Thanks for usingCareesma. Job Offer printed on the 22/05/2018.

Security Analyst

Hubli, Karnataka

UST Global

Job Description

Security Analyst Incident Responder
Key Areas of Responsibility
- The Security Analyst will utilize their background in technology and incident response procedures to act as a subject matter in cybersecurity incident response.
- Security Analyst will be responsible for the execution of incident handling functions as well as direct response to security incidents.
- Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation
- Provides regular monitoring, triage, and incident response to automated security alerts
- Conduct host forensics, network, forensics, log analysis, and malware triage in support of incident response investigations.
- Recognize and organize attacker tools, tactics, and procedures in indicators of compromise IOCs that can be applied to current and future investigations.
- The Senior Attack Analyst have current knowledge of attack methodology including but not limited to malicious tactics techniques vulnerability penetration testing , and response procedures TTPs .
- Reviews trouble tickets generated by Tier 1 analyst s
- Conducts as needed ad hoc incident analysis
- Examine network topologies to understand data flows through the network
Placement in the Organization
Typically reports to a Manager or Senior Manager within the services organization
Dimensions Relating to Know How Technical Know How, Management Breadth, Human Relation Skills

- Effectively addresses and resolve complex and abstract problems and is also the escalation point for devising action plans to resolve challenges
- Proactively identifies and leads business process re definition, introduction of new innovative technology or processes.
- Expert communication skills as the role is customer focused and will involve managing customer and stakeholder expectations
- Provides consultation to significantly enhance customer or business performance not obvious to others
- Exemplifies leadership qualities with the ability to take decisive action
Dimensions Relating to Problem Solving Thinking Environment Challenge
- Acts independently to determine methods and procedures on new and custom solutions.
- Provides input into defining objectives and has considerable freedom to help achieve desired results
- Independently performs assignments supervision is received for routine department management processes ie Performance Reviews
- Confers with management on unusual matters
- Demonstrates ability to lead and oversee highly complex and high profile work
- Demonstrates expert professional capabilities and leadership
- Possesses a compelling track record of strategic, successful, highly complex high profile assignments, accomplished with independence and creativity
- Effectively provides formal technical and or functional direction to other professionals
- Influences highly demanding professionals who value precision, preparation, and a sense that their time is being used well
Education
- Relevant BA BS degree with 7 relevant work experience
- Advanced technical certification preferred ITIL, CISSP, GCIA, GCIH, GCFA, GCFE, etc-
Experience

- The Security Analyst will utilize their background in technology and incident response procedures to act as a subject matter in cybersecurity incident response.
- Security Analyst will be responsible for the execution of incident handling functions as well as direct response to security incidents.
- Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation
- Conduct host forensics, network, forensics, log analysis, and malware triage in support of incident response investigations.
- Recognize and organize attacker tools, tactics, and procedures in indicators of compromise IOCs that can be applied to current and future investigations.
- The Senior Attack Analyst have current knowledge of attack methodology including but not limited to malicious tactics techniques vulnerability penetration testing , and response procedures TTPs .
- Conducts as needed ad hoc incident analysis
- Examine network topologies to understand data flows through the network
Technical Skill set

- Sysadmin skills Linux Windows DB
- Programming skills Python, Ruby, PHP, C, C , Java, Perl
- Security skills ITIL, CISSP, GCIA, GCIH, GCFA, GCFE, etc
- Natural ability, curiosity to get to the root cause
- Ability to remain calm under pressure.
- Being a former white hat hacker is also a big plu

Company Description

it is cmm level 5 company

Additional Information

Last updated:
18/05/2018
Job type:
Full time
Position type:
Permanent
Vacancies:
1
Minimum experience:
Between five and ten years
Education:
Compulsory Education
Category:
Jobs in IT - Systems / Networking / Security
Save job
Go to Top