Principle Analyst, Cybersecurity Incident Response
NTT Ltd.
  • locationNorth Ryde, NSW
  • salaryNot disclosed
  • full-time 22 March 2021
  • locationNorth Ryde, NSW
  • salaryNot disclosed
  • full-time
Job Description

In a constantly changing world, we work together with our people, clients and communities to enable them to fulfill their potential to do great things. We believe that by bringing everyone together, we can solve problems using innovative technology that can create a world that is sustainable and secure. At NTT, we encourage you to remain continuously curious, as that is what keeps you fast, flexible and relevant. No two days will be the same but that is what will help you grow and realize your full potential. The power is in your hands to do great things. It’s time to lead the change, be the authentic you, to solve difficult challenges, to set the pace of change and to unleash your potential. Want to be a part of our team?The Cyber Security Incident Response (CSIR) team is essential in providing an orchestrated and rapid security incident response capability with an oversight of security incident response across wider NTT Managed Security Services clients. The CSIR team utilise various security technologies to identify alerts, prioritize and investigate security issues in a fast-paced environment maintain the level of communication with internal and client stakeholders. As the CSIR engineer, the typical day can vary greatly depending on the specific position. They may begin their day by looking over dashboards, reports from the previous day or shift, including checking for any new threats and identifying malware that may have infiltrated the system. also prepare for and respond to system breaches or attacks. These processes might differ between Clients, but they generally include responding to hacks or network insecurities and working to prevent new ones. You will also be required to participate in a shift roster which may comprise of shifts business hours and after hours. Prepares detailed incident reports and technical briefs for the IT security team. Working at NTT Manage day-to-day operations of reviewing SIEM alert and other vulnerability management tools. Ensure that all the various environments within the Client have adequate scans and assessments performed. Research and recommend mitigation strategy for current and future threats relevant to the Clients environment. Combine outputs from the Cybersecurity Advisory with threat intelligence, to develop contextualised attack scenarios for testing Client’s cyber resilience. Prepares detailed incident reports and technical briefs for the IT security teams and Non-technical audience. Monitor the progress of attack simulations to validate the effectiveness of technical security controls, as well as people and processes, in the prevention, detection and response to real attack behaviours. Participate in security incident response process when required. Assist in Security Incident Response and provide insights on security incidents and threats. Recommend enhancements to AMP security controls or policy configurations to improve the security posture of AMP. Proactively inform any misconfigurations to the Client team and raising tasks against the Clients Tech Domain using the Clients Service Management platform. Collaborate with Client to ensure alignment of Client security objectives with business priorities across Client Tech Domains and other 3rd party providers. Recommend enhancements to Client security controls or policy configurations to improve the security posture. Support the Security Management Lifecycle including: Real-time Monitoring Incident investigation. Research. Correlation. Trending. Remediation. Setup and configure SIEM, including data analysis, rule creation. establish thresholds, reference lists, and other duties. Setup, investigate, and advanced troubleshooting of log transport agents. Work with technology owners and platform leads to ensure vulnerabilities and issues are patched and remediated on time. Oversee the implementation and management of operational security reporting activities. Regularly, meet with the internal team to review security reports, status, review any risks, issues, incidents, and outstanding activities. Vulnerability Management, Malware analysis, Threat hunting and assist in forensic analysis. Managing stakeholder expectations and assisting in the reduction of the impact of a cybersecurity event or incident. Contribute to maintaining knowledge base/playbooks by updating procedural documentation. Actively participate in process improvement with other team members and Wider team. Maintain detailed knowledge of the clients’ environment(s), where applicable, by maintaining and updating relevant documentation. Provide proactive, constant, and clear communication on the status of incident/problem resolution between the client, NTT, and any other third-party supplier and vendors. What will make you a good fit for the role? An Individual with curious mind, a problem solver, a good researcher with good presentation and documentation skills. Experience in working in Security Operation Centre with good understanding of NIST framework. Hands-on experience in managing Splunk, other SIEM logging solution like Microsoft Sentinel, ArcSight. Vulnerability Management solution like Qualys and Tenable experience. SOAR solution like Palo Alto Cortex XSOAR or other SOAR solutions. Hands-on experience to Analyse logs/events from SIEM solution, other infrastructure, Expertise in interpreting and querying Wireshark captures. Experience in managing Security Incidents detect and response, Threat hunt capability with knowledge of Kill chain methodology. Experience in triaging Threat feeds and work towards mitigation and simulation exercise. Experience in reviewing the vulnerability, product bug reports and relating its impact to Clients environment. Hands-on knowledge on the creation of use cases within SIEM solution including advanced correlation rules. Creating custom dashboards based on the client's security landscape. Ability to filter through false positives quickly and focus on true positives. Analyse and perform fine-tuning of SIEM rules/policies on regular basis. Hands-on experience in analysing SIEM alert payload to detect any malicious activity. Good understand of penetration tests and Threat actor simulation both with-in and outside the organisation. Complete understanding of Digital Forensics concept and the process followed therein. Operational knowledge on Security compliance tools like AlgoSec, Firemom, Skybox or Tufin Desirable skills Demonstrated genuine interests and passion for cybersecurity is a must. Working knowledge of security operations environments and security incident management & response handling. Certification - SANS GSEC, Splunk Core/Enterprise Certified admin User , Qualys. Windows / Linux skills and experience with scripting/programming, especially python. Proficiency in Analytics technologies like Elasticsearch, PowerBI, JSON). Exposure to Cyber Security Governance and Risk Compliance (GRC) and experience in providing innovative solutions to complex cybersecurity problems. Strong organisational skills & the ability to prioritise multiple complex tasks. Ability to work effectively under pressure. Excellent verbal and written communication skills are essential to influence both technical and non-technical audiences. Academic Qualifications and Certifications: Degree / Certifications SANS GIAC Security Essentials (GSEC) or equivalent SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent SANS GIAC Certified Incident Handler (GCIH) or equivalent Industry Certifications: CISSP, CISM, CISA, CEH, CHFI Information Technology / ITILSM / ICT Security / ITIL v4 Required Experience: Extensive experience in a Technology Information Security Industry Prior experience working in a SOC/CSIRT for at least 5- 8 years Good Hands-on experience on Splunk solution. Tertiary qualifications or a passionate ethical hacker Experience using End Point Protection Software Experience with Enterprise Detection & Response software

Supporting Documents

    NONE

Share This Job
About

As a leading specialist fibre and network solutions provider, Vocus connects people, businesses, governments, and communities across Australia and New Zealand, to the world. With a world-class team of experts, we challenge convention and do things d

About NTT Ltd.

Supporting Documents

    NONE

company-profile-photo

Principle Analyst, Cybersecurity Incident Response

  • Job Details:
    Not disclosed AUD
    North Ryde, NSW, Any
  • Key Dates:
    22 March 2021
    Last -11 days to apply
  • Industry:
    Information and Communication Technology
  • Insights:
    0 Applicants
    1 Views
Job Description

In a constantly changing world, we work together with our people, clients and communities to enable them to fulfill their potential to do great things. We believe that by bringing everyone together, we can solve problems using innovative technology that can create a world that is sustainable and secure. At NTT, we encourage you to remain continuously curious, as that is what keeps you fast, flexible and relevant. No two days will be the same but that is what will help you grow and realize your full potential. The power is in your hands to do great things. It’s time to lead the change, be the authentic you, to solve difficult challenges, to set the pace of change and to unleash your potential. Want to be a part of our team?The Cyber Security Incident Response (CSIR) team is essential in providing an orchestrated and rapid security incident response capability with an oversight of security incident response across wider NTT Managed Security Services clients. The CSIR team utilise various security technologies to identify alerts, prioritize and investigate security issues in a fast-paced environment maintain the level of communication with internal and client stakeholders. As the CSIR engineer, the typical day can vary greatly depending on the specific position. They may begin their day by looking over dashboards, reports from the previous day or shift, including checking for any new threats and identifying malware that may have infiltrated the system. also prepare for and respond to system breaches or attacks. These processes might differ between Clients, but they generally include responding to hacks or network insecurities and working to prevent new ones. You will also be required to participate in a shift roster which may comprise of shifts business hours and after hours. Prepares detailed incident reports and technical briefs for the IT security team. Working at NTT Manage day-to-day operations of reviewing SIEM alert and other vulnerability management tools. Ensure that all the various environments within the Client have adequate scans and assessments performed. Research and recommend mitigation strategy for current and future threats relevant to the Clients environment. Combine outputs from the Cybersecurity Advisory with threat intelligence, to develop contextualised attack scenarios for testing Client’s cyber resilience. Prepares detailed incident reports and technical briefs for the IT security teams and Non-technical audience. Monitor the progress of attack simulations to validate the effectiveness of technical security controls, as well as people and processes, in the prevention, detection and response to real attack behaviours. Participate in security incident response process when required. Assist in Security Incident Response and provide insights on security incidents and threats. Recommend enhancements to AMP security controls or policy configurations to improve the security posture of AMP. Proactively inform any misconfigurations to the Client team and raising tasks against the Clients Tech Domain using the Clients Service Management platform. Collaborate with Client to ensure alignment of Client security objectives with business priorities across Client Tech Domains and other 3rd party providers. Recommend enhancements to Client security controls or policy configurations to improve the security posture. Support the Security Management Lifecycle including: Real-time Monitoring Incident investigation. Research. Correlation. Trending. Remediation. Setup and configure SIEM, including data analysis, rule creation. establish thresholds, reference lists, and other duties. Setup, investigate, and advanced troubleshooting of log transport agents. Work with technology owners and platform leads to ensure vulnerabilities and issues are patched and remediated on time. Oversee the implementation and management of operational security reporting activities. Regularly, meet with the internal team to review security reports, status, review any risks, issues, incidents, and outstanding activities. Vulnerability Management, Malware analysis, Threat hunting and assist in forensic analysis. Managing stakeholder expectations and assisting in the reduction of the impact of a cybersecurity event or incident. Contribute to maintaining knowledge base/playbooks by updating procedural documentation. Actively participate in process improvement with other team members and Wider team. Maintain detailed knowledge of the clients’ environment(s), where applicable, by maintaining and updating relevant documentation. Provide proactive, constant, and clear communication on the status of incident/problem resolution between the client, NTT, and any other third-party supplier and vendors. What will make you a good fit for the role? An Individual with curious mind, a problem solver, a good researcher with good presentation and documentation skills. Experience in working in Security Operation Centre with good understanding of NIST framework. Hands-on experience in managing Splunk, other SIEM logging solution like Microsoft Sentinel, ArcSight. Vulnerability Management solution like Qualys and Tenable experience. SOAR solution like Palo Alto Cortex XSOAR or other SOAR solutions. Hands-on experience to Analyse logs/events from SIEM solution, other infrastructure, Expertise in interpreting and querying Wireshark captures. Experience in managing Security Incidents detect and response, Threat hunt capability with knowledge of Kill chain methodology. Experience in triaging Threat feeds and work towards mitigation and simulation exercise. Experience in reviewing the vulnerability, product bug reports and relating its impact to Clients environment. Hands-on knowledge on the creation of use cases within SIEM solution including advanced correlation rules. Creating custom dashboards based on the client's security landscape. Ability to filter through false positives quickly and focus on true positives. Analyse and perform fine-tuning of SIEM rules/policies on regular basis. Hands-on experience in analysing SIEM alert payload to detect any malicious activity. Good understand of penetration tests and Threat actor simulation both with-in and outside the organisation. Complete understanding of Digital Forensics concept and the process followed therein. Operational knowledge on Security compliance tools like AlgoSec, Firemom, Skybox or Tufin Desirable skills Demonstrated genuine interests and passion for cybersecurity is a must. Working knowledge of security operations environments and security incident management & response handling. Certification - SANS GSEC, Splunk Core/Enterprise Certified admin User , Qualys. Windows / Linux skills and experience with scripting/programming, especially python. Proficiency in Analytics technologies like Elasticsearch, PowerBI, JSON). Exposure to Cyber Security Governance and Risk Compliance (GRC) and experience in providing innovative solutions to complex cybersecurity problems. Strong organisational skills & the ability to prioritise multiple complex tasks. Ability to work effectively under pressure. Excellent verbal and written communication skills are essential to influence both technical and non-technical audiences. Academic Qualifications and Certifications: Degree / Certifications SANS GIAC Security Essentials (GSEC) or equivalent SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent SANS GIAC Certified Incident Handler (GCIH) or equivalent Industry Certifications: CISSP, CISM, CISA, CEH, CHFI Information Technology / ITILSM / ICT Security / ITIL v4 Required Experience: Extensive experience in a Technology Information Security Industry Prior experience working in a SOC/CSIRT for at least 5- 8 years Good Hands-on experience on Splunk solution. Tertiary qualifications or a passionate ethical hacker Experience using End Point Protection Software Experience with Enterprise Detection & Response software


Be Careful

Don’t provide your bank or credit card details when applying for jobs. Learn how to protect yourself here.

Share This Job
Want to be successful in securing this job?

Post your task and get experts help on:

  • Resume
  • Coverletter
  • Job Application

Get help from Experts Now!