HR Path Group, a global leader in HR consulting, helps clients with their HR transformation projects, covering both human and HRIS (Human Resources Information System) aspects. Our 2,500 employees are located in 28 countries.
Our mission is to support our clients at every step of their HR digital transformation with a comprehensive range of services.
Advise to Run! HR Path, Global Leader in HR solutions
- ADVISE : We support our customers in the transformation of their HR function, through a redefinition of their HR organization and their HRIS digitalization
- IMPLEMENT : As a partner of the main editors of the market, we carry out technical and functional implementation projects of all HRIS solutions (SaaS or On-Premise)
- RUN : With our global payroll expertise, we offer our clients several levels of payroll outsourcing
Our latest fundraising of 500 million euros aims to accelerate our growth and international expansion. Our goal is to double our revenue within five years and become the world leader in HR digital transformation.
Job Postion : Senior Cybersecurity Analyst (L3)
Location : Bengaluru
Company : HR-Path
Job Type : Full-time
About Us
At HR-Path, we are committed to safeguarding the integrity of our systems and protecting the sensitive data of our clients and employees. We are currently seeking a highly skilled Senior Cybersecurity Analyst (L3) to join our dynamic Security Team. This is an exciting opportunity for an individual with advanced expertise in Threat Response, Incident Response, and Email Security, looking to make a significant impact in the fight against cyber threats.
As a Senior Security Analyst, you will play a critical role in defending our organization’s infrastructure, responding to cyber incidents, and ensuring that our email security posture is robust against evolving threats.
Key Responsibilities
Threat Response & Incident Response :
Lead and manage the response to security incidents, breaches, and vulnerabilities, including detection, containment, and remediation.Conduct thorough Root Cause Analysis (RCA) of incidents and collaborate with cross-functional teams to resolve them efficiently.Analyze emerging threats, attack vectors, and vulnerabilities to develop proactive security measures and strengthen the organization’s defenses.Develop, implement, and continuously test incident response plans and playbooks.Maintain precise incident records, timelines, and escalation procedures, particularly during major incidents.Assist with forensic analysis and post-incident reviews to enhance future response strategies.Email Security Management :
Oversee and manage the organization’s email security systems, including anti-spam, anti-phishing, and encryption technologies.Implement, configure, and optimize email security tools such as Proofpoint, Mimecast, and Microsoft Defender for Office 365.Respond to email security incidents, including phishing attacks, Business Email Compromise (BEC), and spam.Develop and enforce email security policies, best practices, and user awareness training programs.Conduct periodic email security assessments, phishing simulations, and user training to enhance email security posture.Monitoring and Analysis :
Continuously monitor security logs, network traffic, and system alerts for suspicious activity and potential threats.Utilize SIEM platforms such as Splunk and ArcSight to identify, analyze, and escalate security incidents.Stay current with the latest threat intelligence and security research to identify potential risks before they materialize.Splunk Administration & SIEM Operations :
Design, configure, and maintain Splunk use cases, correlation rules, alerts, and dashboards for proactive security monitoring.Perform health monitoring, license usage tracking, and performance optimization for the Splunk platform.Develop and document playbooks for threat detection, triage, and incident handling in Splunk.Train and guide L1 and L2 analysts on Splunk activities, dashboards, and investigations.Provide RCA for Splunk-related issues and ensure timely resolution to prevent recurrence.Collaborate with engineering teams to onboard new data sources and improve log parsing / normalization.Collaboration and Communication :
Work closely with internal teams to embed security best practices into business processes.Serve as a subject matter expert (SME) on threat analysis and incident response across the organization.Provide regular updates and detailed reports to senior management regarding security incidents, emerging threats, and overall security posture.Certifications
Splunk Certified Admin or Splunk Certified Power User preferred.Certified Incident Handler (GCIH) or similar certification.Certified Ethical Hacker (CEH).CompTIA Security+ or equivalent.Soft Skills
Exceptional problem-solving and analytical skills.Ability to work well under pressure, prioritize tasks, and manage multiple high-priority incidents simultaneously.Team-oriented with strong collaboration skills across cross-functional teams.Ability to articulate complex security concepts to non-technical stakeholders.