Enable job alerts via email!

Microsoft Defender Operations Support

Simeio

Singapore

Hybrid

SGD 60,000 - 80,000

Full time

21 days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

A leading company is seeking a skilled Microsoft Defender Operations Support Specialist to join their IT Security Operations team in Singapore. This position involves providing advanced support for endpoint and identity protection, managing security incidents, and enhancing the security operations framework. The ideal candidate will possess a strong background in cybersecurity with qualifications in IT and relevant certifications. A collaborative environment awaits, where your expertise in security management will directly contribute to the protection of essential business operations.

Qualifications

  • Minimum 3 years of experience in cybersecurity, endpoint management, and identity protection.
  • Relevant certifications like CISSP, CEH, or Microsoft Certified: Security, Compliance, and Identity Fundamentals are a plus.

Responsibilities

  • Provide L2/L3 support for security incidents including malware outbreaks and phishing attacks.
  • Monitor and manage endpoint security using Microsoft Defender for Endpoint.
  • Investigate and respond to identity-related security incidents.

Skills

Cybersecurity
Endpoint Management
Identity Protection
Analytical Skills
Incident Response

Education

Bachelor's degree in computer science or information technology

Tools

Microsoft Defender for Endpoint
Microsoft Defender for Identity
SIEM solutions
Security automation and orchestration tools

Job description

    Role: Microsoft Defender Operations SupportLocation: Bangalore (Hybrid)We are seeking a skilled Microsoft Defender Operations Support Specialist to join our IT Security Operations team. This role involves providing Level 2 and Level 3 support for endpoint management and identity protection using Microsoft Defender. The ideal candidate will have a strong background in cybersecurity, endpoint management, and identity protection, with experience in handling complex security incidents and optimizing security operations.Key Responsibilities Endpoint Management: Monitor and manage endpoint security using Microsoft Defender for Endpoint. Perform advanced troubleshooting and remediation of endpoint security issues. Implement and maintain endpoint security policies and configurations. Conduct regular security assessments and vulnerability scans on endpoints. Identity Protection: Manage and support Microsoft Defender for Identity. Investigate and respond to identity-related security incidents. Implement identity protection policies and monitor for suspicious activities. Collaborate with the identity management team to enhance security posture. Incident Response: Provide L2/L3 support for security incidents, including malware outbreaks, phishing attacks, and unauthorized access. Conduct root cause analysis and develop mitigation strategies. Coordinate with other IT teams to resolve security incidents and implement preventive measures. Security Operations: Maintain and optimize security monitoring tools and systems. Develop and implement security automation and orchestration processes. Create and maintain documentation for security procedures and incident response. Collaboration and Communication: Work closely with the Security Operations Center (SOC) team to ensure seamless integration of Microsoft Defender solutions. Provide training and guidance to L1 support staff and other team members. Communicate effectively with stakeholders regarding security incidents and resolutions.Qualifications Bachelor's degree in computer science, information technology, or a related field. Minimum of 3 years of experience in cybersecurity, endpoint management, and identity protection. Proficiency in Microsoft Defender for Endpoint and Microsoft Defender for Identity. Strong analytical and problem-solving skills. Excellent communication and collaboration abilities. Relevant certifications such as CISSP, CEH, or Microsoft Certified: Security, Compliance, and Identity Fundamentals are a plus.Preferred Skills Experience with security automation and orchestration tools. Knowledge of SIEM solutions and threat intelligence platforms. Familiarity with cloud security and hybrid environments.Simeio is an equal opportunity employer. If you require assistance with completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please direct your inquiries to any of the recruitment team at hidden_email or +1 hidden_mobile.,

Sign-in & see how your skills match this job

Sign-in & Get noticed by top recruiters and get hired fast

Team Management, Risk Management, Vulnerability Management, Strategic Planning, Process Improvement, Compliance, Reporting, Security Awareness, Training, Effective Communication, Computer Networking, IT Security, Network troubleshooting, SIEM, Security automation, Leadership skills, Analytical skills,Cyber Security Operations, Incident response, Security Tool Optimization, Endpoint troubleshooting, Security frameworks, Investigating security issuesincidents, Network Firewalls, Problemsolving skills, Documentation skills

Network analysis, GREM,EDR systems, Cyber Security Incident Response, Windows systems, Unix systems, Host forensics, Memory forensics, TCPIP Protocols, Investigation techniques, CREST CRT, GCFA, GCFE, GNFA

Cyber Security, Information Security, Vulnerability Management, Network Security, Risk Management, Problem Solving, Analytical Skills, Customer Service,Security Incident Event Management SIEM, Compliance NIST, GDPR, PCI, Network Segmentation, Security Attacks, Microsoft Platforms, Thirdparty Relationship Management

Information Security, Computer Science, Cloud Security, Security Operations, AWS, Azure, GCP, IAM, Network Security, Analytical Skills, Communication Skills,Wiz, Incident Response, DevSecOps, Identity Tools, Cybersecurity, Threat Detection, WQL Queries, Microsoft Sentinel, Defender for Cloud, MITRE ATTCK Framework

Team Management, Risk Management, Vulnerability Management, Strategic Planning, Process Improvement, Compliance, Reporting, Security Awareness, Training, Effective Communication, Computer Networking, IT Security, Network troubleshooting, SIEM, Security automation, Leadership skills, Analytical skills,Cyber Security Operations, Incident response, Security Tool Optimization, Endpoint troubleshooting, Security frameworks, Investigating security issuesincidents, Network Firewalls, Problemsolving skills, Documentation skills

Network analysis, GREM,EDR systems, Cyber Security Incident Response, Windows systems, Unix systems, Host forensics, Memory forensics, TCPIP Protocols, Investigation techniques, CREST CRT, GCFA, GCFE, GNFA

Cyber Security, Information Security, Vulnerability Management, Network Security, Risk Management, Problem Solving, Analytical Skills, Customer Service,Security Incident Event Management SIEM, Compliance NIST, GDPR, PCI, Network Segmentation, Security Attacks, Microsoft Platforms, Thirdparty Relationship Management

Information Security, Computer Science, Cloud Security, Security Operations, AWS, Azure, GCP, IAM, Network Security, Analytical Skills, Communication Skills,Wiz, Incident Response, DevSecOps, Identity Tools, Cybersecurity, Threat Detection, WQL Queries, Microsoft Sentinel, Defender for Cloud, MITRE ATTCK Framework

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.