Sr Engineer - Captive Operations

4 - 7 years

3 - 7 Lacs

Posted:2 days ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

Experience Required: 4+ years in Cybersecurity, with 2+years hands-on any threat intelligence platform

Reports To: Security Operations Lead / SOC Manager

Location: Jaipur
Job Type: Full-time, Customer locations

Job Summary:

We are seeking a skilled Threat IntelligenceEngineer/Analyst with hands-on experience in managing and operating a UnifiedThreat Intelligence Platform (UIP). The ideal candidate will be responsible forintegrating, enriching, analyzing, and disseminating threat intelligence acrosssecurity systems (SIEM, SOAR, EDR) to enhance threat detection, hunting, andresponse efforts.

Key Responsibilities:

  • Administer and maintain the Unified Threat Intelligence Platform (e.g., MISP, Anomali, ThreatConnect, EclecticIQ, TIP from commercial vendors). Should have worked on any of the TI platform. Experience in Recorded future preferred.
  • Aggregate, normalize, and enrich threat intel feeds from internal, commercial, and open-source sources (OSINT).
  • Map Indicators of Compromise (IOCs), TTPs, and threat actor profiles using frameworks such as MITRE ATT&CK and STIX/TAXII.
  • Integrate UIP with SIEM, SOAR, and EDR platforms to enable automated threat correlation and alert enrichment.
  • Analyze and prioritize threat intelligence based on relevance, risk level, and business impact.
  • Coordinate with threat-hunting and SOC teams to enable actionable use of threat intelligence.
  • Create and manage threat intelligence dashboards, reports, and alerts.
  • Continuously improve threat ingestion, enrichment pipelines, and integration workflows.

Required Skills and Qualifications:

  • Solid understanding of Threat Intelligence lifecycle: collection, processing, analysis, dissemination.
  • Experience with commercial or open-source TIP/UIP tools (e.g., MISP, ThreatConnect, Anomali, EclecticIQ).
  • Strong knowledge of STIX/TAXII, OpenIOC, YARA, Sigma rules.
  • Experience integrating threat intel into SIEM (e.g., Splunk, QRadar, Sentinel) and SOAR platforms.
  • Familiarity with threat actor behavior, campaigns, malware families, and IOC tracking.
  • Working knowledge of scripting (Python preferred) for automation and data transformation.
  • Ability to analyze complex data and present threat intelligence in clear, actionable formats.

Education Requirements :

BE, B.Tech in IT/CS/ECE, BCA, BSc CS and MCA

Certification :

  • CEH/CSA/ NBAD certification

Mock Interview

Practice Video Interview with JobPe AI

Start Python Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Python Skills

Practice Python coding challenges to boost your skills

Start Practicing Python Now
Tata Communications logo
Tata Communications

Telecommunications

Chennai

RecommendedJobs for You