
Cloud Services • Enterprise • SaaS
Protera is a globally certified SAP, Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP) cloud migration and enterprise managed service provider. The company excels in modernizing, optimizing, and securing enterprise workloads in the cloud, offering a suite of services that include cloud modernization, managed cloud security, disaster recovery, data intelligence, and SAP migration. Protera has been a pioneer in enterprise cloud services since 1998, known for its deep technical expertise in SAP systems and ability to drive down costs while enhancing performance and security for its clients.
October 6

Cloud Services • Enterprise • SaaS
Protera is a globally certified SAP, Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP) cloud migration and enterprise managed service provider. The company excels in modernizing, optimizing, and securing enterprise workloads in the cloud, offering a suite of services that include cloud modernization, managed cloud security, disaster recovery, data intelligence, and SAP migration. Protera has been a pioneer in enterprise cloud services since 1998, known for its deep technical expertise in SAP systems and ability to drive down costs while enhancing performance and security for its clients.
• Responsible for maintaining cybersecurity posture through continuous monitoring, detection, and incident response. • Use advanced technologies like EDR, SIEM, NDR, FIM, and NGAV to identify and mitigate security threats. • Develop automated playbooks using SOAR platforms to streamline response workflows. • Collaborate across teams to enhance detection logic, improve processes, and ensure proactive defense against cyber threats. • Execute incident response lifecycle including triage, containment, eradication, and recovery. • Document incidents thoroughly and support post-incident reviews. • Develop, maintain, and enhance incident response playbooks. • Conduct regular vulnerability assessments and coordinate timely remediation. • Manage and optimize EDR, SIEM, SOAR, FIM, NDR, and Antivirus tools.
• 4+ years in SOC operations, cybersecurity, or incident response. • Strong knowledge of EDR, SIEM, SOAR, NDR, FIM, and Antivirus/NGAV platforms. • Experience in writing playbooks, automating responses, and tuning detection logic. • Familiarity with incident handling frameworks, threat hunting, and digital forensics. • Knowledge of MITRE ATT&CK, Cyber Kill Chain, NIST IR, ISO 27001 frameworks. • Preferred Certifications: CompTIA Security+, CySA+, CEH, Microsoft SC-200, or equivalent. • Preferred Tools Exposure: Splunk, Microsoft Sentinel, QRadar, Elastic, CrowdStrike Falcon, Defender for Endpoint, SentinelOne, Darktrace, Corelight, Tripwire, Qualys FIM, Trellix/McAfee, Sophos, Bitdefender, Cortex XSOAR, Splunk SOAR, Microsoft Sentinel Automation. • Ability to perform threat hunting and deep-dive investigation using EDR, NDR, and SIEM telemetry. • Strong communication and documentation skills for both technical and executive audiences.
• Work from Home set-up • Comprehensive medical benefits • Gratuity, PF, EPS and Bonus, NPS • Shift Allowances • On-call Allowance • Health and wellness Allowances • Learning and Development Allowances • No question asked certification policy. • Certification Bounty Bonus
Apply Now