This job is no longer available. Continue your job search here.
Security Architect
Bengaluru
Job No. atci-4304916-s1678692
Full-time
Job Description
Project Role : Security Architect
Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations.
Must have skills : Security Threat Hunting
Good to have skills : NA
Minimum 5 year(s) of experience is required
Educational Qualification : be btech
Summary Establishing Threat hunting practice for the stakeholders, preparing hunt plans and its execution ensuring that it meets the business requirements and performance goals. Understand threat actor tactics, techniques, and procedure (TTP), detect, and respond using existing TTP. Lead advanced threat research to proactively identify potential threat vectors and work with engineering and security teams to improve prevention and detection methods. Key Responsibilities : a. Experience with Threat Hunting techniques on both the endpoint and network data b. Understanding about the log sources on both the endpoint and network data c. Preparing the Hypothesis based threat hunt plan for its execution. d. Good knowledge of Windows internals and solid networking fundamentals e. Good understanding of common attack vectors and offensive tools and tactics f. Understanding of enterprise architectures and large IT environment operations g. Understanding of common malware types and behaviors and common infection vectors h. Ability to identify attacker Tactics, Techniques, and procedures (TTPs) i. Experience with IoC lifecycle (development, organization, sharing, effective usage) j. Experience with statistical/quantitative analysis methods and tools k. Ability to develop small automation scripts and makeshift tools (Python, PowerShell, Bash, …) l. Strong findings documentation and reporting skills m. Good presentation and communication skills Technical Experience : a. Person having experience with Forensics & Incident Response will also be considered. b. Knowledge on SIEM tools like Splunk and Sentinel c. Knowledge on EDR tools like Defender ATP, CrowdStrike and Carbon Black d. Tools like Sysmon, PowerShell, Proxy, E-mail Security e. Cyber Network Operations/Penetration Test Methodologies and tools like Metasploit, Kali Linux, Cobalt Strike, Atomic red team etc. f. Good to have Certifications like GCFA, GNFA, GCIH, OSCP, GPEN but not mandatory g. Strong project/program management experience Demonstrated creativity in complex problem solving Professional Attributes : a. Flexible for 24X7 model b. Good verbal and written communication skill
Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations.
Must have skills : Security Threat Hunting
Good to have skills : NA
Minimum 5 year(s) of experience is required
Educational Qualification : be btech
Summary Establishing Threat hunting practice for the stakeholders, preparing hunt plans and its execution ensuring that it meets the business requirements and performance goals. Understand threat actor tactics, techniques, and procedure (TTP), detect, and respond using existing TTP. Lead advanced threat research to proactively identify potential threat vectors and work with engineering and security teams to improve prevention and detection methods. Key Responsibilities : a. Experience with Threat Hunting techniques on both the endpoint and network data b. Understanding about the log sources on both the endpoint and network data c. Preparing the Hypothesis based threat hunt plan for its execution. d. Good knowledge of Windows internals and solid networking fundamentals e. Good understanding of common attack vectors and offensive tools and tactics f. Understanding of enterprise architectures and large IT environment operations g. Understanding of common malware types and behaviors and common infection vectors h. Ability to identify attacker Tactics, Techniques, and procedures (TTPs) i. Experience with IoC lifecycle (development, organization, sharing, effective usage) j. Experience with statistical/quantitative analysis methods and tools k. Ability to develop small automation scripts and makeshift tools (Python, PowerShell, Bash, …) l. Strong findings documentation and reporting skills m. Good presentation and communication skills Technical Experience : a. Person having experience with Forensics & Incident Response will also be considered. b. Knowledge on SIEM tools like Splunk and Sentinel c. Knowledge on EDR tools like Defender ATP, CrowdStrike and Carbon Black d. Tools like Sysmon, PowerShell, Proxy, E-mail Security e. Cyber Network Operations/Penetration Test Methodologies and tools like Metasploit, Kali Linux, Cobalt Strike, Atomic red team etc. f. Good to have Certifications like GCFA, GNFA, GCIH, OSCP, GPEN but not mandatory g. Strong project/program management experience Demonstrated creativity in complex problem solving Professional Attributes : a. Flexible for 24X7 model b. Good verbal and written communication skill
Qualifications
be btech
Please be informed that at any given point in time, you can only have one "Active" application.
Please be informed that at any given point in time, you can only have one "Active" application.