Posted On 11 July
About this role
As an experienced Information Security Services provider we will help lead a highly motivated team laser-focused on analyzing, designing, developing and delivering solutions built to stop adversaries and strengthen your operations
Our Competent individuals and Skilled leadership will provide you incident response, risk reviews and vulnerability assessments, identifying threats, all of which ladder up to driving secure solutions.
You'll have the following responsibilities
Part of Threat Management team doing Monitoring and Analysis of cybersecurity events, incidents, vulnerability reports from multiple sources
Escalating relevant and least false positive intel to customers
Review and analyze data from various sources such as OSINT, TIP and TI tools
Work closely with SOC team to identify customer-specific threats
Create customer-specific analytical reports based upon identified findings with own analysis comments
Create regular Security Trend reporting utilizing information from licensed and public sources
Work with customer POC to understand customer threat landscape and tailor customized delivery
Monitor analyze and report cybersecurity events
Analyze information regarding intrusion events, Security incidents and other threat indications and early-warning functions
You'll have the following skills & experience
SIEM - IBM Qradar,Splunk,Microsoft Sentinel
EndPoint Security CrowdStrike, Microsoft Defender
Malware Sandboxing ThreatGrid , Wildfire
Phishing Email/Attachment/URL/ Behaviour analysis
Mandatory 5-8 Years experience in the field on Security
- Mandatory Bachelor's Degree or higher preferred
Experience on any Threat Intelligence collection and reporting tool
Good Understanding of Cyber Threat Intelligence and ability to create high-quality Security Analysis reports
Well-versed with OWASP Top Ten and MITRE
Familiarity with the DarkNet, DeepWeb, and other sources of cyber-criminal activity
Experience of working in SOC is key
Any experience in Cyber Crime Research will be a plus