Job Details
We are looking for Security analyst (Threat hunter) for one of our most reputed Cyber security clientsSkills: EDR, Threat hunting/Threat intelligenceResponsibilities: -Hunt for security threats, identify threat actor groups and their techniques, tools and processes -Provide expert analytic investigative support to L1 and L2 analysts for complex security incidents -Perform analysis of security incidents for further enhancement of rules, reports, AI/ML models -perform analysis of network packet captures, DNS, proxy, NetFlow, malware, host-based security and application logs, as well as logs from various types of security sensors uncovering the unknown about internet threats and threat actors -Analyze events to differentiate between malicious and benign activity and analyses malicious code, packet capture files, and artefacts -Examine alerts from various security monitoring tools, perform triage & determine scope of threats -Analyze logs, alerts, suspicious malwares samples from all GCSOC tools, other security tools deployed in the bank such as Anti-Virus, EDR, IPS/IDS, Firewalls, Proxies, Active Directory, Vulnerability assessment tools etc.
-Using knowledge of the current threat landscape, threat actor techniques, and the internal network, analyze log data to detect active threats within the network Build, document and maintain a comprehensive model of relevant threats to the bank -Weekly tactical briefings on threat observations and findings to the bank on threats to the bank -Keep up to date with information security news, vulnerabilities, tools, techniques, exploits and trends -Proactively identify potential threat vectors and work with engineering team to improve prevention and detection methods.
-Identify and propose automated alerts for new and previously unknown threats -Above is illustrative list of general activities Technology specific activities shall be arrived at in consultation with the Project Manager of the bidder and / or L3 resource of respective OEM -The required candidate must be able to understand and communicate clearly to required stakeholdersEducation: BE, B Tech, BSC-IT, MCA, BCA or other related field Certifications: OEM Certification: Splunk Core Certified User Industry Certification: CEH/CHFI//GSEC / GMON/ITIL or any equivalent Security Certification