Technical/Functional Skills
Required Skills
- 4+ years of relevant security industry experience working in multiple client environments.
- Sound knowledge of Splunk ES SOC SIEM platform and/or networking operations centers
- Candidates with industry-recognized security or networking certifications will be a plus.
- Well-versed with various security industry frameworks and security processes.
- Strong verbal and written communication skills, fluent in English.
Experience Required
4+ years of relevant security or networking operations centers experience working in multiple client environments.
Roles & Responsibilities
- To work as a SOC and/or NOC analyst to monitor and manage security or network infra related incidents using underlying technology platforms in client environments.
- Initial triaging of the security incidents as per pre-defined playbooks and technology platforms, for example- Splunk SIEM.
- Provide threat and vulnerability analysis as well as security advisory services.
- Investigate, document, and report on information security issues and emerging trends.
- Provide status reports as per expectation from customer (includes Open / Closed incidents, weekly highlights, action items, key risks, and issues)
- Provide Root cause analysis for critical incidents with corrective and preventive actions
- Assist senior members of the SOC community with analyzing and responding to potential security incidents per the pre-defined escalation path.
- Collaborate with client managers and leads to help continuously improve the security controls and associated technology platforms in client environments.
- Work with cross-functional teams that may include teams internally and externally to the client’s organization.
- Help maintain the playbooks repository updated as per revisions in the company’s security policies and industry trends.
- Conduct security research and intelligence gathering on emerging threats and exploits.
- Participate in shift transitions and be able to support in a 24x7x365 support model.