Manager - SOC Senior Analyst
2 years ago Banking Bengaluru 175 views Reference: 23693Job Details
Inviting applications for the role of Manager, SOC Senior Analyst (SOC L3)
In this role, you will support threat monitoring, detection, event analysis, incident response/reporting, forensics, and threat hunting activities for its Cyber Defense Center (SOC), which is a 24/7 environment. The SOC L3 Analyst must be able to rapidly respond to security incidents and should have relevant experience in Cybersecurity incident response and have a deeper understanding with some hands-on experience on enterprise IT infra components such as advanced firewalls, IPS/IDS/WIPS/HIPS, routers/switches, TACACS, VPN, proxy, AV, domain controllers, DNS, DHCP, multi-factor authentication, virtualization, Email systems/security, DLP etc. along with cloud environments (AWS, Azure etc.).
Responsibilities
• Providing incident response/investigation and remediation support for escalated security alerts/incidents (should be flexible to work in 24*7 environment)
• Leverages emerging threat intelligence (IOCs, updated rules, etc.) to identify affected systems and the scope of the attack
• Performing comprehensive computer monitoring, identifying vulnerabilities, Target mapping and profiling.
• Provides support for complex computer/network exploitation and defense techniques to include deterring, identifying, and investigating computer and network intrusions
• Provides technical support for forensics services to include evidence seizure, computer forensic analysis and data recovery, in support of computer crime investigation. Researches and maintains proficiency in open and closed source computer exploitation tools, attack techniques, procedures and trends.
• Performs research into emerging threat sources and develops threat profiles. Keep updated on the latest cybersecurity threats.
• Demonstrates strong evidence of analytical ability and attention to detail. Has a broad understanding of all stages of incident response.
• Has a sound understanding of SIEM, PAM, CASB, EDR, other threat detection platforms and Incident Response tools.
• Has a systematic, disciplined and analytical approach to problem-solving
• knowledge of current threat landscape (threat actors, APT, cyber-crime, etc.)
• Has basic knowledge of Data Loss Prevention monitoring
• Has basic knowledge of audit requirements (PCI, HIPPA, SOX, etc.)
Qualifications we seek in you!
Minimum qualifications
• Graduation
Preferred qualifications
• Security Certifications Preferred (Including but not limited to the following certifications): Certified Incident Handler (GCIH), GDAT, OSCP, CHFI, CEH.
Interested candidates Click on below link Apply Online and you will be redirected to Career Page of Company or Career url.