Dhani - Senior Security Analyst - Cyber Defense & Security

2 months ago


pune, India DHANI Full time

ABOUT THE ROLE:

We are seeking a highly skilled Cyber Defense Incident Responder to join our enterprise-wide cyber security team. The incumbent will be responsible for promptly identifying, mitigating, and resolving cyber defense incidents to ensure the security and integrity of our systems and data. This role requires expertise in incident response coordination, threat analysis, forensics, technical root cause analysis, trend reporting, proactive CAPA (Correct Actions & Preventive Actions analysis etc.

KEY RESPONSIBILITIES:

- Collect intrusion artifacts such as malware, and trojans to facilitate mitigation of potential cyber defense incidents.

- Provide expert technical insights to cyber defense engineers across the enterprise to resolve incidents promptly.

- Coordinate incident response functions to ensure effective and timely resolution.

- Monitor external data sources to stay informed about cyber threats and their potential impact on the enterprise.

- Perform trend analysis and reporting to identify emerging cyber defense issues.

- Conduct forensically sound collection and inspection of assets for mitigation and remediation.

- Analyze alerts & data from organization's internal & public facing assets to determine possible causes and appropriate responses.

- Write and publish after-action reviews and incident reports for organizational learning and improvement.

You've Got What It Takes If You Have:

- 4+ years of experience in cyber defense or incident response roles.

- Consideration for privacy and security obligations.

- Demonstrated commitment to valuing diversity and contributing to an inclusive working and learning environment.

- Hand's on tools/platform experience: SIEM , IDS/IPS , EDR, Forensic Analysis Tools, Network Packet Analyzers, Vulnerability Scanners, Threat Intelligence Platforms, Incident Response Platforms, Malware Analysis Tools, DLP solutions.

CORE COMPETENCIES:

- Business Continuity

- Computer Forensics

- Computer Network Defense

- Incident Management

- Information Systems/Network Security

- Infrastructure Design

- System Administration

- Threat Analysis

- Vulnerability Assessment

CORE KNOWLEDGE:

- Understanding of business continuity and disaster recovery plans.

- Skill in preserving evidence integrity according to established procedures.

- Knowledge of intrusion detection methodologies.

- Familiarity with cyber defense policies, procedures, and regulations.

- Expertise in network security architecture and protocols.

- Proficiency in malware protection techniques.

- Understanding of incident response methodologies and timelines.

- Ability to perform damage assessments accurately.

- Knowledge of cloud service models and their implications for incident response.

- Familiarity with system and application security threats and vulnerabilities.

- Artificial Intelligence (AI) Security would be an added plus.

CORE TOOLS & PLATFORMS HANDS-ON EXPERIENCE:

- SIEM (Security Information and Event Management): SIEM tools to collect, analyze, and correlate security events from various sources across the network to identifypotential security incidents. Examples include Splunk, IBM QRadar, and Elastic SIEM.

- IDS/IPS (Intrusion Detection and Prevention Systems): IDS/IPS tools to monitor network traffic for suspicious activity and can automatically block or alert on potential threats. Examples include Snort, Suricata, and Cisco, Crowdstrike.

- Endpoint Detection and Response (EDR): EDR tools to provide real-time monitoring and response capabilities on endpoints such as desktops, laptops, and servers. Examples include CrowdStrike Falcon, Carbon Black, and Microsoft Defender for Endpoint.

- Forensic Analysis Tools: Tools to help incident responders collect, preserve, and analyze digital evidence from compromised systems. Examples include EnCase Forensic, Autopsy, and Volatility Framework.

- Network Packet Analyzers: Packet analyzers to allow incident responders to capture and analyze network traffic to identify suspicious or malicious activity. Examples include Wireshark, tcpdump, and NetworkMiner.

- Vulnerability Scanners: Vulnerability scanners to help identify weaknesses in systems and applications that could be exploited by attackers. Examples include Nessus, OpenVAS, and Qualys.

- Threat Intelligence Platforms: To aggregate and analyze threat intelligence data from various sources to provide context on potential threats and attacks. Examples include ThreatConnect, Crowdstrike, PaloAlto, Proofpoint , Microsoft Defender, VirusTotal, Alient Vault

- Incident Response Platforms: To help automate and streamline incident response processes, including alert triage, case management, and remediation workflows.

- Malware Analysis Tools: Malware analysis tools to assist in analyzing and understanding the behavior of malicious software. Examples include Cuckoo Sandbox, VirusTotal, IDA Pro, Crowdstrike.

- Data Loss Prevention (DLP) Solutions: DLP solutions to help prevent sensitive data from being exfiltrated or leaked from the organization. They can also assist in incident response by identifying and mitigating data breaches. Examples include Symantec DLP, McAfee DLP, and Digital Bachelor's degree in Computer Science, Information Security, or related field (or equivalent experience).

- Certified Information Systems Security Professional (CISSP), Certified Incident Handler (GCIH), or similar certifications preferred.

- Minimum of 4-5+ years of experience in cyber defense or incident response roles.

- Strong analytical and problem-solving skills.

- Excellent communication and interpersonal abilities.

- Ability to work effectively in a fast-paced and dynamic environment.

MANDATE & SECONDARY SKILLS CAN BE THE COMBINATION OF :

- Malware Analysis

- Forensic Analysis

- Threat Intelligence

- DLP

- IDS/IPS

- Vulnerability Mgmt

- Tools - Crowdstrike | SIEM (Splunk/Any)

- Incident First Responders

- Root Cause Analysis Expert

- Experience with On-Prem & Cloud Vendors

- Threat Hunting (Must

(ref:hirist.tech)

  • Pune/Mumbai, India DHANI Full time

    ABOUT THE ROLE: We are seeking a highly skilled Cyber Defense Incident Responder to join our enterprise-wide cyber security team. The incumbent will be responsible for promptly identifying, mitigating, and resolving cyber defense incidents to ensure the security and integrity of our systems and data. This role requires expertise in incident response...


  • Pune, India TAC Security Full time

    Job Title: Senior Security Engineer - VAPTLocation: Pune, IndiaCompany DescriptionTAC Security is a global leader in vulnerability management that specializes in protecting Fortune 500 companies, leading enterprises, and governments worldwide. With its AI-based Vulnerability Management Platform ESOF (Enterprise Security in One Framework), TAC Security...


  • Pune, India Dashhire Full time

    We are seeking a highly skilled cyber defense incident responder to join our enterprise-wide cyber security team.The incumbent will be responsible for promptly identifying, mitigating, and resolving cyber defense incidents to ensure the security and integrity of our systems and data. This role requires expertise in incident response coordination, threat...


  • Pune, India TAC Security Full time

    Job Title: Senior Security Engineer - VAPTLocation: Pune, IndiaCompany DescriptionTAC Security is a global leader in vulnerability management that specializes in protecting Fortune 500 companies, leading enterprises, and governments worldwide. With its AI-based Vulnerability Management Platform ESOF (Enterprise Security in One Framework), TAC Security...


  • Pune, India TAC Security Full time

    Job Title: Senior Security Engineer - VAPTLocation: Pune, IndiaCompany DescriptionTAC Security is a global leader in vulnerability management that specializes in protecting Fortune 500 companies, leading enterprises, and governments worldwide. With its AI-based Vulnerability Management Platform ESOF (Enterprise Security in One Framework), TAC Security...


  • Pune, India Domo Full time

    COMPANY OVERVIEW:Domo puts data to work to help everyone multiply their impact. Domo gives every kind of user real-time insights they can act on, with secure, easy-to-use, AI-powered data experience that drives a culture of data curiosity.POSITION SUMMARY:The Security Analyst is a key member of Domo’s Security Operations team. This position will be focused...

  • Security Analyst

    5 days ago


    Pune, India Cornerstone OnDemand Full time

    We're looking for a Security Analyst This role is Office Based Security Analyst, IT Security and Compliance Job Brief: We are seeking an experienced Security Analyst to join our IT Security and Compliance team. The ideal candidate will have a cyber security mindset, encompassing various domains of cybersecurity. This role will...

  • Security Analyst

    5 days ago


    pune, India Cornerstone OnDemand Full time

    We're looking for a Security Analyst This role is Office Based Security Analyst, IT Security and Compliance Job Brief: We are seeking an experienced Security Analyst to join our IT Security and Compliance team. The ideal candidate will have a cyber security mindset, encompassing various domains of cybersecurity. This role...

  • SOC Security Analyst

    2 weeks ago


    Pune, India Domo Full time

    COMPANY OVERVIEW: Domo puts data to work to help everyone multiply their impact. Domo gives every kind of user real-time insights they can act on, with secure, easy-to-use, AI-powered data experience that drives a culture of data curiosity. POSITION SUMMARY: The Security Analyst is a key member of Domo’s Security Operations team. This position...

  • SOC Security Analyst

    2 weeks ago


    pune, India Domo Full time

    COMPANY OVERVIEW: Domo puts data to work to help everyone multiply their impact. Domo gives every kind of user real-time insights they can act on, with secure, easy-to-use, AI-powered data experience that drives a culture of data curiosity. POSITION SUMMARY: The Security Analyst is a key member of Domo’s Security Operations team. This...

  • SOC Security Analyst

    3 hours ago


    Pune, India Domo Full time

    COMPANY OVERVIEW: Domo puts data to work to help everyone multiply their impact. Domo gives every kind of user real-time insights they can act on, with secure, easy-to-use, AI-powered data experience that drives a culture of data curiosity. POSITION SUMMARY: The Security Analyst is a key member of Domo’s Security Operations team. This position...


  • Pune, India Jobs for Humanity Full time

    Job DescriptionPosition Type :Full timeType Of Hire :Experienced (relevant combo of work and education)Education Desired :Bachelor of Computer ScienceTravel Percentage :0% As the world works and lives faster, FIS is leading the way. Our fintech solutions touch nearly every market, company and person on the planet. Our teams are inclusive and diverse. Our...

  • Security Analyst

    6 days ago


    Pune, India Hexagon India Full time

    Hexagon Security Analysts L1 Job Description Security Analysts L1: Hexagon is seeking a Security Analysts L1. This position will sit in India (Pune). The working hours will typically starts from 7am/11am and will be on a rotational basis with the need for on-call availability off working hours on need basis. At Hexagon , we strive to help industrial...

  • SOC Security Analyst

    2 weeks ago


    Pune, India Domo Full time

    COMPANY OVERVIEW: Domo puts data to work to help everyone multiply their impact. Domo gives every kind of user real-time insights they can act on, with secure, easy-to-use, AI-powered data experience that drives a culture of data curiosity. POSITION SUMMARY: The Security Analyst is a key member of Domo’s Security Operations team. This position...

  • SOC Security Analyst

    2 weeks ago


    pune, India Domo Full time

    COMPANY OVERVIEW: Domo puts data to work to help everyone multiply their impact. Domo gives every kind of user real-time insights they can act on, with secure, easy-to-use, AI-powered data experience that drives a culture of data curiosity. POSITION SUMMARY: The Security Analyst is a key member of Domo’s Security Operations team. This...

  • Security Analyst

    1 month ago


    Pune, India Forescout Technologies Inc Full time

    What We DoManaging cyber risk, together– Today the modern enterprise is an Enterprise of Things. We are on a mission to secure the Enterprise of Things with active defense by identifying, segmenting, and enforcing compliance of every connected thing in a real-time and at scale. Our unified security platform enables enterprises and government agencies to...

  • Cyber Security

    1 month ago


    Pune, India SA Technologies Inc. Full time

    Certified Information Systems Security Professional (CISSP) - Certified Ethical Hacker (CEH) - Security+ - Security Essentials Certification (GSEC) - Systems certified security practitioner (SSCP) Responsible for setting up of security policies and procedures and incident response system procedures. Knowledgeable in SIEM—Security Information and Event...

  • Data Analyst

    2 weeks ago


    pune, India Quess IT Staffing Full time

    Position: Data Analyst (Cyber Security Domain) Location: Pune Duration: Contract to Hire Job Description: Data Reporting Engaging with stake holders Build risk analytic reports Need to know what is risk analysis EV, SIM, EDR PM/Data manager How reporting is built in Excel / Power BI / Qlick Cyber dashboards, Trend analysis

  • Senior Analyst

    1 month ago


    Pune, India BinaryStar SearchX Full time

    Job Description : - 5 - 8 years of experience (relevant experience min 4 years in cyber security)-Will be performing application vulnerability assessments, API assessments and mobile application penetration tests.- Will perform secure source code reviews of software applications developed in various languages (Java, C#, .NET etc.). - Will manage the Code...

  • Senior Analyst

    1 month ago


    Pune, India BinaryStar SearchX Full time

    Job Description : - 5 - 8 years of experience (relevant experience min 4 years in cyber security)-Will be performing application vulnerability assessments, API assessments and mobile application penetration tests.- Will perform secure source code reviews of software applications developed in various languages (Java, C#, .NET etc.). - Will manage the Code...