Our Ability Jobs

Job Information

Trane Technologies Sr. Cyber Security Specialist in Bangalore, India

At Trane Technologies TM and through our businesses including Trane ® and Thermo King ® , we create innovative climate solutions for buildings, homes, and transportation that challenge what’s possible for a sustainable world. We're a team that dares to look at the world's challenges and see impactful possibilities. We believe in a better future when we uplift others and enable our people to thrive at work and at home. We boldly go.

We offer competitive compensation and comprehensive benefits and programs. We are an equal opportunity employer; all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, pregnancy, age, marital status, disability, status as a protected veteran, or any legally protected status.

Position Summary

The Senior Cyber Security Specialist is responsible for activities relating to monitoring and responding to security events. The Senior SOC analyst receives, researches, triages and documents all security events and alerts as they are received. This individual supports multiple security-related platforms and technologies, interfacing with others within the IT organization, as well as other internal business units and external customers/partners. Events will be generated from endpoints, networks, security information and event management (SIEM) systems, threat intelligence platforms, employees, third-parties and other sources.

The Senior Cyber Security Specialist is responsible for activities relating to monitoring and responding to security reports to the Manager Cybersecurity and is a thought leader of the SOC team. This role must display an in-depth understanding of new trends and technologies related to cybersecurity and contribute to the company cybersecurity strategy and roadmap.

Essential Job Duties

o As an active member of the team, monitor and process response for security events on a 24x7 basis.

o Plan and execute regular incident response and postmortem exercises, with a focus on creating measurable benchmarks to show progress (or deficiencies requiring additional attention).

o Stay current with and remain knowledgeable about new threats. Analyze attacker tactics, techniques, and procedures (TTPs) from security events across a large heterogeneous network of security devices and end-user systems.

o Participate in threat modeling collaboration with other members of the security team.

o Leverage automation and orchestration solutions to automate repetitive tasks.

o

o Assist with incident response as events are escalated, including triage, remediation, and documentation.

o Aid in threat and vulnerability research across event data collected by systems.

o Investigate and document events to aid incident responders, managers and other SOC team members on security issues and the emergence of new threats.

o Work alongside other security team members to hunt for and identify security issues generated from the network, including third-party relationships.

o Share information as directed with other team members and ISACs.

o Seek opportunities to drive efficiencies.

o Manage security event investigations, partnering with other departments (e.g., IT) as needed.

o Evaluate SOC policies and procedures and recommend updates to management as appropriate.

o Adhere to service level agreements (SLAs), metrics and business scorecard obligations for ticket handling of security incidents and events.

o Partner with the security engineering team to improve tool usage and workflow, as well as with the advanced threats and assessment team to mature monitoring and response capabilities.

o Leverage knowledge in multiple security disciplines, such as Windows, Unix, Linux, data loss prevention (DLP), endpoint controls, databases, wireless security, and data networking, to offer global solutions for a complex heterogeneous environment.

o Maintain working knowledge of advanced threat detection as the industry evolves.

o Perform other duties as assigned.

Skills and Experience

o 7+ years of information security with 4+ years of experience in SOC related activities.

o Experience working in a 24x7 operational environment, with geographic disparity preferred.

o Experience driving measurable improvement in monitoring and response capabilities at scale.

o Experience working with SIEM systems, threat intelligence platforms, security automation and orchestration solutions, intrusion detection and prevention systems (IDS/IPS), file integrity monitoring (FIM), DLP and other network and system monitoring tools.

o Knowledge of a variety of Internet protocols.

o Track record of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating effectively.

o Working knowledge/experience with network systems, security principles, applications and risk and compliance initiatives such as Gramm-Leach Bliley Act (GLBA), Payment Card Industry (PCI), Health Information Portability and Accountability Ace (HIPAA), Sarbanes-Oxley Act (SOX) and the General Data Protection Regulation (GDPR).

Additional Qualifications

o Demonstrates highly effective communications skills, with ability to influence business units.

o Has an analytical and problem-solving mindset.

o Is highly organized and efficient.

o Leverages strategic and tactical thinking.

o Works calmly under pressure and with tight deadlines.

o Demonstrates effective decision-making skills.

o Is highly trustworthy; leads by example.

Educational Requirements

o Bachelor’s degree in computer science/Engineering or related field.

Certification Requirements

o Required security certification such as SANS/ GIAC, or Certified Information Systems Security Professional (CISSP), or equivalent.

DirectEmployers