Lead Incident response Engineer

Chennai

Applications have closed

TransUnion's Job Applicant Privacy Notice

What We'll Bring:

Job Description Summary
This role is a member of the larger Threat Detection Services team, which includes security analysts and incident handlers who work alongside teams responsible for red teaming, intelligence analysis, and technical threat researchers. The individual filling this role will join our Special Projects team and act as a senior leader within the organization helping to drive detection and response maturity, enable proactive monitoring strategies and participate in a wide range of larger incident response program activities.
We are a geographically diverse team, with offices and personnel around the globe, making this a remote work position for the right candidate. To support these requirements in addition to the technical skills listed below ideal candidates will also have prior remote work experience and possess necessary soft skills to support their success.

What You'll Bring:

• Analysis, ownership of investigations through remediation.
• Monitoring of infrastructure-related security events across organization within a 24x7 support teams.
• Work events escalated by Security Operations Center or high severity user reported events.
• Provide prolonged, in-depth analysis of potential intrusions or security events, leveraging various data artifacts to determine the context of an event.
• Hands on security alerts creation and maintenance, workload automation.
• Maintain accurate and complete records of incidents and investigations.
• Execute incident response processes to respond to security threats and attacks.
• Create detection and mitigation rules based on indicators of compromise that align with industry threats.
• Assist in the design, evaluation, and implementation of new security technologies.
• Update incident response playbooks to minimize gaps in response processes.
• Extract and analyze malware to determine their nature.
• This may include either static code analysis or runtime/execution analysis or both.

Impact You'll Make:

• 5-7 years of Network/Security/Incident Response experience.
• Advanced Operating System and Network knowledge.
• Experience identifying, investigating, and responding to complex attacks
• Experience with investigative technologies such as SIEM, packet capture analysis, host forensics and memory analysis tools
• Knowledge of at least one scripting language.
• Any Security related certification(s)
• Ability to work independently as well as collaboratively within a team.
• Ability to quickly grasp high-level technical concepts.
• Good communication and interpersonal skills.
• SANS SEC503: Intrusion Detection In-Depth (nice to have)
• SANS SEC504: Hacker Techniques, Exploits & Incident Handling (nice to have)

TransUnion Job Title

Lead Engineer, InfoSec Engineering

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Automation Code analysis Exploits Forensics Incident response Intrusion detection Malware Monitoring Network security Privacy Red team SANS Scripting SIEM SOC Threat detection

Perks/benefits: Team events

Region: Asia/Pacific
Country: India

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.