🔔 FCM Loaded

Cyber Threat Investigator

FastSwitch - Great Lakes Pvt Ltd.

2 - 5 years

Chennai

Posted: 29/01/2026

Getting a referral is 5x more effective than applying directly

Job Description

Position Description:

Employees part of this job function conduct threat and vulnerability assessments, determine resolution actions for high-security incidents or cyber threats, and develop cyber security controls to mitigate potential risk to organizations assets. They also specialize in conducting ethical hacking tests and security trainings and providing recommendations on remediation measures to address potential cyber threats. They proactively develop and implement encryption standards and manage security monitoring tools Key Responsibilities: 1. Conduct threat assessments based on attack analysis, threat modeling, and attack vendor probability. Analyze global intelligence data to uncover patterns and help inform protocols and practices to mitigate potential risk to organization's assets. 2. Monitor security threats and operational performance using various tools, maintain security controls, and automate system health checks for organization's information assets 3. Define scope for penetration testing, perform ethical hacking tests, capture test findings, and communicate recommendations on remediation measures. 4. Collaborate with business to communicate through training programs the risks of identified vulnerabilities and recommend cost-effective security controls for risk mitigation. 5. Triage events, escalations, and incidents to determine resolution actions and coordinate response activities to remediate potential threats including insider and cyber threats 6. Interfacing with teams to deliver multi-factor authentication/access solutions, automate security scans and deployments, and develop full-stack solutions 7. Evaluation, development, implementation, and communication of encryption standards, procedures, and guidelines for multiple platforms and diverse systems environments

Skills Required:

Computer Security, Information Security, Endpoint Security

Skills Preferred:

Microsoft Azure

Experience Required:

Specialist Exp: 5+ experience in relevant field

Experience Preferred:

. Familiarity with EPM, Remote Help, BindPlane, Tanium, or related security platforms. Experience with mobile security (Defender for Mobile, app classification). Experience supporting compliance frameworks in large enterprise environments. Improve security posture visibility and compliance automation. Support smooth rollout of security tools and policies with minimal end-user disruption.

Education Required:

Bachelor's Degree

Education Preferred:


Additional Safety Training/Licensing/Personal Protection Requirements:


Additional Information :

Engineer enhanced compliance configurations: device posture rules, vulnerability requirements, and new hardening baselines. Support remediation strategies for non-compliant and legacy devices. Configure and support Endpoint Privilege Management (EPM) rollout, including policy tuning and access workflows. Deploy Remote Help configuration policies and assist with onboarding for support teams. Deploy Microsoft Defender for corporate iOS and Android devices and assist with onboarding for support teams. Collaborate with Network Engineering on wired device validation, VLAN authentication, and expanded compliance criteria. Contribute to security assessments, including remediation items resulting from assessments.

Services you might be interested in

Improve Your Resume Today

Boost your chances with professional resume services!

Get expert-reviewed, ATS-optimized resumes tailored for your experience level. Start your journey now.