Job description
Job Summary
Synechron is seeking a skilled and dedicated Specialist - Cyber Defense Centre to strengthen our cybersecurity defenses. This pivotal role involves supporting advanced cyber defense operations through proactive threat hunting, incident response, and security analytics. The Specialist will collaborate closely with SOC analysts, cybersecurity teams, and IT operations teams to detect, investigate, contain, and remediate cyber threats. The overarching goal is to enhance the organization’s security posture, improve detection capabilities, and ensure rapid, effective responses to cyber incidents, thus safeguarding our digital assets and business continuity.
Software Requirements
Required Software Skills:
SIEM Platforms: Splunk, IBM QRadar, or Azure Sentinel (expertise in configuration and operational management)
Endpoint Detection and Response (EDR/NDR): Experience with platforms such as CrowdStrike, Microsoft Defender, or Palo Alto Cortex XDR
Security Orchestration, Automation, and Response (SOAR): Familiarity with Palo Alto Cortex XSOAR,Splunk SOAR, or similar tools
Threat Intelligence Platforms and feeds
Log analysis and network forensic tools
Preferred Software Skills:
Cloud Security Tools for AWS, Azure, GCP
Threat hunting frameworks and scripting (Python, PowerShell)
Digital investigation tools
Overall Responsibilities
Conduct proactive threat hunting activities to identify hidden or emerging cyber threats using advanced analytics and intelligence sources.
Support and lead incident response efforts by investigating security incidents, coordinating containment, eradication, and recovery actions.
Monitor, tune, and enhance security tools such as SIEM, EDR, NDR, and SOAR to increase detection efficacy.
Analyze security data to identify trends, generate detailed reports, and develop dashboards for leadership insights.
Collaborate with cross-functional teams to improve detection rules, develop incident response playbooks, and conduct cyber drills.
Validate security controls regularly to ensure readiness and effectiveness.
Maintain comprehensive documentation of investigations, findings, and lessons learned for continuous improvement.
Technical Skills (By Category)
Programming Languages:
Databases/Data Management:
Cloud Technologies:
Frameworks and Libraries:
Development Tools and Methodologies:
Security Protocols & Standards:
Knowledge of TCP/IP, SSL/TLS, VPNs, Firewalls, and encryption protocols
Experience Requirements
Minimum of 3-5 years of experience in cybersecurity roles, specifically in threat detection, incident response, or security operations.
Proven experience supporting or leading cyber defense operations in enterprise environments.
Familiarity with security frameworks, threat intelligence, and forensics.
Industry experience in financial services, technology, or related sectors preferred.
Candidates with relevant certifications or alternative security training programs are encouraged to apply.
Day-to-Day Activities
Performing continuous monitoring and analysis of security alerts and logs.
Conducting threat hunting exercises and updating detection content.
Leading or supporting incident investigations, coordinating with stakeholders.
Tuning security tools and developing automated detection workflows.
Participating in team meetings, tabletop exercises, and security drills.
Producing reports, dashboards, and incident summaries for stakeholders.
Engaging in knowledge sharing and continuous learning initiatives.
Qualifications
Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or an equivalent qualification.
Certifications such as CISSP, GSEC, GIAC, CEH, or relevant vendor-specific accreditations are highly preferred.
Ongoing professional development in cybersecurity tools, threat intelligence, and incident response.
Professional Competencies
Strong analytical and investigative skills to analyze complex security threats.
Excellent communication skills for technical reporting and stakeholder engagement.
Proven ability to work collaboratively in a team environment and across departments.
High attention to detail and a methodical approach to investigations.
Adaptability to evolving threats and technology landscapes.
Critical thinking and problem-solving capabilities to develop effective mitigation strategies.
Ethical judgment in handling sensitive information with integrity.
SYNECHRON’S DIVERSITY & INCLUSION STATEMENT
Diversity & Inclusion are fundamental to our culture, and Synechron is proud to be an equal opportunity workplace and is an affirmative action employer. Our Diversity, Equity, and Inclusion (DEI) initiative ‘Same Difference’ is committed to fostering an inclusive culture – promoting equality, diversity and an environment that is respectful to all. We strongly believe that a diverse workforce helps build stronger, successful businesses as a global company. We encourage applicants from across diverse backgrounds, race, ethnicities, religion, age, marital status, gender, sexual orientations, or disabilities to apply. We empower our global workforce by offering flexible workplace arrangements, mentoring, internal mobility, learning and development programs, and more.
All employment decisions at Synechron are based on business needs, job requirements and individual qualifications, without regard to the applicant’s gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law.
Candidate Application Notice