Threat Detection Services - SOC Sr Consultant

Pune

Applications have closed

TransUnion's Job Applicant Privacy Notice

What We'll Bring:

This role is a senior GCC member of the TransUnion Global Threat Detection Service Operations team, which includes TDS/SOC analysts, incident handlers as well as folks responsible for red teaming, intelligence analysis, and technical threat researchers. This role will focus on proactive monitoring and alert enhancements for TDS, DLP and other Cyber Threat initiatives when not leading Cyber Threat Detection response efforts to complex attacks against TransUnion.

What You'll Bring:

Job Requirements:

  • Overall 5+ years of experience in SOC monitoring (identifying, investigating and responding to complex attacks)
  • Strong host forensics analysis skills (EDR, Static & Dynamic analysis)
  • Experience with investigative technologies such as SIEM, packet capture analysis and Memory analysis tools
  • Strong understanding of threat landscape in terms of the tools, tactics, and techniques of Threats employing both commodity and custom Malware
  • Understanding of networking and security fundamentals of Windows, Unix/Linux, and Macintosh
  • Strong understanding of Cloud-based technologies (CASB, O365, AWS, Azure)
  • Intermediate to Advanced level understanding/use of Splunk

Impact You'll Make:

  • Intermediate to Advanced level understanding of programming concepts and the ability to apply them in a language like PowerShell or Python. is a plus
  • 3 to 5 years of Incident Response experience is a Plus
  • Reverse engineering skills a plus

TransUnion Job Title

Sr Consultant, Cybersecurity

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: AWS Azure CASB Cloud EDR Forensics Incident response Linux Malware Monitoring PowerShell Privacy Python Red team Reverse engineering SIEM SOC Splunk Threat detection UNIX Windows

Region: Asia/Pacific
Country: India
Job stats:  7  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.