Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
Job Location | Mumbai City |
Education | Not Mentioned |
Salary | Not Disclosed |
Industry | IT - Hardware / Networking |
Functional Area | Customer Service (Domestic)Sales / BD |
EmploymentType | Full-time |
The Cyber Threat Hunting and Analytics Lead has advanced skills in network / host forensics , malware reverse engineering , and cyber threat hunting. The Lead is responsible for escalated incidents that involve a deep dive forensics examination and / or reversing an unknown malicious binary. The Lead also has the understanding and know - how of advanced attacker Tools , Techniques , and Procedures (TTP) s.Lead and prioritize incidents and cases escalated to the Cyber Security Threat Hunting Team and Content Development Team Create and maintain SLAs and metrics for Cyber Threat Hunting and content development Review and analysis of incidents escalated from Incident Response Team and conduct additional advanced investigative measures including content creation for tools Work closely with Threat Intelligence and Incident Response teams to proactively and reactively identify IOCs and additional content needed for hunting and response. Create test content used for hunting and detection based on findings , threat intelligence and other sources for proactive threat identification Work closely with Threat intelligence team to create threat models and maps for operational and tactical threat identification and hunting Perform gap assessment reviews on network and system resources to identify threat vectors , this includes conducting a tooling reviews and providing recommendations Examine artifacts from network traf c and hosts to determine 0 - day attack evidence Perform malware and deep dive analysis on incidents to determine all IOC s and other technical activities occurred from the incident Requirements Bachelor s degree AND at least 5 years of experience in security specific profession with leadership responsibility OR a high school diploma (or equivalent) AND 7 years of experience in a security specific profession leadership responsibility Two or more quali ed certi cations including: GCIA , GCIH , CISSP , CISM , GXPN , GREM , OSCP or equivalent a plus Strong abilities to communicate through oral and written methods to internal and external stakeholders Excellent customer service skills Abilities to measure , report , and present metrics that show performance of the Cyber Security Forensics , Reverse Engineering & Threat Hunting Team Ability to find , analyze , interpret , and extract attack related payload from packet captures and host forensic images using tools Advanced forensics and data carving capabilities from memory images , host images , and traffic captures for analysis Experience conducting analysis and creating content for IDS , Firewalls , SIEM and other security monitoring tools Experience working with and creating content for network forensics tools like Netwitness or Security Analytics a plus Experience with Malware , digital forensics techniques and various commercial and open source tools Must be willing to travel as required to respond to an incident (less than 10% travel) Must be available to work on - call or off hours as needed to respond to an incident,
Keyskills :
opensourcecybersecuritycustomerservicecontentcreationmonitcontentdevelopmentreverseengineeringthreatintelligencegapidsiocsiemngtoolsdigitalfensicsnetwensicssecuritymoniting