Home
Jobs

18 Microsoft Defender Jobs

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

7.0 - 10.0 years

6 - 14 Lacs

Hyderabad

Work from Office

Naukri logo

Role & responsibilities This position is responsible for seamlessly onboarding new customers to Defender XDR platform. The specialist will work closely with clients to ensure a smooth and efficient onboarding process, including pre-installation checks, post-installation verification, and ongoing support Required Skills and Qualification: Hands-on experience with Microsoft Defender XDR deployment , configuration and admin knowledge on Defender 365 portal Hands-on experience in policy configuration/deployment through Intune, Group Policy and PowerShell across different products of Defender XDR like for MDE(Real time Protection, Cloud Protection, Tamper Protection, Attack Surface Reduction(ASR), AIR( Automated investigation and response ),NLA (Network Level Authentication) MDO(Unified Audit, Safe Link policies, Safe attachment policies ,Anti-Malware policies, Anti-Spam policies, Anti-phishing policies, Outbound Forwarding policies), MDI(Identity Sensor installation Microsoft Defender for Cloud Apps (Office 365 Connector, MDE integration) and for Entra ID(Multifactor Authentication).Candidate should have a clear understanding of the use cases for these features and be able to explain them effectively. Candidate should be able to articulate and explain the impact and benefits of all policies with configuration steps for different products of XDR Candidate should be well versed with Defender for endpoint using Intune and should have understanding of Configuration Manager and able to pull-out assets inventory. Experience with MDE policies and conditional access policies Experience with onboarding of XDR products, platform and its configurations Proficient in creating and tuning configuration policies, detection rules and analytics across Microsoft Defender XDR products Solid Understanding of Microsoft security architecture, licensing, networking, including Zero trust. Maintain clear and consistent communication with clients and possess excellent communication, interpersonal and problem-solving skills Ability to work independently and as part of a team.

Posted 1 day ago

Apply

2.0 - 5.0 years

8 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Role: Microsoft Defender/MAC Endpoint Vulnerability Management Specialist Role Summary: He/She will be responsible for managing vulnerability remediation activities using Microsoft Defender, with a strong focus on endpoint security and management. Additionally, should possess expertise in Mobile Device Management (MDM) solutions such as Intune, and demonstrate advanced troubleshooting skills at the Windows OS level. Scripting knowledge is considered a plus. Location: Bangalore Preferred Duration: 3 Months(Extendable Project) Date : Immediate Joining also preferred Key Responsibilities: - Review vulnerabilities report, analyze the solutions available and execute vulnerability remediation activities using Microsoft Defender. - Collaborate with the Security Team to assess vulnerabilities and implement mitigation strategies. - Manage endpoint security configurations and policies through Microsoft Defender. - Implement solutions through Mobile Device Management solutions, Intune/WS1/SCCM. - Develop policies as required in collaboration with Product Owners and Security team. - Provide L3 level support for Windows OS-related issues. - Diagnose complex system problems and work towards resolution swiftly. - Utilize scripting languages (e.g., PowerShell) to automate or deploy solutions as needed. - Develop scripts to enhance monitoring capabilities or streamline solution deployment processes. - Maintain comprehensive documentation of processes, incidents, resolutions, and changes implemented. Qualifications: - Proven experience in managing Microsoft Defender Endpoint solutions. - Expertise in MDM tools like Intune/WS1/SCCM. - Strong troubleshooting skills at the Windows OS level. - Proficiency in scripting languages such as PowerShell. - Excellent analytical skills with attention to detail. - Strong communication skills; ability to collaborate effectively with cross-functional teams. - Ability to work independently while managing multiple priorities efficiently. - Work experience with monitoring tools like Nexthink is an advantage.onsibilities

Posted 1 week ago

Apply

4.0 - 9.0 years

7 - 17 Lacs

Kochi

Hybrid

Naukri logo

Key Responsibilities Act as an escalation point for high/critical severity incidents and perform thorough investigations. Analyze TTPs (Tools, Techniques, and Procedures) to identify attack vectors and lifecycle stages. Recommend improvements to security controls and organizational security hygiene. Conduct threat hunting and IOC/APT detection through advanced log analysis. Collaborate with clients security teams and internal teams for incident resolution and documentation. Identify process gaps and propose enhancements for the incident response lifecycle. Create, maintain, and improve runbooks, playbooks, and incident response processes. Actively participate in war room discussions, executive briefings, and team meetings. Must-Have Skills Minimum 3+ years of experience as a SOC L3 Analyst in a global SOC environment. Hands-on experience with SIEM tools such as Microsoft Sentinel, including rule writing in KQL and Use Case development. Strong incident response skills and experience writing response procedures and playbooks. Expertise in advanced threat detection, forensic investigation, and root cause analysis. Knowledge of threat hunting techniques and familiarity with attacker TTPs and MITRE ATT&CK framework. Experience with security monitoring, log analysis, and network traffic inspection. Ability to resolve and escalate incidents and provide detailed post-mortem analyses. Excellent communication and documentation skills for cross-functional collaboration. Good-to-Have Skills Familiarity with Use Case Factory and Managed Detection & Response (MDR) operations. Exposure to various security tools, including EDRs, vulnerability scanners, and SOAR platforms. Experience in training junior analysts and creating knowledge-sharing materials. Prior experience working in global customers/ MSSP environments with multiple customers.

Posted 1 week ago

Apply

6.0 - 10.0 years

10 - 20 Lacs

Bengaluru

Work from Office

Naukri logo

DESIGNATION: SENIOR CONSULTANT MICROSOFT SECURITY EXPERIENCE : 6+ years Key Responsibilities Solution Design & Implementation Design and deploy Microsoft Intune for device compliance, application management, and policy enforcement across Windows, macOS, iOS, and Android platforms. Implement Microsoft Defender for Endpoint, Defender for Identity, Defender for Office 365, and Microsoft Sentinel integrations for proactive threat protection. Configure and optimize Microsoft Entra ID (Azure AD) including conditional access, identity protection, MFA, SSO, and RBAC strategies. Lead zero trust architecture and endpoint protection projects aligned with customer security goals. Client Engagement & Advisory Collaborate with clients to assess current security posture and define Microsoft-centric security roadmaps. Deliver technical workshops, assessments, and POCs for Intune, Defender, and Entra ID solutions. Serve as a trusted advisor for Microsoft Security best practices, compliance (e.g., ISO27001, GDPR), and governance. Operations & Support Support teams in incident investigation and remediation using Microsoft tools. Ensure documentation of architectures, designs, policies, and procedures. Required Skills & Experience 6+ years of hands-on experience in Microsoft Security technologies. Expertise in deploying and managing: Microsoft Intune / Endpoint Manager Microsoft Defender Suite (MDE, MDI, MDO, Defender for Cloud Apps) Microsoft Entra ID / Azure AD (Identity Governance, PIM, Conditional Access) Deep understanding of endpoint protection , identity lifecycle management , device compliance , and modern workplace security . Strong experience with PowerShell scripting , custom compliance policies, and automation. Familiarity with Microsoft 365 E5 Security Suite , Microsoft Sentinel , and Zero Trust Architecture . Excellent communication and documentation skills; ability to present to both technical and executive stakeholders. Preferred Qualifications Microsoft Certifications such as: SC-300: Microsoft Identity and Access Administrator SC-400: Information Protection Administrator MD-102: Endpoint Administrator SC-200: Security Operations Analyst . Knowledge of integration with third-party MDM, SIEM, or IAM solutions.

Posted 1 week ago

Apply

5.0 - 10.0 years

0 - 3 Lacs

Bengaluru

Hybrid

Naukri logo

Job Title: Microsoft Defender / Azure Security Engineer Location: Bangalore (Hybrid) Job Type: Contract to Hire Job Description: Overview: We are seeking two experienced Security Engineers with a strong operational background to join our global security team. These individuals will play a key role in the configuration, deployment, and compliance management of Microsoft Defender and Azure Security solutions, with a particular focus on Endpoint Data Loss Prevention (DLP) and Email Protection. Key Responsibilities: Design, configure, and maintain security policies using Microsoft Defender and Azure Security tools. Implement and manage Endpoint DLP and Email Protection across the enterprise. Ensure compliance with internal and regulatory security standards. Monitor and analyze security events, ensuring a proactive security posture. Collaborate with cross-functional teams to integrate security into daily operations and development processes. Provide subject matter expertise on Microsofts security stack. Required Qualifications: Proven experience in configuring and managing Microsoft Defender and Azure Security solutions. Hands-on expertise in Endpoint DLP and Email Protection setup and compliance. Strong operational skills with the ability to build, configure, and monitor security environments. Excellent understanding of compliance and data protection principles. Ability to work independently in a fast-paced, global team environment. Preferred Qualifications: Experience with additional Microsoft security tools (e.g., Microsoft Purview, Sentinel). Familiarity with Proofpoint is a plus, but not a substitute for Microsoft security stack experience. Relevant certifications (e.g., Microsoft Certified: Security Operations Analyst Associate, Microsoft Certified: Information Protection Administrator Associate). Why Join Us: Be part of a global security initiative protecting enterprise-level environments. Work with cutting-edge Microsoft security technologies. Collaborative and growth-oriented work culture. How to Apply: Interested candidates can share their resumes at [nmaheriya@talentbridge.com]. Or you can call me at 704-837-3374 Thanks, Narendra Maheriya If you are qualified, available, interested, planning to make a change, or know of a friend who might have the required qualifications and interest, please call me ASAP at 704-397-1589, even if we have spoken recently about a different position. If you do respond via e-mail please include a daytime phone number so I can reach you. In considering candidates, time is of the essence, so please respond ASAP. Thank you. Narendra Maheriya Lead Recruiter W: 7048373374 TalentBridge 6100 Fairview Road, Suite 500 Charlotte, NC 28210 TalentBridge.com .........................

Posted 1 week ago

Apply

4.0 - 8.0 years

12 - 14 Lacs

Noida, Gurugram, Delhi / NCR

Work from Office

Naukri logo

Role & responsibilities Identity and Access Management (IAM): Administer and maintain IAM solutions to ensure secure and appropriate access to organizational resources. Implement and manage user provisioning, de-provisioning, and access reviews across cloud and on-premises systems. Support the integration of IAM with Office 365, Azure AD, and other enterprise applications. Create New Conditional Access Policies to cater to business needs and well as Review and optimize Conditional Access Policies Monitor and respond to IAM-related incidents, ensuring timely resolution and documentation. Collaborate with internal teams to enforce role-based access controls (RBAC) and least privilege principles. Participate in IAM-related projects such as onboarding new applications, automating access workflows, and enhancing authentication mechanisms (e.g., MFA, conditional access), Secret and Certificate rotation etc. Maintain and update IAM documentation, including process flows, SOPs, and technical configurations. Office 365 Administration: Perform day-to-day administration of Office 365 services including SharePoint Online, PowerApps, Teams etc. Configure and manage Office 365 security features such as Data Loss Prevention (DLP) and Defender for Office 365. Support compliance initiatives by maintaining audit logs, retention policies, and access controls. Assist in troubleshooting and resolving Office 365-related issues and service requests. Work with the Security Operations team to ensure Office 365 logs are integrated into SIEM and relevant alerts are generated. Preferred candidate profile: Education: Bachelors degree in Computer Science, Information Technology, Cybersecurity, or a related field. Experience: 4+ years of experience in IT Security with a strong focus on Identity and Access Management and Office 365 administration. Hands-on experience with Azure AD, Conditional Access, MFA, and IAM lifecycle processes. Experience managing Office 365 tenants and security configurations. Familiarity with Defender for Office 365 and Microsoft compliance tools. Skills: Strong understanding of IAM principles, RBAC, and authentication protocols. Proficiency in Microsoft PowerShell for automation and administration tasks. Experience with Microsoft Graph API is a plus. Solid troubleshooting and analytical skills. Effective communication and collaboration abilities. Ability to manage multiple operational tasks and project deliverables simultaneously. Good to have: MS-102 or equivalent Microsoft certification. Benefits Highlights: 5 Days working in a Fast-paced work environment. Work directly with the senior management team Reward and Recognition Employee friendly policies Personal development and training Health Benefits, Accident Insurance Potential Growth for you! We will nurture your talent in an inclusive culture that values diversity. You will be doing regular catchups with your manager who will act as your career coach and guide you in your career goals and aspirations. Location The position is based at Egon Zehnders KCI office in Gurgaon, Plot no. 29, Institutional Area Sector 32 EZ Commitment to Diversity & Inclusion Egon Zehnder aims for a diverse workplace and strives to continuously lead with our firm values. We respect personal values of every individual irrespective of race, national or social origin, gender, religion, political or other opinion, disability, age and sexual orientation as warranted by basic rights enshrined in the UN Declaration of Human Rights. We believe diversity of our firm is central to the success and enables us to deliver better solutions for our clients. We are committed to creating an inclusive environment and supportive work environment, where everyone feels comfortable to be themselves and treated with dignity and respect and there is no unlawful discrimination related to employment, recruitment, training, promotion, or remuneration. Egon Zehnder is an Equal Opportunity Employer Egon Zehnder provides equal employment opportunities to all applicants and employees without regard to race, color, creed, religion, sex, sexual orientation, gender identity, marital status, citizenship status, age, national origin, disability, or any other legally protected status and to affirmatively seek to advance the principles of equal employment opportunity.

Posted 2 weeks ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Hyderabad

Work from Office

Naukri logo

Under the direction of the Security Administration Manager, the Security Administration Engineer will manage and administer security technologies and provide security management services, requirements, direction, and support. The Security Administration Engineer is responsible for the quality control within the Security infrastructure and tools. This includes building and defending scalable, secure, and robust systems; defining security requirements for operational systems and networks; helping the organization understand advanced cyber threats; and helping to create strategies to protect networks. This role will be responsible for execution of the vulnerability management program and assist the Security Administration Manager with improving processes and reducing the time remediate vulnerabilities. This leader must be current and keep current with changing technology, industry best practices, and standard security frameworks. Assign remediation tasks and assist application owners and remediation teams by providing vulnerability analysis and remediation prioritization. Maintain the vulnerability scanning infrastructure, scan schedules, and risk scoring adjustments Participates in direct support of security systems and tools, including installation, configuration, security, and maintenance. Implements upgrades, enhancements, and fixes following established change management procedures. Maintains security tool disaster recovery and DEV/Test environments. Execute and improve vulnerability management processes (vulnerability scanning, remediation, exceptions, etc.) and maintain process documentation. Participates as a technical lead in the execution of the security program roadmap across the enterprise by providing expert guidance and solutions engineering services as part of initiatives and day-to-day operations. Stays current with emerging identity technologies, solutions and best practices. Advises Security Administration Manager on related risk and security posture. Performs troubleshooting and remediation of security tool issues. Participates in scheduled and unscheduled after-hours system maintenance and support. Performs rotational on-call duty. Provides implementation assistance for onboarding new security tools and processes. Updates team training documentation, technical processes, and testing plans. Education/Certifications Preferred: CompTIA Security+ Technical/Soft skills Required: Thorough understanding of vulnerability management concepts and processes. Demonstratesstrongproblemsolving,analytical,interpersonalandownershipskills. Proficiency with cloud, hybrid cloud, and on-prem Security Administration models. Thoroughunderstandingofsecurityprotocols/methodologiesandcontrols. Preferred: Knowledge of all aspects of the software development lifecycle Knowledge of web development technologies EXPERIENCE Preferred: Microsoft Defender - Endpoint Vulnerability Management Delinea Privilege Manager 2+years of experience in an information securityrole LEADERSHIP SKILLS Required: Strong leadership skills and the ability to work effectively with business managers, Enterprise Architecture, IT engineering and IT operations staff. Ability to break down technically complex and ambiguous concepts and rationalize into simple concepts and ideas. Ability to understand and articulate business imperatives as well as the business impact of security tools, technologies and policies. Ability to mentor and provide coaching to team members.

Posted 2 weeks ago

Apply

4.0 - 6.0 years

6 - 8 Lacs

Hyderabad

Work from Office

Naukri logo

What you will do In this vital role you will work for the Manager of Endpoint Security, in direct support of the global endpoint management group. This position will provide essential services that enable us to better pursue our mission. Amgen is searching for a Specialist Security Engineer covering Email and Data Loss Prevention (DLP) technologies. This role will work for the Manager of Data Security in direct support of the global email management group. This position will provide essential services that enable us to better pursue our mission. Specialist Security Engineers operate, lead, and improve Amgens email security and email DLP solutions. In our Data Security team, they will identify emerging risks related to changes in communications technologies, advise management, and develop technical remediations to address those risks. Specialists lead the development of processes and procedures for multiple solutions which enable business units to identify and remediate data exposures. They run multiple projects simultaneously to implement and improve the data security protections and use advanced analytics to demonstrate success. This engineer will play a key role in educating technologists and business leaders about the security strategies that both protect and enable business processes related to cloud data handling. Lets do this. Lets change the world. In this vital role you will: Designs, operates, maintains, and enhances capabilities for the technical systems that ensure protection of email for all Amgen global operations. Identifies new risk areas for data and plans controls to mitigate those risks. Researches new technologies, processes, and approaches based on industry practices and recommends future plans for data protection. Includes developing and implementing the roadmap for migrating DLP & email controls into the cloud. Authors procedures and guidelines and advises on policies related to email and data protection requirements and remediation or investigation of violations. Develops and conducts training on email protection technologies for operations staff. Educates business leadership about data risk. Consults to other technology groups on email protection strategies and recommends appropriate points of both technical and process integration. Partners with the Manager of Data Security to collaborate closely with legal and human resources leadership on violation remediations. Collaborates with cloud strategy leaders and business unit leadership to ensure that email and data protection are incorporated by design into new business projects. Collaborates with Data Security Engineers to integrate data protection technology into the operations of traditional Data Loss Prevention operations. What we expect of you We are all different, yet we all use our unique contributions to serve patients. Basic Qualifications: Doctorate degree OR Masters degree and 4 to 6 years of Information Security or Information Technology experience OR Bachelors degree and 6 to 8 years of Information Security or Information Technology experience OR Diploma and 10 to 12 years of Information Security or Information Technology experience Preferred Qualifications: Familiarity with one or more security frameworks, especially in regulated environments. Holds or is actively seeking one or more security related certifications, preferably with a focus on cloud technologies or data protection. Proficiency specifying requirements for technical systems, as well as designing, implementing, and operating those systems. Expertise in global IT operations, including an understanding of regulatory and cultural differences encountered when dealing with international peers and customers. Demonstrated competence maintaining email systems and applications on Windows, MacOS & iOS based operating systems. Skill with elements of the O365 services, including hosted and on-prem exchange, Azure Information Protection (AIP), Microsoft Information Protection (MIP), Microsoft 365 Security, Microsoft Defender for Office 365, Microsoft Defender for Endpoint, and related security and compliance features. Basic capabilities with programming or scripting languages. Skill with elements of the O365 services, including hosted and on-prem exchange, Azure Information Protection (AIP), Microsoft Information Protection (MIP), Microsoft 365 Security, Microsoft Defender for Office 365, Microsoft Defender for Endpoint, and related security and compliance features. Understanding of mail technologies from a security perspective including the security risks associated with mail and collaboration tools. Experience deploying and configuring related M365 applications such as OneDrive, Teams, Defender and SharePoint Online Good-to-Have Skills Experience crafting the basic cryptographic controls associated with email protection. Working knowledge of programming or scripting languages such as Powershell Experience with project management workstream leadership, preferably using Agile methodology Deep knowledge of the principles of Data Protection, including availability, integrity, and confidentiality of data. Work Hours This position requires you to work from 2:00pm to 10:00pm IST. Professional Certifications: Systems Security Certified Practitioner (SSCP) or Security+ SANS Certifications Soft Skills: Excellent analytical and troubleshooting skills Highly motivated and able to work effectively under minimal supervision Strong written and verbal communication skills in English Successful management of multiple priorities Effective working with global, virtual teams Team-oriented, placing priority on the successful completion of team goals.

Posted 3 weeks ago

Apply

10.0 - 15.0 years

14 - 20 Lacs

Hyderabad, Pune

Hybrid

Naukri logo

Job Title Cybersecurity Lead Incident Management Network Security Signature Writing Job Summary The Cybersecurity Lead will manage the Incident Management Network Security Signature Writing team This role involves overseeing incident response and signature development direct stakeholder management team management and project management The ideal candidate will have a strong background in cybersecurity incident response and network security with excellent communication and leadership skills Key Responsibilities Incident Monitoring and Response Monitor security alerts and incidents respond promptly and escalate as needed Threat Analysis and Detection Investigate security incidents develop detection rules and signatures Signature Development Create signatures for vulnerabilities and perform vulnerability hunting Tool Management Deploy configure and manage NDR tools Alert Tuning and Optimization Optimize alerts to reduce false positives Reporting and Documentation Document and report on security incidents Research and Development Stay updated with cybersecurity trends and improve detection capabilities Stakeholder Management Engage with stakeholders and manage escalated issues Team Management Lead and support the team Project Management Oversee projects related to incident response and signature development Preferred Skills Experience with Microsoft Defender or similar endpoint protection solutions Strong understanding of endpoint and network security threat detection and response Proficiency with SIEM platforms and scripting languages Knowledge of network protocols firewall rules and intrusion detection prevention systems Familiarity with advanced persistent threats threat hunting and incident response frameworks Understanding of IPSIDS signatures and Rapid7 recog signatures Good to have malware and threat analysis and CVE hunting This role operates within a 24x7x365 environment requiring flexibility for shifts holidays and on call responsibilities.

Posted 3 weeks ago

Apply

9.0 - 14.0 years

27 - 30 Lacs

Gurugram

Work from Office

Naukri logo

Position : Cloud Security Engineer - 1. Azure (Pan India) 2. AWS(Only Pune) Top Selection & Auto Elimination Criteria: Only Immediate Joiners need to apply (0-15 days) Joiners 16-30 days might be considered >30 days joiners-Please do not apply US/Rotational Shift Cab facility : Yes only late night pick or drop(1 side only for Gurgaon Employees) Location : Gurgaon, Bangalore, Pune, Indore, Hyderabad Relevant experience range 7-9(AWS) / 9-12 years(Azure) Position : Cloud Security Engineer - Azure or AWS US Shift Must Have SKills: Azure, CCSP/Certified Cloud Security Professional, Encryption, Key Management/Azure key Vault, CSPM/Cloud Security Posture Management, Microsoft Defender for Cloud, WAF, Entra firewall, IDS/IPS, Python/Java/C++/Ruby, networking, linux, Microsoft Azure Security Engineer Associate/AZ-500, AWS JD 1: Job Title: Cloud Security Engineer Microsoft Azure (9-12 Years) We are seeking a Senior Cloud Security Engineer with 9-12 years of experience and deep specialization in Microsoft Azure to drive enterprise cloud security architecture, governance, and automation. This strategic and hands-on role will be responsible for ensuring the security and resilience of Azure environments across the organization, embedding security into CI/CD pipelines, and collaborating with stakeholders to strengthen compliance and risk posture. Key Responsibilities Architect, deploy, and optimize security tools in Azure: Microsoft Defender for Cloud , Azure Key Vault , Entra ID , Azure Firewall , WAF, and IDS/IPS. Perform continuous security assessments , vulnerability management , and misconfiguration detection across hybrid cloud environments. Implement and automate Zero Trust and least-privilege access models using Azure-native capabilities. Embed security controls and policy-as-code into infrastructure-as-code templates and DevOps pipelines (Bicep, ARM, Terraform). Conduct threat modeling , architecture reviews , and provide actionable recommendations for securing workloads. Tune SIEM alerts and conduct root cause analysis for incidents via tools such as Microsoft Sentinel and Splunk . Lead incident response efforts and build standardized runbooks, playbooks, and documentation. Collaborate with engineering, compliance, and leadership to shape Azure security strategy, drive remediation, and enforce policy governance. Mentor and guide junior team members on cloud security best practices and emerging trends. Required Skills & Experience 9-12 years of total experience, with 5+ years in Azure cloud security. Proven expertise in: Microsoft Defender for Cloud , Azure Key Vault , Entra ID , Azure Firewall, WAF, IDS/IPS. Scripting (Python, Java, C++, or Ruby) for automation. Linux/Unix administration , cloud networking, encryption, and IAM. Log management and SIEM (Microsoft Sentinel, Splunk). Integrating security into CI/CD pipelines. Strong grasp of security frameworks: ISO 27001, NIST CSF, SOC 2 . Strong SQL query capability and understanding of database security. Education & Certifications Bachelors degree in Computer Science, Information Security, or related field. Must-Have Certifications : Microsoft Azure Security Engineer Associate (AZ-500) CCSP Certified Cloud Security Professional ___________________________________________________________________________________________ JD 2: Cloud Security Specialist AWS (7-9 Years) We are hiring a Cloud Security Specialist (AWS) with 7-9 years of experience to lead the design and implementation of secure cloud environments and services. This role focuses on embedding robust security across Redaptives AWS infrastructure, integrating security automation into DevOps, and ensuring compliance with leading standards. This is a hands-on and strategic role that will be central to our cloud transformation. Key Responsibilities Cloud Security Architecture & Governance Design and enforce cloud-native security architectures for AWS environments using best practices and frameworks. Implement Zero Trust , least privilege access , and secure-by-design principles across workloads. Maintain and evolve cloud security standards, policies, and guardrails across services and regions. DevSecOps & Automation Integrate security checks and policy enforcement into CI/CD pipelines (Jenkins, GitHub Actions, GitLab CI). Automate compliance validation, secret scanning, and IaC security (Terraform, CloudFormation). Build and maintain security-as-code templates and enforcement pipelines. Monitoring & Threat Response Configure and manage AWS-native services: CloudTrail , GuardDuty , Security Hub , Macie , Inspector . Tune and manage log forwarding to SIEM platforms and build detection playbooks. Conduct proactive threat hunting and coordinate incident response activities. IAM & Identity Governance Design and manage IAM strategies with fine-grained permissions, permission boundaries, and access reviews. Implement SSO integrations and enforce secure service-to-service authentication . Compliance & Risk Ensure compliance with SOC 2 , NIST , ISO 27001 , and internal audit requirements. Conduct security risk assessments and provide mitigation strategies and dashboards. Required Skills & Experience 79 years in cybersecurity with 5+ years focused on AWS cloud security . Strong knowledge of: AWS IAM, KMS, GuardDuty, CloudTrail, Security Hub Infrastructure as code (Terraform, CloudFormation) DevSecOps principles, policy-as-code, automated remediation Scripting (Python, Bash, etc.) for security automation Working experience with container and serverless security (ECS, Lambda, EKS). Knowledge of CSPM, CWPP, and cloud-native compliance controls. Education & Certifications Bachelor’s degree in Cybersecurity, Computer Science, or related discipline. Must-Have Certifications : AWS Certified Security – Specialty CCSP or CISSP Preferred Traits Experience implementing Zero Trust architecture in AWS. Familiarity with secrets management (e.g., AWS Secrets Manager, Vault). Deep knowledge of AWS cost-optimization with security in mind. Strong cross-team collaboration and documentation skills. ____________________________________________________________________

Posted 3 weeks ago

Apply

8.0 - 13.0 years

15 - 30 Lacs

Hyderabad, Pune, Chennai

Work from Office

Naukri logo

Azure, CCSP , Encryption, Key Management/Azure key Vault, CSPM , Microsoft Defender for Cloud, WAF, Entra firewall, IDS/IPS, Python/Java/C++/Ruby, networking, linux, Microsoft Azure Security Engineer Associate/AZ-500, AWS

Posted 3 weeks ago

Apply

4.0 - 6.0 years

6 - 7 Lacs

Chandigarh

Work from Office

Naukri logo

Managing & supporting the entire office IT infrastructure, ensuring stability, security & optimal performance of our systems and network. Key Role Support tickets Resolving technical issues Contributing to ongoing improvements in our IT operations

Posted 4 weeks ago

Apply

5.0 - 10.0 years

15 - 20 Lacs

Hyderabad, Chennai

Work from Office

Naukri logo

Cybersecurity expert skilled in Microsoft Defender, CrowdStrike, Intune, Entra ID, QRadar, PowerShell, and Python. Experienced in Zero Trust, PAM (CyberArk), and hybrid/cloud environments. Certified in CISSP, CEH, CCFA, and Microsoft SOA.

Posted 4 weeks ago

Apply

4.0 - 8.0 years

20 - 25 Lacs

Hyderabad

Work from Office

Naukri logo

Minimum of 4 years of experience in endpoint management and security. Proficiency in Microsoft Intune and Microsoft Defender. Strong understanding of mobile device management (MDM) and endpoint protection strategies. Experience with data loss prevention and encryption technologies. Relevant certifications in Microsoft technologies or cybersecurity are a plus.

Posted 4 weeks ago

Apply

7.0 - 12.0 years

20 - 25 Lacs

Pune, Chennai, Bengaluru

Hybrid

Naukri logo

About Client Hiring for One of the Most Prestigious Multinational Corporations! Job Description Job Title : Azure Infrastructure Expert Qualification : Any Graduate or Above Relevant Experience : 7+ Yrs Key expected results: As an Azure Infrastructure Expert Design, architect, and implement complex Azure cloud infrastructure solutions based on business requirements including major services related to compute,storage, network, and security. Ensure optimal performance, reliability, and security of Azure infrastructure across various environments, including production, staging, and development. Collaborate with cross-functional teams, including developers, architects to understand application requirement and provide guidance on Azure infrastructure solutions. Implementation of different Azure IaaS Services in Compute, Storage, and Networking Troubleshoot and resolve complex technical issues related to the Azure infrastructure, working closely with other technical teams and stakeholders. Stay current on emerging trends and technologies related to Azure infrastructure and continuously enhance your skills through training and certifications. Experience in Azure Databricks from Infra perspective. Technical Skills Minimum 7 years experience Azure Cloud services. Strong understanding of different Azure IaaS services and platform Experience in provisioning the Azure components. Expert in designing the secure azure components, services etc. Azure Security and Identity services (e.g., Microsoft defender for cloud, Microsoft Entra id, RBAC, NSGs / ASGs) Azure Networking services (e.g., VNETs, Load Balancers) Hands on experience on Storage account and integration of storage accounts with various components Strong understanding and hands-on capabilities of the Microsoft Cloud Platform (Security, Firewalls, Key Vault, Databricks, Blob Storage, App Insights) and their associated limitations Understanding and exposure to Azure CLI for performing administrative tasks Strong practical Linux and Windows-based systems administration skills in a Cloud or Virtualized environment preferred. Experience in recommending Capacity / Sizing options on Azure Platform Hands-on experience of Azure Scale Sets, Load Balancer, Azure networking, Azure Monitor, Alerts, and Log Analytics Energetic, able to switch gears quickly from task to task. Design, implement, configure, and maintain various Azure SaaS Cloud Services. Optimize Azure buildouts for cost/performance (VM optimization, reserved instances, etc.) Good to have knowledge on Snowflake, Dremio, PowerBI Location : Bangalore/Hyderabad/Chennai/Pune/Mumbai. CTC Range : 20LPA - 25LPA (Lakhs Per Annum) Notice period : Immediate / serving Notice period Mode of Interview : Virtual Joel IT Staffing Analyst Black and White Business solutions PVT Ltd Bangalore, Karnataka, INDIA 8067432416 I joel.manivasan@blackwhite.in I www.blackwhite.in

Posted 1 month ago

Apply

7.0 - 12.0 years

7 - 17 Lacs

Chennai

Work from Office

Naukri logo

Job Title: Endpoint Security Lead(AV/EDR) Responsibilities: - Design, implement, and maintain endpoint security solutions (AV/EDR) - Monitor and analyze endpoint security event logs - Investigate and respond to security incidents - Develop and maintain endpoint security policies and procedures - Understanding and implementing Application and Device control policies - Collaborate with IT teams for endpoint security integration - Stay up-to-date with emerging threats and technologies - Should present reports to the clients as per requirements. Requirements: - 7+ years of experience in endpoint security (AV/EDR) - Strong knowledge of endpoint security technologies (e.g., McAfee, Symantec, CrowdStrike, Cortex XDR, Microsoft Defender) - Experience in Implementing the AV/EDR solution from scratch - Understanding the client network and implementing the security policies efficiently - Experience with security information and event management (SIEM) systems - Proficiency in query languages (e.g., SQL, KQL, XQL) - Strong analytical and problem-solving skills - Excellent communication and collaboration skills Good to Have: - Experience with cloud security (AWS/Azure) - Knowledge of threat intelligence and incident response - Experience with IT service management (ITSM) tools - Relevant certifications (e.g., CompTIA Security+, CISSP)

Posted 1 month ago

Apply

7 - 12 years

22 - 37 Lacs

Bengaluru

Work from Office

Naukri logo

Job Summary: We are seeking an experienced Cybersecurity Strategy & Security Engineer to develop and implement security policies, frameworks, and architectures that align with organizational goals. This role is critical for defining security roadmaps, evaluating current capabilities, and ensuring robust protection across networks and cloud environments. We are looking for immediate joiners or a notice period less then a month is preferrable. Work from office and will have rotational shifts. Key Responsibilities: Develop and maintain IT security policies and standards for infrastructure components (firewalls, routers, VPNs, etc.) Design and implement cybersecurity strategies and roadmaps aligned with business objectives Conduct risk and maturity assessments and recommend security improvements Evaluate and integrate new security technologies and authentication protocols Provide expertise in network security architecture and cloud security across AWS, Azure, or GCP Collaborate with stakeholders to identify critical business functions and ensure alignment of security initiatives Reference and implement industry-standard frameworks like NIST 800-53, CIS Controls, ISO 27001, SOC 2 Mandatory Skills: Proven experience in security policy & standards development Deep understanding of security frameworks : NIST, CIS Controls, ISO 27001, SOC 2 Expertise in security strategy and roadmap development Strong background in network security architecture Cloud security knowledge in AWS, Azure (preferred), or GCP Familiarity with tools like Firewalls, WAF, VPN, EDR/XDR , and cloud-native tools (e.g., Prisma, Microsoft Defender for Cloud Apps, Azure Firewall ) Strong grasp of security reference architectures across domains like application, network, and data security Preferred Qualifications: Experience with security risk assessments, cost analysis, and security maturity evaluations Knowledge of security standards and compliance requirements (e.g., PCI-DSS)

Posted 1 month ago

Apply

4 - 9 years

5 - 15 Lacs

Hyderabad, Pune

Work from Office

Naukri logo

Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response : Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation : Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis : Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography : Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security : Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting : Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance : Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs) : Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools : Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms : Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions : Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools : Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies