Soc Analyst I

Year    Kochi, Kerala, India

Job Description


JOB DESCRIPTION Role Proficiency: Monitor cyber security alerts for our global customers in a 24x7x365 operations team under the close supervision of Team Lead / senior members of the team. Outcomes: Under the close supervision of senior team members ensure that cyber security alerts from the SIEM and multiple sources are dealt with as per SLA. Closely follow the documented playbook to ensure consistent and repeatable response to alerts. Ensure Documentation included in CDC / SIEM work log as predefined / agreed standards. Learn from review process for continuous improvement Communicate and escalate appropriately as per defined process. Seek advice from senior members of the team when in doubt. Adhere to defined SOC processes including housekeeping tasks. Adhere to the Information Security policies as defined by the company and customer. Measures of Outcomes: Adherence to SLA as agreed with the customer. Productivity (Number of alerts addressed) Quality - Percent of tickets that met quality norms Adherence to process - Nil NC during audits Evidence of skill development including training certification etc. Outputs Expected: Cyber Security Monitoring : Work in accordance with the Playbook / under close supervision of the senior members of the team. monitoring alerts in the CDC Platform / SIEM Tool etc. Ensure appropriate response in line with the SLA. Cyber Security Incident Management: In accordance with the Playbook and under close supervision of the senior members of the team process alerts through analysis triage and resolution. Communication and escalation as per defined process. In accordance with the Playbook and under close supervision of the senior members of the team. complete documentation including annotation in CDC / SIEM work log to ensure audit trail as per defined standards and quality requirements. In accordance with the defined process while under close supervision of the senior members of the team ensure that the defined reports are created and published to stakeholders Continuous Learning innovation and optimization : Ensure completion of learning program suggested by Managers Suggest ideas that will help innovation and optimization of processes Skill Examples: User level skills in use of CDC SIEM and other relevant tools Excellent logical problem-solving ability and analytical skills for incident triage and analysis Good oral and written communication skills. Continually learn new technology and stay updated on cyber threats. Ability to work in rotating shifts and also be on-call outside of shift hours on a regular and recurring basis. Possess unimpeachable personal and professional integrity. Individuals will be required to submit to a background check. Knowledge Examples: Lateral hire with 6 months to 1 year SOC Experience or Fresher / Jr. with Cyberproof Foundations Training interns cleared by Manager for next role University Degree in Cyber Security (no back papers) / Bachelor\'s in Science or Engineering with training and demonstrable knowledge in the basics of Cyber Security Understanding of cybersecurity Incident Management process Understanding of enterprise IT Infrastructure including Networks OS Databases Web Applications etc. Awareness of ISMS principles and guidelines relevant frameworks (e.g. ISO27001) Desirable - Training / Certification in Ethical Hacking etc. Additional Comments: Advanced monitoring of system logs, SIEM tools and network traffic for unusual or suspicious activity. SIEM (Security Information and Event Management): Setting up various SIEM solutions and troubleshooting connectivity issues. Investigate and resolve security violations by providing postmortem analysis to illuminate the issues and possible solutions. Collate security incident and event data to produce monthly exception and management reports. Report unresolved network security exposures, misuse of resources or noncompliance situations using defined escalation processes. Develop and maintain documentation for security systems and procedures. Recommend, schedule and/or apply fixes, security patches and any other measures required in the event of a security breach. Analysis and review of logs and cyber event alerts Investigate suspicious security event activity, security breaches and other cyber security incidents Assess damage, document findings and recommendations Work with security team to perform tests and uncover network vulnerabilities Maintain and enforce adherence to corporate procedures, standards and policies Maintain and update functionality and procedures of the documentation Keep up to date with latest security information and threat intelligence Research the latest information technology (IT) security trends Validate security analysis and identify latest capabilities of the monitoring technologies Research and understand the currently published vulnerabilities of enterprise hardware, software, operating systems, appliance, and applications etc Gather and distribute technical information pertaining to new security threats and vulnerability trends Produce reporting and documentation to customers, internal team and management Experience & Qualifications Required Experience working with different Siem vendors like Qradar, Archsight, RSA, Logrythem Experience in incident response, writing procedures runbooks and playbooks Ability to work with customer\'s IT and security teams as well as directors\' level.

foundit

Beware of fraud agents! do not pay money to get a job

MNCJobsIndia.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.


Related Jobs

Job Detail

  • Job Id
    JD3161850
  • Industry
    Not mentioned
  • Total Positions
    1
  • Job Type:
    Full Time
  • Salary:
    Not mentioned
  • Employment Status
    Permanent
  • Job Location
    Kochi, Kerala, India
  • Education
    Not mentioned
  • Experience
    Year