logo

JobNob

Your Career. Our Passion.

Cyber Security


One Degree North Human Resource


Location

Bangalore | India


Job description

Greetings from Navya, One degree North HR services

We are hiring for Cyber Security , inetersted candidates please contact the below provided details

Navya-7411573634

Email: [HIDDEN TEXT]

Min. Experience *
6 Years
Month
Max. Experience *
8 Years
Month

Location *
Bangalore

Does this Position involves *
Shifts

Skills *
Information Security

Essential Skills *
Security incident investigation, Infosec Controls – Physical, Admin, Technical, Security Report Writing, Security Engineering, Network Security, Security Process Flow, Verbal & written Communication

Desirable Skills *
Security incident investigation, Infosec Controls – Physical, Admin, Technical, Security Engineering, Security Report Writing, Network Security, Security Process Flow, Verbal & written Communication
Additional Essential Skills

Qualification *
Any Bachelors
Job Description(Minimum 250 Characters) *
Cybersecurity Incident Response Team (CIRT) Engineers are expected to respond to and mitigate/remediate cybersecurity alerts from Lumen assets.
Responsibilities
·Respond to, remediate, and document information security incidents not limited to dashboard (Advanced Threat Appliance & SIEM) alerts, tickets, emails, or phone calls.
·Actively hunt the enterprise for insecure, suspicious, or malicious activity.
·Review data that is processed within the SIEM to find incident evidence and suspicious events as well as out of scope events.
·Verify and validate security notifications from both internal and external sources.
·Identify and resolve incidents that are not defined by (or deviate from) an existing incident response guide.
·Assist with significant incidents as needed or assigned.
·Provide feedback for development and consistency of automated threat detection mechanisms.
·Update and maintain response guides for accuracy.
·Support Security projects to improve Cyber Defense Team or Lumen's security posture.
·Demonstrate effective communication skills, both verbal and written
·Knowledge of forensic tools such as encase, FTK would be good to have.
·Hands on / knowledge of threat hunting frameworks such as MITRE, Cyber Kill Chain, Diamond model of intrusion analysis is a plus
·Recommend process improvements and new tools / techniques for IR would be a plus
·Research on latest TTP's used by attackers and keep themselves up to date on latest happenings in cyber space
What We Look for in a Candidate
Minimum Qualifications:
·Undergraduate degree in computer science, engineering, or related field, or equivalent experience.
·Solid understanding of information security fundamentals, host and network security hardening and requirements; networking protocols; common intrusion techniques; and common risk management concepts.
·Analytical and problem-solving skills related to networking, operating systems, and malware analysis.
·Candidate must possess, or be willing to pursue, applicable professional/technical certifications, such as Security +, C|EH, OSCP, GCIH, CISSP, GPEN, GWAPT, GISEC, CISM or CISA.
·Strong oral and written communication skills and comfort with presenting technical issues to all levels of management, as well as non-technical staff.
·Broad technical knowledge of current and emerging technologies.
·Ability to work with management to gain necessary support and present reports / findings in a professional manner
·Train juniors and write blogs / articles / whitepapers on things happening around IR / forensic analysis would be of great added value
·Should be able to run IR drills on short notice.
Preferred Qualifications:
Total IT experience: 6-8 yrs.
·4+ years of experience in incident response, computer forensics security, risk assessments, application security or network security.

·Experience in network and/or firewall engineering, administration, design and implementation including experience in applying methodologies and principles for all levels of security.
·Understanding of the following tools: SIEM, IDS / IPS, host based anti-virus, or similar products.
·Experience in network monitoring tools to monitor attacks/threats and doing the initial triage of findings.
·Microsoft or UNIX (including Linux or other UNIX derivatives) operating system administration/support experience.
·Experience with technologies, tools, and process controls to minimize risk and data exposure.
·Development experience in scripting languages such as Python or Perl.
·Experience in large enterprise or carrier data centers and/or networks

Thanks,

Navya-IT recruiter

ODN


Job tags



Salary

All rights reserved