Security Engineer Microsoft Security Engineer

Security Engineer — Microsoft Security Engineer

Pune, India

Experience Required: Mid-Level (8–10 Years)

Job Summary

This profile defines the technical skills and experience required for a Microsoft Security Engineer specializing in end-to-end Microsoft security implementations. The role demands deep hands-on expertise across the Microsoft Security Stack — including Microsoft Purview, Sentinel, Defender, Entra ID, Intune, Azure Infrastructure, and cloud application governance via Microsoft Defender for Cloud Apps (MCAS). Must have delivered at least two end-to-end Microsoft security implementations independently.

Experience Requirements

  • 8–10 years total experience in cybersecurity or cloud infrastructure security.
  • Minimum 4+ years of hands‑on experience with the Microsoft security stack in production enterprise environments.
  • Demonstrated experience in deployment (greenfield and brownfield) as well as steady‑state security operations.
  • Experience working in environments with 500+ managed endpoints.
  • Exposure to regulated industries (healthcare, financial services, or equivalent) preferred.
Microsoft Purview
  • Sensitivity label taxonomy design and auto‑labeling policy deployment at scale.
  • DLP policy creation across Exchange, SharePoint, Teams, Endpoint, and AI Endpoint channels.
  • Purview Audit Advanced configuration and log retention enforcement.
  • Insider Risk Management policy design and tuning.
  • Compliance Manager assessment configuration (HIPAA, SOC 2).
  • Communication Compliance policy configuration.
  • Records Management and retention label automation.
Microsoft Sentinel
  • Sentinel workspace deployment including Log Analytics Workspace sizing and commitment tier selection.
  • Data connector configuration: M365, Defender XDR, Entra ID, Azure Activity, custom sources.
  • Strong KQL skills — can write custom detection queries from scratch.
  • Analytics rule creation, tuning, and false‑positive reduction.
  • Logic App playbook development — must have built at least two end‑to‑end automated response playbooks.
  • HIPAA and SOC 2 workbook configuration.
  • UEBA and entity behavior analytics configuration.
Microsoft Defender
  • Defender for Endpoint Plan 2 deployment at scale — bulk onboarding via Intune.
  • Defender for Cloud Apps — Cloud Discovery configuration, session policies, app sanctioning and blocking, custom app connectors
  • Defender for Office 365 Plan 2 — Safe Attachments, Safe Links, anti-phishing, attack simulation setup
  • Defender Vulnerability Management — risk-based prioritisation dashboard and reporting
  • Defender for Cloud — CSPM configuration and regulatory compliance dashboard
Microsoft Entra ID
  • Conditional Access policy design: Named Locations, device compliance, app‑based CA, sign‑in risk policies.
  • PIM configuration for privileged role access.
  • PIM configuration for privileged roles
  • Entra Access Reviews — configuration and review cycle management
  • Entra Terms of Use for policy enforcement
  • Lifecycle Workflows for automated joiner-mover-leaver processes
  • Identity Protection — risky user and risky sign-in policy configuration
Microsoft Intune
  • MDM configuration: screen lock, encryption, and compliance profiles.
  • MAM app protection policies for BYOD (no enrollment required).
  • Windows Autopilot for bulk device enrollment.
  • App deployment and managed browser configuration.
Azure Infrastructure
  • Log Analytics Workspace creation, data retention configuration, archive tier setup.
  • Azure Backup: vault configuration, backup policy design, restoration testing.
  • Azure Key Vault for secrets management (service principals, automation credentials).
  • Azure Monitor alert rules and diagnostic settings.
  • Basic Azure networking — understands NSGs and private endpoints.
Automation & Tooling (Non‑Negotiable)
  • PowerShell + Microsoft Graph API — able to script bulk Purview label deployments, bulk DLP updates, and Entra operations.
  • Microsoft 365 DSC — used at least once for configuration baseline capture and drift detection.
  • Sentinel All‑in‑One — familiarity with ARM/Bicep template‑based deployment and customization.
  • Terraform or Bicep for Azure infrastructure as code (must know at least one).
  • PnP PowerShell for SharePoint and Teams configuration tasks.

Certifications :

  • SC‑200 (Security Operations Analyst) — Required or must be obtained within 3 months
  • SC‑400 (Information Protection Administrator) — Strongly Preferred
  • AZ‑500 (Azure Security Engineer) — Preferred for infrastructure workloads
Note: SC‑200 is a hard requirement. Candidates without it must demonstrate an active study commitment and a credible path to certification within 90 days of joining.

Non-Technical Requirements :

Communication & Documentation
  • Ability to produce clear, structured technical documentation, including alert rules, playbook runbooks, incident response plans, and evidence reports.
  • Comfortable presenting security metrics and maturity status to non‑technical stakeholders.
  • Able to translate SOC alerts and incidents into plain‑language briefings for leadership teams.
 Evidence & Audit Mindset
  • Understands that in compliance‑driven environments, every control must be evidenced through screenshots, exports, and sign‑off records.
  • Experience producing or contributing to evidence packages for external auditors or assessors.
  • Systematic approach to naming, organizing, and retaining compliance artefacts.

Autonomy & Engineering Discipline

  • Capable of independently owning a technical domain with minimal supervision.
  • Strong diagnostic and troubleshooting skills, able to isolate root causes in complex multi‑layer environments.
  • Applies disciplined change management: tests in non‑production, documents changes, and seeks approval before production deployment.

Submit the application on:

Application Form

Interested to work with us? Send us your application and we will reach out to you, if you candidature fits any of our open positions.

    Give us a call

    Available from 9am to 8pm, Monday to Friday.

    Send us a message

    Send your message any time you want.

    Write to us

    Send us an email.

    Our usual reply time: 1 Business day
    This website uses cookies.

    Cookies allow us to personalize content and ads, provide social media-related features, and analyze our traffic.