1,612 Blockchain Security Specialist jobs in India
Information Security Specialist
Posted 1 day ago
Job Viewed
Job Description
About the Company:
Toyo India & Modec Singapore have joined hands to start a joint venture, Global Capability Centre at Bangalore.
Corporate Office, Bangalore
About the Role
Engineer – Information Security in the Quality and Information Security Management Department.
Responsibilities
- Establish, Implement, Maintain and Improve Information Security Management System (ISMS) as per ISO 27001:2022 Standard.
- Plan and Conduct Information Security (IS) Trainings.
- IS Risk Assessment and Treatment.
- Incident Management.
- Plan and Conduct ISMS Internal Audits.
- Root Cause Analysis.
- Implementation of IS Best Practices.
- IS Vendor Audits.
- Plan, Schedule and Monitor IS activities.
- Presentation Skills, Interpersonal Skills, Time Management Skills.
Qualifications
- Education Qualification: B.E / Diploma in Computers / Information Technology / Electronics & Telecommunication / etc. from recognized University / Board.
- Technical Qualification: Certified ISO 27001:2022 Internal Auditor / Lead Auditor.
- Experience: 8-12 Years; Relevant: 4-6 Years.
Required Skills
- Certified Information System Auditor (CISA) / Certified Information Security Manager (CISM).
- Knowledge of ISO 31000 and ISO 27005 Standards.
- Experience in Network and Server Security.
- Knowledge related to Software Development Life Cycle (SDLC) Security.
- Knowledge of National (e.g. IT Act) / International Laws / Regulations (e.g. EUGDPR) / Standards (e.g. NIST) related to Information Security.
Preferred Skills
- Develop, Update and Review ISMS Policies and procedures in accordance with ISO 27001.
- Plan and Conduct IS Awareness Trainings.
- Prepare IS Awareness emailers and posters.
- Perform and Evaluate Risks and review Risk Registers of Stakeholders.
- Management of IS Incidents.
- Plan, Conduct Internal Audits and report findings.
- Coordinate and follow up for Internal / External Audit Reports and its closures.
- Plan, coordinate and follow up with External Auditors / Certification Agency for ISO 27001.
- Review Root Cause Analysis, Correction and Corrective Actions.
- Coordinate with stakeholders to improve IS Controls.
- Support Departments to prepare for External Audits.
- Participate in Management Review Meetings Agenda, Presentation, MOM and follow up.
- Review Bidding / Contracts and determine IS requirements.
Information Security Specialist
Posted 1 day ago
Job Viewed
Job Description
Role Summary
As a member of Global Security Operations Center, you will be responsible for driving the operational activities of SOC and lead complex investigations, conduct advanced threat analysis, and initiate incident responses activities across various business units. He/she is also responsible for process improvement activities, mentoring the team through training initiatives.
Responsibilities
- Managing shifts / team in the 24X7 SOC Environment.
- Act as a first point of escalation for SOC team and assist with handing out work assignments to the team members.
- Handling escalated security incidents/ issues, Responsible for deep dive analysis of escalated incidents, threat hunting.
- Highlight potential security risks to SOC Manager and concerned SPOCs.
- Maintain and optimize security tools and technologies used within the SOC.
- Support Adhoc investigations on need basis.
- Identify opportunities for continuous improvement in security operations.
- Continuously improve threat detection capabilities, use cases and SOPs.
- Support SOC manager for creating new operational guidelines, processes, and procedures.
- Mentor and provide guidance to L1 analysts and serves as the POC for escalation issues that may arise.
- Support rotational 16x5 operational shifts and on call when needed.
Role Requirements
Experience
At least 7+ years prior experience as a SOC Lead/Lead Analyst in SOC environment with hands-on experience in performing security monitoring and response activities, incident handling, alert tracking, and/or cybersecurity case management.
Process and Technology Skills
- Proven experience in handling any of the EDR solution such as Defender or Crowdstrike.
- Configure and optimize EDR settings to enhance security posture and ensure effective threat detection.
- Analyze threat intelligence and security data to identify trends, patterns, and emerging threats
- Capability to recognize different security situations and refine recurring security notifications by finetuning.
- Respond to security incidents promptly, conducting thorough investigations and implementing remediation strategies to mitigate risks.
- Strong background in incident analysis, evidence collection, documentation, communications, reporting and response.
- Ability to manage cloud security controls, including firewalls, intrusion detection systems, and encryption protocols.
- Lead and coordinate incident response efforts for cloud-related security incidents.
- Collaborate with business and development teams to ensure security best practices are integrated into cloud architecture and deployments.
- Proven experience with cloud platforms such as AWS, Azure, or Google Cloud.
- Experience in mentoring and training junior analysts, Provide technical and functional support to L1 Team with analytical feedback.
- Proven experience in any SIEM tools and/or log management solution
- Must have good knowledge in firewalls, IDS/IPS, Anti-Virus, EDR, Proxy, DNS, email, AD, etc.
- Good understanding of mainstream operating systems (Windows, Linux, etc) and security infrastructure
- Good understanding of log parsing and event analysis (Ability to understand and interpret Windows, Linux OS, firewall, web proxy, DNS log events)
- Expertise in creation of reports, dashboards, metrics for SOC operations
- Knowledge in developing use cases for security monitoring, threat management and threat modelling.
- Knowledge of MITRE or similar frameworks and procedures used by adversaries.
- Advanced knowledge of malware operation and indicators
- Good understanding of ITIL processes including Incident Management, Change Management and Problem Management
- Advanced knowledge of networking fundamentals (OSI Layers, TCP/IP, protocols, and services.)
- Sound knowledge in Information Security policies, procedures, standards, best practices, and guidelines
- Involvement in threat intelligence and cybersecurity communities.
- Deep understanding of Cyber Kill Chain and other applicable analytic models
- Optionally, experience in at least one of the following: Python, PowerShell, VBscript.
Other skills
- Knowledge and understanding of project management methodologies, processes, and tools.
- Strong analytical skills and ability to solve complex technical problems with high attention to detail and accuracy.
- Strong team player and ability to work in a challenging and constantly changing environment.
- Ability to multitask and work independently with minimal direction and maximum accountability.
- Proficiency in verbal and written communication skills.
- Proficiency in time management and presentation skills
- Proficiency in decision-making and problem-solving skills
Education and Certification
- Bachelor’s degree in computer information systems or related field or equivalent demonstrated experience & knowledge.
- Professional certification in Information security like Security+, CCSE, CCSP, AZ900 – AZ500 etc., TICSA, MCSE, CISSP, etc. would be advantageous
Information Security Specialist
Posted today
Job Viewed
Job Description
Role Summary
As a member of Global Security Operations Center, you will be responsible for driving the operational activities of SOC and lead complex investigations, conduct advanced threat analysis, and initiate incident responses activities across various business units. He/she is also responsible for process improvement activities, mentoring the team through training initiatives.
Responsibilities
- Managing shifts / team in the 24X7 SOC Environment.
- Act as a first point of escalation for SOC team and assist with handing out work assignments to the team members.
- Handling escalated security incidents/ issues, Responsible for deep dive analysis of escalated incidents, threat hunting.
- Highlight potential security risks to SOC Manager and concerned SPOCs.
- Maintain and optimize security tools and technologies used within the SOC.
- Support Adhoc investigations on need basis.
- Identify opportunities for continuous improvement in security operations.
- Continuously improve threat detection capabilities, use cases and SOPs.
- Support SOC manager for creating new operational guidelines, processes, and procedures.
- Mentor and provide guidance to L1 analysts and serves as the POC for escalation issues that may arise.
- Support rotational 16x5 operational shifts and on call when needed.
Role Requirements
Experience
At least 7+ years prior experience as a SOC Lead/Lead Analyst in SOC environment with hands-on experience in performing security monitoring and response activities, incident handling, alert tracking, and/or cybersecurity case management.
Process and Technology Skills
- Proven experience in handling any of the EDR solution such as Defender or Crowdstrike.
- Configure and optimize EDR settings to enhance security posture and ensure effective threat detection.
- Analyze threat intelligence and security data to identify trends, patterns, and emerging threats
- Capability to recognize different security situations and refine recurring security notifications by finetuning.
- Respond to security incidents promptly, conducting thorough investigations and implementing remediation strategies to mitigate risks.
- Strong background in incident analysis, evidence collection, documentation, communications, reporting and response.
- Ability to manage cloud security controls, including firewalls, intrusion detection systems, and encryption protocols.
- Lead and coordinate incident response efforts for cloud-related security incidents.
- Collaborate with business and development teams to ensure security best practices are integrated into cloud architecture and deployments.
- Proven experience with cloud platforms such as AWS, Azure, or Google Cloud.
- Experience in mentoring and training junior analysts, Provide technical and functional support to L1 Team with analytical feedback.
- Proven experience in any SIEM tools and/or log management solution
- Must have good knowledge in firewalls, IDS/IPS, Anti-Virus, EDR, Proxy, DNS, email, AD, etc.
- Good understanding of mainstream operating systems (Windows, Linux, etc) and security infrastructure
- Good understanding of log parsing and event analysis (Ability to understand and interpret Windows, Linux OS, firewall, web proxy, DNS log events)
- Expertise in creation of reports, dashboards, metrics for SOC operations
- Knowledge in developing use cases for security monitoring, threat management and threat modelling.
- Knowledge of MITRE or similar frameworks and procedures used by adversaries.
- Advanced knowledge of malware operation and indicators
- Good understanding of ITIL processes including Incident Management, Change Management and Problem Management
- Advanced knowledge of networking fundamentals (OSI Layers, TCP/IP, protocols, and services.)
- Sound knowledge in Information Security policies, procedures, standards, best practices, and guidelines
- Involvement in threat intelligence and cybersecurity communities.
- Deep understanding of Cyber Kill Chain and other applicable analytic models
- Optionally, experience in at least one of the following: Python, PowerShell, VBscript.
Other skills
- Knowledge and understanding of project management methodologies, processes, and tools.
- Strong analytical skills and ability to solve complex technical problems with high attention to detail and accuracy.
- Strong team player and ability to work in a challenging and constantly changing environment.
- Ability to multitask and work independently with minimal direction and maximum accountability.
- Proficiency in verbal and written communication skills.
- Proficiency in time management and presentation skills
- Proficiency in decision-making and problem-solving skills
Education and Certification
- Bachelor’s degree in computer information systems or related field or equivalent demonstrated experience & knowledge.
- Professional certification in Information security like Security+, CCSE, CCSP, AZ900 – AZ500 etc., TICSA, MCSE, CISSP, etc. would be advantageous
Information Security Specialist
Posted today
Job Viewed
Job Description
About the Company:
Toyo India & Modec Singapore have joined hands to start a joint venture, Global Capability Centre at Bangalore.
Corporate Office, Bangalore
About the Role
Engineer – Information Security in the Quality and Information Security Management Department.
Responsibilities
- Establish, Implement, Maintain and Improve Information Security Management System (ISMS) as per ISO 27001:2022 Standard.
- Plan and Conduct Information Security (IS) Trainings.
- IS Risk Assessment and Treatment.
- Incident Management.
- Plan and Conduct ISMS Internal Audits.
- Root Cause Analysis.
- Implementation of IS Best Practices.
- IS Vendor Audits.
- Plan, Schedule and Monitor IS activities.
- Presentation Skills, Interpersonal Skills, Time Management Skills.
Qualifications
- Education Qualification: B.E / Diploma in Computers / Information Technology / Electronics & Telecommunication / etc. from recognized University / Board.
- Technical Qualification: Certified ISO 27001:2022 Internal Auditor / Lead Auditor.
- Experience: 8-12 Years; Relevant: 4-6 Years.
Required Skills
- Certified Information System Auditor (CISA) / Certified Information Security Manager (CISM).
- Knowledge of ISO 31000 and ISO 27005 Standards.
- Experience in Network and Server Security.
- Knowledge related to Software Development Life Cycle (SDLC) Security.
- Knowledge of National (e.g. IT Act) / International Laws / Regulations (e.g. EUGDPR) / Standards (e.g. NIST) related to Information Security.
Preferred Skills
- Develop, Update and Review ISMS Policies and procedures in accordance with ISO 27001.
- Plan and Conduct IS Awareness Trainings.
- Prepare IS Awareness emailers and posters.
- Perform and Evaluate Risks and review Risk Registers of Stakeholders.
- Management of IS Incidents.
- Plan, Conduct Internal Audits and report findings.
- Coordinate and follow up for Internal / External Audit Reports and its closures.
- Plan, coordinate and follow up with External Auditors / Certification Agency for ISO 27001.
- Review Root Cause Analysis, Correction and Corrective Actions.
- Coordinate with stakeholders to improve IS Controls.
- Support Departments to prepare for External Audits.
- Participate in Management Review Meetings Agenda, Presentation, MOM and follow up.
- Review Bidding / Contracts and determine IS requirements.
Information security specialist
Posted today
Job Viewed
Job Description
About the Company: Toyo India & Modec Singapore have joined hands to start a joint venture, Global Capability Centre at Bangalore. Corporate Office, Bangalore About the Role Engineer – Information Security in the Quality and Information Security Management Department. Responsibilities Establish, Implement, Maintain and Improve Information Security Management System (ISMS) as per ISO 27001:2022 Standard. Plan and Conduct Information Security (IS) Trainings. IS Risk Assessment and Treatment. Incident Management. Plan and Conduct ISMS Internal Audits. Root Cause Analysis. Implementation of IS Best Practices. IS Vendor Audits. Plan, Schedule and Monitor IS activities. Presentation Skills, Interpersonal Skills, Time Management Skills. Qualifications Education Qualification: B. E / Diploma in Computers / Information Technology / Electronics & Telecommunication / etc. from recognized University / Board. Technical Qualification: Certified ISO 27001:2022 Internal Auditor / Lead Auditor. Experience: 8-12 Years; Relevant: 4-6 Years. Required Skills Certified Information System Auditor (CISA) / Certified Information Security Manager (CISM). Knowledge of ISO 31000 and ISO 27005 Standards. Experience in Network and Server Security. Knowledge related to Software Development Life Cycle (SDLC) Security. Knowledge of National (e.g. IT Act) / International Laws / Regulations (e.g. EUGDPR) / Standards (e.g. NIST) related to Information Security. Preferred Skills Develop, Update and Review ISMS Policies and procedures in accordance with ISO 27001. Plan and Conduct IS Awareness Trainings. Prepare IS Awareness emailers and posters. Perform and Evaluate Risks and review Risk Registers of Stakeholders. Management of IS Incidents. Plan, Conduct Internal Audits and report findings. Coordinate and follow up for Internal / External Audit Reports and its closures. Plan, coordinate and follow up with External Auditors / Certification Agency for ISO 27001. Review Root Cause Analysis, Correction and Corrective Actions. Coordinate with stakeholders to improve IS Controls. Support Departments to prepare for External Audits. Participate in Management Review Meetings Agenda, Presentation, MOM and follow up. Review Bidding / Contracts and determine IS requirements.
Information Security Specialist
Posted today
Job Viewed
Job Description
Toyo India & Modec Singapore have joined hands to start a joint venture, Global Capability Centre at Bangalore.
Corporate Office, Bangalore
About the Role
Engineer – Information Security in the Quality and Information Security Management Department.
Responsibilities
Establish, Implement, Maintain and Improve Information Security Management System (ISMS) as per ISO 27001:2022 Standard.
Plan and Conduct Information Security (IS) Trainings.
IS Risk Assessment and Treatment.
Incident Management.
Plan and Conduct ISMS Internal Audits.
Root Cause Analysis.
Implementation of IS Best Practices.
IS Vendor Audits.
Plan, Schedule and Monitor IS activities.
Presentation Skills, Interpersonal Skills, Time Management Skills.
Qualifications
Education Qualification: B.E / Diploma in Computers / Information Technology / Electronics & Telecommunication / etc. from recognized University / Board.
Technical Qualification: Certified ISO 27001:2022 Internal Auditor / Lead Auditor.
Experience: 8-12 Years; Relevant: 4-6 Years.
Required Skills
Certified Information System Auditor (CISA) / Certified Information Security Manager (CISM).
Knowledge of ISO 31000 and ISO 27005 Standards.
Experience in Network and Server Security.
Knowledge related to Software Development Life Cycle (SDLC) Security.
Knowledge of National (e.g. IT Act) / International Laws / Regulations (e.g. EUGDPR) / Standards (e.g. NIST) related to Information Security.
Preferred Skills
Develop, Update and Review ISMS Policies and procedures in accordance with ISO 27001.
Plan and Conduct IS Awareness Trainings.
Prepare IS Awareness emailers and posters.
Perform and Evaluate Risks and review Risk Registers of Stakeholders.
Management of IS Incidents.
Plan, Conduct Internal Audits and report findings.
Coordinate and follow up for Internal / External Audit Reports and its closures.
Plan, coordinate and follow up with External Auditors / Certification Agency for ISO 27001.
Review Root Cause Analysis, Correction and Corrective Actions.
Coordinate with stakeholders to improve IS Controls.
Support Departments to prepare for External Audits.
Participate in Management Review Meetings Agenda, Presentation, MOM and follow up.
Review Bidding / Contracts and determine IS requirements.
Information Security Specialist
Posted today
Job Viewed
Job Description
As a member of Global Security Operations Center, you will be responsible for driving the operational activities of SOC and lead complex investigations, conduct advanced threat analysis, and initiate incident responses activities across various business units. He/she is also responsible for process improvement activities, mentoring the team through training initiatives.
Responsibilities
Managing shifts / team in the 24X7 SOC Environment.
Act as a first point of escalation for SOC team and assist with handing out work assignments to the team members.
Handling escalated security incidents/ issues, Responsible for deep dive analysis of escalated incidents, threat hunting.
Highlight potential security risks to SOC Manager and concerned SPOCs.
Maintain and optimize security tools and technologies used within the SOC.
Support Adhoc investigations on need basis.
Identify opportunities for continuous improvement in security operations.
Continuously improve threat detection capabilities, use cases and SOPs.
Support SOC manager for creating new operational guidelines, processes, and procedures.
Mentor and provide guidance to L1 analysts and serves as the POC for escalation issues that may arise.
Support rotational 16x5 operational shifts and on call when needed.
Role Requirements
Experience
At least 7+ years prior experience as a SOC Lead/Lead Analyst in SOC environment with hands-on experience in performing security monitoring and response activities, incident handling, alert tracking, and/or cybersecurity case management.
Process and Technology Skills
Proven experience in handling any of the EDR solution such as Defender or Crowdstrike.
Configure and optimize EDR settings to enhance security posture and ensure effective threat detection.
Analyze threat intelligence and security data to identify trends, patterns, and emerging threats
Capability to recognize different security situations and refine recurring security notifications by finetuning.
Respond to security incidents promptly, conducting thorough investigations and implementing remediation strategies to mitigate risks.
Strong background in incident analysis, evidence collection, documentation, communications, reporting and response.
Ability to manage cloud security controls, including firewalls, intrusion detection systems, and encryption protocols.
Lead and coordinate incident response efforts for cloud-related security incidents.
Collaborate with business and development teams to ensure security best practices are integrated into cloud architecture and deployments.
Proven experience with cloud platforms such as AWS, Azure, or Google Cloud.
Experience in mentoring and training junior analysts, Provide technical and functional support to L1 Team with analytical feedback.
Proven experience in any SIEM tools and/or log management solution
Must have good knowledge in firewalls, IDS/IPS, Anti-Virus, EDR, Proxy, DNS, email, AD, etc.
Good understanding of mainstream operating systems (Windows, Linux, etc) and security infrastructure
Good understanding of log parsing and event analysis (Ability to understand and interpret Windows, Linux OS, firewall, web proxy, DNS log events)
Expertise in creation of reports, dashboards, metrics for SOC operations
Knowledge in developing use cases for security monitoring, threat management and threat modelling.
Knowledge of MITRE or similar frameworks and procedures used by adversaries.
Advanced knowledge of malware operation and indicators
Good understanding of ITIL processes including Incident Management, Change Management and Problem Management
Advanced knowledge of networking fundamentals (OSI Layers, TCP/IP, protocols, and services.)
Sound knowledge in Information Security policies, procedures, standards, best practices, and guidelines
Involvement in threat intelligence and cybersecurity communities.
Deep understanding of Cyber Kill Chain and other applicable analytic models
Optionally, experience in at least one of the following: Python, PowerShell, VBscript.
Other skills
Knowledge and understanding of project management methodologies, processes, and tools.
Strong analytical skills and ability to solve complex technical problems with high attention to detail and accuracy.
Strong team player and ability to work in a challenging and constantly changing environment.
Ability to multitask and work independently with minimal direction and maximum accountability.
Proficiency in verbal and written communication skills.
Proficiency in time management and presentation skills
Proficiency in decision-making and problem-solving skills
Education and Certification
Bachelor’s degree in computer information systems or related field or equivalent demonstrated experience & knowledge.
Professional certification in Information security like Security+, CCSE, CCSP, AZ900 – AZ500 etc., TICSA, MCSE, CISSP, etc. would be advantageous
Be The First To Know
About the latest Blockchain security specialist Jobs in India !
Information Security Specialist
Posted today
Job Viewed
Job Description
About the Company:
Toyo India & Modec Singapore have joined hands to start a joint venture, Global Capability Centre at Bangalore.
Corporate Office, Bangalore
About the Role
Engineer – Information Security in the Quality and Information Security Management Department.
Responsibilities
- Establish, Implement, Maintain and Improve Information Security Management System (ISMS) as per ISO 27001:2022 Standard.
- Plan and Conduct Information Security (IS) Trainings.
- IS Risk Assessment and Treatment.
- Incident Management.
- Plan and Conduct ISMS Internal Audits.
- Root Cause Analysis.
- Implementation of IS Best Practices.
- IS Vendor Audits.
- Plan, Schedule and Monitor IS activities.
- Presentation Skills, Interpersonal Skills, Time Management Skills.
Qualifications
- Education Qualification: B.E / Diploma in Computers / Information Technology / Electronics & Telecommunication / etc. from recognized University / Board.
- Technical Qualification: Certified ISO 27001:2022 Internal Auditor / Lead Auditor.
- Experience: 8-12 Years; Relevant: 4-6 Years.
Required Skills
- Certified Information System Auditor (CISA) / Certified Information Security Manager (CISM).
- Knowledge of ISO 31000 and ISO 27005 Standards.
- Experience in Network and Server Security.
- Knowledge related to Software Development Life Cycle (SDLC) Security.
- Knowledge of National (e.g. IT Act) / International Laws / Regulations (e.g. EUGDPR) / Standards (e.g. NIST) related to Information Security.
Preferred Skills
- Develop, Update and Review ISMS Policies and procedures in accordance with ISO 27001.
- Plan and Conduct IS Awareness Trainings.
- Prepare IS Awareness emailers and posters.
- Perform and Evaluate Risks and review Risk Registers of Stakeholders.
- Management of IS Incidents.
- Plan, Conduct Internal Audits and report findings.
- Coordinate and follow up for Internal / External Audit Reports and its closures.
- Plan, coordinate and follow up with External Auditors / Certification Agency for ISO 27001.
- Review Root Cause Analysis, Correction and Corrective Actions.
- Coordinate with stakeholders to improve IS Controls.
- Support Departments to prepare for External Audits.
- Participate in Management Review Meetings Agenda, Presentation, MOM and follow up.
- Review Bidding / Contracts and determine IS requirements.
Information Security Specialist
Posted today
Job Viewed
Job Description
Responsibilities
END -->Our Principles
These are some of the principles that we strongly believe in, preach and actually follow as well.
Commitments
We clearly commit what we can do, by when can we do it and how we would do it, And then we do it.
Confidentiality
We are extremely paranoid about protecting the confidentiality of what we do, for whom and how we do it.
Comfortability
We ensure comfortability of you and your team with ours, which can only come from complete transparency.
Capability
We keep improving our already awesome capabilities by investing all resources at our disposal.
Information Security Specialist Jobs
Information Security Specialist career path
Information Security Specialist Responsibilities
• Post-Graduate degree in system administration, network security, network administration or a related field
• At least five years of experience in system support
• Knowledge of current security risks and protocols
• Willingness to work on-call in the event of a security breach or other emergency
• Good analytical and problem solving skills
• Ability to work under close supervision, as well as the ability to take independent initiative when needed
Information Security Specialist Required Skills
• Graduates with a degree in computer science, information technology or a related science subject are well placed to apply.
• They need to have strong IT skills and knowledge including hardware, software and networks.
• A forensic approach to challenges is desirable in this sector as they often deal with complex issues.
•They need to prevent and detect computer crime, and gather evidence in the event of the discovery of an incident.
• It also demands problem solving skills, an analytical mind and the ability to keep calm under pressure.
Perception Perfection
CryptoMize is dedicated to ensure a prominent progress to how the world perceives you. We help you to establish your perception to the extent of perfection with our devised strategic plan and techniques.
Promotional Parlance
CryptoMize introduces you to Promotional Parlance which not only promotes your cause but provides a personalized-edge. Our solutions are tailored in a strategic way that attracts the audience in a way that they are most receptive to.
Public Relations
CryptoMize formulates a proactive strategy to amplify your Media Outreach without compromising your reputation. CryptoMize assists you in communicating with your intended audience to achieve a global outreach.
Political Catalysis
We bring efficiency to governance operations through intelligence and strategic thinking. By integrating digital approaches, CryptoMize seeks to improve Campaign Strategies and governance in general.
Policing Phronesis
CryptoMize, with the help of its special mix of Forensics and Consultancy, aims to handle all sorts of cyber crimes affecting your organisation and provide you with the best guidance for such situations.
Privacy Enforcement
CryptoMize is driven by the belief that none of your valuable data should go unprotected. Our experts put concerted effort to preserve your privacy in order to minimize the impact of cybercrime.
What Makes Us Different?
CryptoMize offers a full spectrum of elite services derived with preemptive analysis and strategic planning to our clients. We work efficiently with our proficient and proactive team by utilising extraordinary tools.
Collaboration with Dignitaries
We collaborate with highly influential and prominent personalities around the world. Being transcendental and visionary has its own benefits, our supremacy of being omnipresent empowers us to command, control and maneuver information from the internet.
01Powerful Team
CryptoMize is the combination of a powerful team that works on a supportive, transparent and encouraging platform. With spontaneity and dedication to the advancement of technology, we aspire to be better at what we do for people who trust us with their information and projects.
02Triple-Proof Approach
We execute a triple-proof approach from conducting thorough research, developing strong strategies, to guaranteeing information security. This proves beneficial for our clients to reach their desired goal.
03Our Core Values
Trust
We seek to connect and build relationships with our clients.That is our core principle of our work ethic which we fully-abide to. We works on 3 principles: Respect, Honesty and Transparency.
Reliability
Commitment is an act, not a word. We believe in delivering and living up to your expectations. We have grown into a global agency only through our commitment to deliver and our reliability factor.
Safety
We are extremely paranoid about protecting our client’s safety of what we do, for whom and how we do it. We maintain absolute non disclosure and confidentiality to ensure that nothing sensitive goes out.
Passion
Our passion generates enthusiasm for what we do and how we do it. We inspire, find creative ways and nurture ideas with passion. We strategize based on audience attention.
Innovation
We believe in innovation, change and risk taking. With technology, we reinvent ourselves. Innovation is the reason how we are able to eliminate obstacles for cultivating growth.
Excellence
We ensure to maintain your eminence by reinventing ourselves with our core values that inspire excellence. We strive for quality in everything we do.
OUR PRESENCE
Our Journey So Far
Our presence is all across the globe. Our impact can be seen in 03+ continents and 30+ countries, we know how to shape people's digital lives. We have a vast range of projects, from running political campaigns, shaping people's perceptions to enforcing privacy, we work with a futuristic approach and always look ahead of time. We never restrict ourselves to specific sectors rather make sure that our services are requisites for any and everybody in the world. With our elite clientele we show supremacy of work and build trustworthy relationships. We believe intelligence is the future and aim towards collective good and growth of all! 3+ Our PresenceSuccessfully establishing ourselves globally in 3+ continents.
70+ Our ServicesGiving us an edge over everyone else who is trying to solve similar problems.
10+ Years of ExperienceServing great value to our clients since the past decade.
NEVERENDING OPPORTUNITIES FOR YOUOur Vision
In the days of yore, gathering intelligence was a matter of sending out spies. Today the world has changed, and intelligence is as much about technology as it is about people. We are redefining what it means to truly protect you and your business. From network security, to cloud recovery, to data recovery, CryptoMize focuses on your technology’s vulnerabilities so you can avoid pitfalls and stay ahead.
Information Security Specialist
Posted 12 days ago
Job Viewed
Job Description
Role Summary
As a member of Global Security Operations Center, you will be responsible for driving the operational activities of SOC and lead complex investigations, conduct advanced threat analysis, and initiate incident responses activities across various business units. He/she is also responsible for process improvement activities, mentoring the team through training initiatives.
Responsibilities
- Managing shifts / team in the 24X7 SOC Environment.
- Act as a first point of escalation for SOC team and assist with handing out work assignments to the team members.
- Handling escalated security incidents/ issues, Responsible for deep dive analysis of escalated incidents, threat hunting.
- Highlight potential security risks to SOC Manager and concerned SPOCs.
- Maintain and optimize security tools and technologies used within the SOC.
- Support Adhoc investigations on need basis.
- Identify opportunities for continuous improvement in security operations.
- Continuously improve threat detection capabilities, use cases and SOPs.
- Support SOC manager for creating new operational guidelines, processes, and procedures.
- Mentor and provide guidance to L1 analysts and serves as the POC for escalation issues that may arise.
- Support rotational 16x5 operational shifts and on call when needed.
Role Requirements
Experience
At least 7+ years prior experience as a SOC Lead/Lead Analyst in SOC environment with hands-on experience in performing security monitoring and response activities, incident handling, alert tracking, and/or cybersecurity case management.
Process and Technology Skills
- Proven experience in handling any of the EDR solution such as Defender or Crowdstrike.
- Configure and optimize EDR settings to enhance security posture and ensure effective threat detection.
- Analyze threat intelligence and security data to identify trends, patterns, and emerging threats
- Capability to recognize different security situations and refine recurring security notifications by finetuning.
- Respond to security incidents promptly, conducting thorough investigations and implementing remediation strategies to mitigate risks.
- Strong background in incident analysis, evidence collection, documentation, communications, reporting and response.
- Ability to manage cloud security controls, including firewalls, intrusion detection systems, and encryption protocols.
- Lead and coordinate incident response efforts for cloud-related security incidents.
- Collaborate with business and development teams to ensure security best practices are integrated into cloud architecture and deployments.
- Proven experience with cloud platforms such as AWS, Azure, or Google Cloud.
- Experience in mentoring and training junior analysts, Provide technical and functional support to L1 Team with analytical feedback.
- Proven experience in any SIEM tools and/or log management solution
- Must have good knowledge in firewalls, IDS/IPS, Anti-Virus, EDR, Proxy, DNS, email, AD, etc.
- Good understanding of mainstream operating systems (Windows, Linux, etc) and security infrastructure
- Good understanding of log parsing and event analysis (Ability to understand and interpret Windows, Linux OS, firewall, web proxy, DNS log events)
- Expertise in creation of reports, dashboards, metrics for SOC operations
- Knowledge in developing use cases for security monitoring, threat management and threat modelling.
- Knowledge of MITRE or similar frameworks and procedures used by adversaries.
- Advanced knowledge of malware operation and indicators
- Good understanding of ITIL processes including Incident Management, Change Management and Problem Management
- Advanced knowledge of networking fundamentals (OSI Layers, TCP/IP, protocols, and services.)
- Sound knowledge in Information Security policies, procedures, standards, best practices, and guidelines
- Involvement in threat intelligence and cybersecurity communities.
- Deep understanding of Cyber Kill Chain and other applicable analytic models
- Optionally, experience in at least one of the following: Python, PowerShell, VBscript.
Other skills
- Knowledge and understanding of project management methodologies, processes, and tools.
- Strong analytical skills and ability to solve complex technical problems with high attention to detail and accuracy.
- Strong team player and ability to work in a challenging and constantly changing environment.
- Ability to multitask and work independently with minimal direction and maximum accountability.
- Proficiency in verbal and written communication skills.
- Proficiency in time management and presentation skills
- Proficiency in decision-making and problem-solving skills
Education and Certification
- Bachelor’s degree in computer information systems or related field or equivalent demonstrated experience & knowledge.
- Professional certification in Information security like Security+, CCSE, CCSP, AZ900 – AZ500 etc., TICSA, MCSE, CISSP, etc. would be advantageous