Manager
12 hours ago
Job Title:
Manager, Cyber Threat Intelligence, Sec Monitor & Resp
Job Code:
7465
Subtitle:
CSIRT
Job Summary:
IOC validation/sweeps/ investigations. Assistance in automating workflows (highly desirable). Producing Daily CISO CTI report. Tuning/ responding to alerts from CTI tools regarding topics such as (leaked credentials, brand abuse, deep dark web investigations, etc.)
Education:
Bachelor's Degree
Year of Experience:
5 - 8 years
Type of Experience:
Strong background in tactical/ operational cyber threat intel with knowledge of incident response/ threat hunting. Demonstrated ability to automate tasks/ workflows is highly favorable. Knowledge of Microsoft KQL also highly desirable but other SIEM knowledge acceptable.
Principal Responsibilities:
· One of the primary responsibilities are IOC sweeps/ blocks/ investigations of hits. Assist with automating this task. End goal is for IR to receive high fidelity true positive hits and for the person in this role to assess trends of IOC hits and feed intel to the threat hunt workstream to prioritize hunts on those threat actors. While working towards IOC sweep automation, escalates to hunters when hits determined to be true positive and remediation actions are required or if advanced analysis is required.
· Daily CISO report (CTI Input) – This report is sent out daily to our CISO and other Sr. Leadership/ workstreams regarding daily CTI news and its relevance to KPMG. The person in this role will be responsible for this daily.
· Assist U.S. CTI workstream SME with alerts/ investigations from CTI tools. Prefer experience with CTI tools such as ZeroFox (Brand abuse/ leaked credentials investigations), Flashpoint (Deep dark web investigations), Domain Tools (domain/ web investigations) and experience with a Threat Intelligence Platform (TIP) such as Threat Q.
· Assist with the assessment of Top 10 threat actors/ malware for the firm to prioritize on assessments/ hunts.
· Research and develop risk mitigating approaches and drive response and remediation
· Document processes and procedures in the form of playbooks and reference guides.
· Stay abreast of the latest information security controls, practices, techniques and capabilities in the marketplace.
· Lead internal skills development activities for information security personnel on the topic of cyber threat intelligence, by providing mentoring and by conducting knowledge sharing sessions
· Provide input to business cases and presentations to senior IT leadership of proposed security products and studies. Produce operating metrics and key performance indicators.
· Knowledge of all phases of incident response life cycle: analysis, containment, eradication, remediation, recovery
· Evaluate external threat intelligence sources related to zero-day attacks, exploit kits and malware to determine organizational risk.
Qualifications:
· Knowledge/ experience in automating tasks (creating logic apps, powershell/ python scripts to automate workflows/ tasks). This is highly desirable skillset.
· Experience in security monitoring, security operations, and incident response activities; preferably within a professional services firm or similar environment
·Strong knowledge of incident response and crisis management; Ability to identify both tactical and strategic solutions
· Knowledge/ background with snort rules (reading and/or writing them).
· Knowledge of Microsoft KQL (writing queries/ creating workbooks are highly desirable).
· Experience with IT process definition and / or improvement
· Ability to coordinate, work with and gain the trust of business stakeholders, technical resources, and third-party vendors
· Strong verbal/written communication, with ability to effectively interact with individuals at all levels of responsibility and authority. Must be able to prioritize, delegate to support an environment driven by customer service and teamwork. · Strong trouble-shooting and organizational skills and ability to work on multiple projects simultaneously. Ability to participate in resource planning processes based on defined organizational plans.
· Experience defining security monitoring rules, monitoring events, assessing risk, responding to incidents and providing security oversight related to the security features of IT tools supported by the IT operations teams
· Ability to coordinate, work with and gain the trust of business stakeholders, technical resources, and third-party vendors
· Strong verbal/written communication, with ability to effectively interact with individuals at all levels of responsibility and authority. Must be able to prioritize, delegate and foster the development of high-performance teams to lead/support an environment driven by customer service and team work. Strong trouble-shooting and organizational skills and ability to work on multiple projects simultaneously. Ability to participate in resource planning processes based on defined organizational plans.
· Experience developing/ utilizing SIEM queries for investigating IOCs within the network.
· Experience conducting analysis based on Deep Dark Web intelligence.
Work Location:
null
Responsibilities
Job Title:
Manager, Cyber Threat Intelligence, Sec Monitor & Resp
Job Code:
7465
Subtitle:
CSIRT
Job Summary:
IOC validation/sweeps/ investigations. Assistance in automating workflows (highly desirable). Producing Daily CISO CTI report. Tuning/ responding to alerts from CTI tools regarding topics such as (leaked credentials, brand abuse, deep dark web investigations, etc.)
Education:
Bachelor's Degree
Year of Experience:
5 - 8 years
Type of Experience:
Strong background in tactical/ operational cyber threat intel with knowledge of incident response/ threat hunting. Demonstrated ability to automate tasks/ workflows is highly favorable. Knowledge of Microsoft KQL also highly desirable but other SIEM knowledge acceptable.
Principal Responsibilities:
· One of the primary responsibilities are IOC sweeps/ blocks/ investigations of hits. Assist with automating this task. End goal is for IR to receive high fidelity true positive hits and for the person in this role to assess trends of IOC hits and feed intel to the threat hunt workstream to prioritize hunts on those threat actors. While working towards IOC sweep automation, escalates to hunters when hits determined to be true positive and remediation actions are required or if advanced analysis is required.
· Daily CISO report (CTI Input) – This report is sent out daily to our CISO and other Sr. Leadership/ workstreams regarding daily CTI news and its relevance to KPMG. The person in this role will be responsible for this daily.
· Assist U.S. CTI workstream SME with alerts/ investigations from CTI tools. Prefer experience with CTI tools such as ZeroFox (Brand abuse/ leaked credentials investigations), Flashpoint (Deep dark web investigations), Domain Tools (domain/ web investigations) and experience with a Threat Intelligence Platform (TIP) such as Threat Q.
· Assist with the assessment of Top 10 threat actors/ malware for the firm to prioritize on assessments/ hunts.
· Research and develop risk mitigating approaches and drive response and remediation
· Document processes and procedures in the form of playbooks and reference guides.
· Stay abreast of the latest information security controls, practices, techniques and capabilities in the marketplace.
· Lead internal skills development activities for information security personnel on the topic of cyber threat intelligence, by providing mentoring and by conducting knowledge sharing sessions
· Provide input to business cases and presentations to senior IT leadership of proposed security products and studies. Produce operating metrics and key performance indicators.
· Knowledge of all phases of incident response life cycle: analysis, containment, eradication, remediation, recovery
· Evaluate external threat intelligence sources related to zero-day attacks, exploit kits and malware to determine organizational risk.
Qualifications:
· Knowledge/ experience in automating tasks (creating logic apps, powershell/ python scripts to automate workflows/ tasks). This is highly desirable skillset.
· Experience in security monitoring, security operations, and incident response activities; preferably within a professional services firm or similar environment
·Strong knowledge of incident response and crisis management; Ability to identify both tactical and strategic solutions
· Knowledge/ background with snort rules (reading and/or writing them).
· Knowledge of Microsoft KQL (writing queries/ creating workbooks are highly desirable).
· Experience with IT process definition and / or improvement
· Ability to coordinate, work with and gain the trust of business stakeholders, technical resources, and third-party vendors
· Strong verbal/written communication, with ability to effectively interact with individuals at all levels of responsibility and authority. Must be able to prioritize, delegate to support an environment driven by customer service and teamwork. · Strong trouble-shooting and organizational skills and ability to work on multiple projects simultaneously. Ability to participate in resource planning processes based on defined organizational plans.
· Experience defining security monitoring rules, monitoring events, assessing risk, responding to incidents and providing security oversight related to the security features of IT tools supported by the IT operations teams
· Ability to coordinate, work with and gain the trust of business stakeholders, technical resources, and third-party vendors
· Strong verbal/written communication, with ability to effectively interact with individuals at all levels of responsibility and authority. Must be able to prioritize, delegate and foster the development of high-performance teams to lead/support an environment driven by customer service and team work. Strong trouble-shooting and organizational skills and ability to work on multiple projects simultaneously. Ability to participate in resource planning processes based on defined organizational plans.
· Experience developing/ utilizing SIEM queries for investigating IOCs within the network.
· Experience conducting analysis based on Deep Dark Web intelligence.
Work Location:
null
-
Change Management Manager
4 days ago
Bengaluru, Karnataka, India Russell Tobin Full time ₹ 20,00,000 - ₹ 25,00,000 per yearKEY POINTS:-Change Management ManagerStakeholder Management,Organizational Change management,Mandatory - PROSCI or CCMP certificationJob Title: Change Management ManagerLocation: BangaloreExperience: 8+ Yrs in to Change managementInterview Process: Virtual, Final round will be F2FWork Mode: HybridWork Location- North Gate Business Park Sy.No 2/1, and Sy.No...
-
Managed Services Manager
21 hours ago
Bengaluru, Karnataka, India Talent Worx Full time ₹ 12,00,000 - ₹ 36,00,000 per yearRole DescriptionManaged Services Manager (MSM) is a role, where the individual is expected to have both project management skills and customer handling skills along with fair knowledge of technology. An MSM is of key value to the customer who acts as a management partner, an integral part and extension of the Customer's IT management structure. The major...
-
Assistant Manager/Manager
1 week ago
Bengaluru, Karnataka, India Medibuddy Full time ₹ 15,00,000 - ₹ 25,00,000 per yearJob SummaryAs an Assistant Manager/Manager Legal & Compliance at MediBuddy, you will play a key role in ensuring legal and regulatory compliance across business operations. This includes managing the agreement portfolio, contract lifecycle, compliance reporting, and process automation. You will collaborate cross-functionally to mitigate legal risks, drive...
-
Manager
6 days ago
Bengaluru, Karnataka, India ChanRe Rheumatology & Immunology Center & Research Full time ₹ 9,00,000 - ₹ 12,00,000 per yearCompany DescriptionChanRe Rheumatology & Immunology Center & Research (CRICR) is a specialized hospital in India dedicated to the management of patients with musculoskeletal and immunological diseases. Established by Dr. Chandrashekara.S in 2002, CRICR has grown from a small out-patient clinic to a 24/7 facility with comprehensive laboratory services and a...
-
Manager
1 week ago
Bengaluru, Karnataka, India Weekday AI Full time ₹ 3,50,00,000 - ₹ 7,00,00,000 per yearThis role is for one of the Weekday's clientsSalary range: Rs ie INR 35 LPA)Min Experience: 11 yearsLocation: BangaloreJobType: full-timeAs an IAM Manager, you will oversee the development and management of identity lifecycle processes—covering provisioning, authentication, authorization, and de-provisioning—while ensuring adherence to security and...
-
Assistant Manager/Manager
2 weeks ago
Bengaluru, Karnataka, India MediBuddy Full time ₹ 15,00,000 - ₹ 25,00,000 per yearJob SummaryAs an Assistant Manager/Manager - Legal & Compliance at MediBuddy, you will play a key role inensuring legal and regulatory compliance across business operations. This includes managing theagreement portfolio, contract lifecycle, compliance reporting, and process automation. You willcollaborate cross-functionally to mitigate legal risks, drive...
-
Manager
7 days ago
Bengaluru, Karnataka, India KPMG Global Services Full time ₹ 15,00,000 - ₹ 25,00,000 per yearRole ProfileCapability: Enterprise-Wide TechnologyTeam: Technology Transformation and ChangeJob Title: Project ManagerGrade: C (Manager)ContextTechnology Transformation and ChangeThe Technology Transformation and Change Team delivers on the Digital and Technology Transformation ambitions for our Firm. It is a team which includes the Technology PMO function,...
-
Manager
10 hours ago
Bengaluru, Karnataka, India Spes Manning Solutions LLP Full time ₹ 8,00,000 - ₹ 12,00,000 per yearRole & Responsibilities8+ years management experience in a global workforce planning, supply chain, or operations management environment.Develop the global workforce management strategy to drive optimal outcomes for all contact centers.Expert knowledge of workforce management theory and best practices.Prepare strategic business plans for workforce management...
-
Manager
21 hours ago
Bengaluru, Karnataka, India Express Global Logistics Full time ₹ 4,00,000 - ₹ 8,00,000 per yearAbout The RoleAn experienced and skilled CHA and warehouse knowledge in liquor industry will spearhead the Warehouse facility function of the organization. He/she will assist with the management of custom and corporate compliance across the entire Facility, ensuring that all processes are correctly adhered to deliver the highest level of customer service and...
-
Manager
1 week ago
Bengaluru, Karnataka, India Shadowfax Technologies Full time ₹ 12,00,000 - ₹ 24,00,000 per yearDepartment: LM OperationsLocation: BengaluruReports To: National Operations HeadRole Overview:The Manager Last Mile Operations (South Region) will be responsible for leading, managing, Flipkart Grocery and ODH operations across the South region. This role demands strong operational leadership, P&L ownership, stakeholder management, and decision-making...