Soc siem architect and consultant

Posted: July 6, 2021, 5:23 a.m. - Full Time - Pune

Job Role: L2\L3 SOC Analyst

Alert handling: analyze and tune security alerts and interpret security events that may lead to incidents.

Incident Response activities: identify, investigate and respond to potential security incidents in order to minimize the operational and organizational impact.

Threat hunting: Actively pursue an abnormal activity on assets that may be signs of compromise.

Threat Intelligence: Leverage various threat intelligence sources and capabilities to enable an intelligence-driven response.

Malware Analysis: analyze and interpret malware, exploit, and insider threat activities.

Forensics: Perform forensic analysis on memory, disk, and other system and network artifacts to identify indicators of compromise.

Identify Gaps: Investigate and document gaps in controls, event data, and work with internal teams to resolve.

Process Improvement: Execute, develop and document Incident Handling Guides and processes.

Technical Skills

At least 4 to 5 years of experience handling SIEM tools, Incident Response,

Knowledge and Hands-on experience on Security appliances like (IPS, Proxy, EDR, Malware Protection, Anti-SPAM )

Experience in host and network forensics

Experience in Security Orchestration and Automation.

Good oral and written communication skills.

Have good experience in handling IT Security incidents

Should have good knowledge of SIEM tools, Threat Intelligence, Malware triaging.