Talent.com
This job offer is not available in your country.
Threat Management Senior Associate (SOC / SIEM)

Threat Management Senior Associate (SOC / SIEM)

DTCCChennai, India
30+ days ago
Job type
  • Full-time
Job description

Are you ready to make an impact at DTCC?

Do you want to work on innovative projects, collaborate with a dynamic and supportive team, and receive investment in your professional development? At DTCC, we are at the forefront of innovation in the financial markets. We're committed to helping our employees grow and succeed. We believe that you have the skills and drive to make a real impact. We foster a thriving internal community and are committed to creating a workplace that looks like the world that we serve.

Pay and Benefits :

Competitive compensation, including base pay and annual incentive

Comprehensive health and life insurance and well-being benefits, based on location

Pension / Retirement benefits

Paid Time Off and Personal / Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.

DTCC offers a flexible / hybrid model of 3 days onsite and 2 days remote (onsite Tuesdays, Wednesdays and a third day unique to each team or employee).

The impact you will have in this role :

Reporting to the Cyber Blue Team Regional Manager and working with technical leads and other associates and analysts, you are responsible for detecting, investigating, and responding to cyber security events within the organization as well as handling technical projects. You are a member of the Cyber Security Incident Response Team (CSIRT) and as a result may be tasked with responding to cyber incidents outside of normal work hours.

Your Responsibilities

  • Monitor, Detect, Analyze, research, and respond to cyber security events including Network events, OS Log events and forensic information.
  • Demonstrate strong grasp of forensic interpretation of data
  • Perform eDiscovery and other technical tasks.
  • Independently lead investigations and small projects.
  • Act as Incident Commander on minor (P3-P4) incidents.
  • Train and mentor junior staff members.
  • Collaborate with stakeholders from other business units to conduct investigations, review plans and procedures, and respond to cyber incidents.
  • Participate in training, exercises, and process improvement program.
  • Occasionally travel to conferences, training, and other DTCC offices (up to 10%).
  • Participate in on-call rotation and occasional after-hours work.

Qualifications :

  • Minimum of 4 years in IT working experience.
  • Bachelor's degree and / or equivalent experience preferred.
  • Talents Needed for Success :

  • Have at least four (4) years previous experience as a SOC analyst or similar role.
  • Working knowledge of various security methodologies and processes, and technical security solutions.
  • knowledge on Incident response process, log analysis, packet analysis, Forensics.
  • Tools : SIEM, EDR, IDS, NBA, Cloud security.

  • Demonstrated ability working within a SOC type environment.
  • Skill on at-least one scripting language are a great plus.
  • intermediate to advanced level of Malware analysis skills in both sandbox and manual methods.
  • Demonstrate the ability to produce written reports including detailed analysis and recommendations.
  • Demonstrate the ability to convey complex technical concepts to both technical and non-technical audiences.
  • Have hands-on experience with modern security tools and DFIR best practices.
  • Demonstrate the ability to take high-level requirements and with some guidance produce and execute an action plan to accomplish tasks.
  • Demonstrate the ability to prioritize and manage multiple tasks with some guidance.
  • Demonstrate a strong desire to achieve and contribute to a high-performing team.
  • Actual salary is determined based on the role, location, individual experience, skills, and other considerations.