• Designation – IT Security Analyst
• Experience: 4 - 5 Years
• Location: Pune, India
A. Your Skills:• Significant experience in SOC, CERT, or CSIRT environments, with expertise in Threat Hunting,
Detection Engineering, and Incident Response.
• Proficiency in creating and simulating hypothetical threat scenarios to anticipate and combat
...
potential attack vectors.
• Hands-on experience in developing advanced threat detection analytics rules in Microsoft
Sentinel using KQL (Kusto Query Language).
• In-depth understanding and practical application of the MITRE ATT&CK framework for mapping
detection rules and identifying attacker tactics, techniques, and procedures (TTPs).
• Practical knowledge of security technologies, including firewalls, IDS/IPS, SIEM, endpoint
detection, anti-malware, and vulnerability assessment tools.
• Strong expertise in configuring, optimizing, and maintaining Microsoft security products,
including Sentinel, Defender for Cloud, Endpoint, Identity, Office 365, Exchange, and Azure
Active Directory.
• Solid understanding of networks, cloud infrastructures, operating systems (Windows, Linux),
and evolving cyberattack methods.
• Experience in correlating threat intelligence feeds with detection engineering to identify and
mitigate advanced threats.
• Proven ability to analyze large volumes of security logs and data to craft precise, high-fidelity
detection rules while reducing false positives.
• Proficiency in log management and developing consolidated security dashboards to support
continuous monitoring.
• Excellent communication and collaboration skills to effectively share findings and work with
cross-functional teams.
• Passionate about proactive cybersecurity measures, with a strong desire to stay updated on
emerging threats and technologies.B. Behaviors:• A high level of collaboration skills with other cross functional teams.
• Confidence in expressing your ideas and input to the team.
• Open to learn and work on different/new technologies.
• Agile in nature.
• Self-motivated and proactive.C. Role and Responsibilities:• Threat Intelligence Analysis:
1. Gather, process, and analyze threat intelligence feeds to identify emerging threats.
2. Proactively communicate relevant threat scenarios and provide actionable insights.
• Threat Detection Development:1. Develop and fine-tune advanced KQL queries and analytics rules in Microsoft Sentinel
to detect sophisticated attack vectors.
2. Build and test hypothetical threat scenarios to enhance threat detection capabilities.
3. Optimize detection systems to minimize false positives and maximize precision.
• Incident Response and Collaboration:
1. Collaborate with SOC, CERT, or CSIRT teams for effective incident monitoring and
response.
2. Investigate and respond to cybersecurity incidents, including forensic analysis of attack
patterns.
• Security Tool Management:
1. Configure, monitor, and maintain security tools such as SIEM (Microsoft Sentinel),
Defender for Cloud, antivirus solutions, and consolidated security dashboards.• Continuous Improvement:
1. Participate in developing and implementing security concepts, hardening guidelines,
and monitoring systems.
2. Perform penetration tests, vulnerability assessments, and audits to ensure robust
security measures.
3. Contribute to the creation and refinement of SOC policies, processes, and procedures.D. Desirable Certifications:• Microsoft Certified: Security Operations Analyst Associate
• CEH
• EC-Council Certified Incident Handler
experience
6show more • Designation – IT Security Analyst
• Experience: 4 - 5 Years
• Location: Pune, India
A. Your Skills:• Significant experience in SOC, CERT, or CSIRT environments, with expertise in Threat Hunting,
Detection Engineering, and Incident Response.
• Proficiency in creating and simulating hypothetical threat scenarios to anticipate and combat
potential attack vectors.
• Hands-on experience in developing advanced threat detection analytics rules in Microsoft
Sentinel using KQL (Kusto Query Language).
• In-depth understanding and practical application of the MITRE ATT&CK framework for mapping
detection rules and identifying attacker tactics, techniques, and procedures (TTPs).
• Practical knowledge of security technologies, including firewalls, IDS/IPS, SIEM, endpoint
detection, anti-malware, and vulnerability assessment tools.
• Strong expertise in configuring, optimizing, and maintaining Microsoft security products,
including Sentinel, Defender for Cloud, Endpoint, Identity, Office 365, Exchange, and Azure
Active Directory.
• Solid understanding of networks, cloud infrastructures, operating systems (Windows, Linux),
...
and evolving cyberattack methods.
• Experience in correlating threat intelligence feeds with detection engineering to identify and
mitigate advanced threats.
• Proven ability to analyze large volumes of security logs and data to craft precise, high-fidelity
detection rules while reducing false positives.
• Proficiency in log management and developing consolidated security dashboards to support
continuous monitoring.
• Excellent communication and collaboration skills to effectively share findings and work with
cross-functional teams.
• Passionate about proactive cybersecurity measures, with a strong desire to stay updated on
emerging threats and technologies.B. Behaviors:• A high level of collaboration skills with other cross functional teams.
• Confidence in expressing your ideas and input to the team.
• Open to learn and work on different/new technologies.
• Agile in nature.
• Self-motivated and proactive.C. Role and Responsibilities:• Threat Intelligence Analysis:
1. Gather, process, and analyze threat intelligence feeds to identify emerging threats.
2. Proactively communicate relevant threat scenarios and provide actionable insights.
• Threat Detection Development:1. Develop and fine-tune advanced KQL queries and analytics rules in Microsoft Sentinel
to detect sophisticated attack vectors.
2. Build and test hypothetical threat scenarios to enhance threat detection capabilities.
3. Optimize detection systems to minimize false positives and maximize precision.
• Incident Response and Collaboration:
1. Collaborate with SOC, CERT, or CSIRT teams for effective incident monitoring and
response.
2. Investigate and respond to cybersecurity incidents, including forensic analysis of attack
patterns.
• Security Tool Management:
1. Configure, monitor, and maintain security tools such as SIEM (Microsoft Sentinel),
Defender for Cloud, antivirus solutions, and consolidated security dashboards.• Continuous Improvement:
1. Participate in developing and implementing security concepts, hardening guidelines,
and monitoring systems.
2. Perform penetration tests, vulnerability assessments, and audits to ensure robust
security measures.
3. Contribute to the creation and refinement of SOC policies, processes, and procedures.D. Desirable Certifications:• Microsoft Certified: Security Operations Analyst Associate
• CEH
• EC-Council Certified Incident Handler
experience
6show more