Cyber_MS_KDNI-MDR - Consultant
5 days ago
Function: MDR Response Team
Position: Level 2 Consultant
Location: Bangalore
The primary role of a Security Analyst (L2) is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures. Specifically, these analysts will be responsible for monitoring the SIEM tools for security events and closing or escalating those events as necessary. Security Analysts maintain the group email address and distribution lists, answer the main phone lines, and update all relevant documentation such as shift logs and tickets. Additionally, assist the MDR Analyst in an incident workflow and assist the MDR team in incident detection, remediation and communicate with external teams in proper incident resolution. We are currently seeking a Senior Security Associate for our KPMG Managed Services (Spectrum) practice to join us in our Bangalore office.
Note: Candidate must be willing to Work from Office only (Bangalore Location) & willing to do 24x7 rotational shift (Mandatory requirement for this role)
- You will be working as a consultant in KPMG's expanding Security Operations practice.
- As a Security Operations consultant, you will help our clients in solving some of the key challenges faced by security operations leaders.
- The work would involve advising our clients on Security Operations Strategy, Design, Maturity Assessment, and Optimization.
- Be able to drive client calls & discussions on day-to-day basis and/or address operational issues
- You will get a chance to learn new skills, certifications, and work with some of our key alliance partners, including some of the largest security vendors in the industry.
- You will be working in a dynamic environment and engage with leading companies around the world.
- Rapidly identify, categorize, prioritize and investigate events as the initial cyber event detection group for the enterprise using all available security logs and intelligence sources to include but not limited to:
- Firewalls
- Systems and Network Devices
- Web Proxies
- Intrusion Detection/Prevention Systems
- Data Loss Prevention
- EDR / Antivirus Systems
- Knowledgebase Framework (Confluence)
- Continuously monitor SIEM and logging environments for security events and alerts to threats, intrusions, and/or compromises, including:
- SIEM alert queue
- Security email inbox
- Intel feeds via email and other sources (e.g. NH-ISAC)
- Incident Ticketing queue (IT Security group)
Roles & Responsibilities:
- Validate alerts as they come in to eliminate false positives and use other internal and external data sources to enrich alerts with additional context
- Performing triage of service requests from customers and internal teams
- Use playbook procedures to carry out standard plays for routine event types and escalate alerts to Level 2 Analysts for further triage and remediation
- Assist with containment of threats and remediation of environment during or after an incident
- Act as a participant during Threat Hunting activities at the direction of one or more Incident Response Handlers
- Document event analysis and write comprehensive reports of incident investigations
- Proactively improve security-related operational processes and procedures
- Use available security tools for historical analysis purposes as necessary for detected events; for example, historical searches using SIEM tools
- Maintain operational shift logs with relevant activity from the Analyst's shift. Document investigation results, ensuring relevant details are passed to Level 2 or MDR Analysts for final event analysis
- Update/reference knowledgebase tool (e.g. Confluence) as necessary for changes to processes and procedures, and ingestion of daily intelligence reports and previous shift logs
- Conduct research and document events of interest within the scope of IT Security
- Hands-on experience in a Security Operations Centre
- Alternatively, consulting, or advisory experience in Security Operations
- Monitor and analyse Intrusion Detection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, Security Incident and Event Management (SIEM) toolset and other event logs to identify security attacks and threats for remediation/suppression.
- Validate IOCs that triggered the original alert.
- Research additional internal and external data sources for additional enrichment of event information
- Determine when an event has reached the threshold of an incident and engage Incident Response Handler to declare an incident.
- Create filters, data monitors, dashboards, and reports within monitoring utilities.
- Troubleshoot security monitoring devices to improve event correlation and performance.
- Handle high and critical severity incidents as described in the operations playbook.
- Operational level experience in some of these domains (not all): security engineering, alert triaging, rule writing, incident response, DFIR, threat intelligence and management, vulnerability management, and security control testing
- In-depth knowledge of at least one SIEM platform or security data lake and related processes
- Knowledge of various security tools, their functions, and comparisons
- Knowledge of network and cloud security fundamentals
- Ability to explain complex technical concepts in business terms.
- Extensive experience in report writing and presentation.
- Strong, adaptable, and flexible work ethic
- Good time management skills
- Ability to work under pressure and priorities activities.
Required skills:
- 5+ years of technical experience in Information Security
- Bachelor's degree in information security, Computer Science, Engineering, Technology, or a similar degree
- Good communication skills and the ability to drive & lead client calls
- Knowledge of security best practices and concepts
- Organized, responsive, and thorough problem-solving and analytical skills.
- Strong communication, interpersonal and presentation skills
- Keen cyber threat-landscape interest and awareness
- Previous experience in cyber project management
- Part of a large transformation and implementation project
- Candidate must have hands-on experience in Microsoft Sentinel as a Primary tool.
- Candidate must have hands-on experience in EDR tools like Microsoft Defender, Crowd Strike, Carbon Black, Forcepoint etc., as a Secondary tool
- Candidate must have hands-on experience & exposure to Incident Response processes, also exposure to SOAR tools.
- Candidate must have hands-on experience of log analysis, also must have fundamental knowledge in IDS/IPS and Firewalls (Cisco, FortiGate, Sourcefire, Palo Alto etc.)
- Familiar with TCP/IP protocol, OSI Seven Layer Model, LAN/WAN terminologies
- Knowledge of Windows, Unix-based systems, architectures, and network security devices
- Must have a solid understanding of information technology, information security domains.
- Personal drive, positive work ethic to deliver results within tight deadlines and in demanding situations.
- Familiar with ticketing tool / ITSM tool like ServiceNow, Jira etc.,
- Good to have - at least one of the following certifications – Security+, C|EH, Network+, CISSP, CISM, CCSP, GIAC certifications or an equivalent security certification.
Function: MDR Response Team
Position: Level 2 Consultant
Location: Bangalore
The primary role of a Security Analyst (L2) is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures. Specifically, these analysts will be responsible for monitoring the SIEM tools for security events and closing or escalating those events as necessary. Security Analysts maintain the group email address and distribution lists, answer the main phone lines, and update all relevant documentation such as shift logs and tickets. Additionally, assist the MDR Analyst in an incident workflow and assist the MDR team in incident detection, remediation and communicate with external teams in proper incident resolution. We are currently seeking a Senior Security Associate for our KPMG Managed Services (Spectrum) practice to join us in our Bangalore office.
Note: Candidate must be willing to Work from Office only (Bangalore Location) & willing to do 24x7 rotational shift (Mandatory requirement for this role)
- You will be working as a consultant in KPMG's expanding Security Operations practice.
- As a Security Operations consultant, you will help our clients in solving some of the key challenges faced by security operations leaders.
- The work would involve advising our clients on Security Operations Strategy, Design, Maturity Assessment, and Optimization.
- Be able to drive client calls & discussions on day-to-day basis and/or address operational issues
- You will get a chance to learn new skills, certifications, and work with some of our key alliance partners, including some of the largest security vendors in the industry.
- You will be working in a dynamic environment and engage with leading companies around the world.
- Rapidly identify, categorize, prioritize and investigate events as the initial cyber event detection group for the enterprise using all available security logs and intelligence sources to include but not limited to:
- Firewalls
- Systems and Network Devices
- Web Proxies
- Intrusion Detection/Prevention Systems
- Data Loss Prevention
- EDR / Antivirus Systems
- Knowledgebase Framework (Confluence)
- Continuously monitor SIEM and logging environments for security events and alerts to threats, intrusions, and/or compromises, including:
- SIEM alert queue
- Security email inbox
- Intel feeds via email and other sources (e.g. NH-ISAC)
- Incident Ticketing queue (IT Security group)
Roles & Responsibilities:
- Validate alerts as they come in to eliminate false positives and use other internal and external data sources to enrich alerts with additional context
- Performing triage of service requests from customers and internal teams
- Use playbook procedures to carry out standard plays for routine event types and escalate alerts to Level 2 Analysts for further triage and remediation
- Assist with containment of threats and remediation of environment during or after an incident
- Act as a participant during Threat Hunting activities at the direction of one or more Incident Response Handlers
- Document event analysis and write comprehensive reports of incident investigations
- Proactively improve security-related operational processes and procedures
- Use available security tools for historical analysis purposes as necessary for detected events; for example, historical searches using SIEM tools
- Maintain operational shift logs with relevant activity from the Analyst's shift. Document investigation results, ensuring relevant details are passed to Level 2 or MDR Analysts for final event analysis
- Update/reference knowledgebase tool (e.g. Confluence) as necessary for changes to processes and procedures, and ingestion of daily intelligence reports and previous shift logs
- Conduct research and document events of interest within the scope of IT Security
- Hands-on experience in a Security Operations Centre
- Alternatively, consulting, or advisory experience in Security Operations
- Monitor and analyse Intrusion Detection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, Security Incident and Event Management (SIEM) toolset and other event logs to identify security attacks and threats for remediation/suppression.
- Validate IOCs that triggered the original alert.
- Research additional internal and external data sources for additional enrichment of event information
- Determine when an event has reached the threshold of an incident and engage Incident Response Handler to declare an incident.
- Create filters, data monitors, dashboards, and reports within monitoring utilities.
- Troubleshoot security monitoring devices to improve event correlation and performance.
- Handle high and critical severity incidents as described in the operations playbook.
- Operational level experience in some of these domains (not all): security engineering, alert triaging, rule writing, incident response, DFIR, threat intelligence and management, vulnerability management, and security control testing
- In-depth knowledge of at least one SIEM platform or security data lake and related processes
- Knowledge of various security tools, their functions, and comparisons
- Knowledge of network and cloud security fundamentals
- Ability to explain complex technical concepts in business terms.
- Extensive experience in report writing and presentation.
- Strong, adaptable, and flexible work ethic
- Good time management skills
- Ability to work under pressure and priorities activities.
Required skills:
- 5+ years of technical experience in Information Security
- Bachelor's degree in information security, Computer Science, Engineering, Technology, or a similar degree
- Good communication skills and the ability to drive & lead client calls
- Knowledge of security best practices and concepts
- Organized, responsive, and thorough problem-solving and analytical skills.
- Strong communication, interpersonal and presentation skills
- Keen cyber threat-landscape interest and awareness
- Previous experience in cyber project management
- Part of a large transformation and implementation project
- Candidate must have hands-on experience in Microsoft Sentinel as a Primary tool.
- Candidate must have hands-on experience in EDR tools like Microsoft Defender, Crowd Strike, Carbon Black, Forcepoint etc., as a Secondary tool
- Candidate must have hands-on experience & exposure to Incident Response processes, also exposure to SOAR tools.
- Candidate must have hands-on experience of log analysis, also must have fundamental knowledge in IDS/IPS and Firewalls (Cisco, FortiGate, Sourcefire, Palo Alto etc.)
- Familiar with TCP/IP protocol, OSI Seven Layer Model, LAN/WAN terminologies
- Knowledge of Windows, Unix-based systems, architectures, and network security devices
- Must have a solid understanding of information technology, information security domains.
- Personal drive, positive work ethic to deliver results within tight deadlines and in demanding situations.
- Familiar with ticketing tool / ITSM tool like ServiceNow, Jira etc.,
- Good to have - at least one of the following certifications – Security+, C|EH, Network+, CISSP, CISM, CCSP, GIAC certifications or an equivalent security certification.
Function: MDR Response Team
Position: Level 2 Consultant
Location: Bangalore
The primary role of a Security Analyst (L2) is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures. Specifically, these analysts will be responsible for monitoring the SIEM tools for security events and closing or escalating those events as necessary. Security Analysts maintain the group email address and distribution lists, answer the main phone lines, and update all relevant documentation such as shift logs and tickets. Additionally, assist the MDR Analyst in an incident workflow and assist the MDR team in incident detection, remediation and communicate with external teams in proper incident resolution. We are currently seeking a Senior Security Associate for our KPMG Managed Services (Spectrum) practice to join us in our Bangalore office.
Note: Candidate must be willing to Work from Office only (Bangalore Location) & willing to do 24x7 rotational shift (Mandatory requirement for this role)
- You will be working as a consultant in KPMG's expanding Security Operations practice.
- As a Security Operations consultant, you will help our clients in solving some of the key challenges faced by security operations leaders.
- The work would involve advising our clients on Security Operations Strategy, Design, Maturity Assessment, and Optimization.
- Be able to drive client calls & discussions on day-to-day basis and/or address operational issues
- You will get a chance to learn new skills, certifications, and work with some of our key alliance partners, including some of the largest security vendors in the industry.
- You will be working in a dynamic environment and engage with leading companies around the world.
- Rapidly identify, categorize, prioritize and investigate events as the initial cyber event detection group for the enterprise using all available security logs and intelligence sources to include but not limited to:
- Firewalls
- Systems and Network Devices
- Web Proxies
- Intrusion Detection/Prevention Systems
- Data Loss Prevention
- EDR / Antivirus Systems
- Knowledgebase Framework (Confluence)
- Continuously monitor SIEM and logging environments for security events and alerts to threats, intrusions, and/or compromises, including:
- SIEM alert queue
- Security email inbox
- Intel feeds via email and other sources (e.g. NH-ISAC)
- Incident Ticketing queue (IT Security group)
Roles & Responsibilities:
- Validate alerts as they come in to eliminate false positives and use other internal and external data sources to enrich alerts with additional context
- Performing triage of service requests from customers and internal teams
- Use playbook procedures to carry out standard plays for routine event types and escalate alerts to Level 2 Analysts for further triage and remediation
- Assist with containment of threats and remediation of environment during or after an incident
- Act as a participant during Threat Hunting activities at the direction of one or more Incident Response Handlers
- Document event analysis and write comprehensive reports of incident investigations
- Proactively improve security-related operational processes and procedures
- Use available security tools for historical analysis purposes as necessary for detected events; for example, historical searches using SIEM tools
- Maintain operational shift logs with relevant activity from the Analyst's shift. Document investigation results, ensuring relevant details are passed to Level 2 or MDR Analysts for final event analysis
- Update/reference knowledgebase tool (e.g. Confluence) as necessary for changes to processes and procedures, and ingestion of daily intelligence reports and previous shift logs
- Conduct research and document events of interest within the scope of IT Security
- Hands-on experience in a Security Operations Centre
- Alternatively, consulting, or advisory experience in Security Operations
- Monitor and analyse Intrusion Detection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, Security Incident and Event Management (SIEM) toolset and other event logs to identify security attacks and threats for remediation/suppression.
- Validate IOCs that triggered the original alert.
- Research additional internal and external data sources for additional enrichment of event information
- Determine when an event has reached the threshold of an incident and engage Incident Response Handler to declare an incident.
- Create filters, data monitors, dashboards, and reports within monitoring utilities.
- Troubleshoot security monitoring devices to improve event correlation and performance.
- Handle high and critical severity incidents as described in the operations playbook.
- Operational level experience in some of these domains (not all): security engineering, alert triaging, rule writing, incident response, DFIR, threat intelligence and management, vulnerability management, and security control testing
- In-depth knowledge of at least one SIEM platform or security data lake and related processes
- Knowledge of various security tools, their functions, and comparisons
- Knowledge of network and cloud security fundamentals
- Ability to explain complex technical concepts in business terms.
- Extensive experience in report writing and presentation.
- Strong, adaptable, and flexible work ethic
- Good time management skills
- Ability to work under pressure and priorities activities.
Required skills:
- 5+ years of technical experience in Information Security
- Bachelor's degree in information security, Computer Science, Engineering, Technology, or a similar degree
- Good communication skills and the ability to drive & lead client calls
- Knowledge of security best practices and concepts
- Organized, responsive, and thorough problem-solving and analytical skills.
- Strong communication, interpersonal and presentation skills
- Keen cyber threat-landscape interest and awareness
- Previous experience in cyber project management
- Part of a large transformation and implementation project
- Candidate must have hands-on experience in Microsoft Sentinel as a Primary tool.
- Candidate must have hands-on experience in EDR tools like Microsoft Defender, Crowd Strike, Carbon Black, Forcepoint etc., as a Secondary tool
- Candidate must have hands-on experience & exposure to Incident Response processes, also exposure to SOAR tools.
- Candidate must have hands-on experience of log analysis, also must have fundamental knowledge in IDS/IPS and Firewalls (Cisco, FortiGate, Sourcefire, Palo Alto etc.)
- Familiar with TCP/IP protocol, OSI Seven Layer Model, LAN/WAN terminologies
- Knowledge of Windows, Unix-based systems, architectures, and network security devices
- Must have a solid understanding of information technology, information security domains.
- Personal drive, positive work ethic to deliver results within tight deadlines and in demanding situations.
- Familiar with ticketing tool / ITSM tool like ServiceNow, Jira etc.,
- Good to have - at least one of the following certifications – Security+, C|EH, Network+, CISSP, CISM, CCSP, GIAC certifications or an equivalent security certification.
-
Cyber_KDNI-MDR - Associate Consultant
4 days ago
Bengaluru, Karnataka, India BSR & Co Full time ₹ 80,00,000 - ₹ 1,20,00,000 per yearDescriptionFunction: MDR Response TeamPosition: Associate ConsultantLocation: BangaloreRoles and ResponsibilitiesThe primary role of a Security Analyst (L2) is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures. Specifically, these analysts will be responsible for monitoring the SIEM tools...
-
Cyber_MS_MDR - Consultant
1 day ago
Bengaluru, Karnataka, India BSR & Co Full time ₹ 15,00,000 - ₹ 30,00,000 per yearDescriptionMDR Senior DeveloperRoles and Responsibilities:The Engineering Lead will be focusing primarily on end-to-end execution of an MDR project from planning, client onboarding, delivery to steady state. He/She will lead multiple teams of Microsoft Sentinel Developers in delivery of SIEM and SOAR use cases, Logic apps playbooks, workbooks, PowerBI...
-
Cyber_MS_MDR - Consultant
1 day ago
Bengaluru, Karnataka, India BSR & Co Full time ₹ 12,00,000 - ₹ 24,00,000 per yearDescriptionFunction: KGS Response TeamPosition: Level 2 ConsultantLocation: BangaloreThe primary role of a Security Analyst (L2) is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures. Specifically, these analysts will be responsible for monitoring the SIEM tools for security events and...
-
Bengaluru, Karnataka, India BSR & Co Full time ₹ 1,00,00,000 - ₹ 2,00,00,000 per yearDescriptionFunction: KGS Response TeamPosition: Level 2 Security ConsultantLocation: BangaloreRoles and ResponsibilitiesThe primary role of the Security Analyst (L2) will be to act as an SME for the juniors in the team, mentor them and work towards continuous improvement. Specifically, these analysts will be responsible for monitoring the SIEM tools for...
-
Subject Matter Expert(Medical device)
1 week ago
Bengaluru, Karnataka, India Celegence Systems Full time ₹ 12,00,000 - ₹ 36,00,000 per yearROLE : Senior Subject Matter Expert(Medical Device)Experience : 8-12 yearsJob location: Jayanagar(Hybrid)Core Requirements1. Regulatory Expertise and Document QualityDeep knowledge of Medical Device Regulations: You must be proficient in specific medical device regulations, primarily MEDDEV 2.7/1 Revision 4 and the EU Medical Device Regulation...
-
Associate Consultant
2 weeks ago
Bengaluru, Karnataka, India HCL Technologies Full time ₹ 12,00,000 - ₹ 36,00,000 per yearJob DescriptionSOC JD - E years of experience in a multi tiered SOC/IR/MDR team Should have worked as a SOC lead Experienced with Technologies such as EDR, SIEM, SOAR, FW Deep understanding of attack trends and threat detection services Familiarity with security best practices and common emerging security threats Excellent written and oral communication...
-
Senior Consultant, SailPoint ISC
1 day ago
Bengaluru, Karnataka, India Cyderes Full time ₹ 12,00,000 - ₹ 36,00,000 per yearWe help the world Be Everyday ReadyToday's threatscape is relentless. So are we. At Cyderes, we specialize in building practical IAM, exposure management, and risk programs, and stopping active threats fast with MDR that works with your existing security tools — all augmented by AI and driven by seasoned operators. Our tireless global team is laser-focused...
-
Group Manager I
6 days ago
Bengaluru, Karnataka, India UST Full time ₹ 20,00,000 - ₹ 25,00,000 per yearYears1 OpeningBangaloreRole descriptionRole Proficiency:Should be able to manage multiple teams or domains or services by considering business strategies customer requirements compliance requirements laws and regulations etc. with guidance from directors.Outcomes:Routine management of the Information Security and other compliance framework and...
-
Associate Consultant
5 days ago
Bengaluru, Karnataka, India HCL Technologies Full time ₹ 5,00,000 - ₹ 15,00,000 per yearJob DescriptionSOC JD - E years of experience in a multi tiered SOC/IR/MDR team Should have worked as a SOC lead Experienced with Technologies such as EDR, SIEM, SOAR, FW Deep understanding of attack trends and threat detection services Familiarity with security best practices and common emerging security threats Excellent written and oral communication...
-
Cyber_MS_MDR_TH - Consultant
1 day ago
Bengaluru, Karnataka, India BSR & Co Full time ₹ 12,00,000 - ₹ 36,00,000 per yearDescriptionFunction: KGS Response TeamPosition: Threat HunterLocation: Bangalore/PuneQualificationBachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field. Certification in any SIEM or Threat Intelligence tools would be an added advantage.Roles and responsibilitiesThe primary role of a Threat Hunter is to...