Incident Response (India)

Remote
Full Time
Security
Mid Level
Incident Response 
Location: India

About Centric Software:
Centric Software is a leading provider of innovative Product Lifecycle Management (PLM) solutions designed for the retail, fashion, footwear, luxury, and consumer goods industries. Our software solutions help businesses manage, optimize, and execute their critical product development processes, ensuring they remain competitive in fast-moving markets. At Centric Software, we’re focused on driving success through innovation, efficiency, and cutting-edge technology.


Job Summary:
We are seeking a skilled and proactive Incident Response individual to join our security operations team. This role is designed for a dynamic individual who will assist in managing and mitigating security incidents across our global enterprise. The Incident Response person will work alongside the Incident Response Manager, providing crucial support in the identification, triage, and resolution of security threats. The ideal candidate will have a strong background in cybersecurity with an emphasis on incident response and will be able to work efficiently under pressure while ensuring clear communication with stakeholders.

Key Responsibilities:
  • in the identification and classification of security incidents, evaluating potential impact and severity to determine the appropriate response actions.
  • Support the Incident Response Manager in the containment, investigation, and resolution of security incidents. Work closely with cross-functional teams to manage security events throughout the lifecycle.
  • Collaborate in conducting post-incident analysis to determine the root cause of security breaches and assist in the implementation of measures to prevent future incidents.
  • Support forensic investigations by collecting and analyzing digital evidence, ensuring proper preservation, and contributing to incident reports.
  • Maintain accurate and detailed documentation of security incidents, including incident timelines, actions taken, and impact assessments.
  • Utilize security technologies and tools (e.g., SIEM, IDS/IPS, firewalls, endpoint protection) to detect and respond to incidents.
  • Communicate effectively with both technical and non-technical teams to provide updates and report on the status of security incidents.
  • Assist in conducting training sessions to raise awareness about security best practices and incident response procedures within the organization.
  • Support the management of third-party tools and vendors used in incident response efforts to ensure their effectiveness and proper integration.
  • Ensure that incident response efforts comply with relevant legal, regulatory, and contractual requirements.
Skills & Qualifications:
  • Minimum of 3-5 years of experience in cybersecurity, with a strong emphasis on incident response.
  • Familiarity with common security incident response methodologies and cyber-attack vectors (e.g., ransomware, phishing, malware, DDoS).
  • Experience working with security tools such as SIEM, IDS/IPS, firewalls, endpoint protection, and forensic analysis software.
  • Strong written and verbal communication skills, with the ability to convey technical issues clearly to non-technical stakeholders.
  • Ability to think critically and act swiftly in high-pressure situations to mitigate the impact of security incidents.
  • Industry certifications such as CISSP, CISM, GIAC (GCIH), or other relevant cybersecurity credentials are preferred.
  • Ability to engage with internal teams and external customers to provide updates and support during high-severity incidents.
Technical Skills
Forensics Expertise
  • Experience with forensic tools like EnCase, FTK, Autopsy, Magnet Axiom, or X-Ways.
  • Ability to analyze disk images, memory dumps, and logs to extract evidence.
  • Understanding of data recovery techniques and chain-of-custody procedures.
Incident Response Skills:
  • Proficiency in managing security incidents, including detection, containment, eradication, and recovery.
  • Familiarity with EDR/XDR tools like CrowdStrike, SentinelOne, or Carbon Black.
  • Experience with SIEM systems such as Exabeam, Splunk, ArcSight, or QRadar for log analysis and correlation.
Malware Analysis:
  • Knowledge of reverse engineering and analyzing malicious code.
  • Familiarity with tools like IDA Pro, Ghidra, or OllyDbg.
Networking & Systems:
  • Strong understanding of TCP/IP, DNS, and other networking protocols.
  • Experience with Windows, Linux, and macOS forensics.
  • Ability to perform packet analysis using tools like Wireshark.
Scripting & Automation:
  • Proficiency in Python, PowerShell, or Bash for automating forensic or incident response tasks.
Certifications

Forensics-Specific:
    • GIAC Certified Forensic Analyst (GCFA)
    • EnCase Certified Examiner (EnCE)
    • Magnet Certified Forensics Examiner (MCFE)
    • Certified Hacking Forensics Investigator (CHFI)
Incident Response and Cybersecurity:
    • GIAC Certified Incident Handler (GCIH)
    • CompTIA Cybersecurity Analyst (CySA+)
    • Certified Information Systems Security Professional (CISSP)
Additional Skills:
    • GIAC Reverse Engineering Malware (GREM) for malware analysis.
    • Offensive Security Certified Professional (OSCP) to understand adversarial tactics.


Centric Software provides equal employment opportunities to all qualified applicants without regard to race, sex, sexual orientation, gender identity, national origin, color, age, religion, protected veteran or disability status or genetic information.
 

Centric Software provides equal employment opportunities to all qualified applicants without regard to race, sex, sexual orientation, gender identity, national origin, color, age, religion, protected veteran or disability status or genetic information.

Share

Apply for this position

Required*
Apply with
We've received your resume. Click here to update it.
Attach resume as .pdf, .doc, .docx, .odt, .txt, or .rtf (limit 5MB) or Paste resume

Paste your resume here or Attach resume file

To comply with government Equal Employment Opportunity and/or Affirmative Action reporting regulations, we are requesting (but NOT requiring) that you enter this personal data. This information will not be used in connection with any employment decisions, and will be used solely as permitted by state and federal law. Your voluntary cooperation would be appreciated. Learn more.