Detect and respond to cyber security threats to ensure your organization operates securely. Partner with the existing internal SOC team across the world and keep the CISO informed about security Incidents. Act as a liaison between the SOC team, other internal stakeholders, and external parties such as vendors, clients, or regulatory bodies. Monitor security systems and networks for potential security breaches or incidents. Conduct in-depth investigations into security incidents to determine the root cause and extent of the compromise. Develop and implement incident response plans and procedures to contain, eradicate, and recover from security incidents. Coordinate with cross-functional teams, including IT, legal, and senior management, to respond to and mitigate security incidents. Document incident response activities, including findings, actions taken, and lessons learned, for future reference and improvement. Provide guidance and mentor junior members of the latest security trends techniques. Stay current with emerging cybersecurity threats, vulnerabilities, and trends to proactively enhance incident response capabilities. Define and Drive tabletop exercises and simulated incident scenarios to test and improve incident response readiness. Carry Table-top exercise for Customer on various Incident Response Scenarios Collaborate with external partners, such as law enforcement and industry peers, to share threat intelligence and best practices. Develop incident management plans and procedures, surveying the networks for signs of a breach, and coordinating and executing tabletop exercises to practice, develop plans, policies, and procedures. Perform proactive threat hunts to identify threats and assess the state of security controls; work with in-house red teams to detect offensive operations, and capture and action findings. Upgrade security systems by monitoring security environment; identifying security gaps; evaluating and implementing enhancements. Proactive identification of threats and risk remediation. Generate metrics for the Management as needed. Prepare system security reports by collecting, analyzing, and summarizing data and trends. Define and participate in implementation of On-prem and Cloud architecture and security controls. Maintain security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs. Our Values If you want to know the heart of a company, take a look at their values. Ours unite us. They are what drive our success - and the success of our customers. Does your heart beat like ours Find out here: Core Values Diversity, Inclusion, Value & Equality (DIVE) is our strategy for fostering an inclusive environment we can be proud of. Check out Blue Yonder\'s inaugural Diversity Report which outlines our commitment to change, and our video celebrating the differences in all of us in the words of some of our associates from around the world. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.
foundit
MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.