Threat intelligence - Job Description
͏
Primary Functions and Responsibilities
- Worki location only for Bangalore
- Should be good at Recorded Features & Anomoly.
- Develop/improve internal processes and standards for threat intelligence workflow.
- Drive the normalization, correlation, automation and integration of internal, subscription threat intelligence source as well as OSINT.
- Produce actionable intelligence in the form of reports, notifications, alerts, and briefings.
- Support production of signatures based on internal and externally sourced data and information.
- Support development of custom intelligence research tools and metrics.
- Ensure appropriate telemetry and response capabilities are operating effectively across the security tool stack
- Lead research into intelligence analysis, including analytic tradecraft, and demonstrate critical thinking skills.
- Develop mitigation and countermeasure strategies from collected threat intelligence.
- Support of Incident Response activities as needed
- Other duties related to the position as assigned.
͏
Minimum Qualifications
- Bachelor’s or master’s degree in computer science, computer engineering, digital forensics, cyber security, information assurance or security studies
- 6+ years of information security experience; preferably in a role related to any of the following disciplines: Threat Intelligence, security operations, network monitoring or analysis, intrusion or anomaly detection analysis, threat hunting, threat attribution assessment
- 3+ years hands-on support in incident response and/or investigations
- Excellent problem solving and decision-making skills
- Strong analytical skills and problem-solving skills, curiosity, thinking out-of-box.
- Ability to break down complex problems into workable components.
- Skills developing with python, PowerShell, Golang, bash or other programming languages (prefer python).
- Ability to demonstrate practical knowledge of research/collection skills and analytical methods.
- General understanding of threat/risk management and threat/risk assessment.
- Experience conducting threat modelling and with the intelligence cycle
- Experience with computer forensics and/or malware analysis.
- Strong working knowledge of security-relevant data, including network protocols, ports and common services, such as TCP/IP network protocols and application layer protocols (e.g., HTTP/S, DNS, FTP, SMTP, Active Directory etc.), system administration concepts
͏
͏
Experience: 3-5 Years .
Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention.