Its fun to work in a company where people truly BELIEVE in what they are doing!
Were committed to bringing passion and customer focus to the business.
Responsibilities:
- Perform real time security monitoring and incident response activities across the networks, leveraging a variety of tools and techniques
- Create and improve Incident Response Playbook
- Perform post incident reviews to improve and tune Halma s incident response capability
- Provide support to the team members while investigating alerts escalated by MSSP & work closely with Leads.
- Provide support in the area of Azure Active directory, Intune (conditional access/MDM), single sign on and Multifactor Authentication, Microsoft Defender for Endpoint, Microsoft Defender for Server, Office 365 email security.
- Monitor and respond to security incidents for Halma PLC and Subsidiary companies. Interact with end-users and IT Managers of Halma and Subsidiary companies during investigations, to raise awareness and training opportunities.
- Create and Maintain KB articles & SOPs for all the applications related to SOC to ensure security best practices in the team.
- Should be able to work on Incident and Security Reports Independently.
Experience (exposure):
- Total experience 3-5 years
- Exposure to security technologies including Incident Response, Microsoft Defender, Azure Sentinel.
- Knowledge of network fundamentals TCP/IP, SSL/TLS, DNS, DHCP.
- Hands on experience to Microsoft technologies like 365 ATP Defender, Endpoint Manager (Intune- conditional access/MDM/MAM) and KQL knowledge.
If you like wild growth and working with happy, enthusiastic over-achievers, youll enjoy your career with us!
Not the right fit Let us know youre interested in a future opportunity by clicking Introduce Yourself in the top-right corner of the page or create an account to set up email alerts as new job postings become available that meet your interest!