Shell | Hiring | Lead Cyber Threat Intel Analyst | BigDataKB.com | 2022-09-10

Before u proceed below to check the jobs/CVs, please select your favorite job categories, whose top job alerts you want in your email & Subscribe to our Email Job Alert Service For FREE

 

Job Location: Bangalore

The Role

As businesses leverage digitalization opportunities, their cyber-attack surface structurally increases, which can lead to business disruptions, data breaches and brand damage. High profile industry incidents show that these risks are real, and this has turned cyber resilience into a topic for Boards.

Cyber-attacks can have adverse effects such as brand reputation, destruction of assets and loss of information. Shell is acting to detect and respond to the continuous flow of these types of attacks.

As part of the Information Risk Management function, the CyberDefence capability has specific focus on identifying cyber threats, discovery of IT vulnerabilities, monitoring for cyber intrusions and response to security incidents and test our defenses.

As part of the CyberDefence capability the Threat and Analytics team in CyberDefence has three main areas of focus:

BigDataKB.com Jyotish
BigDataKB.com Jyotish - Career & Life Prediction
  • Understand the internal and external threat landscape, what threats to focus on and how these can be identified within Shell.
  • Find unknown active cyber security threats within Shell and weaknesses in our security controls by applying data analysis techniques to large, diverse sets of internal and external data.
  • Test if our security controls provide us the ability to protect, detect and respond to real cyber-attacks.

Our threat hunters have a passion in dissecting malware or tracking known actor groups and their infrastructure. They can translate techniques employed by adversaries into preventive or detective controls measures. You actively search through large, diverse sets of internal and external data to detect any unknown cyber security threats that are active within Shell based on latest threat intelligence. To close the potential visibility gap, the threat hunter is able to implement new indicators of compromise in our control environment. You will regularly come up with new hypotheses on how adversaries may be attacking us and will prove out your hypotheses based on Shell event data. Once the unknown becomes known, you will ensure that we automate our detection and hand it over to our Content Engineering team and 24×7 Monitoring team. The Threat and Analytics team is paramount to ensure we continuously improve our detection capabilities and keep track of the ever-increasing threat landscape.


Responsibilities


Threat Intelligence

  • Analyse threat intelligence (e.g. actors, hack tools, exploits, malware, etc) using a wide variety of sources and determine impact to Shell, including detailed technical analysis and verification of the intelligence.
  • Translate intelligence into threat scenario’s / security use cases that can be implemented within available surveillance capabilities. Recommend changes to Splunk policies, filters and rules to improve event detection.
  • Review available surveillance data to further develop and improve the threat scenario’s and use cases. Use your clearance with intelligence agencies to attend classified (“secret”) briefings and investigate applicability of obtained intelligence to Shell.
  • Ensure completeness of threat information sources used and evaluate whether additional sources must be included for daily analysis.
  • Setup and continuous improvement of threat intelligence processes, protocols, skills and tools.


Collaboration

  • Work across multiple organizations, cultures and service providers to pull together actionable information and management information.
  • Coordinate and compile threat intelligence from multiple sources into management information and actionable data and report out to relevant parties.
  • Establish a strong working relationship in/outside of IT and Shell.


Generic

  • Assist in discovery of cyber vulnerabilities and investigation of global cyber security incidents where required.
  • Lead improvement projects in the Threat & Analytics team.

Understanding the internal and external threat landscape is paramount for Shell to understand what threats to focus on and how these can be identified within Shell. Our Threat Intelligence Analysts maintain close relationships with intelligence agencies, the O&G industry and other relevant parties and internet sources to maintain an up-to-date view of the threat landscape. Threats will be analyzed and translated into intelligence that can be applied to our cyber detection capabilities for enhanced monitoring for adversaries relevant to Shell. Furthermore, you will be closely collaborating with other teams in IRM to ensure they have the latest relevant information required for risk decision making and prioritization of mitigating actions.

Translated Company Description

This role will not include responsibilities to manage staff and/or direct budget. The guidance you provide will be key to protecting Shell against potential or real cyber threats. This role will require good communication & relationship skills to ensure technical issues can be clearly communicated in business terms for appropriate decision making around mitigating actions. In this role, you will bring red teaming experience skill to a team of cyber security experts. Your work will directly to contribute to improved detection or prevention of cyber threats.

Due to the necessary handling of and access to highly sensitive and privileged information, the successful applicant of this position will need to agree to additional screening being conducted, before appointment. This would include the confirmation of CV, identity, right to work and qualifications, as well as checking additional items such as company directorships, credit/bankruptcy check and criminal record, as allowed under local legislation.


Requirements

  • Completed Master of Science education in Computer Science or similar.
  • Minimum of 13 years IT security experience with deep knowledge and experience of advance analysis (e.g. malware analysis, forensic investigations, packet level analysis, indication of compromise, etc)
  • Understanding of attack activities – scans, man in the middle, sniffing, (D)DoS, phishing, and abnormal activities such as worms, Trojans, viruses, privilege escalations, etc.

Disclaimer

Please note: We occasionally amend or withdraw Shell jobs and reserve the right to do so at any time, including prior to the advertised closing date. Before applying, you are advised to read our data protection policy. This policy describes the processing that may be associated with your personal data and informs you that your personal data may be transferred to Royal Dutch/Shell Group companies around the world. The Shell Group and its approved recruitment consultants will never ask you for a fee to process or consider your application for a career with Shell. Anyone who demands such a fee is not an authorised Shell representative and you are strongly advised to refuse any such demand. Shell is an Equal Opportunity Employer.

Apply Here

Submit CV To All Data Science Job Consultants Across Bharat For Free

LEAVE A REPLY

Please enter your comment!
Please enter your name here