
Search by job, company or skills
Role Snapshot
Objectives of the Role
Roles and Responsibilities
Required Skills and Qualifications
The role isrequiredto meet regulator and NCIIPC expectations for ongoingbreachattack simulations and red team exercises, improve detection and response readiness, and continuouslymonitoremerging threats through tuned honeypots. As the application and network footprint grows across business units, a dedicated analyst is needed to design and execute BAS scenarios, triage honeypot alerts, update detection content, and drivetimelyremediation to meet SLAs, ensuring audit readiness and reduced risk exposure.
12.0 Target Productivity of the requisitionedmanpower(pl provide quantitative details of transactions / work details which these resources would be executing)
The analyst will design and run BAS scenarios across email, endpoint, identity, lateral movement, and data exfiltration paths; map findings to MITRE ATT&CK and validate SIEM/EDR detections; generate reports and track remediation to closure. They will coordinate and execute red team/tabletop exercises aligned to regulator/NCIIPC requirements, deploy and tune honeypots,monitorsuspicious events, enrich with threat intelligence, and escalate true positives promptly. The role includesmaintainingaudit evidence, publishing weekly/monthly dashboards (scenarios run, MTTA/MTTR, SLA adherence), and working closely with AppSec, Infra, Cloud, and business teams to implement fixes and strengthen defenses.
13.0 Current Productivity in the Department for similar roles whichisrequisitions. If new activities / work, pl provide market benchmark
14.0 Any other relevant information
Good analyzing skills onidentifyingvulnerabilities on OS and applications and will recommend remediation.
Good experienceon Dark Web Monitoring tools (Cyble, ID Agent andCloudSek)
Managing the Entire Security landscape with SIEM, IPS, WAF, DLP, End-Point Detection and response
Anti-APT (Advanced Persistent Threat), e-mail Security and Cloud Security, VAPT, and risk mitigation.
Application vulnerability testing and packaging
Identity and Access management (IAM and PAM)
15.0 Providethese infopertaining tothe position
Segment Sub Business Segment DEPTSubDeptBillable Position - Yes/No Client
Information and Cyber Security Cyber Security IT Cyber Security No
Job ID: 144002785