hireejobs
Hyderabad Jobs
Banglore Jobs
Chennai Jobs
Delhi Jobs
Ahmedabad Jobs
Mumbai Jobs
Pune Jobs
Vijayawada Jobs
Gurgaon Jobs
Noida Jobs
Oil & Gas Jobs
Banking Jobs
Construction Jobs
Top Management Jobs
IT - Software Jobs
Medical Healthcare Jobs
Purchase / Logistics Jobs
Sales
Ajax Jobs
Designing Jobs
ASP .NET Jobs
Java Jobs
MySQL Jobs
Sap hr Jobs
Software Testing Jobs
Html Jobs
IT Jobs
Logistics Jobs
Customer Service Jobs
Airport Jobs
Banking Jobs
Driver Jobs
Part Time Jobs
Civil Engineering Jobs
Accountant Jobs
Safety Officer Jobs
Nursing Jobs
Civil Engineering Jobs
Hospitality Jobs
Part Time Jobs
Security Jobs
Finance Jobs
Marketing Jobs
Shipping Jobs
Real Estate Jobs
Telecom Jobs

AVP, Threat Detection (L 10)

2.00 to 4.00 Years   Hyderabad   11 Sep, 2019
Job LocationHyderabad
EducationNot Mentioned
SalaryNot Disclosed
IndustryBanking / Financial Services
Functional AreaGeneral / Operations Management
EmploymentTypeFull-time

Job Description

Responsible for taking action on events, alerts, and incidents escalated from the Level 1 Analyst.Support internal incident response activities, assisting with the mitigation and remediation processes while documenting lessons learnedCommunicates with management on incident updates and provide expert counsel to managementAble to complete triage of an event or alert from start to finish without higher level supervisionContextualize findings to Synchronys specific business risks or vulnerabilitiesUtilize metrics to track the performance and efficiency of detection signatures/rules and associated technologiesIdentify potential process improvement projects and serve as a change agentWork in coordination with cyber security operations and other IT security functions to determine requirements and opportunities for threat detection and policy / prevention recommendationsInterface with fellow team members, colleagues on the security team, business partners, management, vendors, and external parties on best practicesResponsible to ensure Information Security (IS) tools and processes meet regulatory requirementsUnderstand business objectives, priorities, drivers and technology focus areasSupport the design and implementation of procedures and controls necessary to ensure and protect the safety and security of all information systems assets, including prevention of intentional or inadvertent access, modification, disclosure, or destructionSupport the preparation of appropriate reports and communicate status and resultsCollaborate with management in developing technical directions, setting objectives, and executing on team goalsQualifications/Requirements:Graduate with a minimum of 8 years of experience in Information Technology, Cyber Security, Information Assurance, or a related fieldA minimum of 2 years of Security operations center (SOC) experience. Prior cyber incident response experience and/or experience working in high tempo cyber operations environments. Experience of working in a high volume and result-oriented operational environment.Cyber threat detection experience leveraging industry standard toolsets / frameworks such as Snort, Bro, HIPS, Yara, or related tools for detecting anomalous / malicious cyber activity on hosts or across networksOne or more relevant security certifications (GCIH, GCIA, CEH etc.)Ability to work in rotating shifts and also be on-call outside of shift hours on a regular and recurring basis.Possess personal and professional integrity. Individuals will be required to submit to a background examination.Good oral and written communication skills.Strong interpersonal and critical thinking skillsAbility to take initiative and ownership of incidents from reporting to resolution.Ability to understand business impact.Experience presenting to senior leadershipFor internal candidates: Understand the criteria or mandatory skills required for the role, before applying.Inform your Manager or HRM before applying for any role on Workday.Ensure that your Professional Profile is updated (fields such as Education, Prior experience, Other skills) and it is mandatory to upload your updated resume (Word or PDF format)Must not be any corrective action plan (First Formal/Final Formal, PIP)Employees who have completed 18 months in the organization and 12 months in current role and level are only eligible.Last annual performance rating should at least be Strong Contributor / Critical talent.Desired Characteristics:Highly analytical, detail-oriented, and strong problem solving with a common sense approach to resolving problemsExpertise to clearly define complex issues despite incomplete or ambiguous informationExperienced in performing basic and medium level forensic analysis on Microsoft Windows and Unix systems.Identify and evaluate malware related compromise artefacts.Possess comprehensive understanding of and substantive experience in the areas of network systems engineering, computing systems, software applications and cloud.Demonstrate prior experience using network analysis tools, scripting languages, software vulnerabilities, exploits and malware.Ability to assume leadership role on ad-hoc basis for managing Level 1 Analysts.Results driven, self-motivated, strategic, conceptual, and innovative thinkerPrevious experience leading teams and providing guidance to fellow employeesBenchmark and implement industry best practices to mitigate potential threats to Synchronys digital infrastructure and operations.,

Keyskills :
design ts synchrony industry cloud management ad scriptinglanguages action software siem securityoperations communicationskills supervision communication ep inf mationtechnology

AVP, Threat Detection (L 10) Related Jobs

© 2019 Hireejobs All Rights Reserved