The Sr Threat Analyst will provide deep-level analysis for client investigations, utilizing customer-provided data sources, audit, and monitoring tools. This role involves documenting security incidents, understanding threats, and analyzing various security enforcement technologies like SIEM and anti-virus. The analyst will also perform knowledge transfers, provide recommendations, research current threats, and conduct investigations. Collaboration with Technology Engineers, Architects, and Threat Analysts is key to servicing customers and enhancing their security posture. The position requires a minimum of six years of experience in Information Security, preferably within a SOC or MSS environment, and demands availability during US working hours.
Good To Have:- Experience with SIEM platforms (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk)
Must Have:- Provide deep-level analysis for client investigations.
- Utilize customer-provided data sources, audit, and monitoring tools.
- Work closely with Technology Engineers, Architects, and Threat Analysts.
- Document and report on potential security incidents.
- Maintain understanding of security threats, vulnerabilities, and exploits.
- Perform knowledge transfers and train clients on threat mitigation.
- Provide ongoing recommendations on tuning and best practices.
- Research current threats and attack vectors.
- Perform investigations on escalations.
- Discuss security posture with clients and make recommendations.
- Provide gap analysis for clients.
- Maintain and develop SOPs, Playbooks, and runbooks.
- Work with internal teams to increase efficiency.
- Train new analysts on security and tools.
- Create and maintain a Content Catalog.
- Perform QA review of security alerts.
- Six or more years of professional experience in Information Security.
- Experience in a SOC, MSS, or enterprise network environment.
- Excellent time management, reporting, and communication skills.
- Data analysis using SIEM, Database tools, and Excel.
- Troubleshooting security devices and SIEM.
- Create and maintain content within SIEM environments.
- IDS monitoring/analysis with Sourcefire and Snort.
- Experience with various attack types (Web Based, OWASP Top 10, DoS, Brute force).
- Familiarity with SANS' top 20 critical security controls.
- Understand enterprise Windows security (Active Directory, privilege escalation).
- Experience with Anti-virus (AV) and Host Based Intrusion Prevention (HIPS).
- Monitor commercial AV solutions.
- Identify common false positives and suggest tuning.
- Understand root causes of malware and proactive mitigation.
- Familiarity with web-based exploit kits and targeted malware.
- Experience with malware protection tools (FireEye).
- Understand covert channels, egress, and data exfiltration.
- Familiarity with vulnerability scoring systems (CVSS).
- Basic understanding of vulnerability assessment tools.
- Availability for US working hours (5 PM IST to 3 AM IST).
- Work from Office role.
Perks:- Commitment to Diversity, Equality, and Inclusion through Employee Resource Groups
- Work/life balance
- Professional training resources
- Creative problem-solving and ability to tackle unique, complex projects
- Volunteer Opportunities ("Optiv Chips In")
- Ability and technology for productive remote/from home work (where applicable)