Security Analyst

Experience: 2-4 Years
Type: Full Time
Location: Bangalore
Notice-period: Immediate/15 days
Budget: Upto 7-8 LPA
Technology: IT

[Qualifications]

  • Bachelor’s degree or equivalent industry experience (2+ years).
  • SANS GCIA or GMON certification preferred, or relevant intrusion analysis experience.
  • 1+ years of IT or networking experience.
     

[Job Overview]

Sony is seeking a highly motivated, self-driven Security Analyst to join the Global Security Incident Response Team (GSIRT) Security Operations Center (SOC). As a member of the Security Operations Center, you will be a team member responsible for the 24x7x365 continuous investigation of security event feeds, triaging security alerts, incident response, performing phishing analysis and other related activities.

[Primary/Mandatory Skills]

  • Understanding of network defense principles, common attack vectors, and attacker techniques.
  • Technical baseline skills and the ability to acquire in-depth knowledge of network and host security technologies..
  • Basic Linux/Windows OS knowledge, firewall rules and policy fundamentals.
  • Excellent analytical and problem-solving skills.
  • Strong work ethic and commitment to accomplish assigned tasks with a sense of urgency.
  • Strong aptitude for continuous learning and growth and initiative to apply that learning to current problems.
  • Experience with or knowledge of the following technologies or concepts:
    • IT Networking Principles
    • Cybersecurity
    • Malware and cyber threats
  • Strong soft skills, including:
    • Written
    • Verbal
    • Problem solving
    • Decision making
  • Fluency in English (written and verbal)

[Good to have Skills]

  • Specialized knowledge in email or cloud threats.
  • Strong knowledge of industry standard incident response practices.
  • Ability to manage parallel tasks and accurately document work.
  • Experience working with customers in a fast-paced environment.
  • SANS GCIA or GMON certification preferred, or relevant intrusion analysis experience.
  • Experience with or knowledge of the following technologies or concepts:
    • SIEM or other security/log management platforms (e.g., Splunk or Elasticsearch)
    • Basic host-based forensics analysis
    • Basic static and dynamic malware analysis
    • Regular expressions
    • Virtualization
    • Common TCP and UDP protocols
    • Cloud (AWS, Azure and GCP)

[Responsibilities and Duties]

  • Perform security monitoring, event analysis, and incident response activities across the Sony Group’s global networks, leveraging a variety of tools and techniques.
  • Follow detailed operational processes and procedures to appropriately analyze, escalate, and assist in the remediation of information security events and incidents.
  • Prioritize multiple high-priority tasks and formulate responses/recommendations to customers and team members in a fast-paced environment.
  • Monitoring corporate communications.
  • Thoroughly document incident response analysis activities & communicate findings.
  • Keeps current on the IT threat landscape and upcoming trends in security.
  • Perform other duties, as assigned.

Apply for this position

Allowed Type(s): .pdf, .doc, .docx
Scroll to Top