Current jobs related to Urgent Opening For Incident Response - Delhi NCR - Clarity Consulting


  • NCR, India Clarity Consulting Full time

    Key Responsibilities Advanced Log Monitoring and Analysis:- Conduct deeper analysis of security events and alerts generated by Splunk, ELK SIEM & EDR,correlating data across various sources to identify potential security threats.- Perform advanced triage, classification, and root cause analysis of escalated security incidents.- Utilize the Splunk, ELK SIEM &...


  • Delhi, India AiiR Response Full time

    Company DescriptionAiiR is the first AI-driven breach response and extortion management platform that automates negotiations, investigations, and recovery, reducing incident costs and response times. At the core of AiiR is CEIRA, an AI-powered virtual breach response analyst that streamlines ransom negotiations, tracks cryptocurrency payments, conducts...


  • Delhi, India AiiR Response Full time

    Company DescriptionAiiR Response Inc. is the first AI-driven breach response and extortion management platform, designed to automate negotiations, investigations, and recovery. Our platform, powered by our virtual analyst CEIRA, streamlines ransom negotiations, tracks cryptocurrency payments, conducts forensic investigations, and automates breach...

  • Incident response

    4 days ago


    DoubleTree by Hilton Hotel Gurgaon - New Delhi NCR, India Deloitte Consulting Full time

    Role & responsibilities Overall experience of at least 5+ years in SIEM monitoring and Cyber security Incident response and Management. Core Incident Response Knowledge: Deep understanding of the incident response lifecycle, cyber kill chain, and MITRE ATT&CK framework. Operating Systems: Expertise in Windows, Active Directory, DNS, and Linux platforms. SIEM...


  • Delhi, India AiiR Response Full time

    Company DescriptionAiiR Response Inc. provides the first AI-driven breach response and extortion management platform that automates negotiations, investigations, and recovery. AiiR's core is CEIRA, an AI-powered virtual breach response analyst that streamlines ransom negotiations, tracks cryptocurrency payments, conducts forensic investigations, and...


  • Delhi, India AiiR Response Full time

    Location:RemoteExperience:0–2 yearsType:Full-timeAIIR is anAI-driven incident response platformdesigned to help organizations detect, respond to, and manage security breaches effectively. We’re building cutting-edge systems combiningmicroservices architecture ,AI orchestration , andbest-in-class engineering practices , and we’re looking for aJunior...


  • Hyderabad / Secunderabad, Telangana, Delhi, India beBeeResponse Full time ₹ 45,000 - ₹ 55,000

    Job SummaryWe are seeking a highly skilled Incident Response Specialist to join our team. The successful candidate will be responsible for detecting, analyzing, and responding to security incidents in a timely and effective manner.Key Responsibilities:Monitor and analyze security alerts and events from multiple sources, including SIEM systems, intrusion...


  • Delhi, India T A Solution Full time

    Urgent opening for Nurse in Delhi location Posted on -August 12, 2016 **Designation**: Nurse **Experience**: 1-2years **Salary**: upto 8k - 11k PM **Qualification**: GNM Job Reponsibilites


  • Delhi, Delhi, India T A Solution Full time

    Urgent Opening for Sales Executive in Delhi Location Posted on -April 8, 2016 Urgent Opening for Sales Executive in Delhi Location **Designation**: Sales Executive / Sr. Sales Executive Experience - 2 to 8 Years **Company**: Home Decoration Job Location - Delhi Salary - 25k to 35k PM Demonstrating the utmost importance to customer service by...


  • Delhi, India AiiR Response Full time

    Company DescriptionAiiR Response Inc. is an AI-driven platform specializing in breach response and extortion management to automate negotiations, investigations, and recovery. At the core of our operations is CEIRA, an AI-powered virtual analyst for ransom negotiations, cryptocurrency

Urgent Opening For Incident Response

2 weeks ago


Delhi NCR, India Clarity Consulting Full time US$ 90,000 - US$ 1,20,000 per year

Key Responsibilities

Advanced Log Monitoring and Analysis:

- Conduct deeper analysis of security events and alerts generated by Splunk, ELK SIEM & EDR,

correlating data across various sources to identify potential security threats.

- Perform advanced triage, classification, and root cause analysis of escalated security incidents.

- Utilize the Splunk, ELK SIEM & EDR platform to investigate complex security events, identifying

patterns and relationships in logs to identify potential malicious activities.

Incident Escalation and Resolution:

- Escalate high-priority and complex security incidents and work closely with the Level 2 team to

get expertise and guidance.

- Engage with incident response teams to perform deeper forensic analysis and assist with the

containment, mitigation, and recovery phases of security incidents.

- Document and communicate incident findings, ensuring a clear and concise record of the

investigation and resolution process.

Collaboration and Knowledge Sharing:

- Collaborate with the L1 peer team, senior engineers, and other stakeholders in the security

operations lifecycle to ensure smooth and effective incident handling.

- Participate in security operations meetings, helping to continuously refine and improve processes.

Reporting and Compliance:

- Assist in generating reports for security incident analysis, compliance audits, and management

reviews.

- Support internal and external audits, providing data, logs, and documentation as needed.

- Help track security metrics and performance indicators to support security operations reporting.

Continuous Improvement and Research:

- Stay updated on the latest trends in cybersecurity threats, vulnerabilities, and defense

mechanisms to enhance the teams capabilities.

- Suggest improvements to the security monitoring processes and help implement new detection

technologies and methodologies.

Desired qualifications


• Bachelor's degree in computer science, Cybersecurity, or related field, or equivalent

experience.

• Minimum of 2-4 years of experience in cybersecurity, IT security operations, or incident

response.

• Prior experience in a Security Operations Center (SOC) or handling security incidents in an

enterprise environment.

• Experience with security monitoring, SIEM platform tuning, and threat detection engineering.

Technical Skills:

  • Advanced proficiency with Splunk, Azure Sentinel, ELK SIEM & EDR platforms (experience with

    other SIEM platforms like Azure Sentinel is a plus).
  • In-depth understanding of network protocols (TCP/IP, DNS, HTTP, etc.), security devices

    (firewalls, IDS/IPS, etc.), and endpoint security technologies (EDR, antivirus, etc.).
  • Hands-on experience with log analysis, data correlation, and incident investigation.
  • Familiarity with threat intelligence tools, data sources, and feeds.
  • Strong understanding of security frameworks, including MITRE ATT&CK, NIST, and OWASP.