Protera

Protera

Protera Technologies modernizes, optimizes, and secures enterprise workloads in the cloud, offering proactive services to solve business challenges, optimize costs, and mitigate risks with transparency.

IT Services
251-1K
Founded 1998

Description

  • Monitor and analyze security alerts across SIEM, EDR, NDR, FIM, and antivirus platforms to detect and investigate threats.
  • Perform correlation, pattern analysis, and threat hunting to identify anomalies, attack behaviors, lateral movement, and exfiltration attempts.
  • Execute incident response activities including triage, containment, eradication, recovery, and post-incident review.
  • Document incidents with root cause analysis, attack vectors, corrective actions, and response outcomes.
  • Develop, maintain, and improve incident response playbooks and runbooks for recurring alerts and use cases.
  • Collaborate on building SOAR playbooks to automate enrichment, containment, notification, and other response workflows.
  • Tune detection logic and optimize security rules to reduce false positives and improve alert fidelity.
  • Conduct vulnerability assessments, coordinate remediation with IT teams, and track remediation metrics.
  • Manage and optimize security tools and integrations across EDR, SIEM, SOAR, FIM, NDR, and antivirus platforms.
  • Generate incident and SOC performance reports and support compliance audits and evidence gathering.

Requirements

  • 4+ years of experience in SOC operations, cybersecurity, or incident response.
  • Strong knowledge of EDR, SIEM, SOAR, NDR, FIM, and antivirus/NGAV platforms.
  • Experience writing playbooks, automating responses, and tuning detection logic.
  • Familiarity with incident handling frameworks, threat hunting, and digital forensics.
  • Knowledge of MITRE ATT&CK, Cyber Kill Chain, NIST IR, and ISO 27001.
  • Preferred certifications include CompTIA Security+, CySA+, CEH, Microsoft SC-200, or equivalent.
  • Preferred exposure to SIEM tools such as Splunk, Microsoft Sentinel, QRadar, or Elastic.
  • Preferred exposure to EDR/NDR tools such as CrowdStrike Falcon, Defender for Endpoint, SentinelOne, Darktrace, or Corelight.
  • Preferred exposure to FIM/AV tools such as Tripwire, Qualys FIM, Trellix/McAfee, Sophos, or Bitdefender.
  • Preferred exposure to SOAR tools such as Cortex XSOAR, Splunk SOAR, or Microsoft Sentinel Automation.
  • Experience creating and maintaining incident response playbooks and runbooks.
  • Ability to perform threat hunting and deep-dive investigations using EDR, NDR, and SIEM telemetry.
  • Knowledge of security automation, cloud-native security, and network forensics.
  • Strong communication and documentation skills for technical and executive audiences.
  • Ability to work effectively in high-pressure, time-sensitive environments with precision and accuracy.

Benefits

  • Work-from-home setup.
  • Comprehensive medical benefits.
  • Gratuity, PF, EPS, bonus, and NPS contributions.
  • Shift allowances and on-call allowance.
  • Health and wellness allowances.
  • Learning and development allowances.
  • No-question-asked certification policy.
  • Certification bounty bonus.

Interested in this position?

Apply directly on the company website

Apply Now

Similar Roles

Member of Information & Security

Anchorage Digital 251-1K Capital Markets

Anchorage Digital is hiring a Member of the Global Information & Security Team to help build and scale its information security and IT risk management program for institutional digital asset services in a heavily regulated environment.

Cybersecurity Encryption
4 hours, 54 minutes ago

FBS Information Security Analyst

Capgemini 100K+ Internet Software & Services

FBS – Farmer Business Services, in partnership with Capgemini as Employer of Record, is seeking a Platform Security team member to help secure Farmers’ SaaS platforms and support compliance and access governance across a global environment.

9 hours, 39 minutes ago

Threat Intelligence Analyst (Quantitative Methods)

Moonshot 51-250 Diversified Consumer Services

Moonshot is seeking an Analyst to support threat intelligence reporting on online targeted violence in the US, focusing on open-source analysis and delivery of insights for US-based clients.

Kibana Python Tableau
9 hours, 54 minutes ago

SOC Analyst

Kraft Kennedy 51-250 Internet Software & Services

Kraft Kennedy is hiring a remote SOC Analyst to support its managed security services team by maintaining the SIEM platform, investigating incidents, and helping improve client security operations.

Azure Linux PowerShell Python SIEM
10 hours, 24 minutes ago

You're on a roll! Sign up now to keep applying.

Sign Up

Already have an account? Log in

Used by 14,729+ remote workers