https://bayt.page.link/CSHNvtxNe2DWiZFA9
أنشئ تنبيهًا وظيفيًا للوظائف المشابهة

الوصف الوظيفي

Ankura is a team of excellence founded on innovation and growth.


  • Location: Conditional Remote / Gurgaon
  • Hours: 40 hours a week
  • Reporting: Director - Threat Detection Operations (TDO)
  • Duties include providing On-Job Training to fellow Senior Analysts and Analysts, continuous monitoring of Security Information Event Management (SIEM), EDR, XDR and related platforms for correlated events and alerts and working with the client to take action. Senior Analysts leverage events to determine the impact, document possible causes, and provide useful information to clients.
  • A deep understanding of various commercial and open-source network sensors, intrusion detection systems, and event log correlation engines is required as senior analysts are expected to deliver enhanced threat awareness and knowledge through research and continuous improvement of use cases, signatures, and metrics.
  • Expected to help automate anomaly detection and alerting while documenting security incidents, processes, investigations, and remediation efforts.
  • Senior Analysts are also expected to maintain open communication and visibility with their team members, Directors, and Clients.
  • Usually, employees will be permitted to work remotely in the current operational setup however that setup may change based on company and/or business needs, with or without notice. It may also be considered a conditional privilege as the employees are personally responsible to maintain uninterrupted availability and communication via all official channels throughout their designated shifts. If the employee's performance cannot be satisfactorily ascertained by their manager or the employee is unable to adapt to work without disturbance, they may be called upon to work out of the company’s office.

CAPABILITIES


  • Knowledge of IR process, ticketing tools, Knowledgeable in various IR response commands related to Windows, Linux
  • Strong knowledge on advanced attack techniques related to Endpoints and servers, Threat hunting using EDR/XDR.
  • Experience in handling latest attack techniques LOLBAS, fileless malware etc.
  • Experience in monitor globally emerging threats, vulnerabilities, malicious activities etc. research about the same and reports to concerned teams and management for proactive actions.
  • Must have knowledge of various OSINT tools: VirusTotal, Cisco Talos Intelligence, IBM X-force Exchange, URL.io etc. during the investigation of security alerts.
  • Capable to handle a team of L1 analysts, impart training etc
  • Must have experience of Vulnerability management to identify emerging risks in organization's environment using Qualys, Nessus, MS-Defender etc
  • Knowledgeable about Automation and SOAR
  • Must have the necessary experience to conduct initial triage and in depth analysis of security events and incidents; determine the priority, criticality, and impact; facilitate communication within the client's SOC, escalate to the  for containment and remediation, and document/journal progress throughout the Incident Response Lifecycle within the respective service level objectives.
  • Required to have experience in conducting research analysis and data gathering requirements to present in a report format.
  • Should be detail-oriented and able to work independently and communicate effectively both verbally and in writing.Must be flexible enough to work in a 24x7 rotational shift setup, including overnight, weekend, and national holidays.

TECHNICAL


  • Emerging SIEM/XDR such as MS Azure Sentinel, SentinelOne
  • Experience with security tools: Nessus, Burpsuite, Acunetix, Kali Linux
  • Strong knowledge on XDR tools such as Sentinel One, Cortex, CrowdStrike, Microsoft etc
  • Understanding of KQL, Lucene, Python, and/or other similar programming/query/scripting languages
  • Proficient in finetuning detection rules of XDR, creation of SOPs, Playbooks for various scenarios and techniques

EDUCATION, EXPERINCE, TRAINING & CERTIFICATIONS


  • Minimum Experince in SOC/IR/VM 4 yrs plus 
  • Preferred to have a degree in CS/IT or a Masters's Diploma in the field of IT Security.
  • Certifications such as CEH, Security+ CHFI,ACE, and specific to vendor XDR tools SentinelOne cortex, Microsoft CrowdStrike etc

COMMUNICATION


  • Comfortable working in a remote work environment including web-based team management and collaboration applications, and time-keeping systems e.g. Slack, Microsoft Teams, Intapp, and Workday.
  • Ability to communicate complex ideas effectively, both verbally and in writing in English and the local office language(s)
  • Able to provide reports showing progress or achievement of assigned goals and responsibilities as required.
  • Must be an active listener and ask questions of others when clarity is needed
  • Ability to gain an understanding of client needs and apply analytic reasoning
  • Demonstrates proactive engagement in meetings and process discussions

KEY PERFORMANCE INDICATORS


  • Analyze client networks for threats using analytical platforms for event monitoring such as NSM, SIEM, UEBA, ETDR.
  • Deliver client reports based on analyses that are timely, high quality, and accurate.
  • Understand and support incident response and triage
  • Improve reporting to avoid ‘analysis paralysis’.
  • Develop new skills within analytical platforms

INDIVIDUAL & TEAMWORK


  • Must be able to effortlessly switch between independent and team-based work
  • Understands that the work product is dependent on team efforts and remains responsive to internal and external deadlines
  • Able to share expertise and experience with team members to encourage growth and shared success
  • Able to maintain focus and attention to detail for sustained periods of time
  • Engaged in supporting the development and growth of all team members

GROWTH MINDSET


  • Can receive and provide feedback in a constructive manner that leads to the growth of self and others.
  • Displays perseverance of effort and passion for a long-term goal and end state.
  • Works well under timelines and puts in extra effort as required to meet timelines.
  • Self-motivated to identify areas for team & process improvement and collaborate with others to develop creative solutions

LEADERSHIP TRAITS


  • Willing to adapt leadership skills to support larger and more complex projects.
  • Work product for self and team is consistently of excellent quality and efficiency.
  • Respectful and professional in all interactions with team members, clients, and colleagues.
  • Maintains composure and calm disposition under high-pressure or stressful circumstances.

#LI-JK1


Ankura is an Affirmative Action and Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against based on disability. Equal Employment Opportunity Posters, if you have a disability and believe you need a reasonable accommodation to search for a job opening, submit an online application, or participate in an interview/assessment, please email accommodations@ankura.com or call toll-free +1.312-583-2122. This email and phone number are created exclusively to assist disabled job seekers whose disability prevents them from being able to apply online. Only messages left for this purpose will be returned. Messages left for other purposes, such as following up on an application or technical issues unrelated to a disability, will not receive a response.


لقد تجاوزت الحد الأقصى لعدد التنبيهات الوظيفية المسموح بإضافتها والذي يبلغ 15. يرجى حذف إحدى التنبيهات الوظيفية الحالية لإضافة تنبيه جديد
تم إنشاء تنبيه للوظائف المماثلة بنجاح. يمكنك إدارة التنبيهات عبر الذهاب إلى الإعدادات.
تم إلغاء تفعيل تنبيه الوظائف المماثلة بنجاح. يمكنك إدارة التنبيهات عبر الذهاب إلى الإعدادات.