Send me more jobs like this

Sorry, This job is expired.

Manager- Cyber Defense Center - InfoSec

Keywords / Skills : Manager- Cyber Defense Center - InfoSec, incident response, SIEM, PAM, CASB, EDR, Incident Response tools, threat landscape, Network Forensics, Data Loss Prevention monitoring, audit requirements, IT infra components, DNS, DHCP, multi factor authentication

8 - 11 years
Posted: 2019-09-26

Industry
ITES/BPO
Function
Manufacturing/Engineering/R&D
Posted On
26th Sep 2019
Job Ref code
COR012358
Job Description
Job Description :

Inviting applications for the role of Manager, Cyber Defense Center \u2013 InfoSec.

In this role as CDC Incident Response Senior Analyst, you will be responsible to support threat monitoring, detection, event analysis, incident response/reporting, forensics and threat hunting program (24*7 environment). The CDC Senior Analyst must be able to rapidly respond to security alerts/incidents and should have at least 8 years of relevant experience respectively in Cyber security incident response. Should have deeper understanding with some hands-on experience on enterprise IT infra components such as advanced firewalls, IPS/IDS/WIPS/HIPS, routers/switches, TACACS, VPN, proxy, AV, domain controllers, DNS, DHCP, multi factor authentication, virtualization, Email systems/security, DLP etc. along with cloud environments (AWS, Azure etc.).
.
Providing incident response and remediation support for escalated security alerts/incidents (should be flexible to work in 24*7 environment)
.
Leverages emerging threat intelligence (IOCs, updated rules, etc.) to identify affected systems and the scope of the attack
.
Performing comprehensive computer monitoring, identifying vulnerabilities, Target mapping and profiling.
.
Provides support for complex computer network exploitation and defense techniques to include deterring, identifying and investigating computer and network intrusions
.
Provides technical support for forensics services to include evidence seizure, computer forensic analysis and data recovery, in support of computer crime investigation. Researches and maintains proficiency in open and closed source computer exploitation tools, attack techniques, procedures and trends.
.
Performs research into emerging threat sources and develops threat profiles. Keep updated on latest cyber security threats.

Qualifications
Minimum qualifications

. Bachelor\u2019s Degree
. Demonstrates strong evidence of analytical ability and attention to detail. Has a broad understanding of all stages of incident response.
. Has a sound understanding of SIEM, PAM, CASB, EDR, other detection platforms and Incident Response tools.
. Has knowledge of current threat landscape (threat actors, APT, cyber-crime, etc.)
. Good to have Network Forensics experience.
. Has a systematic, disciplined and analytical approach to problem solving
. Has basic knowledge of Data Loss Prevention monitoring
. Has basic knowledge of audit requirements (PCI, HIPPA, SOX, etc.)
. Security Certifications Preferred (Including but not limited to the following certifications): Certified Incident Handler (GCIH), OSCP, CHFI, CEH.



Similar Jobs
View All Similar Jobs
Walkin for you