Analyst I On-site, Bangalore

14 Minutes ago • 2-4 Years

Job Summary

Job Description

The Analyst will provide intrusion/incident monitoring and detection utilizing customer provided data sources, audit and monitoring tools at both the government and enterprise level. This role requires flexibility and quick adaptation to change, working closely with Technology Analysts and Architects to service customers. Key responsibilities include analyzing, documenting, and reporting on security incidents, maintaining an understanding of security threats, and acting as a coordinator for urgent security events.
Must have:
  • Analyze, document and report on potential security incidents identified in customer environments
  • Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits
  • Act as a coordinator for security events that require urgent response, containment and remediation
  • Provide analysis on various security enforcement technologies including SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc.
  • Perform knowledge transfers, document and train clients regarding mitigation of identified threats
  • Provide ongoing recommendations to other MSS peers and customers on tuning and best practices
  • Actively research current threats and attack vectors being exploited in the wild
  • Actively work with associate analysts and perform investigations
  • Development of KB's and SOP's
  • 2-4 years full-time professional experience in the Information Security field
  • 2-4 years’ experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment
  • Ability to generate comprehensive written reports and recommendations
  • Understanding of contemporary security architectures/devices such as firewalls, routers, switches, load balancers, remote access technologies, anti-malware, SIEM, and AV
  • Ability to troubleshoot technical problems and ask probing questions to find the root cause or a problem
  • Queue management
  • IDS monitoring/analysis with tools such as Sourcefire and Snort
  • Attack vectors and exploitation, Mitigation, Active Directory
  • Familiarity with SANS top 20 critical security controls
  • Experience in monitoring at least one commercial AV solution
  • Ability to identify common false positives and make suggestions on tuning
  • Propagation of malware in enterprise environments
  • Familiarity with web-based exploit kits and the methods employed by web-based exploit kits
  • Familiarity with concepts associated with Advanced Persistent Threats and "targeted malware"
  • Understanding of malware mitigation controls in an enterprise environment
  • Network Based Attacks / System Based Attacks, Denial of Service Attacks, HTTP Based DoS Attacks, Network Based DoS Attacks, Brute force attacks
  • Covert channels, egress, and data exfiltration techniques
  • This role requires shift flexibility, including the ability to rotate between days, mids, and nights
  • This role is Work from Office role
Good to have:
  • 2-4 years’ experience working with Incident Ticketing Systems (i.e. ServiceNow, Remedy, Remedy Force, Heat, etc.)
  • Experience with SIEM platforms preferred (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk)
  • Experience with malware protection tools such as FireEye
Perks:
  • A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups
  • Work/life balance
  • Professional training resources
  • Creative problem-solving and the ability to tackle unique, complex projects
  • Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities.

Job Details

The Analyst will provide intrusion/incident monitoring and detection utilizing customer provided data sources, audit and monitoring tools at both the government and enterprise level. An Analyst is required to be flexible and adapt to change quickly. The Analyst will work closely with our Technology Analysts and Architects to service customers.

How you’ll make an impact

  • Analyze, document and report on potential security incidents identified in customer environments
  • Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets
  • Act as a coordinator for security events that require urgent response, containment and remediation
  • Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc.
  • Perform knowledge transfers, document and train clients regarding mitigation of identified threats
  • Provide ongoing recommendations to other MSS peers and customers on tuning and best practices
  • Actively research current threats and attack vectors being exploited in the wild
  • Actively work with associate analysts and perform investigations
  • Development of KB's and SOP's
  • Performs other duties as assigned
  • Complies with all policies and standards

What we’re looking for

  • 2-4 years full-time professional experience in the Information Security field required
  • 2-4 years’ experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment required
  • 2-4 years’ experience working with Incident Ticketing Systems (i.e. ServiceNow, Remedy, Remedy Force, Heat, etc.). preferred
  • Ability to generate comprehensive written reports and recommendations
  • Write professional emails, Coaching and training experience
  • Previous experience as a point of escalation in a technical environment
  • Customer interactions and creation of executive presentations
  • Understanding of contemporary security architectures/devices such as firewalls, routers, switches, load balancers, remote access technologies, anti-malware, SIEM, and AV
  • Ability to troubleshoot technical problems and ask probing questions to find the root cause or a problem
  • Queue management
  • IDS monitoring/analysis with tools such as Sourcefire and Snort
  • Experience with SIEM platforms preferred (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk) a plus
  • Attack vectors and exploitation, Mitigation, Active Directory
  • Direct (E.g. SQL Injection) versus indirect (E.g. cross-site scripting) attacks
  • Familiarity with SANS top 20 critical security controls
  • Experience in monitoring at least one commercial AV solution such as (but not limited to) McAfee/Intel, Symantec, Sophos or Trend Micro
  • Ability to identify common false positives and make suggestions on tuning
  • Propagation of malware in enterprise environments
  • Familiarity with web-based exploit kits and the methods employed by web-based exploit kits
  • Familiarity with concepts associated with Advanced Persistent Threats and "targeted malware"
  • Experience with malware protection tools such as FireEye a plus.
  • Understanding of malware mitigation controls in an enterprise environment.
  • Network Based Attacks / System Based Attacks, Denial of Service Attacks, HTTP Based DoS Attacks, Network Based DoS Attacks, Brute force attacks
  • Covert channels, egress, and data exfiltration techniques
  • This team provides 24/7 support. This role requires shift flexibility, including the ability to rotate between days, mids, and nights.
  • This role is Work from Office role

What you can expect from Optiv

  • A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups.
  • Work/life balance
  • Professional training resources
  • Creative problem-solving and the ability to tackle unique, complex projects
  • Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities.

Similar Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Similar Skill Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Jobs in Bengaluru, Karnataka, India

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Similar Category Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

About The Company

We work alongside clients to manage cyber risk and equip them with perspectives and programs to accelerate business progress. Our real-world experience, deep vertical expertise and diverse teams enable us to face any challenge with confidence. We put you at the center of our unmatched ecosystem of people, products, partners and programs to design and implement agile solutions. Our adaptive approach continually assesses risk in the context of cyber and broader objectives to secure today's business and fortify it for the future.

Bengaluru, Karnataka, India (On-Site)

Bengaluru, Karnataka, India (On-Site)

Bengaluru, Karnataka, India (On-Site)

Bengaluru, Karnataka, India (On-Site)

San Francisco, California, United States (On-Site)

Alexandria, Virginia, United States (On-Site)

Denver, Colorado, United States (On-Site)

Bengaluru, Karnataka, India (On-Site)

Bengaluru, Karnataka, India (On-Site)

Bengaluru, Karnataka, India (On-Site)

View All Jobs

Get notified when new jobs are added by Optiv

Level Up Your Career in Game Development!

Transform Your Passion into Profession with Our Comprehensive Courses for Aspiring Game Developers.

Job Common Plug