Principal Analyst: Information Security Incident Response

3 weeks ago


Mumbai, Maharashtra, India NTT DATA, Inc. Full time
Job Description

Make an impact with NTT DATA

Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion its a place where you can grow, belong and thrive.

Your day at NTT DATA

The Principal Information Security Incident Response Analyst is a highly skilled subject matter exper, responsible for providing an escalation path for Level 1 and 2 workflows for high-risk incidents.

Additionally, this role facilitates proactive security measures through analytics and threat hunting processes and is responsible for detecting and monitoring escalated threats and suspicious activity affecting company technology domain (servers, networks, appliances and all infrastructure supporting production applications for the enterprise, as well as development environments).

This role is responsible to manage critical and high-risk exposures in the daily operation of real-time threat management activities.

This senior technical resource facilitates problem resolution and mentoring for the overall team. This includes operational security tasks such as performance and availability monitoring, log monitoring, security incident detection and response, security event reporting, and content maintenance (tuning).

Key responsibilities:

- Manages weekly sprints in Threat Hunting analytics.
- Manages the processing of security alerts, events, and notifications (e.g. via email, ticketing, virus warning, intelligence feeds, workflow, etc.).
- Manages the notification of internal and/or external teams according to agreed alert priority levels, and escalation trees.
- Monitors events for suspicious events, investigation, and escalate where applicable.
- Maintains an understanding of current and emerging threats, vulnerabilities, and trends.
- Prioritizes threat analysis based on risks associated with each threat and working with the appropriate teams to ensure related communications are in line with company best practice and recommendations.
- Acts as the primary technical lead for the Computer Incident Response Team (CIRT), coordinating the work of technical staff from various departments, as well as the work of third-party technical experts.
- Ties third party attack monitoring services and threat reporting services, into internal CIRT communications systems, so as to better alert CIRT team members about whats coming, and what preparations to undertake before production systems at NTT Ltd are damaged (and what remedial actions to take after damage has taken place).
- Regularly reviews the current configurations of NTT Ltd production information systems and networks, with an eye towards the steps that attackers must take to break through existing defenses, and recommends configuration changes, system setting changes, network topology changes, and other modifications that would enhance the overall level of security.
- Designs, specifies, programs, deploys, and fine-tunes custom software which analyses the vast amount of log, audit trail, and other recorded activity information that modern systems record, so as to be able to immediately detect unauthorized activity, most importantly intrusion by unauthorized parties and the execution of unauthorized software.
- Designs automated scripts, automated contingency plans, and other programmed responses which are launched when an attack against company systems has been detected.
- Designs, specifies, programs, debugs, and oversees the work of others related to middleware, and other system integration tools, which tie multiple security monitoring systems together so as to better meet company information security needs.
- Performs post-mortem analyze with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of authorized users.
- Reviews incident and problem management reports to identify potential security weaknesses and perform an impact and risk analysis, developing recommendations for highlighted risks, ensuring that these risks and solutions are presented to the relevant stakeholders.
- Ensures that security service audit schedules are developed, scoped, discussed and agreed with the business.
- Reviews access authorization for compliance with policy, administration security controls for effectiveness, security on the operational systems and verify that security monitoring is working.

To thrive in this role, you need to have:

- Ability to remain calm and focused during stressful situations.
- Ability to listen and adapt to changing situations.
- Ability to recognize potential problems and take steps to fix the issues.
- Extended understanding of complex inter-relationships in an overall system or process.
- Extended knowledge of technological advances within the information security arena.
- Demonstrates analytical thinking and a proactive approach.
- Displays consistent client focus and orientation.
- Extended knowledge of information security management and policies.
- Extended understanding of current and emerging threats, vulnerabilities, and trends.
- Extended understanding of malware forensics, network forensics, and computer forensics also highly desirable.
- Ability to statically and dynamically analyze malware to determine target and intention.
- Ability to uncover and document tools, techniques, procedures used by cyber adversaries in attacking managed infrastructure.
- Sound decision making abilities with demonstrate teamwork and collaboration skills.
- Displays good planning and organizing ability.

Academic qualifications and certifications:

- Bachelors degree or equivalent in Information Technology, Computer Science or related field.
- SANS GIAC Security Essentials (GSEC) or equivalent preferred.
- SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent preferred.
- SANS GIAC Certified Incident Handler (GCIH) or equivalent preferred.
- Industry certifications such as CISSP, CISM, CISA, CEH, CHFI preferred.
- Information Technology / ITILSM / ICT Security / ITIL v3 preferred.

Required experience:

- Extended experience in a Technology Information Security Industry.
- Extended experience working in a SOC/CSIRT.
- Extended experience or knowledge of SIEM and IPS technologies.
- Extended experience with Wireshark, tcpdump, Remnux, decoders for conducting payload analysis.
- Extended experience in building SIEM rules and/or indicators of compromise for threat detection.

Workplace type:

On-site Working

About NTT DATA

NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.

Equal Opportunity Employer

NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

  • Mumbai, Maharashtra, India beBeeCybersecurity Full time

    Job Summary:This senior role is responsible for leading a team of security analysts and incident responders in detecting, analyzing, and responding to complex security incidents. The ideal candidate will have a strong background in managing security incidents, threat detection tools, and forensic investigations.


  • Mumbai, Maharashtra, India Burns Mcdonnell Full time

    Job DescriptionWe're looking for a Senior Information Security Analyst to strengthen our organization's cybersecurity defenses. The ideal candidate will have extensive experience in information security, a solid understanding of a wide range of security technologies, and the ability to effectively communicate complex security risks to a variety of audiences....


  • Mumbai, Maharashtra, India RCM Business Solutions Full time

    Experience : 4+ years.Location : Mumbai/Nagpur.Notice period : 30 days.Mandatory skills : SOC, Qradar, Endpoint Crowdstrike.Job Description :- Responsible for conducting information security investigations as a result of security incidents identified by the Level 1 security analyst who are monitoring the security consoles from various SOC entry channels...


  • Mumbai, Maharashtra, India Innova ESI Full time

    Role : SOC Analyst.Shifts : Rotational.Exp : 5+ Yrs.Work from office : Mumbai.Mandatory skills : Splunk, SOC, EDR.Education : Any graduate (no Diploma).Level of interview : 2.Mode of interview : Virtual (MS Teams).JD : The SOC analyst is responsible for handling major security incidents escalated by SOC analyst and proactively identifying possible...


  • Mumbai, Maharashtra, India CodeZio Full time

    Job Title : Cybersecurity AnalystExperience : 24 YearsLocation : Mumbai / PuneNotice Period : 30 DaysEmployment Type : Summary :We are seeking a proactive and skilled Cybersecurity Analyst with 24 years of hands-on experience in securing enterprise environments. The ideal candidate will be responsible for monitoring, detecting, analyzing, and responding to...


  • Mumbai, Maharashtra, India Awake Security Full time

    Job Description- Key Responsibilities:- Monitor network traffic to detect malicious or anomalous activity using NDR solutions (e.g., Darktrace, Vectra, ExtraHop, Corelight).- Configure, maintain, and fine-tune NDR tools to optimize detection capabilities and minimize false positives.- Conduct deep-dive analysis of network events to identify indicators of...


  • Navi Mumbai, Maharashtra, India beBeeSecurity Full time US$ 90,000 - US$ 1,20,000

    Job Title: Information Security ProfessionalAre you passionate about ensuring the security and integrity of an organization's digital assets? Do you have a keen eye for detecting and responding to potential security threats?Key Responsibilities:Monitor and respond to security alerts and potential security incidents while taking proactive actions against...

  • Security Analyst

    2 weeks ago


    Mumbai, Maharashtra, India AMSYS IT SERVICES PRIVATE LIMITED Full time

    Job DescriptionJob Title:Security Analyst (SOC) Level 2Timings:RotationalLocation:Kolshet, Thane West (Work from office)Total Experience:3 + yearsAbout the Company AMSYS Group, We pride ourselves on 23 Years of excellence basedon the principles of integrity, honor, and mutual gain. As future decisions are made, we arealways keeping in mind the prosperity of...


  • Mumbai, Maharashtra, India beBeeSecurity Full time ₹ 8,00,000 - ₹ 12,00,000

    **Job Title:** Information Security EngineerWe are seeking a skilled Information Security Engineer to join our team. In this role, you will be responsible for providing managed services to clients to ensure the security of their infrastructure and systems.**Key Responsibilities:Monitor work queues and perform operational tasks to resolve incidents/requests...


  • Mumbai, Maharashtra, India beBeeSecurity Full time ₹ 12,00,000 - ₹ 15,00,000

    Job Title: Information Security SpecialistWe are seeking an experienced Information Security Specialist to join our team. As a key member of our security group, you will be responsible for ensuring the confidentiality, integrity, and availability of our organization's information assets.Responsibilities:Monitor and analyze network traffic to detect potential...