About the job
About The Role
Security Analyst - 2 will cover the incident response aspects of cybersecurity in Flipkart. The Security
Analyst - 2 should be with 5 years of experience and have a minimum of 2.5 years in cyber incident
response. The responsibilities of this role will be to collaborate with internal and external stakeholders,
collect digital evidence related to incidents, the ability to perform triaging, analysis & reporting andperform
RCA(root cause analysis) of incidents.
What You’ll Do
Investigate, document, and report on information security issues and emerging threats.
Provide Incident Response (IR) support when analysis confirms the actionable incident.
Isolation of affected systems, collect and analyze triage/logs, contain the incident and provide
remediation strategy.
Gather information from various threat intel sources and initiate remediation steps to neutralize
the risk to the organisation.
Monitor and analyze logs and alerts from a variety of different technologies across multiple
platforms to identify and triage security incidents affecting the enterprise.
Performing threat hunting along with in-depth investigation and support to incidents escalated
from SOC.
Define and document playbooks, standard operating procedures, and process.
Document results of cyber threat analysis effectively and prepares comprehensive hand-off
and/or escalation for Incident Response process.
Utilize security tools and technologies to analyze potential threats to determine impact, scope,
and recovery.
Collaboration with internal and external stakeholders.
Strong knowledge to conduct a detailed analysis of various security-related events like Phishing,
Malware, DoS/DDoS, Application-specific Attacks, Ransomware, etc.
Also Involves communicating with key business units for making recommendations on mitigation
and prevention techniques.
Research and explore the enrichment and correlation of existing data sets to provide deep threat
analysis.
Contribute and/or drive special projects by providing expertise, guidance, and leadership.
What You’ll Need
Technical know-how on the organisation’s application, system, network and infrastructure.
Deep understanding of technologies and architecture in a highly scalable enterprise network.
Deep understanding of logging mechanisms of Windows, Linux, and MAC OS platforms,
networking.
Proficiency with any of the following: EDR, Anti-Virus, HIPS, NIDS/NIPS, Full Packet Capture,
Network-Based Forensics, and Encryption.
Advanced certifications such as SANS GIAC / GCIA / GCIH, CISSP or CASP and/or IR-specific
training and certification is an added advantage.
At least 5 years of experience as lead investigator and 2.5 years of experience as lead analyst in
Incident Response.
Expertise in IRP (Incident Response Playbook) creation and execution.
Good communication skills to coordinate among various stakeholders of the organization.
ANY GRADUATE