Full-Time

Principal DITO Architect

HEXAWARE

HEXAWARE

No salary listed

India

In Person

Category
IT & Security (1)
Required Skills
Microsoft Azure
DevOps
Requirements
  • Extensive expertise in SIEM/Security Information and Event Management and Security Orchestration, Automation, and Response (SIEM/SOAR); Defender for Servers for antivirus, endpoint detection and response, and file integrity monitoring; Defender for Cloud for cloud security posture management and workload protection; Defender Threat Intelligence for proactive threat hunting and enrichment; Azure Firewall and Network Security Groups for perimeter security; strong coding capabilities to ensure robust defense across hybrid and cloud-native environments.
  • Deep understanding of the Well-Architected Framework, Microsoft Security Adoption Framework (SAF), and Centre for Internet Security/Cloud Security Alliance controls to ensure alignment with industry standards and best practices.
  • Experience integrating and optimizing Microsoft Sentinel for SIEM/SOAR; Defender for Servers; Defender for Cloud; Defender Threat Intelligence; Azure Firewall and NSGs; Log Analytics and Azure Monitor for visibility and monitoring.
  • Design secure Landing Zones and enforce security baselines; Develop and implement incident response playbooks and automation workflows in Microsoft Sentinel.
Responsibilities
  • Architect and implement Azure Solutions by integrating and optimizing Microsoft Sentinel for SIEM/SOAR, Defender for Servers for antivirus, EDR, and FIM, Defender for Cloud for CSPM and workload protection, Defender Threat Intelligence for proactive threat hunting and enrichment, and Azure Firewall and Network Security Groups for perimeter security.
  • Design secure Landing Zones and enforce security baselines.
  • Develop and implement incident response playbooks and automation workflows in Microsoft Sentinel.
  • Integrate Defender solutions with Log Analytics and Azure Monitor for enhanced visibility and monitoring.
  • Conduct threat modeling, vulnerability assessments, and compliance audits to identify and mitigate risks.
  • Implement and manage perimeter security controls, including firewalls, web application firewalls, and DDoS protection.
  • Collaborate with Security Operations Center, DevOps, and infrastructure teams to embed security into CI/CD pipelines and operational workflows.
  • Perform proactive threat hunting and incident analysis using threat intelligence and advanced analytics.

Company Size

N/A

Company Stage

N/A

Total Funding

N/A

Headquarters

N/A

Founded

N/A