Professional Services Consultant – XDR
navneetkaur | Updated: August 1, 2024
About Trantor:
Trantor is a technology services company focused on outsourced product development and digital re-engineering. Leveraging our CaptiveCoE™ engagement model, we operate as a seamless extension of our client’s teams to provide rapid scalability with predictable budgets. Founded in 2012, Trantor has worked with customers across Tech, FinTech, Media & Cybersecurity industries. We have centers in the US, India, Canada, and Costa Rica. We are consistently rated as the #1 employer in the region with the ability to attract and retain technical talent. Our commitment to excellence and impactful results has translated to long-term relationships and value for our clients and solution partners.
Job Role & Responsibilities
- Lead Endpoint protection deployment, operationalisation, troubleshooting, training and Security Policy Tuning
- Analyze customer requirements, provide guidance & assistance throughout the customer lifecycle to ensure a quick and successful product deployment.
- Design and implement advanced security policies based on machine learning, behavioral analytics, and threat intelligence to proactively detect and respond to emerging threats.
- Act as the product SME, working together with product and engineering teams ensuring our customers and partners get the most out of our products.
- Independently investigate and respond to complex security incidents, leveraging XDR and deep understanding of incident response methodologies.
- The candidate is expected to comply with the company’s policies and procedures.
Required Skills
- 6-10 years relevant work experience in Endpoint Security, EDR / XDR or similar roles required
- Hands on experience on EDR/XDR or Next Gen AV tools like Carbon Black, Palo Alto Cortex XDR, Crowd Strike or Cisco AMP (preferably any one of these or equivalent tools).
- Extensive experience in deploying, configuring, and managing XDR, with a deep understanding of its architecture, components, and capabilities.
- Experience as a Security Incident Responder or SOC analyst/manager. Strong incident response skills, with the ability to independently investigate and respond to complex security incidents using XDR.
- Familiarity with threat intelligence frameworks, threat hunting techniques, and advanced threat detection methodologies.
- Should have a clear understanding of the MITRE framework and how to operationalize the same across multiple functions
- Familiarity with cloud technologies, providers (GCP, AWS, Azure), use-cases.
- Networking experience in TCP/IP, OSI Model, troubleshooting, analysis.
- Experience in customer-facing roles.
- Familiarity with machine learning and its various applications within cybersecurity.
- Familiarity with the different enterprise security and IT products, processes, and ecosystem
- Basic Linux system administration & troubleshooting experience.
- The ability to develop and maintain scripts in Python or PowerShell is a plus.
- Excellent written and verbal communication skills.
- AWS/Azure/GCP certifications would be an added advantage.