Are you a seasoned Security Engineer with a passion for safeguarding digital environments and defending against emerging cyber threats? We are seeking a highly skilled and motivated Senior Information Security Engineer to strengthen our security posture across multiple domains.
In this role, you will design, operate, and continuously enhance the organization’s detection, response, and security architecture. The position blends blue team operations with red team thinking, enabling proactive identification of weaknesses, improvement of detection capabilities, and effective response to advanced threats across cloud, email, endpoint, identity, and network environments.
Key Responsibilities
- Collaborate closely with engineering, infrastructure, and compliance teams on security aspects of operating systems, databases, access controls, patch management, encryption, antivirus, and vulnerability management.
- Design, build, deploy, monitor, and maintain security systems, owning assigned initiatives end-to-end.
- Clearly communicate complex cybersecurity risks, threats, and impacts to senior management.
- Provide architectural security guidance to infrastructure, operations, data, and network teams during implementation and production phases.
- Build and maintain strong working relationships with management, peers, project managers, and internal stakeholders.
- Translate threat intelligence into actionable security controls across platforms, including endpoint, email, IAM, patch management, firewalls, IPS, malware detection, and alerting systems.
Lead high-severity incident response efforts, including in-depth investigations, malware analysis, and correlation of user activity with network traffic.
- Conduct post-incident root cause analysis from an attacker’s perspective.
- Perform adversary emulation and attack simulations aligned with the MITRE ATT&CK framework.
- Validate security controls by simulating red-team techniques such as credential theft, lateral movement, privilege escalation, persistence, and living-off-the-land techniques.
- Map detections to MITRE ATT&CK techniques and improve detection coverage. • Partner with the SOC to identify and close detection gaps.
- Mentor junior security engineers and SOC analysts.
- Influence security tooling decisions and long-term security roadmap.
The Ideal Candidate Will Have
- In-depth experience with the Microsoft 365 ecosystem, including endpoint, email, cloud security, and threat hunting.
- Expertise in Identity and Access Management (IAM), Identity Governance, Conditional Access, IdP, PIM, JIT access, and Single Sign-On (SSO) implementations.
- Comprehensive understanding of logging, event management, SOC operations, incident management, host isolation, and containment strategies.
- Hands-on experience with Microsoft Sentinel automation, orchestration, data connectors, analytics rules, and Kusto Query Language (KQL).
- Experience integrating threat intelligence feeds with SIEM platforms.
- Strong hands-on experience with endpoint security tools such as Microsoft Defender for Endpoint (MDE), Intune, and JAMF.
- Expertise in system hardening and Intune policy and compliance configurations. • Network Detection and Response (NDR) experience (preferred).
- Skills in network segmentation, firewall rule reviews, and packet analysis (e.g., Wireshark).
- Familiarity with KnowBe4, including security awareness training and phishing, simulations.
- Strong understanding of cloud security across Azure, AWS, and GCP, including assessment and remediation.
- Expertise in email security, including Microsoft Exchange, SMTP/MAPI protocols, header analysis, and phishing detection.
- Expertise in email security including Microsoft exchange and header analysis for Phishing, suspicious email attachment and detection of other threats.
- Hands-on experience with vulnerability management lifecycle using industry reputable tools such Tenable, Rapid7, Qualys etc. With understanding of Common Vulnerability Scoring System (CVSS) scoring on exploitability and remediation strategies.
- Hands-on with red-teaming tools to execute attack and breach simulations that mimic the specific threat actors to test detection and response capabilities.
- Good reporting and debriefing skills to translate complex technical findings into actionable reports for stakeholders and collaborate with blue teams to improve defenses.
Education & Qualifications
- Bachelor’s degree in an IT-related discipline.
- Minimum 5 years of experience in security engineering, SOC operations, or detection focused roles.
- Relevant technical cybersecurity certifications are a plus
Job Type: Full-time
Pay: Rs350,000.00 - Rs400,000.00 per month
Work Location: In person