Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
Job Location | Hyderabad |
Education | Not Mentioned |
Salary | Not Disclosed |
Industry | Banking / Financial Services |
Functional Area | General / Operations Management |
EmploymentType | Full-time |
Responsible for taking action on events, alerts, and incidents escalated from the Level 1 Analyst.Support internal incident response activities, assisting with the mitigation and remediation processes while documenting lessons learnedCommunicates with management on incident updates and provide expert counsel to managementAble to complete triage of an event or alert from start to finish without higher level supervisionContextualize findings to Synchronys specific business risks or vulnerabilitiesUtilize metrics to track the performance and efficiency of detection signatures/rules and associated technologiesIdentify potential process improvement projects and serve as a change agentWork in coordination with cyber security operations and other IT security functions to determine requirements and opportunities for threat detection and policy / prevention recommendationsInterface with fellow team members, colleagues on the security team, business partners, management, vendors, and external parties on best practicesResponsible to ensure Information Security (IS) tools and processes meet regulatory requirementsUnderstand business objectives, priorities, drivers and technology focus areasSupport the design and implementation of procedures and controls necessary to ensure and protect the safety and security of all information systems assets, including prevention of intentional or inadvertent access, modification, disclosure, or destructionSupport the preparation of appropriate reports and communicate status and resultsCollaborate with management in developing technical directions, setting objectives, and executing on team goalsQualifications/Requirements:Graduate with a minimum of 8 years of experience in Information Technology, Cyber Security, Information Assurance, or a related fieldA minimum of 2 years of Security operations center (SOC) experience. Prior cyber incident response experience and/or experience working in high tempo cyber operations environments. Experience of working in a high volume and result-oriented operational environment.Cyber threat detection experience leveraging industry standard toolsets / frameworks such as Snort, Bro, HIPS, Yara, or related tools for detecting anomalous / malicious cyber activity on hosts or across networksOne or more relevant security certifications (GCIH, GCIA, CEH etc.)Ability to work in rotating shifts and also be on-call outside of shift hours on a regular and recurring basis.Possess personal and professional integrity. Individuals will be required to submit to a background examination.Good oral and written communication skills.Strong interpersonal and critical thinking skillsAbility to take initiative and ownership of incidents from reporting to resolution.Ability to understand business impact.Experience presenting to senior leadershipFor internal candidates: Understand the criteria or mandatory skills required for the role, before applying.Inform your Manager or HRM before applying for any role on Workday.Ensure that your Professional Profile is updated (fields such as Education, Prior experience, Other skills) and it is mandatory to upload your updated resume (Word or PDF format)Must not be any corrective action plan (First Formal/Final Formal, PIP)Employees who have completed 18 months in the organization and 12 months in current role and level are only eligible.Last annual performance rating should at least be Strong Contributor / Critical talent.Desired Characteristics:Highly analytical, detail-oriented, and strong problem solving with a common sense approach to resolving problemsExpertise to clearly define complex issues despite incomplete or ambiguous informationExperienced in performing basic and medium level forensic analysis on Microsoft Windows and Unix systems.Identify and evaluate malware related compromise artefacts.Possess comprehensive understanding of and substantive experience in the areas of network systems engineering, computing systems, software applications and cloud.Demonstrate prior experience using network analysis tools, scripting languages, software vulnerabilities, exploits and malware.Ability to assume leadership role on ad-hoc basis for managing Level 1 Analysts.Results driven, self-motivated, strategic, conceptual, and innovative thinkerPrevious experience leading teams and providing guidance to fellow employeesBenchmark and implement industry best practices to mitigate potential threats to Synchronys digital infrastructure and operations.,
Keyskills :
design ts synchrony industry cloud management ad scriptinglanguages action software siem securityoperations communicationskills supervision communication ep inf mationtechnology