IBM is a global technology and innovation company present in India since 1992. It is the largest technology and consulting employer in the world, with approximately 380,000 employees serving clients in 170 countries. In this new era of Cognitive Business, IBM is helping to reshape industries as diverse as healthcare, retail, banking, travel, manufacturing, and many more, by bringing together our expertise in Cloud, Analytics, Security, Mobile, and the Internet of Things. We are changing how we create. How we collaborate. How we analyze. How we engage. IBM is a leader in this global transformation.
· QRadar SIEM Administrative activities which include install, upgrade and troubleshooting.
· Creating custom parser and non-standard events normalisation.
· Fine tuning logs and creating use-case to cover MITRE ATT&CK framework tactic and technique.
· Perform analysis of security incidents for further enhancement of rules, reports, AI/ML models
· Perform analysis of network packet captures, DNS, proxy, NetFlow, malware, host-based security and application logs, as well as logs from various types of security sensors
· Analyze events to differentiate between malicious and benign activity and analyses malicious code, packet capture files, and artefacts.
· Examine alerts from various security monitoring tools, perform triage & determine scope of threats.
· Analysis for security threats, identify threat actor groups and their techniques, tools and Processes
· Analyze logs, alerts, suspicious malware’s samples from SOC platform deployed at the enterprise
· Using knowledge of the current threat landscape as well as latest threat-intel, threat actor techniques, and the internal network, analyze log data to detect active threats within the network. Build, document and maintain a comprehensive model of relevant threats to the enterprise.
· Monthly tactical briefings on threat observations and findings to the customer stakeholders on threats to the enterprise.
· Keep up to date with information security news, vulnerabilities, tools, techniques, exploits and trends.
· Proactively identify potential threat vectors and work to improve prevention and detection methods
· Responsible for Threat-Intel platform & ensuring its optimal usage for enterprise security monitoring, use-case & playbook tuning
· Graduation in CS/ IT/ EC OR Information Technology/ MCA/ MTech CISM /CISSP / OSCP/OSCE with 6+ years of relevant experience
· Graduation in CS/ IT/ EC OR Information Technology/ MCA/ MTech CISM /CISSP / OSCP/OSCE with 6+ years of relevant experience