Posted:1 week ago|
Platform:
Work from Office
Full Time
Role Proficiency:
Manage a team of Threat Intelligence analysts who oversee delivering the hands-on service to customers and and act as an incident manager with highly technical skills during escalated cyber incidents. Responsible for developing the service to meet market standards. Develop forensic methodologies and dictate the threat hunting methodology to align with the changing cyber landscape and lead the forensic and proactive hunting disciplines into the most advanced techniques in the market. Develop the analysts' technical skills. Effectively communicate with stakeholder. Study the market and help expand the TI service.
Outcomes:
Measures of Outcomes:
Outputs Expected:
Collection:
Processing and analysis:
Communicate with stakeholder:
Learning and Development:
Sales and service development:
Skill Examples:
Knowledge Examples:
Knowledge Examples
Additional Comments:
Requirements: To be successful in this role, you should meet the following requirements: - 5+ years of technical experience in IT or IT Security, for example as a network or operating system administrator. - Expert level knowledge and demonstrated experience of common log management suites, Security Information and Event Management (SIEM), EDR, Email Protection, Case Management & other cyber security tools. - Expert level knowledge and demonstrated experience of common cybersecurity technologies such as IDS / IPS / HIPS, Advanced Anti-malware prevention and analysis, Firewalls, Proxies, MSS, etc. - Good knowledge and technical experience of 3rd party cloud computing platforms such as AWS, Azure, and Google. - Good knowledge and demonstrated experience of common operating systems and platforms to include Windows, Linux, UNIX, Oracle, Citrix, GSX Server, iOS, OSX, etc. - Good knowledge of common network protocols such as TCP, UDP, DNS, DHCP, IPSEC, HTTP, etc. and network protocol analysis suits. - Functional knowledge of scripting, programming and/or development of bespoke tooling or solutions to solve unique problems. - Good knowledge of key information risk management and security related standards including OWASP, ISO2700x series, PCI DSS, GLBA, EU data security and privacy acts, FFIEC guidelines and NIST standards - Good knowledge and demonstrated experience in incident response tools, techniques and process for effective threat containment, mitigation, and remediation. - Formal education and advanced degree in Computer Science or similar and/or commensurate demonstrated work experience in the same. - CEH, EnCE, SANS GSEC, GCIH, GCIA CISSP or any similar Certifications.
Required SkillsCyber Security,Anti Malware,Firewall,Proxies
UST
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Practice Python coding challenges to boost your skills
Start Practicing Python Now5.0 - 5.5 Lacs P.A.
Bengaluru
11.0 - 15.0 Lacs P.A.
7.0 - 11.0 Lacs P.A.
8.0 - 8.0 Lacs P.A.
Experience: Not specified
2.0 - 3.0 Lacs P.A.
4.0 - 7.0 Lacs P.A.
Bengaluru
15.0 - 20.0 Lacs P.A.
15.0 - 30.0 Lacs P.A.
10.0 - 15.0 Lacs P.A.
Noida
Experience: Not specified
1.0 - 2.0 Lacs P.A.