‘Microsoft’ is Hiring – 2024 For Threat Hunter – II – Apply Now

Hiring Details of ‘Microsoft’ – 2024 Recruitment:

Microsoft job updates

About Company:

Microsoft’s mission is to make every individual and every organization in the world earn more. As employees, we adopt an evolutionary attitude, innovate to provide others permission and work together to identify our common objectives. Every day, we strive to uphold our reputation for decency, kindness, and dedication to foster an inclusive workplace environment where everyone may thrive in their career and beyond.

Job Profile:

Threat Hunter II

Qualification:

Bachelor’s degree in a relevant field or equivalent work experience

Experience:

3-4 years of experience in a SOC environment, focusing on incident response, threat hunting, and forensics, specifically leveraging Microsoft Defender.

Salary:

4 LPA – 10 LPA

Work Location:

Hyderabad

Responsibilities:

  • Incident Response: Respond to security issues promptly and efficiently, making use of your Microsoft Defender experience to identify and mitigate threats.
  • Utilizing Defender features for thorough security issue handling, work with cross-functional teams to coordinate incident response efforts.
  • Threat Hunting: Make proactive use of Defender’s threat-hunting features to look for indications of compromise (IoCs) and new threats in our environment.
  • Create and implement threat-hunting tactics that prioritize Defender to locate and eliminate possible security threats. In forensics: Using Defender logs and data, conduct digital forensics investigations to examine and comprehend the underlying cause of security occurrences.
  • Using insights from Defender analytics, record findings and create thorough incident reports for internal and external stakeholders. Knowledge: Exhibit comprehensive understanding and practical expertise with Defender, encompassing Defender
  • Make use of Defender’s features to safeguard email, identify threats, and secure endpoints. Security Monitoring: Keep an eye on events and alarms related to security, making sure that possible threats are promptly identified and escalated.
  • Pay particular attention to Defender’s monitoring capabilities. To improve the security posture of the company, make use of Defender and other SIEM technologies. Working Together and Communicating: Collaborate closely with IT staff and other SOC team members to exchange threat intelligence and raise security awareness generally.
  • Effectively communicate with stakeholders by giving them succinct, understandable updates on your crisis response efforts.
  • Encourage cooperation with outside suppliers and partners to provide a unified and thorough approach to cybersecurity. This position requires 24-hour shift work.

Click the below link to apply –

Honey Gupta

Recent Posts

9 Essential UX Design Principles Every Designer Should Master

Introduction As digital products are becoming increasingly intricate, they demand refined UX in order to…

2 weeks ago

How AI and ML are Creating New Job Opportunities

Artificial Intelligence (AI) and Machine Learning (ML) are no longer limited to research labs or…

4 weeks ago

Internshala Data Science Course Review vs. Simplilearn: A Complete Comparison

Internshala Data Science Course Review vs. Simplilearn...A Complete Comparison Internshala Data Science Course Review vs.…

3 months ago

Udemy vs Intellipaat Machine Learning Courses: A Detailed Comparison

Udemy vs Intellipaat Machine Learning Courses...A Detailed Comparison Udemy vs Intellipaat Machine Learning Courses If…

3 months ago

UpGrad and Simplilearn Data Science Courses Compared: Which One Offers Better Career Opportunities in 2024?

UpGrad and Simplilearn Data Science Courses Compared...Which One Offers Better Career Opportunities in 2024? UpGrad…

3 months ago

Intellipaat vs. Coursera Machine Learning Courses: Key Differences, Syllabus, Fees and Reviews

Intellipaat vs. Coursera Machine Learning Courses...Key Differences, Syllabus, Fees and Reviews Intellipaat vs. Coursera Machine…

3 months ago