Senior Technical Analyst - Cyber Threat Intelligence Analyst

Bengaluru Bengaluru (Bengaluru, IN, 560025

Computacenter

View company page

Life on the team

It’s an exciting time to join the Threat Intelligence Team as it’s still in its infancy – so bring your experience and help us shape the team. Once we’re at full capacity, our work will touch every part of the business. So, you’ll get to know the ins and outs of Computacenter in no time.

 

You’ll work as part of a team of five specialists and analysts. We’ve got big plans – there are so many things we already want to do – and if you’ve got specific areas, you’re passionate about, we’ll encourage and support you to follow that.

 

What you’ll do

  • Identify and contextualise threats to Computacenter.
  • Lead briefings, informing colleagues and relevant teams to help them understand what the threat is.
  • Create threat reports, intelligence reports, briefings, and presentations.
  • Allocate tasks relevant to identify threats that need further investigating.
  • Lead your proactive projects to identify operational, reputational, and financial threats.
  • Liaise with government partners and industry experts.

 

What you’ll need

  • Experienced in Information and Cyber Security, including a SOC with 4 to 9 years.
  • Experienced in common open and closed source intelligence tools and technologies.
  • Experienced in adversary tactics and techniques frameworks such as Mitre ATT&CK and Killchain.
  • Experienced in common SOC SIEM technology applications such as MS Sentinel.
  • Experienced in KQL, with ability to formulate advanced queries.
  • Experienced in investigating security breaches and security incident management.

Provide support for core CTH service lines as detailed below.

  • DF – artefact/ evidence collation o DF – analysis of evidence
  • DF – forensic investigation of seized assets
  • DF – report writing.
  • CTH – create hypothesis, generate structured plan and conduct threat hunts for given threats.
  • CTH – create and maintain standard library of repeatable hunting queries to search for common attack techniques.
  • CTH – generate reports on discovered threats o
  • MA – Liaise with internal and external stakeholders to obtain malware samples, transferring them to the analysis environment in a secure, controlled manner.
  • MA – Build suitable virtual environment for testing malware against
  • MA – detonate and analyse malware using both static and dynamic techniques.
  • MA – Define and disseminate findings to stakeholders.

 

About us

With over 20,000 employees across the globe, we work at the heart of digitisation, advising organisations on IT strategy, implementing the most appropriate technology, and helping our customers to source, transform and manage their technology infrastructure in over 70 countries. We deliver digital technology to some of the world’s greatest organisations, driving digital transformation, and enabling people and their businesses.

 

Learning and development

Our people are our strength which is why we offer leadership training, coaching, mentoring, professional development, and international opportunities. Whichever direction you choose to go in – whether it’s a well-trodden path or a completely new part of the business – we’ll support you. Our managers champion their people, powering their personal development and helping them to reach their full potential. 

 

You belong

We passionately believe in the power of diversity and inclusion. We celebrate our differences because we know a diverse workforce with different experiences and perspectives helps us win together. And to do that, you need to feel comfortable to bring your whole self to work – and you can only do that when you feel supported, valued, and have a sense of belonging which is what we strive to achieve.

 

Your application is considered on its merits regardless of your age, disability, ethnicity, faith, gender identity or sexual orientation. All that matters to us is that you share our vision and our values, and that you bring the experience and skills we need.

 

We are proud to be a Disability Confident Employer, we welcome applications from people with a disability – and guarantee to interview applicants who have a disability and meet the essential requirements for the job.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Malware MITRE ATT&CK SIEM SOC Strategy Threat intelligence

Perks/benefits: Career development

Region: Asia/Pacific
Country: India
Job stats:  1  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.