Sr Threat Analyst | On-site, Bangalore

3 Minutes ago • 6 Years +

Job Summary

Job Description

The Senior Threat Analyst will provide deep-level analysis for client investigations utilizing customer-provided data sources, audit, and monitoring tools at both the government and enterprise level. The Senior Threat Analyst will work closely with our Technology Engineers, Architects, and Threat Analysts to service customers. This is a 24x7 role in Security Operations Center. The role involves documenting and reporting on security incidents, understanding security threats, providing analysis on various security enforcement technologies, and training clients on threat mitigation. The analyst will also research current threats, perform investigations, and make recommendations to improve client security posture.
Must have:
  • Provide deep-level analysis for client investigations.
  • Utilize customer data sources, audit, and monitoring tools.
  • Document and report on potential security incidents.
  • Maintain understanding of security threats and vulnerabilities.
  • Analyze SIEM, anti-virus, firewalls, IDS, WAF, and other security technologies.
  • Train clients on threat mitigation and provide knowledge transfers.
  • Research current threats and attack vectors.
  • Perform investigations on escalations and work with analysts.
  • Discuss and recommend security posture improvements to clients.
  • Conduct gap analysis for client security posture.
  • Develop and maintain SOPs, Playbooks, and runbooks.
  • Train new analysts on security and tools.
  • Create and maintain a Content Catalog.
  • Perform QA review of security alerts.
  • Possess 6+ years of Information Security experience.
  • Experience in SOC, MSS, or enterprise network environments.
  • Proficient in data analysis using SIEM, Database tools, and Excel.
  • Troubleshoot security devices and SIEM.
  • Create and maintain SIEM content.
  • Perform IDS monitoring and analysis with Sourcefire and Snort.
  • Understand enterprise Windows security, Active Directory, and system hardening.
  • Monitor commercial Anti-Virus (AV) solutions.
  • Identify false positives and suggest tuning for security systems.
  • Work in a 24x7 Security Operations Center environment.
Good to have:
  • Experience with SIEM platforms (Exabeam, Elastic, SentinelOne, QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk)
  • Understanding of Direct vs. Indirect attacks (SQL Injection, cross-site scripting)
  • Experience with Web Based Attacks and OWASP Top 10
  • Knowledge of Network Based DoS, Brute force, HTTP Based DoS, Denial of Service, Network Based / System Based Attacks
  • Familiarity with SANS top 20 critical security controls
  • Familiarity with web-based exploit kits and their methods
  • Familiarity with Advanced Persistent Threats (APT) and targeted malware concepts
  • Experience and understanding of malware protection tools (FireEye)
  • Familiarity with vulnerability scoring systems (CVSS)
  • Basic understanding of vulnerability assessment tools (scanners, exploitation frameworks)
  • Knowledge of covert channels, egress, and data exfiltration techniques
Perks:
  • Commitment to Diversity, Equality, and Inclusion through Employee Resource Groups.
  • Work/life balance.
  • Professional training resources.
  • Opportunities for creative problem-solving on complex projects.
  • Volunteer opportunities through "Optiv Chips In".

Job Details

The Senior Threat Analyst will provide deep-level analysis for client investigations utilizing customer-provided data sources, audit, and monitoring tools at both the government and enterprise level. The Senior Threat Analyst will work closely with our Technology Engineers, Architects, and Threat Analysts to service customers. This is a 24x7 role in Security Operations Center.

How you'll make an impact:

  • High level professional writing experience regarding documenting and reporting on potential security incidents identified in customer environments to include timeline of events
  • Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets
  • Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc
  • Perform knowledge transfers, document, and train clients regarding mitigation of identified threats
  • Provide ongoing recommendations to peers and customers on tuning and best practices
  • Actively research current threats and attack vectors being exploited in the wild
  • Actively work with analysts and perform investigations on escalations
  • Ability to discuss security posture with multiple clients and make recommendations to better their holistic security approach
  • Provide gap analysis for clients to better their security posture
  • Maintain and develop SOPs for threat analyst team
  • Develop and maintain Playbooks and runbooks
  • Work with internal teams to increase efficiency and effectiveness of security analysis provided by the threat analysis team
  • Training of new analysts on security and tools
  • Create and maintain Content Catalog based on security essentials and the evolving threat landscape.
  • Provide quality assurance (QA) review of security alerts handled by Team members

What we’re looking for

  • 6 or more years of full-time professional experience in the Information Security field
  • Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment as a point of escalation
  • Excellent time management, reporting, and communication skills including customer interactions and executive presentations
  • Data analysis using SIEM, Database tools, and Excel
  • Experience troubleshooting security devices and SIEM
  • Ability to create and maintain content within SIEM environments and make recommendations to clients to better their visibility
  • IDS monitoring/analysis with tools such as Sourcefire and Snort
  • Experience with SIEM platforms preferred (Exabeam, Elastic, SentinelOne, QRadar, LogRhythm, McAfee/Nitro, ArcSight, Splunk) a plus
  • Direct (E.g., SQL Injection) versus indirect (E.g., cross-site scripting) attacks
  • Experience with the following attacks: Web Based Attacks and the OWASP Top 10, Network Based DoS, Brute force, HTTP Based DoS, Denial of Service, Network Based / System Based Attacks
  • Familiarity with SANS top 20 critical security controls
  • Understand the foundations of enterprise Windows security including Active Directory, Windows security architecture and terminology, Privilege escalation techniques, Common mitigation controls and system hardening
  • Anti-Virus (AV) and Host Based Intrusion Prevention (HIPS)
  • Experience in monitoring at least one commercial AV solution such as (but not limited to) McAfee/Intel, Symantec, Sophos, or Trend Micro
  • Ability to identify common false positives and make suggestions on tuning
  • Understanding of root causes of malware and proactive mitigation
  • Propagation of malware in enterprise environments
  • Familiarity with web-based exploit kits and the methods employed by web-based exploit kits.
  • Familiarity with concepts associated with Advanced Persistent Threats and “targeted malware.”
  • Experience and understanding of malware protection tools (FireEye) and controls in an enterprise environment
  • Covert channels, egress, and data exfiltration techniques
  • Familiarity with vulnerability scoring systems such as CVSS
  • Basic understanding of vulnerability assessment tools such as vulnerability scanners and exploitation frameworks
  • This role is Work from Office role
  • This is a 24x7 role in Security Operations Center.

Similar Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Similar Skill Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Jobs in Bengaluru, Karnataka, India

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

Similar Category Jobs

Looks like we're out of matches

Set up an alert and we'll send you similar jobs the moment they appear!

About The Company

We work alongside clients to manage cyber risk and equip them with perspectives and programs to accelerate business progress. Our real-world experience, deep vertical expertise and diverse teams enable us to face any challenge with confidence. We put you at the center of our unmatched ecosystem of people, products, partners and programs to design and implement agile solutions. Our adaptive approach continually assesses risk in the context of cyber and broader objectives to secure today's business and fortify it for the future.

Overland Park, Kansas, United States (Remote)

Bengaluru, Karnataka, India (On-Site)

Indianapolis, Indiana, United States (On-Site)

Baltimore, Maryland, United States (On-Site)

Bengaluru, Karnataka, India (On-Site)

Bengaluru, Karnataka, India (On-Site)

Hartford, Connecticut, United States (Remote)

Phoenix, Arizona, United States (On-Site)

Houston, Texas, United States (Hybrid)

Dallas, Texas, United States (Hybrid)

View All Jobs

Get notified when new jobs are added by Optiv

Level Up Your Career in Game Development!

Transform Your Passion into Profession with Our Comprehensive Courses for Aspiring Game Developers.

Job Common Plug