About Junglee Games:
Junglee Games is part of Flutter Entertainment, the world’s leading iGaming and sports entertainment group listed on the New York Stock Exchange (NYSE: FLUT). We operate independently in India while leveraging Flutter’s global expertise across product, technology, and responsible gaming.
Junglee Games is a technology-led entertainment powerhouse building safe, intelligent, and immersive gaming ecosystems that delight millions daily. Founded in San Francisco in 2012, we are revolutionizing the player experience by treating trust, safety, and fairness as engineering priorities. We specialize in building scalable platforms across a diverse portfolio of competitive and social genres including Ludo, Carrom, Solitaire, Rummy, Poker, Teen Patti, Pool, Quizzes and Tamboola.
By marrying tech and deep data science with a passion for community, we have turned technology into our unfair advantage. Our focus on platform thinking allows us to deliver seamless, responsible, and culturally relevant experiences at a global scale.
Joining Junglee Games means working at the intersection of India’s fast-growing gaming ecosystem and joining Flutter Entertainment’s global talent community, shaping the future of digital entertainment. Beyond gaming, Junglee Games represents a culture defined by technological ingenuity and strong values. We are committed to shaping the next generation of responsible leaders and redefining what it means to be a tech-first entertainment leader in a digital-first world.
Position Overview
In this role, you aren’t just monitoring dashboards; you are the primary orchestrator of our incident response lifecycle and the bridge between raw data and actionable intelligence. You will oversee the daily operations of the SOC, ensuring that threats are identified, triaged, and neutralized with precision. As a senior contributor and mentor, you will drive the evolution of our security posture by developing advanced detection logic, refining playbooks, and leading deep-dive forensic investigations.
Responsibilities
-
Act as the primary technical escalation point for Tier 1 and 2 analysts, taking full ownership of complex or high-priority security incidents.
-
Lead the response to critical security breaches, coordinating with teams and executive leadership to ensure rapid containment and recovery.
-
Conduct deep-dive forensic analysis and Root Cause Analysis (RCA) to identify how attackers gained access and prevent future occurrences.
-
Design, build, and tune custom SIEM rules and EDR alerts to reduce "alert fatigue" and improve detection of sophisticated threats.
-
Proactively perform threat hunting exercises using the MITRE ATT&CK framework to uncover stealthy adversaries already within the network.
-
Develop and maintain automated SOAR workflows to streamline manual response tasks and improve the team’s overall efficiency.
-
Mentor and coach junior staff through regular knowledge-sharing sessions, code reviews, and simulated tabletop exercises.
-
Audit analyst investigation logs to ensure high standards of quality and adherence to established Service Level Agreements (SLAs).
-
Stay current with the global threat landscape and integrate new Threat Intelligence (TI) feeds into internal monitoring tools.
-
Produce regular reports for leadership on key SOC performance metrics, such as Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR).
-
Evaluate and recommend new security technologies or architectural improvements to harden the organization's defence-in-depth strategy.
-
Ensure all monitoring and logging activities remain compliant with industry frameworks such as SOC2, ISO 27001, or NIST.
Requirements
-
Experience: 8+ years
-
Expertise in the full IR lifecycle (NIST or SANS frameworks), from initial detection and containment to eradication and post-incident forensic reporting.
-
Advanced Detection Engineering skills, with hands-on experience building and tuning detection logic (YARA, Sigma, or SIEM/EDR languages) to identify "low and slow" attacks.
-
Proficiency in Digital Forensics using tools to perform deep-dive memory and disk analysis.
-
Deep familiarity with the MITRE ATT&CK framework, with a proven track record of executing proactive threat hunts across cloud and on-premise telemetry.
-
Strong scripting and automation skills in Python, PowerShell, or Bash to develop custom integrations and automated workflows within a SOAR platform.
-
Cloud Security Expertise, specifically in investigating threats, lateral movement, and permission escalation within AWS, Azure, or GCP environments.
-
Demonstrated Crisis Management leadership, with the ability to remain calm and provide clear, decisive direction to technical teams during a major breach.
-
Experience in Mentorship, including conducting code reviews for detection logic, creating training documentation, and leading tabletop exercises for junior staff.
-
Analytical mindset focused on security metrics (MTTD/MTTR) to identify process bottlenecks and advocate for architectural or resource improvements.
-
Technical Writing skills, capable of translating complex forensic findings into clear Root Cause Analysis (RCA) reports for executive leadership.
