hireejobs
Hyderabad Jobs
Banglore Jobs
Chennai Jobs
Delhi Jobs
Ahmedabad Jobs
Mumbai Jobs
Pune Jobs
Vijayawada Jobs
Gurgaon Jobs
Noida Jobs
Oil & Gas Jobs
Banking Jobs
Construction Jobs
Top Management Jobs
IT - Software Jobs
Medical Healthcare Jobs
Purchase / Logistics Jobs
Sales
Ajax Jobs
Designing Jobs
ASP .NET Jobs
Java Jobs
MySQL Jobs
Sap hr Jobs
Software Testing Jobs
Html Jobs
IT Jobs
Logistics Jobs
Customer Service Jobs
Airport Jobs
Banking Jobs
Driver Jobs
Part Time Jobs
Civil Engineering Jobs
Accountant Jobs
Safety Officer Jobs
Nursing Jobs
Civil Engineering Jobs
Hospitality Jobs
Part Time Jobs
Security Jobs
Finance Jobs
Marketing Jobs
Shipping Jobs
Real Estate Jobs
Telecom Jobs

Information Security Analyst

5.00 to 8.00 Years   Bangalore   19 Apr, 2020
Job LocationBangalore
EducationNot Mentioned
SalaryNot Disclosed
IndustryIT - Software
Functional AreaGeneral / Other Software
EmploymentTypeFull-time

Job Description

The Threat Management Detection Content Management team is dedicated to building threat detection capabilities to protect VMware s information assets. We leverage the latest technologies and correlate multiple telemetry points in order to create high- quality alerting for security analytics. Guided by the latest in threat research and intelligence, our team is at the cutting edge of threat detection.

As a Security Analyst on the Detection Content Management team, you will be responsible for the operationalization of new security platforms in order to enable our Security Operations Center to stay ahead of emerging and current threats. You ll utilize data analytics, threat intelligence, and your experience to leverage new and existing technologies to build the use cases that drive our security analytics and incident response. You ll get hands- on with new and exciting technologies to help drive the direction of our security capabilities.

If the above information excites and motivates you, we want to hear from you! Please read on and apply today.

This position is responsible for:

Development of use cases and alerting for Security Operations from our Security platforms and tools. Communication and collaboration with the Security Operations team for alert development and improvement. Proactively reviewing and operationalizing threat intelligence in order to create alerting to detect techniques, tactics, and procedures employed by theat actors. Planning and execution of excercises to test monitoring capabilities Daily tracking of security metrics and telemetry to drive alerting capabilities. Participation in threat modeling exercises for applications and services in our enterprise Reviewing and updating logging requirements and utilization. Responding to tickets, email, and telephone requests. Developing and maintaining security monitoring and response processes. Participating in evaluation, implementation, and troubleshooting of security tools for the Security Operations Center (SOC) team. Tracking, reporting, and controlling incident communications with other teams. Providing feedback on effectiveness of threat intelligence platform and data feeds. Maintaining current knowledge and understanding of the threat landscape and emerging security threats. Thorough and accurate reporting of project statuses and timelines. Maintaining a high level of confidentiality. Required skills and experience:

5- 8 years of experience working in a Security Operations Center (SOC). Strong understanding of Security Operations Center (SOC) and Incident Response practices and methodologies. Strong understanding of cloud computing and security issues related to cloud environments. A solid understanding of security monitoring and response capabilities on cloud platforms. Expertise using SIEM products (Splunk Enterprise, Elastic Stack). Experience with endpoint security analysis on Windows, Mac, and Linux event data and related tools. Expert technical knowledge of Internet security and networking protocols. Understanding of security technologies, including UEBA, SIEM, IDS/IPS, firewalls, endpoint security, content filtering, and packet inspection. Strong analytical skills and ability to identify advanced threats. Scripting skills such as Python, Perl, RegEx, Splunk Query Language. Ability to interact effectively at all levels of an organization, across diverse cultural and linguistic barriers, and as part of a geographically distributed team. Ability to collaborate effectively as part of a team and work independently with minimal supervision. Ability to quickly adapt as the external environment and organization evolves. Ability to prioritize projects and deliverables. Comfortable facing new challenges and changes in direction. Self- motivated, team player, and detail oriented. Positive and constructive attitude. Excellent written and verbal communications. Availability outside working hours for high priority events. Desired skills / experience / certification:

Bachelor s degree or equivalent experience. Certified Splunk Power User GCIA, GCIH, GCDA, OSCP certifications

,

Keyskills :
information securitysiem networkingmicrosoft access customer relationsstrong analytical skills security operations centeruse cas

Information Security Analyst Related Jobs

© 2019 Hireejobs All Rights Reserved