Protera

Protera

Protera Technologies modernizes, optimizes, and secures enterprise workloads in the cloud, offering proactive services to solve business challenges, optimize costs, and mitigate risks with transparency.

IT Services
251-1K
Founded 1998

Description

  • Lead and coordinate incident response investigations for Protera Technologies and its customers.
  • Analyze logs and alerts to distinguish true security incidents from benign activity.
  • Correlate seemingly unrelated data sources to identify threats and attack patterns.
  • Conduct packet analysis of network traffic to gather evidence for investigations.
  • Lead incident response calls with internal teams and clients and coordinate remediation actions.
  • Provide guidance and mentorship to junior analysts on investigations, best practices, and tool usage.
  • Coordinate incident handling, containment, and remediation support with internal teams and clients.
  • Tune, troubleshoot, and optimize SIEM, EDR, NDR, and other security monitoring systems.
  • Conduct proactive threat hunting and vulnerability assessments to identify emerging risks.
  • Document incident response actions and client communications for audit readiness and post-incident reporting.

Requirements

  • Extensive experience reviewing and analyzing log data from network and security devices.
  • Proficiency with information security tools for packet capture, network/OS fingerprinting, and communications analysis.
  • Strong familiarity with Windows and Linux operating systems, including command-line operations.
  • Solid networking fundamentals, including deep knowledge of TCP/IP and core protocols.
  • Knowledge of common network-based services and client/server applications.
  • Excellent verbal and written communication, interpersonal, and organizational skills.
  • Proven ability to interact professionally with clients during high-pressure situations.
  • Strong problem-solving skills for diagnosing technical issues and mitigating incidents.
  • Ability to learn new technologies and concepts quickly.
  • Willingness to work rotational shifts or on-call schedules as needed.
  • Experience in a mission-critical SOC or operations team is preferred.
  • Hands-on experience with malware analysis, phishing email analysis, log analysis, and digital forensics is preferred.
  • Experience with FTK, Redline, EDR tools, and enterprise SIEM platforms is preferred.
  • Familiarity with ITSM, IT GRC, and cyber case management tools is preferred.
  • Scripting knowledge in Python, Perl, Bash, or PowerShell is preferred.
  • Previous experience mentoring junior analysts or leading SOC initiatives is preferred.
  • Strong client-facing skills and ability to lead incident calls with technical and non-technical stakeholders is preferred.

Benefits

  • Work-from-home setup.
  • Comprehensive medical benefits.
  • Gratuity, PF, EPS, bonus, and NPS contributions.
  • Shift allowances.
  • On-call allowance.
  • Health and wellness allowances.
  • Learning and development allowances.
  • No-question-asked certification policy with certification bounty bonus.

Interested in this position?

Apply directly on the company website

Apply Now

Similar Roles

FBS Information Security Analyst

Capgemini 100K+ Internet Software & Services

FBS – Farmer Business Services, in partnership with Capgemini as Employer of Record, is seeking a Platform Security team member to help secure Farmers’ SaaS platforms and support compliance and access governance across a global environment.

2 hours, 52 minutes ago

Threat Intelligence Analyst (Quantitative Methods)

Moonshot 51-250 Diversified Consumer Services

Moonshot is seeking an Analyst to support threat intelligence reporting on online targeted violence in the US, focusing on open-source analysis and delivery of insights for US-based clients.

Kibana Python Tableau
3 hours, 7 minutes ago

SOC Analyst

Kraft Kennedy 51-250 Internet Software & Services

Kraft Kennedy is hiring a remote SOC Analyst to support its managed security services team by maintaining the SIEM platform, investigating incidents, and helping improve client security operations.

Azure Linux PowerShell Python SIEM
3 hours, 37 minutes ago

Sr. Lead Incident Response / Supervisor Level 5

WaveStrong, 51-250 Internet Software & Services

Sr. Lead Incident Response / Supervisor Level 5 professional role focused on protecting enterprise systems, data, and networks by leading complex security initiatives and improving cyber defense operations.

4 hours, 22 minutes ago

You're on a roll! Sign up now to keep applying.

Sign Up

Already have an account? Log in

Used by 14,729+ remote workers