Skip to Main Content

Job Title


Freelance Security Operations Specialist (SOC, Azure AD/Entra ID, BeyondTrust, Zscaler, QRadar,


Company : ThreatXIntel


Location : Tiruchirappalli,


Created : 2025-07-21


Job Type : Full Time


Job Description

Company Description ThreatXIntel is a startup cyber security company dedicated to delivering customized, affordable solutions to protect businesses and organizations from cyber threats. Our proactive approach includes continuous monitoring and testing to identify vulnerabilities. We offer services in cloud security, web and mobile security testing, cloud security assessment, and DevSecOps to meet the specific needs of our clients. Role Description We are seeking a Freelance Security Operations Specialist to support our enterprise security initiatives across identity, access, endpoint, and threat detection platforms. This role requires hands-on expertise in modern SIEM tools, threat response, and security administration across a multi-vendor environment.Key Responsibilities Monitor and respond to security incidents as part of a 24x7 or follow-the-sun SOC model Manage and administer SIEM tools, especially IBM QRadar , to detect, analyze, and respond to threats Maintain and troubleshoot Azure Active Directory / Entra ID for identity and access management Support policy and configuration management in Zscaler (ZIA/ZPA), Proofpoint , and BeyondTrust (PAM) Correlate data from multiple tools to improve incident detection and resolution Create security rules, reports, dashboards, and threat models across systems Coordinate with infrastructure and application teams to ensure security best practices Required Skills 5+ years of experience in Security Operations Center (SOC) or security engineering roles Hands-on experience with IBM QRadar or similar SIEM platforms Strong knowledge of Azure Active Directory / Entra ID administration and security controls Practical experience with Zscaler (ZIA/ZPA), Proofpoint (Email security), and BeyondTrust (PAM) Familiarity with common attack vectors, MITRE ATT&CK, and threat hunting practices Ability to investigate incidents and write incident reports and root cause analyses Scripting or automation experience (e.g., Python, PowerShell) is a plus Nice to Have Experience integrating third-party logs into QRadar or other SIEM platforms Security certifications such as AZ-500 , CEH , Security+ , or Splunk/QRadar certifications Familiarity with cloud security tools in Microsoft 365 Defender , Sentinel , or Cloud App Security