Home
Jobs

2 Azure Defender Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

0.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Our Client is a global consulting firm that provides award-winning services to transform customer, employee, and student experiences. Since 1997, our Salesforce and Oracle experts have provided a full range of enterprise solutions including CRM and related applications that support sales, marketing, and service financial reporting HR and Business Intelligence. We have top talent all over the United States and India and are continuously growing. We provide our team with a flexible work-life balance in addition to the traditional benefits. Job Summary: Are you interested in working in a dynamic environment that offers opportunities for professional growth and new responsibilities If so, this could be the place for you. Traditional security programs have often been unsuccessful in unifying the need to both secure and support technology innovation required by the business. Join our Client`s Infrastructure and Data Security Team and explore the exciting challenges in store. The Team Our IT Infrastructure and Data Security team helps improve security posture of the organizations, confidently pursue their growth, innovation, and performance agendas through proactive management of the associated cyber risks. Our professionals provide advisory and implementation services that integrate risk, regulatory, and technology skills to help clients transform and secure their legacy programs. Join the team developing the future state of cyber risk solutions Duties/Responsibilities: L3 As a Senior Consultant, you will be at the front lines with our users supporting them with their Cloud needs specifically helping them navigate the journey to the cloud on the Microsoft 365 platform. This will include: Conduct cloud security analysis, evaluating configurations, and providing recommendations for O365, EMS, and Windows Enterprise 10/11 platforms and environments. This can include Microsoft s cloud solutions such as Microsoft 365 Defender, Microsoft Information Protection (MIP), Conditional Access, Azure Defender, and Microsoft Defender for Endpoint. Perform technical health checks for these Cloud platforms/environments prior to broader deployments. Support Proof of Concept (PoC) and Production deployments of these cloud technologies. Assist users with transitions to the M365 cloud services such as tenant setup and service configuration with a focus on cloud cyber risk mitigation. Assist with the configuration and delivery of cloud security and compliance reports. Provide technical support for M365 services and resolve service-related issues through research and troubleshooting and working with Microsoft. Implement of industry leading practices and Microsoft recommendations around M365 cloud security. Design and develop cloud-specific security policies, standards and procedures e.g., Cloud governance, O365 tenant management and configuration, EMS policy development, management and access controls, firewall management, auditing and monitoring, security incident and event management, data protection (DLP and encryption), user and administrator account management, conditional access controls and password/key management. Troubleshoot system level problems in a multi-vendor, multi-protocol network environment. Document platform technical issues, conducting analysis, developing client communications, and driving resolution as part of cyber risk mitigation steps. Execute on M365 cloud security engagements during different phases of the lifecycle Assess, Design, Implement, and Operate. Implement industry leading practices around M365 cyber risks and cloud security for clients. Provide internal technical training to Advisory personnel as needed. Act as a Subject Matter Expert (SME) for the M365 platform. Competency (Knowledge, Skills, and Abilities) Should have M365 Technologies - MUST have advanced troubleshooting and project implementation skills in 2 or more of the technologies below. Certifications highly preferred (ISO 27001 guidelines). If the candidate has reasonably strong experience he must complete it within 2 months. Recent learning and certification should be aligned with the future technologies M365 AzureAD M365 Exchange Online or MDOP 2 M365 Intune - Device Management and Application Management lifecycle, M365 Defender suite (Office 365, EndPoint, Exchange, CloudApps) Microsoft Identify AzureAD, conditional access, integrations SAML Microsoft VDI or DaaS (Microsoft 365, Microsoft Cloud PC) Scripting - PowerShell, KQL Windows 365 Operating systems and Hardware Microsoft Security and Compliance Must Have Intune - 30% (Patching apps, scripts, automation -Autopilot, troubleshoot logs) Defender suite - 20% (email, teams, SharePoint, CoPilot, addressing policies and troubleshooting) Vendor management - 10% (collaborating with MS, HP, Dell, Lenovo, Managed service providers like Microsoft) Security and Compliance products in M365 - 30% (Advanced M365 security features AzureAD, Experience in delivering in SLA environments- 10% Awareness and having worked in ISO 27001 or SOC2 companies - 10% Must work in an IT department with 500+ users or more and be able to mentor juniors in the team Good to Have Compliance - ISO 27001 or SOC 2 (should have experience working in these environments) Network -- FortiGate UTM (Firewall, IDS, IPS, Web Application Filter) Server Operating systems -- Windows Server 2022, Ubuntu, HyperV Hardware - Laptops, Server and Network Equipment Additional Requirements: Must be willing working in rotational shifts India/US (EST) hrs. Team player with experience communication with US users - excellent communication skills Good to have worked in night shifts in the recent future. Certification Certification - M365 Admin certifications in the above technologies are preferred. Must be constantly upgrading/learning new technologies. Position Type: Full Time/Permanent Required Education: Bachelor s degree. Ideally in Computer Science, Cyber Security, Information Security, Engineering, Information Technology. Other Duties: This job description is not designed to cover or contain a comprehensive listing of activities, duties, or responsibilities that are required. Duties, responsibilities, and activities may change, or new ones may be assigned at any time, with or without notice.

Posted 4 days ago

Apply

0.0 - 3.0 years

2 - 5 Lacs

Hyderabad

Work from Office

What you will do In this vital role supports the identification, assessment, and tracking of vulnerabilities across the organizations IT landscape. The Junior Vulnerability Management Analyst assists senior team members in analyzing vulnerability data, correlating risk indicators (e.g., KEV, EPSS), and supporting remediation efforts. This position offers an opportunity to grow technical expertise while contributing to the organizations security posture through structured vulnerability management processes. Roles & Responsibilities: Assist with analyzing vulnerability scan results from tools such as Tenable, Qualys, or Rapid7. Support prioritization efforts using CVSS scores, KEV (Known Exploited Vulnerabilities), EPSS (Exploit Prediction Scoring System), and asset criticality. Collaborate with IT and security teams to track remediation status and escalate high-risk findings. Monitor public threat intelligence sources to understand the context of vulnerabilities. Contribute to the development of dashboards and reports for tracking vulnerabilities and trends. Assist in documenting vulnerability management processes and remediation workflows. Support compliance and audit requests by providing vulnerability data as needed. Learn and follow policies related to patch management and secure configurations. What we expect of you We are all different, yet we all use our unique contributions to serve patients. Basic Qualifications: Bachelors degree and 0 to 3 years of experience in cybersecurity or IT operations with exposure to vulnerability or security tools OR Diploma and 4 to 7 years of experience in cybersecurity or IT operations with exposure to vulnerability or security tools Must-Have Skills: Basic familiarity with vulnerability management platforms (e.g., Tenable, Qualys, or Rapid7) Understanding of basic CVSS scoring and vulnerability classification Awareness of cybersecurity concepts such as threat intelligence, patching, and risk assessment Foundational knowledge of networking and common IT systems Willingness to learn and grow in the field of vulnerability management Preferred Qualifications: Good-to-Have Skills: Exposure to KEV, EPSS, or similar threat-based scoring frameworks Basic experience with scripting languages (e.g., Python, PowerShell) Awareness of cloud security tools (e.g., AWS Inspector, Azure Defender) Familiarity with compliance standards such as NIST, ISO, or PCI-DSS CompTIA Security+ (preferred) Tenable Certified Nessus Auditor (Preferred) Qualys Vulnerability Management Specialist (Preferred) Soft Skills: Analytical Thinking Comfortable working with data and identifying patterns Attention to Detail Careful review and tracking of vulnerabilities Communication Skills Able to clearly document and explain findings Collaboration & Teamwork Works well with cross-functional teams Curiosity & Continuous Learning Strong interest in cybersecurity and professional growth Problem-Solving Mindset Seeks practical solutions to real-world security issues

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies