Job Description
Role Purpose
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
͏
Key Responsibilities
- Assist in incident response processes, including triage, containment, and recovery.
- Analyze alerts and correlate events using Microsoft Sentinel.
- Develop and fine-tune detection rules and KQL queries in Sentinel.
- Support forensic investigations and prepare incident documentation.
- Create and maintain automated playbooks for response workflows.
- Collaborate with SOC and other security teams to resolve incidents.
- Ensure compliance with organizational security standards.
Required Skills & Qualifications
- Experience: 3–6 years in cybersecurity, with at least 1–2 years in Incident Response.
- Hands-on experience with Microsoft Sentinel, including KQL queries and playbook development.
- Knowledge of SIEM and EDR tools.
- Understanding of MITRE ATT&CK framework and threat-hunting basics.
- Basic scripting skills (PowerShell or Python).
- Strong analytical and communication skills.
- Relevant certifications preferred: Microsoft Certified: Security Operations Analyst or equivalent.
͏
Deliver
|
No. |
Performance Parameter |
Measure |
|
1. |
Customer centricity |
Timely security breach solutioning to end users, Internal stakeholders & external customers experience |
|
2. |
Process Adherence |
Adherence to SLAâÂÂs (90-95%), response time and resolution time TAT |
͏
͏
Experience: 3-5 Years .
Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention.