Job Description

Stimulating. Motivating. Challenging.

Leveraging its long-standing expertise in securing digital content as well as fighting piracy, Kudelski Security, a division of the Kudelski Group, is a provider of cybersecurity solutions and services focused on protecting data, processes and systems for companies and organizations around the world, safeguarding their assets at a time of increasingly remote communications.


Location:
Bangalore, India

Mission

Responsibilities

  • Threat Monitoring Be the main point of contact of the Cyber Fusion Center at the client’s side Support standard Cyber Fusion Center activities (Threat Monitoring, Security Device management, Endpoint Detection and Response, Vulnerability scanning services) Investigate/Remediate incident escalated by the Cyber Fusion Center or Client’s internal units Write specific incident response playbooks for the Client Define, test, deploy or perform specific use cases and correlation rule, threat hunting activities and threat intelligence activities for the client Support large scale incident response activities
  • Service improvement Perform rules tuning of client SIEM in operation Support rules factory program in improving the global set of detection Qualify, analyze, and provide recommendations for new standard data source requests Support Product teams to build best new services to fit with Operations capabilities Contribute to client’s security projects Implement new tools or scripts to increase security operations’ efficiency
  • General responsibilities Take responsibility for customer satisfaction and overall success of managed services. Recommend improvements for Standard Operating Procedures Propose enhancement on tools and workflow Document actions in tickets to effectively communicate information internally and to customers. Adhere to policies, procedures, and security best practices.
  • Requirements / Profile

  • Minimum 3 years’ experience in information security, particularly in cyber operations
  • Excellent client service skills
  • Knowledge of incident response processes (detection, triage, incident analysis, remediation and reporting)
  • Experience with two or more of the following technologies: EDR/NGAV (MS Defender, CS), SIEM (Sentinel, Splunk), Falcon Nextgen SIEM, Google SecOps, Vulnerability Scanning, Managed Attacker Deception, SOAR
  • Experience reviewing and analyzing log data, network packets captures
  • Strong knowledge of Windows/Linux OS, network protocols, scripting languages
  • Good knowledge in cyber security threats and tactics
  • Good knowledge in Cloud and OT/ICS technologies
  • An in-depth understanding of information security industry forces and trends
  • An excellent knowledge of the security landscape and different security visibility solutions (SIEM based visibility vs EDR).
  • Reference: 15688
    Publication Date: 23-01-2026

    Apply for this Position

    Ready to join ? Click the button below to submit your application.

    Submit Application