Back to Jobs

Senior Managed EDR Threat Engineer - Remote India Position

Proficio No location specified Full-time
$130,000
per year

Job Description

Proficio is an award-winning managed detection and response (MDR) services provider. We provide 24/7 security monitoring, investigation, alerting and response services to organizations in healthcare, financial services, manufacturing, retail and other industries. Proficio has been highlighted in Gartner’s Market Guide for Managed Detection and Response Services for the last three consecutive years. We have a track record of innovation. Proficio invented the concept of SOC-as-a-Service. We were the first MSSP to provide automated response services and the first in our space to provide a risk scoring dashboard.

 Our typical client is a medium to large-sized organization that lacks the in-house resources to address the challenges of a rapidly changing threat landscape. The difficulty of hiring and retaining cybersecurity professionals are widely understood but our prospective clients also struggle to effectively harness technology and build hardened processes.

 While Proficio has developed a unified service delivery platform designed to meet the needs of the most demanding clients, what sets us apart is the quality and passion of our people. We believe the SOC of the Future will meld the creativity of human intelligence with the power of advanced technologies like AI.

 Summary:

The Managed infrastructure Services team is seeking an experienced MEDR threat engineer who is technical, collaborative, and excited about working on endpoint products. In this role, you will bring your in-depth knowledge of the endpoint and detection response tasks to help guide the evolution of Proficio's Managed EDR visibility, detection, and prevention technologies. You will work closely with engineering, project managers, Hosted & Managed SIEM team, sales, and other departments. You will bring existing knowledge about product EDR best practices and apply them in delivering significant new features and enhancements. The successful candidate will have the ability to interface and influence cross-functional teams throughout the company.

 Responsibilities:

    • Deploy, configure, and maintain EDR solutions: MUST - Manage and optimize EDR platforms, including CrowdStrike Falcon, Microsoft Defender for Endpoint. Ensure that endpoints are adequately secured, and all EDR solutions are functioning effectively within the environment.
    • Endpoint Security Management: Administer endpoint security management tools such as antivirus, web filtering, data loss prevention, and spam filtering, focusing on integration and coordination with EDR platforms to ensure a comprehensive security posture.
    • Proactive Threat Hunting: Leverage the full capabilities of EDR tools to proactively hunt for threats across the enterprise environment. Utilize CrowdStrike Falcon's Threat Graph, Defender for Endpoint's advanced hunting queries, and SentinelOne’s behavioral AI to detect undetected threats and abuse.
    • Incident Investigation and Response: Conduct in-depth investigations using EDR solutions to analyze complex account compromises, malware infections, and vulnerabilities. Use advanced detection mechanisms in TrendMicro Vision One and CrowdStrike to understand adversarial behavior and recommend appropriate mitigation strategies.
    • Remediation and Prevention: Identify and implement detection/prevention strategies through EDR platforms. Leverage Microsoft Defender for Endpoint to automate response playbooks and block potential threats, and utilize Apex One to enhance protection against emerging threats.
    • Tactics, Techniques, and Procedures (TTPs): Apply knowledge of adversary TTPs across multiple attack surfaces using EDR tools. Utilize real-time intelligence from CrowdStrike, Defender for EndPoint and from other EDR tools to stay ahead of emerging tactics and enhance detection capabilities.
    • Cross-functional Communication: Lead technical investigations and communicate actionable insights derived from EDR tools to cross-functional teams. Ensure that the analytic findings and mitigations are clear and actionable across different teams.
    • Continuous Improvement: Continuously analyze data from EDR tools like CrowdStrike, Defender for Endppoint. TrendMicro Vision One to identify trends in adversary behavior. Create new detection rules and adjust EDR settings to ensure optimal performance and coverage.
    • Security Analytics and Data Interpretation: Use data from EDR tools and other EDR platforms to analyze, interpret, and quantify trends. This supports the investigation of threats and validates security incidents.
  • 3.5+ years work experience in a cyber security, security investigations, or cyber threat intelligence investigation’s role
  • REQUIRED: Experience with deploying, configuring, and maintening Enterprise EDR Solutions specifically CrowdStrike Falcon and Microsoft Defender for Endpoint.
  • Experience with similar tools such as SentinelOne, TrendMicro Vision One, and Apex Central is considered a plus.
  • Experience investigating and acting on high-impact threats such as account compromise, account creation abuse, business compromise, or malware analysis
  • Experience thinking critically and qualifying assessments with solid communications skills in a cross-functional setting to influence decision makers
  • 2+ years of experience with performing systems administration, including basic troubleshooting and installation, monitoring system performance or availability, and performing security upgrades
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles
  • Knowledge of various Enterprise Operating System (OS) configurations and management tools for use during deployment, configuration, and management of EDR solutions

 Additional Qualifications:

  • Good to have experience working in a Security Operations Center (SOC) environment including Incident Response, Vulnerability Scanning, Threat Hunting, Network Monitoring/Log Management, or Compliance Management
  • Good to have experience with complimentary Enterprise Security Tools including Security Information & Event Management (SIEM), Threat Intelligence Platforms (TIPs), or Network Monitoring Tools
  • Experience with triaging security events in a security operations center (SOC) environment, leveraging data collected from enterprise security solutions
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions
  • Ability to integrate Cybersecurity data using enterprise or custom tools data aggregation and analysis tools, including Splunk and Elastic
  • Salary 13 Lakh
  • Opportunity to work in a progressive organization with structured training and roadmap for success
  • Health benefits, lunches, gym reimbursement, and internet funding for our India staff!
  • Experience in one of the hottest IT industries today

Proficio is an EOE employer.

Proficio collects certain personal information upon your submission of an application for an open position. More information is available about your consumer rights and our privacy policy at www.proficio.com/privacypolicy

Company Information

Location: Carlsbad, CA

Type: Hybrid