Security Delivery Lead
Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets).
Must have skills : Security Information and Event Management (SIEM)
Good to have skills : NA
Minimum 7.5 year(s) of experience is required
Educational Qualification : 15 years full time education
Summary: The SOC Purple Team Engineer acts as a bridge between offensive security (Red Team) and defensive security (Blue Team). The role focuses on validating, improving, and enhancing SOC detection and response capabilities by simulating attacker behaviors, collaborating with SOC analysts, and strengthening detection engineering. This position drives continuous improvement of the organization’s cyber defense posture through coordinated purple team exercises and detection tuning. Roles & Responsibilities: - Plan and execute purple team engagements combining offensive simulations with defensive monitoring. - Collaborate with Red Team to emulate adversary TTPs aligned with MITRE ATT&CK. - Work with SOC/Blue Team to validate detection logic, alerting accuracy, and response workflows. - Document gaps found during purple tests and drive remediation and tuning activities. - Facilitate training sessions to enhance team skills and knowledge. - Monitor project progress and implement corrective actions as necessary. - Perform controlled simulations of attacker behaviors such as:Initial access, Privilege escalation, Lateral movement, CW/C2 communication, Persistence mechanisms, Data exfiltration techniques - Validate SOC visibility and ensure telemetry coverage across endpoints, network, cloud, and identity. - Identify detection gaps and propose enhancements to SIEM and EDR detection logic. - Create, test, and tune detection use cases based on threat actor behaviors. - Work with detection engineers and hunters to operationalize new detections. - Assist in building dashboards, correlation rules, and behavioral analytics. - Use threat intelligence to select realistic TTPs for simulation. - Map attacks and detections to MITRE ATT&CK to measure coverage and maturity. - Drive improvements in defensive capabilities aligned to known threat actors and campaigns. - Support IR teams during investigations by validating telemetry and attack path reconstruction. - Assist in conducting post-incident purple exercises to improve detection and response readiness. - Document objectives, methods, findings, and recommended remediations from engagements. - Create purple playbooks and standardised methodology for repeatable simulations. - Present results to leadership, highlighting improvements and remaining risks. - Contribute to continuous enhancement of overall SOC maturity. Professional & Technical Skills: - Must To Have Skills: SOC/SIE/SOAR (Splunk, Tines), EDR tools (CrowdStrike, Defender ATP), Red Team tools (Caldera, Atomic Red Team, Cobalt Strike-like frameworks, Metasploit) - Strong understanding of offensive and defensive security concepts. - Experience with incident response and threat management. - Ability to analyze security events and generate actionable insights. - Familiarity with security monitoring tools and technologies. - Strong knowledge of Windows, Linux, Active Directory, and cloud attack techniques. - Familiarity with network security monitoring and anomaly detection. - Good understanding of MITRE ATT&CK, Cyber Kill Chain, and threat actor behaviors. - Ability to write scripts (Python, PowerShell, Bash) for automation and simulation. - Strong analytical and problem-solving mindset. - Ability to collaborate across offensive and defensive security teams. - Clear communication skills to present findings and influence improvements. - Strong documentation, report writing, and stakeholder communication abilities. Additional Information: - The candidate should have minimum 7.5 years of experience in Security Information and Event Management (SIEM). - This position is based at our Bengaluru office. - A 15 years full time education is required. Bachelor’s degree in Cybersecurity, Information Security, or related field. - Preferred certifications: OSCP / OSCE / OSEP (Red Team focus), GCIA / GCIH / GMON (Blue Team focus), Vendor certifications in SIEM/EDR tools
Bengaluru
Equal Employment Opportunity Statement
All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law.
Please read Accenture’s Recruiting and Hiring Statement for more information on how we process your data during the Recruiting and Hiring process.
We work with one shared purpose: to deliver on the promise of technology and human ingenuity. Every day, more than 775,000 of us help our stakeholders continuously reinvent. Together, we drive positive change and deliver value to our clients, partners, shareholders, communities, and each other.
We believe that delivering value requires innovation, and innovation thrives in an inclusive and diverse environment. We actively foster a workplace free from bias, where everyone feels a sense of belonging and is respected and empowered to do their best work.
At Accenture, we see well-being holistically, supporting our people’s physical, mental, and financial health. We also provide opportunities to keep skills relevant through certifications, learning, and diverse work experiences. We’re proud to be consistently recognized as one of the World’s Best Workplaces™.
Join Accenture to work at the heart of change. Visit us at www.accenture.com.
We have been alerted to the existence of fraudulent messages asking job seekers to set up payment to cover various costs associated with establishing employment at Accenture. No one is ever required to pay for employment at Accenture. If you are contacted by someone asking for payment, please do not respond, and contact us at india.fc.check@accenture.com immediately.