Search by job, company or skills

Black Box

Cybersecurity Analyst

new job description bg glownew job description bg glownew job description bg svg
  • Posted 19 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Job Description

This position is for Cyber Security Analyst.

We are seeking a highly skilled Security Analyst with hands-on experience in endpoint detection and response, cloud security controls, and email threat protection. The ideal candidate will have deep operational expertise with CrowdStrike Falcon, Microsoft 365 Defender, Cloudflare WAF, and enterprise-grade email security gateways. This role is critical in strengthening our security posture, responding to threats, and ensuring continuous protection across our digital ecosystem.

The role will be responsible for designing, building, and participating in core Cyber Security capabilities. Qualified candidates will have technical expertise required to monitor, identify, respond, and mitigate cyber threats and risks attempting to compromise company systems.

This position will work with Senior Cyber Security team to enforce and maintain security technologies across the global enterprise. This position will enforce security protocols and policies across the global workforce. Analysts are responsible for systems utilized in creating, distributing, and maintaining security on client systems and will provide tier two support for end user security incidents.

  • Position is based in Bangalore Office , INDIA.

Key, Skills And Abilities Summary

Core Duties Implement security protections, Monitor and investigate security breaches, Threat hunting and forensic triage, Test and eradicate vulnerabilities as an on-going activity.

  • Experience and understanding of multiple information security domains including:
    • Incident Response
    • Malware Analysis
    • Attack Metrics
    • Vulnerability Assessment & Pen testing
    • Threat Hunting
    • AI security testing and devsec ops
  • Experience of Cloudflare WAF, Mimecast email gateway, Crowdstrike falcon EDR, Microsoft Defender.
  • Knowledge in Python, C#, JSON, or other shell scripting languages a plus.
  • Experience designing secure networks, systems and application architectures
  • Experience with Tenable Nessus, Kali Linux, and Burp suite that includes corporate pen-testing experience.
  • AI Tools and platforms SAST and DAST DevSecOps testing
  • Strong troubleshooting, organizational, time management and problem-solving skills
  • Excellent communication skills, verbal and written
  • Excellent Reporting Skills (both verbal and written)
  • Demonstrated capability to deliver solutions and service independently or collaborate as a team. Knowledge or experience of CISCO products a plus - Cisco Security Solutions including AnyConnect, ISE, Secure Endpoint (AMP), Umbrella, and Email Security, generic Antivirus and content filtering related areas
  • Knowledge / experience in HSM administration.

Key Responsibilities Detailed

Endpoint Security & Threat Detection

  • Manage, monitor, and optimize CrowdStrike Falcon EDR across all endpoints.
  • Investigate and respond to alerts, detections, and incidents generated by CrowdStrike and Microsoft 365 Defender.
  • Perform threat hunting, IOC analysis, and behavioral investigation using EDR tools.
  • Develop and tune detection rules, dashboards, and automated response playbooks.

Email Security & Threat Protection

  • Administer and maintain email security gateways (e.g., Proofpoint, Mimecast, or equivalent).
  • Analyze phishing attempts, malware campaigns, and business email compromise (BEC) indicators.
  • Implement and refine email filtering policies, DMARC/DKIM/SPF configurations, and anti-spam controls.

Web Application & Cloud Security

  • Configure, monitor, and optimize Cloudflare WAF policies, firewall rules, bot mitigation, and rate-limiting.
  • Analyze WAF logs to identify malicious traffic patterns and emerging threats.
  • Collaborate with DevOps and cloud teams to ensure secure application deployments.

Security Operations & Incident Response

  • Participate in 24/7 on-call rotation for high-severity incidents.
  • Conduct root-cause analysis, document findings, and recommend remediation steps.
  • Maintain SIEM dashboards, correlation rules, and alert tuning (Splunk, Sentinel, etc.).
  • Support vulnerability management and patching cycles.

Soft & Analytical Skills

  • Ability to fluently communicate with local and international users
  • High analytical and cognitive ability , logical and research oriented approach.
  • Ability to communicate network security issues to peers and management
  • Having the Ability to critically think and problem solve a given situation /challenge
  • Ability to collaborate with peers and team members within and outside security function

Experience / Certification / Licenses

  • 4 years of Min experience required, 6 years preferred
  • Bachelor's degree in computer science, information science or related / equivalent field
  • Experience with basic Object Oriented programming concepts
  • Desirable certification include: Security+, GIAC, GSEC, GCIA, GCFA, CREM, GCTI, CEH,CISSP

More Info

Job Type:
Industry:
Employment Type:

About Company

Job ID: 138610219