Job Summary
Experience:
4.00 - 7.00 Years
Industrial Type:
IT-Software/Software Services
Location:
Bangalore
Functional Area:
IT Software - Other
Designation:
Vulnerability Management - 30031472 (Con) - BLR
Key Skills:
Vulnerability Management
Educational Level:
Graduate/Bachelors
Job Post Date:
2025-08-20 18:44:50
Stream of Study:
Degree:
BE-Comp/IT, BE-Other, BTech-Comp/IT, BTech-Other, MBA, MCA
Company Description
Our Client in India is one of the leading providers of risk, financial services and business advisory, internal audit, corporate governance, and tax and regulatory services.
Our Client was established in India in September 1993, and has rapidly built a significant competitive presence in the country. The firm operates from its offices in Mumbai, Pune, Delhi, Kolkata, Chennai, Bangalore, Hyderabad , Kochi, Chandigarh and Ahmedabad, and offers its clients a full range of services, including financial and business advisory, tax and regulatory.
Our client has their client base of over 2700 companies. Their global approach to service delivery helps provide value-added services to clients. The firm serves leading information technology companies and has a strong presence in the financial services sector in India while serving a number of market leaders in other industry segments.
Job Description
Key Responsibilities:
•???Apply a fundamental understanding of cyber security operations and monitoring to perform the day-to-day operational responsibility of security monitoring and incident response activities, associated with operations that provide up to 24x7 coverage. Implement efficiencies and improvements.
•Response activities may include incident response, incident management, driving remediation or threat mitigation, threat hunting, forensic analysis, etc. Other security operations activities may include identification of weakness (e.g. vulnerabilities / insecure configurations), reviewing/assessing security configuration change requests, driving the coverage of the security monitoring services, etc.
•Stay abreast of the latest information security controls, practices, techniques and capabilities in the marketplace. Participate in internal skills development activities for information security personnel on the topic of security monitoring and incident response, by providing knowledge sharing sessions.
•Develop and keep effective working relationships with multiple internal technology groups. Collaborate across multiple internal federated technology groups. Become a go-to subject matter professional to others within the firm to achieve the required goals and objectives.
•Leverage intelligence, monitor for threats and vulnerabilities and respond accordingly, including the development of risk mitigating approaches. As a continuous feedback loop, incorporate learnings into additional preventive and detective controls.
•Define or implement security configuration for monitoring tools, including alerts, correlation rules, and reporting. Leverage a combination of vendor products and services, open source and custom developed utilities.
•Implement or leverage automation and orchestration to improve efficiency and effectiveness of security monitoring and response processes. · Document processes and procedures in the form of playbooks and reference guides.
•Integrate processes and technologies, with the objective of a "single pane of glass" for monitoring and comprehensive security response process.
•Provide input into business cases and presentations to leadership of proposed security products and studies. Produce operating metrics and key performance indicators.
•Active project team member or self-manage small projects, which may include facilitating team meetings; publishing meeting notes and action items; updating project documents and systems; and ensuring timely completion of assigned action items
Qualifications:
•Bachelor’s degree or equivalent work experience with 4-7 years of experience in Cyber security operations, such as data loss prevention, data discovery and classification, threat detection engineering, threat analysis, threat hunting, incident response, vulnerability, and configuration monitoring with the goal of attack surface reduction.?
•Experience in security monitoring, security operations, and incident response activities; preferably within a professional services firm or similar environment.
•Experience creating playbooks and procedures.
•Experience tuning security monitoring rules, monitoring events, assessing risk, responding to incidents.
•Hands on network or system administration skills or experience with SIEM and security infrastructure
•Experience with scripting or automation.
•Excellent verbal/written communication, collaboration, analytical and presentation skills to lead an environment driven by customer service and teamwork. Experience leading meetings and operating effectively in a matrixed environment.
•Relevant certifications include CISSP, CCSP, CCSK, GSEC, GCIH, GCFE, GCFA, SC-200, CEH, and AZ-900
