C3iHub
Cybersecurity and Cybersecurity of Cyber-physical Systems: A Cybersecurity Technology Innovation Hub at IIT Kanpur
About the Role
Position: Log Analyst (Security Operations)
Nature of Role: Rotating shifts (24x7 SOC operation)
This role involves reviewing logs, conducting forensic analyses, and safeguarding data and systems from unauthorized access. The role requires hands-on security monitoring, threat analysis, and collaboration with cybersecurity teams to mitigate risks.
Responsibilities
- Monitor and secure log sources and access points.
- Conduct forensic analysis to detect unauthorized activities.
- Write scripts to automate routine tasks.
- Perform security assessments and root cause analyses of incidents.
- Utilize advanced analytics to detect threat patterns and vulnerabilities.
- Assess the credibility and impact of identified threats.
- Maintain lists of Indicators of Compromise (IOCs) like IPs, domain names, and file hashes.
- Report log analysis findings to management.
- Analyze attacks and recommend remedial actions.
- Conduct detailed incident analyses and forward reports.
- Identify and address security gaps.
- Explore new security technologies.
- Install, build, test, and configure scripts and analysis software.
- Train other analysts.
- Collaborate with cybersecurity teams for threat intelligence sharing.
Eligibility Criteria
1. For Bachelor’s Degree Holders:
A 4-year Bachelor’s degree in engineering AND:
- At least 2 years of industrial experience in log analysis and threat intelligence, OR
- At least 3 years of academic/research experience in log analysis and threat intelligence.
- For Master’s Degree Holders:
A 2-year Master’s degree in engineering AND:
- At least 1 year of industrial experience in log analysis and threat intelligence, OR
- At least 2 years of academic/research experience in log analysis and threat intelligence.
Skills:
- Deep understanding of cyber threats, attack methodologies, and the cybercriminal ecosystem.
- Proficiency in threat intelligence platforms, security tools, and data analysis techniques.
- Expertise in analyzing technical data (network traffic logs, malware reports, system logs).
- Strong analytical and problem-solving skills.
- Effective communication (written and verbal) for technical and non-technical audiences.
Desired Eligibility
- Participation in industry forums, threat-sharing groups, or cybersecurity conferences.
- Experience in scripting/programming (Python, PowerShell, etc.) for automation.
- Relevant certifications (e.g., CISSP, CEH, GIAC).
- Knowledge of enterprise endpoint security tools (EDR, XDR, MDR, SIEM, etc.).
Travel Requirements
Travel across the country may be required for project execution, monitoring, and team coordination.
Application Process
Required Documents:
- Cover letter summarising relevant experience and expertise.
- Updated resume.
- Latest passport-size photograph.
Apply for a Free Career Guidance Session
One-hour interactive discussions providing insights, mentorship, and resources to support meaningful career transitions.
