Manager, Detection and Response (L09)
Hyderabad IN
Synchrony
Find great deals, promotional offers, credit cards, savings products, payment solutions, and more. See how Synchrony can help you today!Job Description:
Role Title: Manager, Detection and Response (L09)
COMPANY OVERVIEW:
Synchrony (NYSE: SYF) is a premier consumer financial services company delivering one of the industry’s most complete digitally enabled product suites. Our experience, expertise and scale encompass a broad spectrum of industries including digital, health and wellness, retail, telecommunications, home, auto, outdoors, pet and more.
We have recently been ranked #2 among India’s Best Companies to Work for by Great Place to Work. We were among the Top 50 India’s Best Workplaces in Building a Culture of Innovation by All by GPTW and Top 25 among Best Workplaces in BFSI by GPTW. We have also been recognized by AmbitionBox Employee Choice Awards among the Top 20 Mid-Sized Companies, ranked #3 among Top Rated Companies for Women, and Top-Rated Financial Services Companies.
Synchrony celebrates ~51% women diversity, 105+ people with disabilities, and ~50 veterans and veteran family members.
We offer Flexibility and Choice for all employees and provide best-in-class employee benefits and programs that cater to work-life integration and overall well-being.
We provide career advancement and upskilling opportunities, focusing on Advancing Diverse Talent to take up leadership roles
Organizational Overview: The core functionality of JSOC team within Synchrony is to provide continuous monitoring and response to cyber threats against Synchrony, its employees, its customers and partners. We do this by developing best in class detection, response and containment capabilities through automation, orchestrations and machine learning
Role Summary/Purpose: The Manger, Detection and Response is part of the Synchrony Joint Security Operations Center (JSOC) and is responsible for being a subject matter expert in cyber detection of information security alerts and assisting in the investigation/reporting of major information security incidents supporting all business units. The candidate would have a management position focused on the detection and response program operation consisting of detection, response, mitigation, and reporting of cyber security incidents; documenting and implementing the rotation schedule and assignments for handling escalated incidents. The candidate is expected to have a strong understanding of both traditional on-premise security and cloud management plane (also known as cloud control plane) security.
Key Responsibilities: The JSOC coordinates with IT, Legal, Human Resources, and other appropriate business units to gather incident details, assess impact, and coordinate response. This role requires experience in all phases of Cyber Detection and Incident Response including preparation, notification, response, recovery, analysis.
Respond to security incidents across a wide array of technologies, mitigate and contain impacts, coordinate remediation efforts, summarize and make recommendations to Sr. Management for improvements. Security technologies utilized by the JSOC team includes: Security Incident and Event Management (SIEM), Security Orchestration Automation and Response (SOAR), Endpoint Detection and Response (EDR), Web Application Firewall (WAF), network perimeter firewall, enterprise email security, User and Entity Behavioral Analytics (UEBA), and Cloud Access Security Broker (CASB) toolsets.
Provide technical subject matter expertise to enable proactive detection of potential security threats and recommendations for improvements in overall security posture.
Required Skills/Knowledge:
Bachelor’s degree with minimum 2+ years of work experience in SOC, or in in lieu of a degree, minimum 4+ years SOC work experience.
Experience of working in high performing teams and understand the dynamics of teamwork in a SOC environment.
Strong verbal and written communication skills.
Ability to perform logical problem solving.
Desired Skills/Knowledge:
Industry certifications such as GCIH, AWS Certified Cloud Practitioner, AWS Certified Security – Specialty, and other cybersecurity certifications are a plus.
Experience in the securities or financial services industry is a plus.
Eligibility Criteria:
Bachelor’s degree with minimum 2+ years of work experience in SOC, or in in lieu of a degree, minimum 4+ years SOC work experience.
Work Timings: Rotational shifts including Night shifts (7:30am to 4:30pm IST/ 3:30pm to 12:30am IST/ 11pm to 8am IST).
For Internal Applicants:
Understand the criteria or mandatory skills required for the role, before applying
Inform your manager and HRM before applying for any role on Workday
Ensure that your professional profile is updated (fields such as education, prior experience, other skills) and it is mandatory to upload your updated resume (Word or PDF format)
Must not be any corrective action plan (First Formal/Final Formal, PIP)
L4 to L7 Employees who have completed 12 months in the organization and 12 months in current role and level are only eligible
L8+ Employees who have completed 18 months in the organization and 12 months in current role and level are only eligible
L04+ Employees can apply
Grade/Level: 09
Job Family Group:
Information Technology* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics Automation AWS CASB Cloud EDR Firewalls GCIH Incident response Machine Learning Monitoring SIEM SOAR SOC
Perks/benefits: Career development Health care Wellness
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.