As a leading outsourcing partners, we are hiring a SOC Analyst (L2 Support) to work on a project for our client, which is a globally recognized consulting firm specializing in areas such as technology, risk, compliance, and internal audit. With a presence in over 25 countries and a track record of serving a significant portion of Fortune 100 and Fortune 500 companies, they are committed to delivering innovative solutions and fostering a collaborative work environment.
Job Details :
Experience required : 3-6 years of experience
Qualification : B.E. / B.Tech in Computer science or Information Technology
Location : Delhi, Bangalore and Lucknow
Notice Period : Immediate to 15 days (Candidates with Notice period of less than 30 days are :
- Advanced Security Monitoring and Analysis : Perform in-depth analysis of security events and alerts generated by various security tools (SIEM, IDS / IPS, EDR, Firewall logs, etc.) to identify genuine security incidents.
- Incident Triage and Prioritization : Evaluate security events based on severity, impact, and context to effectively triage and prioritize incidents for further investigation and response.
- Level 2 Incident Handling : Investigate and respond to security incidents beyond the capabilities of Level 1 analysts, performing detailed technical analysis to determine the scope, impact, and root cause of security breaches.
- Threat Analysis and Intelligence : Utilize threat intelligence sources and frameworks (e.g., MITRE ATT&CK) to understand attacker tactics, techniques, and procedures (TTPs) and apply this knowledge to incident analysis and response.
- Log Analysis and Correlation : Analyze and correlate security logs from diverse sources to identify suspicious patterns, anomalies, and potential security incidents.
- Vulnerability Assessment Support : Assist in the analysis of vulnerability scan results and contribute to the development of remediation strategies.
- Security Tool Management and Optimization : Assist in the maintenance, tuning, and optimization of security monitoring tools to improve detection capabilities and reduce false positives.
- Creation of Security Documentation : Develop and maintain clear and concise documentation, including incident reports, analysis findings, and standard operating procedures (SOPs).
- Collaboration and Communication : Effectively communicate incident details, analysis findings, and remediation steps to relevant stakeholders, including Level 1 analysts, other security teams, and management.
- Mentorship and Knowledge Sharing : Provide guidance and mentorship to Level 1 SOC analysts, sharing knowledge and best practices to enhance their skills and capabilities.
- Participation in Security Improvement Initiatives : Contribute to the development and improvement of security monitoring processes, incident response playbooks, and security tool configurations.
- Compliance Adherence : Ensure adherence to security policies, procedures, and compliance Skills :
- Security Information and Event Management (SIEM) : Proven experience (3-6 years) in working with and analyzing data from at least one major SIEM platform (e.g., Splunk, IBM QRadar, ArcSight, SentinelOne).
- Incident Response Fundamentals : Solid understanding of incident response methodologies, frameworks, and best practices.
- Log Analysis : Expertise in analyzing and correlating security logs from various sources, including operating systems, network devices, security appliances, and applications.
- Network Security Concepts : Strong understanding of network protocols (TCP / IP, HTTP, DNS, etc.), network devices (firewalls, routers, switches), and network security concepts (firewall rules, intrusion detection / prevention systems).
- Endpoint Security : Familiarity with Endpoint Detection and Response (EDR) solutions and their role in incident detection and response.
- Operating System Security : Good understanding of security principles and hardening techniques for both Windows and Linux operating systems.
- Threat Intelligence : Familiarity with threat intelligence sources, platforms, and their application in security monitoring and incident response.
- Scripting (Basic) : Basic scripting skills in at least one language (e.g., Python, Bash, PowerShell) for automation and analysis tasks.
- Excellent Analytical and Problem-Solving Skills : Demonstrated ability to analyze complex security events, identify root causes, and develop effective solutions.
- Strong Communication Skills : Excellent written and verbal communication skills for documenting findings and communicating with stakeholders.
Good to Have Skills :
Experience with cloud security monitoring and tools (AWS Security Hub, Azure Security Center, GCP Security Command Center).Knowledge of malware analysis techniques.Familiarity with vulnerability management processes and tools.Experience with security automation and orchestration (SOAR) platforms.Relevant security certifications (CompTIA Security+, CEH, GCIH).Experience working in a multi-client or managed security services provider (MSSP) environment.ref : hirist.tech)