Posted:
4/7/2025, 9:36:20 PM
Location(s):
Telangana, India ⋅ Hyderabad, Telangana, India
Experience Level(s):
Senior
Field(s):
IT & Security
At Medtronic you can begin a life-long career of exploration and innovation, while helping champion healthcare access and equity for all. You’ll lead with purpose, breaking down barriers to innovation in a more connected, compassionate world.
Responsibilities may include the following and other duties may be assigned.
Threat Intelligence Platform: Implement, manage, and optimize threat intelligence platforms (TIPs) to centralize, analyze, and operationalize threat data.
Threat Briefings: Deliver actionable threat insights to technical and non-technical audiences, including executives and stakeholders.
Cybersecurity Standups: Participate in team standups, sharing insights on emerging threats and incidents from intelligence feeds.
Intelligence Gathering: Collect and analyze data from OSINT, TIPs, and industry publications to identify new vulnerabilities, malware variants, and adversary tactics.
Trend Analysis: Evaluate intelligence to identify trends, risks, and suggest mitigation strategies specific to Medtronic’s environment.
Investigation Support: Provide actionable threat intelligence for ongoing investigations and share insights on threat actor tactics and IOCs.
Vulnerability Management: Collaborate with the vulnerability management team to prioritize findings based on threat intelligence.
Threat Modeling: Develop and refine threat models, assessing attack vectors and organizational defenses to recommend improvements.
Situational Briefings: Write and deliver threat briefings, raising awareness of relevant current events or vulnerabilities that could impact Medtronic.
Documentation: Record all findings and methodologies for future reference and analysis.
Threat Hunting Evaluation: Assess the effectiveness of threat hunting efforts, highlighting successes and areas for improvement.
Mentorship & Team Development: Mentor junior analysts, fostering growth and enhancing team capabilities.
Collaboration: Work with Incident Response, Vulnerability Management, and Security Engineering teams to share intelligence and strengthen defenses.
Strong collaboration experience with SOC and IR teams, leveraging MITRE ATT&CK, YARA, and Sigma rules to enhance detection and defense strategies.
Minimum Qualifications
8+ years of experience
Experience with SIEM solutions (Splunk, QRadar) and EDR tools (CrowdStrike, Carbon Black).
Strong knowledge of attack techniques and frameworks (e.g., MITRE ATT&CK).
Malware analysis and IDS/IPS experience.
Ability to analyze logs and network traffic for anomalies.
Proven ability to deliver high-impact intelligence briefings to executive leadership, board members, and technical teams.
Outstanding written and verbal communication skills.
NICE TO HAVE (Preferred Qualifications)
Strongly Preferred:
Industry certifications such as GCTI, GCIH, GREM, GOSI, CTIA.
10+ years of experience in cybersecurity with a strong focus on cyber threat intelligence, adversary tracking, and geopolitical threat analysis.
Experience in implementing, managing, and optimizing free (MISP, OpenCTI) and/or commercial Threat Intelligence Platforms (TIPs), such as Recorded Future, ThreatConnect, Anomali, Mandiant Advantage, Intel 471, etc. to centralize, analyze, and operationalize threat data.
Proficiency in OSINT tools (e.g., Maltego, SpiderFoot, Recon-ng, Shodan) and experience monitoring the Clearnet and dark web for emerging threats including but not limited to deep fakes and AI.
Experience with integrating TIPs with existing tools and workflows, such as SIEMs, SOAR platforms, and incident response processes.
Experience using the Intelligence Cycle, Cyber Kill Chain, and MITRE ATT&CK frameworks
Ability to write scripts and find opportunities for automation to streamline data collection, analysis, enrichment, and reporting processes.
Develop and lead hands-on training sessions and workshops to upskill colleagues in key areas, including threat intelligence, incident response, and advanced threat hunting techniques.
xperience contributing to ISACs, industry threat-sharing groups, or initiatives such as H-ISAC, MS-ISAC, or CISA programs.
Physical Job Requirements
The above statements are intended to describe the general nature and level of work being performed by employees assigned to this position, but they are not an exhaustive list of all the required responsibilities and skills of this position.
Medtronic offers a competitive Salary and flexible Benefits Package
A commitment to our employees lives at the core of our values. We recognize their contributions. They share in the success they help to create. We offer a wide range of benefits, resources, and competitive compensation plans designed to support you at every career and life stage.
We lead global healthcare technology and boldly attack the most challenging health problems facing humanity by searching out and finding solutions.
Our Mission — to alleviate pain, restore health, and extend life — unites a global team of 95,000+ passionate people.
We are engineers at heart— putting ambitious ideas to work to generate real solutions for real people. From the R&D lab, to the factory floor, to the conference room, every one of us experiments, creates, builds, improves and solves. We have the talent, diverse perspectives, and guts to engineer the extraordinary.
Learn more about our business, mission, and our commitment to diversity here
Website: https://www.medtronic.com/
Headquarter Location: Mumbai, Maharashtra, India
Employee Count: 1001-5000
Year Founded: 1979
IPO Status: Private
Industries: Health Care ⋅ Manufacturing ⋅ Medical Device