As a Senior Security Analyst, you will be responsible for conducting thorough investigations to determine potential impact and understand the extent of compromise. You will analyze attack patterns, Tools, Techniques and Procedures (TTPs) to identify methods of attacks and attack life cycle. You will also develop and implement novel threat detection content, rules, and use cases for deployment in the SIEM platform.
Requirements
- Minimum 8 years' experience working in a large-scale IT environment with focus on Cyber/Information Security.
- Strong Knowledge of Network security (Firewalls, Proxies, IDS/IPS, Vulnerability Scanner).
- Seasoned in Digital forensics, malware assessment, and Threat Hunting.
- 5+ years of hands-on experience on leading analytical platforms like Splunk, Qradar, Hunters, SumoLogic, Sentinel.
- Deep understanding of MITRE ATT&CK Framework.
- Customer-facing, with good report-writing skills and strong communication skills at all levels.
- Ability to provide technical and service leadership to L1 analysts. Be a thought leader in the SOC.
- Knowledge of Security Best Practices and Concepts.
- Conducting vulnerability testing and risk analyses to assess security and performing internal and external security audits.
- Strong analytical and problem-solving skills.
- Lead incident investigation and response activity
- Participate in on-call rotation for after-hours security incident escalations.
- Capability to communicate and listen to needs from organizational or client stakeholders.
- Staying up to date with emerging security threats
- Well-developed logical thinking capabilities, to be able to investigate cases.
- Reliability and overall good communication skills – both verbal and written.
- Able to work in shift schedule.
- Staying up to date with emerging security threats.
- Good interpersonal skills – clear communication, attentive & careful listening, empathetic behavior, being positive, supporting useful ideas & honest efforts of colleagues, being positive.