SAP | Cyber Incident Response and Recovery Investigator | Bengaluru | 12-03-25 | JobId: 12179

0
1

Industry Type:
Risk / Safety / Compliance / Privancy / Security

Job Detail:

In this role, you will not only conduct an initial assessment of the event, but also help scope and determine root cause analysis, support development of attack remediation strategies and coordinate the communication and handling of escalations of security activities. This role also triages operational response processes like those intervening in phishing campaigns. You will also assist in the review and updating of incident handling processes, standard operating procedures, playbooks and runbooks.

You will work with Detection and SIEM teams to make improvements to detection and alerting mechanisms and support forensic investigations to determine incident details and provide supporting evidence.

What you bring

You should have demonstrated experience in cyber-attack analysis and of working in a similar 24/7 environments managing cases with enterprise SIEM or Incident Management systems. Previous experience of supporting multi-function, cross-organizational teams is also highly desirable.

We are looking for analytical, critical thinkers, who have an eye for detail and are solution orientated. You should be quick to learn and adapt and operate in a dynamic environment.

You typically will have most of the following technical skills and experience:
8+ years experience in a similar incident Investigator role or equivalent combination of education, certifications, and trainings
Security certification (e.g. Security+, GCIA, GCIH, CISSP)
Knowledge APT actors; their tools, techniques, and procedures (TTPs)
Knowledge of TTP methods and frameworks
Knowledge of TCP/IP communications knowledge of how common protocols and applications work at the network level, including DNS, HTTP, and SMB
Solid knowledge of one or more:
Windows/AD file system, registry functions and memory artifacts
Unix/Linux file systems and memory artifacts
Mac file systems and memory artifacts
Database, web application, cloud, or mobile device cyber incident response principals and techniques
Cybersecurity automation
Web servers and web applications.
SIEM
Security tools: IPS, Web proxy, Email proxy, pDNS, Deception, EDR etc….
Experience with one or more scripting languages (Powershell, Python, Bash, etc.)
Experience with integration of threat hunting and cyber threat intelligence into the incident response process
Experience with information security compliance audit frameworks and requirements e.g. ISO, FISMA, FedRAMP, SOC, SOX, PCI, GDPR and Data Privacy

Apply Here:

🔍 Explore All Related ITSM Jobs Below! 🚀 ✅ Select your preferred "Job Category" in the Job Category Filter 🎯 🔎 Hit "Search" to find matching jobs 🔥 ➕ Click the "+" icon that appears just before the company name to see the Job Detail & Apply Link 📝💼

LEAVE A REPLY

Please enter your comment!
Please enter your name here