FIND YOUR DREAM JOB

Sign In
 [New User? Sign Up]
Mobile Version

Security Services Specialist


Source:
TIMESJOBS.COM
Location:
Bengaluru, KA
Date:
19-11-2016
Job Code:
58329096
Categories:
  • IT
Applying for this job will take you to an external site
  •  
  • Shortlist
  • Email Friend
  • Print

Job Details

Candidate will be responsible for implementing, monitoring and conducting forensic analysis on a multitude of security tools within heterogeneous environments in support of Security Monitoring, Forensics and Threat Intelligence discipline.The individual will perform security monitoring, investigations and perform analysis of events in order to thwart internal and external threats to the environment.Additionally, will collaborate on an ongoing basis with the Cyber Security Rapid Response Incident Response Team to support detection, triage, incident analysis, containment, remediation and reporting of events/incidents while coordinating, balancing business priorities, emerging and actual threats and best practices to ensure the confidentiality, integrity and availability of information assets.Conduct Security Monitoring activities to provide Security in Depth visibility into potential known and unknown threats that may pose risk to the IBM environment.Participate in security incidents and act as technical Subject Matter Expert during significant security incidents.Review of alerts from Managed Security SOC providers, log correlation, log analysis, determining malicious software behavior, vetting out False Positives, remediating system mis configurations, tracking system state changes, and other information across multiple systems. Finally, leveraging outputs to support forensic reconstruction as needed.Collaborate and serve as liaison to Managed and/or Unmanaged Security Service providers.Conduct Operations surrounding cyber security incident response technologies including network logging and forensics, security information and event management tools, security analytics platforms, log search technologies, and host based forensics as applicable.Act as an internal information security consultant to the business and technology units, advising on risks, threats and control practices related to Rapid Response.Develop and manage ongoing Cyber Security Training and Awareness to stakeholders.Threat IntelligenceOperate Cyber Intelligence discipline that will provide a systematic, continuous process to identify, organize, analyze, understand and visually represent intelligence information about an adversary and their operational environment (physical, information, and cognitive dimensions) as a core component of Threat Intelligence program.Analyze global and regional threat data and correlate to any existing intelligence. Actively monitor and research cyber threats with a direct or indirect impact to the corporate brand, business operations, technology infrastructure and client trust.Actively engage in liaison activities with intelligence communities.Engage in pro-active Intelligence collection, root cause analysis, reporting of threat intelligence from both internal and external sources.Prepare reports that document security breaches and the extent of the damage caused by the breaches or security incidents. Provide expertise in identifying key cyber threat issues through a variety of intelligence resources available and proactively advise on remediation processes.Advise management on tactical and strategic methodologies to proactively thwart Cyber Security incidents.Produce weekly and monthly Cyber Intelligence Bulletins based on current posture. Produce technical and non-technical high-quality presentations, recommendations and findings for applicable stakeholders.Collaborate with counterparts across the Intelligence Community.Collaborate with all information assurance security professionals to identify IT security, physical & procedural shortfalls.ForensicsImplement and conduct ongoing Forensic Services.Establish repeatable process for Forensic support environment (i.e. Recovering deleted files, reconstructing internet history, using GREP search techniques, analyzing metadata, carving unallocated clusters, analyzing registry files, imaging files from servers and RAID arrays, and similar forensic techniques).Knowledge of computer evidence and forensics application tools including EnCase, FTK, NetAnalysis, NetWitness, Helix, Raptor, and others.Expert knowledge of incident response processes (detection, triage, incident analysis, remediation and reporting).Conduct digital investigations including incident handling and response, network and computer forensics, malware and memory analysis."Conduct Security Monitoring activities to provide Security in Depth visibility into potential known and unknown threats that may pose risk to the IBM environment.Participate in security incidents and act as technical Subject Matter Expert during significant security incidents.Review of alerts from Managed Security SOC providers, log correlation, log analysis, determining malicious software behavior, vetting out False Positives, remediating system misconfigurations, tracking system state changes, and other information across multiple systems. Finally, leveraging outputs to support forensic reconstruction as needed.Act as an internal information security consultant to the business and technology units, advising on risks, threats and control practices related to Rapid Response.Develop and manage ongoing Cyber Security Training and Awareness to stakeholders.How we ll help you growYoull have access to all the technical and management training courses you need to become the expert you want to beYou ll learn directly from expert developers in the field; our team leads love to mentorYou have the opportunity to work in many different areas to figure out what really excites youQualificationsHe/she should have a minimum of five years of experience in Cyber Security discipline and experience managing Technical Teams in a large scale environment.Professional Certification One or more of the itemized professional certifications is highly desirable for this position; CISSP, CRISC, GISP, GIAC, or equivalent.Strong Information in System Security.
Degree: MCA/ PGDCA | ME/ M.Tech./ MS (Engg/ Sciences)

Additional Degree: BE/ B.Tech (Engineering) | BCA (Computer Application)

Experience: 5-10

Requirements

Application Programming | Project Leader/ Project Manager | System Administration | System Security
Applying for this job will take you to an external site

FEATURED JOBS

© Copyright 2015 Al Nisr Publishing LLC - powered by Gulf News