Your browser does not support javascript! Please enable it, otherwise web will not work for you.

L1/L2 SOC Monitoring Analyst @ [24]7.ai India

Home > Network / System Administration

 L1/L2 SOC Monitoring Analyst

Job Description

Position: L1/L2 SOC Monitoring Analyst

Reports to: SOC Lead

Department: Information Security

Location: Bangalore

POSITION SUMMARY:

The Level Two SOC Monitoring analyst will fit into a global team providing 24/7 monitoring and first line of response for incidents, as L2 Engineer you are expected to conduct investigations, monitor for alerts, triage, and mitigation of detected threats/issues, also to start and track security investigations for resolution.

POSITION RESPONSIBILITIES:

  • Investigation, triage, and mitigation of detected security events
  • Start and track security investigations for resolution
  • Provide threat and vulnerability analysis as well as security advisories
  • Demonstrate in-depth technical knowledge of the infrastructure leading to security incidents through hands-on experience to investigate, mitigate/remediate security incidents.
  • Serve as a Threat/Security Incident Specialist to identify emerging threats through Insider Threat and Infrastructure migrations for an enhanced security management.
  • Involve actively in enhancing methodologies for architecture, implementation of existing environments.
  • Understanding and leveraging various product capabilities across the gamut of incident response to best serve the needs.
  • Identify and recommend operational improvements to the client, drawing on deep experience and industry specific knowledge of risks.
  • Analyze complex issues to determine client impact and to suggest alternative solutions based on client needs and objectives.
  • Demonstrate capability to enhance and manage independently SIEM, SOC, SOAR, UEBA platforms.
  • Responsible for on time delivery and quality of all in scope deliverables.
  • Manage any in scope solution projects (integration/ implementations).
  • Responsible for meeting audit and compliance requirements.
  • Demonstrate ability to manage and motivate multiple project teams in multiple geo-locations.
  • Perform security monitoring, event analysis and incident response activities across [24]7 global networks
  • Creation of rules, dashboards and use cases in SIEM tool
  • Conduct host-based forensics analysis
  • Prioritize multiple high-priority tasks and formulate responses/recommendations
  • Support and act as first line of defense for detections and incident response
  • Documentation of case investigations
  • Provide recommendations to enhance monitoring and detection capabilities
  • Conduct analysis for spam, phishing, BEC and other email related attacks
  • Support audit requirements like evidence collection reports and different types of scans
  • Conduct and use of Vulnerability Assessment tools
  • Create and implement scripts for detection, monitoring and defense related purposes
  • Continuous monitoring of different security detection tools such as SIEM, Firewalls, IPS, EDR, Email Filtering and other technologies)

Educational Requirements:

  • Bachelor s degree or equivalent working experience
  • Desired Certifications:
    • Cisco CCNA Security or Cyber Ops
    • EC Council (CEH or Incident Handler)
    • GIAC related certifications
    • Cloud Security

Required Skills and Abilities:

  • 2 - 4+ years previous working experience in a SOC or Cyber Security
  • Knowledge of various operating systems
  • Proficient in preparation of reports, dashboards and documentation
  • Strong, verbal, and written communication, facilitation, and interpersonal skills
  • Required Experience in administrating or monitoring detection/security tools:
  • SIEM
  • EDR
  • Endpoint Protection
  • IPS/IDS
  • DLP
  • Cloud Security (GCP. AWS, Azure)
  • Identity and Access Management
  • Firewalls and Networking
  • Good understanding of security and incident response activities
  • Core understanding of possible attacks activities such as network probing/scanning, DDOS, etc.
  • Good understanding of vulnerability assessment tools
  • Good networking understanding
  • English proficiency (written and oral)
  • Ability to complete tasks and deliver on time, and good interaction with other teams
  • Self-Motivated, curious, and knowledgeable pertaining to news and current information security trends and news.
  • Hands on experience in creating rules, dashboard and SIEM use cases
  • Experience in host-based forensics tools
  • Good understanding of security and incident response
  • Desired hands-on experience on:

  • McAfee SIEM/Nitro
  • Sumo Logic
  • Cisco (ASA, Firepower, IDS,e etc.)
  • Tanium
  • Crowdstrike or any other EDR
  • Palo Alto
  • Cloud Computing such as AWS, GCP or Azure
  • Proofpoint

Does your profile matches to above Job description and looks exciting Then look no further and share your resume to Ar*****s@***.ai

,

Employement Category:

Employement Type: Full time
Industry: IT - Software
Role Category: Network / System Administration
Functional Area: Not Applicable
Role/Responsibilies: L1/L2 SOC Monitoring Analyst

Contact Details:

Company: 24 7 Customer
Location(s): Bengaluru

+ View Contactajax loader


 Job seems aged, it may have been expired!
 Fraud Alert to job seekers!

₹ 2.0 - 2.5 Lakh/Yr

[24]7.ai India

About [24]7.ai:24]7 is redefining the way companies interact with consumers. Using artificial intelligence and machine learning to understand consumer intent, [24]7s technology helps companies create a personalized, predictive and effortless customer experience across all channels...