Job Description
Identify patterns and behaviours related to threat actors and propose improvements to detection and protection capabilities
Ability to communicate complex cyber-attacks to technical and non-technical audiences with recommended mitigating actions
Perform post incident lessons learned, root cause analysis and incident reporting
Conduct threat hunting across a large range of security solutions and products. Logs from SIEM, WAF, IPS/IDS, Network Anomaly, AV, EDR etc...
Lead and support Digital Forensics investigations and produce technical findings reports
Support team in driving continual improvements in incident response and threat detection
Required Technical and Professional Expertise
Required skills and experience:
Security incident response, coordination, communications, mitigation, and remediation
Experienced and hardworking Cyber Security Professional, specializing in Security Incident Response & Security Operations with a minimum of 3 years experience within a SOC or CSIRT Function
Identification of threats through to resolution/mitigation, providing clear and significant communication
Document security incidents both for reporting and case study perspective
Conduct malware analysis to determine capabilities and aid the response of an incident
Digital Forensics experience across open source and commercial tools with knowledge of industry standard process and methodology
Good interpersonal and communication skills
Ability to provide technical mentorship to both technical and non-technical audiences
Endpoint and network-based analysis. (EDR, WAF, IDS/IPS, NGFW, Network Anomaly etc.)
An in-depth knowledge of Windows and/or Linux/Unix & understanding of networking and common protocols.
Experience with Microsoft Azure Cloud Security products
Intelligence lead threat hunting and methodology
Ability to hunt for known and unknown threats
Any sector specific knowledge will also be helpful, an MSSP customer base covers many different sectors
Disassembly (low level programming language)/ reverse engineering experience will be helpful
Desirable/Preferable skills and experience:
Excellent technical security knowledge of network architecture, IT infrastructure, applications, and systems including an understanding of cloud services such as MS Azure and AWS
Industry recognised certification relating to Cyber Security Incident Response (desirable)
Offensive Security Certified Professional or equivalent (desirable)
GIAC certification in GCFE, GCFA, GCIH or GCIA (desirable)
SANS Defensive and DFIR certifications (desirable)
Solid grasp of any of the following security frameworks; NIST, PCI DSS, ISO:27001 or The Critical Security Controls for Effective Cyber Defence
Functional knowledge of Incident Response and Cyber Security Operations along with Cyber Kill Chain, MITRE ***@**, NIST CSF, OSINT, TTPs, IOCs, APTs and how to best apply
Understanding of compliance requirements and how these relate to cyber security business practises and controls
Here at Atos, diversity and inclusion are embedded in our DNA. Read more about our commitment to a fair work environment for all.
Job Classification
Industry: IT Services & Consulting
Functional Area / Department: Engineering - Hardware & Networks
Role Category: IT Network
Role: System Administrator / Engineer
Employement Type: Full time
Contact Details:
Company: Atos
Location(s): Kolkata
Keyskills:
Unix
PCI DSS
Linux
Networking
SOC
ISO 27001
Windows
Open source
Security operations
IPS