Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Strong experience in SIEM & Threat Detection (MITRE ATT&CK framework) ---Must
Strong experience in Analyze logs, detect threats, and tune alerts using tools like Splunk/QRadar. -MUST
Strong experience in Incident Response & Threat Hunting is THE MUST
Strong Experience Endpoint Security (EDR/XDR) Is MUST
Strong experience in Banking Domain is preferred
The Specialist – Cyber Defense Centre is responsible for supporting advanced cyber defense operations, including proactive threat hunting, incident detection and response, and security analytics. The role involves close collaboration with Security Operations Center (SOC) teams and other IT/security stakeholders to identify, contain, and remediate cyber threats, ensuring the protection of critical banking systems and sensitive data.
Key Responsibilities
- Perform proactive threat hunting to detect advanced persistent threats (APTs) and hidden malicious activities within the network.
- Monitor, analyze, and respond to security alerts and incidents generated by SOC tools (SIEM, EDR, NDR).
- Conduct incident response activities, including investigation, containment, eradication, and recovery.
- Collaborate with SOC analysts and IT teams to triage and escalate security incidents based on severity.
- Analyze logs and security events to identify anomalies, attack patterns, and indicators of compromise (IOCs).
- Support implementation and tuning of security monitoring and detection use cases.
- Ensure compliance with banking security policies, regulatory requirements, and industry standards.
- Prepare detailed incident reports, root cause analysis (RCA), and post-incident reviews.
- Assist in vulnerability management by validating and prioritizing security findings and remediation efforts.
- Stay updated on the latest cyber threats, attack techniques, and security trends.
- Proven experience in cybersecurity operations, SOC, or cyber defense roles (banking/financial services preferred).
- Strong knowledge of SIEM tools (e.g., Splunk, IBM QRadar, ArcSight).
- Hands-on experience with endpoint detection and response (EDR) and threat intelligence platforms.
- Understanding of network security, firewalls, IDS/IPS, and attack vectors.
- Familiarity with frameworks such as MITRE ATT&CK, NIST, ISO 27001.
- Experience in incident response and digital forensics fundamentals.
- Knowledge of Windows/Linux systems, logs, and security event analysis.
- Strong analytical, problem-solving, and decision-making skills under pressure.
- Relevant certifications such as CEH, CompTIA Security+, CISSP, or GIAC are an advantage.
Key Skills
Ranked by relevanceReady to apply?
Join TAT IT Technolgies and take your career to the next level!
Application takes less than 5 minutes

