WhatsApp Channel Join Now
Telegram Channel Join Now

‘Microsoft’ is Hiring – 2024 For Threat Hunter – II – Apply Now

Hiring Details of ‘Microsoft’ – 2024 Recruitment:

About Company:

Microsoft’s mission is to make every individual and every organization in the world earn more. As employees, we adopt an evolutionary attitude, innovate to provide others permission and work together to identify our common objectives. Every day, we strive to uphold our reputation for decency, kindness, and dedication to foster an inclusive workplace environment where everyone may thrive in their career and beyond.

Job Profile: 

Threat Hunter II


Bachelor’s degree in a relevant field or equivalent work experience


3-4 years of experience in a SOC environment, focusing on incident response, threat hunting, and forensics, specifically leveraging Microsoft Defender.

WhatsApp Channel Join Now
Telegram Channel Join Now


4 LPA – 10 LPA

Work Location



  • Incident Response: Respond to security issues promptly and efficiently, making use of your Microsoft Defender experience to identify and mitigate threats.
  • Utilizing Defender features for thorough security issue handling, work with cross-functional teams to coordinate incident response efforts. 
  • Threat Hunting: Make proactive use of Defender’s threat-hunting features to look for indications of compromise (IoCs) and new threats in our environment. 
  • Create and implement threat-hunting tactics that prioritize Defender to locate and eliminate possible security threats. In forensics: Using Defender logs and data, conduct digital forensics investigations to examine and comprehend the underlying cause of security occurrences. 
  • Using insights from Defender analytics, record findings and create thorough incident reports for internal and external stakeholders. Knowledge: Exhibit comprehensive understanding and practical expertise with Defender, encompassing Defender 
  • Make use of Defender’s features to safeguard email, identify threats, and secure endpoints. Security Monitoring: Keep an eye on events and alarms related to security, making sure that possible threats are promptly identified and escalated. 
  • Pay particular attention to Defender’s monitoring capabilities. To improve the security posture of the company, make use of Defender and other SIEM technologies. Working Together and Communicating: Collaborate closely with IT staff and other SOC team members to exchange threat intelligence and raise security awareness generally. 
  • Effectively communicate with stakeholders by giving them succinct, understandable updates on your crisis response efforts. 
  • Encourage cooperation with outside suppliers and partners to provide a unified and thorough approach to cybersecurity. This position requires 24-hour shift work. 

Click the below link to apply –

Leave a Comment

Your email address will not be published. Required fields are marked *

WhatsApp Channel Join Now
Telegram Channel Join Now
Scroll to Top