AVP, Lead Detection and Incident Responder(L11)

Hyderabad IN

Synchrony

Find great deals, promotional offers, credit cards, savings products, payment solutions, and more. See how Synchrony can help you today!

View all jobs at Synchrony

Apply now Apply later

Job Description:

Role Title: AVP, Lead Detection and Incident Responder

Company Overview: Share a brief overview of the company (Standard write-up sourced from HR)

COMPANY OVERVIEW: Synchrony (NYSE: SYF) is a premier consumer financial services company delivering one of the industry’s most complete digitally enabled product suites. Our experience, expertise and scale encompass a broad spectrum of industries including digital, health and wellness, retail, telecommunications, home, auto, outdoors, pet and more.

  • We have recently been ranked #5 among India’s Best Companies to Work for 2023, #21 under LinkedIn Top Companies in India list, and received Top 25 BFSI recognition from Great Place To Work India. We have been ranked Top 5 among India’s Best Workplaces in Diversity, Equity, and Inclusion, and Top 10 among India’s Best Workplaces for Women in 2022.

  • We offer 100% Work from Home flexibility for all our Functional employees and provide some of the best-in-class Employee Benefits and Programs catering to work-life balance and overall well-being. In addition to this, we also have Regional Engagement Hubs across India and a co-working space in Bangalore.

Organizational Overview:

The core functionality of JSOC team within Synchrony is to provide continuous monitoring and response to cyber threats against Synchrony, its employees, its customers and partners. We do this by developing best in class detection, response and containment capabilities through automation, orchestrations and machine learning.

Role Summary/Purpose:

The AVP, Lead Detection and Incident Responder​ ​is part of the Synchrony Joint Security Operations Center (JSOC) and is responsible leading cyber detection of information security alerts and investigating/reporting of major information security incidents supporting all business units.  The candidate would have a both technical and people leadership position focused on the detection and response program operation consisting of detection, response, mitigation, reporting of cyber security incidents and conducting assignments for escalated incidents.  The candidate is expected to have a strong understanding of both traditional on-premise security and cloud management plane (also known as cloud control plane) security. As a people leader candidate will be handling the day-to-day shift operations, documenting, and implementing the rotation schedule, mentoring junior analyst in the team, and providing feedback and tracking their technical competency. 

Key Responsibilities:

The JSOC coordinates with IT, Legal, Human Resources, and other appropriate business units to gather incident details, assess impact, and coordinate response. This role requires experience in all phases of Cyber Detection and Incident Response including preparation, notification, response, recovery, analysis, and post-mortem. The candidate must be familiar with communication technologies, communications protocols and emerging cloud security practices. The candidate that fulfills this role will be expected to have process documentation experience and excellent intra-business relationship experience. This role interacts with all levels of the organization, particularly within the IT organization and is viewed as a subject matter expert.  Specific responsibilities include:

  • Respond to security incidents across a wide array of technologies, mitigate and contain impacts, coordinate remediation efforts, summarize and make recommendations to Sr. Management for improvements.  Security technologies utilized by the JSOC team includes: Security Incident and Event Management (SIEM), Security Orchestration Automation and Response (SOAR), Endpoint Detection and Response (EDR), Web Application Firewall (WAF), network perimeter firewall, enterprise email security, User and Entity Behavioral Analytics (UEBA), and Cloud Access Security Broker (CASB) toolsets.

  • Provide technical leadership and expertise to enable proactive detection of potential security threats and recommendations for improvements in overall security posture.

  • Work with members of the Cyber Intelligence team to develop and implement threat detection logic to counter emerging cybersecurity threats.

  • Develop and enhance Detection and Incident Response processes and procedures leveraging relationships with front line operations teams and exploiting tools and systems.

  • Document findings and create detailed reports for constituency both in written and verbal formats.

  • Enumerate risks and prioritize mitigation efforts based on clear business priorities.

  • Coordinates IT resources to effectively perform incident response tasks.

  • Supervises formal incident response tasks and takes responsibility for successful execution of incident response plan.

  • Performs incident response tasks to contain exposures from an incident.

  • Authors incident response reports and lessons learned to include root cause analysis.

  • Identify and recommend process improvements.

Desired Skills/Knowledge:

  • Strong verbal and written communication skills.

  • Ability to perform logical problem solving.

  • Experience of working in high performing teams and understand the dynamics of teamwork in a SOC environment

  • Experience managing SOC team in the past.

  • Industry certifications such as CISSP, GCIH, AWS Certified Cloud Practitioner, AWS Certified Security – Specialty, and other cybersecurity certifications are a plus.

Eligibility Criteria:

Bachelor’s degree and a minimum 6 years of work experience or Computer Science or a related discipline OR in in lieu of a degree, a High School Diploma/GED and minimum 8 years equivalent work experience.  Additional requirements include:

  • Minimum of 5 years of years of experience in information security or related technology experience required, experience in the securities or financial services industry is a plus.

  • Minimum 5 years of cyber security and incident response or security operations related to the detection, analysis, containment, eradication and recovery from cyber security incidents.

WORK TIMINGS:  Rotational Shifts
This role qualifies for Enhanced Flexibility and Choice offered in Synchrony India and will require the incumbent to be available between 06:00 AM Eastern Time – 11:30 AM Eastern Time (timings are anchored to US Eastern hours and will adjust twice a year locally). This window is for meetings with India and US teams. The remaining hours will be flexible for the employee to choose. Exceptions may apply periodically due to business needs. Please discuss this with the hiring manager for more details.

For Internal Applicants:

  • Understand the criteria or mandatory skills required for the role, before applying

  • Inform your manager and HRM before applying for any role on Workday

  • Ensure that your professional profile is updated (fields such as education, prior experience, other skills) and it is mandatory to upload your updated resume (Word or PDF format)

  • Must not be any corrective action plan (First Formal/Final Formal, PIP)

  • L8+ Employees who have completed 18 months in the organization and 12 months in current role and level are only eligible.

  • L8+ Employees are eligible to apply

Grade/Level: 11

Job Family Group:

Information Technology

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  3  0  0

Tags: Analytics Automation AWS CASB CISSP Cloud Computer Science EDR Firewalls GCIH Incident response Machine Learning Monitoring SIEM SOAR SOC Threat detection

Perks/benefits: Career development Flex hours Health care Wellness

Regions: Remote/Anywhere Asia/Pacific
Country: India

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.