Skip Navigation
search jobs

Sr Info Sec Analyst

Apply Now Job ID: R0000036837 Date posted: 08/07/2019 schedule: Full time Location: Target Corporation India Pvt. Ltd., Bangalore, Karnataka, India, 560045;

Sr Information Security Analyst, CSIRT, Cyber Security


The Incident Triage Analyst position is responsible for triaging cyber security events and incidents across the Target environment. The Incident Triage Analyst supports Target’s cyber security operations by monitoring alerts during heavy volume events within a 24/7 Cyber Fusion Center.  This position conducts more in-depth analyses of security incidents with specific ability to identify potential compromise, perform intrusion scope and root cause analyses and implement triaging protocols to mitigate potential impacts.


  • Incident Triage Analysts create filters, data monitors, dashboards, and reports within monitoring utilities.
  • Troubleshoot security monitoring devices to improve event correlation and performance. 
  • Develop and update procedures, and configure tools for Event Detection Analysts to use. 
  • Handle high and critical severity incidents as described in the operations playbook. 
  • Perform additional analysis of escalations from Event Detection analysts and reviews Level 1 tickets. 
  • Escalate high or critical severity level incidents to Incident Handlers.
  • Acts as a participant during Cyber Hunt activities at the direction of one or more Target Incident Handlers


  • 4+ years of information security experience
  • BE in Engineering, Computer Science, Information Security or any computer science graduate
  • Experience using event escalation and reporting procedures
  • Ability to learn and operate in a dynamic environment
  • Ability to demonstrate analytical expertise, close attention to detail, excellent critical thinking, logic, and solution orientation and to learn and adapt quickly
  • Knowledge of network monitoring, analysis, troubleshooting, and configuration control technologies
  • Knowledge of how common protocols and applications work at the network level, including DNS, HTTP, and SMB
  • Strong oral and written communication skills


  • Experience with ArcSight/Splunk/FireEye or other security products desired
  • Experience managing cases with enterprise SIEM systems
  • Knowledge of how the Windows file system and registry function and UNIX operating systems and command line tools
  • Experience conducting forensic media analysis and log file analysis
  • Experience in writing basic scripts in languages such as PowerShell or Python or Bash
  • Experience supporting network investigations.
  • One or more certifications including, CEH, CHFI, GCIA, GCIH, CISSP or similar

Apply Now

get email updates

Get the latest job openings right in your inbox. View privacy statement.

areas of interestSearch for a category and select one from the list of suggestions. Search for a location and select one from the list of suggestions. Finally, click “Add” to create your job alert.

  • Assets Protection and Corporate Security, Bengaluru, Karnataka, IndiaRemove


What’s it like to work here? We’re asked that a lot. Target respects and values the individuality of all team members and guests—and we have lots of fun in all that we do.

experience our culture