About the job
You may know McCormick as a leader in herbs, spices, seasonings, and condiments – and we're only getting started on our journey to create flavors for the globe. At McCormick, we're always looking for new people to bring their unique perspective to our team.
McCormick employees – all 14,000 of us across the world – are what makes this company a great place to work.
We are looking to hire a Cybersecurity Analyst to join our Cybersecurity Threat Management team. The Cybersecurity Analyst, reporting to the Sr Manager of Threat Detection & Response, will be responsible for security operations. This position can be based in Gurugram, Haryana, India.
What We Bring To The Table
The best people deserve the best rewards. In addition to the benefits you'd expect from a global leader (401k, health insurance, paid time off, etc.) we also offer:
- Competitive compensation
- Career growth opportunities
- Flexibility and Support for Diverse Life Stages and Choices
- We prioritize our communities and the planet we share. We are proud to be awarded as a Diversity Inc. Top 50 company for Diversity and have multiple Sustainability awards (ranking #22 in the World and #1 in Food Products)
- Wellbeing programs including Physical, Mental and Financial wellness
- Tuition assistance
Responsibilities
- Investigate Security Incidents: Perform detailed analysis of security alerts and incidents, leading response activities through containment, eradication, and recovery
- Enhance Detection Engineering Capabilities: Recommend and implement enhancements to log sources, detection logic, and tooling to reduce detection gaps and improve overall security posture
- Conduct Proactive Threat Hunting: Identify, investigate, and mitigate threats and anomalies in IT and OT environments using intelligence, custom detection logic, and security tools
- Analyze Adversary Techniques: Research and identify threat actor tactics, techniques, and procedures (TTPs) to develop and tune detections that uncover malicious activity
- Develop Detection Content and Hunting Playbooks: Create and refine detection rules, use cases, and threat hunt playbooks to improve coverage across the environment
- Partner Collaboration: Work with security teams to address threats, share findings, and provide actionable intelligence and detection guidance to support response efforts
- Investigate Security Incidents: Perform detailed analysis of security alerts and incidents, leading response activities through containment, eradication, and recovery
- Enhance Detection Engineering Capabilities: Recommend and implement enhancements to log sources, detection logic, and tooling to reduce detection gaps and improve overall security posture
- Document Findings: Prepare detailed reports and summaries of incident investigations, detection development, and hunting activities for technical and non-technical audiences
Required Qualifications
- Bachelor's degree in computer science, information security, related degree, or measurable knowledge from serving in industry/military/government unit.
- GCIH, OSCP, GCIA, GCTI, CEH or other relevant professional certifications
- Minimum 5 years professional experience working in cybersecurity or information technology
- Minimum 3 years experience in an incident response, threat hunting, or security operations center role
- Proven experience working with cross-functional teams within a large organization
- Proficiency with SIEM and EDR platforms
- Strong knowledge of adversary TTPs and frameworks such as MITRE ATT&CK.
- Proficiency with scripting languages such as Python and PowerShell to support automation and analysis tasks
- Experience with reporting and communicating incident details, improving incident response processes and recovering from security incidents
- Fluency in English