Threat Intel
3 months ago
Introduction
Your Role and Responsibilities
This position serves as a Cyber Threat Analyst in support of a major IBM client. This organization provides services that analyse and produce enhanced cyber security and threat intelligence information to include threats and potential threats to the customer’s personnel, information, and information systems; provides timely and relevant intelligence to assist with mitigating cyber threats confronting the Department; supports evaluation, implementation, and operations of tools/technologies used in advanced analysis; support and develop the Cyber Insider Threat Program. Responsible for the delivery of written and oral briefings to stakeholders.
Role & Responsibilities:
- The Cyber Threat and Intelligence Analyst will support the customer’s overall cyber threat analysis efforts.
- Researches, analyses, and writes documents such as cybersecurity intelligence bulletins, alerts, and briefings for all levels of stakeholders from Tier 1-3 SOC, security engineering, and executives.
- Ensures documentation is accurate, complete, meets editorial and government specifications, and adheres to standards for quality, graphics, coverage, format, and style.
- Ensures content is developed in an appropriate style for the intended audience including presentations, bulletins, white papers, memos, policies, briefings, and other products.
- Assists in coordinating projects from the planning stage, provides additional or missing materials, and edits for content format, flow, and integrity.
- Researches topics and collaborate with stakeholders to understand communication product requirements; analyse business problems and helps prescribe communication solutions.
- Perform Cyber Threat Assessment and Remediation Analysis
- Processing, organizing, and analysing incident indicators retrieved from the client environment and correlating said indicators to various intelligence data
- Assisting in the coordination with internal teams as well as in the creation of engagement deliverables for a multitude of activities, including but not limited to Insider Threat, Rule of Engagement (ROE), Threat Hunting, After Action Reports, and other artifacts to support testing, monitoring and protecting the enterprise
- Investigate network and host detection and monitoring systems to advise engagement processes
- Develop and Execute bash and python scripts to process discrete log files and extract specific incident indicators; develop tools to aid in Tier 1 and Tier 2 functions
- Responsible for threat hunting activity using SIEM, EDR and other hunting tools and technologies.
- Good understanding of Mitre Framework, NIST framework and Cyber Kill Chain Process.
- Overall responsible for SIEM and EDR platform.
- Mentor and support L1 and L2 team for technical expertise and skills.
- Responsible for L1 and L2 team members skill development and trainings.
- Drive Process and technology standardization.
- Participate in periodic customer meetings.
- Ready to work in 24x7 rotational shift model including night shift.
- Explore different technologies available in the security industry.
- Analyse and tune threat monitoring dashboards.
- Closely work with SOC team and be responsible for incident detection, triage, analysis and response.
- Performing TI based and hypothesis driven threat hunting oriented to SIEM logs.
- Support the incident response team during major security incident with advance investigation skills.
Required Technical and Professional Expertise
- 8-10+ years of experience in cyber threat intelligence, cyber technical analysis, threat hunting, and threat attribution assessment with increasing responsibilities.
- 5-7+ years’ experience in a technical capacity; preferably in a role related to any of the following disciplines: security operations, network monitoring or analysis, intrusion or anomaly detection
- Bachelor’s Degree or a minimum of 8 years of relevant experience
- One of the following certifications is required: CISSP or GIAC Certified Incident Handler
- Strong understanding of malware analysis, advanced persistent threats, infection vectors, and defence strategies.
- Experience with and knowledge of cyber threat and/or intelligence analysis.
- Expert written and oral communication skills, including experience with executive-level presentations.
- Knowledge of and experience with standard network logging formats, network management systems and network security monitoring systems, security information, and event management, network packet analysis tools, and forensic analysis tools.
- Knowledge of and experience with web proxy, firewalls, IPS, IDS, mail content scanning appliances, enterprise Antivirus solutions, Network Analysers, and domain name servers desired
- Demonstrated knowledge in one or more of the following areas: network security principles, host-based security principles, network and system administration, forensic analysis principles
- Advanced user of Splunk, Varon
-
Threat Intelligence and Researcher
2 months ago
Mumbai, Maharashtra, India Terralogic Vietnam Full time**Threat Intelligence and Researcher**: Location :Mumbai (5 days WFO) **Total Experience**: **Experience**:5 - 8 years **Job Skills**: - Keep track of APTs groups (advanced persistent threats). - Know APT Groups motivation, their tools & techniques, the malware they write, and C&C (command and control center), identify their targets. - Threat intelligence...
-
Threat Hunter
6 months ago
Mumbai, Maharashtra, India IBM Full timeIntroduction Your Role and Responsibilities Is a thought leader in security intelligence and operations. This Level 3 role and is Subject Matter Expert (SME) and is involved running Threat hunting expeditions in your environment. He/She will develop suitable documentation and provide guidance to team performing for event analysis & Use-case...
-
Threat Hunter
3 months ago
Mumbai, Maharashtra, India IBM Full timeIntroduction Your Role and Responsibilities Is a thought leader in security intelligence and operations. This Level 3 role and is Subject Matter Expert (SME) and is involved running Threat hunting expeditions in your environment. He/She will develop suitable documentation and provide guidance to team performing for event analysis & Use-case development. We...
-
Threat Hunter
5 months ago
Mumbai, Maharashtra, India CoreIT Services Pvt. Ltd. Full time**1. Position Summary** 2. Core responsibilities a. Detect, investigate, and respond to security incidents in a timely and effective manner. b. Stay up-to-date with the latest threat intelligence feeds, trends, and emerging threats. Incorporate threat intelligence into the threat hunting process to enhance detection capabilities. c. Conduct “Hunt...
-
Security Operations Sme-perimeter Security
2 months ago
Pune, Maharashtra, India IBM Full timeIntroduction Your Role and Responsibilities - Work closely with the Security Managers, Leadership and other Enterprise IT teams and be the bridge between the various departments. - Strong Technical Knowledge and Experience in Perimeter Security management, audit and reporting. - SIEM Event Analysis and manual Co-relation of Events to narrow down the...
-
Security Eng
6 months ago
Pune, Maharashtra, India Blue Hexagon Full timeCome work at a place where innovation and teamwork come together to support the most exciting missions in the world! **Job Description**: As our Security Operations Engineer L1 you will be part of a fast-paced SOC team and cover broad aspects of Qualys Cyber security monitoring and incident response operations. Working closely with SOC Manager/lead and...
-
Subject Matter Expert
5 months ago
Pune, Maharashtra, India Qualys Full timeCome work at a place where innovation and teamwork come together to support the most exciting missions in the world! - About Us: At Qualys, we're on the lookout for an exceptional Senior Subject Matter Expert in Container and Cloud Security Engineering. If you're a tech-savvy storyteller with a passion for securing Modern Cloud and Container services, we...
-
Security
6 months ago
Pune, Maharashtra, India IBM Full timeIntroduction Your Role and Responsibilities This is level 2 role and would be responsible to support SIEM Management & content management for SIEM detection use-cases for the program. They would be overlooking technical services delivery for SOC program for your enterprise. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to...
-
Pre Sales
6 months ago
Mumbai, Maharashtra, India Sequretek Full timePre Sales (Mumbai)**Job Location** - Mumbai, India**About Us and Vision** Sequretek is one of the very few cybersecurity companies in the world, to offer their own AI-based security products around endpoint security, user access governance, and security monitoring. Sequretek has its 5 offices across US (New Jersey, Arkansas) and India (Mumbai, Delhi,...
-
Cyber Security Architect
6 months ago
Pune, India Wipro Limited Full timeOverview: **Role Purpose** The purpose of this role is to design the organisation?s computer and network security infrastructure and protect its systems and sensitive information from cyber threats. **Do** Day to Day Operation Vectra- Log in to console and address all critical alerts in the critical quadrants- Depending on the severity, true positive, and...
-
Siem Admin
5 months ago
Mumbai, Maharashtra, India IBM Full timeIntroduction Your Role and Responsibilities This is level 2 role and would be responsible to support SIEM Management & content management for SIEM detection use-cases for the program. They would be overlooking technical services delivery for SOC program for your enterprise. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to...
-
SOC Infra
6 months ago
Mumbai, Maharashtra, India Sequretek Full timeSOC Infra**Job Location** - Mumbai, India**About Us and Vision** Sequretek is one of the very few cybersecurity companies in the world, to offer their own AI-based security products around endpoint security, user access governance, and security monitoring. Sequretek has its 5 offices across US (New Jersey, Arkansas) and India (Mumbai, Delhi, Bangalore)...