Securities Roles and Responsibilities
Job Description
Internal
Confidential and Proprietary Information of CredAvenue Private Limited (‘Yubi’). Only expressly authorized for individuals under obligations of confidentiality with Yubi are permitted to review materials in this document. By reviewing these materials, you agree to not disclose these materials to any third party unless expressly authorized by CredAvenue Private Limited and to protect the materials as confidential and trade secret information. Any unauthorized review, retransmission, dissemination, or other use of these materials is strictly prohibited. If you are not authorized to review these materials, please return these materials (and any copies) from where they were obtained. All materials found herein are provided “AS IS” and without warranty of any kind.
Role : SOC Analyst
In this role, you are expected to manage Cyber Defence Centre (SOC), which is a 24 / 7 environment. Handle security incidents and able to provide rapid response with the deep understanding of IT & Network Infrastructure tools and Technologies.
Primary Responsibilities :
- Member of a critical role in our cyber security function to ensure enterprise and client data is secure and private.
- You will help provide 24x7 monitoring for the organization by acting as the first line of defence against potentially malicious events.
- Escalate confirmed incidents to SOC leads and reach out to respective teams to get the security issue fixed as soon as possible.
- Monitor and remediate the cloud alerts like AWS, GCP and Azure.
- Derive steps for identifying various suspicious and anomalous activities.
- Develop response playbooks for various scenarios.
- Perform manual analysis of log files to identify attack patterns.
- Technical expertise to assist with creating new methods for detection and triage would be an added advantage.
- Threat Hunting - Analyses security system logs, security tools, and available data sources on a day to day basis to identify attacks against the enterprise and report on any irregularities, issues related to improper access patterns, trending, and event correlations and make suggestions for detection rules and system tuning.
Desired Skills :
Bachelor’s Degree in computer science with minimum of 1-7 years of experience in the SOC team.Should be proficient in AWS and / or Azure resource alerts handling.Critical incident analysis and response experience.Must have excellent written and verbal skills. Requires the ability to recognize ways toimprove IT security.Knowledge of windows server-based systems including DNS, DHCP, IIS, NPS, RDS, DFS, Hyper-V etcExperience with suspicious URL blocking, sandboxing and malware analysis.Has a sound understanding of SIEM, PAM, CASB, EDR, other threat detection platforms and Incident Response tools.Knowledge of authentication standards like SAML, OAuth etc.Knowledge to perform Forensic Analysis of laptops, Mobile devices, Servers etc.Experience with advanced SIEM is good to have.Working knowledge of compliance standards such as ISO27001, PCI-DSS & Cyber Essentials Plus.Preferred Qualification :
Bachelor’s Degree in computer science with minimum of 2 years related experience.Experience of working in or with a Security Operations Centre and managing security issues and incidents. Security Certifications PreferredMust have excellent written and verbal skills. Requires the ability to recognize ways to improve IT security.