Please find the Job Description for EDR:Experience - 5 to 12 years1. -Good working knowledge of EDR solutions such as MDATP, FireEye, CrowdStrike Falcon, Carbon Black.2. -Must be well-versed with Operating System concepts i.e. Windows/Linux/MacOS3. -Ability to distinguish between False Positives and False Negatives detections with respect to logs available.4. -Good Exposure to OSINT tools, sandboxing, encoding-decoding techniques for independent investigation.5. -Must be able to Investigate and Triage EDR related alerts with an ability to share detailed investigation reports to clients within SLA.6. -Knowledge of Cyber kill chain and MITRE ATT&CK techniques and tactics used by adversary to evade detection.7. -Awareness of various stages of Incident Response which involves in-depth analysis and RCA submission on security incidents.8. -Good understanding of Malware Analysis i.e. static and dynamic and its variants.9. -Exposure to adversary simulation and red teaming tools such as Caldera, PowerShell Empire, Cactus Torch10. -Understanding of Database language i.e. KQL is a Plus.11. -Understanding of Network Security concepts and popular encryption standards.12. -Excellent communication skills for cross-group and interpersonal skills with ability to articulate business need for detection improvements.13. -Exposure to reverse engineering of malware samples is a plus.14. -Certification in OSCP, OSCE, GREM, GCIH, GCFA will be highly preferred.***Willing to work in rotational shift timings.// To be added if required.
Job Title
EDR