Incident Response Analyst

Bengaluru, Karnataka Autodesk

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

**Job Requisition ID #**
25WD91175
**Position Overview**
The Incident Response Analyst is responsible for monitoring, identifying, assessing, containing, and responding to various information security events in a large and complex environment, as well as analyse, triage, and report on these incidents and investigations. The candidate must have knowledge of system security design, network/cloud security best practices and in-depth knowledge of systems security operations, threat actors frequently used attack vectors, and general user behaviour analytics. The candidate will be part of an established security team and work closely with teams across the company in remediating security issues and driving Incident Response. The candidate should have a strong passion for security and growth and be willing to accept challenging projects and incidents.
**Responsibilities**
+ Responsible for handling day-to day operations to monitor, identity, triage and investigate security events from various Endpoint (EDR), Network and Cloud security tools and detect anomalies, and report remediation actions
+ Analyze firewall logs, server, and application logs to investigate events and incidents for anomalous activity and produce reports of findings
+ Conduct reviews and analysis of proxy logs, Microsoft Windows and Active Directory logs, and malicious code to identify, contain, eradicate, and ensure recovery from incidents
+ Help create and maintain process tools and documentation
+ Perform all stage of incident response from detection to postmortem
+ Collaborate with stakeholders in building and improving our Security Orchestration Platform
+ Clearly document notes for incidents in our case management solution
+ Perform basic forensics and malware analysis based on our playbooks and procedures
+ Responsible for working in a 24/7 environment including night shifts and the shifts are decided based on the business requirement
+ Maintain a high level of confidentiality and Integrity
**Minimum Qualifications**
+ BS in Computer Science, Information Security, or equivalent professional experience
+ 2+ years of cyber security experience in incident response
+ Technical depth in one or more specialties including: Malware analysis, Host analysis and Digital forensics
+ Strong understanding of Security Operations and Incident Response process and practices
+ Experience performing security monitoring, response capabilities, log analysis and forensic tools
+ Strong understanding of operating systems including Windows, Linux and OSX
+ Experience with SIEM, SOAR, EDR, Network, AWS, and Azure security tools
+ Excellent critical thinking and analytical skills, organizational skills, and the ability to work as part of a team
+ Excellent verbal and written communication skills
+ Ability to design playbooks for responding to security incidents
+ Ability to support off-hours, weekends, and holidays if needed in support of incident response
**Preferred Qualifications**
+ Advanced interpersonal skills to effectively promote ideas and collaboration at various levels of the organization
+ One or more security-related certifications from any of the following organizations: GCIH, GCFE, GCFA, AWS, Azure Cloud security Certifications or equivalent is desired
#LI-PJ1
**Learn More**
**About Autodesk**
Welcome to Autodesk! Amazing things are created every day with our software - from the greenest buildings and cleanest cars to the smartest factories and biggest hit movies. We help innovators turn their ideas into reality, transforming not only how things are made, but what can be made.
We take great pride in our culture here at Autodesk - it's at the core of everything we do. Our culture guides the way we work and treat each other, informs how we connect with customers and partners, and defines how we show up in the world.
When you're an Autodesker, you can do meaningful work that helps build a better world designed and made for all. Ready to shape the world and your future? Join us!
**Salary transparency**
Salary is one part of Autodesk's competitive compensation package. Offers are based on the candidate's experience and geographic location. In addition to base salaries, our compensation package may include annual cash bonuses, commissions for sales roles, stock grants, and a comprehensive benefits package.
**Diversity & Belonging**
We take pride in cultivating a culture of belonging where everyone can thrive. Learn more here: you an existing contractor or consultant with Autodesk?**
Please search for open jobs and apply internally (not on this external site).
This advertiser has chosen not to accept applicants from your region.

Incident Response Analyst

Bengaluru, Karnataka Autodesk

Posted today

Job Viewed

Tap Again To Close

Job Description

Position Overview

The Incident Response Analyst is responsible for monitoring, identifying, assessing, containing, and responding to various information security events in a large and complex environment, as well as analyse, triage, and report on these incidents and investigations. The candidate must have knowledge of system security design, network/cloud security best practices and in-depth knowledge of systems security operations, threat actors frequently used attack vectors, and general user behaviour analytics. The candidate will be part of an established security team and work closely with teams across the company in remediating security issues and driving Incident Response. The candidate should have a strong passion for security and growth and be willing to accept challenging projects and incidents.

Responsibilities
 

  • Responsible for handling day-to day operations to monitor, identity, triage and investigate security events from various Endpoint (EDR), Network and Cloud security tools and detect anomalies, and report remediation actions

  • Analyze firewall logs, server, and application logs to investigate events and incidents for anomalous activity and produce reports of findings

  • Conduct reviews and analysis of proxy logs, Microsoft Windows and Active Directory logs, and malicious code to identify, contain, eradicate, and ensure recovery from incidents

  • Help create and maintain process tools and documentation

  • Perform all stage of incident response from detection to postmortem

  • Collaborate with stakeholders in building and improving our Security Orchestration Platform

  • Clearly document notes for incidents in our case management solution

  • Perform basic forensics and malware analysis based on our playbooks and procedures

  • Responsible for working in a 24/7 environment including night shifts and the shifts are decided based on the business requirement

  • Maintain a high level of confidentiality and Integrity

  • Minimum Qualifications
     

  • BS in Computer Science, Information Security, or equivalent professional experience

  • 2+ years of cyber security experience in incident response

  • Technical depth in one or more specialties including: Malware analysis, Host analysis and Digital forensics

  • Strong understanding of Security Operations and Incident Response process and practices

  • Experience performing security monitoring, response capabilities, log analysis and forensic tools

  • Strong understanding of operating systems including Windows, Linux and OSX

  • Experience with SIEM, SOAR, EDR, Network, AWS, and Azure security tools

  • Excellent critical thinking and analytical skills, organizational skills, and the ability to work as part of a team

  • Excellent verbal and written communication skills

  • Ability to design playbooks for responding to security incidents

  • Ability to support off-hours, weekends, and holidays if needed in support of incident response

  • Preferred Qualifications
     

  • Advanced interpersonal skills to effectively promote ideas and collaboration at various levels of the organization

  • One or more security-related certifications from any of the following organizations: GCIH, GCFE, GCFA, AWS, Azure Cloud security Certifications or equivalent is desired

  • #LI-PJ1

    Learn More

    About Autodesk

    Welcome to Autodesk! Amazing things are created every day with our software – from the greenest buildings and cleanest cars to the smartest factories and biggest hit movies. We help innovators turn their ideas into reality, transforming not only how things are made, but what can be made.

    We take great pride in our culture here at Autodesk – it’s at the core of everything we do. Our culture guides the way we work and treat each other, informs how we connect with customers and partners, and defines how we show up in the world.

    When you’re an Autodesker, you can do meaningful work that helps build a better world designed and made for all. Ready to shape the world and your future? Join us!

    Salary transparency

    Salary is one part of Autodesk’s competitive compensation package. Offers are based on the candidate’s experience and geographic location. In addition to base salaries, our compensation package may include annual cash bonuses, commissions for sales roles, stock grants, and a comprehensive benefits package.

    Diversity & Belonging
    We take pride in cultivating a culture of belonging where everyone can thrive. Learn more here:

    Are you an existing contractor or consultant with Autodesk?

    Please search for open jobs and apply internally (not on this external site).

    This advertiser has chosen not to accept applicants from your region.

    Information Security Analyst, Incident Response L1

    Bengaluru, Karnataka NTT

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    JOB DESCRIPTION

    Make an impact with NTT DATA
    Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive.

    Additional Career Level Description:

    Knowledge and application:

  • Seasoned, experienced professional; has complete knowledge and understanding of area of specialization.
  • Uses evaluation, judgment, and interpretation to select right course of action.
  • Problem solving:

  • Works on problems of diverse scope where analysis of information requires evaluation of identifiable factors.
  • Resolves and assesses a wide range of issues in creative ways and suggests variations in approach.
  • Interaction:

  • Enhances relationships and networks with senior internal/external partners who are not familiar with the subject matter often requiring persuasion.
  • Works with others outside of own area of expertise, with the ability to adapt style to differing audiences and often advises others on difficult matters.
  • Impact:

  • Impacts short to medium term goals through personal effort or influence over team members.
  • Accountability:

  • Accountable for own targets with work reviewed at critical points.
  • Work is done independently and is reviewed at critical points.
  • Workplace type:

    Hybrid Working

    About NTT DATA
    NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.

    Equal Opportunity Employer
    NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

    This advertiser has chosen not to accept applicants from your region.

    Cyber Incident Response - Junior Incident

    Bengaluru, Karnataka EY

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.

    **Cyber & Investigative Services - Junior Incident Coordinator**

    **EY Technology**:
    Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 250,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day. Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients. Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization.

    **EY Technology **supports our technology needs through three business units:
    **Client Technology (CT)** - focuses on developing new technology services for our clients. It enables EY to identify new technology-based opportunities faster and pursue those opportunities more rapidly.
    **Enterprise Workplace Technology (EWT)** - EWT supports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services. EWT will also support our internal technology needs by focusing on a better user experience.
    **Information Security (InfoSec)**:

    - InfoSec prevents, detects, responds and mitigates cyber-risk, protecting EY and client data, and our information management systems.

    **The opportunity**

    **Your key responsibilities**
    - Coordinate response efforts to cyber incidents caused by external threats that may involve nontraditional working hours
    - Serve as a liaison to different businesses and interface with fellow team members and colleagues on other security teams. As-needed, manage relationships with business partners, management, vendors, and external parties
    - Drive integration with other corporate incident management programs to ensure consistency and alignment with peer support teams within IT
    - Help lead small to medium sized projects as directed by leadership
    - Be a champion for process and documentation. Develop and document processes to ensure consistent and scalable response operations, and ensure continuous improvement to the company’s incident response plan
    - As requested, develop and deliver metrics to leadership
    - Create ready-to-go draft communications and ensure timely reports/updates to leadership during and after an event
    - Own and manage the teams internal action playbooks and knowledgebase
    - Must be willing to be on-call off hours in rotation with other team members (required)

    **Skills and attributes for success**
    - Resolution of security incidents by validating root cause and solutions
    - Analyze findings in investigative matters, and develop fact-based reports
    - Ability to identify and articulate opportunities for improvement while helping drive lessons learned activities
    - Demonstrated integrity and judgment within a professional environment
    - Inquisitive approach to analysis and peer review
    - Application of emotional intelligence and calm under pressure
    - Ability to appropriately balance work/personal priorities

    **To qualify for the role, you must have**
    - ** Education**:

    - Bachelors or Masters Degree in Computer Science, Information Systems, Engineering, a related field, or equivalent experience
    - **
    Experience**:

    - 5+ years’ experience in at least two of the following roles:

    - Member of a Security Operations Center (SOC)
    - Security Incident Response Analyst or supporting function (2 years minimum)
    - eDiscovery or related role performing forensic functions
    - Deep understanding of security threats, vulnerabilities, and incident response
    - Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis
    - Be familiar with a basic understanding of legalities surrounding electronic discovery and analysis
    - Understanding of regulatory stipulations regarding security incidents
    - Experience with SIEM technologies (i.e. Splunk)
    - Deep understanding of both Windows and Unix/Linux based operating systems

    **Ideally, you’ll also**

    **What we look for**
    - Demonstrated integrity in a professional environment
    - Ability to work independently
    - Have a global mind-set for working with different cultures and backgrounds
    - Knowledgeable in business industry standard security incident response process, procedures, and life-cycle
    - Excellent organizational skills and strong
    This advertiser has chosen not to accept applicants from your region.

    Major Incident Response Analyst

    Bengaluru, Karnataka Astellas Pharma

    Posted 17 days ago

    Job Viewed

    Tap Again To Close

    Job Description

    **Purpose and Scope:**
    We are looking for a detail-oriented and proactive Major Incident Response Analyst to join our incident response team. The ideal candidate will be responsible for analyzing and managing major incidents that affect our operations, ensuring timely resolution and minimizing impact on the business. This role requires strong analytical skills, effective communication, and the ability to work collaboratively in a fast-paced environment.
    **Responsibilities and Accountabilities:**
    + Proactively monitor and analyze incidents to identify major incidents that require immediate attention and escalation.
    + Collaborate with End User Technology Support, the Digital Desk, Security Operations, and other relevant teams to support effective response and resolution of major incidents.
    + Assist in investigations of major incidents to determine root causes and impact on business operations.
    + Maintain detailed incident records, including timelines, actions taken, communications, and resolution outcomes to support reporting and analysis.
    + Maintain and update the Major Incident Management process, including policies, procedures, knowledge base with critical contacts and best practices.
    + Organise and participate in post-incident reviews to identify lessons learned and recommend improvements to incident management processes.
    + Maintain and update incident management tools and documentation to ensure accurate tracking and reporting of major incidents.
    + Provide support and guidance to team members during major incidents, ensuring adherence to established processes and protocols.
    + Stay informed about industry trends, latest security threats, and best practices related to incident response and management.
    + Contribute to a culture of preparedness across Service Enablement, TechX and DigitalX.
    + Work closely with End User Technology Support, SecOps & Incident Response and the Digital Desk
    + Capable of identifying potential signs of external threat actor involvement which could indicate a security incident.
    + Stay current with industry trends, threats, and best practices related to incident management
    **Required Qualifications:**
    + Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
    + Atleast 3 years of experience in incident management, with a focus on major incidents in a complex global environment.
    + Strong understanding of IT service management (ITSM) frameworks, such as ITIL.
    + Excellent leadership and team management skills, with the ability to motivate and guide cross-functional teams.
    + Strong analytical and problem-solving abilities, with a focus on root cause analysis and continuous improvement.
    + Exceptional communication skills, both written and verbal, with the ability to convey complex information to diverse audiences.
    + Relevant certifications (e.g., ITIL, CISSP, CISM) are a plus.
    **Preferred Qualifications:**
    + Experience in managing IT budgets and vendor relationships.
    + Relevant certifications, such as ITIL, PMP, or AWS, are a plus
    **Working Environment**
    **Astellas' Global Capability Centres - Overview**
    _Astellas' Global Capability Centres (GCCs) are strategically located sites that give Astellas the ability to access talent across various functions in the value chain and to co-locate core capabilities that are currently dispersed._ __ _Our three GCCs are located in India, Poland and Mexico._ __
    __ _The GCCs will enhance our operational efficiency, resilience and innovation potential, enabling a timely response to changing business demands._ __
    __ _Our GCCs are an integral part of Astellas, guided by our shared values and behaviors, and are critical enablers of the company's strategic priorities, sustainable growth, and commitment to turn innovative science into VALUE for patients._
    Category
    Astellas is committed to equality of opportunity in all aspects of employment.
    EOE including Disability/Protected Veterans
    This advertiser has chosen not to accept applicants from your region.

    Senior Information Security Incident Response Analyst

    Bengaluru, Karnataka NTT DATA

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Job Description

    Make an impact with NTT DATA
    Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive.

    Your day at NTT DATA

    The Senior Information Security Incident Response Analyst is an advanced subject matter expert, responsible for detecting and monitoring escalated threats and suspicious activity affecting the organization's technology domain (servers, networks, appliances and all infrastructure supporting production applications for the enterprise, as well as development environments).

    This role acts as the technical second responder for the team and supports the work of technical staff from various business areas, as well as third-party technical experts.

    The Senior Information Security Incident Response uses their technical competencies of systems and automated mechanisms to detect unauthorized activity on company information assets.

    What you'll be doing

    Key Responsibilities:

  • Manages the prevention and resolution of security breaches and ensure incident and problem management processes are initiated.
  • Performs access management activities according to the policy.
  • Implements and discusses security service audit schedules, review access authorization and perform the required access controls and testing to identify security weaknesses.
  • Interacts with a global team of Cyber Security Analysts and specialists.
  • Manages 2nd level triaging of security alerts, events, and notifications.
  • Manages notifications of internal and/or external teams according to agreed alert priority levels, and escalation trees.
  • Communicates status of response, resolution and final root cause analysis to the appropriate stakeholders.
  • Follows and updates established and/or ad-hoc processes and work instructions and create procedures where deficiencies are identified.
  • Logs, manages and coordinates service requests through to resolution including the identification, isolation, resolution and escalation of IT infrastructure faults.
  • Maintains an understanding of current and emerging threats, vulnerabilities, and trends.

  • Knowledge and Attributes:

  • Advanced understanding of End Point Protection Software.
  • Advanced understanding of Enterprise Detection and Response software.
  • Advanced knowledge of technological advances within the information security arena.
  • Advanced understanding of inter-relationships in an overall system or process.
  • Advanced knowledge of information security management and policies.
  • Advanced understanding risk management principles and frameworks is crucial for prioritizing and addressing security incidents
  • Advanced understanding of the organization's business operations, goals, and objectives enables the analyst to align incident response efforts with the broader business strategy.
  • Ability to effectively communicate technical information to both technical and non-technical stakeholders, and end-users, as well as working with cross-functional teams during incident response.
  • Ability to think critically, analyze information, and solve medium to complex problems.

  • Academic Qualifications and Certifications:

  • Bachelor’s degree or equivalent in Information Technology, Computer Science or related preferred.
  • SANS GIAC Security Essentials (GSEC) or equivalent preferred.
  • SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent preferred.
  • SANS GIAC Certified Incident Handler (GCIH) or equivalent preferred

  • Required Experience:

  • Advanced experience in a Technology Information Security Industry.
  • Advanced experience or knowledge of SIEM and IPS technologies.
  • Advanced experience with Wireshark or tcpdump to identify normal and abnormal/malicious traffic patterns and behaviors.
  • Workplace type:

    Remote Working

    About NTT DATA
    NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.

    Equal Opportunity Employer
    NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.

    Apply Apply Back to search results
    This advertiser has chosen not to accept applicants from your region.

    Incident response commander / project manager | aiir – ai-driven incident response

    Bengaluru, Karnataka AiiR Response

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Company DescriptionAii R is the first AI-driven breach response and extortion management platform that automates negotiations, investigations, and recovery, reducing incident costs and response times. At the core of Aii R is CEIRA, an AI-powered virtual breach response analyst that streamlines ransom negotiations, tracks cryptocurrency payments, conducts forensic investigations, and automates breach notifications. The platform provides AI-powered ransom negotiation, crypto payment tracking, threat intelligence, digital forensics, and automated breach notification and compliance. Aii R supports cyber insurers, enterprises, legal teams, and SOC, ensuring faster response times and reduced breach costs.Role DescriptionWe are seeking a Incident Response Commander / Project Manager based in India to join our product innovation team. You’ll play a critical role in translating real-world IR experiences into actionable use cases, working closely with our engineering and AI teams to test and validate breach workflows, QA features, and build out battle-tested Promptbooks for varied breach types.This role requires deep domain expertise in the end-to-end incident response lifecycle—particularly across ransomware, business email compromise, insider threat, and regulatory breach scenarios.Key Responsibilities? Subject Matter Expert for Breach ResponseBring your extensive IR experience to shape Promptbook scenarios and playbooks across a wide range of case types, from extortion to insider threats. QA and Feature TestingAct as the QA lead for new breach response features, workflows, and case management logic inside the Aii R platform. Test AI-generated recommendations and prompt outputs for accuracy and relevance? Promptbook Development & Use Case DesignAuthor and validate Promptbooks (prompt-based workflows) for breach scenarios that mimic real-life attacker TTPs and regulatory obligations? Cross-Functional CoordinationCollaborate with product managers, AI engineers, and UX teams to ensure functionality meets field demands and maintains alignment with real-world investigation and response flow?️ Project Management SupportHelp manage internal development sprints and delivery schedules related to breach response and forensic modules.Required Skills & Experience 10+ years of experience in cybersecurity, with at least 5 years in hands-on incident response (in-house, consulting, MSSP, or law enforcement)? Strong understanding of the IR lifecycle: detection, containment, eradication, recovery, and post-incident review. Experience building IR playbooks or response frameworks (NIST, MITRE ATT&CK, ISO 27035, etc.)? Familiarity with prompt engineering, AI-generated response design, or at least strong interest in working closely with LLMs and intelligent systems? Proven experience in QA testing, user acceptance testing (UAT), or product feedback loops? Comfortable using project management and product tools like Jira, Confluence, Notion, etc? Experience coordinating with distributed teams across time zones? Self-starter, detail-oriented, and passionate about redefining IR with modern tools.Nice-to-Have? Familiarity with forensic tools (Velociraptor, KAPE, etc.) or SIEM/XDR platforms like Sentinel, Splunk, Defender? Exposure to breach notification laws, regulatory frameworks (GDPR, HIPAA, SEC, etc.)? Background in product management, AI testing, or user story writing? Experience in working with AI security tools or building IR tools/platforms.What We OfferOpportunity to shape a next-gen cybersecurity platform from the ground upCollaborative, agile team culture across the U. S. and IndiaFlexible remote work scheduleFast-paced, high-impact work environment with a mission to protect global organizations from breach chaos

    This advertiser has chosen not to accept applicants from your region.
    Be The First To Know

    About the latest Incident response Jobs in Bengaluru !

    Incident response commander / project manager | aiir – ai-driven incident response

    Bengaluru, Karnataka AiiR Response

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    permanent
    Company DescriptionAii R is the first AI-driven breach response and extortion management platform that automates negotiations, investigations, and recovery, reducing incident costs and response times. At the core of Aii R is CEIRA, an AI-powered virtual breach response analyst that streamlines ransom negotiations, tracks cryptocurrency payments, conducts forensic investigations, and automates breach notifications. The platform provides AI-powered ransom negotiation, crypto payment tracking, threat intelligence, digital forensics, and automated breach notification and compliance. Aii R supports cyber insurers, enterprises, legal teams, and SOC, ensuring faster response times and reduced breach costs.Role DescriptionWe are seeking a Incident Response Commander / Project Manager based in India to join our product innovation team. You’ll play a critical role in translating real-world IR experiences into actionable use cases, working closely with our engineering and AI teams to test and validate breach workflows, QA features, and build out battle-tested Promptbooks for varied breach types.This role requires deep domain expertise in the end-to-end incident response lifecycle—particularly across ransomware, business email compromise, insider threat, and regulatory breach scenarios.Key Responsibilities? Subject Matter Expert for Breach ResponseBring your extensive IR experience to shape Promptbook scenarios and playbooks across a wide range of case types, from extortion to insider threats.  QA and Feature TestingAct as the QA lead for new breach response features, workflows, and case management logic inside the Aii R platform. Test AI-generated recommendations and prompt outputs for accuracy and relevance? Promptbook Development & Use Case DesignAuthor and validate Promptbooks (prompt-based workflows) for breach scenarios that mimic real-life attacker TTPs and regulatory obligations? Cross-Functional CoordinationCollaborate with product managers, AI engineers, and UX teams to ensure functionality meets field demands and maintains alignment with real-world investigation and response flow?️ Project Management SupportHelp manage internal development sprints and delivery schedules related to breach response and forensic modules.Required Skills & Experience  10+ years of experience in cybersecurity, with at least 5 years in hands-on incident response (in-house, consulting, MSSP, or law enforcement)? Strong understanding of the IR lifecycle: detection, containment, eradication, recovery, and post-incident review. ️ Experience building IR playbooks or response frameworks (NIST, MITRE ATT&CK, ISO 27035, etc.)? Familiarity with prompt engineering, AI-generated response design, or at least strong interest in working closely with LLMs and intelligent systems? Proven experience in QA testing, user acceptance testing (UAT), or product feedback loops? Comfortable using project management and product tools like Jira, Confluence, Notion, etc? Experience coordinating with distributed teams across time zones? Self-starter, detail-oriented, and passionate about redefining IR with modern tools.Nice-to-Have? Familiarity with forensic tools (Velociraptor, KAPE, etc.) or SIEM/XDR platforms like Sentinel, Splunk, Defender? Exposure to breach notification laws, regulatory frameworks (GDPR, HIPAA, SEC, etc.)? Background in product management, AI testing, or user story writing? Experience in working with AI security tools or building IR tools/platforms.What We OfferOpportunity to shape a next-gen cybersecurity platform from the ground upCollaborative, agile team culture across the U. S. and IndiaFlexible remote work scheduleFast-paced, high-impact work environment with a mission to protect global organizations from breach chaos
    This advertiser has chosen not to accept applicants from your region.

    Incident response commander / project manager | aiir – ai-driven incident response

    Bengaluru, Karnataka AiiR Response

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    permanent
    Company DescriptionAii R is the first AI-driven breach response and extortion management platform that automates negotiations, investigations, and recovery, reducing incident costs and response times. At the core of Aii R is CEIRA, an AI-powered virtual breach response analyst that streamlines ransom negotiations, tracks cryptocurrency payments, conducts forensic investigations, and automates breach notifications. The platform provides AI-powered ransom negotiation, crypto payment tracking, threat intelligence, digital forensics, and automated breach notification and compliance. Aii R supports cyber insurers, enterprises, legal teams, and SOC, ensuring faster response times and reduced breach costs.Role DescriptionWe are seeking a Incident Response Commander / Project Manager based in India to join our product innovation team. You’ll play a critical role in translating real-world IR experiences into actionable use cases, working closely with our engineering and AI teams to test and validate breach workflows, QA features, and build out battle-tested Promptbooks for varied breach types.This role requires deep domain expertise in the end-to-end incident response lifecycle—particularly across ransomware, business email compromise, insider threat, and regulatory breach scenarios.Key Responsibilities? Subject Matter Expert for Breach ResponseBring your extensive IR experience to shape Promptbook scenarios and playbooks across a wide range of case types, from extortion to insider threats.  QA and Feature TestingAct as the QA lead for new breach response features, workflows, and case management logic inside the Aii R platform. Test AI-generated recommendations and prompt outputs for accuracy and relevance? Promptbook Development & Use Case DesignAuthor and validate Promptbooks (prompt-based workflows) for breach scenarios that mimic real-life attacker TTPs and regulatory obligations? Cross-Functional CoordinationCollaborate with product managers, AI engineers, and UX teams to ensure functionality meets field demands and maintains alignment with real-world investigation and response flow?️ Project Management SupportHelp manage internal development sprints and delivery schedules related to breach response and forensic modules.Required Skills & Experience  10+ years of experience in cybersecurity, with at least 5 years in hands-on incident response (in-house, consulting, MSSP, or law enforcement)? Strong understanding of the IR lifecycle: detection, containment, eradication, recovery, and post-incident review. ️ Experience building IR playbooks or response frameworks (NIST, MITRE ATT&CK, ISO 27035, etc.)? Familiarity with prompt engineering, AI-generated response design, or at least strong interest in working closely with LLMs and intelligent systems? Proven experience in QA testing, user acceptance testing (UAT), or product feedback loops? Comfortable using project management and product tools like Jira, Confluence, Notion, etc? Experience coordinating with distributed teams across time zones? Self-starter, detail-oriented, and passionate about redefining IR with modern tools.Nice-to-Have? Familiarity with forensic tools (Velociraptor, KAPE, etc.) or SIEM/XDR platforms like Sentinel, Splunk, Defender? Exposure to breach notification laws, regulatory frameworks (GDPR, HIPAA, SEC, etc.)? Background in product management, AI testing, or user story writing? Experience in working with AI security tools or building IR tools/platforms.What We OfferOpportunity to shape a next-gen cybersecurity platform from the ground upCollaborative, agile team culture across the U. S. and IndiaFlexible remote work scheduleFast-paced, high-impact work environment with a mission to protect global organizations from breach chaos
    This advertiser has chosen not to accept applicants from your region.

    Incident Response Commander / Project Manager | AIIR – AI-driven Incident Response

    Bengaluru, Karnataka AiiR Response

    Posted today

    Job Viewed

    Tap Again To Close

    Job Description

    Company Description

    AiiR is the first AI-driven breach response and extortion management platform that automates negotiations, investigations, and recovery, reducing incident costs and response times. At the core of AiiR is CEIRA, an AI-powered virtual breach response analyst that streamlines ransom negotiations, tracks cryptocurrency payments, conducts forensic investigations, and automates breach notifications. The platform provides AI-powered ransom negotiation, crypto payment tracking, threat intelligence, digital forensics, and automated breach notification and compliance. AiiR supports cyber insurers, enterprises, legal teams, and SOC, ensuring faster response times and reduced breach costs.


    Role Description

    We are seeking a Incident Response Commander / Project Manager  based in India to join our product innovation team. You’ll play a critical role in translating real-world IR experiences into actionable use cases, working closely with our engineering and AI teams to test and validate breach workflows, QA features, and build out battle-tested Promptbooks for varied breach types.


    This role requires deep domain expertise in the end-to-end incident response lifecycle—particularly across ransomware, business email compromise, insider threat, and regulatory breach scenarios.


    Key Responsibilities

    This advertiser has chosen not to accept applicants from your region.
     

    Nearby Locations

    Other Jobs Near Me

    Industry

    1. request_quote Accounting
    2. work Administrative
    3. eco Agriculture Forestry
    4. smart_toy AI & Emerging Technologies
    5. school Apprenticeships & Trainee
    6. apartment Architecture
    7. palette Arts & Entertainment
    8. directions_car Automotive
    9. flight_takeoff Aviation
    10. account_balance Banking & Finance
    11. local_florist Beauty & Wellness
    12. restaurant Catering
    13. volunteer_activism Charity & Voluntary
    14. science Chemical Engineering
    15. child_friendly Childcare
    16. foundation Civil Engineering
    17. clean_hands Cleaning & Sanitation
    18. diversity_3 Community & Social Care
    19. construction Construction
    20. brush Creative & Digital
    21. currency_bitcoin Crypto & Blockchain
    22. support_agent Customer Service & Helpdesk
    23. medical_services Dental
    24. medical_services Driving & Transport
    25. medical_services E Commerce & Social Media
    26. school Education & Teaching
    27. electrical_services Electrical Engineering
    28. bolt Energy
    29. local_mall Fmcg
    30. gavel Government & Non Profit
    31. emoji_events Graduate
    32. health_and_safety Healthcare
    33. beach_access Hospitality & Tourism
    34. groups Human Resources
    35. precision_manufacturing Industrial Engineering
    36. security Information Security
    37. handyman Installation & Maintenance
    38. policy Insurance
    39. code IT & Software
    40. gavel Legal
    41. sports_soccer Leisure & Sports
    42. inventory_2 Logistics & Warehousing
    43. supervisor_account Management
    44. supervisor_account Management Consultancy
    45. supervisor_account Manufacturing & Production
    46. campaign Marketing
    47. build Mechanical Engineering
    48. perm_media Media & PR
    49. local_hospital Medical
    50. local_hospital Military & Public Safety
    51. local_hospital Mining
    52. medical_services Nursing
    53. local_gas_station Oil & Gas
    54. biotech Pharmaceutical
    55. checklist_rtl Project Management
    56. shopping_bag Purchasing
    57. home_work Real Estate
    58. person_search Recruitment Consultancy
    59. store Retail
    60. point_of_sale Sales
    61. science Scientific Research & Development
    62. wifi Telecoms
    63. psychology Therapy
    64. pets Veterinary
    View All Incident Response Jobs View All Jobs in Bengaluru