Description
POSITION SUMMARY : SOC Analyst ( L1 / L2 – 2 to 6 years)
The SOC Analyst is responsible for a broad range of responsibilities with a primary emphasis on 24 / 7, Log analysis, threat and event monitoring and data loss prevention to contribute to effective remediation of security incidents.
ESSENTIAL DUTIES AND RESPONSIBILITIES
- Experience in one or more SIEM tools like MacAfee / Logrhythm.
Strong analytical and problem solving skill. Strong communication skills both written and verbally
Understanding of log formats for syslog, DB logs and how to gather forensics for traceability back to a security eventKnowledgeable in reverse-engineering / analysis tools such as WiresharkKnowledge of security devices such as IDS / IPS, HIDS / HIPS, anomaly detection, Firewall and Antivirus systems and their log outputCreating content in LogRhythm like dashboards, reports as per customer requirement.Perform in-depth data analysis on various data and media types through the application of advanced methods, tools, and research techniques.Respond to, report on, and track security events reported to the SIEM, system and event logs, and other sources which require further analysis.Monitor internal and external threats; examine logs, events, and alerts generated by multiple platforms for anomalous activity, evidence of security incidents, and other error conditions that may constitute a breach in security or a degradation of integrity or confidentiality of our systems and data.Provide input, trends or analytical support to discover anomalous traffic, behaviors or patterns related to new threat activity, policy violations, etc.Participate in internal projects and initiatives, researching and recommending appropriate security solutions.