Cyber_KDNI-MDR - Associate Consultant

4 days ago


Bengaluru, Karnataka, India BSR & Co Full time ₹ 80,00,000 - ₹ 1,20,00,000 per year
Description

Function: MDR Response Team

Position: Associate Consultant

Location: Bangalore

Roles and Responsibilities

The primary role of a Security Analyst (L2) is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures. Specifically, these analysts will be responsible for monitoring the SIEM tools for security events and closing or escalating those events as necessary. Security Analysts maintain the group email address and distribution lists, answer the main phone lines, and update all relevant documentation such as shift logs and tickets. Additionally, assist the MDR Analyst in an incident workflow and assist the MDR team in incident detection, remediation and communicate with external teams in proper incident resolution. 

Note : Candidate must be willing to Work from Office only (Bangalore Location) & willing to do 24x7 rotational shift (Mandatory requirement for this role)

Specifically, Security Analysts (L2) will:

  1. Rapidly identify, categorize, prioritize and investigate events as the initial cyber event detection group for the enterprise using all available security logs and intelligence sources to include but not limited to:
    1. Firewalls (Zscalar, Cisco ASA & Palo Alto etc.,)
    2. Systems and Network Devices
    3. Web Proxies (Zscalar)
    4. Intrusion Detection/Prevention Systems (Zscalar, Cisco ASA & Palo Alto etc.,)
    5. Data Loss Prevention (Zscalar)
    6. EDR / Antivirus Systems (Crowd Strike, MDE etc.,)
    7. Knowledgebase Framework (Confluence)
  2. Continuously monitor SIEM and logging environments for security events and alerts to threats, intrusions, and/or compromises, including:
  • SIEM tools like Splunk & Microsoft Sentine queue management from different data sources Network/EndPoint/Firewall etc., (Splunk & Microsoft Sentinel etc.,)
  • Security email inbox (ProofPoint, Rapid7, Area1 etc.,)
  • Intel feeds via email and other sources (e.g. NH-ISAC)
  • Incident Ticketing queue (ServiceNow)
  1. Validate alerts as they come in to eliminate false positives and use other internal and external data sources to enrich alerts with additional context 
  2. Perform triage of service requests from customers and internal teams
  3. Use playbook procedures to carry out standard plays for routine event types and escalate alerts to Level 2 Analysts for further triage and remediation
  4. Assist with containment of threats and remediation of environment during or after an incident
  5. Document event analysis and write comprehensive reports of incident investigations
  6. Proactively improve security-related operational processes and procedures
  7. Use available security tools for historical analysis purposes as necessary for detected events; for example, historical searches using SIEM tools (Splunk & Microsoft Sentinel)
  8. Maintain operational shift logs with relevant activity from the Analyst's shift. Document investigation results, ensuring relevant details are passed to Level 2 or MDR Analysts for final event analysis 
  9. Update/reference knowledgebase tool (e.g. Confluence) as necessary for changes to processes and procedures, and ingest of daily intelligence reports and previous shift logs
  10. Conduct research and document events of interest within the scope of IT Security
  11. Alternatively, consulting, or advisory experience in Security Operations
  12. Monitor and analyse Intrusion Detection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, Security Incident and Event Management (SIEM) toolset and other event logs to identify security attacks and threats for remediation/suppression.
  13. Validate IOCs that triggered the original alert.
  14. Research additional internal and external data sources for additional enrichment of event information
  15. Determine when an event has reached the threshold of an incident and engage Incident Response Handler to declare an incident.
  16. Handle high and critical severity incidents as described in the operations playbook.   
  17. Operational level experience in some of these domains (not all): security engineering, alert triaging, rule writing, incident response, DFIR, threat intelligence and management, vulnerability management, and security control testing
  18. Expeirnece and knowledge of at least one SIEM platform or security data lake and related processes
  19. Knowledge of various security tools, their functions, and comparisons
  20. Knowledge of network and cloud security fundamentals
  21. Ability to explain complex technical concepts in business terms.
  22. Extensive experience in report writing and presentation.
  23. Strong, adaptable, and flexible work ethic
  24. Good time management skills
  25. Ability to work under pressure and prioritise activities

Qualifications

  • Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field
  • 2+ years of technical experience of prior MDR/SOC/Incident response experience
  • Demonstrated technical knowledge of current network security, network hardware, protocols, and standards required
  • Shall have demonstrated professional experience in incident detection and response, malware analysis, or cyber forensics
  • Act as a workstream participant to support tier-1
  • Demonstrated strong oral and written communication and client facing skills
  • Demonstrated strong analytical and communications skills
  • Flexibility to adapt to different types of engagement, working hours, work environments, and locations
  • Proven ability to work creatively, analytically in a problem-solving environment
  • Ability to work nights, weekends, and/or holidays in the event of an incident response emergency
  • Be comfortable working against deadlines in a fast-paced environment
  • Identify issues, opportunities for improvement, and communicate them to an appropriate senior member
  • Demonstrated technical knowledge of current network security, network hardware, protocols, and standards required

Required skills:

  • 2+ years of technical experience in Information Security
  • Experience with SIEM tools (Sentinel, Splunk, Logrhythm, etc.)
  • Experience in Microsoft Sentinel
  • Familiarity with common IDS/IPS and Firewalls (Snort, Cisco, Fortigate, Sourcefire)
  • Familiarity with incident response process and activities
  • Familiarity with TCP/IP protocol, OSI Seven Layer Model
  • Knowledge of Windows, Unix-based systems, architectures, and network security devices
  • Intermediate level of knowledge of LAN and WAN technologies
  • Must have a solid understanding of information technology, information security domains
  • Knowledge of security best practices and concepts
  • Desired certifications: ISC2 CC, CEH, AZ-900, AZ-500, SC-200
  • Familiarity with ticketing tool / ITSM tool
  • Personal drive, positive work ethic to deliver results within tight deadlines and in demanding situations
Responsibilities

Function: MDR Response Team

Position: Associate Consultant

Location: Bangalore

Roles and Responsibilities

The primary role of a Security Analyst (L2) is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures. Specifically, these analysts will be responsible for monitoring the SIEM tools for security events and closing or escalating those events as necessary. Security Analysts maintain the group email address and distribution lists, answer the main phone lines, and update all relevant documentation such as shift logs and tickets. Additionally, assist the MDR Analyst in an incident workflow and assist the MDR team in incident detection, remediation and communicate with external teams in proper incident resolution. 

Note : Candidate must be willing to Work from Office only (Bangalore Location) & willing to do 24x7 rotational shift (Mandatory requirement for this role)

Specifically, Security Analysts (L2) will:

  1. Rapidly identify, categorize, prioritize and investigate events as the initial cyber event detection group for the enterprise using all available security logs and intelligence sources to include but not limited to:
    1. Firewalls (Zscalar, Cisco ASA & Palo Alto etc.,)
    2. Systems and Network Devices
    3. Web Proxies (Zscalar)
    4. Intrusion Detection/Prevention Systems (Zscalar, Cisco ASA & Palo Alto etc.,)
    5. Data Loss Prevention (Zscalar)
    6. EDR / Antivirus Systems (Crowd Strike, MDE etc.,)
    7. Knowledgebase Framework (Confluence)
  2. Continuously monitor SIEM and logging environments for security events and alerts to threats, intrusions, and/or compromises, including:
  • SIEM tools like Splunk & Microsoft Sentine queue management from different data sources Network/EndPoint/Firewall etc., (Splunk & Microsoft Sentinel etc.,)
  • Security email inbox (ProofPoint, Rapid7, Area1 etc.,)
  • Intel feeds via email and other sources (e.g. NH-ISAC)
  • Incident Ticketing queue (ServiceNow)
  1. Validate alerts as they come in to eliminate false positives and use other internal and external data sources to enrich alerts with additional context 
  2. Perform triage of service requests from customers and internal teams
  3. Use playbook procedures to carry out standard plays for routine event types and escalate alerts to Level 2 Analysts for further triage and remediation
  4. Assist with containment of threats and remediation of environment during or after an incident
  5. Document event analysis and write comprehensive reports of incident investigations
  6. Proactively improve security-related operational processes and procedures
  7. Use available security tools for historical analysis purposes as necessary for detected events; for example, historical searches using SIEM tools (Splunk & Microsoft Sentinel)
  8. Maintain operational shift logs with relevant activity from the Analyst's shift. Document investigation results, ensuring relevant details are passed to Level 2 or MDR Analysts for final event analysis 
  9. Update/reference knowledgebase tool (e.g. Confluence) as necessary for changes to processes and procedures, and ingest of daily intelligence reports and previous shift logs
  10. Conduct research and document events of interest within the scope of IT Security
  11. Alternatively, consulting, or advisory experience in Security Operations
  12. Monitor and analyse Intrusion Detection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, Security Incident and Event Management (SIEM) toolset and other event logs to identify security attacks and threats for remediation/suppression.
  13. Validate IOCs that triggered the original alert.
  14. Research additional internal and external data sources for additional enrichment of event information
  15. Determine when an event has reached the threshold of an incident and engage Incident Response Handler to declare an incident.
  16. Handle high and critical severity incidents as described in the operations playbook.   
  17. Operational level experience in some of these domains (not all): security engineering, alert triaging, rule writing, incident response, DFIR, threat intelligence and management, vulnerability management, and security control testing
  18. Expeirnece and knowledge of at least one SIEM platform or security data lake and related processes
  19. Knowledge of various security tools, their functions, and comparisons
  20. Knowledge of network and cloud security fundamentals
  21. Ability to explain complex technical concepts in business terms.
  22. Extensive experience in report writing and presentation.
  23. Strong, adaptable, and flexible work ethic
  24. Good time management skills
  25. Ability to work under pressure and prioritise activities

Qualifications

  • Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field
  • 2+ years of technical experience of prior MDR/SOC/Incident response experience
  • Demonstrated technical knowledge of current network security, network hardware, protocols, and standards required
  • Shall have demonstrated professional experience in incident detection and response, malware analysis, or cyber forensics
  • Act as a workstream participant to support tier-1
  • Demonstrated strong oral and written communication and client facing skills
  • Demonstrated strong analytical and communications skills
  • Flexibility to adapt to different types of engagement, working hours, work environments, and locations
  • Proven ability to work creatively, analytically in a problem-solving environment
  • Ability to work nights, weekends, and/or holidays in the event of an incident response emergency
  • Be comfortable working against deadlines in a fast-paced environment
  • Identify issues, opportunities for improvement, and communicate them to an appropriate senior member
  • Demonstrated technical knowledge of current network security, network hardware, protocols, and standards required

Required skills:

  • 2+ years of technical experience in Information Security
  • Experience with SIEM tools (Sentinel, Splunk, Logrhythm, etc.)
  • Experience in Microsoft Sentinel
  • Familiarity with common IDS/IPS and Firewalls (Snort, Cisco, Fortigate, Sourcefire)
  • Familiarity with incident response process and activities
  • Familiarity with TCP/IP protocol, OSI Seven Layer Model
  • Knowledge of Windows, Unix-based systems, architectures, and network security devices
  • Intermediate level of knowledge of LAN and WAN technologies
  • Must have a solid understanding of information technology, information security domains
  • Knowledge of security best practices and concepts
  • Desired certifications: ISC2 CC, CEH, AZ-900, AZ-500, SC-200
  • Familiarity with ticketing tool / ITSM tool
  • Personal drive, positive work ethic to deliver results within tight deadlines and in demanding situations
Qualifications

Function: MDR Response Team

Position: Associate Consultant

Location: Bangalore

Roles and Responsibilities

The primary role of a Security Analyst (L2) is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures. Specifically, these analysts will be responsible for monitoring the SIEM tools for security events and closing or escalating those events as necessary. Security Analysts maintain the group email address and distribution lists, answer the main phone lines, and update all relevant documentation such as shift logs and tickets. Additionally, assist the MDR Analyst in an incident workflow and assist the MDR team in incident detection, remediation and communicate with external teams in proper incident resolution. 

Note : Candidate must be willing to Work from Office only (Bangalore Location) & willing to do 24x7 rotational shift (Mandatory requirement for this role)

Specifically, Security Analysts (L2) will:

  1. Rapidly identify, categorize, prioritize and investigate events as the initial cyber event detection group for the enterprise using all available security logs and intelligence sources to include but not limited to:
    1. Firewalls (Zscalar, Cisco ASA & Palo Alto etc.,)
    2. Systems and Network Devices
    3. Web Proxies (Zscalar)
    4. Intrusion Detection/Prevention Systems (Zscalar, Cisco ASA & Palo Alto etc.,)
    5. Data Loss Prevention (Zscalar)
    6. EDR / Antivirus Systems (Crowd Strike, MDE etc.,)
    7. Knowledgebase Framework (Confluence)
  2. Continuously monitor SIEM and logging environments for security events and alerts to threats, intrusions, and/or compromises, including:
  • SIEM tools like Splunk & Microsoft Sentine queue management from different data sources Network/EndPoint/Firewall etc., (Splunk & Microsoft Sentinel etc.,)
  • Security email inbox (ProofPoint, Rapid7, Area1 etc.,)
  • Intel feeds via email and other sources (e.g. NH-ISAC)
  • Incident Ticketing queue (ServiceNow)
  1. Validate alerts as they come in to eliminate false positives and use other internal and external data sources to enrich alerts with additional context 
  2. Perform triage of service requests from customers and internal teams
  3. Use playbook procedures to carry out standard plays for routine event types and escalate alerts to Level 2 Analysts for further triage and remediation
  4. Assist with containment of threats and remediation of environment during or after an incident
  5. Document event analysis and write comprehensive reports of incident investigations
  6. Proactively improve security-related operational processes and procedures
  7. Use available security tools for historical analysis purposes as necessary for detected events; for example, historical searches using SIEM tools (Splunk & Microsoft Sentinel)
  8. Maintain operational shift logs with relevant activity from the Analyst's shift. Document investigation results, ensuring relevant details are passed to Level 2 or MDR Analysts for final event analysis 
  9. Update/reference knowledgebase tool (e.g. Confluence) as necessary for changes to processes and procedures, and ingest of daily intelligence reports and previous shift logs
  10. Conduct research and document events of interest within the scope of IT Security
  11. Alternatively, consulting, or advisory experience in Security Operations
  12. Monitor and analyse Intrusion Detection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, Security Incident and Event Management (SIEM) toolset and other event logs to identify security attacks and threats for remediation/suppression.
  13. Validate IOCs that triggered the original alert.
  14. Research additional internal and external data sources for additional enrichment of event information
  15. Determine when an event has reached the threshold of an incident and engage Incident Response Handler to declare an incident.
  16. Handle high and critical severity incidents as described in the operations playbook.   
  17. Operational level experience in some of these domains (not all): security engineering, alert triaging, rule writing, incident response, DFIR, threat intelligence and management, vulnerability management, and security control testing
  18. Expeirnece and knowledge of at least one SIEM platform or security data lake and related processes
  19. Knowledge of various security tools, their functions, and comparisons
  20. Knowledge of network and cloud security fundamentals
  21. Ability to explain complex technical concepts in business terms.
  22. Extensive experience in report writing and presentation.
  23. Strong, adaptable, and flexible work ethic
  24. Good time management skills
  25. Ability to work under pressure and prioritise activities

Qualifications

  • Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field
  • 2+ years of technical experience of prior MDR/SOC/Incident response experience
  • Demonstrated technical knowledge of current network security, network hardware, protocols, and standards required
  • Shall have demonstrated professional experience in incident detection and response, malware analysis, or cyber forensics
  • Act as a workstream participant to support tier-1
  • Demonstrated strong oral and written communication and client facing skills
  • Demonstrated strong analytical and communications skills
  • Flexibility to adapt to different types of engagement, working hours, work environments, and locations
  • Proven ability to work creatively, analytically in a problem-solving environment
  • Ability to work nights, weekends, and/or holidays in the event of an incident response emergency
  • Be comfortable working against deadlines in a fast-paced environment
  • Identify issues, opportunities for improvement, and communicate them to an appropriate senior member
  • Demonstrated technical knowledge of current network security, network hardware, protocols, and standards required

Required skills:

  • 2+ years of technical experience in Information Security
  • Experience with SIEM tools (Sentinel, Splunk, Logrhythm, etc.)
  • Experience in Microsoft Sentinel
  • Familiarity with common IDS/IPS and Firewalls (Snort, Cisco, Fortigate, Sourcefire)
  • Familiarity with incident response process and activities
  • Familiarity with TCP/IP protocol, OSI Seven Layer Model
  • Knowledge of Windows, Unix-based systems, architectures, and network security devices
  • Intermediate level of knowledge of LAN and WAN technologies
  • Must have a solid understanding of information technology, information security domains
  • Knowledge of security best practices and concepts
  • Desired certifications: ISC2 CC, CEH, AZ-900, AZ-500, SC-200
  • Familiarity with ticketing tool / ITSM tool
  • Personal drive, positive work ethic to deliver results within tight deadlines and in demanding situations



  • Bengaluru, Karnataka, India BSR & Co Full time ₹ 12,00,000 - ₹ 24,00,000 per year

    DescriptionFunction: MDR Response TeamPosition: Level 2 ConsultantLocation: BangaloreThe primary role of a Security Analyst (L2) is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures. Specifically, these analysts will be responsible for monitoring the SIEM tools for security events and closing...

  • Associate Consultant

    2 weeks ago


    Bengaluru, Karnataka, India HCL Technologies Full time ₹ 12,00,000 - ₹ 36,00,000 per year

    Job DescriptionSOC JD - E years of experience in a multi tiered SOC/IR/MDR team Should have worked as a SOC lead Experienced with Technologies such as EDR, SIEM, SOAR, FW Deep understanding of attack trends and threat detection services Familiarity with security best practices and common emerging security threats Excellent written and oral communication...


  • Bengaluru, Karnataka, India Sakra World Hospital Full time ₹ 4,00,000 - ₹ 6,00,000 per year

    Associate Consultant : NeurologyQualification: DM NeurologyExperience: 0 - 3 yearsShare the resumes to or WhatsApp @


  • Bengaluru, Karnataka, India CertPro Full time ₹ 2,50,000 - ₹ 7,50,000 per year

    We're hiring Associate Consultant – Bangalore About Us:CertPro is a leading provider of compliance and certification solutions across domains including Information Security Management Systems, Quality Management, and Environmental Management. We are dedicated to supporting organizations in achieving their ISO certification goals efficiently and...


  • Bengaluru, Karnataka, India BSR & Co Full time ₹ 15,00,000 - ₹ 30,00,000 per year

    DescriptionMDR Senior DeveloperRoles and Responsibilities:The Engineering Lead will be focusing primarily on end-to-end execution of an MDR project from planning, client onboarding, delivery to steady state. He/She will lead multiple teams of Microsoft Sentinel Developers in delivery of SIEM and SOAR use cases, Logic apps playbooks, workbooks, PowerBI...


  • Bengaluru, Karnataka, India Huron Consulting Group Full time ₹ 9,00,000 - ₹ 12,00,000 per year

    Huron helps its clients drive growth, enhance performance and sustain leadership in the markets they serve. We help healthcare organizations build innovation capabilities and accelerate key growth initiatives, enabling organizations to own the future, instead of being disrupted by it. Together, we empower clients to create sustainable growth, optimize...


  • Bengaluru, Karnataka, India HCL Technologies Full time ₹ 5,00,000 - ₹ 15,00,000 per year

    Job DescriptionSOC JD - E years of experience in a multi tiered SOC/IR/MDR team Should have worked as a SOC lead Experienced with Technologies such as EDR, SIEM, SOAR, FW Deep understanding of attack trends and threat detection services Familiarity with security best practices and common emerging security threats Excellent written and oral communication...


  • Bengaluru, Karnataka, India BSR & Co Full time ₹ 12,00,000 - ₹ 24,00,000 per year

    DescriptionFunction: KGS Response TeamPosition: Level 2 ConsultantLocation: BangaloreThe primary role of a Security Analyst (L2) is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures. Specifically, these analysts will be responsible for monitoring the SIEM tools for security events and...


  • Bengaluru, Karnataka, India BSR & Co Full time ₹ 5,00,000 - ₹ 12,00,000 per year

    DescriptionServiceNow Associate Consultant ResponsibilitiesThe ServiceNow Consultant is responsible for developing technical solutions on the ServiceNow platform to satisfy the business needs of the IT department and beyond.Development of ITSM & other modules (GRC, SECOPS, HRSD, CSM, ITBM, ITOSM, ITOM) in ServiceNow Platform.Always follow best development...


  • Bengaluru, Karnataka, India Merative Full time ₹ 5,00,000 - ₹ 15,00,000 per year

    Join a team dedicated to supporting the crucial mission of improving health outcomes.At Merative,  you can apply your skills – and grow new ones – with colleagues who have deep expertise in health and technology. Merative provides data, analytics and software for the health industry. Our clients include providers, health plans, employers, life sciences...