CrawlJobs Logo

Senior Endpoint Security Analyst I

alterdomus.com Logo

Alter Domus

Location Icon

Location:
India , Hyderabad

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

We are seeking a highly skilled Senior Endpoint Security Analyst to lead and mature our endpoint security capabilities across a global hybrid environment. This role is responsible for the ownership, operation, and continuous improvement of endpoint protection technologies, ensuring effective detection, prevention, and response to advanced threats across both on-premise and cloud-hosted infrastructure. This individual will play a critical role as an extension of the Cyber Fusion Center team, partnering closely with IT operations, Engineering, and Infrastructure teams to strengthen endpoint security posture and resilience.

Job Responsibility:

  • Endpoint Security Platform Ownership
  • Deployment & Implementation
  • Threat Detection & Response Enablement
  • Host Security Controls Management
  • Solution Evaluation & Engineering
  • Operational Excellence & Maintenance
  • Collaboration & Leadership

Requirements:

  • 5+ years of experience in endpoint security, EDR/XDR, or related cybersecurity roles
  • Hands-on experience with enterprise endpoint security platforms (e.g., Microsoft Defender for Endpoint, CrowdStrike, SentinelOne, etc.)
  • Strong understanding of: Endpoint attack techniques and MITRE ATT&CK framework
  • Windows, Linux, and cloud-hosted systems security
  • Threat detection, response, and forensic analysis
  • Experience operating in hybrid environments (on-prem + cloud)
  • Familiarity with SIEM/XDR platforms and log analysis
  • Strong analytical and problem-solving skills

Nice to have:

  • Experience with ransomware protection platforms
  • Knowledge of identity-integrated endpoint controls (Entra ID, Zero Trust models)
  • Experience with automation and scripting (PowerShell, Python)
  • Relevant certifications (e.g., Security+, GCED, GCIA, Microsoft Security certifications)
What we offer:
  • Support for professional accreditations such as ACCA and study leave
  • Flexible arrangements, generous holidays, plus an additional day off for your birthday
  • Continuous mentoring along your career progression
  • Active sports, events and social committees across our offices
  • 24/7 support available from our Employee Assistance Program
  • The opportunity to invest in our growth and success through our Employee Share Plan

Additional Information:

Job Posted:
April 23, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Senior Endpoint Security Analyst I

Senior Security Incident Response Analyst

We are looking for an Incident Responder with robust technical skills, expertise...
Location
Location
Poland , Gdańsk
Salary
Salary:
256000.00 - 342000.00 PLN / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years in security domains like Operations, Incident Response, Detection Engineering, Threat Research, or Engineering, with relevant incident response and investigation experience
  • Proficiency in modern programming languages (Python, Ruby, Java, Go) or scripting for security tasks
  • Experience with AWS, GCP, or similar cloud platforms
  • Experience in building and delivering projects from start to finish
  • Expertise in areas such as malware analysis, forensics, threat hunting, network analysis, or cloud endpoint analysis
  • Contributions to the security community or open source projects
  • Capable of explaining technical issues to non-technical stakeholders
Job Responsibility
Job Responsibility
  • Security Incident Management: Act as an escalation point, collaborate with partners, communicate updates, and work towards resolution. Participate in on-call roster and conduct post-incident reviews to analyze causes and recommend improvements
  • Investigation and Analysis: Investigate log data from multiple sources for signs of compromise, conduct threat hunts, research threat actor tools and tactics, and lead evidence collection and forensic analysis
  • Technical Solutions and Automation: Provide technical solutions to reduce incidents, build and maintain tools for automation, and develop security incident response guides and procedures
  • Advocacy and Training: Advocate for security best practices and secure coding standards, and conduct tabletop exercises and simulations to test and improve incident response readiness
What we offer
What we offer
  • health and wellbeing resources
  • paid volunteer days
  • Fulltime
Read More
Arrow Right

Senior Cybersecurity Analyst, Threat Hunter

Our cybersecurity and information security teams at IDEXX contribute to a more r...
Location
Location
United States , Westbrook, Maine
Salary
Salary:
120000.00 - 140000.00 USD / Year
idexx.com Logo
IDEXX
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 6–10 years of experience in cybersecurity roles
  • Minimum of 3 years dedicated specifically to threat hunting or advanced incident response
  • Bachelor’s degree in computer science, Cybersecurity, Information Technology, or a related field
  • Preferred certifications GCIH (GIAC Certified Incident Handler) and CompTIA CySA+ (Cybersecurity Analyst+) certification
  • Proven, hands-on experience using platform for EDR (Endpoint Detection and Response) and threat hunting
  • Expert-level knowledge of PowerShell Scripting, Python and EDR and SIEM query language is preferred
  • Deep understanding of incident response lifecycles, methodologies, and forensic techniques
  • Strong knowledge of networking protocols, operating systems (Windows, Linux, macOS), and common attack vectors
  • Familiarity with scripting languages (e.g., Python, PowerShell) for automation of hunting tasks is a plus
  • Exceptional analytical and problem-solving skills with keen attention to detail
Job Responsibility
Job Responsibility
  • Proactively hunt for indicators of compromise (IOCs) and advanced persistent threats (APTs) across the network, endpoints, and cloud environments using threat intelligence and a hypothesis-driven methodology
  • Conduct in-depth analysis of security events, network traffic, and endpoint data to identify malicious activity and potential breaches
  • Utilize the SIEM and EDR platform extensively, applying expert knowledge of the scripting, SIEM and EDR query language to perform complex searches and data analysis
  • Lead and participate in incident response activities, including containment, eradication, and recovery efforts, serving as a primary escalation point for critical security incidents
  • Develop and refine threat hunting playbooks, procedures, and detection rules to improve the security team’s efficiency and effectiveness
  • Collaborate with the security engineering and security operations center (SOC) teams to integrate new threat intelligence and enhance existing security tools and controls
  • Mentor junior analysts and contribute to the ongoing improvement of the organization's overall security posture
What we offer
What we offer
  • Opportunity for annual cash bonus
  • Health / Dental / Vision Benefits Day-One
  • 5% matching 401k
  • Additional benefits including but not limited to financial support, pet insurance, mental health resources, volunteer paid days off, employee stock program, foundation donation matching
  • Fulltime
Read More
Arrow Right

Senior Information Security Analyst

We are seeking a highly skilled and technically strong (Senior) Information Secu...
Location
Location
Germany , Munich; Berlin
Salary
Salary:
Not provided
hawk.ai Logo
Hawk
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of hands-on experience in Information Security, IT Security, or System Administration within a B2B tech or SaaS environment
  • Strong technical competence across multiple operating systems (macOS, Windows, Linux) including admin-level experience
  • Experience with identity and access management tools (e.g., JumpCloud, Okta), MDM solutions, and enterprise security platforms
  • Solid understanding of IT security fundamentals, including authentication, endpoint security, encryption, and network basics
  • Familiarity with ISO 27001 or ISMS operations
  • experience supporting audits or certification maintenance
  • Basic security certifications (e.g., CompTIA Security+, CEH) are highly desirable
  • Fluent German and English — mandatory due to regular customer-facing security discussions
  • Ability to articulate complex technical issues clearly to diverse audiences (engineers, customers, auditors, leadership)
  • Strong documentation skills with attention to accuracy and clarity
Job Responsibility
Job Responsibility
  • Respond to security questionnaires, RFPs, and due-diligence requests in collaboration with Sales and Pre-Sales
  • Participate in customer calls to explain Hawk’s security posture and answer technical, compliance, and infrastructure-related questions
  • Represent Hawk’s security capabilities clearly and confidently to regulated financial institutions
  • Support the ongoing operation and improvement of Hawk’s ISMS, ensuring alignment with ISO 27001 controls and underlying processes
  • Assist in internal audits, evidence gathering, and risk assessments
  • Help maintain certification readiness by driving documentation, process adherence, and corrective actions
  • Provide operational support for core IT & security tools, including JumpCloud (SSO/IdP), MDM, endpoint policies, and access management workflows
  • Support the roadmap toward centralized, secure workstation management — monitoring, controlling, and updating all endpoints across macOS, Windows, and Linux
  • Assist in evaluating and managing security-related 3rd party SaaS tools used across the business
  • Monitor the security posture of Hawk’s corporate tools, infrastructure, and integrations
  • Fulltime
Read More
Arrow Right

Senior Security Engineer

Truveta is the world’s first health provider led data platform with a vision of ...
Location
Location
United States , Seattle
Salary
Salary:
135000.00 - 180000.00 USD / Year
truveta.com Logo
Truveta
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Cyber Security, Computer Science, Information Security, Information Systems, or a related field, or equivalent practical experience
  • 5+ years of experience in Security Operations (SOC), Incident Response, or Detection & Response role, with demonstrated ownership of complex security incidents
  • Hands-on experience with Microsoft Sentinel (SIEM) and Microsoft Defender XDR (Defender for Endpoint, Identity, Office 365, Cloud Apps)
  • Proficiency in KQL (Kusto Query Language) for investigations, threat hunting, and detection engineering
  • Experience designing, tuning, and maintaining SIEM detections and SOAR automation, including alert triage and response workflows
  • Solid understanding of Azure cloud architecture, core services, and native security controls
  • Familiarity with Azure Entra ID, identity security concepts, RBAC, and IAM-related threats
  • Experience with handing high-severity security incidents, including cross-team coordination and stakeholder communication
  • Familiarity with MITRE ATT&CK, threat actor techniques, and modern attack methodologies across cloud, identity, and endpoint environments
  • Experience supporting on-call rotations and working in a 24/7 or follow-the-sun SOC environment
Job Responsibility
Job Responsibility
  • Incident Response: Handle investigation and response to security incidents across endpoints, identities, email, cloud workloads, and SaaS applications
  • Act as a senior escalation point for SOC analysts during complex or ambiguous security events
  • Participate in on-call rotations and provide senior-level escalation support when needed
  • Lead or contribute to post-incident reviews (RCA, postmortems) and track remediation actions to completion
  • Ensure incidents are accurately documented for audit, compliance, and operational learning
  • Maintain and improve incident response runbooks, playbooks, and escalation procedures
  • Support incident readiness activities, including tabletop exercises and response drills
  • Detection Engineering & Automation: Develop, tune, and maintain Microsoft Sentinel analytics rules to improve detection quality and reduce false positives
  • Design and optimize KQL queries for investigations, threat hunting, and detection engineering
  • Integrate and maintain log sources and data connectors in Microsoft Sentinel, ensuring data quality and proper normalization
What we offer
What we offer
  • Interesting and meaningful work for every career stage
  • Great benefits package
  • Comprehensive benefits with strong medical, dental and vision insurance plans
  • 401K plan
  • Professional development & training opportunities for continuous learning
  • Work/life autonomy via flexible work hours and flexible paid time off
  • Generous parental leave
  • Regular team activities (virtual and in-person)
  • Fulltime
Read More
Arrow Right

Vulnerability Management Senior Cyber Security Analyst

Location (Primary) - Noida / Chennai (Secondary) GCF Level - 2A(01 nos) & 2B(01 ...
Location
Location
India , Noida
Salary
Salary:
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must hands on experience with detection and monitoring tools (Microsoft Defender for Endpoint EDR/XDR, WIZ, NESSUS PRO, Dynatrace)
  • Experience information system management and mapping tools (CMDB, VISIT)
  • Good knowledge of software distribution tools (SCCM, Intune, Satellite, Ansible, etc.), and reporting and analysis tools (PowerBI)
  • Experience with ServiceNow (SNOW), specifically the SECOPS module
  • Strong understanding of - On-prem infrastructure, SaaS / IaaS / Cloud workloads, Application vulnerability context
  • Ability to enrich findings using CMDB / asset mapping tools
  • Working knowledge of - SCCM, Intune, Ansible, Satellite
  • Stakeholder & Coordination Skills
  • Documentation & Effective Communication - Clear communication (EN/FR preferred) with structured documentation mindset
  • Process & Continuous Improvement Mindset
Job Responsibility
Job Responsibility
  • Oversee the receipt, analysis, and tracking of vulnerabilities from various sources (CERT, scanning tools, division reports)
  • manage backlog processing, and create or update vulnerability tickets using multiple detection and asset management tools
  • Assess and identify impacted assets across various environments
  • Qualify vulnerabilities by evaluating exposure, versions, severity, attack vectors, and client context
  • Enhance asset information using CMDB, and promptly issue alerts for critical vulnerabilities
  • Develop, implement, and coordinate remediation plans by analyzing security advisories and scan reports
  • Defining tailored action strategies (including patches, workarounds, and updates)
  • Prioritizing tasks, tracking requests in ServiceNow
  • Sending criticality-based reminders, and supporting remediation teams
  • Monitor and validate patch application by ensuring timely verification
  • Fulltime
Read More
Arrow Right

Cybersecurity Analyst

The Cybersecurity Analyst role at NTT DATA Romania involves monitoring and respo...
Location
Location
Romania , Bucharest; Cluj-Napoca; Sibiu; Timisoara; Brasov
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in a computer related field, preferably Engineering, Computer Science, Mathematics areas
  • Minimum 1-3 years of relevant experience in cybersecurity
  • Skills in usage of ticketing systems, SIEM, SOAR tools and other cybersecurity tools
  • Understanding of cybersecurity domains such as network security, endpoint security, anomaly detection
  • Ability and desire to travel both domestically and internationally
  • Customer oriented behavior
  • Work schedule is based on 24/7 rotating shifts (12/24, 12/48)
  • Excellent command of both spoken and written English and German
Job Responsibility
Job Responsibility
  • Monitor customer's industrial environment to perform detection, response and reporting of cybersecurity threats
  • Properly investigate, document and escalate tickets, according to internal procedures
  • Propose recommendations to fine-tune use-cases and automations, in SIEM, SOAR, and other security solutions
  • Handling phone calls on the emergency cybersecurity hotline and providing support to the customer
  • Participate in customer meetings, maintain close relationship with current clients and understand the client’s security service needs
  • Assist Senior Cybersecurity Analysts in advanced investigations & root cause analysis
  • Remain knowledgeable of the latest security threats, tactics, vulnerabilities and regulations
What we offer
What we offer
  • Smooth integration and a supportive mentor
  • Choose from Remote, Hybrid or Office work opportunities
  • Projects have different working hours to suit your needs
  • Sponsored certifications, trainings and top e-learning platforms
  • Private Health Insurance
  • Individual coaching sessions or joining our accredited Coaching School
  • Epic parties or themed events
  • Fulltime
Read More
Arrow Right

Junior SOC Analyst

We are seeking a Junior SOC Analyst to support Security Operations Center (SOC) ...
Location
Location
South Africa , Pretoria
Salary
Salary:
Not provided
overturerede.in Logo
Overture Rede
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Information Technology, Cybersecurity, or a related field
  • 3–5 years of experience in SOC operations, security monitoring, or IT security support roles
  • One or more of the following certifications: CompTIA Security+ EC-Council Certified SOC Analyst (CSA) CompTIA CySA+ Splunk Core Certified User Elastic Certified Analyst
  • Basic understanding of cybersecurity principles, threats, and incident response
  • Hands-on experience with SIEM tools (Splunk, Elastic Stack)
  • Familiarity with MITRE ATT&CK framework
  • Basic knowledge of networking, operating systems, and log analysis
Job Responsibility
Job Responsibility
  • Monitor security alerts and events using SIEM platforms such as Splunk or Elastic
  • Perform initial analysis and triage of security incidents and suspicious activities
  • Escalate confirmed incidents to senior SOC analysts according to defined procedures
  • Assist in investigating security events related to endpoints, networks, and applications
  • Maintain incident records, reports, and SOC documentation
  • Support threat intelligence ingestion and basic threat hunting activities
  • Follow SOC playbooks and contribute to continuous improvement of SOC processes
  • Support compliance and audit-related security monitoring requirements
What we offer
What we offer
  • Entry point into cybersecurity
  • High demand role
  • Exposure to enterprise environments
  • Fulltime
Read More
Arrow Right
New

Senior Cloud Security Analyst

Reporting to the Global Head of Security under Product Security, the Sr Cloud Se...
Location
Location
India , Hyderabad
Salary
Salary:
Not provided
alterdomus.com Logo
Alter Domus
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in computer science, Information Security, or related professional experience
  • 6+ years’ experience in cloud security
  • 3+ years hand-on experience working with containerized environments
  • Excellent understanding of Azure, AWS, k8s
  • Experience working with cloud security posture management tooling
  • Hands-on experience on threat modeling and security architecture reviews
  • Hands-on experience of working with compliance requirements and turning them to technical controls
  • Knowledge of cloud security best practices and industry standards
  • Strong analytical and problem-solving skills
  • Ability to think critically and make data-driven decisions
Job Responsibility
Job Responsibility
  • Design and implement security controls across AWS, Azure environments
  • Continuously enhance our cloud security posture management (CSPM) program to identify and remediate risks in configurations and policies
  • Ensure SOC 2 cloud security controls are always executed and auditable
  • Oversee security for containerized applications and Kubernetes clusters
  • Establish best practices for container image security, pod security policies, and cluster network segmentation to protect our microservices
  • Ensure cloud systems and solutions are secure by design and champion a secure guardrails approach
  • Conduct continuous vulnerability and compliance validation to ensure ongoing adherence to security policies and regulations
  • Monitor cloud environments for security incidents and ensuring rapid response through automated mechanisms
  • Serve as subject matter expert on cloud technologies and security solutions
  • Perform technical security design, architecture, change and/or configuration audits/reviews on our hosting environments including Azure & AWS, servers, network devices, endpoints, and security technologies deployed (CNAPP, MDM, WAF, DDoS, etc.)
What we offer
What we offer
  • Flexible arrangements, generous holidays, plus an additional day off for your birthday
  • Continuous mentoring along your career progression
  • Active sports, events and social committees across our offices
  • 24/7 support available from our Employee Assistance Program
  • The opportunity to invest in our growth and success through our Employee Share Plan
  • Fulltime
Read More
Arrow Right