Tech Mahindra Ltd logo
Tech Mahindra Ltd Careers

Tech Mahindra Ltd

Tech Mahindra Ltd

Technical Skills: Arabic Native Bilingual • Siebel Tools: Proficient in using Siebel Tools for configuration, customization, and development tasks.• Siebel Open UI: Experience in developing and customizing Siebel Open UI applications.• Siebel Business Services: Strong understanding of Siebel Business Services and their integration with other systems.• Siebel Workflow: Expertise in designing, implementing, and troubleshooting Siebel Workflows.• Siebel Scripting: Proficiency in Siebel Scripting language for customization and automation.• Siebel Integration: Knowledge of integrating Siebel with other systems using various methods, such as EAI, Web Services, and APIs.• Siebel Troubleshooting: In-depth knowledge of Siebel troubleshooting techniques.• Log Analysis: Ability to analyze Siebel logs to identify and resolve issues.• Incident Management: Experience in managing and resolving incidents efficiently.• Problem Management: Ability to identify and resolve root causes of recurring issues.• Change Management: Understanding of change management processes and procedures.• SQL and PL/SQL: Solid understanding of SQL and PL/SQL for database queries and scripting.Functional Skills:• CRM Domain Knowledge: Strong understanding of CRM concepts and processes, CRM Public sector knowledge is preferred.• Problem-Solving: Excellent problem-solving and troubleshooting skills.• Communication: Effective communication skills, both written and verbal.• Teamwork: Ability to work collaboratively with team members and stakeholders.• Customer Service: Excellent customer service skills.• Communication: Effective communication skills, both written and verbal, Arabic & English.• Problem-Solving: Strong problem-solving and analytical skills.• Time Management: Ability to manage multiple tasks and prioritize effectively.Additional Considerations:• Certification: Siebel certification can be an asset.• Industry Experience: Experience in public sector can be an asset.

Posted 4 months ago

Roles and Responsibilities:Hands-on Experience is performing Network Security Assessment and vulnerability Assessment. (Web / Android /iOS)• Conduct Penetration Testing, secure coding, secure coding review, application Security Assessments and application design review.• Conduct and compile findings on new vulnerabilities.• Conduct scans and tests to find vulnerabilities in IoT devices.• Perform IoT penetration tests on various types of applications, networks, systems, and infrastructure.• Good understanding of OWASP top 10 and web Application security audits.Manual Penetration Testing skills and techniques are required besides automated tools and frameworks.• Mobile application security assessment. (iOS / Android)• Good understanding Mobile application OWASP Top 10.• Create project deliverables / reports and assist the immediate supervisor during submissions.• Analyzing bugs in code and mitigate run time damage in Production.• Communicating with the concerned team for better explanations of security issues and preparing Security testing reports for the security observations.• Conducting Security Audit to minimize IT security Risk.• Preparing reports, reviewing supported documentation• Validated Data and analysis with the external audit• Validating the manual testing reports on quarterly basis with external audit for application related securityCandidate must be able to:• Proven experience in securing application.• Technical domain knowledge - deep understanding and knowledge of the application security technical domain including Threat Modelling, Security by Design, Secure Coding and Software Assurance.• Familiarity with common security libraries, controls, and common security flaws• Architecture and design knowledge.• Ideally five or more years' experience in programming, with three or more years' experience in application security engineering.

Posted 6 months ago

1. Team Leadership & Management:Lead, mentor, and manage the SOC team (Tier 1, Tier 2, and Tier 3 analysts) to ensure the effective operation of the SOC.Establish clear objectives, KPIs, and performance metrics for the SOC team.Oversee staffing levels, training, and skill development to ensure that the team has the necessary capabilities to address emerging threats.Conduct regular performance reviews, provide feedback, and foster a culture of continuous improvement and collaboration within the team.2.Incident Detection & Response:Oversee the real-time monitoring of security events and incidents across the organization’s network, systems, and applications.Ensure proper triage and escalation of incidents to the appropriate internal teams for investigation and remediation.Ensure that all security incidents are documented, tracked, and reported accurately.Provide guidance during high-severity incidents, ensuring appropriate response and resolution.Collaborate with other departments (IT, legal, compliance, etc.) for incident response and business continuity.3. SOC Operations & Strategy:Develop and refine incident detection and response procedures, workflows, and escalation protocols.Ensure the continuous improvement of SOC processes by identifying gaps and implementing best practices.Maintain and update standard operating procedures (SOPs) for the SOC team to ensure effective and consistent response to security incidents.Develop and implement strategies for threat hunting, vulnerability management, and security event correlation.Manage the integration and configuration of SOC tools (SIEM, endpoint detection, network monitoring, etc.) and ensure they meet the organization's security needs.4. Collaboration & Communication:Serve as the primary point of contact between the SOC team and senior leadership, providing regular updates on incident status, trends, and emerging threats.Work closely with IT, network, and system teams to ensure security measures are implemented and adhered to.Collaborate with internal stakeholders to identify business risks and ensure that SOC activities align with business priorities.Maintain relationships with external partners, such as Managed Security Service Providers (MSSPs), threat intelligence vendors, and law enforcement.5. Security Monitoring & Threat Intelligence:Oversee the monitoring of security events and logs from various sources (firewalls, IDS/IPS, SIEM, etc.) to identify potential threats.Ensure that the SOC team is actively engaging in threat intelligence sharing, monitoring emerging threats, and utilizing external threat intelligence feeds.Drive the development of proactive threat-hunting initiatives to identify and mitigate potential security threats before they become incidents.6. Reporting & Compliance:Ensure that security incidents are reported in accordance with organizational policies, legal requirements, and regulatory standards.Generate and present regular reports on SOC activities, security incidents, and metrics to senior management and other stakeholders.Ensure compliance with relevant regulations (e.g., GDPR, PCI-DSS, HIPAA) by aligning SOC activities with regulatory requirements.Oversee the reporting of security metrics, key performance indicators (KPIs), and incident reports to stakeholders.7. Continuous Improvement & Risk Management:Implement post-incident reviews (PIRs) to assess the effectiveness of the SOC's response and identify opportunities for improvement.Lead efforts to refine and enhance SOC capabilities, including toolsets, threat detection, and automation.Stay up to date with the latest cybersecurity trends, threats, and technologies, and incorporate these into SOC operations to enhance detection and response.Develop and oversee the execution of security awareness programs for the organization.

Posted 7 months ago

Platform Administration:Install, configure, and maintain LogRhythm SIEM platform components (collectors, processors, and storage).Manage system updates, patches, and upgrades to ensure platform security and functionality.Monitor the health and performance of the platform, ensuring high availability and reliability.Troubleshoot and resolve issues related to the LogRhythm platform, including data ingestion, alerts, and reporting.Perform periodic backups of configurations and ensure recovery processes are tested.Security Monitoring & Event Management:Work with the security operations team to tune and optimize event correlation rules, policies, and alerts.Analyze and review LogRhythm logs and events to identify potential security incidents or vulnerabilities.Configure and maintain custom log sources and integrations, ensuring all necessary data is ingested into the platform.Collaborate with other IT teams to integrate additional security tools into LogRhythm (e.g., firewalls, IDS/IPS, endpoint protection systems).Incident Response Support:Assist with investigating security incidents by providing insights from LogRhythm dashboards, reports, and logs.Create custom reports and alerts to aid in incident detection and response.Provide technical support to security analysts during incident investigations.Reporting & Dashboards:Develop and maintain customized dashboards and reports tailored to the organization's security requirements.Create automated reports for compliance and audit purposes.Provide visibility into security metrics and key performance indicators (KPIs) to stakeholders.Performance Optimization:Continuously assess and improve the performance of the LogRhythm platform, ensuring efficient data processing and storage.Identify and address any performance bottlenecks related to data ingestion, correlation, and reporting.Collaboration & Documentation:Collaborate with internal teams to identify and address emerging security threats.Maintain clear and comprehensive documentation for platform configuration, processes, and incident resolution.Train and support team members on LogRhythm best practices and usage.Compliance & Security Standards:Ensure the platform is configured to comply with industry regulations (e.g., GDPR, HIPAA, PCI-DSS).Conduct periodic reviews of platform configurations to ensure alignment with internal security policies.

Posted 7 months ago

Technical Skills:• Siebel Tools: Proficient in using Siebel Tools for configuration, customization, and development tasks.• Siebel Open UI: Experience in developing and customizing Siebel Open UI applications.• Siebel Business Services: Strong understanding of Siebel Business Services and their integration with other systems.• Siebel Workflow: Expertise in designing, implementing, and troubleshooting Siebel Workflows.• Siebel Scripting: Proficiency in Siebel Scripting language for customization and automation.• Siebel Integration: Knowledge of integrating Siebel with other systems using various methods, such as EAI, Web Services, and APIs.• Siebel Troubleshooting: In-depth knowledge of Siebel troubleshooting techniques.• Log Analysis: Ability to analyze Siebel logs to identify and resolve issues.• Incident Management: Experience in managing and resolving incidents efficiently.• Problem Management: Ability to identify and resolve root causes of recurring issues.• Change Management: Understanding of change management processes and procedures.• SQL and PL/SQL: Solid understanding of SQL and PL/SQL for database queries and scripting.Functional Skills:• CRM Domain Knowledge: Strong understanding of CRM concepts and processes, CRM Public sector knowledge is preferred.• Problem-Solving: Excellent problem-solving and troubleshooting skills.• Communication: Effective communication skills, both written and verbal.• Teamwork: Ability to work collaboratively with team members and stakeholders.• Customer Service: Excellent customer service skills.• Communication: Effective communication skills, both written and verbal, Arabic & English.• Problem-Solving: Strong problem-solving and analytical skills.• Time Management: Ability to manage multiple tasks and prioritize effectively.Additional Considerations:• Certification: Siebel certification can be an asset.• Industry Experience: Experience in public sector can be an asset.

Posted 7 months ago

JD for Sr. Risk AnalystEstablishing information security risk management processes; identifying and managing information security risks.Responsible for end-to-end risk management.Create maintain risk and operational risk register to ensure that all identified risk factors are accounted for.Ensure all registered risk are treated on time, and treatment plan should be published to all stakeholders.Experience in Third party Risk assessment while maintaining the risk register for the program.Perform risk evaluations and communicate IT security gaps impact to business and program owners.Drive IT security and risk assessment on program products, services, technologies, applications, and Consultants.Demonstrated experience in performing audit/compliance and third-party Consultant assessments.Experience with internal project consulting to provide compliance and security requirements and guidance.Assist in the improvement of risk management and Cyber Security controls.Support the Third-Party Senior Manager with all third-party Consultant risk assessment activities and reporting tasks.Required Professional ExperienceRelevant experience in IT infra & Application risk domain.Good understanding of the IT General and Security controls for Technology Infra.Exposure to Global IT and Security Risk models like ISO27001/ ISO27005/ ISO31000.Worked on documentation of IT Policies/ Procedures.Good written and communication skills.Skills/Tools ExperienceGood to have any GRC tool experience (E.g., AllGress RSA Archer, MetricStream etc.)Academic Qualifications & CertificationsBachelor’s degree in engineering (BTech/B. E), MTech, MSc in IT related field.Desirable but not mandatory ISO 27001/ 22301/ 31000.

Posted 8 months ago