
Threat Detection and Response Analyst II (Hybrid)
Kaplan · Bengaluru, Karnataka, India
- On site
- Full-time
- ₹800,000 / year
- Bengaluru, Karnataka, India
Job highlights
- Monitor security alerts and triage potential threats.
- Investigate security events and analyze IOCs.
- Escalate incidents to senior analysts.
- Support detection engineering and threat hunting.
- Document alerts, incidents, and findings.
About the role
Threat Detection and Response Analyst II (Hybrid)
For more than 80 years, Kaplan has been a trailblazer in education and professional advancement. We are a global company at the intersection of education and technology, focused on collaboration, innovation, and creativity to deliver a best in class educational experience and make Kaplan a great place to work.
Our offices in India opened in Bengaluru in 2018. Since then, our team has fueled growth and innovation across the organization, impacting students worldwide. We are eager to grow and expand with skilled professionals like you who use their talent to build solutions, enable effective learning, and improve students’ lives.
The future of education is here and we are eager to work alongside those who want to make a positive impact and inspire change in the world around them.
About the Role
The Threat Detection and Response Analyst II is a foundational member of the security team, serving as the first line of defense against cyber threats. This role is responsible for monitoring security alerts, performing initial analysis, and escalating potential incidents. Additionally, this role will assist in refining security detections and participate in guided threat hunting activities to proactively identify threats and protect organizational assets.
Primary/Key Responsibilities
- Alert Monitoring & Triage: Perform real-time monitoring of security alerts from tools like SIEM and EDR. Conduct initial triage of alerts using established procedures and playbooks to determine if they are true or false positives.
- Initial Investigation: Analyze security events to gather essential information and context. Use security tools to investigate indicators of compromise (IOCs) and anomalous activity.
- Incident Escalation: Escalate validated security incidents to Senior Level or higher analysts for in-depth investigation and response. Provide clear and concise information to support the incident response process.
- Detection Engineering Support: Assist senior analysts in tuning and optimizing existing security alerts. Provide feedback on alert fidelity from a front-line perspective to help reduce false positives and improve the accuracy of detection rules.
- Guided Threat Hunting: Participate in structured threat hunting missions based on hypotheses and threat intelligence provided by senior team members. Use security tools to search for evidence of specific tactics, techniques, and procedures (TTPs) within the environment.
- Documentation: Create and maintain detailed tickets for all monitored alerts and escalated incidents. Document findings from threat hunting activities for further analysis.
Hybrid Schedule
3 days remote / 2 days in office. 30-day notification period preferred.
Minimum Qualifications
- Bachelor's Degree in Information Systems, Engineering, IT, Computer Science, Cybersecurity, or a related field. Equivalent alternative education, skills, and/or practical experience is also acceptable.
- 4+ years of experience in an IT, help desk, or cybersecurity role. Experience gained through internships or relevant coursework is also considered.
- Basic understanding of common attack techniques and the MITRE ATT&CK framework.
- Familiarity with navigating security dashboards (e.g., SIEM, EDR) to review alerts, log analysis, rule creation, and dashboarding.
- Foundational knowledge of network protocols, operating systems (Windows, Linux), and cloud environments (AWS, Azure, GCP).
- Familiarity with ability to perform root cause identification and remediation planning/tracking.
- Basics of SIEM query languages (e.g., SPL, KQL) to search logs.
- Strong attention to detail with an inquisitive and analytical mindset.
- Excellent written and verbal communication skills for documenting and escalating issues.
Preferred Qualifications
- Relevant entry-level security certifications (e.g., CompTIA Security+, CySA+).
- Familiarity with scripting languages (e.g., Python, PowerShell) for automation and analysis.
- Familiarity with SOAR platforms and developing automation playbooks.
- Exposure to cloud security monitoring and incident response in cloud environments.
- Exposure to regulatory compliance requirements (e.g., SOX, PCI DSS) as they relate to vulnerability management.
- Exposure to security frameworks and standards (e.g., NIST, ISO 27001, CIS Benchmarks).
Total Rewards Package Includes
- Hybrid work model provides a flexible work/life balance.
- Voluntary Provident Fund.
- Gift of Knowledge Program for tuition assistance and discounts.
- Comprehensive health benefits (eligibility starts day 1).
- Generous Paid Time Off (National holidays, Earned leaves, sick leave, volunteer day).
- Gratuity applicable after 5 years.
At Kaplan, we believe in attracting, rewarding, and retaining exceptional talent. Our compensation philosophy is designed to be competitive within the market, reflecting the value we place on the skills, experience, and contributions of our employees, while taking into account labor market trends and total rewards. The specific compensation offered will be determined by a variety of factors, including but not limited to the candidate's qualifications, relevant experience, education, skills, and market data.
Key skills/competency
- Threat Detection
- Incident Response
- SIEM
- EDR
- MITRE ATT&CK
- Log Analysis
- Network Protocols
- Cybersecurity
- Cloud Security
- Communication Skills
Skills & topics
- Threat Detection
- Incident Response
- Cybersecurity Analyst
- SIEM
- EDR
- Log Analysis
- MITRE ATT&CK
- Information Security
- IT
- Computer Science
How to get hired
- Tailor your resume: Highlight IT, cybersecurity, SIEM, EDR, and incident response experience relevant to Kaplan's needs.
- Showcase your skills: Emphasize your understanding of attack techniques, MITRE ATT&CK, and log analysis.
- Prepare for technical questions: Brush up on network protocols, operating systems, and cloud environments.
- Understand Kaplan's mission: Research their commitment to education, innovation, and student success to align your answers.
- Ask insightful questions: Inquire about team collaboration, threat hunting methodologies, and professional development opportunities.
Technical preparation
Behavioral questions
Frequently asked questions
- What is the work arrangement for the Threat Detection and Response Analyst II role at Kaplan?
- The Threat Detection and Response Analyst II position at Kaplan offers a hybrid work model, requiring 3 days remote and 2 days in the office.
- What are the minimum educational requirements for the Threat Detection and Response Analyst II job at Kaplan?
- A Bachelor's Degree in Information Systems, Engineering, IT, Computer Science, Cybersecurity, or a related field is the minimum educational requirement. However, equivalent alternative education, skills, and/or practical experience are also accepted.
- How much experience is needed for the Threat Detection and Response Analyst II position at Kaplan?
- Kaplan requires at least 4 years of experience in an IT, help desk, or cybersecurity role for the Threat Detection and Response Analyst II position. Internships and relevant coursework can also count towards this experience.
- What security frameworks and tools are important for the Threat Detection and Response Analyst II role?
- Familiarity with common attack techniques, the MITRE ATT&CK framework, SIEM, EDR dashboards, and SIEM query languages like SPL or KQL are important for this role.
- What are some preferred qualifications for the Threat Detection and Response Analyst II at Kaplan?
- Preferred qualifications include entry-level security certifications (CompTIA Security+, CySA+), scripting languages (Python, PowerShell), SOAR platforms, cloud security monitoring, and knowledge of regulatory compliance and security frameworks.
- What kind of benefits does Kaplan offer for this role?
- Kaplan offers a comprehensive total rewards package including a hybrid work model, health benefits, generous paid time off, a Gift of Knowledge program, and more.
- How does Kaplan approach compensation for the Threat Detection and Response Analyst II position?
- Kaplan's compensation is market-competitive and considers factors such as qualifications, experience, education, skills, and market data. Specific salary details are determined on a case-by-case basis.
- What is the main focus of the Threat Detection and Response Analyst II role at Kaplan?
- The main focus is to act as the first line of defense against cyber threats by monitoring security alerts, performing initial analysis, escalating incidents, and assisting with detection tuning and threat hunting.