Sr. Analyst I | On-site, Bangalore

1 Month ago • 6 Years +

Job Description

The Sr Threat Analyst will provide deep-level analysis for client investigations, utilizing customer-provided data sources, audit, and monitoring tools. This role involves documenting security incidents, understanding threats, and analyzing various security enforcement technologies like SIEM and anti-virus. The analyst will also perform knowledge transfers, provide recommendations, research current threats, and conduct investigations. Collaboration with Technology Engineers, Architects, and Threat Analysts is key to servicing customers and enhancing their security posture. The position requires a minimum of six years of experience in Information Security, preferably within a SOC or MSS environment, and demands availability during US working hours.
Good To Have:
  • Experience with SIEM platforms (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk)
Must Have:
  • Provide deep-level analysis for client investigations.
  • Utilize customer-provided data sources, audit, and monitoring tools.
  • Work closely with Technology Engineers, Architects, and Threat Analysts.
  • Document and report on potential security incidents.
  • Maintain understanding of security threats, vulnerabilities, and exploits.
  • Perform knowledge transfers and train clients on threat mitigation.
  • Provide ongoing recommendations on tuning and best practices.
  • Research current threats and attack vectors.
  • Perform investigations on escalations.
  • Discuss security posture with clients and make recommendations.
  • Provide gap analysis for clients.
  • Maintain and develop SOPs, Playbooks, and runbooks.
  • Work with internal teams to increase efficiency.
  • Train new analysts on security and tools.
  • Create and maintain a Content Catalog.
  • Perform QA review of security alerts.
  • Six or more years of professional experience in Information Security.
  • Experience in a SOC, MSS, or enterprise network environment.
  • Excellent time management, reporting, and communication skills.
  • Data analysis using SIEM, Database tools, and Excel.
  • Troubleshooting security devices and SIEM.
  • Create and maintain content within SIEM environments.
  • IDS monitoring/analysis with Sourcefire and Snort.
  • Experience with various attack types (Web Based, OWASP Top 10, DoS, Brute force).
  • Familiarity with SANS' top 20 critical security controls.
  • Understand enterprise Windows security (Active Directory, privilege escalation).
  • Experience with Anti-virus (AV) and Host Based Intrusion Prevention (HIPS).
  • Monitor commercial AV solutions.
  • Identify common false positives and suggest tuning.
  • Understand root causes of malware and proactive mitigation.
  • Familiarity with web-based exploit kits and targeted malware.
  • Experience with malware protection tools (FireEye).
  • Understand covert channels, egress, and data exfiltration.
  • Familiarity with vulnerability scoring systems (CVSS).
  • Basic understanding of vulnerability assessment tools.
  • Availability for US working hours (5 PM IST to 3 AM IST).
  • Work from Office role.
Perks:
  • Commitment to Diversity, Equality, and Inclusion through Employee Resource Groups
  • Work/life balance
  • Professional training resources
  • Creative problem-solving and ability to tackle unique, complex projects
  • Volunteer Opportunities ("Optiv Chips In")
  • Ability and technology for productive remote/from home work (where applicable)

Add these skills to join the top 1% applicants for this job

timeline-management
excel
problem-solving
communication
data-analytics
game-texts
quality-control
snort
cross-site-scripting
sql

How you'll make an impact:

  • High-level professional writing experience regarding documenting and reporting on potential security incidents identified in customer environments including timeline of events
  • Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets.
  • Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc.
  • Perform knowledge transfers, document, and train clients regarding the mitigation of identified threats.
  • Provide ongoing recommendations to peers and customers on tuning and best practices.
  • Actively research current threats and attack vectors being exploited in the wild
  • Actively work with analysts and perform investigations on escalations.
  • Ability to discuss security posture with multiple clients and make recommendations to better their holistic security approach.
  • Provide gap analysis for clients to better their security posture.
  • Maintain and develop SOPs for the threat analyst team.
  • Develop and maintain Playbooks and runbooks.
  • Work with internal teams to increase the efficiency and effectiveness of security analysis provided by the threat analysis team.
  • Training of new analysts on security and tools
  • Create and maintain a Content Catalog based on security essentials and the evolving threat landscape.
  • Provide quality assurance (QA) review of security alerts handled by Team members.

What we’re looking for

  • Six or more years of full-time professional experience in the Information Security field
  • Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment as a point of escalation.
  • Excellent time management, reporting, and communication skills including customer interactions and executive presentations.
  • Data analysis using SIEM, Database tools, and Excel.
  • Experience troubleshooting security devices and SIEM.
  • Ability to create and maintain content within SIEM environments and make recommendations to clients to better their visibility.
  • IDS monitoring/analysis with tools such as Sourcefire and Snort
  • Direct (E.g., SQL Injection) versus indirect (E.g., cross-site scripting) attacks
  • Experience with the following attacks: Web Based Attacks and the OWASP Top 10, Network-Based DoS, Brute force, HTTP Based DoS, Denial of Service, and Network-Based / System Based Attacks.
  • Familiarity with SANS' top 20 critical security controls
  • Understand the foundations of enterprise Windows security including Active Directory, Windows security architecture and terminology, Privilege escalation techniques, Common mitigation controls and system hardening.
  • Anti-virus (AV) and Host Based Intrusion Prevention (HIPS)
  • Experience in monitoring at least one commercial AV solution such as (but not limited to) McAfee/Intel, Symantec, Sophos, or Trend Micro
  • Ability to identify common false positives and make suggestions on tuning.
  • Understanding of root causes of malware and proactive mitigation
  • Propagation of malware in enterprise environments
  • Familiarity with web-based exploit kits and the methods employed by web-based exploit kits.
  • Familiarity with concepts associated with Advanced Persistent Threats and “targeted malware.”
  • Experience and understanding of malware protection tools (FireEye) and controls in an enterprise environment.
  • Covert channels, egress, and data exfiltration techniques
  • Familiarity with vulnerability scoring systems such as CVSS.
  • Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks
  • The role demands the availability for US working hours (5 PM (IST) to 3 AM (IST))
  • This role is Work from Office role

What you can expect from Optiv

  • A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups.
  • Work/life balance
  • Professional training resources
  • Creative problem-solving and the ability to tackle unique, complex projects
  • Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities.
  • The ability and technology necessary to productively work remotely/from home (where applicable)

Set alerts for new jobs by Optiv
Set alerts for new jobs in India
Contact Us
hello@outscal.com
Made in INDIA 💛💙