Security Threat Analyst

Posted:
7/5/2024, 5:00:00 PM

Location(s):
Telangana, India ⋅ Hyderabad, Telangana, India

Experience Level(s):
Junior ⋅ Mid Level ⋅ Senior

Field(s):
IT & Security

ROLES & RESPONSIBILITIES  

  • Reviews alerts generated by SentinelOne and implements appropriate containment and mitigation measures
  • Analyzes payloads using JoeSandbox and escalates to the appropriate team as necessary
  • Collaborates with the Forensics team to conduct threat hunting using identified Indicators of Compromise (IoCs) and Tactics, Techniques, and Procedures (TTPs)
  • Assists the Tiger Team in targeted collections of systems based on identified malicious activities in the client's environment
  • Conducts historical log reviews to support threat hunting efforts and ensures all malicious artifacts are mitigated in the SentinelOne console
  • Examines client-provided documents and files to supplement the SOC investigation and mitigation strategy
  • Conducts perimeter scans of client infrastructure and reports any identified vulnerabilities to the Tiger Team for appropriate escalation
  • Manages client-related tasks within the ConnectWise Manage ticketing system as part of the Client Handling Lifecycle
  • Creates user accounts in SentinelOne console for the client
  • Generates Threat Reports showcasing activity observed within the SentinelOne product
  • Executes passphrase exports as needed for client offboarding
  • Submits legacy installer requests to ensure the team is properly equipped for deployment
  • Provides timely alert notifications to the IR team of any malicious activity impacting our clients
  • Assists with uninstalling/migrating SentinelOne
  • Generates Ranger reports to provide needed visibility into client environments
  • Manages and organizes client assets (multi-site and multi-group accounts)
  • Applies appropriate interoperability exclusions relating to SentinelOne and client applications
  • Performs SentinelOne installation / interoperability troubleshooting as needed
  • Contributes to the overall documentation of SOC processes and procedures
  • Participates in “Handler on Duty (HOD) shifts as assigned to support the TT client matters
  • Internally escalates support ticket / alerts to Tier II-IV Analysts as needed
  • May perform other duties as assigned by management

SKILLS AND KNOWLEDGE  

  • Demonstrated knowledge of Windows and Unix operating systems
  • Thorough understanding of Digital Forensics and Incident Response practices
  • Proficiency in advanced analysis techniques for processing and reviewing large datasets in various formats
  • Familiarity with TCP/IP and OSI Model concepts at a basic level
  • Expertise in the Incident Response Life Cycle stages (Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned)
  • Working knowledge of the MITRE ATT&CK framework at an intermediate level
  • Proven ability to work independently and solve complex problems with little direction from management
  • Highly detail-oriented and committed to producing quality work

JOB REQUIREMENTS

  • Associate’s degree and 6+ years of IT related experience or Bachelor’s Degree and 2-5 years related experience
  • Current or previous knowledge of, or previous experience with, Endpoint Detection and Response (EDR) toolsets
  • General knowledge of the Incident Handling Lifecycle
  • Ability to communicate in both technical and non-technical terms both oral and written

DISCLAIMER

The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. 

WORK ENVIRONMENT

While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job.

PHYSICAL DEMANDS

  • No physical exertion required
  • Travel within or outside of the state
  • Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects

TERMS OF EMPLOYMENT

Salary and benefits shall be paid consistent with Arete salary and benefit policy.

FLSA OVERTIME CATEGORY

Job is exempt from the overtime provisions of the Fair Labor Standards Act.

DECLARATION

The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description.

EQUAL EMPLOYMENT OPPORTUNITY

We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better. 

#LI

Arete Incident Response is an outstanding (and growing) company with a very dedicated, fun team. We offer competitive salaries, fully paid benefits including Medical/Dental, Life/Disability Insurance, 401(k) and the opportunity to work with some of the latest and greatest in the fast-growing cyber security industry.

 

 

When you join Arete…

You’ll be doing work that matters alongside other talented people, transforming the way people, businesses, and things connect with each other. Of course, we will offer you great pay and benefits, but we’re about more than that. Arete is a place where you can craft your own path to greatness. Whether you think in code, words, pictures or numbers, find your future at Arete, where experience matters.

Equal Employment Opportunity

We’re proud to be an equal opportunity employer- and celebrate our employees’ differences, regardless of race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or Veteran status. Different makes us better.