SOC Analyst L1/L2
Location :GurgaonTotal Experience:
3 – 5 years
Job Skills:
- Must be available 45 hours each week.
- Must be flexible for the rotational shift.
- Must have the hand-on experience in SOC related tools.
- Must uphold, enforce, and abide by all Company policies.
- Strong writing skills.
- Preference given to analyst with working knowledge of TCP/IP, Wire shark, Microsoft Word, Visio, Excel, and web design (HTML or WYSIWYG editor).
- Must have any Professional Security qualifications: CEH (preferred), SIEM or End Point
Certifications. - Degree or Professional Industry experience.
- Keen analytical mind and approach to problems with a perspective of certainty over
assumption as a priority.
Responsibilities:
- Should act as front level defensive agent in monitoring the various infrastructure devices.
- Should assist L2 in generating the tickets to the customer, if any suspicious activity
observed. - Provide support in the malicious activities detections with various SIEM supporting tools.
- Must have hands-on experience with any SIEM such as Log Rhythm, Arc sight, Splunk and others.
- Must have knowledge on packet analysis, various Cyber security attack patterns.
- Assist with applications/tools including but not limited to SIEM, IPS, Net flow, e-mail gateway protection, and DLP tools.
- Must know the best practices for Cyber-attack Mitigations.
- Review and update SOC Management Reports for policies, procedures, standards and
guidelines. - Research and evaluate applications and services for use by the institution.
- Provide a matrix when possible, detailing features within each different application or service.
- Assistance with the deployment and upkeep of the cyber security department’s website
content. - Provide first level compliance monitoring and investigations.
- Assist with forensics analysis and fact gathering.
- Assist with vulnerability assessments and penetration testing for specific applications,
services, networks and servers as required. - Perform compliance audits against institutionally accepted security controls.
- Record and track IT security incidents, including but not limited to copyright violations.
- Compromised accounts, e-mail threats, and abuse reports from various sources.
- Other duties as assigned.