- 4-7yrs
- Deep understanding of computer intrusion activities, incident response techniques, tools, and procedures
- Knowledge of Windows, Active Directory, DNS & Linux operating systems,
- Good Experience in SIEM monitoring (QRadar, Sentinel)
- Knowledge of SOAR technologies, working with playbooks (Cortex, Phantom, Demisto)
- Working experience and knowledge of ITSM tools for incident management.
- Must be action oriented and have a proactive approach to solving issues.
- Knowledge of security logs, log quality review.
- Develop and document enhanced event analysis and incident response processes and procedures
The role requires efficient incident response and digital forensics skills to minimise the impact of cyber risks. The individual will oversee Security monitoring, Security tools Operations, Security incidents, ensure incidents are managed effectively and reported to stakeholders. This role primarily consists of first responder activities and to conducting thorough response activities on behalf of a wide variety of clients across every sector.
Candidate required to work in complex security environments and alongside SOC team to design, communicate and execute incident response, containment, and remediation plans. Support incident response team analysts and incident management teams. Analyse tools, processes, and procedures for responding to cyber intrusions and come up with new methods for detecting cyber adversaries.
Demonstrates proven expertise and success in incident handling, triage of events, network analysis and threat detection, trend analysis. Should have the following skills:
-
- Deep understanding of computer intrusion activities, incident response techniques, tools, and procedures. L2, L3 Support.
- Knowledge of Windows, Active Directory, DNS & Linux operating systems,
- Good Experience in SIEM monitoring (QRadar, Sentinel, Splunk, chronicle)
- Knowledge of SOAR technologies, working with playbooks (Cortex, chronicle, Splunk SOAR)
- Experience handling malware incidents (Flare VM, Remnux) and detections from EDR (MS Defender, Crowdstrike, SenitnelOne etc.)
- Reverse Engineering like- IDA Pro, GHIDRA.
- Working experience and knowledge of ITSM tools for incident management.
- Must be action oriented and have a proactive approach to solving issues.
- Knowledge of security logs, log quality review.
- Knowledge on IT (Operating systems, networking, databases) and IT security knowledge (system and network security) including IT security tools.
- Good knowledge of office collaboration tools
Work you ll do
- Detect, Analyze, Investigate, and report qualified security incidents to the Client as per the defined SLA
- Provide recommendations to the security incidents reported as per SLA
- Investigates incidents using various security event sources (FW, IDS, PROXY, AD, EDR, DLP etc.).
- Investigations into non-standard incidents and execution of standard scenarios.
- Provide dashboard and data related to Incidents/Offenses for governance reports.
- Escalates to L3 if investigations uncover unusual or atypical situations.
- Monitoring unhealthy log source/data source and escalate to engineering team to fix them.
- Participate in incident response (IR) efforts; detect, identify, respond, contain and remediate all information security incidents.
- Rapidly and accurately determine the source of a security incident and moving quickly to identify and apply containment, mitigation, and remediation steps.
- Contribute to the execution of Cyber Security operations, incident response, and investigations spanning across all functions of the Corporate Security organization.
- Track, monitor incident actions while applying intelligence, situational awareness to prioritise incident actions based on risk
- Responsible for Incident and Breach communications, assessments, and reports and customer facing, to include leadership and executive management for the purpose of enabling Senior Management to make decisions in a crisis
- Develop and document processes to ensure consistent and scalable response operations.
- Deliver tabletop IR assessments and real-life IR simulations at a technical and executive level.
- Conduct in-depth root cause analysis on complex malware and user/system behaviour event
- Gather and analyse forensic evidence for cyber security incidents and investigations.
- Develop and document enhanced event analysis and incident response processes and procedures.
Education & Experience:
B.Tech/BE / B.Sc / BCA or Master s degree in Computer Science, Engineering.
Your role as AM
We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society.
In addition to living our purpose, Manager across our organization must strive to be:
- Inspiring - Leading with integrity to build inclusion and motivation
- Committed to creating purpose - Creating a sense of vision and purpose
- Agile - Achieving high-quality results through collaboration and Team unity
- Skilled at building diverse capability - Developing diverse capabilities for the future
- Persuasive / Influencing - Persuading and influencing stakeholders
- Collaborating - Partnering to build new solutions
- Delivering value - Showing commercial acumen
- Committed to expanding business - Leveraging new business opportunities
- Analytical Acumen - Leveraging data to recommend impactful approach and solutions through the power of analysis and visualization
- Effective communication Must be well abled to have well-structured and well-articulated conversations to achieve win-win possibilities
- Engagement Management / Delivery Excellence - Effectively managing engagement(s) to ensure timely and proactive execution as well as course correction for the success of engagement(s)
- Managing change - Responding to changing environment with resilience
- Managing Quality & Risk - Delivering high quality results and mitigating risks with utmost integrity and precision
- Strategic Thinking & Problem Solving - Applying strategic mindset to solve business issues and complex problems
- Tech Savvy - Leveraging ethical technology practices to deliver high impact for clients and for Deloitte
- Empathetic leadership and inclusivity - creating a safe and thriving environment where everyones valued for who they are, use empathy to understand others to adapt our behaviours and attitudes to become more inclusive.