Job Role
SOC L3 + Cloud Incident Response (AWS)
Exp Range
5-8 Years (Relevant)
Location
Hyderabad preferred (WFO)
Payroll
Permanent with LTI
Availability
Immediate to 30 Days only
Detail JD
Mandatory Skills
- Minimum 5 years of experience in Security Operations & Incident Response. Resource should have experience in Cloud experience (AWS) or Forensic experience or Reverse engineering.
- Provide support to the Security Operations Centre (SOC) during incident response, event monitoring, and threat hunting activities. Responsibilities include cyber threat analysis support, research, recommending appropriate remediation and mitigation.
- Incident & Problem Management – Monitoring, Validation, Analysis, Triage, Escalation, Response and Resolution
- SIEM - Log source integration
- Use Case Fine tuning and New Use case creation
- Proficient in one more of the following computer languages PowerShell, Bash, Python, or Visual Basic to support cyber threat detection or reporting. Security API implementations can be considered as well.
- Candidate must have a deep understanding of several of the following fields: Email security (including PDF and Document analysis), digital media forensics, monitoring and detection, incident response, vulnerability assessment, penetration testing, cyber intelligence analysis and network analysis
- Deep understanding of either the Lockheed Cyber Kill Chain or MITRE Attacks framework (MITRE preferred)
- Cyber threat analysis support, research and recommend appropriate remediation and mitigation
- Trending and correlation of monitored events to build new Indicators of Compromise (IOC), attack attribution and helping establish countermeasures increasing cyber resiliency
- Identification of advanced cyber threat activities, Endpoint Detection & Response, intrusion detection, incident response, malware analysis, and security content development (e.g., signatures, rules etc.); and cyber threat intelligence
Educational Requirement
- Bachelor’s Degree, in Computer Science or related field preferred and 7+ years’ experience in an information technology field with a minimum of 3 years of experience as a Tier III senior cybersecurity analyst performing intelligence analysis, collection management, and technical analysis