Lead Information Security Analyst
Mumbai, IN
Nomura
Nomura Holdings website. Group companies, news releases, services, CSR, IR, careers information.Division Overview:
The Global Information Security teams are responsible for the confidentiality, integrity and availability of the firm’s information and assets. Responsible for maintaining, communicating and raising awareness of the Policy. Facilitate the effective implementation and compliance of the firm’s polices.
The Global Information Security Team is based in Europe, Asia, India and America.
Business Unit Overview:
The team’s focus is to serve as the single point of contact for all Information security related queries, concerns, and technologies. Provide a high standard of user and business support in a responsive and timely manner across all businesses, take responsibility and ownership for maintaining the global strategy and controls for the delivery and operational deployment of global security initiatives in a manner consistent with the common business goals and objectives.
Technologies Covered:
Exposure to Cloud, Endpoint, Application and network security investigations – like – NDR, IPS, EDR, ATP, Malware defences and detection development on this technologies.
Threat hunting experience based on Static, Dynamic and Behaviour.
Knowledge of common adversary tactics and techniques, e.g., obfuscation, persistence, Defense evasion, etc.
Knowledge of Mitre ATT&CK framework preferred
Good Experience at least 3+ years in IR and Knowledge on handling advance incident response.
Exposure in query development for rule development on Elastic or any Data lake platform.
Good understanding of network traffic logs from different systems with analysis including TCP/IP, routing, switching, protocols, etc.
Strong understanding of Windows / Linux event log analysis
Programming and scripting skills - proficient knowledge of Powershell is a plus
Excellent troubleshooting and analytical thinking skills
Excellent understanding on Malware Techniques and Malware analysis skills.
Strong documentation and communication skills
Passion for all things information technology and information security
Natural curiosity and ability to learn new skills quickly.
Skills & Experience
At least 4+ years of experience within a cybersecurity incident L3/ Advance investigation environment; experience in a leadership role is preferred
Experience in a security operations centre, or similar environment, and identifying indications of compromise or attack and responding to incidents.
Position Specifications:
Corporate Title
Associate
Functional Title
Lead Support Analyst
Experience
8 - 10 years
Qualification
B.E / B.Tech / MCA / M.Tech
Requisition No
8211 - Position ID - ITIND10015896
Role & Responsibilities:
- 8+ years of demonstrated experience in performing technical analysis and enrichment of pertinent attacks, threats and their indicators.
- Sound Knowledge on developing use cases in Elastic and EDR based on MITRE ATT&CK framework
- Working knowledge of Machine Learning and User Behaviour Analytics as it pertains to baselining normal to determine outliers and anomalous behaviours.
- Ability to manage complex security scenarios and develop innovative solutions to address the most recent cyber threats
- Maintain supervision over operational tasks and provide day-to-day oversight for Incident Response Analysts and Incident Leads
- Oversee analysts in their investigation and response activities when security incidents arise to determine possible cause and resolution
- Effectively communicate information to stakeholders of all levels
- Demonstrate experience in network and host-based intrusion analysis, incident response processes and procedures, digital forensics and/or handling malware
- Acting as a lead throughout incident scenarios and provide subject matter expertise in cybersecurity incident response
- Successfully executing incident handling procedures as well as direct response to cyber security incidents
- Maintaining current knowledge and recognition of attacker tools, tactics, and procedures to produce indicators of compromise (IOCs) that can be utilized during active and future investigations
- Assessing cyber threat intelligence/open source intelligence and operationalizing that information
- Demonstrating real-world, hands-on experience dealing with sophisticated malware and dynamic cyber threat actors
- Identifying current and emerging threats and application of such research
Mind Set
Mandatory
Desired
Domain
- Mandatory hands on experience on below mentioned Domains / Tools: (Must have Any One) - Elasticsearch (ELK) / Sqrrl / Crowd strike / Fireeye Mandiant HX / SOAR / Cloud Incident Response
- Hands-on experience on Sysinternals / Sysmo
- Hands on experience Any Malware analysis tool like Cuckoo, Cisco threat grid, Threat connect
- Strong knowledge of Cyber Detection technologies like (Advanced Threat Detection Tools, UEBA Tools, Network Packet Analysis, Endpoint Protection)
- Should be able to investigation Spam and Malware samples.
- Certifications Preferred: CISSP, CCSP, GCIH, GCFA
- Strong communication skills, ability to work comfortably with different regions
- Actively participate within internal project community
- Good team player, ability to work on a local, regional and global basis and as part of joint cross location initiative
- Self-motivated, able to work independently and with a team
- Able to perform under pressure.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics CCSP CISSP Cloud Compliance EDR Elasticsearch ELK Forensics GCFA GCIH Incident response IPS Linux Log analysis Machine Learning Malware MITRE ATT&CK Network security Open Source PowerShell Scripting SOAR Strategy TCP/IP Threat detection Threat intelligence Windows
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.