Sr. Analyst I | On-site, Bangalore

8 Minutes ago • 6 Years +

Job Summary

Job Description

The Sr Threat Analyst will provide deep-level analysis for client investigations, utilizing customer-provided data sources, audit, and monitoring tools. This role involves documenting security incidents, understanding threats, and analyzing various security enforcement technologies like SIEM and anti-virus. The analyst will also perform knowledge transfers, provide recommendations, research current threats, and conduct investigations. Collaboration with Technology Engineers, Architects, and Threat Analysts is key to servicing customers and enhancing their security posture. The position requires a minimum of six years of experience in Information Security, preferably within a SOC or MSS environment, and demands availability during US working hours.
Must have:
  • Provide deep-level analysis for client investigations.
  • Utilize customer-provided data sources, audit, and monitoring tools.
  • Work closely with Technology Engineers, Architects, and Threat Analysts.
  • Document and report on potential security incidents.
  • Maintain understanding of security threats, vulnerabilities, and exploits.
  • Perform knowledge transfers and train clients on threat mitigation.
  • Provide ongoing recommendations on tuning and best practices.
  • Research current threats and attack vectors.
  • Perform investigations on escalations.
  • Discuss security posture with clients and make recommendations.
  • Provide gap analysis for clients.
  • Maintain and develop SOPs, Playbooks, and runbooks.
  • Work with internal teams to increase efficiency.
  • Train new analysts on security and tools.
  • Create and maintain a Content Catalog.
  • Perform QA review of security alerts.
  • Six or more years of professional experience in Information Security.
  • Experience in a SOC, MSS, or enterprise network environment.
  • Excellent time management, reporting, and communication skills.
  • Data analysis using SIEM, Database tools, and Excel.
  • Troubleshooting security devices and SIEM.
  • Create and maintain content within SIEM environments.
  • IDS monitoring/analysis with Sourcefire and Snort.
  • Experience with various attack types (Web Based, OWASP Top 10, DoS, Brute force).
  • Familiarity with SANS' top 20 critical security controls.
  • Understand enterprise Windows security (Active Directory, privilege escalation).
  • Experience with Anti-virus (AV) and Host Based Intrusion Prevention (HIPS).
  • Monitor commercial AV solutions.
  • Identify common false positives and suggest tuning.
  • Understand root causes of malware and proactive mitigation.
  • Familiarity with web-based exploit kits and targeted malware.
  • Experience with malware protection tools (FireEye).
  • Understand covert channels, egress, and data exfiltration.
  • Familiarity with vulnerability scoring systems (CVSS).
  • Basic understanding of vulnerability assessment tools.
  • Availability for US working hours (5 PM IST to 3 AM IST).
  • Work from Office role.
Good to have:
  • Experience with SIEM platforms (QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk)
Perks:
  • Commitment to Diversity, Equality, and Inclusion through Employee Resource Groups
  • Work/life balance
  • Professional training resources
  • Creative problem-solving and ability to tackle unique, complex projects
  • Volunteer Opportunities ("Optiv Chips In")
  • Ability and technology for productive remote/from home work (where applicable)

Job Details

How you'll make an impact:

  • High-level professional writing experience regarding documenting and reporting on potential security incidents identified in customer environments including timeline of events
  • Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets.
  • Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc.
  • Perform knowledge transfers, document, and train clients regarding the mitigation of identified threats.
  • Provide ongoing recommendations to peers and customers on tuning and best practices.
  • Actively research current threats and attack vectors being exploited in the wild
  • Actively work with analysts and perform investigations on escalations.
  • Ability to discuss security posture with multiple clients and make recommendations to better their holistic security approach.
  • Provide gap analysis for clients to better their security posture.
  • Maintain and develop SOPs for the threat analyst team.
  • Develop and maintain Playbooks and runbooks.
  • Work with internal teams to increase the efficiency and effectiveness of security analysis provided by the threat analysis team.
  • Training of new analysts on security and tools
  • Create and maintain a Content Catalog based on security essentials and the evolving threat landscape.
  • Provide quality assurance (QA) review of security alerts handled by Team members.

What we’re looking for

  • Six or more years of full-time professional experience in the Information Security field
  • Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment as a point of escalation.
  • Excellent time management, reporting, and communication skills including customer interactions and executive presentations.
  • Data analysis using SIEM, Database tools, and Excel.
  • Experience troubleshooting security devices and SIEM.
  • Ability to create and maintain content within SIEM environments and make recommendations to clients to better their visibility.
  • IDS monitoring/analysis with tools such as Sourcefire and Snort
  • Direct (E.g., SQL Injection) versus indirect (E.g., cross-site scripting) attacks
  • Experience with the following attacks: Web Based Attacks and the OWASP Top 10, Network-Based DoS, Brute force, HTTP Based DoS, Denial of Service, and Network-Based / System Based Attacks.
  • Familiarity with SANS' top 20 critical security controls
  • Understand the foundations of enterprise Windows security including Active Directory, Windows security architecture and terminology, Privilege escalation techniques, Common mitigation controls and system hardening.
  • Anti-virus (AV) and Host Based Intrusion Prevention (HIPS)
  • Experience in monitoring at least one commercial AV solution such as (but not limited to) McAfee/Intel, Symantec, Sophos, or Trend Micro
  • Ability to identify common false positives and make suggestions on tuning.
  • Understanding of root causes of malware and proactive mitigation
  • Propagation of malware in enterprise environments
  • Familiarity with web-based exploit kits and the methods employed by web-based exploit kits.
  • Familiarity with concepts associated with Advanced Persistent Threats and “targeted malware.”
  • Experience and understanding of malware protection tools (FireEye) and controls in an enterprise environment.
  • Covert channels, egress, and data exfiltration techniques
  • Familiarity with vulnerability scoring systems such as CVSS.
  • Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks
  • The role demands the availability for US working hours (5 PM (IST) to 3 AM (IST))
  • This role is Work from Office role

What you can expect from Optiv

  • A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups.
  • Work/life balance
  • Professional training resources
  • Creative problem-solving and the ability to tackle unique, complex projects
  • Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities.
  • The ability and technology necessary to productively work remotely/from home (where applicable)

Similar Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Similar Skill Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Jobs in Bengaluru, Karnataka, India

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Similar Category Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

About The Company

We work alongside clients to manage cyber risk and equip them with perspectives and programs to accelerate business progress. Our real-world experience, deep vertical expertise and diverse teams enable us to face any challenge with confidence. We put you at the center of our unmatched ecosystem of people, products, partners and programs to design and implement agile solutions. Our adaptive approach continually assesses risk in the context of cyber and broader objectives to secure today's business and fortify it for the future.

Bengaluru, Karnataka, India (On-Site)

Bengaluru, Karnataka, India (On-Site)

Bengaluru, Karnataka, India (Remote)

Bengaluru, Karnataka, India (On-Site)

Bengaluru, Karnataka, India (On-Site)

San Francisco, California, United States (On-Site)

Bengaluru, Karnataka, India (Remote)

Baltimore, Maryland, United States (Remote)

Overland Park, Kansas, United States (Remote)

View All Jobs

Get notified when new jobs are added by Optiv

Level Up Your Career in Game Development!

Transform Your Passion into Profession with Our Comprehensive Courses for Aspiring Game Developers.

Job Common Plug