About Us
Join us at Orange Business!
We are a network and digital integrator that understands the entire value chain of the digital world, freeing our customers to focus on the strategic initiatives that shape their business.
Every day, you will collaborate with a team dedicated to providing consistent, sustainable global solutions, no matter where our customers operate. With over 30,000 employees across Asia, the Americas, Africa, and Europe, we offer a dynamic environment to develop and perfect your skills in a field filled with exciting challenges and opportunities.
About The Role
- Plan, implement, configure, and migrate market-leading cyber security solutions (Qradar, Sentinel, Defender etc.)
- Creation and implementation of new SIEM use cases (correlation rules), fine tuning, Defender policies etc.
- Configuration, onboarding, and parsing of new log sources in SIEM solution, working on malware analysis, mail analysis, Threat intelligence / hunting etc.
- Assessment of the effects of an attack, taking initial measures and making concrete recommendations for action, Improvement of response plans and incident playbooks.
- Classification and investigation of alarms from different threat detection platforms and provision of the processed results to our customers
- Anomaly and attack pattern detection at all stages of the cyber killchain
- Anomaly and attack pattern detection at all stages of the cyber killchain
- Tool-based and manual threat hunting to detect attacks after zero-day exploits or vulnerabilities with a potentially severe impact on customer environments become known
- Creation of security reports based on the security incidents within the reporting period
- Creation of reports and dashboards
- Ensure adherence to and implementation of best incident response procedures as well as internal and industry standards
- Participation in on-call duty to ensure incident response even outside of business hours
- 24
- 7 onsite cybersoc support to customer including weekends & public holidays
About You
Skill Set Required : Mandatory skill set
Good hands-on experience on SIEM tools like Qradar, MS Sentinel.Knowledge on Microsoft DefenderGood experience on Incident handling & responseCertification in IBM Qradar SOC Analyst / Administrator, SC-200Secondary skill set
Knowledge on Python, any scripting languageMalware investigation and reportingForensic investigation of SPAM / Phising email incidentsKnowledge on threat intelligence & threat huntingExperience
4+ years related work experience in customer facing organizations within cybersoc servicesDegree / Diploma Holders with Cybersecurity knowledge.Excellent verbal & written communication skills in English languageWhat We Offer
Global Opportunities : Work in multi-national teams with opportunity to collaborate with colleagues and customers from all over the world.Flexible Work Environment : Flexible working hours and possibility to combine work from office and home (hybrid ways of working).Professional Development : training programs and upskilling / re-skilling opportunities.Career Growth : Internal growth and mobility opportunities within Orange.Caring and Daring Culture : Health and well-being programs and benefits, diversity & inclusion initiatives, CSR and employee connect events.Reward Programs : Employee Referral Program, Change Maker Awards.Only Your Skills Matter
NA
Awards
Skills Required
Threat Intelligence, Python, Threat Hunting