Posted:1 month ago|
Platform:
On-site
Full Time
Skills: Incident Response, Malware Analysis, Digital Forensics, Reverse Engineering, L3, Crowdstrike Falcon, Role: Cyber Security Analyst ( Forensic and IR )Location: Navi MumbaiExp: 4 To 10 Years Job Accountabilities Plan and Oversee daily activities of forensic analysts and incident responders Conduct forensic investigations, identify systems of interest and direct data acquisition, analysis and containment measures Conduct network forensics, intrusion analysis, malware analysis and reverse engineering, threat intelligence fusion (wherever possible/ required) to identify the root cause / patient zero Build knowledge and skills within the team on latest forensic tools, endpoint threat detection tools, technologies and techniques on an ongoing basis Work with red team/ penetration testing teams to strengthen detection and response measures for advanced attacks and contribute to the knowledgebase of the Cyber Defence Center Able to conduct manual investigation of Cyber Incident by correlating logs, events from multiple devices, servers, etc. Able to develop standard operating procedures, playbooks for Cyber Incident Response. Contribute to enhanced detection capabilities of the CDC using threat intelligence and drive innovation and efficiency of the Cyber Defence Center by leading automation initiatives Be responsible for accuracy, timeliness of the forensics investigation incidents and examinations and provide relevant reports, dashboards, metrics for periodic reviews and management presentations Co-ordinate with stakeholders, build and maintain positive working relationships with them Skills Required (Knowledge and Skills) Technical Competencies Deep knowledge of OS internals (Windows, Linux), Active Directory and typical vulnerabilities and misconfigurations and associated exploitation techniques and scripting In-depth practical knowledge and experience in application of TTPs, MITRE Framework in securing an enterprise environment Working knowledge of at-least 1 EDR and SIEM tools (commercial or open source) Expertise in server and mobile forensic tools such as Autopsy, FTK, Encase, Oxygen, Cellebrite, Wireshark, RAM analysis, Registry analysis tools etc Significant experience in investigating complex, multi-location security breaches and creation of detailed forensic investigation reports and presentations for variety of stakeholders Experience of rapid rule development in response to newly released attacks, IOCs will be a plus Research bent of mind and passion for keeping up-to-date with the latest threat landscape and adversarial techniques Non-technical Competencies Logical thinker with attention to detail Strong collaborative skills and proven ability to work in a diverse team of security and IT professionals Process oriented Meticulous and methodical approach to documentation Good interpersonal skills to interact and gather relevant information from a variety of stakeholders such as IT, Network and Security teams Excellent verbal and written English Ability to work with calm and patience in high pressure situations in a dynamic environment Key Attributes (Experience And Qualifications) BE/B.Tech/ME/M.Tech/MCA/MS from a reputed/recognized institute 5-8 years of relevant experience in Forensics, Incident Analysis and Investigation Excellent verbal and written communication skills and customer management skills Certification as a CHFI, GCIH or GCFA would be an advantage (desired)
Jio
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
My Connections Jio
Navi Mumbai, Maharashtra, India
Salary: Not disclosed
Navi Mumbai, Maharashtra, India
Salary: Not disclosed