Sr Security Analyst
Bengaluru
Applications have closed
Everbridge
Keep people safe and organizations running with Everbridge. Empower Resilience. Anticipate, mitigate, respond to, and recover from critical events.About the Team:As a valued member of our Cyber Intelligence Center /Security Operations team, you will advocate a pragmatic approach to proposing and implementing security solutions. You will actively contribute to the continual analysis of our security logs and posture to uphold our organization's security and situational awareness regarding potential threats.
What you'll do
- Responsibilities and Technical Requirements: Security Monitoring and Analysis:
- Monitor security alerts and events from various sources, including SIEM (Security Information and Event Management) tools.
- Conduct in-depth analysis of security incidents to determine the scope, impact, and severity. Incident Triage and Investigation:
- Ability to identify abuse/ Fraud patterns on Cloud Platform
- Perform initial triage of security incidents, prioritizing and escalating as necessary.
- Conduct detailed investigations to identify the root cause of security incidents and recommend remediation actions. Threat Detection and Analysis:
- Utilize threat intelligence and analyse patterns to detect emerging cybersecurity threats.
- Collaborate with other SOC analysts and teams to improve detection capabilities.
- Investigate signs of compromise, utilizing your problem-solving skills and knowledge of cyber-attacks and data analysis (phishing, Ransomware, account compromise, DDOS)
- Zero-day attack analysis and control, Analyse end user system for attack related incidents and share RCA Incident Response:
- Assist in coordinating and executing incident response procedures.
- Strong understanding of cybersecurity concepts, attack vectors, and defence mechanisms.
- Analytical mindset and the ability to think critically under pressure. Documentation and Reporting:
- Document incident details, investigation, analysis findings, and response actions.
- Generate and communicate incident reports to relevant stakeholders.
- Preparing disaster recovery plans / tabletop exercise / PEN Test / weekly monthly metric reports Tool Management:
- Operate and manage security tools, including sumo logic, defender, Qualys, Sophos, O365, Phislabs, Litmos, Service desk, Jira, confluence, datadog
- Recommend improvements to enhance the effectiveness of security tools.
- Developing, configuring, and deploying monitoring tools and scripts for applications and systems
- Exposure on Terraform, Git, workflow Business Support:
- Participate in business and technology initiatives, contributing as an information security professional to define security-related processes and procedures.
- Engage in internal and third-party audits of the company’s information security policies, procedures, and operational duties, supporting remediation efforts as necessary.
- Collaborating with product development, information technology (IT) and architecture teams to evaluate and implement new services based on requirements.
What you'll bring:
- Projects:
- Coordinate and execute security projects aligned with the global security strategy, evaluating the security posture of the company and related data assets.
- Stay informed on the latest information security technologies, methodologies, and events, providing feedback on the security aspects or impact of non-security-related technology.
- Liaise with external vendors and service providers to ensure the efficacy of security solutions and services.
- Certification:
- CompTIA Security+, Certified Ethical Hacker (C|EH), CSA or equivalent are highly desirable.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Audits C Cloud CompTIA Confluence DDoS Incident response Jira Monitoring Qualys Security strategy SIEM SOC Strategy Terraform Threat detection Threat intelligence
Perks/benefits: Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Product Security Engineer jobs
- Open Senior Cybersecurity Engineer jobs
- Open Senior Cyber Security Engineer jobs
- Open Information Security Officer jobs
- Open Information Security Specialist jobs
- Open Principal Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Cloud Security Architect jobs
- Open Chief Information Security Officer jobs
- Open IT Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Senior Network Security Engineer jobs
- Open Senior Product Security Engineer jobs
- Open Security Specialist jobs
- Open Cyber Security Architect jobs
- Open Security Operations Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Information System Security Officer jobs
- Open Security Consultant jobs
- Open Information Systems Security Officer jobs
- Open Senior Information Security Analyst jobs
- Open Information Security Architect jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Security Architect jobs
- Open CISA-related jobs
- Open Agile-related jobs
- Open Risk assessment-related jobs
- Open Analytics-related jobs
- Open SOC-related jobs
- Open Network security-related jobs
- Open GCP-related jobs
- Open ISO 27001-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open DoD-related jobs
- Open DevOps-related jobs
- Open Pentesting-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Vulnerability management-related jobs
- Open Security Clearance-related jobs
- Open Kubernetes-related jobs
- Open CEH-related jobs
- Open SaaS-related jobs
- Open Malware-related jobs
- Open Security assessment-related jobs
- Open SQL-related jobs
- Open PowerShell-related jobs