Required Skills:
• At least 8 years of experience; · Technical leadership for the delivery team, in charge of resolving L3 incidents; · Practical knowledge of two or more Vuln Assessment tools and Vuln Lifecycle management .
• Proficient with Qualys, Tenable, Rapid7, and MS Defender, with knowledge of both virtual machines and policy compliance scanning.
• Exposure to the Mitre framework and its equivalent, practical experience with EDR
platforms and threat analysis, and knowledge of threat hunting and incident response
• During the reaction, coordinate SOC activities among several corporate units.
Drive automation initiatives and contribute to the transformation of technology.
Create, put into practice, and carry out standard operating procedures for the SIEM/Log Management systems' administration, content management, change management, version/patch management, and lifecycle management.
• To identify and address risks, conduct hunting exercises utilising threat information, abnormal log data analysis, and historical event and data outcomes.
• Perform proof-of-concept evaluations for novel security products.
Create summaries, reports, and other communications materials that may be used internally or with clients.
• Staying up to date with security best practices and industry trends.
Assure SLA adherence, process improvisation, and process adherence in order to accomplish operational goals.
• Work or instructions for scripting in Python, Perl, Bash, and/or Shell Email security solutions are evaluated for Sender Policy Framework (SPF) and Domain Keys Identification Mail (DKIM) policies, and adjustments are suggested.
• Present security principles to both technical and non-technical people in an effective manner. Write postmortem reports that will be given to top leadership after a red team engagement or intrusion.
• Practical knowledge of at least two SIEM analysis and use case management domains · Encouragement of protection and mitigation tactics to be applied through lessons learnt exercises
• Strong expertise and practical experience managing cloud-based architecture vulnerability assessments with Prisma cloud, Wiz.io, and other tools Additionally, it will be desired to have knowledge of other tools related to CSPM and ASM.
• Proficiency in developing, executing, and offering advice on enterprise security-based vulnerability management frameworks.
• General understanding of remediation governance and the VM process. Capacity to collaborate with the business to successfully convey the risks associated with vulnerabilities and suggest solutions.
Soft Skill:
The incumbent should possess a mindset of continuous system improvement and be able to exhibit it in their work. They should also be willing to operate in surroundings that are open around the clock. Should possess the ability to represent technical analysis reports to clients.