Job Title : SOC - Incident management Security Analyst
Experience : 3 - 5yrs
Locations : Mumbai / Pune / Bangalore / Hyderabad / Chennai / Delhi / Indore / Nagpur / Bhubaneshwar / Jaipur / Kolkata
Job Description :
- Security operations engineer SOC Incident management
- Experience in Security Operations Incident Response Resource should have experience in Splunk CrowdStrike
- Ensure compliance to SLA process adherence and process improvisation to achieve operational objectives
- Revise and develop processes to strengthen the current Security Operations Framework Review policies and highlight the challenges in managing SLAs aligning with customer
- Responsible for team vendor management overall use of resources and initiation of corrective action where required for Security Operations Center
- Perform threat management threat modeling identify threat vectors and review use cases for security monitoring
- Responsible for integration review of standard and nonstandard logs in SIEM
- Submission of reports dashboards metrics for SOC operations and presentation to Sr Mgmt
- Coordination with stakeholders build and maintain positive working relationships with them
- Provide support to the Security Operations Center SOC during incident response event monitoring and threat hunting activities Responsibilities include cyber threat analysis support research recommending appropriate remediation and mitigation
- Incident Problem Management Monitoring Validation Analysis Triage Escalation Response and Resolution
- SIEM Log source integration
- Use Case Fine tuning and New Use case creation
- Proficient in one more of the following computer languages PowerShell Bash Python or Visual Basic to support cyber threat detection or reporting Security API implementations can be considered as well
- Candidate must have a deep understanding of several of the following fields Email security including PDF and Document analysis digital media forensics monitoring and detection incident response vulnerability assessment penetration testing cyber
- intelligence analysis and network analysis
- Deep understanding of either the Lockheed Cyber Kill Chain or MITRE Attacks framework MITRE preferred 16 Cyber threat analysis support research and recommend appropriate remediation and mitigation
- Trending and correlation of monitored events to build new Indicators of Compromise IOC attack attribution and helping establish countermeasures increasing cyber resiliency
- Identification of advanced cyber threat activities Endpoint Detection Response intrusion detection incident response malware analysis and security content development eg signatures rules etc and cyber threat intelligence
Educational Requirement :
- Bachelors Degree in Computer Science or related field preferred and 7 years experience in an information technology field with a minimum of 3 years of experience as a Tier III senior cybersecurity analyst performing intelligence analysis collection management and technical analysis.