Sr Information Security Analyst

ID
2021-14928
Category
Information Technology
Position Type
Full Time
Location : Location
IN-KA-Bengaluru

About Blackhawk Network:

At Blackhawk Network, we shape the future of global branded payments through the prepaid products, technologies, and networks that connect brands and people. Our collaborative innovation and scalable, security-minded solutions help our partners to increase reach, loyalty, and revenue. We believe our future holds great things for Blackhawk Network and its partners. We believe that together, we can shape the future. Our beliefs? Win as one team, be innovative, global excellence and be inspiring!

So, what are you waiting for? Shape your career and join our global network.

Overview:

Blackhawk Network is building a digital platform and products that bring people and brands together.  We facilitate cross channel payments via cash-in, cash-out and mobile payments. By leveraging blockchain, smart contracts, serverless technology, real time payment systems, we are unlocking the next million users through innovation.

 

Our employees are our biggest assets!  Come find out how we engage, with the biggest  brands in the world.  We look for people who collaborate, who are inspirational, who have passion that can make a difference by working as a team while striving for global excellence.

 

As a leader in branded payments,  we are building a strong diverse team and  expanding in ASIA PACIFIC –we are hiring in Bengaluru, India! This is an amazing opportunity for problem solvers who want to be a part of an innovative and creative Engineering team that values your contribution to the company. If this role has your name written all over it, please contact us apply now with a resume so that we explore further and get connected.

 

Are you passionate about information security and technology? Do you find solving complex problems an exciting challenge?  Do you have a strong understanding of attacker and defender tradecraft? Do you get excited about performing forensic analysis, reversing malware, and responding to cybersecurity incidents? Are you looking for a Life/Work balance?  Are you looking to be a key contributor in the World’s leading Anytime/Anywhere Payment Network?  If you answered ‘Yes, please read on…your career is at Blackhawk Network, and we want to talk to you!

 

Blackhawk Network’s technology includes world-class transaction acquisition, switching and routing, real-time settlement, pre-paid card processing, fulfilment and business analytics components. State of the art consumer web sites, emerging mobile apps, and high-speed transaction processing with volume spikes that make Pikes Peak seem small are all part of a challenging and rewarding technology environment. What does this translate into from a security standpoint? We print money. That means we are heavily targeted by financially motivated threat actors and need people like you to help join the fight against evil.

 

 

 

Responsibilities:

High-level Responsibilities:

  • Working as an integral part of the 24x5 GSOC team as a shift lead Level 2 analyst
  • Working with and enhancing the Playbooks, Runbooks and SOP’s as part of your daily operations role
  • Working closely with the broader Global Security team, forensics, application security, pen testing team etc.
  • Working closely with the security engineering team to strengthen the existing coverage and enhance the in-play security tools
  • Act as the in shift incident coordinator when the incident is raised as a P1

 

 

 

 

 

 

 

Qualifications:

 

Essential, demonstrable strong experience of:

 

  • 6 plus years front-line level 2 / 3 analyst experience working managing a shift or the team in a 24x5 or 24x7 follow the sun GSOC.
  • Acting as the incident coordinator or manager multi-discipline Cyber Security Incident Response where you managed the incident form alert notification to resolution and wash-up meeting review
  • Balancing cybersecurity priorities to focus on most valuable next business action
  • Distilling complex topics into easily understandable to non-technical users
  • Ability to review raw logs in many different formats and collate the data into actionable use-cases and feed into investigations
  • Working using service management tools encompassing alerts, triage, and incident response/remediation
  • Strong experience of directly engaging with internal customers and wider stakeholders
  • Advanced expertise in integrating threat intelligence into threat hunting and ultimately reducing security incidents
  • Methodologies for proactively detecting host- and network-based indicators of compromise.
  • High levels of exposure to standard OS’s, e.g. Windows, *NIX, & OS X etc.
  • Exposure and use of SIEM / Log Aggregators
  • Exposure and use of EDR
  • Escalating where necessary and coaching other team members
  • Collaborating with outsourced service providers / MSSPs

Desirable experience:

 

  • Excellent written, verbal communication, time management & organization skills.
  • Formal security related qualifications such as CISSP, CISM etc.
  • Operating within PCI-DSS, ISO-27001/2 Frameworks
  • Detecting and responding to incidents in cloud and hybrid-cloud network environments.
  • Working on Financial systems requiring PCI-DSS Compliance
  • Threat Hunting & OSINT tools and techniques
  • Enterprise forensics tools & processes

 

 

#GLDR

 

Options:

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed