SOC - Threat Hunter

AHMEDABAD, GUJARAT, India

Apply now Apply later

Responsible for analyzing and correlating large data sets to uncover novel threats and attack techniques that may be present within the organization’s Environment
• He / She will be part of cyber defense center team to identify opportunities to develop analytical methods to detect advanced threat actors who utilize emerging tactics and techniques.
• In support of these processes, the role will also include developing and documenting new and innovative threat hunt hypotheses to increase the team’s ability to find existing threats that are otherwise going unidentified or unnoticed.
• The role will be working part of Security Operation Center operational and technical teams to gain insight into critical security controls and architectural specifics to develop valuable hunt strategies and analytics that identify malicious behavior accurately while maintaining a low false positive rate.
• This role advises on and reviews product assessments, policy adjustments, and architectural transformations that impact the Cyber Security at Group level, and will be a thought leader in the design of cutting-edge detective, preventative, and proactive controls
• Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis, and incident response
• Lead Threat Hunting activities and mentor junior staff
• Work with key stakeholders to implement remediation plans in response to incidents
• Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership
• Author Standard Operating Procedures (SOPs) and training documentation when needed
• Generates end-of-shift reports for documentation and knowledge transfer to subsequent analysts on duty
• Should be comfortable to be part of 24*7 SOC services, including night shift.

Educational qualifications:
• Bachelor’s degree relevant to Information Technology, Computer Science/Engineering (or equivalent).
Advanced certification desirable GCIH, GCIA, GCFE, GREM, GCFA, GSEC 

Experience:

• Minimum 3+ years in a Threat Hunting role and overall 7 to 12 years in Cyber Security
• Experience in a technical role in the areas of Security Operation, Incident Response, Detection Engineering, Offensive Security/Red Team, or Cyber Threat Intelligence.
• Strong experience in SIEM (Security Incident and Event Monitoring) processes and Products (e.g., Microsoft Sentinel, EDR)
• Experience analysing system, network, and application logging for attack techniques at all stages of the cyber kill chain/MITRE framework.
• Experience consuming and analysing Cyber Threat Intelligence for actionable takeaways
• Ability to navigate and work effectively across a complex, geographically dispersed organization.
• Deep packet and log analysis
• Windows forensic and Malware Analysis
• Cyber Threat and Intelligence gathering and analysis
• Bachelor’s degree or equivalent experience
• Knowledge and experience with scripting and programming (Python, PERL, etc.) are also highly preferred
• Process improvement, project management, ISO, six sigma certifications are preferred

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  2  0  0
Category: Threat Intel Jobs

Tags: Analytics APT Computer Science Cyber defense Cyber Kill Chain EDR GCFA GCFE GCIA GCIH GREM GSEC Incident response Log analysis Malware Monitoring Offensive security Perl Python Red team Scripting Sentinel SIEM SOC Threat intelligence Windows

Region: Asia/Pacific
Country: India

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.