Please share your resumes with bimala.behera@inspiraenterprise.com
_________________________________________________________________________________________________________
📅 Date : Saturday 8th November 2025 and Sunday 9th November 2025
🕙 Timing : 10 : 00 AM – 5 : 00 PM
📍 Venue : Office No. 401, 4th Floor, Amar Tech Park, Village Balewadi, Pune-411045
SIEM Admin - EXP : 5+ Years 1. Develop and implement new correlation rules, detection logic, and alerts based on client-specific security requirements and emerging threat intelligence. 2. Continuously fine-tune existing rules to reduce false positives, improve detection accuracy, and align with evolving business and compliance needs. 3. Configure and maintain SIEM data ingestion pipelines, ensuring accurate parsing and normalization of logs from diverse sources. 4. Manage and update device configurations, data source settings, and field mappings to ensure consistent and reliable log ingestion. 5. Perform daily, weekly, and monthly health checks of the SIEM infrastructure, including log ingestion status, storage utilization, and system performance. 6. Create and maintain Standard Operating Procedures (SOPs) for SIEM administration, ensuring operational consistency and faster issue resolution. 7. Apply software patches, updates, and version upgrades for QRadar and Microsoft Sentinel in accordance with vendor guidelines and change management policies. 8. Conduct periodic configuration reviews and cleanup to maintain system efficiency and performance. 9. Design, develop, and deploy custom parsers to handle non-standard or proprietary log formats. 10. Test and validate custom parsers to ensure proper field extraction, normalization, and mapping for accurate analysis. 11. Work closely with SOC analysts, threat hunters, and incident response teams to enhance detection capabilities.
EDR L3 - EXP : 4 -7 Years 1. Conduct proactive threat hunting using KQL queries in Advanced Hunting. 2. Develop and fine-tune detection rules and custom indicators in Defender. 3. Analyze malware samples, exploit attempts, and correlate with other telemetry (SIEM, threat intel). 4. Work with Microsoft support for complex incident resolution and platform issues. 5. Contribute to playbook creation, tuning, and integration with SOAR for automated response.
CISCO NBAD L2 - 1. Conduct in-depth analysis of escalated security incidents, identify root causes, and recommend corrective actions. 2. Perform regular tool health checks and provide detailed reports on NBAD system performance, anomalies, and stability. 3. Plan, coordinate, and execute patch upgrades, software updates, and system optimizations to maintain platform security and compliance. 4. Serve as the highest escalation point for NBAD-related security alerts, coordinating with SOC teams and stakeholders for timely resolution. 5. Create, refine, and modify NBAD use cases / rules to improve detection capabilities in alignment with evolving threat landscapes. 6. Onboard new devices, integrate additional data sources, and ensure accurate and complete traffic visibility in NBAD. 7. Provide expert guidance to SOC teams on NBAD configurations, detection logic, and operational improvements.
Professional • hosur, tamil nadu, in