Home
/
Comprehensive
/
Cybersecurity Incident Response Engineer – L2
Cybersecurity Incident Response Engineer – L2-March 2024
Bangalore
Mar 28, 2026
About Cybersecurity Incident Response Engineer – L2

  Want to be a part of our team?

  MS Engineer (L2) is responsible for providing a managed service to clients to ensure that their IT infrastructure and systems remain operational. Through the proactive monitoring, identifying, investigating and resolving of technical incidents and problems, the MS Engineer (L2) are able to restore service to clients. Their primary objective is to proactively review client requests or tickets and apply technical/process knowledge to resolve them without breaching service level agreement (SLA). The MS Engineer (L2) focuses on second line support for incidents and requests with medium level of complexity.

  Radford reference:

  "Performs IT functions such as design, analysis, evaluation, testing, debugging and implementation of applications programs supporting the company infrastructure business processes and operations and/or network-based (cloud) product systems. Analyzes, installs, acquires, modifies and supports operating systems, database or utilities software. Plans, conducts and directs the analysis of business problems with automated systems solutions. Analyzes, designs, acquires and implements projects for LAN and/or WAN systems. Plans, designs, acquires and implements telecommunications voice/wire systems. At higher job levels, may contribute to the development, testing, evaluation or design of system or infrastructure architecture used throughout the IT solution set."

  Working at NTT

  Job Profile Summary

  The Cyber Security Incident Response (CSIR) team is essential in providing an orchestrated and rapid security incident response capability with an oversight of security incident response across wider NTT Managed Security Services clients. The CSIR team utilise various security technologies to identify alerts, prioritize and investigate security issues in a fast-paced environment maintain the level of communication with internal and client stakeholders.

  As the CSIR engineer, the typical day can vary greatly depending on the specific position. They may begin their day by looking over dashboards, reports from the previous day or shift, including checking for any new threats and identifying malware that may have infiltrated the system. also prepare for and respond to system breaches or attacks. These processes might differ between Clients, but they generally include responding to hacks or network insecurities and working to prevent new ones.

  You will also be required to participate in a shift roster which may comprise of shifts business hours and after hours.

  Primary Skill Set - SOC - Splunk, Qualys, SIEM

  Your key responsibilities will include but are not limited to:

  Manage day-to-day operations of reviewing SIEM alert and other vulnerability management tools. Ensure that all the various environments within the Client have adequate scans and assessments performed.

  Research and recommend mitigation strategy for current and future threats relevant to the Clients environment.

  Participate in security incident response process when required.

  Support the Security Management Lifecycle including:

  Real-time Monitoring

  Incident investigation.

  Research.

  Correlation.

  Trending.

  Remediation.

  Setup and configure SIEM, including data analysis, rule creation. establish thresholds, reference lists, and other duties.

  Setup, investigate, and advanced troubleshooting of log transport agents.

  Work with Client technology owners and platform leads to ensure vulnerabilities and issues are patched and remediated on time.

  Oversee the implementation and management of operational security reporting activities.

  Regularly, meet with the internal team to review security reports, status, review any risks, issues, incidents, and outstanding activities.

  Vulnerability Management, Malware analysis, Threat hunting and assist in forensic analysis.

  Managing stakeholder expectations and assisting in the reduction of the impact of a cybersecurity event or incident.

  Contribute to maintaining knowledge base/playbooks by updating procedural documentation. Actively participate in process improvement with other team members and Wider team.

  Maintain detailed knowledge of the clients’ environment(s), where applicable, by maintaining and updating relevant documentation.

  Provide proactive, constant, and clear communication on the status of incident/problem resolution between the client, NTT, and any other third-party supplier and vendors.

  Performs post-mortem analyse with logs, network traffic flows, and other recorded information to identify intrusions by unauthorised parties, as well as unauthorized activities of authorised users.

  Manage the prevention and resolution of security breaches and ensure that the required incident and problem management processes are initiated to ensure compliance to policy.

  Conduct presentations of the security breaches findings to the business and advise on new measures required to prevent reoccurrence of similar breaches.

  What would make you a good fit for this role? (Mandatory skills)

  Experience in working in Security Operation Centre.

  Demonstrated genuine interests and passion for cybersecurity, incident problem solving is a must.

  Working knowledge of security operations environments and security incident management & response handling.

  Hands-on experience in managing Splunk, other SIEM logging solution like Microsoft Sentinel, ArcSight, LogRythm.

  Hands-on knowledge on the creation of use cases within SIEM solution including advanced correlation rules.

  Creating custom dashboards based on the client's security landscape.

  Ability to filter through false positives quickly and focus on true positives.

  Analyse and perform fine-tuning of SIEM rules/policies on regular basis.

  Hands-on experience in analysing SIEM alert payload to detect any malicious activity.

  Hands-on experience in managing Vulnerability Management solution like Qualys and Tenable experience,

  Hands-on experience to Analyse logs/events from SIEM solution, other infrastructure,

  Expertise in interpreting and querying Wireshark captures.

  Experience in managing Security Incidents detect and response, Threat hunt capability with knowledge of Kill chain methodology.

  Experience in triaging Threat feeds and work towards mitigation exercise.

  Experience in reviewing the vulnerability, product bug reports and relating its impact to Clients environment.

  Good understanding of Digital Forensics concept and the process followed therein.

  Operational knowledge on Security compliance tools like AlgoSec, Firemom, Skybox or Tufin.

  Previous experience in working on Firewalls from Palo Alto, Checkpoint, Cisco and Web security solution, End Point Security solutions like Mcafee, Symantec, Trend Micro, FireEye.

  Desirable skills

  Experience in managing Palo Alto Cortex XSOAR or other SOAR solutions is a plus.

  Certification - SANS GSEC, Splunk Core Certified Power User (SCCPU), Qualys.

  Experience in XDR or EDR solution like Carbon Black, Crowdstrike, FireEye, Palo Alto XDR.

  Windows / Linux skills and experience with scripting/programming, especially python.

  Proficiency in Analytics technologies like Elasticsearch, PowerBI, JSON).

  Exposure to Cyber Security Governance and Risk Compliance (GRC) and experience in providing innovative solutions to complex cybersecurity problems.

  Strong organisational skills & the ability to prioritise multiple complex tasks.

  Ability to work effectively under pressure.

  Excellent verbal and written communication skills are essential to influence both technical and non-technical audiences.

  Academic Qualifications and Certifications:

  Degree / Certifications

  SANS GIAC Security Essentials (GSEC) or equivalent

  SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent

  SANS GIAC Certified Incident Handler (GCIH) or equivalent

  Industry Certifications: CISSP, CISM, CISA, CEH, CHFI

  Information Technology / ITILSM / ICT Security / ITIL v4.

  Required Experience:

  Extensive experience in a Technology Information Security Industry

  Prior experience working in a SOC/CSIRT for at least 3 - 6 years

  Good Hands-on experience on SIEM mainly Splunk solution.

  Good Hands-on experience on Vulnerability management tools.

  Tertiary qualifications or a passionate ethical hacker.

  Experience using End Point Protection Software.

  Experience with Enterprise Detection & Response software.

  Knowledge of malware analysis, hacking techniques, latest vulnerabilities, and security trends.

  Preferably an interest, or knowledge of, or experience with SIEM and IPS technologies.

  Knowledge of network technologies including routers, switches, firewalls.

  Skills Summary

  Cisco Routers and Switches, Data Networking, IP Routing, Local Area Network (LAN), Routing Protocols, Wireless Local Area Network (WLAN), Wireless Networks

  What will make you a good fit for the role?

  Remote Type :

  Equal Opportunity Employer

  NTT is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, color, sex, religion, national origin, disability, pregnancy, marital status, sexual orientation, gender reassignment, veteran status, or other protected category

  Is innovation part of your DNA? Do you want to enable a connected future for people, organizations, and society?

  Join our growing global NTT family and you’ll be part of the world’s largest ICT company (by revenue). We’ve combined the capabilities of 28 remarkable companies to become one, leading technology services provider. Together, we help our people, clients, and communities do great things with technology to create a more secure and connected future.

  We employ 40,000 people across 57 countries. By bringing together the world’s best technology companies and emerging innovators, we work together to deliver sustainable outcomes to businesses and the world. Innovation is part of our DNA. We believe it’s key to what makes us different. So, we strive to move forward, challenge the status quo, and drive excellence through the technologies we integrate and the services we deliver around the world. The result is connected cities, connected factories, connected healthcare, connected agriculture, connected conservation, connected mobility, and connected sport. Together we enable the connected future.

  You’ll be joining a global employer that is committed to attracting, growing and keeping the best talent. A place where you will be at the heart of our success!

Comments
Welcome to zdrecruit comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Show More Comments
SIMILAR JOBS
SAP Functional Implementation Lead - Payroll Module
Are you interested in working in a dynamic environment that offers opportunities for professional growth and new responsibilities? Are you interested in helping clients drive alignment with their bus
Assistant Director - Ecological Services
Summary FWS works with others to conserve, protect, and enhance fish, wildlife, plants, and habitats for the continuing benefit of the American people. Our major responsibilities are to protect and c
Non-Engineering Safety Intern - PennDOT District 11 (College)
Reference #: 4307270THE POSITIONThe Pennsylvania Department of Transportation is looking for non-engineering college students for employment during the summer months for the 2024 Summer Employment Pr
Store Associate Per Diem
Bring your heart to CVS Health. Every one of us at CVS Health shares a single, clear purpose: Bringing our heart to every moment of your health. This purpose guides our commitment to deliver enhanced
Accounting Specialist
Description Our client is looking for a dynamic Accounting Specialist to become a key player in their finance department. If you have proficiency in Microsoft Excel, a solid understanding of accounti
Retail Banker I (20hrs) Wildwood
430867BR Job Title: Retail Banker I (20hrs) Wildwood Company Overview: Our Values At TD, we're guided by our purpose to enrich the lives of our customers, communities and colleagues, and share a set
Senior Energy Engineer - Renewables
Senior Energy Engineer - Renewables Location CO - Denver Job Family Building Energy Apply Now (https://phg.tbe.taleo.net/phg02/ats/careers/v2/applyRequisition?org=MCKINSTRY&cws=41&rid=8000) B
Software Engineer
As a Backend Engineer on the FPI APIs team, you will communicate and collaborate with technical program managers, product managers, frontend and data platform teams to develop and maintain performant
Deli Production Team Member
Company Description Pay Rates Starting between: $13.70 - $18.90 / hour Are you passionate about team building, customer service, and meeting new people? Pilot Company offers a dynamic environment whe
Oracle Cloud SCM Senior Consultant
Oracle Cloud SCM - Senior Consultant Today's chief financial officers (CFOs) and financial executives are being asked to improve business performance and shareholder value, along with operational eff
Copyright 2023-2026 - www.zdrecruit.com All Rights Reserved