← Back
Group Specialist - Threat Detection
Company: dpworld
Location: Bangalore, Karnataka, India
Source: oracle
Language: english
<figure class="table"><table style="border-collapse:collapse;border:none;margin-left:-7.35pt;" border="1" cellspacing="0" cellpadding="0" width="655"><tbody><tr><td style="background-color:#B3B3B3;border:solid windowtext 1.0pt;padding:0cm 5.4pt 0cm 5.4pt;width:491.4pt;" width="655" valign="top"><h3 style="margin:6.0pt 0cm;"><span style="color:black;font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB"><strong>KEY ACCOUNTABILITIES</strong></span></span></h3></td></tr><tr style="height:40.0pt;"><td style="border-top:none;border:solid windowtext 1.0pt;height:40.0pt;padding:0cm 5.4pt 0cm 5.4pt;width:491.4pt;" width="655" valign="top"><p style="margin:0cm 0cm 6.0pt 22.3pt;"> </p><ol style="padding-left:30.53px;"><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Develop and operationalize AI/ML-based threat detection models across endpoint, identity, network, and cloud environments.</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Operationalise threat intelligence feeds into AI-driven detection pipelines, ensuring alignment with MITRE ATT&CK TTPs.</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Design, develop, and deploy detection use cases across SIEM and XDR platforms.</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Build, maintain, and continuously tune detection rules, KQL queries, and analytics for improved detection fidelity.</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Design and enhance UEBA (User and Entity Behaviour Analytics) models to detect anomalies, insider threats, and advanced persistent threats (APTs).</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Collaborate with red team and adversary simulation functions to validate detection coverage against real-world attack scenarios.</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Drive proactive threat hunting by developing automated workflows leveraging AI-assisted query generation and anomaly detection.</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Continuously evaluate detection effectiveness, reduce false positives, and improve signal-to-noise ratio.</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Integrate multiple threat intelligence sources and contextual data to enrich detections and improve response outcomes.</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Contribute to the development of threat detection standards, frameworks, and best practices.</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Maintain up-to-date knowledge of evolving threats, adversary techniques, and detection technologies to continuously strengthen the organization’s cyber defense capabilities.</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Act as an ambassador for DP World at all times when working; promoting and demonstrating positive behaviours in harmony with DP World’s Principles, values and culture; ensuring the highest level of safety is applied in all activities; understanding and following DP World’s Code of Conduct and Ethics policies.</span></span></p></li><li><p style="margin-bottom:6.0pt;margin-right:0cm;margin-top:0cm;text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Perform other related duties as assigned.</span></span></p></li></ol></td></tr></tbody></table></figure><figure class="table"><table style="border-collapse:collapse;border:none;margin-left:-7.35pt;" border="1" cellspacing="0" cellpadding="0" width="655"><tbody><tr style="height:11.7pt;"><td style="background-color:#B3B3B3;border:solid windowtext 1.0pt;height:11.7pt;padding:0cm 5.4pt 0cm 5.4pt;width:491.4pt;" width="655" valign="top"><p class="Tablehead" style="margin:3.0pt 0cm;text-align:left;" align="left"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB"><strong>QUALIFICATIONS, EXPERIENCE AND SKILLS</strong></span></span></p></td></tr><tr style="height:15.75pt;"><td style="border-top:none;border:solid windowtext 1.0pt;height:15.75pt;padding:0cm 5.4pt 0cm 5.4pt;width:491.4pt;" width="655" valign="top"><p style="margin:6.0pt 0cm;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB"><strong>Knowledge and Experience</strong></span></span></p><ul style="list-style-type:disc;padding-left:24px;"><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Bachelor’s degree in computer science, Cyber Security, Information Systems, or related field.</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">8+ years of experience in cybersecurity, with a strong focus on threat detection, threat hunting, or detection engineering.</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Hands-on experience with SIEM/XDR platforms, preferably Microsoft Sentinel and Falcon /Cortex/Stellar Cyber/Defender XDR.</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Strong understanding of MITRE ATT&CK framework and adversary tactics, techniques, and procedures (TTPs).</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Experience in developing detection logic, analytics, and threat hunting queries (e.g., KQL).</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Experience in AI/ML applications for cybersecurity, including anomaly detection and behavioural analytics.</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Experience working with threat intelligence platforms and integrating intelligence into detection workflows.</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Familiarity with cloud security (Azure, AWS), endpoint security, and identity-based threat detection.</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Relevant certifications such as GCIA, GCIH, GCED, AZ-500, SC-200, or equivalent are preferred.</span></span></p></li><li><p style="text-align:justify;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Experience in multinational environments is an advantage.</span></span></p></li></ul><p style="margin-left:0cm;"> </p><p style="margin:6.0pt 0cm;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB"><strong>Soft Skills</strong></span></span></p><ul style="list-style-type:disc;padding-left:24px;"><li><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Strong analytical and problem-solving skills.</span></span></li><li><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Excellent verbal and written communication skills.</span></span></li><li><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Ability to work in cross-functional teams (SOC, Red Team, Engineering).</span></span></li><li><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Proactive mindset with strong attention to detail.</span></span></li><li><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Ability to manage multiple priorities in a fast-paced environment.</span></span></li><li><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Continuous learning attitude, especially in AI and emerging cyber threats.</span></span></li></ul><p style="margin-left:0cm;"> </p><p style="margin:6.0pt 0cm;"><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB"><strong>Technical Skills</strong></span></span></p><ul style="list-style-type:disc;padding-left:24px;"><li><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Proficiency in KQL (Kusto Query Language) and detection rule development.</span></span></li><li><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Strong understanding of SIEM, XDR, EDR technologies.</span></span></li><li><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Experience with UEBA and behavioural analytics platforms.</span></span></li><li><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Hands-on experience of AI/ML concepts applied to cybersecurity (anomaly detection, classification models).</span></span></li><li><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Understanding of log sources and telemetry across endpoint, network, identity, and cloud.</span></span></li><li><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Familiarity with scripting languages (Python, PowerShell) for automation and analysis.</span></span></li><li><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Experience with threat hunting frameworks and automation tools.</span></span></li><li><span style="font-family:"Tahoma",sans-serif;"><span style="font-size:10.0pt;" lang="EN-GB">Strong knowledge of cyber threats, attack techniques, and detection strategies.</span></span></li></ul></td></tr></tbody></table></figure><p> </p><p>#LI-AA6</p>
🔥 Apply Now