Duties and Responsibilities
• Detect incidents through proactive “hunting” across security-relevant datasets.
•Thoroughly document incident response analysis activities
•Review investigations conducted by more junior analysts to ensure quality standards are met.
•Develop new, repeatable methods for finding malicious activity across the networks.
•Provide recommendations to enhance detection and protection capabilities.
•Regularly present technical topics to technical and non-technical audiences
•Develop and follow detailed operational processes and procedures to appropriately analyse, escalate, and assist in the remediation of information security incidents.
•Prioritize multiple high-priority tasks and formulate responses/recommendations to customers and team members in a fast-paced environment.
•Provide assistance to other security teams.
•Continually develop new technical skills and push overall team capabilities forward.
•Engage with and mentor other team members.
•Work with other teams on major engineering and architecture initiatives.
•Be innovative with their understanding of attack methodologies, malware analysis, malicious toolkits, and how those may manifest within various security technologies.
•Advanced proactive threat hunting
•Understands advanced adversary emulation concepts.
•Advanced use case design for insider threat, operational, threat detection and response
•Review of defensive and detective controls to reduce client attack surface.
•Other duties as assigned
Required Qualifications
Preferred Qualifications
Duties and Responsibilities
• Detect incidents through proactive “hunting” across security-relevant datasets.
•Thoroughly document incident response analysis activities
•Review investigations conducted by more junior analysts to ensure quality standards are met.
•Develop new, repeatable methods for finding malicious activity across the networks.
•Provide recommendations to enhance detection and protection capabilities.
•Regularly present technical topics to technical and non-technical audiences
•Develop and follow detailed operational processes and procedures to appropriately analyse, escalate, and assist in the remediation of information security incidents.
•Prioritize multiple high-priority tasks and formulate responses/recommendations to customers and team members in a fast-paced environment.
•Provide assistance to other security teams.
•Continually develop new technical skills and push overall team capabilities forward.
•Engage with and mentor other team members.
•Work with other teams on major engineering and architecture initiatives.
•Be innovative with their understanding of attack methodologies, malware analysis, malicious toolkits, and how those may manifest within various security technologies.
•Advanced proactive threat hunting
•Understands advanced adversary emulation concepts.
•Advanced use case design for insider threat, operational, threat detection and response
•Review of defensive and detective controls to reduce client attack surface.
•Other duties as assigned
Required Qualifications
Preferred Qualifications
See what comes ahead in the application process. Find out how we help you land that job.
Applying with us is easy. We will review your application and see if you are a good fit for the job and the company.
Our consultant will call you to discuss your application and further career aspirations if you're suitable for a role.
If you’ve never worked with us before, we’ll need some basic additional pieces of information to confirm your eligibility to work in India.
Next, we just need to verify a few things - we’ll make the relevant compliance checks and keep you posted.
We will keep you updated when we have similar job postings.
Thank you for subscribing to your personalised job alerts.