Accenture
Accenture2h ago
Naukri

Security Architect

Hyderabad
Full Time
Mid Level

Auto Apply to 50+ AI Matched Security Architect Jobs

Use Auto Apply Agents to Bulk Apply jobs with ATS Optimised Resumes, find verified Insider Connections for jobs at Accenture

Qualifications

10/10 matched

Experience Level: Mid Level

  • </b>-Sentinal One:Custom detections
  • forensic triage
  • threat graphs-Splunk SIEM (core + ES module):Searching Logs
  • Monitoring and investigating alerts.-Incident Response and SIEMExperience:2+ years in SOC/IR . Experience in 24x7 environments
  • shift-based operations
  • or critical infrastructure response-Alert Triage & Monitoring:Experience investigating escalated alerts using SIEM or EDR-Incident Response and Containment:Take necessary actions to contain
  • eradicate and recover from security incidents.-Identify opportunities for automation and work with SIEM Platform Support team for implementing it.-EDR Deep Dive:Using Real Time Response (RTR)
  • Threat Graph
  • custom IOA rules-Proficiency in writing SPL queries
  • dashboards and providing fine tuning opportunities-Threat Hunting:Behavior-based detection using TTPs-Good understanding of malware

Full Job Description

Accenture is seeking a talented Security Architect to join their team in Hyderabad.

In this role, you will be responsible for defining and implementing robust cloud security frameworks and architectures that align with business requirements and performance goals. You will play a crucial part in documenting the deployment of cloud security controls and ensuring a smooth transition to cloud security-managed operations.

Key Responsibilities:

  • Define cloud security frameworks and architectures.
  • Ensure security solutions meet business requirements and performance targets.
  • Document the implementation of cloud security controls.
  • Facilitate the transition to cloud security-managed operations.

Must-Have Skills:

  • Security Information and Event Management (SIEM)

Minimum Experience: 2 years

Educational Qualification: 15 years of full-time education.

Additional Information: This position is based at our Hyderabad office.

Summary:

As a SOC Analyst, you will conduct in-depth investigations of security alerts and confirmed incidents. Your responsibilities include validating escalated events using SentinelOne and Splunk SIEM, enriching them with context, and collaborating with L3 analysts for containment and remediation. You will also contribute to improving detection accuracy and supporting SOAR automation. This role demands deep expertise in detection, investigation, containment, remediation, and cross-functional collaboration with security, IT, and compliance teams.

Roles & Responsibilities:

  • Investigate alerts escalated by L1 to determine scope, impact, and root cause.
  • Perform in-depth endpoint and network triage using SentinelOne.
  • Utilize SentinelOne for endpoint analysis and threat validation.
  • Correlate multiple log sources in Splunk to trace attacker activity.
  • Enrich events with asset, identity, and threat intelligence context.
  • Document investigation workflows, evidence, and conclusions.
  • Support L2 analysts during major incidents with log or memory triage.
  • Suggest improvements for alert logic and fine-tuning.
  • Conduct threat research aligned with alert patterns and business context.
  • Enhance alert fidelity with threat intelligence and historical context.
  • Document investigation findings and communicate with stakeholders.

Professional & Technical Skills:

  • SentinelOne: Custom detections, forensic triage, threat graphs.
  • Splunk SIEM (core + ES module): Log searching, alert monitoring, and investigation.
  • Incident Response and SIEM Experience: 2+ years in SOC/IR, experience in 24x7 environments, shift-based operations, or critical infrastructure response.
  • Alert Triage & Monitoring: Experience investigating escalated alerts using SIEM or EDR.
  • Incident Response and Containment: Ability to take necessary actions to contain, eradicate, and recover from security incidents.
  • Identify automation opportunities and work with SIEM Platform Support for implementation.
  • EDR Deep Dive: Proficiency with Real-Time Response (RTR), Threat Graphs, and custom IOA rules in EDR solutions.
  • Proficiency in writing SPL queries, creating dashboards, and providing fine-tuning opportunities.
  • Threat Hunting: Behavior-based detection using TTPs.
  • Good understanding of malware, lateral movement, privilege escalation, and exfiltration patterns.
  • Threat Intel Integration: Automation of IOC lookups and enrichment flows.
  • Forensic Skills: Live host forensics, log correlation, malware behavioral analysis.
  • Good experience in advanced threat detection and incident response.
  • Proficiency in SentinelOne forensic and incident response capabilities.
  • Playbook Development/Updation: Ability to define, update, and optimize IR playbooks and workflows.
  • Forensic analysis (memory, file systems, logs).
  • Cloud incident handling (AWS, Azure).
  • Dashboarding: Advanced visualizations and business-focused metrics in Splunk.
  • Certifications: Splunk Certified Admin/ES Admin, SC-200, SentinelOne EDR vendor training.

Additional Information:

  • Minimum 2 years of experience in Security Information and Event Management (SIEM).
  • This position is based at our Hyderabad office.
  • A 15-year full-time education is required.

Qualification:

15 years of full-time education.

Company

Accenture

Accenture

Hyderabad
Posted on Naukri
Security Architect at Accenture | Hyderabad | Apply Now | MindMyJob | MindMyJob - AI Job Search Platform