cybersecurity Professional Certificate, Chronicle-specific training, GCIA/GCIH preferred. Education Bachelor’s degree in science or engineering or information technology, related field, Minimum 7 years’ experience in Cybersecurity, SOC Operations or Incident Response Should have one of the following certifications CISSP, CISA, OSCP, SANS, SIEM, CEH, CCNA Security etc.,
-
Google Secops(L3)
4 days ago
bangalore, India TECEZE Full timeL3 Analyst: Google Chronicle / Google SecOps Roles & Responsibilities The associate highly skilled Level 3 Security Analyst with expertise in Google Chronicle and Google SecOps , focusing on Next-Gen SIEM and SOAR capabilities . SIEM Integration of Log Sources: Cloud (GCP, AWS, Azure), endpoints (EDR), identity (AD/Azure AD/Okta), network (FW/Proxy/NDR),...
-
Google Secops(L3)
2 weeks ago
bangalore, India TECEZE Full timeL3 Analyst: Google Chronicle / Google SecOpsRoles & ResponsibilitiesThe associate highly skilled Level 3 Security Analyst with expertise in Google Chronicle and Google SecOps, focusing on Next-Gen SIEM and SOAR capabilities.SIEM Integration of Log Sources: Cloud (GCP, AWS, Azure), endpoints (EDR), identity (AD/Azure AD/Okta), network (FW/Proxy/NDR), SaaS...
-
Google Secops
2 weeks ago
bangalore, India Tata Consultancy Services Full timeTCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. TCS Hiring for Google Secops Experience Range: 6+Years Job Location: Chennai, Hyderabad Job Description Must-Have** Google Secops, Google Cloud Role & Responsibilities: Designed...
-
Google Secops
7 days ago
bangalore, India Tata Consultancy Services Full timeTCS has been a great pioneer in feeding the fire of Young Techies like you. We are a global leader in the technology arena and there's nothing that can stop us from growing together. TCS Hiring for Google Secops Experience Range: 6+Years Job Location: Chennai, Hyderabad Job Description Must-Have** Google Secops, Google Cloud Role & Responsibilities: Designed...
-
Google Secops(L2)
3 days ago
bangalore, India TECEZE Full timeRole: L2 Google SecOps Platform Engineer Key Responsibilities: Log Source & Device Integration: Onboard devices and integrate log sources with the SIEM platform. ITSM Integration: Connect assets with ITSM solutions and configure incident response workflows within SIEM. SIEM Content Development: Create and fine-tune SIEM rules, develop new use cases, and...
-
Security Operations Center Analyst
5 days ago
bangalore, India Valorant Full timeRole SummaryWe are seeking an experienced L1 SOC Analyst (3–5 years) to perform real-time Eyes on Glass monitoring and first-level incident triage within our Security Operations Center. The role requires hands-on experience with SIEM, EDR, DLP, and network security tools, strong analytical skills, and a disciplined approach to SOP-driven incident handling....
-
GCP Devops Engineer
3 weeks ago
bangalore, India Teamware Solutions Full timeGoogle Cloud DevOps Engineer (SecOps) The Google Cloud DevOps engineer will be focusing primarily on the Google Cloud space to build and automate a new multi-tenant Managed Detection & Response (MDR) service. This engineer will primarily utilize the Azure DevOps toolset to orchestrate deployments and will need to become highly proficient with Google Cloud...
-
Windows L3 Engineer
5 days ago
Bangalore, Karnataka, India NuStar Technologies Full timeDesired Competencies Technical Behavioral Competency Must-Have A successful candidate will have the opportunity to serve as the focal point for large incidents including providing awareness and debriefing to senior management Manage time-sensitive incidents and investigations requiring follow-the-sun coordination Work with and become proficient in a variety...
-
Security Operations Center Analyst
4 days ago
bangalore, India Valorant Full timeRole Summary We are seeking an experienced L1 SOC Analyst (3–5 years) to perform real-time Eyes on Glass monitoring and first-level incident triage within our Security Operations Center. The role requires hands-on experience with SIEM, EDR, DLP, and network security tools, strong analytical skills, and a disciplined approach to SOP-driven incident...
-
Security Operations Center Analyst
3 days ago
bangalore, India Valorant Full timeRole Summary We are seeking an experienced L1 SOC Analyst (3–5 years) to perform real-time Eyes on Glass monitoring and first-level incident triage within our Security Operations Center. The role requires hands-on experience with SIEM, EDR, DLP, and network security tools, strong analytical skills, and a disciplined approach to SOP-driven incident...