Soc analyst l1
Posted: May 27, 2024, 9:39 a.m. - Full Time - MumbaiJob Description: SoC Analyst L1
Experience: 2 to 4 Years
Location: Mumbai
Job Summary:
Security Operations Centre (SOC) Analyst Trainee/L1: will be responsible for the incident response and forensic investigation for SOC as a service offering of CyberNX. The candidates should be with 1-3 years of experience and have a minimum of 1 years in SOC Operations Monitoring. The role will be required to collaborate with internal and external stakeholders, analyse incidents, the ability to perform triaging, analysis, investigate, and reporting. The candidate should have exposure to SOC monitoring process and understanding of cyber-attacks and alert investigation process.
Responsibilities and Scope:
• Monitor and analyse logs and alerts from a variety of different technologies across multiple platforms to identify and triage security incidents affecting the customers. • Assess the security impact of security alerts and traffic anomalies to identify malicious activities and take mitigating actions, discuss with customers and internal teams. • Provide Incident Response (IR) support for the incidents and alerts reported. • Use security tools and technologies to analyse potential threats to determine impact, scope, and recovery of services. • Collaboration with internal and customer incident response teams.
Must-Have:
• Technical understanding of applications, system, network, cloud and infrastructure architecture • Deep understanding of logging mechanisms of Windows, Linux, and MAC OS platforms, networking • Understanding of SOC monitoring process in any one of the leading SIEMs such as QRADAR, ARCSIGHT etc. Preference will be given to people having expertise on ELK Stack. • At least 2 years of experience in a Security Operation Centre (SOC) • Good communication skills to coordinate among various stakeholders of the organization