loader

SOC Analyst L1/L2

Location :Gurgaon

Total Experience:

3 – 5 years

Job Skills:

  • Must be available 45 hours each week.
  • Must be flexible for the rotational shift.
  • Must have the hand-on experience in SOC related tools.
  • Must uphold, enforce, and abide by all Company policies.
  • Strong writing skills.
  • Preference given to analyst with working knowledge of TCP/IP, Wire shark, Microsoft Word, Visio, Excel, and web design (HTML or WYSIWYG editor).
  • Must have any Professional Security qualifications: CEH (preferred), SIEM or End Point
    Certifications.
  • Degree or Professional Industry experience.
  • Keen analytical mind and approach to problems with a perspective of certainty over
    assumption as a priority.

Responsibilities:

  • Should act as front level defensive agent in monitoring the various infrastructure devices.
  • Should assist L2 in generating the tickets to the customer, if any suspicious activity
    observed.
  • Provide support in the malicious activities detections with various SIEM supporting tools.
  • Must have hands-on experience with any SIEM such as Log Rhythm, Arc sight, Splunk and others.
  • Must have knowledge on packet analysis, various Cyber security attack patterns.
  • Assist with applications/tools including but not limited to SIEM, IPS, Net flow, e-mail gateway protection, and DLP tools.
  • Must know the best practices for Cyber-attack Mitigations.
  • Review and update SOC Management Reports for policies, procedures, standards and
    guidelines.
  • Research and evaluate applications and services for use by the institution.
  • Provide a matrix when possible, detailing features within each different application or service.
  • Assistance with the deployment and upkeep of the cyber security department’s website
    content.
  • Provide first level compliance monitoring and investigations.
  • Assist with forensics analysis and fact gathering.
  • Assist with vulnerability assessments and penetration testing for specific applications,
    services, networks and servers as required.
  • Perform compliance audits against institutionally accepted security controls.
  • Record and track IT security incidents, including but not limited to copyright violations.
  • Compromised accounts, e-mail threats, and abuse reports from various sources.
  • Other duties as assigned.

Our 15 years of achievements includes:

  • 10M+

    lines of codes

  • 2400+

    projects completed

  • 900+

    satisfied clients

  • 16+

    counties served

Consult with us Now