Incident Handler
Chicago, INDIA
hace 6 días
source : TimesJobs

What We'll Bring This role is a member of the larger Threat Detection Services team, which includes security analysts and incident handlers who work alongside teams responsible for red teaming, intelligence analysis, and technical threat researchers.

The individual filling this role will join our Special Projects team and act as a senior leader within the organization helping to drive detection and response maturity, enable proactive monitoring strategies and participate in a wide range of larger threat detection program activities specific to our growing cloud environments.

We are a geographically diverse team, with offices and personnel around the globe, making this a remote work position for the right candidate.

To support these requirements in addition to the technical skills listed below ideal candidates will also have prior remote work experience and possess necessary soft skills to support their success.

What You'll Bring Responsibilities Analysis, ownership of investigations through remediation. Monitoring of infrastructure-related security events across organization within a 24x7 support teams.

Work events escalated by Security Operations Center or high severity user reported events. Provide prolonged, in-depth analysis of potential intrusions or security events, leveraging various data artifacts to determine the context of an event.

Hands on security alerts creation and maintenance, workload automation. Maintain accurate and complete records of incidents and investigations.

Execute incident response processes to respond to security threats and attacks. Create detection and mitigation rules based on indicators of compromise that align with industry threats.

Assist in the design, evaluation, and implementation of new security technologies. Update incident response playbooks to minimize gaps in response processes.

Extract and analyze malware to determine their nature. This may include either static code analysis or runtime / execution analysis or both.

Impact You'll Make Experience and Expertise 5-7 years of Network / Security / Incident Response experience. 3-5 years working in cloud and containerized environments.

Advanced Operating System and Network knowledge. Experience identifying, investigating, and responding to complex attacks Experience with investigative technologies such as SIEM, packet capture analysis, host forensics and memory analysis tools Knowledge of at least one scripting language.

Any Security related certification(s) Ability to work independently as well as collaboratively within a team. Ability to quickly grasp high-level technical concepts.

Good communication and interpersonal skills. SANS SEC503 Intrusion Detection In-Depth (nice to have) SANS SEC504 Hacker Techniques, Exploits & Incident Handling (nice to have) SANS SEC524 Cloud Security and Risk Fundamentals (nice to have) SANS SEC545 Cloud Security Architecture and Operations (nice to have) Any additional cloud technology specific certification (nice to have) We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability status, veteran status, marital status, citizenship status, sexual orientation, gender identity or any other characteristic protected by law.

TransUnion's Internal Job Title Advisor, Cybersecurity

Reportar esta oferta

Thank you for reporting this job!

Your feedback will help us improve the quality of our services.

Mi Correo Electrónico
Al hacer clic en la opción "Continuar", doy mi consentimiento para que neuvoo procese mis datos de conformidad con lo establecido en su Política de privacidad . Puedo darme de baja o retirar mi autorización en cualquier momento.
Formulario de postulación