Accenture
Accenture2h ago
Naukri

Security Architect

Hyderabad
Full Time
Mid Level

Auto Apply to 50+ AI Matched Security Architect Jobs

Use Auto Apply Agents to Bulk Apply jobs with ATS Optimised Resumes, find verified Insider Connections for jobs at Accenture

Qualifications

10/10 matched

Experience Level: Mid Level

  • Live host forensics
  • log correlation
  • malware behavioral analysis<br />-Good experience in advanced threat detection and incident response<br />-Proficiency in Sentinal One forensic and incident response capabilities<br />-Playbook Development/Updation:Able to define
  • update
  • and optimize IR playbooks and workflows <br />-Forensic analysis (memory
  • file systems
  • logs)<br />-Cloud incident handling (AWS
  • Azure)<br />-Dashboarding:Advanced visualizations and business-focused metrics in Splunk<br />-Certifications:Splunk Certified Admin/ES Admin
  • SC-200
  • Sentinal One EDR vendor training<br /><br /><b>Professional & Technical Skills:</b> <br />-Investigate alerts escalated by L1 to determine scope

Full Job Description

Security Architect - Accenture Hyderabad

Accenture is seeking a Security Architect to join their team in Hyderabad. This role focuses on defining and implementing cloud security frameworks and architectures to meet business requirements and performance goals. Key responsibilities include documenting the implementation of cloud security controls and transitioning to cloud security-managed operations.

The ideal candidate will have a minimum of 2 years of experience in Security Information and Event Management (SIEM). A strong understanding of SIEM technologies is essential.

Key Responsibilities:

  • Define and document cloud security frameworks and architectures.
  • Ensure cloud security solutions meet business requirements and performance goals.
  • Oversee the implementation of cloud security controls.
  • Facilitate the transition to cloud security-managed operations.

Required Skills:

  • Security Information and Event Management (SIEM)

Qualifications:

  • 15 years of full-time education.
  • Minimum 2 years of experience in SIEM.

Summary for SOC Analyst (Level 1.5)

As a Level 1.5 SOC Analyst, you will be responsible for in-depth investigation of security alerts and confirmed incidents. This involves validating escalated events using SentinelOne and Splunk SIEM, enriching them with relevant context, and collaborating with L3 analysts for containment and remediation. You will also contribute to improving detection fidelity and supporting SOAR automation.

This role demands deep expertise in detection, investigation, containment, and remediation, along with strong collaboration skills across security, IT, and compliance teams.

Roles & Responsibilities:

  • Alert Triage & Monitoring: Investigate escalated alerts using SIEM or EDR.
  • Incident Response and Containment: Execute actions to contain, eradicate, and recover from security incidents.
  • Identify and implement automation opportunities with the SIEM Platform Support team.
  • EDR Deep Dive: Utilize Real Time Response (RTR), Threat Graph, and custom IOA rules.
  • Write SPL queries, create dashboards, and suggest fine-tuning opportunities.
  • Threat Hunting: Employ behavior-based detection using TTPs.
  • Understand malware, lateral movement, privilege escalation, and exfiltration patterns.
  • Threat Intel Integration: Automate IOC lookups and enrichment flows.
  • Forensic Skills: Conduct live host forensics, log correlation, and malware behavioral analysis.
  • Demonstrate advanced threat detection and incident response capabilities.
  • Leverage SentinelOne forensic and incident response features.
  • Playbook Development/Updation: Define, update, and optimize IR playbooks and workflows.
  • Perform forensic analysis (memory, file systems, logs).
  • Handle cloud incidents (AWS, Azure).
  • Dashboarding: Create advanced visualizations and business-focused metrics in Splunk.
  • Certifications: Splunk Certified Admin/ES Admin, SC-200, SentinelOne EDR vendor training are advantageous.

Professional & Technical Skills:

  • Investigate alerts escalated by L1 to determine scope, impact, and root cause.
  • Perform in-depth endpoint and network triage using SentinelOne.
  • Utilize SentinelOne for endpoint analysis and threat validation.
  • Correlate multiple log sources in Splunk to trace attacker activity.
  • Enrich events with asset, identity, and threat intelligence context.
  • Document investigation workflows, evidence, and conclusions.
  • Support L2 during major incidents with log or memory triage.
  • Suggest improvements for alert logic and fine-tuning.
  • Conduct threat research aligned with alert patterns and business context.
  • Enhance alert fidelity with threat intelligence and historical context.
  • Document investigation findings and communicate with stakeholders.
  • Proficiency with SentinelOne: Custom detections, forensic triage, threat graphs.
  • Proficiency with Splunk SIEM (core + ES module): Log searching, alert monitoring, and investigation.

Additional Information:

  • Minimum 2 years of experience in Security Information and Event Management (SIEM).
  • This position is based at our Hyderabad office.
  • 15 years of full-time education is required.

Company

Accenture

Accenture

Accenture is a leading global professional services company, providing a broad range of services and solutions in strategy, consulting, digital, technology and operations.

Hyderabad
Posted on Naukri
Security Architect at Accenture | Hyderabad | Apply Now | MindMyJob | MindMyJob - AI Job Search Platform