REF51087N - Threat Intelligence Specialist - Mumbai/Gurugram
Mumbai, India
WNS Global Services
Company Description
WNS (Holdings) Limited (NYSE: WNS), is a leading Business Process Management (BPM) company. We combine our deep industry knowledge with technology and analytics expertise to co-create innovative, digital-led transformational solutions with clients across 10 industries. We enable businesses in Travel, Insurance, Banking and Financial Services, Manufacturing, Retail and Consumer Packaged Goods, Shipping and Logistics, Healthcare, and Utilities to re-imagine their digital future and transform their outcomes with operational excellence.We deliver an entire spectrum of BPM services in finance and accounting, procurement, customer interaction services and human resources leveraging collaborative models that are tailored to address the unique business challenges of each client. We co-create and execute the future vision of 400+ clients with the help of our 44,000+ employees.
Job Description
Job Summary:
The Lead Threat Intelligence Specialist will be responsible for gathering, analyzing, and disseminating threat intelligence to support our cybersecurity operations. This role requires a deep understanding of the threat landscape, advanced analytical skills, and the ability to communicate complex information effectively. Additionally, the Lead Threat Intelligence Specialist will manage and mentor a team of threat intelligence analysts, ensuring the team’s effectiveness and growth.
Key Responsibilities:
Collect and analyze threat intelligence from various sources, including open-source intelligence (OSINT), dark web monitoring, and threat feeds.
Identify and assess emerging threats, vulnerabilities, and attack vectors.
Develop and maintain threat intelligence reports, briefings, and advisories.
Collaborate with incident response teams to provide actionable intelligence during security incidents.
Monitor and analyze trends in cyber threats and provide strategic recommendations to enhance security posture.
Perform Weak Password Assessment activity
Red Team activities on BAS systems
Conduct threat hunting activities to proactively identify potential threats within the network.
Maintain and update threat intelligence databases and tools.
Liaise with external partners, industry groups, and government agencies to share and receive threat intelligence.
Provide training and awareness sessions on threat intelligence to internal teams.
Utilize tools such as Recorded Future and Group IB ASM for threat intelligence and analysis.
Perform activities related to weak password authentication and cybersecurity proof of concepts (POCs).
Lead, mentor, and manage a team of threat intelligence analysts, fostering a collaborative and high-performance environment.
Develop and implement team goals, objectives, and performance metrics.
Strong understanding of cyber threat intelligence frameworks such as MITRE ATT&CK.
Proficiency in using threat intelligence platforms and tools, including Recorded Future and Group IB ASM.
Excellent analytical and problem-solving skills.
Strong written and verbal communication skills.
Ability to work independently and as part of a team.
Experience with scripting and automation tools is a plus.
Proven leadership and team management skills.
Any Degree
Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), or Certified Threat Intelligence Analyst (CTIA) is a plus.
Experience with malware analysis and reverse engineering.
Knowledge of network security and endpoint protection technologies.
Familiarity with cloud security and hybrid environments.
Understanding of regulatory requirements and compliance standards.
Knowhow of tools such as Recorded Future, MISP, AnyRun, ASM, OSINT, BAS and Qradar
Qualifications
• Certifications such as CISSP, CEH, GIAC, or similar.• Experience with vulnerability management frameworks and prioritization methodologies.• Understanding of cloud security, API security, or microservices architecture.• Strong analytical and problem-solving skills with attention to detail.• Experience with threat hunting and advanced persistent threat (APT) detection.• Knowledge of regulatory requirements and standards in cybersecurity.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics APIs APT ASM Automation Banking CEH CISSP Cloud Compliance Finance GCIH GIAC Incident response Malware Microservices MISP MITRE ATT&CK Monitoring Network security OSINT POCs QRadar Red team Reverse engineering Scripting Threat intelligence Vulnerabilities Vulnerability management
Perks/benefits: Startup environment
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.