Dr. Kundankumar Saraf’s Post

View profile for Dr. Kundankumar Saraf, graphic

SOC Manager | CISM Certified | Ph.D. in Cyber Security | Splunk ES | SOC | Artificial Intelligence | CEH

Hello Job Seeker, I am SOC Manager at Wipro and searching for "Threat Hunting and Threat Intelligence Lead" with +6 Year of experience and acceptable notice period is up to 30 days. If your skills and experience are matches with below given Job Description, please ping me to schedule a further round of interviews. Role = Threat Hunting and Threat Intelligence Lead Job Description Performs intelligence-driven network defense supporting the monitoring and incident response capabilities. The role involves analysis of large amounts of data from vendors and internal sources, including various indicator feeds, Splunk, and several threat hunting tools, etc. Threat Hunters perform the functions of threat operations and hunting and serve as the liaison for Threat Intelligence in the Security Operations Center, and mentor the incident handling, incident response, and forensics teams. Search for cyber threats and risks hiding inside the data before attacks occur. Gather as much information on threat behavior, goals, and methods as possible. Organize and analyze the collected data to determine trends in the security environment of the organization. Make predictions for the future and eliminate the current vulnerabilities. Monitoring and analyzing external and internal cyber threats to assess risk. Analyzing the likelihood that an emerging threat will impact their organization and identify where weaknesses are. Delivering reports and recommendations to the business to enable the effectiveness of mitigation and remediation efforts. Providing requirements to influence threat mitigation strategies. Analyzing internal risk and security controls to identify existing security weaknesses. Consolidating cyber threat intelligence feeds and sources. Providing threat intelligence support to cybersecurity teams during security incidents. Create process documents and SOPs for Threat Hunting Finalizing the Threat hunting scenarios and hypothesis Proactive threat hunting leveraging all platforms Creating IoC databases for threat hunting Submit detailed reports on a monthly basis to all relevant stake holders Up to date and good knowledge of all latest and prevalent threats for conducting threat hunts SME for presenting threat hunt scenarios to customer Providing logs as required by CSIRT and Forensic services   Experience – +6 Year of experience , Certification in threat hunting & forensic , VA/PT , Splunk , EDR and other Security tool awareness , understanding of Unix , windows and application structure

Really good opportunity!

Like
Reply
Pinku Patel

Lead Technical HR at NMS Consultant IT Recruiter |client Management| HR Recruiter|Team Management|

2mo

Please share me your Updated CV

Like
Reply
Pankaj Lohia

Security Analyst - SOC | Cybersecurity | SIEM | Seceon | Arcsight | RSA Netwitness | CNSS | CCNA | SC-900 | SC-200

2mo

I'm interested

Like
Reply
Deeksha K

SOC Analyst L1 | SIEM | Splunk | Proofpoint | SentinelOne | Crowdstrike | Darktrace

2mo

#CFBR

Like
Reply

Great opportunity!

Like
Reply
Kiran Gund

Database administrator at Bajaj Finserv

2mo

#CFBR

Like
Reply
Anant Gupta

Managing IT infrastructure & Technology RISK Expert | GRC | Inventor | Splunk Product Owner/Admin

2mo

#CFBR

Kalpesh Mahajan

Senior Network Engineer | Loadbalancer, Checkpoint, Azure Cloud

2mo

Cfbr

Like
Reply
Saikiran Mayekar

Talent Acquisition Consultant

2mo

Great opportunity

See more comments

To view or add a comment, sign in

Explore topics