1,973 Sentinelone Edr 4 To 6 Years Bengaluru Mumbai jobs in India
Sentinelone Edr 4 to 6 Years Bengaluru & Mumbai
Job Viewed
Job Description
- Monitor dashboard for compliance, threats and troubleshoot
- Check if any incidents are missed by L1 and follow up for the cause
- Basic level of fine tune policies and provide service improve plans.
- Maintain the SOP for the new events
- Expert in analyzing alerts generated in EDR
- Raise case and follow up with support for any issue
- Policy creation & Changes
- Major Changes in Infrastructure
- Major Incidents/Outages
- Provide Service improvement to the management
- Configuring policies on request
- Check Audit logs and fix if any disturbance.
**Primary Skills**:
- SentinelOne
**Secondary Skills**:
- Endpoint Detection Response
Job No Longer Available
This position is no longer listed on WhatJobs. The employer may be reviewing applications, filled the role, or has removed the listing.
However, we have similar jobs available for you below.
Information Security Analyst (Threat Detection)
Posted today
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts and logs from various security tools (SIEM, IDS/IPS, EDR, firewalls) to identify potential threats.
- Perform real-time analysis of security events to determine the scope and impact of incidents.
- Investigate and document security incidents, including root cause analysis.
- Develop and tune detection rules and signatures to improve threat identification capabilities.
- Conduct vulnerability assessments and penetration testing to identify system weaknesses.
- Respond to security incidents, coordinating containment, eradication, and recovery efforts.
- Develop and maintain incident response playbooks and procedures.
- Provide guidance and support to IT teams on security best practices.
- Stay current with the latest cybersecurity threats, trends, and technologies.
- Collaborate with cross-functional teams to implement security controls and policies.
- Prepare reports on security incidents, vulnerabilities, and overall security posture.
- Participate in security awareness training for employees.
- Assist in the development and maintenance of security policies and standards.
- Evaluate and recommend new security technologies and tools.
- Conduct forensic analysis when necessary to support investigations.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- 3+ years of experience in information security, with a focus on threat detection and incident response.
- Proficiency with Security Information and Event Management (SIEM) tools (e.g., Splunk, LogRhythm, QRadar).
- Experience with Intrusion Detection/Prevention Systems (IDS/IPS) and Endpoint Detection and Response (EDR) solutions.
- Strong understanding of network protocols, operating systems (Windows, Linux), and common attack vectors.
- Familiarity with security frameworks and standards (e.g., NIST, ISO 27001).
- Knowledge of scripting languages (e.g., Python, PowerShell) for automation is a plus.
- Excellent analytical, problem-solving, and critical thinking skills.
- Strong communication and documentation skills.
- Ability to work independently and effectively in a remote team environment.
- Relevant security certifications such as CompTIA Security+, CEH, CISSP are highly desirable.
- Experience with cloud security monitoring is a plus.
Information Security Analyst - Threat Detection
Posted 1 day ago
Job Viewed
Job Description
Information Security Analyst - Threat Detection
Posted 6 days ago
Job Viewed
Job Description
Senior Information Security Analyst - Threat Detection
Posted 1 day ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and logs from various sources, including SIEM, IDS/IPS, EDR, and firewalls.
- Analyze security events and investigate potential threats and breaches to determine scope and impact.
- Develop and refine threat detection rules, signatures, and correlation logic.
- Conduct forensic analysis of security incidents to identify root causes and evidence.
- Respond to security incidents, coordinating containment, eradication, and recovery efforts.
- Stay current with the latest threat landscapes, attack vectors, and vulnerability intelligence.
- Develop and implement security best practices and procedures.
- Collaborate with IT operations and other departments to address security vulnerabilities.
- Create detailed incident reports and provide recommendations for security improvements.
- Participate in security awareness training and incident response drills.
- Contribute to the development and maintenance of the organization's Security Operations Center (SOC) capabilities.
Qualifications:
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Minimum of 5-7 years of experience in information security, with a focus on threat detection and incident response.
- Proficiency with Security Information and Event Management (SIEM) tools (e.g., Splunk, QRadar).
- Strong understanding of network security, endpoint security, and cloud security concepts.
- Experience with Intrusion Detection/Prevention Systems (IDS/IPS) and Endpoint Detection and Response (EDR) solutions.
- Knowledge of threat intelligence platforms and analysis techniques.
- Relevant certifications such as CISSP, CEH, GIAC, or CompTIA Security+ are highly desirable.
- Excellent analytical, problem-solving, and critical-thinking skills.
- Strong communication skills, both written and verbal, for reporting and collaboration.
- Ability to work under pressure during security incidents.
Senior Information Security Analyst - Threat Detection
Posted 5 days ago
Job Viewed
Job Description
Responsibilities:
- Monitor security alerts and investigate potential security incidents.
- Analyze security logs and system events for malicious activity.
- Perform forensic analysis of security breaches and system compromises.
- Develop, implement, and maintain security policies and procedures.
- Conduct vulnerability assessments and penetration testing.
- Manage and configure SIEM, IDS/IPS, and EDR solutions.
- Develop and execute incident response plans.
- Stay informed about emerging threats, vulnerabilities, and security trends.
- Provide recommendations for improving security controls and posture.
- Educate staff on security best practices and awareness.
Qualifications:
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Minimum of 4-6 years of experience in information security or a related role.
- Strong understanding of cybersecurity frameworks, principles, and best practices.
- Experience with SIEM tools (e.g., Splunk, LogRhythm), IDS/IPS, and EDR solutions.
- Proficiency in network security, host security, and cloud security concepts.
- Experience with vulnerability scanning and penetration testing tools.
- Excellent analytical, problem-solving, and critical thinking skills.
- Relevant certifications such as CISSP, CEH, CompTIA Security+ are highly desirable.
- Strong written and verbal communication skills.
Senior Information Security Analyst - Threat Detection
Posted 5 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and events from various security tools, including SIEM, IDS/IPS, and EDR systems.
- Analyze security incidents to determine scope, impact, and root cause.
- Develop and execute incident response plans and procedures.
- Conduct forensic analysis of security breaches and malware infections.
- Identify and report on emerging threats and vulnerabilities relevant to the organization.
- Implement and tune security controls to enhance threat detection capabilities.
- Collaborate with IT and other departments to implement security best practices.
- Develop and maintain security documentation, policies, and procedures.
- Participate in security awareness training and initiatives.
- Stay current with the latest security threats, trends, and technologies.
- Perform vulnerability assessments and penetration testing.
- Manage security investigations and provide detailed reports.
Qualifications:
- Bachelor's degree in Computer Science, Information Security, or a related field; relevant certifications (e.g., CISSP, CEH, GIAC) are highly preferred.
- Minimum of 5 years of experience in information security, with a focus on threat detection and incident response.
- Proven experience with SIEM tools (e.g., Splunk, QRadar), IDS/IPS, firewalls, and endpoint security solutions.
- Strong understanding of common attack vectors, malware analysis, and network security.
- Excellent analytical and problem-solving skills, with the ability to think critically under pressure.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation and analysis is a plus.
- Strong written and verbal communication skills.
- Ability to work effectively in a team environment and independently.
- Experience with cloud security principles (AWS, Azure) is beneficial.
- Commitment to maintaining confidentiality and ethical conduct.
This role is essential in bolstering our client's defense against cyber threats and offers a chance to work with a forward-thinking security team.
Cybersecurity Analyst - Threat Detection
Posted 2 days ago
Job Viewed
Job Description
Key Responsibilities:
- Monitor security alerts and events from SIEM, IDS/IPS, EDR, and other security tools.
- Investigate security incidents, determine scope and impact, and develop containment strategies.
- Perform threat hunting to proactively identify advanced persistent threats (APTs) and malicious activities.
- Analyze malware and phishing attempts to understand attack methodologies.
- Develop and tune detection rules and signatures to improve security posture.
- Contribute to the development and improvement of incident response playbooks.
- Stay current with the latest cybersecurity threats, vulnerabilities, and mitigation techniques.
- Generate reports on security incidents and trends for management.
- Collaborate with IT teams to implement security best practices and remediation actions.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, or a related field, or equivalent practical experience.
- 2-4 years of experience in cybersecurity operations, incident response, or threat analysis.
- Strong understanding of networking protocols (TCP/IP, HTTP/S), operating systems (Windows, Linux), and security concepts.
- Experience with SIEM platforms (e.g., Splunk, QRadar), IDS/IPS, and EDR solutions.
- Familiarity with scripting languages (Python, PowerShell) for automation and analysis.
- Knowledge of common attack vectors, malware types, and threat actor tactics, techniques, and procedures (TTPs).
- Excellent analytical and problem-solving skills.
- Strong communication and documentation abilities.
- Relevant certifications such as CompTIA Security+, CEH, or GIAC are a plus.
Be The First To Know
About the latest Sentinelone edr 4 to 6 years bengaluru mumbai Jobs in India !
Cybersecurity Analyst - Threat Detection
Posted 5 days ago
Job Viewed
Job Description
Key responsibilities include analyzing security logs, performing vulnerability assessments, and contributing to the development and implementation of security policies and procedures. The successful candidate will also participate in incident response activities, conduct security awareness training, and stay current with emerging cybersecurity threats and technologies. Experience with scripting languages for automation of security tasks is a significant advantage. This is an on-site position, requiring your presence in our Mysuru office, fostering collaborative problem-solving and direct engagement with the security infrastructure. If you are passionate about cybersecurity and eager to make a tangible impact on protecting critical systems, we invite you to apply.
Responsibilities:
- Monitor and analyze security alerts from various security tools (SIEM, IDS/IPS, etc.).
- Investigate security incidents and breaches, identify root causes, and recommend remediation steps.
- Perform vulnerability assessments and penetration testing.
- Develop and maintain security policies, procedures, and guidelines.
- Respond to security incidents in a timely and effective manner.
- Assist in the development and implementation of security awareness training programs.
- Stay up-to-date with the latest cybersecurity threats, trends, and technologies.
- Collaborate with IT teams to implement security solutions and controls.
- Conduct regular security audits and reviews.
- Contribute to the continuous improvement of the organization's security posture.
Qualifications:
- Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 3 years of experience in cybersecurity analysis or a similar role.
- Proficiency with SIEM, IDS/IPS, firewalls, and endpoint security solutions.
- Strong understanding of network protocols and security principles.
- Experience with vulnerability assessment tools and methodologies.
- Excellent analytical and problem-solving skills.
- Ability to communicate technical information clearly to both technical and non-technical audiences.
- Relevant certifications such as CompTIA Security+, CEH, or CISSP are a plus.
- Experience with scripting languages (e.g., Python, PowerShell) is advantageous.
Cyber Threat Detection Engineer
Posted today
Job Viewed
Job Description
About Rearc
At Rearc, we&aposre committed to empowering engineers to build awesome products and experiences. Success as a business hinges on our people&aposs ability to think freely, challenge the status quo, and speak up about alternative problem-solving approaches. If you&aposre an engineer driven by the desire to solve problems and make a difference, you&aposre in the right place!
Our approach is simple — empower engineers with the best tools possible to make
an impact within their industry.
Role Overview
Rearc is looking for a Cybersecurity Threat Detection Engineer with proactive communication skills, a foundation in DevSecOps, Detection-As-Code, deep purple team technical expertise, and an entrepreneurial approach to join our growing Cybersecurity practice. This role involves partnering with Rearc customers to design cutting-edge detection strategies and support the development of top-tier, modern cybersecurity monitoring programs. You will craft tailored security detections to strengthen our clients&apos cybersecurity efforts by leveraging Security Information and Event Management (SIEM), Security Orchestration Automation and Response (SOAR), Endpoint Detection and Response (EDR), and Network Detection and Response (NDR) services.
What You Bring
- Enthusiasm about developing and evangelizing services in the cyber space.
- Strong cloud, security, SIEM and data engineering fundamentals.
- Utilize NDR, EDR, real-time streaming, and SIEM technologies to develop robust threat detection capabilities.
- Build and optimize detection rules leveraging real-time data streaming to enhance detection accuracy.
- Design enrichment pipelines and automation workflows to enhance the precision of threat detections.
- Develop correlation logic and automated processes to create high-fidelity threat alerts.
- Build compliance and recoverability of customer Data Analytics solutions, including SOPs, data onboarding, normalization, enrichment, and system maintenance.
- Create automation playbooks for incident triage and response.
- Align detection content with customer-specific Use Case Frameworks and provide metrics on cybersecurity threats impacting their environment.
- Collaborate with customer cybersecurity teams to cover gaps and enhance enterprise posture.
- Support enterprise Cybersecurity, Information Technology (IT), and Operational Technology (OT) teams by providing dashboards and other data exploration tools.
- Stay continually aware of emerging cybersecurity threats and trends, adapting detection strategies as needed.
- Work closely with customer teams, including Cybersecurity Operations Center (CSOC), Operational Technology (OT), and Incident Response (IR) teams, to ensure detections are actionable and relevant.
- Provide feedback to improve the customer&aposs security framework and overall security monitoring strategy.
Qualifications
- 6+ years of experience in Cybersecurity with a focus on:
- Log streaming
- Cybersecurity data lakes and data warehousing
- SOAR engineering
- SIEM engineering, administration, architecture, and operations
- Data science, statistical analysis, and threat detection development
- Integrating disparate IT, OT, and business applications into SIEM systems
- Bachelor&aposs degree in Management Information Systems, Computer Science, or a related field
- A strong passion for Cybersecurity and a commitment to staying current with industry trends, best practices, and tools
- Proven experience in documenting, socializing, and operationalizing Cybersecurity technologies and processes
- Prior programming experience in Python, SQL, and Apache Spark
- Solid understanding of common attack techniques and their practical applications
- Demonstrated ability to work effectively across multiple teams, building cross-functional relationships with individuals of varying technical expertise
- A self-starter with a proven ability to thrive in fast-paced environments
- Strong technical communication skills, both written and verbal
- Prior experience with platforms like Databricks, Cribl, Tines, or other cybersecurity lakehouse providers
At Rearc, our mission is straightforward - empower engineers with the best tools possible to make an impact within their industry. We pride ourselves on fostering an environment where creativity flourishes, bureaucracy is non-existent, and individuals are encouraged to challenge the status quo. We&aposre not just a company; we&aposre a community of problem-solvers dedicated to improving the lives of fellow software engineers.
Our commitment is simple - finding the right fit for our team and cultivating a desire to make things better. If you&aposre a cloud professional intrigued by our problem space and eager to make a difference, you&aposve come to the right place. Join us, and let&aposs solve problems together!
Skills Required
Statistical Analysis, Apache Spark, Cybersecurity, Data Science, Data Warehousing, Sql, DevSecOps, Python
Cybersecurity Threat Detection Engineer
Posted today
Job Viewed
Job Description
Job Title: Cybersecurity Threat Detection Engineer
Experience: 6 + Years
Location: Hyderabad,
Notice Period: Immediate Joiner
Cab Facility: Available
Job Summary:
We are seeking a skilled Cybersecurity Threat Detection Engineer with 6+years of experience in cybersecurity, specializing in threat detection and incident response. This is a contract-to-hire opportunity for a candidate with strong expertise in SIEM platforms, detection content development, and cloud security. The role involves working closely with clients and internal teams to enhance detection capabilities across on-premises, cloud, and SaaS environments.
Key Responsibilities:
- Design and develop detection rules, policies, and alerting mechanisms to identify cybersecurity threats across varied technology stacks.
- Lead the creation and deployment of high-fidelity detection content across on-prem , cloud (AWS, Azure, GCP), and SaaS platforms.
- Collaborate with threat hunters, security analysts, and intelligence teams to incorporate emerging threats into detection strategies.
- Fine-tune detection mechanisms to reduce false positives and increase accuracy.
- Stay current with the latest cybersecurity trends, tools, and attack techniques.
- Assist clients in boarding the security platform and integrating diverse data sources.
- Document detection uses cases, processes, and generate security metrics reports.
- Provide technical guidance and collaborate with Security Operations on alert response automation and playbook development.
- Understand and work with network security tools and infrastructure such as firewalls, EDR, DLP, proxies, IDS/IPS , and email security solutions.
Required Qualifications:
- Bachelor’s degree in computer science, Information Security , or related discipline.
- 5+ years of hands-on experience in cybersecurity , with emphasis on threat detection , incident response , and SIEM tools.
- Expertise in log analysis , SIEM tuning , and detection rule creation.
- Strong familiarity with MITRE ATT&CK , Cyber Kill Chain , and adversary TTPs.
- Knowledge of cloud-based threat detection techniques and strategies.
- Excellent written and verbal communication skills with the ability to collaborate effectively with clients and cross-functional teams.
Technical Skills & Tools:
- Hands-on experience with SIEM platforms : Splunk, Elastic Stack (ELK/Security Onion), IBM QRadar, Securonix, Wazuh, Azure Sentinel.
- Ability to create and manage SIEM queries, alerts, dashboards, and integrate new log sources.
- Familiarity with CSPM, SOAR, EDR/XDR, WAF , and other security toolsets.
- Scripting and automation knowledge for alert responses and playbooks.
Preferred Certifications:
- OSCP , CISSP , or GIAC certifications such as GCIH, GCIA , or similar.