Security Incident Investigation_CBS

Remote: 
Full Remote
Contract: 
Work from: 

Offer summary

Qualifications:

3-4 years of experience in security incident investigation with L2/L3 support., Proficient in networking concepts and security investigations., Experience with OS management, troubleshooting, and SIEM log analysis., Familiarity with security monitoring tools and threat recognition..

Key responsibilities:

  • Provide escalation response for security events and manage event triage and correlation.
  • Monitor SIEM platforms for security alerts and create dashboards for reporting.
  • Perform analysis duties including log reviews and incident triage.
  • Document case activities and engage in communications for efficient investigations.

CodersBrain logo
CodersBrain SME https://www.codersbrain.com/
201 - 500 Employees
See all jobs

Job description

Location: PAN India

JOB DESCRIPTION:
 
Must Have:
Please ensure the future candidates have at least 3 - 4 years of security incident investigation experience providing L2/L3 support. SOC experience/hunt is a strong plus. They must be proficient in Networking, working knowledge of networking concepts such as common TCP/UDP ports, TCP flows, LDAP, authentication, DNS components flow and analysis, HTTP response codes and be able to use this knowledge in security investigations.
OS Full-Service Management/Troubleshooting and have performed Device Level/SIEM Log Analysis. Recognize threats such as but not limited to DDOS, APT lifecycle (including Data exfiltration attempts).
Day to Day Responsibilities of entire team:
•   Providing escalation response for security events including but not limited to intrusion detection, malware infections, denial of service attacks, privileged account misuse and network breaches. Event management includes triage, correlation, and enrichment of individual events to either rule out as false positive, trigger standard detective and corrective responses, or escalating as a security incident.
Improving the service level for security operations and monitoring. Creating and maintaining system documentation for security event processing. Expands the usage of security monitoring tools to improve the security of the environment based on business use cases or changes in threat landscape, root causes from security incident response, or output from security analytics
 
•   Monitoring Security Information and Event Management (SIEM) platform for security alerts, preferably Splunk Enterprise Security.
•   Providing metrics and reports around security monitoring by designing dashboards for asset owners and management consumption. Leveraging existing technologies within the organization to expand the scope of coverage of the security monitoring service.
•   Performs analysis duties, including:
o   Development of Data Dictionaries for log sources to confirm which fields and values are needed or useful for Security Monitoring
o   Review of available logs to confirm there are adequate quantities and content to usefully provide Security Monitoring
o   Triage SIEM alerts to determine False Positive, Incident, or Technology Misconfiguration
o   Perform research at the request of Incident Response teams
o            Recognize IoCs on networks and host machines.
o            Have basic desktop support skills in Windows and Unix environments (ex. password and log locations)
o            Configuring and reading packet captures such as Wireshark.
 
•   Provide technical and thought leadership within SOC by:
o   Teaching other SOC Analysts about both traditional and unconventional ways to detect, analyze, and mitigate security incidents and other anomalies
o   Regularly recommending new SOC practices and approaches to address program improvement
 
•   Perform case management activities to ensure successful BAU Security Monitoring Operations, including:
o   Documenting case activities in the system of record
o   Documenting current case notes sufficient for effective shift handover, as well as reviewing current status via phone call or in person
o   Engaging in all forms of communications (e.g. phone calls, instant-messaging, web page updates) to ensure cases are efficiently investigated by all approved parties, regardless of what company, department, or team they are a member of
o            Familiarity with handling of digital evidence (chain of command)
 
•   Author Standard Operating Procedures (SOPs), such as:
o   Incident detection "use case" needs, logic, and implementation methods
o   "use case" alert triage workflows
o   Training documentation
o   Recommending, then implementing approved program improvements
 
•   Consults with other IT areas and the businesses and provides professional support for major components of the company's information security infrastructure.
•   Contributes to the development and implementation of security architecture, standards, procedures and guidelines for multiple platforms.
•   Consults with the business and operational infrastructure personnel regarding new and existing technologies.
•   Recommends new security tools to management and reports and provides guidance and expertise in their implementation.
•   Reviews and analyzes complex data and information to provide insights, conclusions and actionable recommendations provides direction and guidance on reports and analyses and ensures recommendations are aligned with customer/business needs and capabilities.
•   Ensures that all significant security concerns are addressed.
•   Recommends course of action to mitigate risk and ensures that appropriate standards are established and published.
•   Contributes to the achievement of area objectives

Required profile

Experience

Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Teaching
  • Teamwork
  • Communication
  • Problem Solving

Related jobs