Salary: Open
Employment Type: Permanent
Sub-industry: Insurance
Function: Technology

Company Overview

Our Client is US HQed $45 Billion Global Insurance Service Provider having large Software Development Center in India in Bangalore & Pune locations

Job Description

• Serve as an escalation resource and mentor for other analysts
• Perform investigation and escalation for complex or high severity security threats or incidents
• Work with SIEM Engineering and other security partners developing and refining correlation rules
• Work on complex tasks assigned by leadership, which may involve coordination of effort among Level 1/2 analysts
• Coordinate evidence/data gathering and documentation and review Security Incident reports
• Assist in defining and driving strategic initiatives
• Create and develop SOC processes and procedures working with Level 2 Analysts
• Provide recommendations for improvements to Allstate’s Security Policy, Procedures, and Architecture based on operational insights
• Define and assist in creation of operational and executive reports
• Define tool requirements to improve SOC capabilities
• Provide leadership and technical guidance in project planning, task definition, estimating, reporting, scheduling, documentation, and workflow.


At least 10 years of technical experience in Information Security, System Administration, or Network Engineering with at least 5 years of experience in Information Security.
Experience in Security Operations and Incident Response.
Detailed practical knowledge of Internet protocols, firewalls, load balancers, routers, switches, intrusion detection/prevention systems.
Ability to conduct multi-step breach and investigative analysis to trace the dynamic activities associated with advanced threats. Knowledge of configuration of firewalls, load balancers, routers, and switches.
Advanced knowledge and expertise of using SIEM technologies for event investigation.
College degree in related field or equivalent work experience.

Additional Information

• Advanced event analysis leveraging SIEM tools
• Advanced incident investigation and response skill set
• Advanced log parsing and analysis skill set
• Advanced knowledge of networking fundamentals (TCP/IP, network layers, Ethernet, ARP, etc)
• Advanced knowledge of current threat landscape (threat actors, APT, cyber-crime, etc)
• Advanced knowledge of malware operation and indicators
• Advanced knowledge of penetration techniques
• Moderate to Advanced knowledge of DDoS mitigation techniques
• Moderate to Advanced knowledge or IDS/IPS systems
• Moderate to Advanced knowledge of Windows and Unix or Linux
• Moderate knowledge of Firewall and Proxy technology
• Moderate knowledge of Data Loss Prevention monitoring
• Moderate knowledge and experience with Cloud technologies (Amazon, Azure, Google Cloud)
• Moderate experience with scripting
• Moderate knowledge of forensic techniques
• Moderate protocol analysis experience (Wireshark, Gigastor, Netwitness, etc.)
• Moderate knowledge of audit requirements (PCI, HIPPA, SOX, etc.)
• Experienced in mentoring and training junior analysts

Security Certifications Preferred (Including but not limited to the following certifications):
- Certified Incident Handler (GCIH)
- Certified Intrusion Analyst (GIAC)
- Certified Ethical Hacker (CEH)
- Certified Expert Penetration Tester (CEPT)
- Certified Information Systems Security Professional (CISSP)
- Networking Certifications (CCNA, etc)
- Platform Certifications (Microsoft, Linux, Solaris, etc)

Job reference: JO-210805-266706

Need Help?

Feel free to connect with us

Job application

You are about to apply to the following job: Principle Consultant - Cyber-Security - Incident response . Applying a job is not a commitment, it gives us the authorization to show your CV to the employer

Upload from Computer
Application confirmed!
Thank you for applying! We shall be in touch with you.