What makes Cognizant a unique place to work? The combination of rapid growth and an international and innovative environment! This creates many opportunities for people like YOU — individuals with an entrepreneurial spirit who want to make a difference in the world.
At Cognizant, you will collaborate with colleagues from around the globe to develop solutions for leading companies, helping them become more flexible, innovative, and successful. This is your chance to be part of a success story.
Your day-to-day will include:
- Security Operations & Incident Response
- Leading threat detection, investigation, and remediation efforts using tools such as IBM QRadar, Splunk, CrowdStrike Falcon, Microsoft 365 Defender, and SentinelOne.
- Performing real-time and retrospective analysis of logs, alerts, and PCAP files to detect malicious activity using Wireshark and SIEM platforms.
- Conducting static and dynamic malware analysis and coordinating with threat intelligence teams for actionable IOCs.
- Developing, tuning, and maintaining incident response playbooks aligned with organizational risk posture.
- Implementing and maintaining a Zero Trust Architecture, securing access through strong authentication, micro-segmentation, and continuous monitoring.
- Leveraging ZTNA principles in cloud and hybrid environments, ensuring strict verification for every access request regardless of location or device.
- Integrating identity-based access controls across firewalls, VPNs, and cloud platforms to support secure remote access and workload isolation.
- Collaborating with network, AD, and cloud teams to establish secure perimeters and enforce device trust and user validation.
- Maintaining comprehensive visibility and lifecycle management of IT / OT assets using tools like Axonius and CrowdStrike.
- Implementing robust endpoint security across various environments, including manufacturing and labs.
- Integrating asset inventory with vulnerability management processes for accurate risk scoring and prioritization.
- Classifying assets based on risk level, business criticality, and compliance needs.
- Conducting vulnerability assessments using Nessus and CrowdStrike, and coordinating remediation with system owners.
- Documenting and tracking security incidents, risks, and mitigation strategies through dashboards and reports.
- Collaborating with leadership to deliver executive reports and insights on security posture and incidents.
- Building automation scripts and workflows to reduce manual efforts in detection, remediation, and reporting.
- Creating custom correlation rules, dashboards, and threat detection content in Splunk.
- Managing Zero Trust Network Access (ZTNA) to enforce secure, identity-aware access across hybrid environments.
- Configuring ZTNA policies for application segmentation to reduce lateral movement and enhance security.
- Monitoring web and application traffic through ZTNA platforms to detect anomalies and enforce policies.
- Creating dynamic ZTNA policies based on user identity, device posture, location, and risk score.
- Utilizing Secure Web Gateway (SWG) capabilities to inspect web traffic, block malicious downloads, and prevent data exfiltration.
- Deploying and maintaining Cybersecurity Asset Management platforms for asset visibility.
- Creating dynamic queries to detect unmanaged or vulnerable assets and trigger automated remediation workflows.
- Using asset management tools to correlate data across systems for real-time security gap identification.
- Supporting compliance audits through dashboards that detail asset security status, patching, and coverage.
- Using asset management tools for lifecycle tracking, licensing checks, and enforcing security baselines.
Technical Skills & Tools that will help you succeed:
- Endpoint Security: Microsoft 365 Defender, CrowdStrike, SentinelOne
- Cloud Security: Azure AD, Azure Security Center, Monitor, AKS, ACR, VNets, Functions, RBAC
- Vulnerability Tools: Nessus, IBM AppScan, OSINT, Joe Sandbox (basic knowledge is good to have)
- Firewalls & Networking: Fortinet, Palo Alto, DNS, TCP/IP, DHCP, IPS/IDS (basic knowledge)
- Email Security: Proofpoint, DarkTrace, Mimecast (basic or good to have)
- Strong communication skills; ability to translate technical risks effectively.
Preferred Qualifications:
- Bachelor’s or Master’s degree in Cybersecurity, Computer Science, Information Systems, or related fields.
- Relevant certifications such as CISSP, CISM, CEH, Microsoft Certified: Azure Security Engineer, CompTIA Security+, or similar.
Next Steps: If you believe this opportunity is right for you or if Cognizant appeals to you, we want to connect! Please apply directly.
Cognizant is committed to Equal Employment Opportunities. Successful candidates will undergo a background check.