Threat analyst
Chennai, Tamil Nadu, India
Codincity Digital Technologies
Roles & Responsibilities:
- Prior experience administrating IT systems or networks (~3+ years), preferably with experience in both public cloud environments and physical data center locations.
- Solid understanding of SQL-like query languages and proficiency in data manipulation and analysis techniques to extract actionable insights from large and complex cybersecurity datasets.
- Ability to maintain a collected demeanor under high-pressure security incident response scenarios.
- Knowledge of the MITRE ATT&CK framework and its application to threat-hunting campaign scenarios, especially in hybrid cloud environments (preferred).
- Hands-on experience professionally administrating and securing both Windows and Unix/Linux operating systems, and an understanding of the common threats each is susceptible to.
- Thorough understanding of the OSI model and a wide range of common network protocols, enabling effective analysis, detection, and mitigation of security threats at various layers of the network stack.
- Experience, or exceptional aptitude, working with Security Information and Event Management (SIEM) platforms, including building and optimizing custom detection rules.
- Ability to monitor various security tools, logs, and threat intelligence feeds to detect potential cyber threats, including malware, phishing attempts, and unauthorized access attempts.
- Excellent communication skills with the ability to translate complex technical concepts and findings into clear and concise insights for non-technical stakeholders, fostering collaboration and informed decision-making across cross-functional teams.
- Solid understanding of scripting languages such as Python (preferred), Bash scripting, or PowerShell; prior experience using scripting to automate tasks.
- Familiarity with modern defense-in-depth security tools and technologies such as Intrusion Detection and Prevention (IDS/IPS), Endpoint Detection and Response (EDR) solutions, Cloud Native Application Protection Platform (CNAPP), and Web Application Firewalls (WAF).
- Enthusiasm for security automation and creative technical ability to identify time-saving or novel automation workflows.
- Proven understanding of cloud infrastructure concepts, paradigms, and associated security threats.
- Proven understanding of common web-based attacks at runtime (e.g., those listed in the OWASP Top 10), and how to respond/mitigate them operationally. Must have strong cloud security and log investigation skills.
- Proven understanding of identifying and mitigating email-based threats, including phishing, malware, and spoofing. Hands-on experience with administering and configuring email security tools and protocols to safeguard against these threats is a bonus.
- Analyze security events and incidents to identify threats, attack vectors, and potential impact. Utilize threat intelligence to improve detection and prevention strategies.
- Investigate and respond to phishing attempts and email-based threats, with a foundational understanding of phishing techniques and indicators. Implement and manage email security solutions.
- Manage and track security incidents through to resolution. Participate in live incident handling, including containment, remediation, and recovery efforts.
- Use SIEM tools to monitor security events across both on-premises and cloud environments. Apply cloud security principles to identify and address threats specific to cloud-based infrastructure and applications.
- Demonstrate knowledge of SOC principles, SIEM technologies, and attack handling. Experience with cloud security concepts is essential.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
5
0
0
Categories:
Analyst Jobs
Threat Intel Jobs
Tags: Automation Bash Cloud CNAPP EDR Firewalls IDS Incident response Intrusion detection IPS Linux Malware MITRE ATT&CK OWASP PowerShell Python Scripting SIEM SOC SQL Threat intelligence UNIX Windows
Region:
Asia/Pacific
Country:
India
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Information Security Specialist jobsInformation System Security Officer jobsSenior Security Analyst jobsSenior Cloud Security Engineer jobsSenior Cybersecurity Engineer jobsSystems Administrator jobsSystems Engineer jobsInformation Security Manager jobsSenior Information Security Analyst jobsSenior Network Security Engineer jobsCyber Security Specialist jobsIT Security Engineer jobsIT Security Analyst jobsChief Information Security Officer jobsSecurity Specialist jobsSecurity Consultant jobsInformation System Security Officer (ISSO) jobsInformation Systems Security Engineer jobsSenior Cyber Security Engineer jobsCyber Threat Intelligence Analyst jobsSenior Product Security Engineer jobsSenior Information Security Engineer jobsCyber Security Architect jobsThreat Intelligence Analyst jobsSenior Software Engineer jobs
Java jobsEncryption jobsBash jobsTS/SCI jobsEDR jobsIDS jobsThreat detection jobsSQL jobsIPS jobsSplunk jobsMalware jobsTerraform jobsSDLC jobsTop Secret jobsSOC 2 jobsFinance jobsForensics jobsDocker jobsRMF jobsIntrusion detection jobsCompTIA jobsActive Directory jobsGIAC jobsITIL jobsOWASP jobs
VPN jobsData Analytics jobsDoDD 8570 jobsHIPAA jobsOSCP jobsAnsible jobsIT infrastructure jobsTCP/IP jobsCRISC jobsSAP jobsUNIX jobsCCSP jobsBanking jobsSANS jobsSOAR jobsClearance Required jobsMITRE ATT&CK jobsSOX jobsJavaScript jobsMachine Learning jobsSecurity strategy jobsZero Trust jobsDNS jobsJira jobsNIST 800-53 jobs