Minimum of 4 years of experience in security incidents and analysis within a Security Operations Centre (SOC)., Familiarity with log analysis from various IT security devices including host, network, firewall, and IDS/IPS., Good knowledge of Cyber Kill Chain and MITRE ATT&CK framework., Experience with EDR & SIEM technologies, particularly Splunk, and understanding of OSI model protocols..
Key responsibilities:
Serve as the first point of contact for security operations support.
Analyze and trend security log data from diverse IT security devices.
Provide Incident Response support for actionable incidents and conduct threat and vulnerability analysis.
Monitor and assess security systems for weaknesses and recommend improvements.
Report This Job
Help us maintain the quality of our job listings. If you find any issues with this job post, please let us know.
Select the reason you're reporting this job:
Coders Brain is a global leader in IT services, digital and business solutions that partners with its clients to simplify, strengthen and transform their businesses. We ensure the highest levels of certainty and satisfaction through a deep-set commitment to our clients, comprehensive industry expertise and a global network of innovation and delivery centers.
We achieved our success because of how successfully we integrate with our clients.
Job Location: Manikonda Lanco Hills IT Park, Hyderabad / Yelahanka, Bengaluru
Shifts: Rotational (24/7) (includes night shift) - Mandatory
Cab Facility: Yes
Below is the JD:
The role will serve as the first point of contact for providing support to
security operations responsible for monitoring and fighting threats to an
organization's IT infrastructure. He or she is in charge of assessing security
systems, identifying and patching vulnerabilities, and improving cyber
resilience.
Key Responsibilities
Provide analysis and trending of security log data from a large number of heterogeneous IT security devices.
Provide Incident Response (IR) support when analysis confirms an actionable incident.
Provide threat and vulnerability analysis as well as security advisory services
Monitor and fight threats to an organization's IT infrastructure, and to assess security systems and measures for weaknesses and possible improvements.
Skills Required:
Should have a minimum of 4 years of experience with security incidents and analysis as part of the Security Operations Centre (SOC).
Should be familiar with log analysis (host, network, firewall, IDS/IPS) from any device.
Good knowledge in understanding Cyber Kill Chain and MITRE ATT & CK framework.
Monitoring and Investigating threats using Next-Gen Firewall and Email Security Gateway.
Should have deep understanding and experience with EDR & SIEM technologies (Splunk) - monitoring and investigations.
Expertise in the knowledge of protocols from different layers of the OSI model
(HTTP, HTTPS, TCP/IP, Web Socket, SSH, SFTP, RDP).
Must be able to adjust and adapt to changing priorities in a dynamic environment.
Should be ready and flexible to Support 24/7 shifts.
Required profile
Experience
Spoken language(s):
English
Check out the description to know which languages are mandatory.