logo

JobNob

Your Career. Our Passion.

Cyber Security : Threat Intelligence & Hunting


Ltimindtree Limited


Location

Chennai | India


Job description

Job Title :Â Cyber Security : Threat Intelligence & Hunting
Location : Pune /Mumbai /Chennai/Bangalore /Hyderabad /Kolkata /Delhi /Noida
Experience : 08 – 12 Years
Skills : Cyber , Threat Intelligence , Threat Hunting

Â
Job Description :

'The offshore TIH Lead will work closely with Onshore & offshore team on the Threat Intelligence & hunting activities. This includes developing methodologies for Threat intelligence. Analyze, develop Threat Intelligence & disseminate indicators of compromise (IOCs), reports and launch Threat Hunting campaigns based on Industry adopted best practices based on MITRE ATT&CK framework & others.

Mandatory Skills :Â

1. Minimum 8+ years of experience in Threat Intelligence & Hunting
2. Experienced in discovering and gathering Threat data from intelligence feeds
3. Prior experience of developing methodologies for threat data mining to uncover the threat actors and threat vectors
4. Experienced in maintaining, developing, and continuously evaluating cyber threat intelligence, & data sources. Experienced in integrating the Threat intelligence platforms with various security solutions.
5. Maintain an understanding of the overall threat landscape (cyber, malware, botnets, phishing, DDoS, physical) applicable to the customer.
6. Collect, analyse, investigate, store, and disseminate indicators of compromise (IOCs)
7. Regularly develop and produce written cyber, brand and threat intelligence reports
8. Provide support to the Security Incident Response Team and SOC in the effective detection, analysis, and containment of attacks, as well as researching potential IOCs and linking to intelligence
9. Draft, edit, and disseminate threat intelligence information/briefs to stakeholders, executive leadership, and others
10. Monitoring of security procedures and practices; recommend optimizations and improvements when gaps are identified
11. Collaborate with Monitoring and Incident Response team & Content Engineering team to build proactive detection logic for threat detection.
12. Assist the SOC Monitoring & IR team in providing intel briefing, threat analysis and resolution of Major incidents.
13. Leverage Threat Intelligence gathered to execute Threat Hunting campaigns.Â

Following types of Threat Hunting campaigns will be executed :
o Threat Indicator driven threat hunting
o Hypotheses driven threat hunting
o MITRE ATT&CK framework driven hunting campaigns
14. Escalate true positives to Incident status and assist in relevant incident response
15. Perform end-to-end threat hunting, developing, maturing and maintaining TTP or attack pattern detection techniques
16. Perform the full threat hunting cycle, including recommendations for EDR detection rules
17. Collaborate with IR team to recommend and mitigate the effects caused by an incident.
18. Perform technical cyber security investigations on security incidents, root cause analysis and deep dive analysis of malicious artifacts, analyze threat intelligence, identify TTP and attack patterns.
19. Help mature the Security Incident Response process to ensure it meets the needs of the global business and is adhered to.
20.Analyze large and unstructured data sets to identify trends and anomalies indicative of malicious activities.'
Â
Â


Job tags



Salary

All rights reserved