Jobs
Interviews

54 Ms Defender Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 5.0 years

5 - 9 Lacs

bengaluru

Work from Office

Role Overview Validate antivirus strategy for all elements of the IT environment, in accordance with the security policies and procedures. -Complete installation of all supported devices, including implementation, testing, reporting, alerting, and operational support resource training -Create, modify, test, and implement approved changes to supported devices based upon customer requirements -Verify system status and health including memory usage and disk space and validation of process execution -Maintain current standard operating procedures and documentation Role Responsibilities Experience with design, architecture and implementation of services in the areas of anti-virus and EDR. In-depth knowledge and experience with implementing and installing the following technologies: Experience in Implementing and managing Antivirus Projects including Installation, Configuration and troubleshooting of various Antivirus suites like MS Defender for Endpoint, Crowdstrike Sophos, Sentinalone, Trend Micro. Administration of AV/EDR server and Distributed Repositories. Configuring tasks, policies, scheduled scans and adding scan exclusions based on clients requirement. Performing daily activities, monitoring and remediation of servers/ workstations for virus infections and threats. EDR event logs monitoring and analysis. Vulnerability assessment of Critical Application servers. Excellent oral and written communication skills Evaluate/deconstruct malware through open-source and vendor provided tools Resolve client issues by taking the appropriate corrective action, or following the appropriate escalation procedures Utilize ticketing system and standard operating procedures for effective call processing and escalation to adhere to client Service Level Agreement (SLA) Perform all tasks required per shift including reporting, monitoring, and turnover logs Evaluate the type and severity of security events by making use of packet analyses and in-depth understanding of exploits and vulnerabilities Confidently communicate technical information to NTT Data Services client base and internal technical team members Participate in knowledge sharing with other analysts and develop efficient customer solutions Maintain a working knowledge of local security policies and execute general controls as assigned Role Requirements Three to five years experience with MS Defender for Endpoint, Crowdstrike Sophos, Sentinalone, Trend Micro etc.(Any two) Three to five years experience with Virus Scan, ePolicy Orchestrator -Three to five years experience with McAfee Host Intrusion Prevention or Cylance Host Intrusion Detection -Windows operating systems Internet connectivity and protocols (TCP/IP) -Enterprise Security Information Management systems -Networking knowledge and experience -Investigative and analytical problem solving skills Role Preferences Vendor Certifications from Symantec/McAfee/Cylance/Sophos/Microsoft/Crowdstrike Other Vendor Certifications like MS Defender, Trend Micro, Carbon Black Typical Years Work Experience 3-5 Years relevant work experience

Posted 12 hours ago

Apply

5.0 - 7.0 years

4 - 9 Lacs

thane, navi mumbai, mumbai (all areas)

Work from Office

Position - MS Defender - Endpoint (MDE) Specialist Job location :- Ghansoli Shift:- Rotational shift We are seeking a highly skilled and experienced L3 for handling EDR operations to our dynamic security team. The Ideal candidate will play a key role in advance threat detection, Incident response and responding to critical security incident and enhancing our endpoint security capabilities with EDR tools. Roles & Responsibilities Investigate and analyse sophisticated security alerts and events to determine root cause, scope and impact of security incidents. Provide technical expertise and guidance to junior analysts (L1, L2s), assisting with incident investigations, analysis and resolution. Develop and implement advanced detection and response strategies using Carbon Black EDR to enhance our overall security posture. Lead incident response efforts, including coordination with cross-functional teams and external stakeholders. Conduct in-depth analysis of endpoint data and logs to identify indicators of compromise (IOCs) and advanced attack techniques. Collaborate with threat intelligence teams to stay updated on emerging threats and tactics used by threat actors. Develop and maintain security playbooks, procedures and response plans for incident response and threat hunting. Assist in the tuning and optimization of Carbon Black EDR policies, SIEM rules and custom queries to improve detection efficacy. Stay abreast of industry best practices, emerging technologies and trends in endpoint security and threat detection. Provide regular reports and updates on security incident trends, analysis findings and mitigation efforts to stakeholders. Personal & TECH Skills: Good Team player. Possess Positive and learning attitude. Good Verbal and Written communication skills. Sense of Ownership, Priorities and Autonomous. At least one technical certification required (CEH, CompTIA Security+, CBCA, CSA etc.) Should have at least one cyber security certification (CISM, CCIR, ECSA, GCIH etc) Knowledge of banking business and information technology practices and trends in banking sector. Understanding of technology-related issues and how they might impact business; Ability to communicate effectively, both orally and in writing. Knowledge of banking business and information technology practices and trends in banking sector. Qualifications Graduation/Post graduation in, Computers, Information Systems, Computer Science, or Information. technology systems Experience:- Relavant 5 - 7 years of work experience of MS Defender in cyber security /Information security project, with skills including SIEM,SOAR, Endpoint Detection work experience with security posture. Assessment. Interested candidate can share our updated cv in mgs.rec@mizuho-cb.com if above details are matching to your current role. Preferred Candidates From Mumbai under 20 Kilometers Mizuho Global Services India Pvt. Ltd. 11th Floor, Q2 Building Aurum Q Park,Gen 4/1, Ttc,Thane Belapur Road ,MIDC Industrial Area, Ghansoli, Navi Mumbai- 400710.

Posted 2 days ago

Apply

12.0 - 22.0 years

5 - 15 Lacs

navi mumbai

Work from Office

Exp: Above 12yrs, relevant should be 7yrs L3 Roles and responsibilities. Education criteria: Mtech, Btech only Mandatory skills to be check- AV/EDR M365 Technologies Active Directory Azure AD Compliance Security Configurations, well versed with tackling vulnerabilities and act as advisor to fill the recommended gaps, Security assessment of the Active Directory, Windows Servers, End Points using various tools JD for MS Defender: Provide Platform Security Strategy for the organization. Security Advisory role in design of platform tools. Advisory role from security perspective in selection, design, and configuration of endpoint security, Microsoft technologies, like O365, Intune, Active Directory, AV/EDR etc. and formulate policies and processes to manage risk and interoperability. Assist in defining Security Policies & Standards for Server Security including for OS, Database, based on global security best practices including CIS benchmarks, OEM hardening guidelines, NVD etc. Provide overall security expertise and advise on secure deployment of servers. Strategize and formulate high and low-level monitoring mechanism for platform security technology and best practices, manage the organisations platform security strategy & controls and keep abreast of new technologies and capabilities. Strategize and formulate high and low-level monitoring mechanism for security posture of platform technology deployments and advise measures to improve them. Possess and maintain in-depth technical and business knowledge of aspects of endpoint security, Microsoft technologies like O365, Intune, Active Directory, AV/EDR etc Possess and maintain broad technical and business knowledge of aspects of security technologies including Cryptographic technologies, basics of networking etc. Provide Security advisory role during technology acquisition and project origination to assess security requirements and controls. Provide Security advisory role in implementation of platform technology procured. Taking proactive measures for enhancing the security posture of the Bank's platform technologies by studying the vulnerabilities issued/ published by various OEMs, internal and external agencies such as CERT, CSITE, CISA etc. Ensure service metrics relating to security and assurance that Infrastructure technology configurations are compliant. PowerShell scripting/reporting/ Automation experience would be good to have. Coordinate closely with the infrastructure security monitoring team to Strategize and formulate high and low-level monitoring mechanism for the security posture and to ensure implementation of security best practices.

Posted 3 days ago

Apply

5.0 - 7.0 years

3 - 8 Lacs

thane, navi mumbai, mumbai (all areas)

Work from Office

Position - MS Defender - Endpoint (MDE) Specialist Job location :- Ghansoli Shift:- Rotational shift WALKIN DRIVE:- 12th September 12pm to 5pm 13th September 9am to 12.30pm HR Spoc:- Ruchika HR We are seeking a highly skilled and experienced L3 for handling EDR operations to our dynamic security team. The Ideal candidate will play a key role in advance threat detection, Incident response and responding to critical security incident and enhancing our endpoint security capabilities with EDR tools. Roles & Responsibilities Investigate and analyse sophisticated security alerts and events to determine root cause, scope and impact of security incidents. Provide technical expertise and guidance to junior analysts (L1, L2s), assisting with incident investigations, analysis and resolution. Develop and implement advanced detection and response strategies using Carbon Black EDR to enhance our overall security posture. Lead incident response efforts, including coordination with cross-functional teams and external stakeholders. Conduct in-depth analysis of endpoint data and logs to identify indicators of compromise (IOCs) and advanced attack techniques. Collaborate with threat intelligence teams to stay updated on emerging threats and tactics used by threat actors. Develop and maintain security playbooks, procedures and response plans for incident response and threat hunting. Assist in the tuning and optimization of Carbon Black EDR policies, SIEM rules and custom queries to improve detection efficacy. Stay abreast of industry best practices, emerging technologies and trends in endpoint security and threat detection. Provide regular reports and updates on security incident trends, analysis findings and mitigation efforts to stakeholders. Personal & TECH Skills: Good Team player. Possess Positive and learning attitude. Good Verbal and Written communication skills. Sense of Ownership, Priorities and Autonomous. At least one technical certification required (CEH, CompTIA Security+, CBCA, CSA etc.) Should have at least one cyber security certification (CISM, CCIR, ECSA, GCIH etc) Knowledge of banking business and information technology practices and trends in banking sector. Understanding of technology-related issues and how they might impact business; Ability to communicate effectively, both orally and in writing. Knowledge of banking business and information technology practices and trends in banking sector. Qualifications Graduation/Post graduation in, Computers, Information Systems, Computer Science, or Information. technology systems Experience:- Relavant 5 - 7 years of work experience of MS Defender in cyber security /Information security project, with skills including SIEM,SOAR, Endpoint Detection work experience with security posture. Assessment. Interested candidate can share our updated cv in mgs.rec@mizuho-cb.com or can directly Walkin if above details are matching to your current role. Preferred Candidates From Mumbai under 20 Kilometers Mizuho Global Services India Pvt. Ltd. 11th Floor, Q2 Building Aurum Q Park,Gen 4/1, Ttc,Thane Belapur Road ,MIDC Industrial Area, Ghansoli, Navi Mumbai- 400710.

Posted 4 days ago

Apply

7.0 - 12.0 years

15 - 20 Lacs

pune

Work from Office

Minimum 12 years in Active Directory, Anti-Virus, Microsoft Intune, MS Defender for Endpoints (EDR/ATP),Office 365,Trend Micro above mentioned security tools in Banking, Financial Services and Insurance (BFSI)/ Non-Banking Financial Company (NBFC)/ Payment industries/ out of which at least past 5 years should have been in security tool deployments. Work location: Mumbai

Posted 4 days ago

Apply

8.0 - 13.0 years

6 - 12 Lacs

chennai

Hybrid

Role Summary: We are seeking an experienced Microsoft Security Engineer with strong hands-on expertise in Microsoft Sentinel (SIEM/SOAR) and Microsoft Intune (Endpoint Compliance & Access Control). The candidate will be responsible for designing, implementing, customizing, and supporting our SIEM dashboards, threat detection rules, connectors, and device compliance policies to strengthen our cybersecurity posture. This is a core technical role the candidate must have direct hands-on experience in end-to-end deployment of both Sentinel and Intune in enterprise environments. Key Responsibilities: Microsoft Sentinel (SIEM): Enable and configure data connectors: Azure Activity, AWS CloudTrail/GuardDuty, On-prem AD, Cisco ASA/Firepower, FortiGate firewalls. Deploy and manage Syslog collector VMs for firewall/AD log ingestion. Configure IoC/IoA threat intelligence feeds (MISP, OTX, Recorded Future, etc.). Build custom dashboards (Top Talkers, Incident Overview, Events per Device, Rule Hits, Device Coverage). Write and implement custom KQL correlation rules (beyond Microsoft built-ins). Tune rules to reduce false positives and align with SOC operational needs. Provide incident playbooks/runbooks for SOC team. Microsoft Intune (MDM): Review existing Intune configuration and optimize policies. Define and implement device onboarding (corporate devices + BYOD). Configure compliance validation policies (encryption, AV, OS patch levels). Define and implement conditional access (CA) policies for O365, SaaS apps, and internal systems. Integrate Intune with Defender for Endpoint and Sentinel for unified risk visibility. Generate compliance dashboards and audit-ready reports. Cross-Functions: Work with Architect/Lead to align design with security framework. Document all configurations, rules, dashboards, and policies. Conduct structured knowledge transfer sessions for SOC/IT teams. Support audit and regulatory readiness (ISO 27001, PDPL, GDPR, etc.). Required Skills & Experience: 8-12 years of hands-on experience in enterprise security engineering. Minimum 3+ years direct, practical experience with Microsoft Sentinel (KQL, connectors, dashboards, rules). Minimum 3+ years direct, practical experience with Microsoft Intune (compliance, CA, device onboarding). Strong expertise in Azure AD, Conditional Access, Defender for Endpoint integration. Proven experience writing custom KQL correlation rules (beyond out-of-box templates). Familiarity with Syslog/CEF ingestion for firewalls and AD logs. Experience integrating multi-cloud (Azure + AWS) into Sentinel. Solid understanding of IoC/IoA feeds and Threat Intelligence integrations. Strong documentation and KT delivery experience. Certifications preferred: SC-200: Microsoft Security Operations Analyst SC-300: Microsoft Identity and Access Administrator SC-400: Microsoft Information Protection MS-101/MD-101: Microsoft 365 Enterprise Admin / Modern Desktop Administrator Soft Skills: Strong communication and stakeholder-facing ability. Ability to lead discussions with security teams and senior management. Problem-solving mindset balancing business risk vs technical enforcement. Can work independently and deliver under tight timelines.

Posted 5 days ago

Apply

4.0 - 9.0 years

0 - 3 Lacs

pune, bengaluru, mumbai (all areas)

Hybrid

Role & responsibilities SME will be responsible for the configuration, management, monitoring, analysis, and threat hunting related to our endpoint security suite, which includes CrowdStrike Falcon, Microsoft Defender Antivirus (ATP), Microsoft Defender Firewall, Microsoft BitLocker, and Tanium Enforce. This role requires a deep understanding of endpoint security best practices and the ability to translate them into robust endpoint protection strategies. Responsibilities: Configuration and Management: Deep dive into the functionalities of CrowdStrike Falcon, Microsoft Defender Antivirus, Microsoft Defender Firewall, and Microsoft BitLocker. Collaborate with security engineers to configure and optimize these tools for maximum protection against evolving threats. Leverage Tanium Enforce to centrally manage and enforce endpoint security policies across the organization's devices. Stay updated on the latest threat intelligence and adjust configurations proactively to mitigate emerging risks. Monitoring and Analysis: Proactively monitor endpoint security alerts from CrowdStrike Falcon and Microsoft Defender Antivirus, identifying potential threats and incidents. Investigate security incidents related to endpoints, working with internal teams to understand the root cause, remediate the issue, and prevent future occurrences. Analyze endpoint security data to identify trends, suspicious activities, and potential vulnerabilities. Generate reports and provide insights into the effectiveness of your endpoint security posture. Threat Hunting: Utilize advanced threat hunting techniques within CrowdStrike Falcon to proactively identify and respond to hidden threats within the network. Leverage Tanium Enforce for large-scale endpoint investigations and threat hunting activities. Collaborate with security analysts to develop and implement effective threat hunting strategies. Collaboration and Communication : Work closely with security engineers, system administrators, and IT operations to ensure seamless integration of endpoint security solutions with existing infrastructure. Participate in security awareness training programs to educate employees on endpoint security best practices. Maintain clear and concise documentation of endpoint security configurations, policies, and procedures for knowledge sharing and future reference. Qualifications : Minimum 8-10 years of experience in information security or a related field, with a focus on endpoint security. Proven experience in configuring, managing, and monitoring endpoint security solutions like CrowdStrike Falcon and Microsoft Defender suite (AV, Firewall). Experience with endpoint management tools. Strong understanding of endpoint threats, vulnerabilities, and malware analysis techniques. Excellent analytical, problem-solving, and critical thinking skills. Experience with threat hunting methodologies and tools is a plus. Strong written and verbal communication skills. Ability to work independently and as part of a team in a fast-paced environment Preferred Skills : Experience with scripting languages (Python, PowerShell) is a plus. Experience with security frameworks (NIST CSF, PCI DSS) is a plus. Strong understanding of network protocols and data exfiltration techniques. Certifications in security (CISSP, Security+, CCNA Security) are a plus.

Posted 1 week ago

Apply

5.0 - 8.0 years

3 - 15 Lacs

bengaluru

Work from Office

Sr. Endpoint Security Engineer Job Description If you have Endpoint Security Product experience as a Technical Support Engineer, reach out for a more detailed JD. We are looking for immediate joiners. We are NOT looking for SOC Analysts! Work from home Health insurance Provident fund

Posted 1 week ago

Apply

3.0 - 7.0 years

0 Lacs

maharashtra

On-site

The ideal candidate for the position should have expertise in Microsoft Sentinel (Not Azure Sentinel) along with strong skills in KQL, Incident Response, MS Defender, Content Management, MITRE ATT&CK, MITRE DEFEND, and Kusto Query Language. Additionally, experience in Threat Intelligence, Threat Hunting, Custom Workbooks, and familiarity with the Microsoft cloud platform Azure is required. The candidate should have a notice period of 0-30 days and hold a graduate degree. The job location options include Bangalore, Pune, Mumbai, Hyderabad, Chennai, Gurgaon, and Noida. For further details and application submission, please reach out to career@krazymantra.com.,

Posted 2 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

As an Infoscion, your primary responsibility is to address customer issues, diagnose problem areas, design innovative solutions, and facilitate deployment to ensure client satisfaction. You will take ownership of parts of proposal documents and provide inputs in solution design based on your expertise. Your tasks will include planning configuration activities, configuring products as per the design, conducting conference room pilots, and assisting in resolving queries related to requirements and solution design. Additionally, you will conduct solution/product demonstrations, POC (Proof of Technology) workshops, and prepare effort estimates that align with customer budgetary requirements and organizational financial guidelines. In this role, you will actively lead small projects and contribute to unit-level and organizational initiatives, aiming to deliver high-quality, value-adding solutions to customers. If you believe you can contribute to helping our clients navigate their digital transformation journey, this is the right opportunity for you. Technical Requirements: - Primary Skills: All Firewalls (Palo Alto, Cisco), Cyberark, MS Defender, Checkpoint - Network Security: Firewalls (Checkpoint, Juniper), Network Intrusion Prevention System (NIPS), Virtual Private Network Firewall - Technology: Infrastructure Security, Network Firewall and Media (Palo Alto) Additional Responsibilities: - Develop value-creating strategies and models to drive innovation, growth, and business profitability for clients - Possess good knowledge of software configuration management systems - Stay informed about the latest technologies and industry trends - Demonstrate logical thinking, problem-solving skills, and collaboration abilities - Understand financial processes for different project types and pricing models - Identify process improvement areas and recommend technology solutions - Have expertise in one or two industry domains - Possess client interfacing skills and project/team management capabilities Preferred Skills: - Domain: Network (Network Security Firewall & Policies), Technology: Infrastructure Security (Cloud Security), Technology: Data Security (Data Security - ALL),

Posted 2 weeks ago

Apply

5.0 - 7.0 years

0 Lacs

hyderabad, telangana, india

On-site

Prym Shared Services is seeking a dynamic and results-oriented candidate who specializes in cybersecurity to join its growing team. The successful candidate will be responsible for cybersecurity processes and will be tasked with building a cybersecurity unit. The high performing candidate should work to the ISO27000 standard(s) for information security management and demonstrate a preference for emphasizing governance and management over solely technical controls. This role requires a continuous improvement mindset, strong risk management skills and the ability to navigate an international environment. KEY RESPONSIBILITIES Responsibility for the cyber security incident response process Technical and organizational responsibility for the process Weekly and monthly reporting of incidents Management of escalations to the Director IT Services and CIO Analyze cyber security incidents, especially in the area of MS Defender and CrowdStrike Establishment and further development of the cyber security unit together with Director IT Services Provide technical support and guidance to users and IT staff. IDEAL CANDIDATE PROFILE Professional Competencies (Qualification, Experience & Skills): 5 years of professional experience in the field of cyber security Experience in the field of Microsoft technologies and infrastructure Experience in the area of incident management for the section of cyber security Excellent troubleshooting skills and ability to grasp issues quickly, even in stressful situations High process affinity for cyber security Interest in building a Cyber Security Operations unit Affinity and assertiveness in the field of matrix organizations High affinity for the area of IT governance Working according to the ITIL V4 and ISO27000 standard. Prioritization and time management: Realistic goals and deadlines, delegating tasks where necessary and making decisions about the use of time and resources. Very good English language skills (written and spoken). Personal Qualities (Attitude, Character, & Style): Analytical, systematic, and conceptual way of working and thinking. Excellent communication skills combined with a strong team spirit. Achiever and leadership attitude. Proactive, performance, service, and result oriented. Able to work under pressure, structured, flexible, team player, reliable. Ability to quickly grasp and apply new technological advancements, as the candidate could be sent to global headquarters for implementation of cyber security. Show more Show less

Posted 2 weeks ago

Apply

4.0 - 7.0 years

3 - 15 Lacs

bengaluru

Work from Office

Sr. Endpoint Security Engineer Job Description If you have Endpoint Security Product experience as a Technical Support Engineer, reach out for a more detailed JD. We are looking for immediate joiners. Work from home Health insurance

Posted 2 weeks ago

Apply

3.0 - 7.0 years

0 Lacs

chennai, tamil nadu

On-site

The ideal candidate should possess experience in API development using Java or Python, as well as UI development using Angular JS or React JS. Additionally, having a strong understanding of CI/CD processes, Anti-malware, Endpoint protection, XDR, and IPS/IDS tools is essential. Familiarity with working on SaaS platforms like MS Defender and Proofpoint for Email Security, along with their APIs, and cloud computing services such as GCP, AWS, and Azure is required. A relevant Bachelor's or Master's Degree in engineering or computer applications is preferred. The candidate should have at least 5+ years of experience in UI development using Angular JS, React, or Backstage, and API development using Python Flask, FastAPI, or Java. Moreover, the candidate should have 4+ years of experience in developing CI/CD pipelines and working with GCP, Azure, or AWS cloud services while configuring infrastructure using tools like Terraform, Ansible, etc. Candidates with 3+ years of experience as a Security Engineer focusing on tools such as MS Defender, Proofpoint for Email Security, and UEBA will be given preference. Experience working in an Agile development environment and knowledge of cybersecurity principles, practices, and technologies is a plus. Desired Certifications include GCP Professional Cloud Security Engineer, GCP Developer Certification, Security Certifications, and experience with SaaS products. The candidate should be capable of designing and developing self-service portals (UI), security central websites using Angular JS, React JS, Backstage, and backed APIs using Java or Python. Developing CI/CD pipelines on Tekton and deploying to GCP cloud is also part of the responsibilities. The candidate will collaborate with product managers, Subject Matter Experts (SMEs), and anchors to create prototypes, conduct Proof of Concepts (PoCs), and work with Platform vendors to automate deployments and manual tasks through understanding APIs and integration patterns. Automation of testing using tools like Playwright and Postman, along with providing technical direction and addressing security issues to various infrastructure and application support teams, is essential. The candidate will also be required to design, test, and implement security policies for critical Enterprise Infrastructure, automate repeatable tasks and workflows for process efficiency by developing APIs/scripts, and deploy them to the cloud. Implementing Site Reliability Engineering (SRE) for Platform services to achieve availability and reliability is part of the role.,

Posted 2 weeks ago

Apply

8.0 - 13.0 years

16 - 22 Lacs

gurugram

Remote

Role & responsibilities Lead - Endpoint Security & Tooling The Lead - Endpoint Security & Tooling plays a pivotal role in overseeing and optimizing a diverse array of endpoint security tools and technologies. The Lead will spearhead the configuration, troubleshooting, and maintenance of security tools, develop and implement robust security policies, conduct in-depth threat intelligence analysis, design secure endpoint architectures, and assess and mitigate risks to endpoints. Roles and Responsibilities Expertise in Security Tools: Lead the management and optimization of the Zscaler suite of applications, including Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), Browser Isolation, Firewall (Tunnel 2.0), Deception, and other endpoint security tools. Demonstrate proficiency in Microsoft Intune for advanced endpoint security management, encompassing policy configuration, device management, compliance enforcement, and performance optimization. Exhibit familiarity with Endpoint Detection and Response (EDR) solutions, encompassing advanced threat detection, configuration management, policy enforcement, and performance monitoring. Display proficiency in Application Control solutions for managing and controlling application execution on endpoints, including policy management and application behavior monitoring. Endpoint Security Tooling Management: Oversee the configuration, troubleshooting, and maintenance of security tools to ensure optimal performance and effectiveness. Conduct regular assessments and audits of endpoint security configurations. Stay updated with new releases, versions, changes, and breaking changes in Microsoft Intune and other endpoint security tools. Assess the impact of new releases and changes on endpoints and security policies. Security Policy Development: Lead the development and implementation of comprehensive endpoint security policies, configurations, and best practices. Ensure strict compliance with industry standards and regulations. Secure Architecture Design: Apply expert security architecture principles to design and implement highly secure endpoint architectures. Implement sophisticated network segmentation, access controls, and secure configurations for endpoints. Risk Assessment and Mitigation: Conduct comprehensive risk assessments for endpoints to identify potential risks and vulnerabilities. Lead the implementation of robust risk mitigation strategies and controls to reduce risks to endpoints. Communication and Collaboration: Collaborate seamlessly with cross-functional teams, including IT, security, compliance, and business stakeholders. Communicate complex technical concepts related to endpoint security effectively to non-technical audiences. Continuous Learning and Adaptability: Stay at the forefront of the latest trends, threats, and technologies in endpoint security. Adapt swiftly to the evolving security landscape and emerging threats in endpoint security. Problem-solving and Critical Thinking: Apply advanced problem-solving skills and critical thinking to analyze and resolve complex security issues related to endpoints. Lead the troubleshooting of endpoint security incidents and drive the development of innovative solutions. Preferred candidate profile Bachelor's degree in Computer Science, Information Technology, or related field (Master's degree preferred). Proven leadership experience (7+ years) in endpoint security management, including extensive expertise in Microsoft Intune and other endpoint security tools. Advanced understanding of endpoint security principles, technologies, and best practices. Familiarity with network security concepts, firewalls, VPNs, and secure web gateways. Outstanding analytical, problem-solving, and communication skills. Ability to lead collaboratively in a team environment, manage multiple projects simultaneously, and drive results effectively. Advanced skills in threat intelligence analysis, incident response, security architecture design, risk assessment, communication, continuous learning, adaptability, problem-solving, and critical thinking. Good to have : Certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Endpoint Security Professional (CESP). Benefits Benefits which make us unique At EZ, we know that great people are what makes a great firm. We value our people and offer employees a comprehensive benefits package. Learn more about what working at Egon Zehnder can mean for you! Benefits Highlights: 5 Days working in a Fast-paced work environment Work directly with the senior management team Reward and Recognition Employee friendly policies Personal development and training Health Benefits, Accident Insurance Potential Growth for you! We will nurture your talent in an inclusive culture that values diversity. You will be doing regular catchups with your Manager who will act as your career coach and guide you in your career goals and aspirations. EZ commitment to Diversity & Inclusion Egon Zehnder aims for a diverse workplace and strive to continuously lead with our firm values. We respect personal values of every individual irrespective of race, national or social origin, gender, religion, political or other opinion, disability, age and sexual orientation as warranted by basic rights enshrined in the UN Declaration of Human Rights. We believe diversity of our firm is central to the success and enables us to deliver better solutions for our clients. We are committed to creating an inclusive environment and supportive work environment, where everyone feels comfortable to be themselves and treated with dignity and respect and there is no unlawful discrimination related to employment, recruitment, training, promotion, or remuneration. Egon Zehnder is an Equal Opportunity Employer Egon Zehnder provides equal employment opportunities to all applicants and employees without regard to race, color, creed, religion, sex, sexual orientation, gender identity, marital status, citizenship status, age, national origin, disability, or any other legally protected status and to affirmatively seek to advance the principles of equal employment opportunity.

Posted 2 weeks ago

Apply

8.0 - 10.0 years

9 - 13 Lacs

bengaluru

Work from Office

Experience: 8+ YearsJob Description Identity & Access Management (IAM) Manage and support identity platforms including Active Directory, Azure AD, and Okta Implement RBAC, least privilege principles, and automated provisioning/deprovisioning Conduct periodic access reviews and support access certification processes Integrate IAM controls into application and cloud environments Security Engineering & Tooling Administer and optimize Mimecast, OKTA, Microsoft Defender, Intune, and other endpoint/cloud security tools Manage SIEM tools including rule tuning, log ingestion, and correlation Implement and automate application code reviews using security scanning tools (eg, SAST, DAST) Perform application security testing and contribute to threat modeling and risk evaluations Lead cloud control monitoring, data protection measures, and compliance reporting

Posted 3 weeks ago

Apply

5.0 - 10.0 years

13 - 17 Lacs

gurugram

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Endpoint Extended Detection and Response Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). You will be responsible for ensuring the successful execution of projects and managing the delivery team. Your typical day will involve overseeing project implementation, collaborating with multiple teams, making key decisions, and providing solutions to problems for your team and across multiple teams. Project Role Description:Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Roles & Responsibilities:Assists in EDR/AV platform design, testing and implementation.Deep expertise on EDR/AV installation for data enrichment and policy configurations.Hands on experience in working with assets, especially supporting EDR/AV deployment in SaaS / OnPrem environment.Troubleshoot EDR/AV platform issues.Monitor the EDR/AV infrastructure for capacity planning, system health, availability, and optimization.Verify custom reports, manage asset groups, policies and validate with clients.Maintain a close partnership with EDR/AV vendor on feature requests, upgrade planning, and product roadmap alignment.Perform supporting tasks such as system hardening, high availability configurations, and developing backup strategies.Identify and implement Automation opportunities in project.Review and apply any newly available and applicable updates on EDR/AV components routinely.Troubleshoot issues with EDR/AV sources or systems with vendor, and report system defects as needed.Coordinate & lead the technical discussions with Client/vendors.Identify root cause of EDR/AV platform incidents.Provide day to day operational support for Endpoint Security solution having expert level knowledge of Fault Management like Identify and Classify issues.Candidate should have knowledge of backup and restoration for EDR/AV configuration as per policy defined.Create various reports for remediation, change tracking and on demand basis.Very good Understanding for Endpoint Logs to investigate any incidents and suggest remediations. Technical Experience:Expert level experience with deployment, maintenance and operations of one or more major Endpoint Security Products, primarily McAfee alongwith Symantec, TrendMicro, MS Defender, CrowdStrike, Carbon Black etc.Must have experience on Endpoint Security management , policy management , Alert triage , managing EDR platform (admin) , compliance reporting.Must have experience in designing Standard Operating Procedures.Must have the understanding on ITSM process i.e., Incident & change management process.Good to have experience in the solution build and design documentation. Professional Attributes:Strong communication and presentation skillEvaluate and validate the custom reports and log source groups as per business requirement.At least 7+ years of experience in Information Security, Risk Management, Infrastructure Security and Compliance5+ years of hands-on experience on EDR administration, development and troubleshooting with good Understanding on EDR/AV environments. Mid-level expertise in UNIX, Linux, and Windows Project/program management experienceExcellent time management and problem-solving skills Professional & Technical Skills: - Must Have Skills: EDR/AV and Antivirus Skills (Traditional or Next-Gen)- Tools Proficiency:CrowdStrike, Defender for Endpoint- Strong understanding of cloud security principles and practices.- Experience with security frameworks such as NIST, ISO 27001, or CIS.- Familiarity with incident response and threat hunting methodologies.- Knowledge of compliance requirements related to cloud security. Additional Information:- The candidate should have minimum 7 years of experience in Endpoint Extended Detection and Response.- Experience working in a diversified and virtual environment.- This position is based at our Gurugram office.- A 15 years full time education is required. Educational Qualification:BE / BTECH Qualification 15 years full time education

Posted 3 weeks ago

Apply

5.0 - 10.0 years

8 Lacs

Mumbai

Work from Office

Role & responsibilities 5 to 7 years of work experience in cyber security /Information security project, with security posture. Assessment At least one technical certification required (CEH, CompTIA Security+, CBCA, CSA etc.) Should have at least one cyber security certification (CISM, CCIR, ECSA, GCIH etc.) Lead and manage advanced threat detection and response efforts using carbon black EDR across our clients endpoints. Investigate and analyze sophisticated security alerts and events to determine root cause, scope and impact of security incidents. Provide technical expertise and guidance to junior analysts (L1, L2s), assisting with incident investigations, analysis and resolution Develop and implement advanced detection and response strategies using Carbon Black EDR to enhance our overall security posture. Lead incident response efforts, including coordination with cross-functional teams and external stakeholders. Conduct in-depth analysis of endpoint data and logs to identify indicators of compromise (IOC) and advanced attack techniques. Collaborate with threat intelligence teams to stay updated on emerging threats and tactics used by threat actors. Develop and maintain security playbooks, procedures and response plans for incident response and threat hunting. Assist in the tuning and optimization of Carbon Black EDR policies, SIEM rules and custom queries to improve detection efficacy. Contact Person: Ackshaya Email ID: ackshaya@gojobs.biz

Posted 1 month ago

Apply

12.0 - 18.0 years

20 - 25 Lacs

Mumbai, Mumbai (All Areas)

Work from Office

Role & responsibilities Minimum 12+ years in above mentioned security tools in Banking, Financial Services and Insurance (BFSI)/ Non-Banking Financial Company (NBFC)/ Payment industries/ out of which at least past 5 years should have been in mentioned security tool deployments. Preferred candidate profile MS Defender for Endpoints (EDR/ATP),Office 365,Active Directory, Microsoft Intune, Anti-Virus, Trend Micro

Posted 1 month ago

Apply

3.0 - 5.0 years

3 - 5 Lacs

Bengaluru, Karnataka, India

On-site

NTT DATA strives to hire exceptional, innovative and passionate individuals who want to grow with us. If you want to be part of an inclusive, adaptable, and forward-thinking organization, apply now. We are currently seeking a Crowdstrike Security Analysis Senior Specialist to join our team in Bengaluru, Karn?taka (IN-KA), India (IN). Job Title Information Security Senior Specialist Role Overview Validate antivirus strategy for all elements of the IT environment, in accordance with the security policies and procedures. -Complete installation of all supported devices, including implementation, testing, reporting, alerting, and operational support resource training -Create, modify, test, and implement approved changes to supported devices based upon customer requirements -Verify system status and health including memory usage and disk space and validation of process execution -Maintain current standard operating procedures and documentation Role Responsibilities Experience with design, architecture and implementation of services in the areas ofanti-virus In-depth knowledge and experience with implementing and installing the following technologies: Experience in Implementing and managing Antivirus Projects including Installation, Configuration and troubleshooting of various Antivirus suites like McAfee ePO 4.6, ePO 5.3. Administration of ePO server and Distributed Repositories. Configuring tasks, policies, scheduled scans and adding scan exclusions based on client's requirement. Performing daily activities, monitoring and remediation of servers/ workstations for virus infections and threats. ePO event logs monitoring and analysis. Vulnerability assessment of Critical Application servers. Excellent oral and written communication skills Evaluate/deconstruct malware through open-source and vendor provided tools Resolve client issues by taking the appropriate corrective action, or following the appropriate escalation procedures Utilize ticketing system and standard operating procedures for effective call processing and escalation to adhere to client Service Level Agreement (SLA) Perform all tasks required per shift including reporting, monitoring, and turnover logs Evaluate the type and severity of security events by making use of packet analyses and in-depth understanding of exploits and vulnerabilities Confidently communicate technical information to NTT Data Services client base and internal technical team members Participate in knowledge sharing with other analysts and develop efficient customer solutions Maintain a working knowledge of local security policies and execute general controls as assigned Role Requirements Three to five years experience with Cylance Antivirus and Cylance Endpoint Protection, MS Defender. Experience with MS Defender ,Purview, Vectraadministrator and Monitoring Three to five years experience with McAfee Virus Scan, ePolicy Orchestrator -Three to five years experience with McAfee Host Intrusion Prevention or Cylance Host Intrusion Detection -Windows operating systems Internet connectivity and protocols (TCP/IP) -Enterprise Security Information Management systems -Networking knowledge and experience -Investigative and analytical problem solving skills Role Preferences Vendor Certifications fromMS Defender ,Purview, Vectra Other Vendor Certifications like MS Defender, Trend Micro, Carbon Black Typical Years Work Experience 3-5 Years relevant work experience

Posted 1 month ago

Apply

6.0 - 11.0 years

15 - 25 Lacs

Hyderabad

Work from Office

Sr. Managed Services Engineer Microsoft (SHI Complete and Expert support) Location: Hyderabad Experience: 8+ Years Level: L3 Managed Services Shift: 24/7 Rotational Support Notice Period: Immediate Joiners Preferred / Max 30 Days Overview: Managed Services Engineer is responsible for supporting, building, managing, configuring and implementing solutions within the customers managed platform or services under SHI’s management. They must aim to achieve optimal system performance across all supported platforms. The engineer will collaborate with internal and external customers, lead IT projects, monitor performance, optimize environments, stay updated on industry trends, and seek personal and professional growth Responsibilities: Include, but not limited to: Build, implement and support a wide range of solutions using platform services for both internal and customer purposes. Manage and configure platform infrastructures, applications, and collaboration tools. Contribute and take lead on MSP Projects, collaborating with internal/external customer and ensuring timely delivery and alignment with business objectives. Contribute, develop, and take lead on service improvement initiatives, collaborating with internal/external customer and ensuring timely delivery and alignment with business objectives. Engaging directly with customers through status updates, change requests, meetings, incident responses, and projects, while understanding their needs and success criteria. Monitoring and diagnosing performance issues to ensure optimal system performance. Optimizing existing environments and standardizing processes using/developing standard operating procedures (SOPs). Stay updated with industry trends, emerging technologies, and best practices. Continuously seek opportunities for personal and professional growth. Track time and document work out of SHI’s PSA system, submitting weekly timesheets. Align with leadership and organization initiatives. Mentor/Train lower tier engineering employees and service desk employees. Involvement in a wide range of required Audit’s. SOW Scoping, development, and build out assistance on a per-request basis. Ownership, alignment, assessment (at times delivery) of customer Agile Cloud Engineering requests. Assistance at all lower level’s where needed based on resource constraints Migration of Email from O365 to O365 tenant Migration of Email from Gsuit to O365 tenant Application packaging and deployment from SCCM OS deployment from SCCM Administration and management of MS Defender for endpoint Administration and management of MS purview Azure resources management Work closely with L2 and L1 teams along with Vendor support coordination Please share your CV to Annapurna.t@locuz.com Regards, Annapurna Manager – Talent Acquisition. https://www.locuz.com/

Posted 1 month ago

Apply

4.0 - 8.0 years

15 - 17 Lacs

Pune

Hybrid

About Client Hiring for One of the Most Prestigious Multinational Corporations! Job Description Job Title: Endpoint security Engineer Required skills and qualifications : Endpoint MS defender Qualification : Any Graduate or Above Relevant Experience :4+ yrs Location : Pune CTC Range : 15 to 17 LPA (fixed) Notice period : immediate joiners /Currently serving Mode of Interview : Virtual Mode of Work : Hybrid If you are interested share the below: Name as per your pan card: Mobile No: Email ID: Current and perferred location: Current and Expected CTC: Total and Relevent Experience: Official notice period: (if serving/immediate - LWD) Gayatri G Staffing analyst - IT recruiter Black and White Business solutions PVT Ltd Bangalore, Karnataka, INDIA gayatri@blackwhite.in / www.blackwhite.in +91 8067432430

Posted 1 month ago

Apply

2.0 - 6.0 years

2 - 6 Lacs

Mumbai, Maharashtra, India

On-site

Responsibilities: SOC Monitoring: Provide core Security Operations Center (SOC) monitoring services for client environments, ensuring continuous vigilance against security threats. Tool Proficiency: Utilize and operate various SOC tools, including FortiSOAR, IBM QRadar, MS Defender, and Cisco Umbrella , for effective threat detection and response. L1 Support: Provide initial (L1) support for security incidents within client environments, triaging alerts and performing preliminary investigations. Incident Response Assistance: Assist in the initial phases of incident response, following established protocols to contain and escalate security incidents. Alert Analysis: Analyze security alerts and logs from various sources, distinguishing between false positives and genuine threats. Documentation: Maintain accurate records of security incidents, investigations, and resolutions. Communication: Effectively communicate security findings, incidents, and recommendations through good verbal and written communication skills. Shift Work: Be open and flexible to work in shifts as per operational requirements. Required Skills: Proficiency in FortiSOAR, IBM QRadar, MS Defender, and Cisco Umbrella . Core SOC Monitoring experience. Good verbal and written communication skills. Openness to work in shifts and flexibility in work approach.

Posted 1 month ago

Apply

10.0 - 14.0 years

0 Lacs

chennai, tamil nadu

On-site

As a Network Security Operations professional at Arthur Grand Technologies, you will be responsible for designing and maintaining secure, high-performance network architectures with policy compliance. With over 10 years of experience in Secops/Network Security Operations, you will demonstrate expertise in tools such as Sentinel, MS Defender, Palo Alto Firewalls (HA), IDS/IPS, and vulnerability management tools. Your role will involve leading advanced incident response, triage, investigations, and documentation, as well as developing incident plans, threat hunts, and detection use cases using SIEM and threat intelligence. To enhance detection capabilities, you will be involved in rule tuning, hunting strategies, and vulnerability analysis. Collaboration with teams, mentoring analysts, and ensuring timely resolution of incidents will be key aspects of your responsibilities. Preferred certifications for this role include GCIH, CISSP, and Security+. Arthur Grand Technologies is a reputable provider of staffing and technology consulting services, managed by professionals with extensive experience in top consulting firms. As an Equal Opportunity Employer, we value our employees and contractors, offering challenging work, market-relevant benefits, and opportunities for professional growth. If you are enthusiastic about joining a dynamic team and possess the required qualifications, please send your resume to indhu.s@arthurgrand.com for immediate consideration. Thank you for considering Arthur Grand Technologies. We eagerly anticipate your response. Best Regards, Indhu Arthur Grand Technologies Inc Job Type: Full-time Schedule: Monday to Friday Work Location: In person,

Posted 2 months ago

Apply

5.0 - 9.0 years

0 Lacs

chennai, tamil nadu

On-site

As a Secops/Network Security Operations professional at Arthur Grand Technologies Inc in Chennai, your primary responsibility will be to design and maintain secure, high-performance network architectures that comply with policies. You will be proficient in utilizing tools such as Sentinel, MS Defender, Palo Alto Firewalls (HA), IDS/IPS, and other vulnerability management tools to ensure the security of the network. In this role, you will lead advanced incident response activities, including triage, investigations, and documentation. You will be tasked with developing incident plans, conducting threat hunts, and creating detection use cases using SIEM and threat intelligence. Additionally, you will be responsible for enhancing detection capabilities through rule tuning, implementing hunting strategies, and conducting vulnerability analysis. Collaboration with cross-functional teams will be a key aspect of this role, where you will also provide mentorship to analysts and ensure the timely resolution of security incidents. Preferred certifications for this position include GCIH, CISSP, and Security+. If you are looking to work in a dynamic environment that values security expertise, collaboration, and continuous learning, Arthur Grand Technologies Inc is the place for you. Join us in our mission to maintain a secure network environment and protect our organization from potential threats. Please note that this is a full-time, permanent position with a UK shift schedule and requires in-person work at our Chennai location. We look forward to welcoming you to our team. Best regards, Steve Jackson Arthur Grand Technologies Inc Arthur Grand Technologies is an Equal Opportunity Employer (including disability/vets),

Posted 2 months ago

Apply

7.0 - 12.0 years

15 - 22 Lacs

Chennai

Work from Office

Role & responsibilities 6+ years of experience in cybersecurity operations with solid L3-level incident handling. Hands-on expertise with endpoint security solutions (CrowdStrike, SentinelOne, Microsoft Defender ATP, Carbon Black, etc.). Strong proficiency in conducting demos and technical evaluations for R&D or pre-deployment scenarios. In-depth understanding of SIEM platforms, EDR, network security, and intrusion detection. Experience with malware analysis, threat intelligence, and reverse engineering is a plus. Knowledge of Windows, Linux, and cloud environments (AWS/Azure/GCP). Familiarity with security frameworks (NIST, MITRE ATT&CK, SANS). Scripting skills (Python, PowerShell, Bash) for automation. Relevant certifications preferred: CISSP, OSCP, CEH, GCIA, GCIH .

Posted 2 months ago

Apply
Page 1 of 3
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies