Principle Analyst, Cybersecurity Incident Response
Johannesburg, South Africa
2h ago

Want to be a part of our team?

The Cyber Security Incident Response (CSIR) team is essential in providing an orchestrated and rapid security incident response capability with an oversight of security incident response across wider NTT Managed Security Services clients.

The CSIR team utilise various security technologies to identify alerts, prioritize and investigate security issues in a fast-paced environment maintain the level of communication with internal and client stakeholders.

As the CSIR engineer, the typical day can vary greatly depending on the specific position. They may begin their day by looking over dashboards, reports from the previous day or shift, including checking for any new threats and identifying malware that may have infiltrated the system.

also prepare for and respond to system breaches or attacks. These processes might differ between Clients, but they generally include responding to hacks or network insecurities and working to prevent new ones.

You will also be required to participate in a shift roster which may comprise of shifts business hours and after hours.

Prepares detailed incident reports and technical briefs for the IT security team.

Working at NTT

Manage day-to-day operations of reviewing SIEM alert and other vulnerability management tools. Ensure that all the various environments within the Client have adequate scans and assessments performed.

Research and recommend mitigation strategy for current and future threats relevant to the Clients environment.Combine outputs from the Cybersecurity Advisory with threat intelligence, to develop contextualised attack scenarios for testing Client’s cyber resilience.

Prepares detailed incident reports and technical briefs for the IT security teams and Non-technical audience.Monitor the progress of attack simulations to validate the effectiveness of technical security controls, as well as people and processes, in the prevention, detection and response to real attack behaviours.

Participate in security incident response process when required.Assist in Security Incident Response and provide insights on security incidents and threats.

Recommend enhancements to AMP security controls or policy configurations to improve the security posture of AMP.Proactively inform any misconfigurations to the Client team and raising tasks against the Clients Tech Domain using the Clients Service Management platform.

Collaborate with Client to ensure alignment of Client security objectives with business priorities across Client Tech Domains and other 3rd party providers.

Recommend enhancements to Client security controls or policy configurations to improve the security posture.Support the Security Management Lifecycle including : Real-time MonitoringIncident investigation.

Research.Correlation.Trending.Remediation.Setup and configure SIEM, including data analysis, rule creation. establish thresholds, reference lists, and other duties.

Setup, investigate, and advanced troubleshooting of log transport agents. Work with technology owners and platform leads to ensure vulnerabilities and issues are patched and remediated on time.

Oversee the implementation and management of operational security reporting activities.Regularly, meet with the internal team to review security reports, status, review any risks, issues, incidents, and outstanding activities.

Vulnerability Management, Malware analysis, Threat hunting and assist in forensic analysis.Managing stakeholder expectations and assisting in the reduction of the impact of a cybersecurity event or incident.

Contribute to maintaining knowledge base / playbooks by updating procedural documentation. Actively participate in process improvement with other team members and Wider team.

Maintain detailed knowledge of the clients’ environment(s), where applicable, by maintaining and updating relevant documentation.

Provide proactive, constant, and clear communication on the status of incident / problem resolution between the client, NTT, and any other third-party supplier and vendors. #ownyourfuture

What will make you a good fit for the role?

  • An Individual with curious mind, a problem solver, a good researcher with good presentation and documentation skills.
  • Experience in working in Security Operation Centre with good understanding of NIST framework.
  • Hands-on experience in managing Splunk, other SIEM logging solution like Microsoft Sentinel, ArcSight.
  • Vulnerability Management solution like Qualys and Tenable experience.
  • SOAR solution like Palo Alto Cortex XSOAR or other SOAR solutions.
  • Hands-on experience to Analyse logs / events from SIEM solution, other infrastructure,
  • Expertise in interpreting and querying Wireshark captures.
  • Experience in managing Security Incidents detect and response, Threat hunt capability with knowledge of Kill chain methodology.
  • Experience in triaging Threat feeds and work towards mitigation and simulation exercise.
  • Experience in reviewing the vulnerability, product bug reports and relating its impact to Clients environment.
  • Hands-on knowledge on the creation of use cases within SIEM solution including advanced correlation rules.
  • Creating custom dashboards based on the client's security landscape.
  • Ability to filter through false positives quickly and focus on true positives.
  • Analyse and perform fine-tuning of SIEM rules / policies on regular basis.
  • Hands-on experience in analysing SIEM alert payload to detect any malicious activity.
  • Good understand of penetration tests and Threat actor simulation both with-in and outside the organisation.
  • Complete understanding of Digital Forensics concept and the process followed therein.
  • Operational knowledge on Security compliance tools like AlgoSec, Firemom, Skybox or Tufin
  • Desirable skills

  • Demonstrated genuine interests and passion for cybersecurity is a must.
  • Working knowledge of security operations environments and security incident management & response handling.
  • Certification - SANS GSEC, Splunk Core / Enterprise Certified admin User , Qualys.
  • Windows / Linux skills and experience with scripting / programming, especially python.
  • Proficiency in Analytics technologies like Elasticsearch, PowerBI, JSON).
  • Exposure to Cyber Security Governance and Risk Compliance (GRC) and experience in providing innovative solutions to complex cybersecurity problems.
  • Strong organisational skills & the ability to prioritise multiple complex tasks.
  • Ability to work effectively under pressure.
  • Excellent verbal and written communication skills are essential to influence both technical and non-technical audiences.
  • Academic Qualifications and Certifications :

  • Degree / Certifications
  • SANS GIAC Security Essentials (GSEC) or equivalent
  • SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent
  • SANS GIAC Certified Incident Handler (GCIH) or equivalent
  • Industry Certifications : CISSP, CISM, CISA, CEH, CHFI
  • Information Technology / ITILSM / ICT Security / ITIL v4
  • Required Experience :

  • Extensive experience in a Technology Information Security Industry
  • Prior experience working in a SOC / CSIRT for at least 8-12 years
  • Good Hands-on experience on Splunk solution.
  • Tertiary qualifications or a passionate ethical hacker
  • Experience using End Point Protection Software
  • Experience with Enterprise Detection & Response software
  • Report this job

    Thank you for reporting this job!

    Your feedback will help us improve the quality of our services.

    My Email
    By clicking on "Continue", I give neuvoo consent to process my data and to send me email alerts, as detailed in neuvoo's Privacy Policy . I may withdraw my consent or unsubscribe at any time.
    Application form