Information Security Analyst

World Bank, India

Skill Required:, IT and ICT
Preferred Experience: 
5 years
Closing Date for Applications: 
17th December, 2019

Job Description

Established in 1944, the WBG is one of the world’s largest sources of funding and knowledge for development solutions. In fiscal year 2018, the WBG committed $67 billion in loans, grants, equity investments and guarantees to its members and private businesses, of which $24 billion was concessional finance to its poorest members. It is governed by 189-member countries and delivers services out of 120 offices with nearly 15,000 staff located globally.

The WBG consists of five specialized institutions: the International Bank for Reconstruction and Development (IBRD), the International Development Association (IDA), the International Finance Corporation (IFC), the Multilateral Investment Guarantee Agency (MIGA), and the International Centre for the Settlement of Investment Disputes (ICSID). The World Bank is organized into six client-facing Regional Vice-Presidencies, several corporate functions and thirteen Global Practices to bring best-in-class knowledge and solutions to regional and country clients.

Vice Presidency Context:

Information and Technology Solutions (ITS) enables the WBG to achieve its mission of ending extreme poverty by 2030 and boosting shared prosperity in a sustainable manner by delivering transformative information and technologies to its staff working in over 130 client countries.

ITS services range from: establishing the infrastructure to reach and connect staff and development stakeholders; providing the devices and agile technology and information applications to facilitate the science of delivery through decentralized services; creating and maintaining tools to integrate information across the World Bank Group, the clients we serve and the countries where we operate; and delivering the computing power staff need to analyze development challenges and identify solutions.

The ITS business model combines dedicated business solutions centers that provide services tailored to specific World Bank Group business needs and shared services that provide infrastructure, applications and platforms for the entire Group. ITS is one of three VPUs that have been brought together as the World Bank Group Integrated Services (WBGIS), to provide enhanced corporate core services and enable the institution to operate as one strategic and coordinated entity.

Unit Context

The ITS Information Security and Risk Management (ITSSR) unit, headed by the Chief Information Security Officer (CISO), is responsible for providing leadership in managing the functions and activities of information security and risk across the World Bank Group, enabling the achievement of WBG’s business objectives. ITSSR enables and facilitates a risk aware culture, ensures that WBG information assets are protected in an effective, efficient, and balanced manner; and IT security and risk management efforts throughout the World Bank Group are coordinated and aligned to the Bank's business and IT strategy. ITSSR establishes and maintains the World Bank Group's IT and InfoSec policies and standards; develops and engineers the WBG’s information security plans and solutions; responds to security incidents; and ensures that the information risks are identified, assessed, and managed in consistent with the overall risk management approach and with the established appetite and tolerance.

Duties and Accountabilities:

ITSIS is seeking to fill a vacant information security analyst position within the ISOC. The successful candidate will be responsible for incident response, research and report writing. The individual should be multi-disciplined and comfortable in operating and maintaining secured solutions for platforms running mission critical business applications in a homogeneous environment, at the enterprise level

Scope of Work

Security Incident Response

Provide Information Security Operations Center (ISOC) support on a 24x7x365 basis by shift work with rotation.Review information security alerts from various sources and based on the classification and its impact would prioritize the alerts and assign to the respective teams within Information Security Office.Conduct thorough investigative actions based on security events and remediate as dictated by standard operating procedures.Participate in all the phases of security incident response process, including detection, containment, eradication, and post-incident reporting.Record detailed Security Incident Response activities in the Case Management System.Use Security information and event management (SIEM) capabilities to develop alerts to detect anomalies.Assist in developing and setting up frameworks for developing Security incident response.Assist developing and maintaining ISMS procedures (related to ISOC) for complying with global ISMS policy defined by the organization.Maintain technical proficiency in information security concepts and related technologies through on the job training, performing individual research and attending training courses as necessary.Undertake knowledge sharing and training activities on various monitoring tools and remediation techniques on periodic basis.Develop periodic status reports and monthly metrics for reporting purposes.Support R&D lab using virtual machines and monitor open source security research news, contribute to control testing and strengthening.Experience in threat hunting in a diverse log and tool environment. The role requires the person to be able to manage threat hunting work program not limited to scoping, tooling and reporting metrics.Perform detailed analysis of attacks against web infrastructure. This includes identification of malicious code within URLs, collection of malicious plugins and/or exploits' payload. Able to identify exploit and exploit tools involved in attacks. Able to identify packing techniques used to obfuscate URLs. Able to look at return traffic from exploitation activity looking for successful exploitation.

Selection Criteria

  • Bachelor's degree in computer science, information technology, systems engineering, or a related field.Minimum 5 years of Information Security experience required with majority of time in a SOC.Understanding of how operating systems work and how malware exploits them.Understanding of network traffic and be able to analyze network traffic from an Incident Response perspective.Past exposure to handle malware and financial crime malware related incidents.Thorough understanding of Windows Internals and memory management.Knowledge of common hacking tools and techniquesExperience in understanding and analyzing various log formats from various sources.Experience in analyzing reports generated of SIM/SEM tools
  • Proficient experience with the following concepts and related toolsets:
  • Network sniffersProcess analysis toolsRegistry analysis tools

Preferred Skillsets / Requirements: GIAC Certified Intrusion Analyst (GCIA) or GIAC Certified Incident Handler (GCIH)


Recommend your friend

Copyrights 2017. All rights reserved | Technology Partner: Indev Consultancy Pvt. Ltd