Incident Response Analyst

  • Gurugram
  • Valvoline Global Operations
About the job Why Valvoline Global Operations (VGO)? Valvoline Global is a worldwide leader in automotive and industrial solutions, creating future-ready products and best-in-class services for partners around the globe. Established in 1866, we introduced the world’s first branded motor oil, claiming our position as The Original Motor Oil. As an affiliate of Aramco, one of the world's largest integrated energy and chemicals companies, we continue to invest strategically and expand globally, driving unparalleled product innovation and sustainable business solutions. Our corporate values of care, integrity, passion, and excellence shape everything we do. Living out our values is what makes our company, our employees, our partners, our customers, and the communities we serve great. Careers for the Driven We whole-heartedly adopt a ‘never idle' mindset. We also know that outstanding service begins and ends with our employees. So, we’re looking for good people to join our team. You bring your skills, talent, and drive. We will give you a great place to work, a competitive salary and benefits, and the resources and support to develop and advance within our global company. How You’ll Make an Impact Monitor the inbound alert queue, perform initial triage on security events, and resolve or escalate to successive levels appropriately. Record and capture alert timelines for accurate reporting. Parse event logs generated by endpoint detection and response tools and technologies (anti-virus, data loss prevention, client-based web proxy) to detect anomalies and/or abnormalities. Maintain familiarity with all Valvoline security policies, procedures, and standards. Investigate and resolve security violations by providing postmortem analysis to illuminate the issues and possible solutions. Assist team members with the development and implementation of security protocols, including incident detection and prevention measures. Implement or coordinate remediation required by audits and reviews, and document exceptions as necessary. Participates in security investigations and compliance reviews, as requested by internal or external auditors. Generate reports to monitor the status of all information security tools to ensure continued functionality and configuration integrity. What You’ll Need Bachelor's degree in IT, engineering, business, management or a related field, or equivalent work experience Minimum one year of technology experience, including troubleshooting and performing root cause analysis of complex IT solutions, required Minimum of one year of experience in security incident management processes and tools, preferred Licenses and Certifications CISSP, CISM, CEH, Security+, Network+, CCNA, CCNP, CCNE, SANS preferred Knowledge, Skills, and Competencies Basic experience with SOAR Basic experience with SEIM (Splunk, Elastic Stack) Basic experience with Endpoint Detection and Response (Forensics, Tools and Technologies, etc.), Intrusion Detection and Prevention, and Packet Capture and Analysis Basic experience with Email Technologies (Spam Filters, Headers, Phishing, etc.) and Network Technologies (TCIP/IP, Basic Routing, DNS, etc.)