Job Title : Active Directory Administrator
Location : Bangalore
Experience : 9+ years
Duration : 12+ months (With an option to extend)
Job description :
- Automate routine tasks ( PowerShell preferred , any scripting language welcome). Must?have — Core Windows / AD (applies to all candidates)
- Strong hands?on administration of Microsoft Active Directory (GPO, DNS, DHCP), PKI , and Windows Server / Client at enterprise scale.
- Working knowledge of LDAP , directory replication , and schema change safety; obsessive about standards, procedures, and access hygiene.
- Scripting proficiency in at least one language (PowerShell preferred) for automation and diagnostics.
- Demonstrated, methodical troubleshooting and prioritization under pressure; excellent communication; quick learner with a growth mindset. Must?have — Pick ONE Emphasis Track Track A — Splunk Administration
- Administer and harden Splunk Enterprise in multi?site deployments (indexer clustering + search head clustering, deployer / DS, RBAC, app lifecycle, license mgmt).
- Own performance & reliability : ingestion / search tuning (RF / SF validation, queues, bucket health, retention), and DR / failover testing.
- Lead clean, compliant data onboarding (forwarders / syslog / HEC), sourcetypes, props / transforms, timestamps / line?breaking, field extractions.
- Build / optimize SPL , dashboards, and alerts; coach users on best practices. Nice within this track : Linux + scripting (bash / Python); networking / TLS fundamentals; NFS?backed indexers; Splunk ES / ITSI / MLTK / SOAR; Splunk Architect cert; include a brief write?up of a difficult Splunk performance / ingestion issue you solved (symptoms ? root cause ? fix ? before / after).Track B — Netskope (SWG / CASB) Administration
- Administer and evolve Netskope : threat protection, secure web gateway, and DLP policies aligned to security requirements; coordinate safe rollouts with client, network, and InfoSec teams.
- Investigate and resolve connectivity / performance issues; assist security incident response and apply relevant product features.
- Analyze endpoint / agent logs, policy traces , SSL / TLS handshakes, PAC / proxy flows, and gateway telemetry; corroborate with identity, DNS, and network data; build diagnostics dashboards (often in Splunk). Nice within this track : Netskope certification (NSCO&A / NSCI); familiarity with SSL / TLS and PKI internals; Wireshark / HAR fluency; prior CASB / SWG experience (vendor?agnostic).You’ll also touch IPAM , Splunk (as a consumer if you’re in the Netskope track), Netskope / CASB (as a consumer if you’re in the Splunk track), One Identity ActiveRoles , Quest RMAD , and related enterprise tools.Success looks like
- Directory hygiene : clean replication, predictable GPO / DNS / DHCP behavior, and well?documented PKI changes.
- Troubleshooting outcomes : faster MTTR with clear RCAs, reusable runbooks, and automation to prevent recurrence.
- Splunk track : cluster health green (RF / SF met), low ingest errors & latency, stable license utilization, search SLOs met, clean field extractions.
- Netskope track : safe policy rollouts, measurable reduction in policy?related incidents, clear visibility for investigations, and improved end?user experience. Nice?to?have (both tracks)
- Experience in large enterprises (~10k+ users) and with compliance regimes (ISO / NIST / PCI / HIPAA / GDPR).