Security Specialist - EDR - Mumbai
Maharashtra, Mumbai, India
SHI | Locuz
- Lead the investigation and remediation of complex endpoint security incidents, proxy, DLP, VPN, Mailing gateway
- Perform root cause analysis of advanced threats and recommend containment and recovery measures.
- Collaborate with IT and SOC teams to resolve escalated incidents from L1 analysts.
- Conduct proactive threat hunting using Endpoint Detection and Response (EDR) tools like SentinelOne, CrowdStrike, or similar solutions.
- Analyze malware behavior, including static and dynamic analysis.
- Ensure optimal configuration of endpoint security tools(EDR, DLP, mailing gateway) to enhance detection capabilities.
- Review and fine-tune policies and rules within endpoint security platforms.
- Coordinate with vendors for troubleshooting or enhancement of endpoint security solutions.
- Document detailed findings, actions taken, and lessons learned for each incident.
- Prepare periodic security reports and contribute to compliance audits.
- Maintain and update incident response playbooks and standard operating procedures (SOPs).
- Guide and mentor L1 analysts to enhance their skills and understanding of endpoint security.
- Provide training sessions or knowledge-sharing workshops on endpoint security best practices.
- Work closely with SOC, threat intelligence, and vulnerability management teams to improve overall security posture.
- Escalate unresolved or critical incidents to L3 or security engineering teams.
- Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- CEH (Certified Ethical Hacker), CCNA, EDR-focused certifications (e.g., Certified SentinelOne Analyst, CrowdStrike Certified Expert), GIAC Certified Incident Handler (GCIH), or equivalent.
- Strong knowledge of endpoint security tools and EDR platforms like SentinelOne, CrowdStrike, Carbon Black, etc.
- Hands-on experience with malware analysis, reverse engineering, and threat hunting techniques.
- Proficiency in scripting (e.g., Python, PowerShell) for automating tasks.
- Familiarity with MITRE ATT&CK Framework and its application in threat detection.
- Experience analyzing logs and alerts using SIEM platforms.
- Excellent problem-solving and critical-thinking abilities.
- Strong communication and teamwork skills, with the ability to articulate technical details to non-technical stakeholders.
- Proactive and detail-oriented with a focus on continuous improvement.
- 3-5 years of experience in endpoint security, incident response, or SOC roles.
- Hands-on experience in MSS or similar managed service environments.
- Mostly week days but support on weekends as well (sometimes)
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Audits Carbon Black CEH Compliance Computer Science CrowdStrike EDR Endpoint security Firewalls GCIH GIAC Incident response IPS Malware MITRE ATT&CK Network security PowerShell Python Reverse engineering Scripting Security analysis SIEM SOC Threat detection Threat intelligence VPN Vulnerability management
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.