Explore careers with our portfolio companies

Security Operations Analyst - Hyderabad

E2open

E2open

IT, Operations
Southern Asia · East Asia · Oceania
Posted on Sep 18, 2024

E2open is the connected supply chain platform that enables the world’s largest companies to transform the way they make, move, and sell goods and services. We connect more than 400,000 partners as one multi-enterprise network. Powered by the network, data, and applications, our SaaS platform anticipates disruptions and opportunities to help companies improve efficiency, reduce waste, and operate sustainably. Our employees around the world are focused on delivering enduring value for our clients.

Title: Security Operation Analyst
Location: Hyderabad
Experience: 2 to 4 years

Job Descriptions
The Cyber Security Analyst be responsible for handling security events/alerts and providing rapid response with the understanding of network infrastructure and security tools. In addition to this, the analyst will be responsible for executing a cyber threat hunting program to identify, detect, mitigate, and respond to cyber threats and advanced threat actors.

Responsibilities and Tasks

  • Performing daily detect and response functions, closely aligned with typical SOC functions.
  • Analyze, and investigate alerts/incidents as required, perform in-depth analysis, summarize observations, and perform root cause analysis as required.
  • Conduct proactive threat-hunting operations to detect and investigate sophisticated cyber threats including advanced persistent threats (APTs).
  • Analyze security event logs, network traffic, and other security data to identify indicators of compromise (IOCs) and potential security breaches.
  • Enhance detection and response capabilities by creating and enhancing threat-hunting methodologies, processes, and playbooks.
  • Undertake investigation for the various threat advisories/feeds received within the shift, in line with the defined process.
  • Present threat hunt findings to management and develop use cases on pervasive threats as identified by Offensive Security/Red teams and recent security incidents.
  • Provide technical and service mentorship to other SOC analysts.
  • Stay up to date with the latest cybersecurity threats, vulnerabilities, and attack methodologies.

Required Experience and Knowledge:

  • 2-4 years of Experience
  • Excellent communication skills, with an emphasis on the ability to discuss technical issues with non-technical people.
  • Experience of cyber threat hunt working within a global organization and understanding of offensive security strategies and assessment methodologies.
  • Have an understanding in at least three of the following areas: Network, and Internet Security; Operations Security; Risk and Compliance; Access Control Systems and Methodologies; Security Architectures and Models; Security Management Practices; Investigative techniques.
  • Exposure to Incident Response, Threat Hunting, Vulnerability Management among other cyber security streams
  • Excellent Organizational skills and the ability to see Incidents to their conclusion.
  • The ability to define and communicate risk in business-relevant language.
  • The ability to react to high pressure dynamic changing environments.
  • Advanced problem solving and analytical skills.

Background and Education:

  • Bachelor’s degree or higher from an accredited 4-year university
  • CEH /CompTIA certified.

E2open is proud to be an Equal Employment Opportunity employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, reproductive health decisions, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, genetic information, political views or activity, or other applicable legally protected characteristics.

E2open participates in the E-verify program in certain locations, as required by law.

E2open does not accept unsolicited referrals or resumes from any source other than directly from candidates or preferred vendors. We will not consider unsolicited referrals.