Roles and Responsibilities Must have Skills: We need SIEM Rule Developer candidate Regex development with Kusto or SQL knowledge, including query optimisation Experience with rule development in at least 2 SIEM platforms (ArcSight, Sentinel, Splunk,
Skills :
Job Description : Job Description: Must have Skills: We need SIEM Rule Developer candidate • Regex development with Kusto or SQL knowledge, including query optimisation • Experience with rule development in at least 2 SIEM platforms (ArcSight, Sent
Job Description : • Experience and talent in data visualization • Experience creating Dashboards and Analytics within SEIM (Security Information and Event Management) Tool. • Experience creating workflows for Incident Response within a SEIM (Securit
Skills :
Hello Folks, Greetings !!! This is with reference to your profile posted in Naukri.com, Currently we have immediate opening matching your profile with Innova Solutions (www.innovasolutions.com) Interested candidates please mail across your updated
Hello Folks, Greetings !!! This is with reference to your profile posted in Naukri.com, Currently we have immediate opening matching your profile with Innova Solutions (www.innovasolutions.com) Interested candidates please mail across your updated
Job Description : Overview Hi Team, Please start working on below demands. Client Name : Capgemini Mode of hiring : C2H We can candidates from PAN INDIA Need 2 profiles on each demand and please share me in below tracker only. Sr No Date Process s
Skills :
Job Description : Introduction Information and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analyzing business requirements to design and impl
Job Description : Job Title: Implementor - PAM Flipkart is looking for a person to implement and support the PAM tool across the group of companies. The person will be responsible for the maintenance and integration of the PIM/PAM security service t
Skills :
Job Description : About the role: Security Analyst - 2 will cover the incident response and forensic investigation aspects of cybersecurity in Flipkart. The Security Analyst - 2 should be with 5 years of experience and have a minimum of 2.5 years in
Skills :
Job Description : Introduction At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to atte
Job Description : Introduction At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to atte
Skills :
Job Description : Introduction At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to atte
Line of ServiceAdvisory Industry/SectorNot Applicable SpecialismCybersecurity & Privacy Management LevelAssociate Job Description & SummaryA career in our Advisory Acceleration Centre is the natural extension of PwC’s leading class global delivery ca
Skills :
Job Description : Introduction At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to atte
Line of ServiceAdvisory Industry/SectorNot Applicable SpecialismCybersecurity & Privacy Management LevelAssociate Job Description & SummaryA career in our Advisory Acceleration Centre is the natural extension of PwC’s leading class global delivery ca
Skills :
Job Description : Introduction At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to atte
Job Description : * Ability to drive complex deployments of SIEM solutions handling new Integrations. * Expert on SIEM architecture design, implementation and optimization * Expert on Log source management. * Hands on experience Validatin
Job Description : Introduction At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to atte
Job Description : Introduction At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to atte
Job Description : * Experience in SOC monitoring, working knowledge in QRadar (preferable) or other SIEM tools like LogRhythm, ArcSight, Splunk, McAfee Nitro, and AlienVault USM Anywhere. * 24x7 Active monitoring of Security events using SIEM (
Skills :
Job Description About Accenture: Accenture is a leading global professional services company, providing a broad range of services in strategy and consulting, interactive, technology and operations, with digital capabilities across all of these servi
Skills :
Job Description : Job Description: Application security J5- Engineering 8 to 12 years Solutioning, Architecture, Engineering & Design Cyber security domain Cloud security Manage security services- MSS Azure security AWS security * Cyber-Sec
Skills :
Job Description : Roles & Responsibilities Operating System a. OS disk management and connectivity to the server with opened ports b. Establishing a connection and creating a session/logins. c. Configure database Client tools. d. Perform simple conne
Job Description About Accenture: Accenture is a leading global professional services company, providing a broad range of services in strategy and consulting, interactive, technology and operations, with digital capabilities across all of these servi
Skills :
Job Description : Roles & Responsibilities Operating System a. OS disk management and connectivity to the server with opened ports b. Establishing a connection and creating a session/logins. c. Configure database Client tools. d. Perform simple conne