4+ Threat analysis Jobs in Chennai | Threat analysis Job openings in Chennai
Apply to 4+ Threat analysis Jobs in Chennai on CutShort.io. Explore the latest Threat analysis Job opportunities across top companies like Google, Amazon & Adobe.
Key Responsibilities:
1. Threat Research: Work on researching emerging cyber threats specifically. You will monitor threat actor activities, study their tactics, techniques, and procedures (TTPs), and help identify potential risks.
2. Alert Triage and Incident Analysis: Support the analysis of security alerts generated by our in-house platform. You will work alongside the team to identify critical issues and provide timely
intelligence to help mitigate threats.
3. Data Collection and OSINT: Assist in gathering and analyzing data using Open Source Intelligence (OSINT) methodologies. You will help collect relevant information to support ongoing threat investigations.
4. Report Preparation: Contribute to the preparation of threat intelligence reports for internal and external stakeholders. You will learn how to convey complex technical information in a clear and
actionable manner.
5. SOP Development: Collaborate with the team to develop and refine Standard Operating Procedures (SOPs) for systematic threat analysis. Your input will help ensure that our procedures are efficient and scalable.
6. Cross-functional Collaboration: Work closely with various teams, including product development and data acquisition, to support the integration of new intelligence sources and improve the effectiveness of our threat intelligence platform.
Key Qualifications:
Educational Background: Completed a degree in Cybersecurity, Computer Science, Information Technology, or a related field.
Basic Knowledge of Cybersecurity: A foundational understanding of cybersecurity concepts, including web application security, threat analysis, and vulnerability assessment.
Familiarity with OSINT: Basic knowledge of Open Source Intelligence (OSINT) tools and methodologies for data collection.
Technical Skills: Familiarity with scripting languages such as Python, Ruby, or GO is a plus.
Experience with automation and data analysis tools will be advantageous.
Communication Skills: Strong written and verbal communication skills, with the ability to learn how to convey technical findings effectively.
Problem-Solving and Adaptability: A proactive attitude with strong problem-solving skills. You should be comfortable learning in a fast-paced and dynamic environment.
Additional Skills:
Interest in Cybersecurity Challenges: Participation in bug bounty programs, Capture The Flag (CTF) challenges, or cybersecurity competitions is a plus.
Willingness to Learn: A keen interest in developing skills in threat intelligence, threat actor profiling, and behavioral analysis.
Helping leaders continuously improve their security posture
Company: A cyber security company, helping leaders continuously improve their security posture.
Team Size: 200 +
Responsibilities
- Analyze, plan, and develop requirements (and standards) for scheduled projects.
- Assign and oversee the daily tasks of technical personnel while ensuring the team is working toward established milestones.
- Hold regular team meetings to determine the progress and address any questions or challenges regarding projects.
- Determine and define clear deliverables, roles, and responsibilities for security engineers required for specific projects or initiatives.
- Research and evaluate different trends and technology in the cyber space and articulate the same to the team.
- Hands-on experience with vulnerability management tools and strong technical understanding and experience assessing vulnerabilities and identifying weaknesses in multiple operating system platforms, database, and application servers.
- Strong written and verbal communication skills with the ability to collaborate through all parts of the business.
- High performance skillset which not only understands the threat spaces as it relates to risks, but also is able to meet the technical challenge of communicating this out to our teams/customers.
- Leadership skills which bring out the best in the team. This includes both direct leadership but also cross-functional capabilities.
- 5+ years in a vulnerability management program. Knowing not only how to assess vulnerabilities, but prioritize and drive remediation of the same.
- Ability to communicate at the executive leadership levels. Understanding how to translate technical gaps to business risk is critical for communication in this role.
- Reporting gaps in a meaningful way that addresses a business risk as well as providing technical solutions to the operations teams in remediation is key.
- Experience in interacting with auditors and regulators.
- Travel to client location (within India and abroad) as and when required.
- Conduct exit briefing and presentation to clients and relevant stakeholders.
- Work with pre-sales on technical proposals and RFP responses.
- Certification in Project Management or related technical field will be an added advantage.
- Experience in working in a high-level collaborative environment and promoting teamwork
- Ability to predict challenges and seek to proactively head-off obstacles.
Education : Bachelor’s degree in Computer Science, Information Systems, or equivalent education or work experience
Experience : 12 -16 years
Location : Chennai (Hybrid)
Compensation: Best in Industry
Why should we talk?
We are a bunch of passionate cybersecurity professionals who are building a culture of security. Today, cybersecurity is no more a luxury but a necessity with a global market value of $150 Billion. Our vision is to make cybersecurity available for all, not just the Fortune 500 companies.
We live by a people-first approach. We firmly believe that our employees should enjoy what they do. For our employees, we provide a hybrid work environment with a competitive best in industry pay, while providing them with an environment to learn, thrive, and grow. Our hybrid working environment allows employees to work from the comfort of their homes or the office if they choose to. For the right candidate, this will feel like your second home.
If you are passionate about cybersecurity just as we are, we would love to pick your brains.
Job Description
Cyber Threat Intelligence & Threat Hunting - Subject Matter Expert (B3-2)
Responsibilities:
Perform threat research, create actionable threat advisories, and derive hunting queries based on the evolving threat vectors.
Understand APT groups, Conduct deep dive technical analysis of cyber-attack tools, tactics, and procedures. Create hypothesis and perform active threat hunting.
Minimum Requirements:
10+ years of overall experience, 7+ years of experience in cyber threat intelligence, malware analysis (Reverse engineering)
Hands-on experience with writing threat hunting hypothesis & active threat hunting
Experience with YARA rule and OpenIOC signature creation.
Experience with multi-tiered mission-critical systems.
Experience in opensource sandbox and honeypots.
Preferred Certification
GIAC Cyber Threat Intelligence (GCTI)
C| TIA (Certified Threat Intelligence Analyst)
CCTIA by the NICCS
• Handling critical incidents/escalations, reviewing incidents and tracking towards closure • Good experience in SIEM tools, event logging and event analysis • Good knowledge in enterprise security products like Firewalls, IPS, Web/content Filtering tools, Compliance tools • Team Management, performance monitoring and prepare reports on weekly, monthly basis and share to stakeholders as needed • Good knowledge about common security attacks, targeted attacks • Good experience in forensic analysis, Packet Analysis tools like Wireshar • Assisting, mentoring L2/L3 analysts and groom them to move to next level • Contribute to continue monitoring and improvement of security posture of the organization • Having experience of managing team of 25+ team members across multiple locations.
|
• Primarily responsible for security event monitoring, management and response • Ensure incident identification, assessment, quantification, reporting, communication, mitigation and monitoring • Revise and develop processes to strengthen the current Security Operations Framework, Review policies and highlight the challenges in managing SLAs • Responsible for team & vendor management, overall use of resources and initiation of corrective action where required for Security Operations Center • Management, administration & maintenance of security devices under the purview of SOC which consists of state-of-the art technologies • Perform threat management, threat modeling, identify threat vectors and develop use cases for security monitoring • Responsible for integration of standard and non-standard logs in SIEM • Creation of reports, dashboards, metrics for SOC operations and presentation to Sr. Mgmt. • Co-ordination with stakeholders, build and maintain positive working relationships with them
|