Cyber Threat Investigator
Company:
Adani Enterprises Limited
Location:
Ahmedabad, Gujarat, India
The position of Threat Hunter is responsible for analyzing and correlating large data sets to uncover novel threats and attack techniques that may be present within the organization’s Environment A Threat Hunter also will be tasked with and collaborating with other team and will be part of cyber defense center team to identify opportunities to develop analytical methods to detect advanced threat actors who utilize emerging tactics and techniques. In support of these processes, the role will also include developing and documenting new and innovative threat hunt hypotheses to increase the team’s ability to find existing threats that are otherwise going unidentified or unnoticed.
Roles and Responsibilities
- Responsible for analyzing and correlating large data sets to uncover novel threats and attack techniques that may be present within the organization’s Environment
- He / She will be part of cyber defense center team to identify opportunities to develop analytical methods to detect advanced threat actors who utilize emerging tactics and techniques.
- In support of these processes, the role will also include developing and documenting new and innovative threat hunt hypotheses to increase the team’s ability to find existing threats that are otherwise going unidentified or unnoticed.
- The role will be working part of Security Operation Center operational and technical teams to gain insight into critical security controls and architectural specifics to develop valuable hunt strategies and analytics that identify malicious behavior accurately while maintaining a low false positive rate.
- This role advises on and reviews product assessments, policy adjustments, and architectural transformations that impact the Cyber Security at Group level, and will be a thought leader in the design of cutting-edge detective, preventative, and proactive controls
- Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis, and incident response
- Lead Threat Hunting activities and mentor junior staff
- Work with key stakeholders to implement remediation plans in response to incidents
- Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership
- Author Standard Operating Procedures (SOPs) and training documentation when needed
- Generates end-of-shift reports for documentation and knowledge transfer to subsequent analysts on duty
- Should be comfortable to be part of 24*7 SOC services, including night shift.
Educational qualifications:
- Bachelor’s degree relevant to Information Technology, Computer Science/Engineering (or equivalent).
- Advanced certification desirable GCIH, GCIA, GCFE, GREM, GCFA, GSEC Experience:
Experience
- Minimum 3+ years in a Threat Hunting role and overall 5 to 10 years in Cyber Security
- Experience in a technical role in the areas of Security Operation, Incident Response, Detection Engineering, Offensive Security/Red Team, or Cyber Threat Intelligence.
- Strong experience in SIEM (Security Incident and Event Monitoring) processes and Products (e.g., Microsoft Sentinel, EDR)
- Experience analysing system, network, and application logging for attack techniques at all stages of the cyber kill chain/MITRE framework.
- Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways
- Ability to navigate and work effectively across a complex, geographically dispersed organization.
- Deep packet and log analysis
- Windows forensic and Malware Analysis
- Cyber Threat and Intelligence gathering and analysis
- Bachelor’s degree or equivalent experience
- Knowledge and experience with scripting and programming (Python, PERL, etc.) are also highly preferred
- Process improvement, project management, ISO, six sigma certifications are preferred