Consultant - EDR Job
Hyderabad, TG, IN
Applications have closed
Yash Technologies
YASH Technologies is a leading Digital Solution Company for Business IT Solutions. YASH is a Right Sized Technology Partner of Choice.YASH Technologies is a leading technology integrator specializing in helping clients reimagine operating models, enhance competitiveness, optimize costs, foster exceptional stakeholder experiences, and drive business transformation.
At YASH, we’re a cluster of the brightest stars working with cutting-edge technologies. Our purpose is anchored in a single truth – bringing real positive changes in an increasingly virtual world and it drives us beyond generational gaps and disruptions of the future.
We are looking forward to hire EDR Professionals in the following areas :
Position Name: Consultant - EDR and Threat Huntin
Description
YASH is a Digital services enabler organization delivering vast portfolio of digital services to customers across the globe. Our topline services include Cybersecurity services. We are looking for a candidate with strong EDR and Threat Hunting experience. This role will be part of vibrant YASH’s Cybersecurity – Security Operations Center services team.
Description:
We are seeking an experienced Threat Hunter to perform intelligence-driven network and endpoint analysis of artifacts to identify non-alerted security incidents. This impactful position will involve analysis of large amounts of data from multiple security tools, including various indicator feeds, SIEM, and several threat intelligence tools, etc. The individual in this role will perform the functions of threat hunting and serve as a liaison for Threat Services.
Position: 01
Location: Across India
Total Experience: 4 to 6 years
Key Responsibilities
- Responsible for monitoring the security patterns to identify, isolate, and detect the threats before attackers tend to exploit them.
- Design and run custom analysis models on security event information to discover active threats.
- Identify (hunting) security nuances and abnormalities in the environment.
- Develop use cases and actionable content to identify security variants that are currently not alerted within the environment.
- Testing and analyzing assets for potential security threats.
- Identifying possible security threats and determining the best security measures.
- Designing, implementing, and maintaining security protocols, policies, plans, and systems to cover all possible security threats.
- Coordinating and briefing a team of security specialists and assigning tasks.
- Meeting with clients to discuss security measures, provide information, and explained the designed system.
- Perform as an Information Security Resource in three or more of the following areas:
- Threat Intelligence
- Incident Response
- Log analysis (statistical modelling, correlation, pattern recognition, etc.)
- Reverse Engineering / Malware analysis
- Collaborate and support teammates and outside teams about threat hunting techniques/issues.
- Communication/rapport with other divisions and various peers
- Strong ability to identify needs & driving solutions, and providing guidance, in an autonomous manner.
Job Qualifications
- Bachelor's and/or master’s degree in IT Security, Engineering, Computers Science, or related field/experience
- 4+ years overall technical experience in either threat hunting, threat intelligence, incident response, security operations, or related information security field
- Deep understanding of common network and application stack protocols, including but not limited to TCP/IP, SMTP, DNS, TLS, XML, HTTP, etc.
- Advanced experience with security operations tools, including but not limited to:SIEM (e.g., Splunk, Sentinel), Network analysis (e.g., Net Witness, Palo Alto)
- Signature development/management (e.g., Spunk rules, Snort rules, Yara rules)
- EDR solutions (e.g., CrowdStrike, Tanium)
- Scripting experience (KQL, Python, Bash, PowerShell, GO, Perl, C/C++)
- Excellent analytical and problem-solving skills, a passion for research and puzzle-solving
- Strong communication (oral, written, presentation), interpersonal, and consultative skills.
At YASH, you are empowered to create a career that will take you to where you want to go while working in an inclusive team environment. We leverage career-oriented skilling models and optimize our collective intelligence aided with technology for continuous learning, unlearning, and relearning at a rapid pace and scale.
Our Hyperlearning workplace is grounded upon four principles
- Flexible work arrangements, Free spirit, and emotional positivity
- Agile self-determination, trust, transparency, and open collaboration
- All Support needed for the realization of business goals,
- Stable employment with a great atmosphere and ethical corporate culture
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Agile Bash C CrowdStrike DNS EDR Exploit Incident response Log analysis Malware Monitoring Perl PowerShell Python Reverse engineering Scripting Sentinel SIEM SMTP Snort SOC Splunk TCP/IP Threat intelligence TLS XML
Perks/benefits: Career development Flex hours Transparency
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.