Ingram Micro
Join our Talent Network

This site uses and sets "cookies" on your computer to help make this website better. You can learn more about these cookies and general information about how to change your cookie settings by clicking here. By continuing to use this site without changing your settings, you are agreeing to our use of cookies.

Skip to main content

Senior Professional, Cyber Security-IND

Chennai, TN, India
Job ID: 55326

Share:

Description

Ingram Micro touches 80% of the technology you use every day with our focus on Technology Solutions, Cloud, and Commerce and Lifecycle Solutions. With $50 billion in revenue, we have become the world’s largest technology distributor with operations in 64 countries and more than 35,000 associates.

Position Summary: Provide a L3 level support, manage the queue and lead incident response engagements, evaluate, and respond incident response procedures and capabilities. Managing the Security incidents queue and track the SLA of tickets. Analyze data, such as logs or packets captures, from various sources within the enterprise and draw conclusions regarding past and future security incidents. Guiding the Junior team members with aspects of their job. Demonstrate the experience in working security technologies such as Security Incident and Event Management (SIEM), Endpoint Detection and Response (EDR), and Threat Hunting. Collaborate with multiple teams to Operationalize new security controls. Be there as a point of escalation in a technical environment. Ability to provide on call support when needed

What you bring to the role: Minimum 5 or more years of full-time professional experience in the Information Security field. Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or inhouse SOC. Familiarity with MITRE ATT&CK and methods to detect suspicious and malicious behavior. Basic understanding of vulnerability assessment tools. Evaluate, respond, and mitigate alerts that originate from the SIEM and the Cybersecurity product suite, IDS/IPS, Anti-virus, Web Application Firewalls, NAC Solution, EDR, etc. Identify the root cause of the incidents. Ability to identify common false positives and work towards the fine-tuning. Familiarity with web-based exploit kits and the methods employed by web-based exploit kits. Familiarity with concepts associated with Advanced Persistent Threats and “targeted malware.” Understanding of malware mitigation controls in an enterprise environment. Covert channels, egress, and data exfiltration techniques. Familiarity with vulnerability scoring systems such as CVSS. Join forces with internal Security Incident Response Team (SIRT) during investigations. Author investigation reports for technical and non-technical audience. Willing to work in shift pattern. Two or more certifications preferred (GCIA, GSEC, GMON, GCIH, CISSP, CCSE, CISA, HBSS, NSA, CEH, Cisco Security, Security +)

*This is not a complete listing of the job duties. It’s a representation of the things you will be doing, and you may not perform all of these duties.

Ingram Micro
Share:
mail

STILL LOOKING?

Get updates about the latest job openings
that match your skills.

Sign up today