Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
Job Location | Bangalore |
Education | Not Mentioned |
Salary | Not Disclosed |
Industry | IT - Software |
Functional Area | DBA / Datawarehousing |
EmploymentType | Full-time |
Dear candidates,Greetings,Profile:Threat HuntingWork Location:BangaloreExperience:6 to 9 YearsShift Timings:1:00 PM to 9:30 PMKey responsibilities:1. Enhancing the Security Operations and Threat Intelligence workflow by redesigning process and approach to operationalize the sharing and utilization of actionable intelligence and indicators.2. Assist in identifying (hunting) and profiling threat actors and TTPs.3. Custom tool design to assist in analysis and investigation. (Related experience in programming, database, system administration, etc.)4. Implementing integration/orchestration of existing security infrastructure and indicators.5. Design and run custom analysis models on (centralized) security event information to discover active threats, including collaboration on the development of use cases when appropriate.6. Perform as an Information Security SME in the following areas:o Threat Intelligenceo Incident Responseo Log analysis (statistical modeling, correlation, pattern recognition, etc.)o Microsoft platform (Server, workstation, applications)o Open Systems platforms (Linux, UNIX, VM Ware ESX)o Web Applicationo Networking (firewalls, IDS/IPS, packet capture)o Databases (Oracle, SQL Server, DB2, IMS)7. Providing mentorship and support to teammates with regard to Threat Intelligence, communication/rapport with other divisions and various levels of leadership, technical expertise, and career development.8. Capable of identifying need & driving solutions, and providing guidance, in an autonomous manner.Primary Skills1. Degree and/or certifications in Engineering, Computers Science, or related field2. 7+ years overall technical experience in either threat intelligence, incident response, security operations, or related information security field.3. 2+ years experience in application design/engineering, including but not limited to programming/scripting, Windows/Linux system administration, RDBMS/NoSQL database administration, etc.4. 3+ years experience in penetration testing, ethical hacking, exploit writing, and vulnerability management6. Deep understanding of common network and application stack protocols, including but not limited to TCP/IP, SMTP, DNS, TLS, XML, HTTP, etc.7. Strong and recent experience with malware analysis and reverse engineering.8. Advanced experience with security operations tools, including but not limited to:o SIEM (e.g. Splunk, Arc Sight)o Indicator management (e.g. ThreatConnect)o Link/relationship analysis (e.g. Maltego, IBM i2 Analyst Notebook)o Signature development/management (e.g. Snort rules, Yara rules)9. Broad experience with various common security infrastructure tools (NIDS, HIPS, EDR, etc.)10. Excellent analytical and problem solving skills, a passion for research and puzzle-solving.11. Expert understanding of large, complex corporate network environments.12. Strong communication (oral, written, presentation), interpersonal and consultative skills, especially in regard to white papers, briefs, and presentations.13. Good organization and documentation skills14. Leadership and mentorship skillsExperience1. 7+ years overall technical experience in either threat intelligence, incident response, security operations, or related information security field.2. 2+ years experience in application design/engineering, including but not limited to programming/scripting, Windows/Linux system administration, RDBMS/NoSQL database administration, etc.3. 3+ years experience in penetration testing, ethical hacking, exploit writing, and vulnerability management4. At least hobbyist experience in maker/hardware hacking, e.g. Raspberry Pi, Arduino, etc.5. Experience with incident response workflow (or other case management ticketing) tools such as RSA Archer, ServiceNow, Remedy, JIRA, Resilient, Best Practical Request Tracker, etc.6. Obtained certifications in several of the following: SANS GIAC courses, CEH, CISSP, OSCP, or tool-specific certifications7. Scripting experience related to system administration and security operations (Python, Bash, PowerShell, Perl, C/C++)If interested pls specify the skill set in the subject line & provide the following details along with a copy of your resume onHarihara@affluentgs.comCurrent CTCExpected CTCNotice PeriodCurrent LocationRegards,Team HR
Keyskills :
linux system administrationdnsdatabase administrationnosqlwindowstestinghttprdbmsscriptingthreat huntingnetwork environments