Cyber_KDNI_TH/TI - Assistant Manager

2 days ago


Bengaluru, Karnataka, India BSR & Co Full time ₹ 20,00,000 - ₹ 40,00,000 per year
Description

Job Title: Threat Hunting and Intelligence Lead
Location: Bangalore
Department: MDR – TH/TI

 

Job Summary:

We are seeking a highly skilled and proactive Threat Hunting and Intelligence Lead to spearhead our proactive cybersecurity initiatives. This role is responsible for leading a team of threat hunters and intelligence analysts to detect, analyze, and respond to advanced cyber threats. The ideal candidate will have a strong background in threat intelligence, incident response, and security operations, with a passion for staying ahead of emerging threats. He/she will help design, build, and deliver in the strategic direction of KPMG's threat hunting and threat intelligence function, which supports a diverse portfolio of clients

Key Responsibilities:

  • Lead the threat hunting and cyber threat intelligence (CTI) functions within the Security Operations Center (SOC), defining long-term strategy and ensuring scalability to meet client needs. 
  • Develop and execute proactive, hypothesis-driven threat hunting strategies to detect and mitigate advanced threats across diverse environments.
  • Oversee the daily operations of the threat intelligence team, ensuring timely collection, analysis, and dissemination of actionable intelligence to internal stakeholders and clients. 
  • Conduct in-depth research on sophisticated threat actors, their evolving tactics, techniques, and procedures (TTPs), and motivations—leveraging advanced intelligence platforms and tools. 
  • Analyze threat intelligence from internal and external sources to assess relevance and potential impact on client environments. 
  • Collaborate with incident response, SOC, and vulnerability management teams to enhance detection, response, and remediation capabilities. 
  • Build and maintain threat detection use cases, playbooks, and automation workflows to improve operational efficiency. 
  • Conduct root cause analyses and post-incident reviews to continuously improve threat detection and response processes. 
  • Develop and deliver high-quality intelligence reports, dashboards, and briefings tailored to client-specific threats and business risks. 
  • Establish and enforce best practices across the intelligence lifecycle—from requirements gathering to analysis and dissemination—ensuring intelligence outputs are timely, accurate, and relevant.
  • Stay abreast of emerging cyber threats, vulnerabilities, malware, and attack methodologies by monitoring threat feeds, industry reports, and security research. 
  • Evaluate and integrate new intelligence tools and technologies, ensuring the team remains current with evolving capabilities and trends. 
  • Serve as the primary point of contact for threat intelligence discussions with internal and external stakeholders, acting as a trusted advisor and aligning intelligence services with business objectives. 
  • Mentor and develop junior analysts and threat hunters, fostering a culture of continuous learning and operational excellence.

Essential Qualifications:

  • Bachelor's degree in computer science, Information Security, or a related field (or equivalent experience). 
  • 7+ years of experience in cybersecurity, including at least 5 years in threat hunting or threat intelligence and 3+ years in a leadership or management role. 
  • Deep understanding of threat actor tactics, techniques, and procedures (TTPs), including the MITRE ATT&CK framework and the cyber kill chain. 
  • Proficiency with SIEM (e.g., Splunk, QRadar), EDR solutions, and threat intelligence platforms. 
  • Hands-on experience with scripting languages such as Python or PowerShell for automation and data analysis. 
  • Proven track record in building and scaling threat intelligence programs, ideally within a managed security services environment. 
  • Strong grasp of the global cyber threat landscape and its implications across industries. 
  • Ability to translate complex technical threats into business risks and effectively communicate with both technical and non-technical stakeholders. 
  • Excellent communication, presentation, and interpersonal skills.

Preferred Qualifications:

  • Certifications such as GCTI, GCIA, GCIH, OSCP, or CISSP.
  • Experience with threat modeling and risk assessment methodologies.
  • Familiarity with cloud security (AWS, Azure, GCP) and hybrid environments.
  • Knowledge of regulatory and compliance frameworks (e.g., NIST, ISO 27001, GDPR)
Responsibilities

Job Title: Threat Hunting and Intelligence Lead
Location: Bangalore
Department: MDR – TH/TI

 

Job Summary:

We are seeking a highly skilled and proactive Threat Hunting and Intelligence Lead to spearhead our proactive cybersecurity initiatives. This role is responsible for leading a team of threat hunters and intelligence analysts to detect, analyze, and respond to advanced cyber threats. The ideal candidate will have a strong background in threat intelligence, incident response, and security operations, with a passion for staying ahead of emerging threats. He/she will help design, build, and deliver in the strategic direction of KPMG's threat hunting and threat intelligence function, which supports a diverse portfolio of clients

Key Responsibilities:

  • Lead the threat hunting and cyber threat intelligence (CTI) functions within the Security Operations Center (SOC), defining long-term strategy and ensuring scalability to meet client needs. 
  • Develop and execute proactive, hypothesis-driven threat hunting strategies to detect and mitigate advanced threats across diverse environments.
  • Oversee the daily operations of the threat intelligence team, ensuring timely collection, analysis, and dissemination of actionable intelligence to internal stakeholders and clients. 
  • Conduct in-depth research on sophisticated threat actors, their evolving tactics, techniques, and procedures (TTPs), and motivations—leveraging advanced intelligence platforms and tools. 
  • Analyze threat intelligence from internal and external sources to assess relevance and potential impact on client environments. 
  • Collaborate with incident response, SOC, and vulnerability management teams to enhance detection, response, and remediation capabilities. 
  • Build and maintain threat detection use cases, playbooks, and automation workflows to improve operational efficiency. 
  • Conduct root cause analyses and post-incident reviews to continuously improve threat detection and response processes. 
  • Develop and deliver high-quality intelligence reports, dashboards, and briefings tailored to client-specific threats and business risks. 
  • Establish and enforce best practices across the intelligence lifecycle—from requirements gathering to analysis and dissemination—ensuring intelligence outputs are timely, accurate, and relevant.
  • Stay abreast of emerging cyber threats, vulnerabilities, malware, and attack methodologies by monitoring threat feeds, industry reports, and security research. 
  • Evaluate and integrate new intelligence tools and technologies, ensuring the team remains current with evolving capabilities and trends. 
  • Serve as the primary point of contact for threat intelligence discussions with internal and external stakeholders, acting as a trusted advisor and aligning intelligence services with business objectives. 
  • Mentor and develop junior analysts and threat hunters, fostering a culture of continuous learning and operational excellence.

Essential Qualifications:

  • Bachelor's degree in computer science, Information Security, or a related field (or equivalent experience). 
  • 7+ years of experience in cybersecurity, including at least 5 years in threat hunting or threat intelligence and 3+ years in a leadership or management role. 
  • Deep understanding of threat actor tactics, techniques, and procedures (TTPs), including the MITRE ATT&CK framework and the cyber kill chain. 
  • Proficiency with SIEM (e.g., Splunk, QRadar), EDR solutions, and threat intelligence platforms. 
  • Hands-on experience with scripting languages such as Python or PowerShell for automation and data analysis. 
  • Proven track record in building and scaling threat intelligence programs, ideally within a managed security services environment. 
  • Strong grasp of the global cyber threat landscape and its implications across industries. 
  • Ability to translate complex technical threats into business risks and effectively communicate with both technical and non-technical stakeholders. 
  • Excellent communication, presentation, and interpersonal skills.

Preferred Qualifications:

  • Certifications such as GCTI, GCIA, GCIH, OSCP, or CISSP.
  • Experience with threat modeling and risk assessment methodologies.
  • Familiarity with cloud security (AWS, Azure, GCP) and hybrid environments.
  • Knowledge of regulatory and compliance frameworks (e.g., NIST, ISO 27001, GDPR)
Qualifications

Job Title: Threat Hunting and Intelligence Lead
Location: Bangalore
Department: MDR – TH/TI

 

Job Summary:

We are seeking a highly skilled and proactive Threat Hunting and Intelligence Lead to spearhead our proactive cybersecurity initiatives. This role is responsible for leading a team of threat hunters and intelligence analysts to detect, analyze, and respond to advanced cyber threats. The ideal candidate will have a strong background in threat intelligence, incident response, and security operations, with a passion for staying ahead of emerging threats. He/she will help design, build, and deliver in the strategic direction of KPMG's threat hunting and threat intelligence function, which supports a diverse portfolio of clients

Key Responsibilities:

  • Lead the threat hunting and cyber threat intelligence (CTI) functions within the Security Operations Center (SOC), defining long-term strategy and ensuring scalability to meet client needs. 
  • Develop and execute proactive, hypothesis-driven threat hunting strategies to detect and mitigate advanced threats across diverse environments.
  • Oversee the daily operations of the threat intelligence team, ensuring timely collection, analysis, and dissemination of actionable intelligence to internal stakeholders and clients. 
  • Conduct in-depth research on sophisticated threat actors, their evolving tactics, techniques, and procedures (TTPs), and motivations—leveraging advanced intelligence platforms and tools. 
  • Analyze threat intelligence from internal and external sources to assess relevance and potential impact on client environments. 
  • Collaborate with incident response, SOC, and vulnerability management teams to enhance detection, response, and remediation capabilities. 
  • Build and maintain threat detection use cases, playbooks, and automation workflows to improve operational efficiency. 
  • Conduct root cause analyses and post-incident reviews to continuously improve threat detection and response processes. 
  • Develop and deliver high-quality intelligence reports, dashboards, and briefings tailored to client-specific threats and business risks. 
  • Establish and enforce best practices across the intelligence lifecycle—from requirements gathering to analysis and dissemination—ensuring intelligence outputs are timely, accurate, and relevant.
  • Stay abreast of emerging cyber threats, vulnerabilities, malware, and attack methodologies by monitoring threat feeds, industry reports, and security research. 
  • Evaluate and integrate new intelligence tools and technologies, ensuring the team remains current with evolving capabilities and trends. 
  • Serve as the primary point of contact for threat intelligence discussions with internal and external stakeholders, acting as a trusted advisor and aligning intelligence services with business objectives. 
  • Mentor and develop junior analysts and threat hunters, fostering a culture of continuous learning and operational excellence.

Essential Qualifications:

  • Bachelor's degree in computer science, Information Security, or a related field (or equivalent experience). 
  • 7+ years of experience in cybersecurity, including at least 5 years in threat hunting or threat intelligence and 3+ years in a leadership or management role. 
  • Deep understanding of threat actor tactics, techniques, and procedures (TTPs), including the MITRE ATT&CK framework and the cyber kill chain. 
  • Proficiency with SIEM (e.g., Splunk, QRadar), EDR solutions, and threat intelligence platforms. 
  • Hands-on experience with scripting languages such as Python or PowerShell for automation and data analysis. 
  • Proven track record in building and scaling threat intelligence programs, ideally within a managed security services environment. 
  • Strong grasp of the global cyber threat landscape and its implications across industries. 
  • Ability to translate complex technical threats into business risks and effectively communicate with both technical and non-technical stakeholders. 
  • Excellent communication, presentation, and interpersonal skills.

Preferred Qualifications:

  • Certifications such as GCTI, GCIA, GCIH, OSCP, or CISSP.
  • Experience with threat modeling and risk assessment methodologies.
  • Familiarity with cloud security (AWS, Azure, GCP) and hybrid environments.
  • Knowledge of regulatory and compliance frameworks (e.g., NIST, ISO 27001, GDPR)


  • Bengaluru, Karnataka, India Hillarys Full time ₹ 8,00,000 - ₹ 12,00,000 per year

    Seeking a dynamic Assistant Sales Manager to expand Hillarys' presence in Bangalore through architect and designer networks. Strong A&D ties, and proven ability to build relationships, drive business, and deliver results


  • Bengaluru, Karnataka, India Texas Instruments Full time ₹ 10,00,000 - ₹ 25,00,000 per year

    Job DescriptionChange the world. Love your job.In your first year with TI, you will participate in the Career Accelerator Program (CAP), which provides professional and technical training and resources to accelerate your ramp into TI and set you up for long-term career success. Within this program, we also offer function-specific technical training and...


  • Bengaluru, Karnataka, India Texas Instruments Full time ₹ 12,00,000 - ₹ 36,00,000 per year

    Title: Verification and AVnV managerAbout The JobYou will be part of the team which charter to develop wireless MCU solutions for PE, Industrial, Automotive market segment. As part of your role, you will be leading DV and AVV activities for at least 2 devices in parallel. This comes along with people responsibilities.You will be a core member in a design...

  • Assistant Professor

    1 week ago


    Bengaluru, Karnataka, India Acharya Institutes Full time ₹ 38,40,000 - ₹ 76,80,000 per year

    Role SummaryThe Faculty in Business Analytics will be responsible for teaching, research, and academic administration within the MBA program. The primary focus is to equip management students with data-driven decision-making skills, covering analytical tools, statistical methods, and their application in various business functions.Key...


  • Bengaluru, Karnataka, India Texas Instruments Full time ₹ 8,00,000 - ₹ 25,00,000 per year

    Change the world. Love your job.About the job:We are seeking a Development Manager for the Switching Regulators product line in Analog Power business. This role provides an opportunity to be part of a world-class team that develops power converter/controller devices for a broad variety of markets. These markets demand high level of technical differentiation...


  • Bengaluru, Karnataka, India ti Steps Full time ₹ 12,00,000 - ₹ 36,00,000 per year

    Job Title: AVP-Data SME Location: Bangalore Job Summary: This role is based in India with a tactical focus on the data analysis of highly segmented, incomplete IT Services pricing and solution data. Competitive Solutioning Data SME (CSDS) will collect, clean, rationalize, and analyze solution and price data from multiple sources including from within...


  • Bengaluru, Karnataka, India d70e3c3c-4c2b-4f4c-ad69-a320e4a73fad Full time ₹ 15,00,000 - ₹ 50,00,000 per year

    Sales & MarketingGrow B2B sales, onboard partners, run local campaigns, close deals, and build lasting client tiesOperationsLead food ops: onboard kitchens, manage fleet, resolve issues, plan menus, improve processes, and build partnershipsFood allowanceHealth insuranceProvident fundAnnual bonusTravel allowance


  • Bengaluru, Karnataka, India cee5704f-9e92-4c57-a64e-6f4aa2698ede Full time ₹ 5,00,000 - ₹ 15,00,000 per year

    Associate, Managing Partners OfficeA BD facing position that works directly with me on expansion, new practice areas, client outreach and firm wide growth projects. It requires clarity, discipline and an instinct for where opportunity sits.What you will do• Build high quality decks, pitches and capability materials• Track emerging sectors and identify...

  • Customer Service

    2 weeks ago


    Bengaluru, Karnataka, India ti Steps Full time ₹ 3,00,000 - ₹ 4,50,000 per year

    Role Overview:As a Customer Service Advocate, you will be the frontline representative for consumer concern/query. Your primary responsibility is to assist customers with non-technical issues related to customer query related to orders, billing, banking , and services. Youll provide timely and effective solutions, ensuring a positiveKey responsibilities:*...


  • Bengaluru, Karnataka, India Texas Instruments Full time US$ 1,50,000 - US$ 2,00,000 per year

    Job DescriptionChange the world. Love your job.Your career starts here This is an exciting opportunity to design and develop innovative software solutions that drive TI's revolutionary product lines. We change lives by working on the technologies that people use every day. Are you ready for the challenge?As a Software Engineer, you'll become a key...