Hi,
Greetings from V3 Staffing
We are having an immediate opening for SOC L3 Analyst position for Hyderabad location with US based Healthcare product development company.
Work Mode - 5 days work from office.
Shifts - Rotational shifts
Interview date - 24th October and 27th October(Face to Face)
Job description : Overview :
As a Sr. SOC Analyst at Zelis, you will play a critical role in maintaining the security of our clients' systems and data. You will be responsible for monitoring, analyzing, and responding to security alerts and incidents, ensuring that potential threats are identified and escalated for mitigation in a timely manner
Job Description :
Primary Responsibilities :
Undergraduate degree or equivalent experience
- Minimum 9 plus overall experience out of minimum 7 Yrs. of relevant experience in Information security domain.
- Proven expertise of Security Operations (L2 / L3) in Infrastructure Security Services domains.
- Ability to resolve issues pertaining to security solutions implemented at client locations.
- Working experience on incident response, threat protections, SecOps, identity & Access management & vulnerability management
Technical Skills
SIEM Skills
Create, modify, and tune the SIEM rules to adjust the specifications of alerts and incidents.Knowledge Integrating various log sources like Windows, Linux, Pala alto firewall , AWS, Etc.To provide continual correlation rule tuning, incident classification and prioritization recommendations.Report query adjustments, and various other SIEM configuration activities.Ability to fully optimize the SIEM system capabilities as well as the audit and logging features of the event log sources.Work closely with the other teams related to Network, Device, Policy, connectivity issues etc.Identify new opportunities / threats in the network to improve the security of the networkMonitor and administer enterprise log correlation (SIEM)Select, design, implement and manage security measures to reduce the risk of lossVM – SkillsCollecting, analyzing, interpreting, evaluating, and integrating vulnerability data from multiple sources to update existing product
Vulnerability / exploit research and creating signatures for the sameHandle Customer escalations, to identify False-Positive & False-NegativeActively investigate the latest in security vulnerabilities, advisories, incidents, and provide insights (sources like, Microsoft, Oracle, etc)Troubleshooting security vulnerability issues / gaps that ariseVulnerability data discovery and validation (Data efficacy & Accuracy)Develop, test and modify custom scripts for vulnerability contentManually / Automate analyzing new CVE information publishedXDR - Skills
Monitor and analyzing Threat hunting, Deep investing on Cortex XDR Alerts, Detection, Incidents.Troubleshoot and Configure Prevention Policies, Custom IOA Rule Groups, Detections Management, Exclusions, IOC Management, Firewall Policies, Firewall Rule Groups, USB Device Policies, Response Policies, Response Scripts & Files, Containment Policy, Sensor Update Policies.Should be able to check and utilize all Vulnerability feature in spotlight.PAM- Skills
Perform daily tasks that include reconciliation of servers, daily health check of the PAM servers, run daily compliance reports, etc.Manage Privileged Session Management and associated policies.Create and manage Platforms, Policies and Safes for Privileged ID's.Responsible for Privileged User account administration for various platforms including Windows, UNIX, LDAP, Databases.Manage Service Accounts, Non-Production Accounts, Test Accounts within the vaults.Develop and maintain documentation for security systems and procedures.Reporting and metricsManagement skills :
1. Analyze, investigate, lead and coordinate responses to complex, advanced security events and alerts, perform forensic analysis to understand extent of compromise by using respective tools.
2. Monitor, analyse security threats, vulnerabilities and trends by utilize threat intelligence to enhance detection and response capabilities.
3. Provide guidance, conduct trainings and support to level 1 and 2 SOC analysts
4. Collaborate, Assist with security engineers to deploy, develop, implement and manage security tools and architecture.
5. Work closely with IT and security teams to coordinate efforts
6. Identify opportunities for improving security processes and technology
7. Stay upto date on cybersecurity trends and threats.
8. documenting security incidents, responses and related information in accordance with procedures.
Regards,
Sabarish Kumar Gembali