Talent.com
This job offer is not available in your country.
Security Operations Center Analyst

Security Operations Center Analyst

Intellismith pvt LtdBangalore
30+ days ago
Job description

As a leading outsourcing partners, we are hiring a SOC Analyst (L2 Support) to work on a project for our client, which is a globally recognized consulting firm specializing in areas such as technology, risk, compliance, and internal audit. With a presence in over 25 countries and a track record of serving a significant portion of Fortune 100 and Fortune 500 companies, they are committed to delivering innovative solutions and fostering a collaborative work environment.

Job Details :

Experience required : 3-6 years of experience

Qualification : B.E. / B.Tech in Computer science or Information Technology

Location : Delhi, Bangalore and Lucknow

Notice Period : Immediate to 15 days (Candidates with Notice period of less than 30 days are :

  • Advanced Security Monitoring and Analysis : Perform in-depth analysis of security events and alerts generated by various security tools (SIEM, IDS / IPS, EDR, Firewall logs, etc.) to identify genuine security incidents.
  • Incident Triage and Prioritization : Evaluate security events based on severity, impact, and context to effectively triage and prioritize incidents for further investigation and response.
  • Level 2 Incident Handling : Investigate and respond to security incidents beyond the capabilities of Level 1 analysts, performing detailed technical analysis to determine the scope, impact, and root cause of security breaches.
  • Threat Analysis and Intelligence : Utilize threat intelligence sources and frameworks (e.g., MITRE ATT&CK) to understand attacker tactics, techniques, and procedures (TTPs) and apply this knowledge to incident analysis and response.
  • Log Analysis and Correlation : Analyze and correlate security logs from diverse sources to identify suspicious patterns, anomalies, and potential security incidents.
  • Vulnerability Assessment Support : Assist in the analysis of vulnerability scan results and contribute to the development of remediation strategies.
  • Security Tool Management and Optimization : Assist in the maintenance, tuning, and optimization of security monitoring tools to improve detection capabilities and reduce false positives.
  • Creation of Security Documentation : Develop and maintain clear and concise documentation, including incident reports, analysis findings, and standard operating procedures (SOPs).
  • Collaboration and Communication : Effectively communicate incident details, analysis findings, and remediation steps to relevant stakeholders, including Level 1 analysts, other security teams, and management.
  • Mentorship and Knowledge Sharing : Provide guidance and mentorship to Level 1 SOC analysts, sharing knowledge and best practices to enhance their skills and capabilities.
  • Participation in Security Improvement Initiatives : Contribute to the development and improvement of security monitoring processes, incident response playbooks, and security tool configurations.
  • Compliance Adherence : Ensure adherence to security policies, procedures, and compliance Skills :
  • Security Information and Event Management (SIEM) : Proven experience (3-6 years) in working with and analyzing data from at least one major SIEM platform (e.g., Splunk, IBM QRadar, ArcSight, SentinelOne).
  • Incident Response Fundamentals : Solid understanding of incident response methodologies, frameworks, and best practices.
  • Log Analysis : Expertise in analyzing and correlating security logs from various sources, including operating systems, network devices, security appliances, and applications.
  • Network Security Concepts : Strong understanding of network protocols (TCP / IP, HTTP, DNS, etc.), network devices (firewalls, routers, switches), and network security concepts (firewall rules, intrusion detection / prevention systems).
  • Endpoint Security : Familiarity with Endpoint Detection and Response (EDR) solutions and their role in incident detection and response.
  • Operating System Security : Good understanding of security principles and hardening techniques for both Windows and Linux operating systems.
  • Threat Intelligence : Familiarity with threat intelligence sources, platforms, and their application in security monitoring and incident response.
  • Scripting (Basic) : Basic scripting skills in at least one language (e.g., Python, Bash, PowerShell) for automation and analysis tasks.
  • Excellent Analytical and Problem-Solving Skills : Demonstrated ability to analyze complex security events, identify root causes, and develop effective solutions.
  • Strong Communication Skills : Excellent written and verbal communication skills for documenting findings and communicating with stakeholders.

Good to Have Skills :

  • Experience with cloud security monitoring and tools (AWS Security Hub, Azure Security Center, GCP Security Command Center).
  • Knowledge of malware analysis techniques.
  • Familiarity with vulnerability management processes and tools.
  • Experience with security automation and orchestration (SOAR) platforms.
  • Relevant security certifications (CompTIA Security+, CEH, GCIH).
  • Experience working in a multi-client or managed security services provider (MSSP) environment.
  • ref : hirist.tech)

    Create a job alert for this search

    Security Analyst • Bangalore