Qualifications:
● Graduation/Post graduation in, Computers, Information Systems, Computer Science, or
Information technology systems
● 7 to 10 years of work experience in cyber security /Information security as L2 analyst.
● Should have at least one cyber security certification (CEH, CompTIA Security+ etc.)
...
● Knowledge of banking business and information technology practices and trends in
banking sector
● Understanding of technology-related issues and how they might impact business.
● Ability to communicate effectively, both orally and in writing.
● Knowledge of banking business and information technology practices and trends in
banking sector.
Roles & Responsibilities
● In-depth knowledge of security concepts such as cyber-attacks and techniques,
threat vectors, risk management, incident management etc.● Utilized Carbon black EDR to proactively identify and response to advance threats
and security incident.
● Investigate and analyse complex security alerts and events to determine the root
cause, scope, and impact of security incidents.
● Able to deploy and manage Carbon black EDR also expert in troubleshooting the
agent related issues.
● Lead and coordinate incident response efforts, including containment, eradication,
and recovery action in collaborations with the management team.
● Develop and implement advance detection strategies using carbon black EDR to
enhance overall security posture.
● Provide technical guidance and mentorship to level 1 analyst, assisting with incident
investigation, analysis and resolutions.
● Conduct in depth analysis of endpoints data and logs to identify indicator of
compromise (IOCs) and advance attack technique.
● Contribute to the development and improvement of security processes, procedure,
and playbooks for incident response and threat hunting.
● Assist in the tuning and optimization if carbon black EDR policies, rules, and custom
queries to improve detection efficacy.
● Stay abreast of industry best practices, emerging technologies, and trends in
endpoint security and threat detection.
● Provide regular reports and updates on security incident trends, analysis findings,
and mitigation efforts.
● Investigate, document, and report on information security issues and emerging
trends.
● Knowledge of various operating system flavours including but not limited to Windows,
Linux, Unix.
● Knowledge of common Internet protocols and applications.
Personal skills:
• Good Team player
• Possess Positive and learning attitude
• Good Verbal and Written communication skills
• Sense of Ownership, Priorities and Autonomous
show more
Qualifications:
● Graduation/Post graduation in, Computers, Information Systems, Computer Science, or
Information technology systems
● 7 to 10 years of work experience in cyber security /Information security as L2 analyst.
● Should have at least one cyber security certification (CEH, CompTIA Security+ etc.)
● Knowledge of banking business and information technology practices and trends in
banking sector
● Understanding of technology-related issues and how they might impact business.
● Ability to communicate effectively, both orally and in writing.
● Knowledge of banking business and information technology practices and trends in
banking sector.
Roles & Responsibilities
● In-depth knowledge of security concepts such as cyber-attacks and techniques,
threat vectors, risk management, incident management etc.● Utilized Carbon black EDR to proactively identify and response to advance threats
and security incident.
● Investigate and analyse complex security alerts and events to determine the root
cause, scope, and impact of security incidents.
● Able to deploy and manage Carbon black EDR also expert in troubleshooting the
...
agent related issues.
● Lead and coordinate incident response efforts, including containment, eradication,
and recovery action in collaborations with the management team.
● Develop and implement advance detection strategies using carbon black EDR to
enhance overall security posture.
● Provide technical guidance and mentorship to level 1 analyst, assisting with incident
investigation, analysis and resolutions.
● Conduct in depth analysis of endpoints data and logs to identify indicator of
compromise (IOCs) and advance attack technique.
● Contribute to the development and improvement of security processes, procedure,
and playbooks for incident response and threat hunting.
● Assist in the tuning and optimization if carbon black EDR policies, rules, and custom
queries to improve detection efficacy.
● Stay abreast of industry best practices, emerging technologies, and trends in
endpoint security and threat detection.
● Provide regular reports and updates on security incident trends, analysis findings,
and mitigation efforts.
● Investigate, document, and report on information security issues and emerging
trends.
● Knowledge of various operating system flavours including but not limited to Windows,
Linux, Unix.
● Knowledge of common Internet protocols and applications.
Personal skills:
• Good Team player
• Possess Positive and learning attitude
• Good Verbal and Written communication skills
• Sense of Ownership, Priorities and Autonomous
show more