Sr Security Analyst
Bengaluru
Everbridge
Keep people safe and organizations running with Everbridge. Empower Resilience. Anticipate, mitigate, respond to, and recover from critical events.About the Team:As a valued member of our Cyber Intelligence Center /Security Operations team, you will advocate a pragmatic approach to proposing and implementing security solutions. You will actively contribute to the continual analysis of our security logs and posture to uphold our organization's security and situational awareness regarding potential threats.
What you'll do
- Responsibilities and Technical Requirements: Security Monitoring and Analysis:
- Monitor security alerts and events from various sources, including SIEM (Security Information and Event Management) tools.
- Conduct in-depth analysis of security incidents to determine the scope, impact, and severity. Incident Triage and Investigation:
- Ability to identify abuse/ Fraud patterns on Cloud Platform
- Perform initial triage of security incidents, prioritizing and escalating as necessary.
- Conduct detailed investigations to identify the root cause of security incidents and recommend remediation actions. Threat Detection and Analysis:
- Utilize threat intelligence and analyse patterns to detect emerging cybersecurity threats.
- Collaborate with other SOC analysts and teams to improve detection capabilities.
- Investigate signs of compromise, utilizing your problem-solving skills and knowledge of cyber-attacks and data analysis (phishing, Ransomware, account compromise, DDOS)
- Zero-day attack analysis and control, Analyse end user system for attack related incidents and share RCA Incident Response:
- Assist in coordinating and executing incident response procedures.
- Strong understanding of cybersecurity concepts, attack vectors, and defence mechanisms.
- Analytical mindset and the ability to think critically under pressure. Documentation and Reporting:
- Document incident details, investigation, analysis findings, and response actions.
- Generate and communicate incident reports to relevant stakeholders.
- Preparing disaster recovery plans / tabletop exercise / PEN Test / weekly monthly metric reports Tool Management:
- Operate and manage security tools, including sumo logic, defender, Qualys, Sophos, O365, Phislabs, Litmos, Service desk, Jira, confluence, datadog
- Recommend improvements to enhance the effectiveness of security tools.
- Developing, configuring, and deploying monitoring tools and scripts for applications and systems
- Exposure on Terraform, Git, workflow Business Support:
- Participate in business and technology initiatives, contributing as an information security professional to define security-related processes and procedures.
- Engage in internal and third-party audits of the company’s information security policies, procedures, and operational duties, supporting remediation efforts as necessary.
- Collaborating with product development, information technology (IT) and architecture teams to evaluate and implement new services based on requirements.
What you'll bring:
- Projects:
- Coordinate and execute security projects aligned with the global security strategy, evaluating the security posture of the company and related data assets.
- Stay informed on the latest information security technologies, methodologies, and events, providing feedback on the security aspects or impact of non-security-related technology.
- Liaise with external vendors and service providers to ensure the efficacy of security solutions and services.
- Certification:
- CompTIA Security+, Certified Ethical Hacker (C|EH), CSA or equivalent are highly desirable.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Audits C Cloud CompTIA Confluence DDoS Incident response Jira Monitoring Qualys Security strategy SIEM SOC Strategy Terraform Threat detection Threat intelligence
Perks/benefits: Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Systems Security Officer (ISSO) jobs
- Open Principal Security Engineer jobs
- Open Information Security Officer jobs
- Open Senior Cyber Security Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Cyber Security Specialist jobs
- Open Information Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Product Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open Cyber Security Architect jobs
- Open Security Specialist jobs
- Open Senior Information Security Analyst jobs
- Open Manager Pentest H/F jobs
- Open Staff Security Engineer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Cybersecurity Consultant jobs
- Open Cybersecurity Editor jobs
- Open IT Security Engineer jobs
- Open IT Security Analyst jobs
- Open Senior Penetration Tester jobs
- Open Consultant SOC / CERT H/F jobs
- Open Information Security Architect jobs
- Open Security Operations Analyst jobs
- Open Security Consultant jobs
- Open Risk assessment-related jobs
- Open Network security-related jobs
- Open CISM-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open ISO 27001-related jobs
- Open Threat intelligence-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open Security Clearance-related jobs
- Open APIs-related jobs
- Open DoD-related jobs
- Open Java-related jobs
- Open Forensics-related jobs
- Open EDR-related jobs
- Open DevOps-related jobs
- Open SaaS-related jobs
- Open Kubernetes-related jobs
- Open CEH-related jobs