Jobs
Interviews

2 Shell Scripting. Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 8.0 years

20 - 22 Lacs

bengaluru

Work from Office

Key Skills: AWS, Core Java, Java, Microservices, Spring Boot, Kafka. Roles & Responsibilities: Design, develop, and maintain backend components and services using Java and Spring Boot. Implement microservices architecture to enhance application scalability and performance. Collaborate with cross-functional teams to define, design, and ship new features. Ensure the performance, quality, and responsiveness of applications. Troubleshoot and debug applications to optimize performance. Participate in code reviews and maintain coding standards. Stay updated with emerging technologies and industry trends. Experience Required: 3-8 years of proven experience in backend development using Core Java and Spring Boot. Strong expertise in developing and deploying scalable microservices in AWS environments. Experience in troubleshooting, debugging, and performance tuning of Java applications. Involvement in cross-functional collaboration for feature development and delivery. Exposure to Kafka or similar messaging systems is a plus. Education: B.E., B.Tech.

Posted Date not available

Apply

1.0 - 3.0 years

8 - 14 Lacs

bengaluru

Work from Office

Key Skills: Endpoint Security, Crowdstrike, EDR, Sentinel, Shell Scripting. Roles & Responsibilities: Monitor security alerts and events from EDR and SIEM tools. Perform initial triage, investigation, and escalation of security incidents. Conduct threat hunting across endpoints and cloud workloads using the MITRE ATT&CK framework. Assist in building an internal Cyber Threat Intelligence (CTI) repository. Analyze malware behaviors and artifacts including hashes, domains, persistence, and lateral movement. Perform incident documentation, evidence gathering, and ticket management. Build and customize detection rules and logic. Conduct weekly calls with clients to discuss detections, incidents, and Managed Detection and Response (MDR) updates. Manage multiple client environments while ensuring adherence to Service Level Agreements (SLAs). Hands-on experience with SIEM tools such as Microsoft Sentinel (mandatory) and Exabeam (preferred). Hands-on experience with EDR tools such as Microsoft Defender for Endpoint (mandatory) and CrowdStrike (mandatory). Basic understanding of scripting languages (preferred). Strong understanding of threat actors, malware types, and the attack lifecycle. Familiarity with the MITRE ATT&CK framework. Basic knowledge of PowerShell or KQL (Kusto Query Language) for log analysis. Experience in triaging phishing, endpoint, or insider alerts. Excellent communication skills and a collaborative team mindset. Experience Required: 1.5-3 years of experience in real-time monitoring and triaging security incidents using EDR and SIEM tools. Proven experience in threat hunting and malware analysis. Familiarity with industry-standard frameworks such as MITRE ATT&CK. Experience working in a Managed Security Services environment across multiple clients. Exposure to detection engineering and rule customization for improving threat visibility. Education: Any Graduation.

Posted Date not available

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies