Opening for Associate (Level -3) Cyber security for Mumbai location.
The L3-Security Engineer will be responsible for supporting various cybersecurity operations services including incident/event analysis, forensic investigations, security monitoring, log aggregation services and new technology/services implementation support.
The candidate must have hands on experience in network engineering, IDS/IPS, threat analysis, security monitoring and a solid understanding of large-scale enterprise IT operations.
DETAILED RESPONSIBILITIES/DUTIES:
- Develop and maintain security analyst metrics for effective measurement of operations volumes
- Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
- Support critical, sensitive incidents spanning multiple geographies
- Day-to-day operational tasks related to the ongoing support of Cyber Operations.
- Responsible for documenting the incident life cycle, conducting handoffs-, escalation, and providing support during cyber incidents
- Responsible for the tracking and assignment of tickets/events to Cyber Security Team.
- Responsible for analyzing potential threats from multiple sources.
- Responsible for creating filters, reports, dashboards, and alerts in support of Cyber Operations.
- Responsible for initiating blocks for all indicators of compromise gathered in analysis.
- Responsible for creating and updating existing playbooks and runbooks.
- Collaborate and support various internal technology teams and service providers on security related issues and provide guidance and recommendations as necessary.
- Assist with real-time security incident handling and tracking (e.g., intrusion correlation/tracking, threat analysis, and direct system remediation) tasks to support Incident Response Team.
SUPERVISORY RESPONSIBILITIES: None
REQUIRED QUALIFICATIONS:
Skills:
- Demonstrated experience in leading initiatives across regional operations, information protection, risk assessments (technical/network related), incident response and cyber investigations
- Strong knowledge of networking fundamentals such as TCP/IP and basic packet analysis
- Experience with Networking and operation tools (i.e. - Log management, Firewall management, SIEM, etc- )
- Ability in conducting network security assessments such as creating and maintaining detailed project plans, scope of work, and other technical documentation as required
- Strong experience with cyber security in the domains of cyber threat intelligence and analysis, security monitoring and incident response
- Experience of network and system vulnerabilities, malware, networking protocols and attack methods to exploit vulnerabilities
- Knowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologies
- Knowledge of incident response and handling methodologies
- Thorough understanding and application of security concepts, protocols and methodologies across multiple operating environments
- Excellent verbal and written communication skills with a wide range of audiences including technologists, business stakeholders and IT team members
- Experience in working with and being a part of matrix teams
- High level of personal integrity, and the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity
Experience:
- Minimum 7-9 years of demonstrated experience in Technology/IT industry
- Security Operations Center experience preferred.
- 6-8 years of experience in a cybersecurity discipline
Education:
- Bachelor's degree in Computer Science, Information Technology, Business or equivalent discipline
- Professional Certifications will be plus
PREFERRED QUALIFICATIONS:
- Knowledge of security incident and event management, log analysis, network traffic analysis, malware investigation/remediation, SIEM correlation logic and alert generation
- Understanding of Security principles, techniques and technologies such as SANS Top 20 Critical Security Controls
- Moderate knowledge of current threat landscape (threat actors, APT, cyber-crime, etc.)
- Moderate knowledge of security related technologies and their functions (IDS, IPS, EDR, IRP, FW, WAF, SIEM, etc.)
- Professional Certification like: Certified Incident Handler (GCIH), Certified Intrusion Analyst (GIAC), Certified Ethical hacker (CEH), Certified Incident Handler (CIH)
Please provide the following details with the updated CV:
- Current Company :
- Current Designation : ___________ Since ________
- Total Exp:
- Relevant Exp:
- Current CTC :
- Exp CTC:
- Notice Period :
- Reason for Job Change :
- Current Location
- Preferred Location
- Reporting to :
- Handling a team of :
Tejashree Waradkar
Recruitment Consultant @ Black Turtle
Didn’t find the job appropriate? Report this Job