hireejobs
Hyderabad Jobs
Banglore Jobs
Chennai Jobs
Delhi Jobs
Ahmedabad Jobs
Mumbai Jobs
Pune Jobs
Vijayawada Jobs
Gurgaon Jobs
Noida Jobs
Oil & Gas Jobs
Banking Jobs
Construction Jobs
Top Management Jobs
IT - Software Jobs
Medical Healthcare Jobs
Purchase / Logistics Jobs
Sales
Ajax Jobs
Designing Jobs
ASP .NET Jobs
Java Jobs
MySQL Jobs
Sap hr Jobs
Software Testing Jobs
Html Jobs
IT Jobs
Logistics Jobs
Customer Service Jobs
Airport Jobs
Banking Jobs
Driver Jobs
Part Time Jobs
Civil Engineering Jobs
Accountant Jobs
Safety Officer Jobs
Nursing Jobs
Civil Engineering Jobs
Hospitality Jobs
Part Time Jobs
Security Jobs
Finance Jobs
Marketing Jobs
Shipping Jobs
Real Estate Jobs
Telecom Jobs

Data Scientist Threat Hunter Cloud Infastructure

2.00 to 3.00 Years   Hyderabad   31 Aug, 2019
Job LocationHyderabad
EducationNot Mentioned
SalaryNot Disclosed
IndustryIT - Software
Functional AreaGeneral / Other Software
EmploymentTypeFull-time

Job Description

*Designs, develops and programs methods, processes, and systems to consolidate and analyze unstructured, diverse big data sources to generate actionable insights and solutions for client services and product enhancement.Interacts with product and service teams to identify questions and issues for data analysis and experiments. Develops and codes software programs, algorithms and automated processes to cleanse, integrate and evaluate large datasets from multiple disparate sources. Identifies meaningful insights from large data and metadata sources; interprets and communicates insights and findings from analysis and experiments to product, service, and business managers.Job duties are varied and complex utilizing independent judgment. May have project lead role. 5 years relevant work experience. BS/BA preferred., *Are you interested in building large-scale distributed infrastructure for the cloud Oracle s Cloud Infrastructure team is building its next generation Cloud IaaS/PaaS/SaaS technologies that operate at high scale in a broadly distributed multi-tenant environment. Our customers run their businesses on our cloud, and our mission is to provide them with best in class, foundational cloud networking services. https://cloud.oracle.com/cloud-infrastructure Our team designs, engineers and operates the security for our premier cloud services. We are reimagining the traditional enterprise thinking of security and creating an environment suitable for the most demanding and security conscience customers with our new large scale distributed services. This team is here to protect the customers, protect our cloud and make sure it best of breed. We are looking for people with experience in threat hunting, determining indicators of compromise (IOCs), incident management and red team/blue team activities for our IaaS, PaaS and SaaS environments. You will be part of a SOC team responsible for the investigation and reporting of product security incidents for all of our cloud. This includes using tools to analyze and respond to threats, creating tools/scripts to aid in quick analysis and response, and responding to security events. The position operates and tunes security-supporting tools, provides requirements for new security tools and creates use cases for additional monitoring situations. If this excites you, come help us deliver the next level of secure cloud computing. These are exciting times in our space - we are growing fast, still at an early stage and working on ambitious new initiatives. An engineer at any level can have significant technical and business impact. We are looking for a Security Analyst to help us push the boundaries of what can be accomplished in both current and the next generation of Oracle cloud services using automation and active intelligence gathering systems. The ideal candidate will have proven experience in Security Incident Response (CSIRT, SIRT), Blue Team, Security Monitoring, or Threat Hunting. This role will be part of the Oracle s Cloud Detection and Response Team. Multiple levels of experienced roles are available for this posting. Responsibilities:Coordinate SOC efforts across multiple business units during responsePerform hunting exercises using threat intelligence, analysis of anomalous log data and results of historical events and data to detect and response to threatsDevelop anomaly detection dashboards and reports to identify potential threats, suspicious activity, and intrusionsMonitor for security indicators by correlating and analyzing a variety of application, network and host-based security logs and determining the correct remediation actions and escalation paths foreach incidentAssist with the development of processes and procedures to improve security operations functions, incident response times, analysis of incidents, and overall SOC functionsCreate repeatable processes for continuous testing and monitoring of IOCs following a proven methodology you help defineDevelop scripts, processes and content to improve detective capabilitiesKnowledge of the chain of custody process and properly securing evidenceResearch industry trends, identify ongoing security threats, analyze new security testing tools, and provide recommendations on the need and usefulness of services and/or productsEvaluate and recommend new and emerging security solutions and technologies to issuesEffectively communicate security concepts with both technical and non-technical individualsProvide information regarding intrusion events, security incidents, and other threat indications and warning information to teams and leadership as part of incident responseDeliver self-service security metric data of discovery, triage and trending analysis of team findingsAuthor post mortem reports to be provided to senior leadership following an intrusion or red team engagementParticipate in Red/Blue/Purple team activities Qualifications:Bachelor s Degree in Information Assurance, Security, Management Information Systems, Risk Management or equivalent work experience acceptable2-3+ years of related cybersecurity architecture, engineering, or SOC work experience (monitoring, detection, incident response, forensics)Ability to write scripts/code using Python, Perl, PowerShell, or an equivalent languageExcellent written and verbal communications, including presentation skills, are important to be successful in this roleProven ability to effectively communicate with all levels of the organization, as well as with external partiesExperience with forensics tools such as X-Ways, F-Response, Volatility and RekallRed/Blue team experience turning findings into actionable detections and mitigationsPreferred knowledge of current advanced adversary TTP s and experience responding to ATP attacksUnderstanding of privilege escalation, persistence, and lateral movement techniquesUnderstanding of host and network Incident Response processes, tasks, and tools

  • Excellent customer service skills required
  • Knowledge of operational security tools and practices (e.g. IDS, firewalls, & 3rd-party security products)
Ability to both work independently with minimal direction and to collaborate effectively with local and remote teams with a strong customer focusExperience working in a large cloud or Internet software company preferred.Be available on an on-call basis to respond to pending issues or problems arising during non-business hours and provide support and response

Keyskills :
machinelearning python dataanalysis sql analytics chainofcustody securityincidentresponse bigdata redteam usecases testingtools customerfocus businessunits securitytools anagementinf mationsystems

Data Scientist Threat Hunter Cloud Infastructure Related Jobs

© 2019 Hireejobs All Rights Reserved