Responsible for working in a 24x7 Security Operation Center (SOC) environment in shifts
Act as point of contact for projects, escalations, new updates and changes from stakeholders.
Monitor, investigate and respond to security alerts from SIEM / log management and various security controls / tools such as Firewall, secure email gateway, endpoint security, WAF, IDS / IPS and DLP, etc.
Provide Incident Response (IR) support when analysis confirms an actional incident and build rules, dashboards and reports in SIEM.
Create automation / playbooks in SOAR platforms. Playbooks should automate the application of security hardening configurations on multiple infrastructure assets, and execute SOC responses and prcoedures.
Process and manage requests for various security services, for example, responding to security inquiries from affiliates / stakeholders, reviewing malicious or blocked attachments or websites, reviewing firewall change requests, performing vulnerability scans, etc.
Provide threat and vulnerability analysis services, for example, analyze and respond to unkown or previously undisclosed software and hardware vulnerabilities.
Report to IT Management and stakeholders any major incident that could significantly impact the business
Bachelor's degree in Computer Science, Computer Engineering, IT Security or a related field; alternatively equivalent demonstrated knowledge.
Highly technical with atleast 10 years of relevant experience in IT Security / IT Operations and atleast 8 years experience as a Security Analsyt with global companies.
Professional certifications such as ITIL, CompTIA Security+, CompTIA CySA+ , EC-Council Certified Ethical Hacker (CEH) will be a plus
Experience with SIEM / SOAR platforms, firewalls and intrusion detection / prevention systems and security operations.
Experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, secure email gateway logs or intrusion prevention logs.
Experience with packet analysis (wireshark) and malware analysis preferred
Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution).
Knowledge of general attack stages (e.g., foot printing and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
Knowledge of system and application security threats and vulnerabilities