ValuementorValuementor

SOC Analyst L1

Responsibility

Responsibilities: -

 

·        Monitoring of security incidents in 24x7 rotational shifts.

·        Detect Incidents by monitoring the SIEM console, Rules, Reports and Dashboards.

·        Ensure incidents are reported as tickets using ticketing tool and handled as per SLA defined for each customer. The Standard SLA time to be taken is 10 mins per incident ticket.

·        Monitor the SIEM console resources to identify any anomalies.

·        Recognize potential, successful, and unsuccessful intrusion attempts/compromises thorough review and analysis of relevant event detail and summary information.

·        Report the confirmed incidents to customers and escalate to them for further to the concerned L2 team.

·        Track incident status to closure as per Standard Operating Procedures (SOP) defined.

·        first level Triage of events as provided in Standard Operating Procedures and automate analysis if possible.

·        Monitor the health of the SIEM tool and create incidents to the engineering team for their action.

·        Assist L2 analysts in incident workflow whenever requested.

·        Proactively identify vulnerabilities in customer infrastructure environment and suggest updating of SIEM use cases to generate alerts.

·        Ensure confidentiality and protection of sensitive customer data. 

Requirements

Experience / Job Competencies / Success Factors: -

·        Experience in working as a SOC analyst for at least 6 months in any reputed cyber security company 

·        Knowledge and experience in operating Windows & Linux Platforms.

·        Scripting skill set (Bash, Python, Ruby, Perl, PowerShell) will be considered a plus.

·        Hands-on experience with any commercial Security Information and Event Management (SIEM) solution

·        In-depth understanding of security threats (preferably OWASP Top 10 vulnerabilities), threat attack methods and the current threat environment

·        Basic understanding of common cyber-attacks (e.g., brute force, SYN flood, session hijack, smurf etc.) and their SIEM signatures.

·        Must be Collaborative and team oriented.

·        Must have appreciable troubleshooting and analytical skills.

·        Must be able to multitask in a fast-paced environment.

·        Strong written and oral communication skills

·        Good Understanding of network protocols (TCP/IP stack, SSL/TLS, IPSEC, SMTP/IMAP, FTP, HTTP etc.)

·        Good Understanding of Operating System, Web Server, database, and Security devices (firewall/NIDS/NIPS) logs and log formats.

 

Education Qualification Requirements: -

·        Any bachelor’s degree in computer science

·        Priority for B. Tech (Computer Science/IT/Electronics/Communication Engineering)

·        Mandatory: CEH/CySA+/ECSA (any 1 will do)

     Desirable: SIEM product Certifications /RHCE/CCNA/CCNP

Industry
Information & Technology
Department
MSS
Seniority Level
Associate
Location
India, Kerala
Working Days
Employment Type
Full Time
Education Level
Bachelor's Degree