MSP SPOC
Ujwala Singh
Date of Position Open
28-Aug-25
Date Of Intake Call
3-Sep-25
Type Of Demand - Confirmed / Proposal
Confirmed
PWC Partner
Sabitabrata Banerjee
Hiring Manager
Ashutosh Raj
No. Of Resources Needed
1
Location
Bangalore
WFO / WFH / Hybrid
Hybrid
Shift Timing
Regular Shift
Primary Skill(s)
Oracle FDI FAW
Experience
5 to 8 Yrs
Budget
Budget in below table
Duration Of Project
1 Yr
LOS
Advisory
BU
One Consulting
SBU
Enterprise Apps Oracle
Designation
SA
Interview
3
Responsibilities
Salary : As per industry standard.
Industry :IT-Software / Software Services
Functional Area : IT Software - Application Programming , Maintenance
Job Title: Developer
Work Location: Hyderabad, TG/Bangalore, KA
Skill Required: Digital : Amazon Web Service(AWS) Cloud Computing
Experience Range: 4-10 Years
Job Description:
AWS Datalake Administrator :
Skills Required: S3, AWS Lake Formation, SQL, AWS Data services such as Glue, Step Function, Redshift etc
• Administer and optimize AWS Data Lake infrastructure using services like S3, Lake Formation, Glue, Athena, and Redshift, ensuring secure, scalable, and efficient operations.
• Design and manage ETL workflows with AWS Glue and Step Functions, enabling seamless data ingestion, transformation, and cataloging.
• Implement access controls and data governance using Lake Formation, IAM policies, and resource tagging to ensure compliance and data security.
• Use SQL and automation scripts for data validation, performance tuning, and supporting analytics teams with curated, query-ready datasets.
Responsibilities
Job Title: Developer
Work Location: Hyderabad, TG/Bangalore, KA
Skill Required: Digital : Amazon Web Service(AWS) Cloud Computing
Experience Range: 4-10 Years
Job Description:
AWS Datalake Administrator :
Skills Required: S3, AWS Lake Formation, SQL, AWS Data services such as Glue, Step Function, Redshift etc
• Administer and optimize AWS Data Lake infrastructure using services like S3, Lake Formation, Glue, Athena, and Redshift, ensuring secure, scalable, and efficient operations.
• Design and manage ETL workflows with AWS Glue and Step Functions, enabling seamless data ingestion, transformation, and cataloging.
• Implement access controls and data governance using Lake Formation, IAM policies, and resource tagging to ensure compliance and data security.
• Use SQL and automation scripts for data validation, performance tuning, and supporting analytics teams with curated, query-ready datasets.
Salary : Rs. 70,000.0 - Rs. 1,30,000.0
Industry :IT-Software / Software Services
Functional Area : IT Software - Application Programming , Maintenance
Job Title: Analyst
Work Location: Bangalore, KA
Skill Required: SOC Incident handler L3
Experience: 6-9 years
Job Description: Minimum 5+ years of experience
• Use Case Development: Knowledge of organizational risks and threats to design relevant and effective detection rules.
• Log Sources: Understanding log formats, sources, and parsing for accurate data utilization in use cases.
• SIEM and Analytics Tools: Familiarity with platforms like Securonix, Sentinel, or Splunk to implement and monitor use cases.
• Alert Logic: Ability to define thresholds, logic, and conditions to reduce false positives and improve detection accuracy.
• Incident Response Needs: Awareness of incident response workflows to align use cases with actionable intelligence.
• Performance Metrics: Skills to create and optimize KPI/KRI reports to track detection and response performance.
• Fine-Tuning Methodology: Experience in analyzing alert data to refine use cases and adjust logic periodically. Detect and respond to company-wide security incidents, coordinating cross-functional teams to mitigate and eradicate threats.
• Incident response lead for high impact cyber security incidents
• Triage events, escalations and incidents to determine remediation and resolution actions
• Coordinate appropriate response activities across teams or directly with stakeholders to rapidly remediate potential threats
• Develop playbooks to improve processes and information sharing across teams
• Initiative and project-related support to provide Security Operations and Incident Response perspective and subject matter expertise
• Contribute technical and process improvements within the team
• Participate in current operations, on call rotation. Which includes some after-hours responsibilities and escalations.
Essential Skills:
• Experience in Cyber Threat incident response, vulnerability research, malware analysis and exploit investigation.
• Demonstrated experience in computer security related disciplines, including but not limited to the following subject areas: software vulnerabilities and exploitation, host forensics, malware analysis, network traffic analysis, Insider Threat and web-focused security topics.
• Knowledgeable about modern security related subjects and trends, for example, Advanced Persistent Threat (APT), Spear Phishing, and credential compromise techniques
• Proven ability to drive large scale, high visibility projects with high collaboration and leadership
• Excellent judgment, decision making skills, and the ability to work under pressure
• Excellent written and oral communication skills
• Excellent presentation skills and experience of presenting to senior management
• Solid understanding of events, related fields in log records and alerts reported by various data sources such as Windows/Unix systems, IDS/IPS, AV, HIDS/HIPS, WAFs, firewalls, and web proxies
• Develop and improve the existing EDR Specific use cases for enhanced detection.
• Analyze the TTP's of the emerging threats and co-ordinate with the EDR team to develop use cases at EDR.
• Closely co-ordinate and provide continuous support for CSIRT team in an event of a P1/P2 Security Incidents.
• Conduct a Security Incident tabletop simulation internally with in SOC to gauge the process and track improvements.
• Handle BEC emails targeted against VIP users within the Organization
Desired Skills :
• EC-Council’s Certified Incident Handler (E|CIH)
• Experience with Cloud Computing and technology
• Experience with Unix/Linux, or work relating to OS internals or file level forensics
• CISSP or related GIAC certifications
Good to have certifications: Network Security certification ,security plus, CISA,CISSP
Responsibilities
Job Title: Analyst
Work Location: Bangalore, KA
Skill Required: SOC Incident handler L3
Experience: 6-9 years
Job Description: Minimum 5+ years of experience
• Use Case Development: Knowledge of organizational risks and threats to design relevant and effective detection rules.
• Log Sources: Understanding log formats, sources, and parsing for accurate data utilization in use cases.
• SIEM and Analytics Tools: Familiarity with platforms like Securonix, Sentinel, or Splunk to implement and monitor use cases.
• Alert Logic: Ability to define thresholds, logic, and conditions to reduce false positives and improve detection accuracy.
• Incident Response Needs: Awareness of incident response workflows to align use cases with actionable intelligence.
• Performance Metrics: Skills to create and optimize KPI/KRI reports to track detection and response performance.
• Fine-Tuning Methodology: Experience in analyzing alert data to refine use cases and adjust logic periodically. Detect and respond to company-wide security incidents, coordinating cross-functional teams to mitigate and eradicate threats.
• Incident response lead for high impact cyber security incidents
• Triage events, escalations and incidents to determine remediation and resolution actions
• Coordinate appropriate response activities across teams or directly with stakeholders to rapidly remediate potential threats
• Develop playbooks to improve processes and information sharing across teams
• Initiative and project-related support to provide Security Operations and Incident Response perspective and subject matter expertise
• Contribute technical and process improvements within the team
• Participate in current operations, on call rotation. Which includes some after-hours responsibilities and escalations.
Essential Skills:
• Experience in Cyber Threat incident response, vulnerability research, malware analysis and exploit investigation.
• Demonstrated experience in computer security related disciplines, including but not limited to the following subject areas: software vulnerabilities and exploitation, host forensics, malware analysis, network traffic analysis, Insider Threat and web-focused security topics.
• Knowledgeable about modern security related subjects and trends, for example, Advanced Persistent Threat (APT), Spear Phishing, and credential compromise techniques
• Proven ability to drive large scale, high visibility projects with high collaboration and leadership
• Excellent judgment, decision making skills, and the ability to work under pressure
• Excellent written and oral communication skills
• Excellent presentation skills and experience of presenting to senior management
• Solid understanding of events, related fields in log records and alerts reported by various data sources such as Windows/Unix systems, IDS/IPS, AV, HIDS/HIPS, WAFs, firewalls, and web proxies
• Develop and improve the existing EDR Specific use cases for enhanced detection.
• Analyze the TTP's of the emerging threats and co-ordinate with the EDR team to develop use cases at EDR.
• Closely co-ordinate and provide continuous support for CSIRT team in an event of a P1/P2 Security Incidents.
• Conduct a Security Incident tabletop simulation internally with in SOC to gauge the process and track improvements.
• Handle BEC emails targeted against VIP users within the Organization
Desired Skills :
• EC-Council’s Certified Incident Handler (E|CIH)
• Experience with Cloud Computing and technology
• Experience with Unix/Linux, or work relating to OS internals or file level forensics
• CISSP or related GIAC certifications
Good to have certifications: Network Security certification ,security plus, CISA,CISSP
Salary : Rs. 90,000.0 - Rs. 1,65,000.0
Industry :IT-Software / Software Services
Functional Area : IT Software - Application Programming , Maintenance
Skill Required: SQL Server Database Administration, Database Administration (DBMS)
Experience Range in Required Skills 6-8 Years
Job Description:
• Good experience with creating tools for DBA daily tasks, using PowerShell
• Thorough understanding of SQL Server internals for troubleshooting performance issues
• Provide primary support for critical, complex production SQL Server databases
• Troubleshoot, investigate and drive resolution of incidents
• Work closely with internal technical teams during incident resolution and root cause analysis Coordinate interaction with vendors, creating service requests and escalating as needed to ensure timely resolution
• Provide problem management and resolution for repeat issues
• Make recommendations and contribute to the design and development of long-term solutions
• Respond to inquiries from business partners related to performance, application errors, storage capacity, etc.
• Review and execute medium to low risk changes including DDL, database configuration changes, patching, and upgrades
• Participate in new system builds; create databases, schemas and deploy standard jobs and monitoring
• Through review and solid handoffs, ensure system supportability prior to production utilization
• Adhere to documented change and incident management policies
• Develop technical documentation for use in future incident resolution
• Provide support outside of normal office hours only on rare occasions (emergency and infrequent pre-planned occurrences)
• Experience with SQL Server Replication & AG
• Experience with PowerShell and automation projects
Responsibilities
Skill Required: SQL Server Database Administration, Database Administration (DBMS)
Experience Range in Required Skills 6-8 Years
Job Description:
• Good experience with creating tools for DBA daily tasks, using PowerShell
• Thorough understanding of SQL Server internals for troubleshooting performance issues
• Provide primary support for critical, complex production SQL Server databases
• Troubleshoot, investigate and drive resolution of incidents
• Work closely with internal technical teams during incident resolution and root cause analysis Coordinate interaction with vendors, creating service requests and escalating as needed to ensure timely resolution
• Provide problem management and resolution for repeat issues
• Make recommendations and contribute to the design and development of long-term solutions
• Respond to inquiries from business partners related to performance, application errors, storage capacity, etc.
• Review and execute medium to low risk changes including DDL, database configuration changes, patching, and upgrades
• Participate in new system builds; create databases, schemas and deploy standard jobs and monitoring
• Through review and solid handoffs, ensure system supportability prior to production utilization
• Adhere to documented change and incident management policies
• Develop technical documentation for use in future incident resolution
• Provide support outside of normal office hours only on rare occasions (emergency and infrequent pre-planned occurrences)
• Experience with SQL Server Replication & AG
• Experience with PowerShell and automation projects
Salary : Rs. 55,000.0 - Rs. 95,000.0
Industry :IT-Software / Software Services
Functional Area : IT Software - Application Programming , Maintenance
Job Summary:
We are seeking a seasoned Cyber security Lead to work on the Application risk assessment and
operational security in our both traditional and private cloud infrastructure and applications.
The successful candidate will perform risk assessment, security validation and exceptions,
review security incidents, different level of risk assessments, driving security programs and
follow the remediation with close Governance.
Responsibilities:
- Conduct risk assessments and security evaluations of private cloud control plane services (API Services) & and On-Prem application/infrastructure
- Identify and assess threats, vulnerabilities, risks and potential attack vectors and prioritize the mitigation
- Assess and manage IT risk treatment in all new projects or infrastructure within its scope (integration of security into projects, secure by design processes)
- Enforce Group policies / standards and/or procedures / good security practices within its department.
- Develop and implement risk mitigation strategies and security controls
- Drive security program such as Pen test and Vulnerability programs globally
- Evaluate security configurations, policies, and procedures
- Perform security validations and exceptions for different need on day to day basis (AV , Browsing exceptions, RAF,admin rights, firewall flow, secureshare access etc.);
- Assess compliance with industry standards and regulatory requirements (e.g., NIST, SOC 2, PCI-DSS, OWASP)
- Develop and maintain risk management frameworks, playbooks, and reporting dashboards
- Communicate risk and security recommendations to stakeholders
- Contribute to security audits (internal audit / regulators) within its scope
- Ensure proper work distribution between team members and help team members as and when required
- To act as a security expert and point of contact on all the operational security and risk management activities
- Lead the resolution of security incidents and contribute to the post-mortem investigation of security incidents
- Lead the remediation of critical vulnerabilities in coordination with technical teams, SOC and CERT.
- Monitor and coordinate for timely closure of audit recommendations (internal / regulators), if necessary, intervene in support of operational teams.
- Communicate the status of security audits (internal audit / regulators) as well as the plans for dealing with recommendations.
- Communicate on its activities (definition of relevant KPIs/KRIs) and on security alert points.
Profile
Profile Required:
- 8+ years of experience in application risk assessment, operational security and risk management or related fields
- Strong understanding of infrastructure & application security architecture, compliance frameworks, and risk management principles
- Experience with infrastructure & application security assessments, risk assessments, and security controls implementation
- Excellent analytical, problem-solving, and communication skills
- Familiarity with security framework, tools, and technologies (e.g., OSWAP, CSPM, CWPP, CIEM, DAST/SAST)
- Certifications in risk management, or related fields (e.g., CRISC,CCSP, CISSP)
Responsibilities
Job Summary:
We are seeking a seasoned Cyber security Lead to work on the Application risk assessment and
operational security in our both traditional and private cloud infrastructure and applications.
The successful candidate will perform risk assessment, security validation and exceptions,
review security incidents, different level of risk assessments, driving security programs and
follow the remediation with close Governance.
Responsibilities:
- Conduct risk assessments and security evaluations of private cloud control plane services (API Services) & and On-Prem application/infrastructure
- Identify and assess threats, vulnerabilities, risks and potential attack vectors and prioritize the mitigation
- Assess and manage IT risk treatment in all new projects or infrastructure within its scope (integration of security into projects, secure by design processes)
- Enforce Group policies / standards and/or procedures / good security practices within its department.
- Develop and implement risk mitigation strategies and security controls
- Drive security program such as Pen test and Vulnerability programs globally
- Evaluate security configurations, policies, and procedures
- Perform security validations and exceptions for different need on day to day basis (AV , Browsing exceptions, RAF,admin rights, firewall flow, secureshare access etc.);
- Assess compliance with industry standards and regulatory requirements (e.g., NIST, SOC 2, PCI-DSS, OWASP)
- Develop and maintain risk management frameworks, playbooks, and reporting dashboards
- Communicate risk and security recommendations to stakeholders
- Contribute to security audits (internal audit / regulators) within its scope
- Ensure proper work distribution between team members and help team members as and when required
- To act as a security expert and point of contact on all the operational security and risk management activities
- Lead the resolution of security incidents and contribute to the post-mortem investigation of security incidents
- Lead the remediation of critical vulnerabilities in coordination with technical teams, SOC and CERT.
- Monitor and coordinate for timely closure of audit recommendations (internal / regulators), if necessary, intervene in support of operational teams.
- Communicate the status of security audits (internal audit / regulators) as well as the plans for dealing with recommendations.
- Communicate on its activities (definition of relevant KPIs/KRIs) and on security alert points.
Profile
Profile Required:
- 8+ years of experience in application risk assessment, operational security and risk management or related fields
- Strong understanding of infrastructure & application security architecture, compliance frameworks, and risk management principles
- Experience with infrastructure & application security assessments, risk assessments, and security controls implementation
- Excellent analytical, problem-solving, and communication skills
- Familiarity with security framework, tools, and technologies (e.g., OSWAP, CSPM, CWPP, CIEM, DAST/SAST)
- Certifications in risk management, or related fields (e.g., CRISC,CCSP, CISSP)
Salary : Rs. 0.0 - Rs. 12,00,000.0
Industry :IT-Software / Software Services
Functional Area : IT Software - Application Programming , Maintenance
8+ years of experience in application risk assessment, operational security and risk management or related fields
- Strong understanding of infrastructure & application security architecture, compliance frameworks, and risk management principles
- Experience with infrastructure & application security assessments, risk assessments, and security controls implementation
- Excellent analytical, problem-solving, and communication skills
- Familiarity with security framework, tools, and technologies (e.g., OSWAP, CSPM, CWPP, CIEM, DAST/SAST)
- Certifications in risk management, or related fields (e.g., CRISC,CCSP, CISSP)
Responsibilities
Salary : As per industry standard.
Industry :IT-Software / Software Services
Functional Area : IT Software - Application Programming , Maintenance
Role Category :Programming & Design
Role :Cyber Security Lead - On Prem-Gen2 OSM PAS/PLT