Experience: 2-4 Years
Type: Full Time
Location: Bangalore
Notice-period: Immediate/15 days
Budget: Upto 7-8 LPA
Technology: IT
[Qualifications]
- Bachelor’s degree or equivalent industry experience (2+ years).
- SANS GCIA or GMON certification preferred, or relevant intrusion analysis experience.
- 1+ years of IT or networking experience.
[Job Overview]
Sony is seeking a highly motivated, self-driven Security Analyst to join the Global Security Incident Response Team (GSIRT) Security Operations Center (SOC). As a member of the Security Operations Center, you will be a team member responsible for the 24x7x365 continuous investigation of security event feeds, triaging security alerts, incident response, performing phishing analysis and other related activities.
[Primary/Mandatory Skills]
- Understanding of network defense principles, common attack vectors, and attacker techniques.
- Technical baseline skills and the ability to acquire in-depth knowledge of network and host security technologies..
- Basic Linux/Windows OS knowledge, firewall rules and policy fundamentals.
- Excellent analytical and problem-solving skills.
- Strong work ethic and commitment to accomplish assigned tasks with a sense of urgency.
- Strong aptitude for continuous learning and growth and initiative to apply that learning to current problems.
- Experience with or knowledge of the following technologies or concepts:
- IT Networking Principles
- Cybersecurity
- Malware and cyber threats
- Strong soft skills, including:
- Written
- Verbal
- Problem solving
- Decision making
- Fluency in English (written and verbal)
[Good to have Skills]
- Specialized knowledge in email or cloud threats.
- Strong knowledge of industry standard incident response practices.
- Ability to manage parallel tasks and accurately document work.
- Experience working with customers in a fast-paced environment.
- SANS GCIA or GMON certification preferred, or relevant intrusion analysis experience.
- Experience with or knowledge of the following technologies or concepts:
- SIEM or other security/log management platforms (e.g., Splunk or Elasticsearch)
- Basic host-based forensics analysis
- Basic static and dynamic malware analysis
- Regular expressions
- Virtualization
- Common TCP and UDP protocols
- Cloud (AWS, Azure and GCP)
[Responsibilities and Duties]
- Perform security monitoring, event analysis, and incident response activities across the Sony Group’s global networks, leveraging a variety of tools and techniques.
- Follow detailed operational processes and procedures to appropriately analyze, escalate, and assist in the remediation of information security events and incidents.
- Prioritize multiple high-priority tasks and formulate responses/recommendations to customers and team members in a fast-paced environment.
- Monitoring corporate communications.
- Thoroughly document incident response analysis activities & communicate findings.
- Keeps current on the IT threat landscape and upcoming trends in security.
- Perform other duties, as assigned.