Synaptics

Information Security Analyst

Job Locations IN-Bengaluru
ID
2022-3192
Category
Information Technology
Type
Employee

Overview

Millions of people experience Synaptics every day. Our technology impacts how people see, hear, touch, and engage with a wide range of IoT applications -- at home, at work, in the car or on the go.

 

We solve complex challenges alongside the most influential companies in the industry, using the most advanced algorithms in areas such as machine learning, biometrics and video processing, combined with world class software and silicon development.

 

Synaptics’ Information Security Group is seeking a talented and highly motivated individual to serve as an Incident Response Analyst. This role is responsible for overseeing incident response and forensics efforts for all security related investigations, including collecting logs, documenting response steps, and collecting critical evidence in accordance with the company’s incident response process.

 

This role may also be required to coordinate activities with specialized teams engaged to assist in investigations. This role is critical to our ability to contain and reduce the impact of cybersecurity events that would otherwise have significant reputational and financial impacts.

Responsibilities

  • Conduct timely cyber security incident response, advanced investigations including but not limited to:
    • Network and end-point forensic acquisition and analysis.
    • Analysis of various security logs (endpoint, security appliances, SIEM).
  • Research, improve, and refine detection capabilities to support incident.
  • Develop tools and mechanisms to automate and improve the effectiveness of incident response functions and security investigations 
  • Develop Incident Response playbooks, leverage the MITRE ATT&CK framework, and carry out tabletop exercises with technical teams to prepare them for Incident Response.
  • Communicate status of ongoing incidents with all stakeholders including executive management as required
  • Perform post incident reviews and ensure all findings are documented and remediations are appropriately actioned.
  • Develop reporting with focused messages to enable stakeholders to understand their risks and responsibilities.
  • Determine technical/operational impact, root cause(s), scope, and nature of the incident to mitigate risk and provide advice on remediation or recommendations.
  • Utilize incident response playbooks to align with best practices, minimize gaps in response and provide comprehensive mitigation of threats following.

Qualifications

  • 5 or more years of experience of working within cybersecurity field with a minimum of 3 years of experience in digital forensics and incident response as an Incident Response Analyst.
  • Performing incident handling, evidence acquisition, digital forensics, endpoint and network, chain of custody, sensor alert tracking and cybersecurity incident case management.
  • Familiar with and have worked within Cyber Security Frameworks such as:
    • NIST 800 - 61.
    • MITRE Cyber Attack Life Cycle.
    • MITRE ATT&CK Framework.
  • Experience with investigative technologies such as Log Analysis, Malware Analysis, Network and Host Forensics, Endpoint Detection and Response, SIEM / Security Analytics, etc.
  • Ability to multi-task, present to executive staff members
  • Experience investigating cloud application, endpoint, network, user reported security events.
  • Natural curiosity for investigating and solving technical problems while demonstrating strong critical thinking and analytical problem-solving and documenting within case management systems.
  • Ability to communicate technical details in writing and verbally to non-technical and junior SOC team members.
  • Must be a team player with great verbal and written communication skills.

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed