Search by job, company or skills

Jio

Incident Response Lead

new job description bg glownew job description bg glownew job description bg svg
  • Posted 8 days ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Job Accountabilities

  • Perform forensic investigations, identify systems of interest and direct data acquisition, analysis and containment measures.
  • Conduct network forensics, intrusion analysis, malware analysis and reverse engineering, threat intelligence fusion (wherever possible/ required) to identify the root cause / patient zero
  • Knowledge and skills on latest forensic tools, endpoint threat detection tools, technologies and techniques on an ongoing basis.
  • Work with red team/ penetration testing teams to strengthen detection and response measures for advanced attacks and contribute to the knowledgebase of the Cyber Defence Center (CDC).
  • Contribute to enhanced detection capabilities of the CDC using threat intelligence and drive innovation and efficiency of the Cyber Defence Center by assisting automation initiatives.
  • Be responsible for accuracy, timeliness of the forensics investigation incidents and examinations and provide relevant reports, dashboards, metrics for periodic reviews and management presentations
  • Co-ordinate with stakeholders, build and maintain positive working relationships with them
  • Participate in incident bridges and crisis calls.
  • Prepare incident reports for management and compliance teams

Skills Required (Knowledge and Skills) Technical competencies:

  • Deep knowledge of OS internals (Windows, Linux), Active Directory and typical vulnerabilities and misconfigurations and associated exploitation techniques and scripting.
  • In-depth practical knowledge and experience in application of TTPs, MITRE Framework in securing an enterprise environment.
  • Working knowledge of at-least 3 EDR and SIEM tools (commercial or open source).
  • Expertise in server and mobile forensic tools such as Autopsy, FTK, Encase, Oxygen, Cellebrite, Wireshark, RAM analysis, Registry analysis tools etc.
  • Significant experience in investigating complex malware incidents, data theft, data breach, system compromise incidents and creation of detailed forensic investigation reports and presentations for variety of stakeholders.
  • Experience of rapid rule development in response to newly released attacks, IOCs will be a plus.
  • Research bent of mind and passion for keeping up-to-date with the latest threat landscape and adversarial techniques.
  • Cloud security (M365, AWS, Azure, GCP).

Non-technical competencies:

  • Logical thinker with attention to detail Strong collaborative skills and proven ability to work in a diverse team of security and IT professionals Process oriented
  • Meticulous and methodical approach to documentation
  • Good interpersonal skills to interact and gather relevant information from a variety of stakeholders such as IT, Network and Security teams
  • Excellent verbal and written English
  • Ability to work with calm and patience in high pressure situations in a dynamic environment

Key Attributes (Experience and Qualifications)

  • BE/B.Tech/ME/M.Tech/MCA/MS from a reputed/recognized institute
  • Overall 10-12 years with atleast 8 years of relevant experience in Incident response and Digital Forensic.
  • Excellent verbal and written communication skills and customer management skills
  • Certification as a CHFI, GCIH or GCFA, SANS certification would be an advantage (desired)

More Info

Job Type:
Industry:
Function:
Employment Type:

About Company

Job ID: 143908781