Lead Security Specialist (Incident Response)

16 Minutes ago • 7-10 Years • Cyber Security

Job Summary

Job Description

The Lead Security Specialist will be responsible for incident response, threat hunting, and security operations within the SOC. This role involves developing processes and playbooks for threat hunting, proactively identifying suspicious activities, and documenting remediation. The specialist will also be crucial in validating and analyzing investigations, performing Level 3 triage, and communicating actionable threat intelligence. A strong understanding of adversary techniques and administrative tools is essential for this position.
Must have:
  • 7 to 10 years of total experience.
  • 5+ years experience in Incident Response, Security Operations (SOC), or Threat Intelligence.
  • Strong knowledge of EDR, SIEM (Splunk, Microsoft Sentinel), SOAR, IDS/IPS, and forensic tools.
  • Hands-on experience with malware analysis, digital forensics, and reverse engineering.
  • Familiarity with MITRE ATT&CK, NIST CSF, CIS Controls, and ISO 27001 frameworks.
  • Proficiency in log analysis, network security monitoring, and packet analysis (Wireshark, Zeek).
  • Strong scripting skills in Python, PowerShell, or Bash.
  • Excellent communication skills to interact with stakeholders, executives, and technical teams.
  • Ability to create process and Playbooks for Threat Hunting.
  • Proactively look for suspicious anomalous activity.
  • Strong understanding of administrative tools and how adversaries may leverage them.
  • Familiarity with adversary techniques and attack lifecycles (MITRE ATT&CK® matrix).
  • Document remediation required based on input during incident handling or vulnerability identification.
  • Communicate actionable threat intelligence to both technical and non-Technical Teams.
  • Responsible for the validation and analysis of investigations within Security Operations Center (SOC) Analysts.
  • Responsible for completing the documentation of the investigation.
  • Carry out Level 3 triage of incoming issues.
  • Provide communication and escalation throughout the incident per SOC guidelines.
  • Identify and manage a wide range of intelligence sources.
  • Lead the development of actionable use cases to detect, triage, investigate and remediate.
  • Ensure that all security events and incidents are logged into ServiceNow and regularly updated and closed within the set SLAs.
Good to have:
  • Security certifications such as GCFA, GCIH, CISM, CISSP, or CEH are preferred.

Job Details

Scope:

  • The successful applicant will have a demonstrable passion for security and willingness to progress within the role and support the Senior SOC Analysts with rule tuning, use case development, purple teaming, Investigation, threat hunting, DFIR, and cyber threat intelligence

What you will do:

  • Create process and Palybooks for Threat Hunting.
  • Proactively look for suspicious anomalous activity based on data alerts or data outputs from various toolsets.
  • strong understanding of administrative tools and how adversaries may leverage them to live-off-the-land.
  • familiar with adversary techniques and attack lifecycles. MITRE ATT&CK® matrix)
  • Document remediation required based on input during incident handling or vulnerability identification.
  • communicating actionable threat intelligence to both technical and non-Technical Teams
  • Responsible for the validation and analysis of investigations within Security Operations Center (SOC) Analysts
  • Responsible for completing the documentation of the investigation; determine the validity and priority of the activity and escalate to senior SOC analyst team
  • Carry out Level 3 triage of incoming issues (initial assessing the priority of the event, initial determination of incident to determine risk and damage or appropriate routing of security or privacy data request)
  • Provide communication and escalation throughout the incident per the SOC guidelines.
  • Identify and manage a wide range of intelligence sources to provide a holistic view of the threat landscape and filter out noise to focus and execute upon actionable intelligence.
  • Leading the development of actionable use cases to detect, triage, investigate and remediate based on latest threat actor trends, support teams with the technical implementation of parsing log sources creating, validating, and testing alerting queries to reduce false positives
  • Ensure that all security events and incidents (internal / external) are logged into ServiceNow and regularly updated and closed within the set SLAs

What we are looking for:

  • 7 to 10 years of total experience with 5+ yrs of experience in Incident Response, Security Operations (SOC), or Threat Intelligence.
  • Strong knowledge of EDR, SIEM (Splunk, Microsoft Sentinel, or similar), SOAR, IDS/IPS, and forensic tools.
  • Hands-on experience with malware analysis, digital forensics, and reverse engineering.
  • Familiarity with frameworks like MITRE ATT&CK, NIST CSF, CIS Controls, and ISO 27001.
  • Proficiency in log analysis, network security monitoring, and packet analysis (Wireshark, Zeek, etc.).
  • Strong scripting skills in Python, PowerShell, or Bash for automation and threat hunting.
  • Excellent communication skills to interact with stakeholders, executives, and technical teams.
  • Security certifications such as GCFA, GCIH, CISM, CISSP, or CEH are preferred

Similar Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Similar Skill Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Jobs in Hyderabad, Telangana, India

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Cyber Security Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

About The Company

We are a proven, passionate bunch of disruptors. Our work is all about tapping into your potential so we can deliver the best solutions and customer experiences on the planet. Collaboration, respect, and a great work-life balance earned us the title of "Best Place to Work- Employees' Choice" by Glassdoor. Our people are smart, creative, rock stars with over 400 patents and 10,000 people years of domain expertise. Blue Yonder is the world leader in digital supply chain and omni-channel commerce fulfillment. Our intelligent, end-to-end platform enables retailers, manufacturers and logistics providers to seamlessly predict, pivot and fulfill customer demand. With Blue Yonder, you can make more automated, profitable business decisions that deliver greater growth and re-imagined customer experiences. Blue Yonder - Fulfill your Potential.™

Dallas, Texas, United States (Hybrid)

Hyderabad, Telangana, India (On-Site)

Hyderabad, Telangana, India (On-Site)

Bengaluru, Karnataka, India (On-Site)

Bengaluru, Karnataka, India (On-Site)

Hyderabad, Telangana, India (On-Site)

View All Jobs

Get notified when new jobs are added by Blue Yonder

Level Up Your Career in Game Development!

Transform Your Passion into Profession with Our Comprehensive Courses for Aspiring Game Developers.

Job Common Plug
Contact Us
hello@outscal.com
Made in INDIA 💛💙