
Qradar Admin
- Mumbai, Maharashtra
- Permanent
- Full-time
- IBM QRadar SIEM, UEBA and SOC expertise, Python scripting
- Deception technologies, SOC Radar, Dark Web and Brand Protection monitoring, Proactive threat hunting
- Industry certifications such as GCIA, GCIH, CEH, CISSP, CySA+, QRadar Admin/Analyst.
- Familiarity with SOAR tools (e.g., IBM Resilient, Google SOAR, Cortex XSOAR) and EDR platforms.
- Experience with cloud security monitoring (AWS, Azure, GCP) and API integrations.
- Exposure to DevSecOps and CI/CD security monitoring is a plus.
- Minimum 3 years of experience in a SOC, Threat Intelligence, or Cybersecurity Analyst role.
- Proven hands-on experience with IBM QRadar SIEM (log integration, AQL, custom rules).
- Strong experience with SOC Radar or similar DRP/Digital Risk Protection platforms.
- Deep understanding and practical usage of UEBA and Deception technologies.
- Python scripting expertise is mandatory – ability to write scripts for automation, threat analysis, and system integrations.
- Strong grasp of MITRE ATT&CK, cyber kill chain, and advanced threat actor tactics.
- Excellent incident analysis, communication, documentation, and stakeholder management skills