Required Skills and Qualifications:
5-7 year experience
Bachelor’s degree in Computer Science, Information Technology, or a related field (or equivalent experience).
The candidate should be willing to relocate to Noida.
Good knowledge of Windows /Linux system and networking fundamentals.
Experience with cloud security and technologies like AWS, Azure, or Google Cloud
Knowledge in operating and configuring SIEM tools (e.g., Sentinel , Splunk, MS defender).
Knowledge of firewalls, IDS/IPS, DLP, and endpoint protection systems.
Familiar with scripting and automation tools (e.g., Python, PowerShell).
Experience with monitoring and logging platforms like ELK Stack, Splunk, Prometheus, Grafana, New Relic , Solarwinds
Knowledge in CI/CD tools and processes (e.g., Jenkins, GitLab CI/CD).
Knowledge containerization and orchestration tools (e.g., Docker, Kubernetes).
Key Responsibilities
- Hands-on experience in Security incident response and threat intelligence analysis
- Knowledge of networking concepts, firewalls, and security protocols.
- Experience with SIEM tools, IDS/IPS systems, and endpoint security tools.
- Investigate security incidents and recommend remediation measures.
- Analyze security alerts from various monitoring tools and respond appropriately.
- Manage SIEM (Security Information and Event Management) tools and ensure logs are analyzed.
- Respond to incidents, perform initial troubleshooting, and escalate complex issues to L2/L3 engineers.
- Perform routine maintenance of servers, virtual machines, and cloud resources.
- Assist in provisioning, configuring, and decommissioning infrastructure as required.
- Support and maintain CI/CD pipelines for various projects.
- Execute existing automation scripts for routine tasks.
- Contribute to the improvement of automation scripts and processes.
- Maintain accurate and up-to-date documentation for configurations, incidents, and procedures.
- Coordinate with L2/L3 engineers, development, and QA teams for issue resolution.