SOC Architect - Information Security
Pune, Maharashtra
Applications have closed
Icertis
Icertis is the global leader in AI-powered contract intelligence. The Icertis platform revolutionizes contract lifecycle management, equipping customers with powerful AI automation and insights to grow revenue, control costs, mitigate risk, and...
With unmatched technology and category-defining innovation, Icertis pushes the boundaries of what’s possible with contract lifecycle management (CLM). The AI-powered, analyst-validated Icertis Contract Intelligence (ICI) platform turns contracts from static documents into strategic advantage by structuring and connecting the critical contract information that defines how an organization runs. Today, the world’s most iconic brands and disruptive innovators trust Icertis to fully realize the intent of their combined 10 million contracts worth more than $1 trillion, in 40+ languages and 93 countries.
Who we are: Icertis is the only contract intelligence platform companies trust to keep them out in front, now and in the future. Our unwavering commitment to contract intelligence is grounded in our FORTE values—Fairness, Openness, Respect, Teamwork and Execution—which guide all our interactions with employees, customers, partners and stakeholders. Because in our mission to be the contract intelligence platform of the world, we believe how we get there is as important as the destination
Icertis is not open to third party solicitation or resumes for our posted FTE positions. Resumes received from third party agencies that are unsolicited will be considered complimentary.
Who we are: Icertis is the only contract intelligence platform companies trust to keep them out in front, now and in the future. Our unwavering commitment to contract intelligence is grounded in our FORTE values—Fairness, Openness, Respect, Teamwork and Execution—which guide all our interactions with employees, customers, partners and stakeholders. Because in our mission to be the contract intelligence platform of the world, we believe how we get there is as important as the destination
Responsibilities:
- Responsible for design, architecture and maintenance of an Azure Sentinel in a highly dynamic Product engineering environment for IT and Cloud systems
- Log source integration expertise: Demonstrated understanding of ingestion load, SIEM policies, diverse log sources (not limited to network devices, servers, applications, cloud platforms, etc.)
- Policy design and implementation: Tailored and robust policies that can be scrutinized against frameworks such as MITRE, with a continuous view on MTTx (mean time to respond/ resolve).
- Recognize the role of Defender – in this environment where first line of defense is almost always a Defender (for cloud apps, EDR, etc.) and appreciate the role of a SIEM as a means to correlation, subsequently.
- Understanding of Microsoft Secure Score card for continuous review, security posture assessment and improvement.
- CSIRT Operations Management – Proficient in managing an Incident lifecycle to effectively detect, respond and mitigate cybersecurity incidents including Response Planning, RCA (root cause analysis) and Execution
Skills:
- Strong familiarity with cloud capabilities and products and services for Azure, and demonstrated expertise across one or more of leading SIEM products in the market (could be Sentinel, Q-Radar, Splunk, etc.)
- A deep understanding of networking, e.g. IP subnetting, Network Security Groups, routing, Azure Firewall, ExpressRoute, load balancer, DNS.
- A deep understanding of configuring SIEM policies, architecture to correlate logs and events across the variety of data sources mentioned above.
- Strong familiarity with cloud native tools in Azure, e.g. Azure Monitor, Log Analytics, Azure Security Center.
- Ability to interact with a broad cross-section of personnel to explain and enforce security measures.
- Knowledge of scripting languages like PowerShell and Python for automation.
- Threat hunting – experience, exposure to the concept and custom handling of threat hunting scenarios.
- Compliance driven dashboards – an ability to configure and dashboard security posture for some of the leading Compliance standards impacting Information Security (such as NIST)
- Custom visualization expertise – in creating tailored dashboards, views.
- Python programming – for security analytics, threat hunting, exposure to ML models relevant for custom rules.
- Vulnerability management – good to have grounded skills on one or more dependent areas (such as networks, applications, cloud platforms) to be able to articulate vulnerability remediation procedures and integration with SIEM
- Working with the Business to effectively communicate the risks of identified vulnerabilities and make recommendations regarding the selection of cost-effective security controls to mitigate identified risks.
Icertis is not open to third party solicitation or resumes for our posted FTE positions. Resumes received from third party agencies that are unsolicited will be considered complimentary.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
8
1
0
Category:
Architecture Jobs
Tags: Analytics Automation Azure Cloud Compliance CSIRT DNS EDR Firewalls Network security NIST PowerShell Privacy Python Scripting Sentinel SIEM SOC Splunk Vulnerabilities Vulnerability management
Perks/benefits: Team events
Region:
Asia/Pacific
Country:
India
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Information Security Officer jobsSenior Cybersecurity Engineer jobsInformation System Security Officer jobsSenior Cloud Security Engineer jobsInformation Security Manager jobsInformation Security Specialist jobsCyber Security Specialist jobsSecurity Consultant jobsSenior Network Security Engineer jobsIT Security Engineer jobsSystems Engineer jobsSecurity Specialist jobsSenior Information Security Analyst jobsIT Security Analyst jobsSenior Cyber Security Engineer jobsChief Information Security Officer jobsSystems Administrator jobsSenior Penetration Tester jobsInformation System Security Officer (ISSO) jobsStaff Security Engineer jobsThreat Intelligence Analyst jobsSenior Product Security Engineer jobsInformation Systems Security Engineer jobsSecurity Operations Analyst jobsCloud Security Architect jobs
Encryption jobsForensics jobsJava jobsTop Secret jobsEDR jobsRMF jobsSaaS jobsGDPR jobsIDS jobsSplunk jobsDoDD 8570 jobsIPS jobsSQL jobsSDLC jobsIntrusion detection jobsBash jobsActive Directory jobsThreat detection jobsCompTIA jobsITIL jobsDocker jobsGIAC jobsFinance jobsCRISC jobsOWASP jobs
SANS jobsUNIX jobsIndustrial jobsTerraform jobsTCP/IP jobsClearance Required jobsHIPAA jobsJavaScript jobsOSCP jobsIT infrastructure jobsCCSP jobsBanking jobsSOC 2 jobsVPN jobsDNS jobsCISO jobsPolygraph jobsData Analytics jobsSOX jobsSAP jobsNIST 800-53 jobsJira jobsGCIH jobsMITRE ATT&CK jobsGSEC jobs