No more applications are being accepted for this job
- Actively monitoring, analyzing & escalating SIEM alerts based on correlation rules
- Email protection alerts & malware analysis
- Provide inputs for proactive content fine tuning & use case enablement
- Active threat hunting on network flow, user behavior & threat intelligence
- Phishing email analysis for MFs
- Raising incidents in Papstein intel
- Responsible for critical security incident/breach management life cycle across the enterprise which includes, validating legitimacy of the incident, identification of possible source / incident origin/patient
- Responsible for analysis of logs from various network devices, security tools, SIEM conclude investigation process
- Perform memory forensics for investigating file less malware, sophisticated ransomware etc.
- Carry out incident forensic investigations as and when needed and ensure chain of custody
- Perform Bit stream Imaging/acquiring of the Digital Media during the process of Investigation
- Handle information breach violations identified through Data Loss Prevention tool
- Work closely with SOC Analysts, Threat Intelligence and Threat Hunting team to enable a worldclass cyber defense team for KPMG
- Perform proactive analysis & reporting of cyber threats, data breaches and security anomalies
- Aid in and participate in daily, weekly, quarterly, and yearly production reporting for clients, partners, and internal teams.
KPMG - GSOC Engineer - Operation Monitoring & Alerting - Delhi, India - KPMG Assurance and Consulting Services LLP
Description
Roles and Responsibility :