
SCRAT Developer
- Bangalore, Karnataka
- Permanent
- Full-time
- Collaboration and Innovation:
- Apply your extensive knowledge of attack patterns, tactics and techniques to conduct in-depth analysis of cyber threats. Unearth the subtle nuances that set apart malicious activities from innocuous ones, thus empowering the firm with a heightened security posture.
- In the ever-changing landscape of cyber threats, stat at the forefront of industry trends and emerging attack vectors. This ensures that the strategies you develop remain resilient and effective in the face of new challenges.
- Participate in red teaming and penetration testing exercises to subject the developed use cases to real-world simulation. By doing so, ensuring their robustness and effectiveness in diverse scenarios.
- Produce and report valuable metrics to leadership and cross functional teams to quantify the value and effectiveness of use cases in an ever-changing threat landscape.
- Bachelors degree in Information Technology, Cyber Security, Computer Science, or related discipline or equivalent work experience
- Preferred Certifications: CISSP, ISSMP, SANS, GSEC, GCFA, GNFA, GIAC and/or GCIH
- 5-8 years in Information Security or other Information Technology fields
- Experience working within the Financial Services Industry preferred
- Experience with use case and automation related to UEBA, SIEM, SOAR, DLP, EDR and other open-source security tools
- Knowledge of models/frameworks such as Cyber Kill Chain, MITRE and CRI (Cyber Risk Institute)
- Well-developed analytic, qualitative, and quantitative reasoning skills
- Demonstrated creative problem-solving abilities
- Security event monitoring, investigation, and overall incident response process
- Strong time management skills to balance multiple activities and lead junior analysts as needed
- Understanding of offensive security to include common attack methods
- Understanding of how to pivot across multiple datasets to correlate artifacts for a single security event
- A diverse skill base in both product security and information security including organizational structure and administration practices, system development and maintenance procedures, system software and hardware security controls, access controls, computer operations, physical and environmental controls, and backup and recovery procedures.
- In-depth knowledge in one or more security domains including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, and Incident Response and Forensics
- Experience creating trending, metrics, and management reports
- Network-Based Security Controls (Firewall, IPS, WAF, MDS, Proxy, VPN)
- Anomaly Detection and Investigation
- Host and Network Forensics
- Operating Systems
- Web Applications and Traffic
- Experience across the following technical concentrations:
- Experience with cloud computing security, network, operating system, database, application, and mobile device security.
- Experience with information security risk management, including conducting information security audits, reviews, and risk assessments.