Expoint - all jobs in one place

המקום בו המומחים והחברות הטובות ביותר נפגשים

Limitless High-tech career opportunities - Expoint

Dell Consultant Cyber Incident Response 
India, Karnataka 
833229228

09.01.2025
What you’ll achieve

As a Consultant, Cyber Incident Response, you will be responsible for handling complex security incidents, providing advanced analysis, and supporting L1 and L2 analysts. This role requires experience in all phases of Cybersecurity Incident Response including preparation, analysis, notification, response, recovery, and post-mortem.

You will:

  • Serve as a global escalation point for complex cybersecurity incidents not resolved at the L1/L2 levels, and regional technical subject matter expert for incident response

  • Provide guidance and training to L1 and L2 analysts to enhance their skills and knowledge

  • Perform in-depth analysis of security incidents to determine the root cause and impact

  • Investigate/analyze large and unstructured data sets, malicious artifacts, and EDR tools to identify trends and anomalies indicative of potential threats & lead post incident reviews to identify lessons learned and improve future response efforts

  • Liaison with stakeholders and internal CSIRT teams to serve as a cybersecurity champion to help implement best security practices and mature the incident response process to meet the needs of the business

Essential Requirements
  • 10+ years of overall related experience with expertise in cybersecurity Incident Response experience and hands-on experience in a Security Operations Center.

  • Exceptional ability to conduct cybersecurity investigations, analyze and distill relevant findings and determine root cause

  • Strong knowledge of security and web technologies such as SIEM, full packet capture, Firewall/NGFW, IDS/IPS, EDR, DLP, UEBA, networking protocols, Cloud Computing, Microsoft Windows and Linux/Unix platforms and tools with related experience in corporate infrastructures

  • Strong technical experience and familiarity of various types and techniques of cyber-attacks, with the incident response and threat hunting lifecycles

  • Excellent analytical thinking, time management and coordination skills and excellent command in English (both written and verbal)

Desirable Requirements

  • Industry recognized certification (CISSP, SANS GCIH, GCIA, GNFA, GREM, etc.)

  • Knowledge and experience in: Digital Forensics, reverse malware tools, and scripting languages.