Key Deliverables :
- Lead security investigations triggered by alerts from SIEM tools, tickets, and other incident sources.
- Develop, fine-tune, and maintain correlation rules, parsers, and log source integrations in tools like QRadar.
- Act as escalation point for L1 analysts, guiding resolution of incidents and containment strategies.
- Prepare executive summary reports, weekly activity logs, and maintain SOC procedure documentation.
- Mentor SOC team members on security controls, incident response, and vulnerability management best practices.
Role Responsibilities :
Monitor and analyze security events using SIEM tools (QRadar, Arcsight, Splunk).Coordinate with internal IT teams to address escalations, track performance, and manage incidents effectively.Ensure procedural adherence to ITIL standards across incident, problem, and change management.Regularly review and enhance SOC processes and security playbooks to stay ahead of emerging threats.Maintain up-to-date expertise on TCP / IP networking, firewalls, host-based security, and operating system logs.Skills Required
Siem, Tcp / ip, Security Monitoring, Qradar, Incident Response