Posted:2 months ago| Platform:
Work from Office
Full Time
Job Description Department : Research Development Key Responsibilities: Threat Intelligence and Incident Response: Develop and maintain threat intelligence feeds, playbooks, and integrations with detection platforms (e.g., Wazuh, Elastic, Splunk). Lead incident response efforts to mitigate cyber threats and minimize business impact. Analyze threat actor behaviors and TTPs to proactively design mitigation strategies. Vulnerability Management: Implement and manage comprehensive vulnerability management programs to ensure timely identification, assessment, and remediation. Collaborate with technical teams to prioritize vulnerabilities and track remediation progress. Research and advise on the latest vulnerability trends and their potential impacts. Automation and Orchestration: Design and deploy automation solutions for threat intelligence integration and response workflows. Build scripts and tools (e.g., using Python or PowerShell) to streamline repetitive security tasks and enhance operational efficiency. Leverage orchestration tools to improve the speed and accuracy of incident handling. Data-Driven Decision-Making: Conduct data analysis to identify patterns, improve threat detection mechanisms, and generate actionable insights. Provide strategic recommendations to stakeholders based on trends and findings from intelligence data. Develop detailed reports and metrics to measure the effectiveness of security operations. Qualifications: Master s or Bachelor s degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Experience: 3 to 5 years of experience in threat intelligence, incident response, and vulnerability management. Hands-on experience in integrating intelligence into SIEM platforms like OpenSearch, Wazuh, Elastic, or Splunk. Technical Skills: Proficient in threat intelligence frameworks such as MITRE ATTCK and the Diamond Model. Expertise in automation using scripting languages like Python or PowerShell. Familiarity with vulnerability scanning tools and methodologies. Experience with orchestration tools and platforms for incident management. Knowledge of malware analysis and threat actor profiling. Preferred Certifications: Certified Threat Intelligence Analyst (CTIA), GIAC Cyber Threat Intelligence (GCTI), CEH, or other relevant certifications.
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Mumbai, Bengaluru, Gurgaon
INR 32.5 - 37.5 Lacs P.A.
Chennai, Pune, Mumbai, Bengaluru, Gurgaon
INR 35.0 - 42.5 Lacs P.A.
Chennai, Pune, Delhi, Mumbai, Bengaluru, Hyderabad, Kolkata
INR 8.0 - 12.0 Lacs P.A.
Pune, Bengaluru, Mumbai (All Areas)
INR 0.5 - 0.7 Lacs P.A.
INR 2.5 - 5.5 Lacs P.A.
INR 3.0 - 4.5 Lacs P.A.
Bengaluru
INR 3.0 - 3.0 Lacs P.A.
Bengaluru
INR 3.5 - 3.75 Lacs P.A.
INR 2.5 - 3.0 Lacs P.A.
INR 4.0 - 4.0 Lacs P.A.