Key Skills: Grafana, Prometheus, Monitoring, MITRE Attack Framework, Incident Management, OWASP
Roles and Responsibilities:
- Investigate EDR, Azure AD, Email & SIEM alerts to identify threats and anomalies.
- Perform detailed technical investigations on security incidents and recommend mitigation strategies as per security frameworks.
- Create and maintain Incident Response processes, run books, and SOPs, ensuring continuous documentation and reporting.
- Provide security advisory services and develop use cases while supporting deployment and integration efforts with the Corporate IT team.
- Collaborate with Corporate IT teams to strengthen InMobi's security posture and reduce the attack surface.
- Utilize open-source threat intelligence to evaluate threats and analyze their impact within the InMobi environment, deploying necessary detection and remediation procedures.
- Coordinate with stakeholders to understand infrastructure, products, and business processes to ensure adequate security controls are in place.
- Demonstrate strong skills in event correlation, log analysis, networking basics, and security fundamentals.
- Maintain a customer-focused approach while exhibiting curiosity and a willingness to learn.
Skills Required:
- Proficient in Monitoring tools - Grafana, Prometheus
- Experience with SIEM, EDR, Azure AD, and Email alert investigations
- Knowledge of Incident Management and writing SOPs/Runbooks
- Familiarity with MITRE ATT&CK and OWASP frameworks
- Strong understanding of log analysis, networking basics, and security fundamentals
- Ability to collaborate across teams and stay updated with threat intelligence trends
Education: B.E., B.Tech, B.Tech M.Tech (Dual), M.Tech, M.E. in Computer Engineering, Computer Science, or related fields