Cyber Security Specialist -EDR SME

Remote: 
Full Remote
Contract: 
Work from: 

Offer summary

Qualifications:

Bachelor's degree in IT, Computer Science, or related field (BE/BTech, BSc/MSc), 6 to 10 years of experience in Cyber Security and EDR administration, Proficiency in EDR tools and security disciplines such as incident response and threat hunting, Strong communication skills and a team-oriented mindset..

Key responsibilities:

  • Lead the deployment, operation, and maintenance of the global EDR platform.
  • Collaborate with security teams to identify and implement adjustments to the EDR toolset.
  • Manage day-to-day operations of Security Device Management and incident response activities.
  • Provide support in documentation, reporting, and mentoring team members.

Intuitive Apps Inc. logo
Intuitive Apps Inc. Startup https://www.intuitiveapps.com
51 - 200 Employees
See all jobs

Job description

Hi to all Tech Enthusiasts out there , We are hiring for a reputed Banking client of ours for the below positions :
Location: Navi Mumbai- Ghansoli
Minimum Qualification: BE/BTech, BSc/MSc IT/Computer Science
Experience : 6 to 10 years
Notice Period : 45 To Max 60 Days
Job Designation : Cyber Security Specialist -EDR SME
Technical Skills : Cyber Security ,EDR, SOAR, SIEM, Crowdstrike, Threathunting
Job Description
·       The candidate should have a team-oriented, client-facing mindset with proven experience conducting EDR infrastructure deployments. Use deep insights to identify, recommend and execute resolution for malware and other EDR-detected incidents while helping to develop and execute methodologies for EDR deployment, feature enablement and technical integration in a SOC.
·       As an Endpoint Detection and Response (EDR) SME, candidate will play a key role in supporting the design, deployment, configuration, optimization, and operation of a large-scale Endpoint Detection and Response (EDR) deployment solution or similar security products, across multiple geographies.
·       Candidate shall be responsible for managing day to day operations of Security Device Management SIEM, incident response, threat hunting, Use case engineering, SOC analyst, device integration with SIEM. Also Responsible for identifying, reporting and tracking system vulnerabilities within corporate, commercial and federal assets ensuring the integrity of the environment.
Skills Required
·       Project and delivery management experience 3+ years EDR administration (CrowdStrike Falcon, VMware Carbon Black, Palo Alto Network Cortex XDR, Microsoft Windows Defender, Cylance, Tanium etc.)
·       3 + years of working with EDR tools performing requirements gathering, deployment, configuration, and conducting threat hunting
·       5+ years working with operational information security disciplines (e.g. incident response, security infrastructure management, or monitoring services)
·       3+ years security tool engineering and administration (e.g. NGAV, EPP, EDR, SIEM, SOAR, UEBA, Deception, Attack Surface Management, etc.)
·       Some of the following EDR experience- Agent deployment, health check and coverage sustainability
·       Threat Hunting
·       Systems integration
·       Comparing vendor functionality
·       Mapping EDR capabilities to threat scenarios
·       Deploying EDR in a multi-agent (i.e. AV, NG AV) environments
·       Deep understanding and proven experience in Cybersecurity Operations (Monitoring, Detection, Incident Response, Forensics)
Personal skills:
·       Good Team player
·       Possess Positive and learning attitude
·       Good Verbal and Written communication skills
·       Sense of Ownership, Priorities and Autonomous
·       Ability to travel up to 50% of the time
Roles & Responsibilities
·       As an Endpoint Detection and Response (EDR) Tools Engineer, the candidate will be part of the Cyber security team responsible for deploying, operating, and maintaining the global EDR platform. The candidate will provide support for EDR tools in the environment. The candidate must be able to communicate with the Security Operations and Incident Response teams to identify adjustments and modifications to be made to the EDR toolset. As in the most senior EDR tools engineer position, the candidate must be able to lead and by example to drive progress forward.
·       Lead and oversee deployment, operation, and maintenance of the global EDR platform
·       Provide support response to other security teams in respect to the EDR platform
·       Identify adjustments and modifications for configuration
·       Identify new opportunities for tools to incorporate into the EDR platform
·       work with cross functional teams to identify the right mix of processes and technology to implement solutions to support the needs of the internal and external customers.
·       Continually work on the optimization of EDR and integrated solutions, including refinement data produced, development of automated workflows or playbooks, and integration of the EDR data with complementary security solutions, including SIEM, SOAR, etc.
·       Establishing technical processes and tools focused on the incident response lifecycle. Preparation; Detection and Analysis; Containment, Eradication, and Recovery; and Post-Event Activity.
·       Work to integrate cybersecurity data using enterprise or custom tools data aggregation and analysis tools, including Splunk and similar complementary security solutions.
·       Manage projects to completion both individually and in a group as well as mentoring others and orchestrating team efforts for problem solving
·       Serve as an escalation point to triage and remediate security events in a SOC environment by leveraging data collected from security solutions.
·       Provide support in an operations and maintenance role, including ticket work information updates, issue responses, and remediation.
·       Provide content on deliverables, including written reports and technical documents, SOPs and configuration guides, and training and briefing materials
·       Collaborate and consult with peers, colleagues, and managers, etc. to resolve issues and achieve goals
·       General SIEM monitoring, analysis, content development, and maintenance.
·       Daily security activities related to the protection of corporate and other federal assets including scanning tools and ticketing systems documenting the identification and remediation process for identified system flaws
·       Provide information to system owners of flaws identified within that group's responsible systems.
·       · Assist in risk assessment duties including reporting and oversight of remediation efforts
·       Research, analysis, and response for alerts; including log retrieval and documentation.
·       Conduct analysis of network traffic and host activity across a wide array of technologies and platforms.
·       Assist in incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts.
·       Enterprise-level experience managing the remediation of vulnerabilities in two or more of the following areas:
·       Server Operating Systems (Windows Server, Red Hat, CentOS)
·       Network (Cisco, Fortinet, Palo Alto, F5, McAfee)
·       Storage (NetApp, CleverSafe)
·       Manage multiple projects with various priority levels and time lines from start to finish
·       Develop and maintain accurate documentation for internal procedures and services
·       Maintain knowledge of outstanding vulnerability management issues and ensure remediation timelines are completed by required guidelines
·       Thorough understanding of how to calculate CVSS v2 and v3 adjusted scores
·       Must collaborate with other departments to resolve complex issues and be detail oriented

Required profile

Experience

Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Non-Verbal Communication
  • Collaboration
  • Problem Solving

Cybersecurity Engineer Related jobs