Home
Jobs

3 Endpoint Detection Jobs

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

7 - 12 years

17 - 27 Lacs

Gurugram

Work from Office

Naukri logo

Your potential, unleashed. Indias impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realise your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks. Your work profile. Reporting to the Director of SOC Engineering, a Sentinel is primarily responsible for the build development and maintenance of the Sentinel SIEM. The engineer will participate in installing, configuring, and maintaining Microsoft Sentinel; design and develop detections; implement operational and technical security controls; and adhere to organisational security policies and procedures. About the team The engineering team provides a number of services to internal and external stakeholders including: Working on onboarding new clients to the service on the Microsoft Sentinel SIEM platform Working closely with a large SOC to maintain adequate connectors and analytics. Working with clients for the development of new detections bespoke to client use cases, threats and environments. Assist on internal SOC quality of life or process improvement projects. As part of a small team you will experience diverse days, find yourself hands on building and developing as well as handling client tickets or SOC queries. Engineering: Analyze and define data requirements and specifications. Oversight of data system performance, capacity, availability, serviceability, and recoverability. Analyze and plan for anticipated changes in data capacity requirements. Install, configure and support data system components. Raise/manage/close vendor support cases. Develop and facilitate data-gathering methods. Manage the compilation, cataloguing, caching, distribution, and retrieval of data. Provide a managed flow of relevant information to represent data in creative formats. Part of Data and Security Engineering escalation roster for critical alerts. Data Analysis Analyze data sources to provide actionable recommendations and strategic insights. Assess the validity of source data and subsequent findings. Conduct hypothesis testing using statistical processes. Develop strategic insights from large data sets. Develop data standards, policies, and procedures. Client facing Interface with customers to address concerns, issues, or escalations; track and drive to closure any issues that impact the service and its value to clients. Work with product owners to onboard additional data sources. Present technical information to technical and non-technical audiences. Professional Experience: Experience working with Microsoft Sentinel. Experience writing SIEM queries, constructing alert logic, and building dashboards. Experience integrating custom log sources into Microsoft Sentinel. An understanding of the information technology marketplace including modern security operations and Digital Forensics/Incident Response. Demonstrate a high level of flexibility and resourcefulness, being able to adapt to change and challenges. Experience communicating with a high level of professionalism. Previous technical experience owning and delivering complex, technical bodies of work. Evidence of working with or in the Enterprise market. A demonstrable track record of success. Ideally, experience working in or with a cyber security team. Ideally, experience working with Endpoint Detection and Response products such as Microsoft Defender ATP. How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report . Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals. *Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices. At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution.

Posted 1 month ago

Apply

7 - 12 years

9 - 14 Lacs

Bengaluru

Work from Office

Naukri logo

SOC SME - J48243 DUTIES & RESPONSIBILITIES Owns and leads individual incident response activities by analyzing security alerts and coordinating responses. Perform in-depth event review and analysis where appropriate. Analyze events, research the potential cause, and recommend a course of action Designs modern detective controls for emerging security risks and involved in innovative programs to enhance the firms security posture Hunts for indications of compromise across multiple technology platforms Continuously improves our alerting use cases and the threat hunting program Stays updated on the latest security trends, vulnerabilities, and threat actors to continually improve the organizations security posture Participates in on-call rotation schedule to provide 24/7 coverage for security incidents and emergencies Documents/generates reports detailing security incidents for security leaders and the business Conducts postmortem reviews of incident response (IR) activities, to facilitate continuous improvement Researches security trends with the goal of improving our processes and tools MINIMUM REQUIREMENTS Threat hunting experience Familiarity with known cyber security frameworks including NIST and Mitre, ATT&CK, and fundamentals of kill chain analysis Hands-on working knowledge of SIEM/SOAR/XDR Tools (Cortex XSIAM, Torq, etc.) PREFERRED EXPERIENCE Familiarity with the principles of network and endpoint security, current threat, and attack trends, and have working knowledge of security principles such as defense in depth Familiarity with performing security Incident Response (IR) activities in complex organizations, with familiarity of the following: Endpoint Detection and Response (EDR) or Endpoint Forensics, Network Log Analysis, Public Cloud Defense (Azure, AWS, GCP, etc.) Relevant industry certifications such as CISSP, GIAC, or CEH Scripting knowledge (Python, PowerShell, etc.) Forensic knowledge Ability to assess and prioritize risks associated with alerts and events based on both industry knowledge and organizational context Excellent analytical and problem-solving skills Strong communication skills, both spoken and written Required Candidate profile Candidate Experience Should Be : 7 To 14 Candidate Degree Should Be : BCA,BE-Comp/IT,BE-Other,BSc-Comp/IT,BSc-Other,BTech-Comp/IT,BTech-Other

Posted 2 months ago

Apply

2 - 6 years

3 - 6 Lacs

Mumbai

Work from Office

Naukri logo

Job DescriptionDescription: JOB DESCRIPTION of Endpoint Security Support Executive Job Title (Designation): Assistant Manager II Endpoint Security Support Executive Department: Information Technology Reports to: Senior Manager Experience: 2 /3 Years of work experience Required Qualification: Diploma in Engineering/Any Graduation Degree Preferred Qualification: Diploma in Engineering/Any Graduation Degree Skill, Knowledge & Trainings: Excellent command / highly proficient in spoken and written English Should have Exceptional customer service skills. Troubleshooting skills for Windows Operating Systems (OS). Should have working knowledge of softwares/tools used for management of Antivirus, Inventory, Application control, Windows Patches & Builds & Browser security. Proficient knowledge of computer systems and its peripherals. Microsoft trainings on Server / Client OS Fundamentals & Security preferred. Core Competencies: Excellent in teamwork with a strong sense of responsibility, accountability, reliability, and commitment Self-motivated & Self starter Ability to quickly adapt to new technologies Ability to thrive on challenges/pressure Ability to manage task flow and complete assigned project on time Demonstrate solid time management, communication, decision making, human relations, organizational skills and ability to set and manage priorities in a results-oriented way Have an analytical nature in order to determine the underlying reason for a particular problem. Solve non-standard issues that may require analytical and conceptual thinking Functional Competencies: Security Products Related Support for the following. Antivirus / EndPoint Detection & Response (EDR), Extended Detection & response (XDR). Endpoint Patch Management. Application Whitelisting Solution. Data Loss Prevention (DLP) Management. Performing Health-check exercises to ensure Compliance enforcement & adherence of all systems beings managed. Logging call with OEMs / Service providers for various issues and vulnerability related closure. Additional Competencies Strong technical knowledge of Microsoft product line including Windows & Client Operating Systems & MS Office IT asset tracking knowledge and related documentation. Expertise in advance level troubleshooting of incidents impacting end users. Capacity management of Servers hosted in virtualized environments. Adhere to system security practices. Support multiple users in a timely and efficient manner, following timely escalation process/procedures. Research, resolve, respond to, and document appropriate user inquiries, as requested. Escalate or re-assign issues as needed to appropriate resources for resolution. Good knowledge of Local Area Network infrastructure. Knowledge on basic handling of Virtual hosted Servers. Effective Co-ordination with various support teams/departments /vendors. Proficiency in Email and Telephonic communication. Ability to multi-task and prioritize workload Ability to make independent decisions when required for problem resolution. Job Purpose: Maintenance of Compliance of End user Windows systems by effective management of Security products of Antivirus, EDR & XDR, Windows Security Patches, Application Whitelisting solution & Data Leakage Solution. Area of Operations Key Responsibility Onsite & Remote Technical support to users & Onsite consultants Using centralized ticketing system for receiving & closing support related calls. Ensure support tickets are responded to in a timely manner and resolved in accordance to predefined company standards. Running day to day Server & Application checklists as part of Server / application management. Submission of monthly / quarterly reports for applications / servers being managed. Maintenance & Submission of various documentation & reports for Audits. Maintaining the build environments for all products and platforms. Adhere to Asset Management procedures, ensuring assets are fully tracked & information is maintained throughout its lifecycle in a timely fashion. Plan, execute and finalize procurement for technology spending across the organization. Experience in obtaining quotes from vendors and negotiations. Management of End user centralized Application Softwares used for Browser management, Asset Inventory management, Antivirus management. Patch management. Management of Voice Recording Systems (VRS). Management of onsite AMC vendor team to ensure call resolution is within agreed Service Level greement (SLA). Setup and support for hosting meeting via softwares such as Cisco Webex / Zoom. Audio / video conference systems setup such as Polycom / Blue Jeans. Vendor management. Replacement / Upgrade of hardware / software in line with organizations Asset Obsolescence policy & procedure. Assessment of VA/PT (Vulnerability Assessment / Penetration Test) reports and related work for closure of vulnerabilities. Day to Day investigation work related to SOC (Security Operation Centre) alerts & reports. Planning & Executing BCP for various applications being managed. Performing Health-check exercises to ensure Compliance enforcement & adherence of all systems beings managed. Provide technical support to onsite and remote personnel to ensure prompt restoration of service on a variety of systems and applications. Installation, configuration, maintenance and troubleshooting of existing endpoint environments including imaging and complete system setups.

Posted 3 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies