Soc siem architect and consultantPosted: July 6, 2021, 5:23 a.m. - Full Time - Pune
Job Role: L2\L3 SOC Analyst
Alert handling: analyze and tune security alerts and interpret security events that may lead to incidents.
Incident Response activities: identify, investigate and respond to potential security incidents in order to minimize the operational and organizational impact.
Threat hunting: Actively pursue an abnormal activity on assets that may be signs of compromise.
Threat Intelligence: Leverage various threat intelligence sources and capabilities to enable an intelligence-driven response.
Malware Analysis: analyze and interpret malware, exploit, and insider threat activities.
Forensics: Perform forensic analysis on memory, disk, and other system and network artifacts to identify indicators of compromise.
Identify Gaps: Investigate and document gaps in controls, event data, and work with internal teams to resolve.
Process Improvement: Execute, develop and document Incident Handling Guides and processes.
At least 4 to 5 years of experience handling SIEM tools, Incident Response,
Knowledge and Hands-on experience on Security appliances like (IPS, Proxy, EDR, Malware Protection, Anti-SPAM )
Experience in host and network forensics
Experience in Security Orchestration and Automation.
Good oral and written communication skills.
Have good experience in handling IT Security incidents
Should have good knowledge of SIEM tools, Threat Intelligence, Malware triaging.