Main Purpose of Role : Expert in areas of security deception solutions, Security Monitoring & Response services, responsible for development, implementation & delivery.
Performs & implements threat detection, hunting, incident monitoring, investigation & response activities are effectively delivered and enhanced for future. Main Responsibility Areas :
Telecom network threat use case for deception
Managed detection and response
Threat Intelligence & Threat hunting
Design & manage Deception Platform and Application
Design & implement deception use cases for telecom network
Apply various analytical methods, tools, and techniques for implementing effective deception solution (e.g., competing hypotheses;
chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network / association or link analysis; etc.).
Develops and maintains deception platforms & processes to support enterprise mission needs; develops rules and requirements that describe baseline and target architectures.
Responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence.
Ensure timely detection, identification, and alerting of possible attacks / intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.
Internal & external threat environment)
Create, update & manage the knowledgebase.
Deploy Security automation & response, threat intelligence & hunting capabilities
Support in development of incident response plans and procedures to ensure that business-critical services are recovered in the event of a security event
Perform review & analysis with stakeholders to help establish the lessons learnt, create & update new / existing processes & procedures to mature the security operations services & support.
Determine tactics, techniques, and procedures (TTPs) for intrusion sets..
Improve scoring and grading metrics for effectiveness of continuous monitoring program.
Key Competencies :
Experience in developing deception use cases, Threat hunting, Forensics solutions for telecom network
Skilled in denial and deception techniques and technology solutions
Skill in implementing, maintaining, and improving established network security practices.
Knowledge of configuring and utilizing network protection components and software-based computer protection tools (e.g.
Firewalls, VPNs, NIPS, HIDS, antivirus etc.).
Skilled in troubleshooting and diagnosing cyber defence infrastructure anomalies and work through resolution.
Skilled in system, network, and OS hardening techniques. (e.g., remove unnecessary services, password policies, network segmentation, enable logging, least privilege, etc.).
Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict / prevent external devices, spam filters).
Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol TCP and Internet Protocol IP , Open System Interconnection Model OSI , Information Technology Infrastructure Library, current version ITIL ).
Knowledge of specific operational impacts of cybersecurity lapses.
Knowledge of Vulnerability Management, Penetration Testing principles, Secure configuration and Application Security tools, and techniques.
Knowledge of network security architecture concepts and principles (e.g., application of defense-in-depth).
Good written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate security and risk-related concepts to technical and nontechnical audiences at various hierarchical levels
Poise and ability to act calmly and competently in high-pressure, high-stress situations
Should be a critical thinker, with strong problem-solving skills
Experience & Certification :
8 to 15 years of total experience
Minimum 5 years of recent and relevant experience
Security Certifications (Active certification preferred)
OSCP (Offensive Security Certified Professional)
CEH (Certified Ethical Hacker)
Degree in computer, electrical, software, or systems engineering, graduate degree preferred Additional Information