drjobs Cyber Incident Response and Recovery Investigator | Digital Forensics - Bangalore

Cyber Incident Response and Recovery Investigator | Digital Forensics - Bangalore

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Bengaluru - India

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

We help the world run better

At SAP we enable you to bring out your best. Our company culture is focused on collaboration and a shared passion to help the world run better. How We focus every day on building the foundation for tomorrow and creating a workplace that embraces differences values flexibility and is aligned to our purpose-driven and future-focused work. We offer a highly collaborative caring team environment with a strong focus on learning and development recognition for your individual contributions and a variety of benefit options for you to choosefrom.

Summary

An SAP Global Cyber Senior Incident Response and Recovery Investigatorplays a critical role in safeguarding SAPs digital enterprise. As a front-line defender the Investigator is responsible for triaging security events identified by monitoring tools analysing data to assess severity and urgency and conducting initial evaluations to determine whether a cyberattack is underway. When a potential incident is identified the Investigator works closely with Global Security Operations to scope the impact coordinate containment efforts and support forensic investigations to uncover the nature and details of the attack.

What youll do


Our Global Cyber Security Incident Response and Recovery Investigator are our first line of response for security event and incidents with a global scope. They are responsible for triaging security alerts detected by Enterprise Detection and SIEM analysing available data to determine scope severity and priority to determine follow on actions which could include escalation to a IR Investigator. In escalation cases they then work in a supportive capacity to further validate if a cyber-attack is occurring scoping the extent of a suspected attack coordinating efforts to contain attacks supporting forensic investigations to determine the details around an attack and providing guidance on remediation actions.

In this role you will:

  • Conduct initial assessments and help drive root cause analysis.
  • Contribute to the development of attack remediation and response strategies.
  • Coordinate escalation handling and communication across teams.
  • Triage operational security processes including phishing response.
  • Assist in maintaining and improving incident handling documentationsuch as playbooks runbooks and standard operating procedures.
  • Collaborate with Detection and SIEM teams to enhance detection logic and alert accuracy.
  • Support forensic investigations with technical insights and evidence collection.
  • Analysingcloud logs and telemetryfor signs of compromise (e.g. CloudTrail VPC Flow Logs Azure Activity Logs).
  • Leverage your offensive knowledge to identify gaps simulate attacks and drive improvements in detection response and hardening strategies.
  • We value hands-on practitionersour environment includes sandboxing red vs. blue testing or adversary emulation frameworks (e.g. MITRE ATT&CK CALDERA Atomic Red Team) and opportunities to build tooling or simulate attack chains.


What you bring


We are seeking analytical and detail-oriented critical thinkers who are solution-focused and thrive in dynamic environments. The ideal candidate should be a fast learner with the ability to adapt quickly and respond effectively to changing circumstances.

Preferred Technical Skills and Experience:

  • Experience:
    814 years in a cyber incident investigation role or equivalent combination of education certifications and relevant training.
  • Certifications - Industry-recognized certifications such as Security GCIA GCIH GCFA GCFE GREM CISSP (or equivalent).
  • Strong understanding of Advanced Persistent Threat (APT) actors their tools techniques and procedures (TTPs) as well as threat modelling frameworks.
  • Proficiency in TCP/IP communications and knowledge of core network protocols and applications such as DNS HTTP and SMB.
  • Security Infrastructure Tools: (SIEM IDS EDR DNS other Deception technologies)
  • Proficiency in scripting languages such as PowerShell Python or Bash.
  • Core Forensic Competencies:
  • Expertise in memory disk and file system forensics across multiple OS platforms (Windows Linux macOS).
  • Experience performing volatile memory acquisition and analysis (e.g. using Volatility Plaso Sleuth Kit Velociraptor KAPE).
  • Proficient in analyzing logs timelines and system artifacts to reconstruct attacker activity.
  • Proficiency in forensic toolsets such as EnCase FTK X-Ways Autopsy.
  • Knowledge of file carving metadata analysis and data recovery.
  • Cloud Forensics & Logging:
  • Experience analyzing cloud logs (e.g. CloudTrail Azure Activity Logs GCP Audit Logs).
  • Familiarity with cloud storage and compute forensics (e.g. EC2 Lambda S3 Blob Storage).
  • Ability to investigate container and orchestration layers (e.g. Docker Kubernetes EKS/AKS/GKE).

Bring out your best

SAP innovations help more than four hundred thousand customers worldwide work together more efficiently and use business insight more effectively. Originally known for leadership in enterprise resource planning (ERP) software SAP has evolved to become a market leader in end-to-end business application software and related services for database analytics intelligent technologies and experience management. As a cloud company with two hundred million users and more than one hundred thousand employees worldwide we are purpose-driven and future-focused with a highly collaborative team ethic and commitment to personal development. Whether connecting global industries people or platforms we help ensure every challenge gets the solution it deserves.At SAPyou can bring out your best.

We win with inclusion

SAPs culture of inclusion focus on health and well-being and flexible working models help ensure that everyone regardless of background feels included and can run at their best. At SAP we believe we are made stronger by the unique capabilities and qualities that each person brings to our company and we invest in our employees to inspire confidence and help everyone realize their full potential. We ultimately believe in unleashing all talent and creating a better and more equitable world.
SAP is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to the values of Equal Employment Opportunity and provide accessibility accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment with SAP and are in need of accommodation or special assistance to navigate our website or to complete your application please send an e-mail with your request to Recruiting Operations Team:
For SAP employees: Only permanent roles are eligible for the SAP Employee Referral Program according to the eligibility rules set in the SAP Referral Policy. Specific conditions may apply for roles in Vocational Training.

EOE AA M/F/Vet/Disability:

Qualified applicants will receive consideration for employment without regard to their age race religion national origin ethnicity age gender (including pregnancy childbirth et al) sexual orientation gender identity or expression protected veteran status or disability.
Successful candidates might be required to undergo a background verification with an external vendor.

Requisition ID: 420839 Work Area: Information Technology Expected Travel: 0 - 10% Career Status: Professional Employment Type: Regular Full Time Additional Locations: #LI-Hybrid.

Employment Type

Full-Time

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.