Match score not available

Senior SOC Analyst

extra holidays - extra parental leave
Remote: 
Full Remote
Contract: 
Experience: 
Senior (5-10 years)
Work from: 

Offer summary

Qualifications:

4-6 years experience in SOC, Bachelor's in Computer Science/Information Security, SC-200 Certification required, AZ-500 Certification desirable, CompTIA Security+ and CEH desirable.

Key responsabilities:

  • Analyze alerts and log data promptly
  • Monitor SIEM tools for security incidents
  • Conduct in-depth analysis of security events
  • Execute containment and remediation measures
  • Assist in vulnerability assessments and reporting
Resillion logo
Resillion Information Technology & Services SME https://www.resillion.com/
501 - 1000 Employees
See more Resillion offers

Job description

Company Description

Resillion is a global company with end-to-end capabilities: no matter your industry, your geographical location, or stage in your digital journey. With offices in North America, Europe, and Asia, Resillion will be by your side. Helping you and your organization realize your ambitions in cyber security, testing of digital media content and quality assurance.

Whether, testing, certification, (software) development, cyber security, or data-protection, the experts at Resillion do whatever it takes. We work as long and hard as necessary to get you to market. 

Job Description

Senior SOC Analyst 

Experience Range: 4 -6 Years 

Location: Bangalore

Key responsibilities

  • Operate within a fast-paced 24x7 SOC environment, either as part of a team or independently, to Analyse alerts and log data promptly and effectively. Assess the severity and impact of potential threats to accurately prioritize alerts and incidents.
  • Monitor and analyze security information and event management (SIEM) tools and other security monitoring systems to identify potential security incidents and anomalies.
  • Conduct in-depth analysis of security events, collaborating directly with customers to escalate and thoroughly investigate incidents. This involves understanding the scope, impact, and root cause of incidents to tailor the response effectively.
  • Execute swift containment and remediation measures for identified security incidents, employing predefined response strategies to isolate affected systems and prevent further compromise.
  • Proactively participate in the creation and enhancement of processes and procedures such as Security Playbooks.
  • Refine and optimise analytical rules within the SIEM platform to reduce false positive alerts, enhancing the accuracy and efficiency of threat detection.
  • Assist in vulnerability assessments and penetration testing activities. Evaluate and prioritise identified vulnerabilities for remediation by collaborating directly with customers.
  • Maintain accurate records of incidents, investigations, and security-related activities within the incident management platform.
  • Create detailed reports on security incidents, response actions taken, and recommendations for improvement.
  • Research new concepts and present them to the internal team as well as customers.

Required skills:

  • Excellent English written and verbal communication skills.
  • Prior experience working within a 24x7 Security Operations Centre (SOC).
  • Security monitoring experience with one or more SIEM technologies, preferably Microsoft Sentinel.
  • Knowledge of EDR solutions including Microsoft Defender and CrowdStrike Falcon.
  • Strong understanding of Windows, Linux and cloud technologies including Microsoft Azure and Office365.
  • Good understanding of security solutions including SIEMs, Web Proxies, Anti-Virus, Firewalls, VPN, authentication providers and mechanisms, encryption, IPS/IDS.
  • Strong understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols.

Qualifications
  • Degree in Computer Science, Information Security, or a related field – Must have.
  • SC-200 Microsoft Security Operations Analyst – Must have.
  • AZ-500 Microsoft Azure Security Technologies – Desirable.
  • CompTIA Security+ SY0-601 – Desirable.
  • Certified Ethical Hacker (CEH) – Desirable.
  • GIAC Security Essentials (GSEC) – Desirable.
  • GIAC Certified Incident Handler (GCIH) – Desirable.

Required profile

Experience

Level of experience: Senior (5-10 years)
Industry :
Information Technology & Services
Spoken language(s):
EnglishEnglish
Check out the description to know which languages are mandatory.

Other Skills

  • Microsoft Windows
  • Verbal Communication Skills
  • Analytical Thinking
  • Report Writing

Related jobs