Assistant Vice President, SCRAT Engineer (Splunk/ SIEM)

5 - 8 years

0 Lacs

Posted:3 weeks ago| Platform: Foundit logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

Job Role:

AVP Threat Detection & Response (SCRAT Engineer)

Location:

Bengaluru

Work Mode:

Onsite

About The Role

This role is part of the Security Operations function responsible for strengthening threat detection, response, and cyber resilience across the region. As a Threat Detection & Response Engineer, you will design, enhance, and operationalize advanced security use cases aligned with global frameworksfortifying detection capabilities, reducing risk exposure, and proactively countering evolving cyber threats.

Key Responsibilities

Threat Detection & Use Case Engineering

  • Design, refine, and implement advanced detection use cases aligned with global security frameworks such as MITRE ATT&CK and Cyber Kill Chain.
  • Develop response strategies leveraging SIEM, UEBA, SOAR, EDR, and other security technologies.
  • Conduct deep threat analysis using knowledge of attack patterns, TTPs, and adversarial behavior.

Cross-Functional Collaboration

  • Partner with Threat Intelligence, Incident Response, Forensics, and SOC teams to create targeted and effective detection content.
  • Participate in red-team and penetration testing exercises to validate robustness of detection logic.

Continuous Monitoring & Improvement

  • Keep up to date with emerging threats, attack vectors, and industry trends to maintain resilient detection strategies.
  • Produce metrics, dashboards, and performance reports to highlight effectiveness of use cases.
  • Improve automation and correlation logic across multiple datasets for enhanced visibility and response.

Operational Security Expertise

  • Drive investigations, monitoring, triage, and incident response workflows.
  • Leverage SIEM/Splunk for integration, development, and content creation.
  • Apply knowledge across network security, host forensics, anomaly detection, cloud security, and offensive security fundamentals.

Requirements

  • Bachelor's degree in IT, Cyber Security, Computer Science, or related field.
  • 58 years of experience in Information Security; SOC experience of 34 years preferred.
  • Strong expertise with SIEM/Splunk, detection content development, and security automation.
  • Familiarity with models/frameworks such as MITRE ATT&CK, Cyber Kill Chain, and CRI.
  • Hands-on experience across:
    • Network Security (Firewalls, IPS, WAF, Proxy, VPN)
    • Incident Response & Forensics
    • Anomaly Detection
    • Cloud, OS, Application & Database Security
  • Strong analytical, problem-solving, and time-management skills.
  • Ability to correlate multiple datasets to investigate and validate security events.
  • Preferred certifications: CISSP, ISSMP, SANS, GSEC, GCFA, GNFA, GIAC, GCIH, Splunk certifications.
In cybersecurity, threats evolve every daytrue defenders evolve faster. Are you ready to engineer the next line of defense

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You