· Experience & Qualifications: · We need to append EDR experience / exposure and strong understanding of the threat landscape to the below JD. o Experience : Minimum of 3 years of hands-on experience working in a Security Operations Center (SOC) environment, with a strong focus on incident monitoring, triage, and response. o Certifications : § Microsoft Certified: Security Operations Analyst Associate (SC-200) § CompTIA Security § Security Blue Team Level 2 o Preferred Technical Skills : Familiarity with scripting languages (e.g., Python, PowerShell) for automation and analysis. Advanced (non-Negotiable): 1. Experience in Critical Security Incident Response. 2. Advanced knowledge of EDR tools (preferably CrowdStrike or Microsoft). 3. Advanced knowledge on Microsoft Security Monitoring and Alerting platforms e.g. Sentinel, Cloud Defender. 4. Well versed with Cyber Kill Chain and other leading Security framework related to Security Incident Response. 5. Advanced knowledge of Windows Security, its logging and monitoring 6. Advance knowledge and understanding of Threat Hunting. Intermediate: 1. Intermediate knowledge of SIEM Content Engineering. 2. Intermediate knowledge of network security platform e.g. WAF, Proxy, Next Gen Firewall and associated security policies. 3. Intermediate knowledge of Linux Security and Cloud Security. 4. Intermediate knowledge of DLP and Email Security. Basic/Good-to-Have: 1. Digital Forensic 2. Cybersecurity Engineering 3. Offensive Security