SOC Analyst – L2

From 4 to 7 year(s) of experience
₹ Not Disclosed by Recruiter

Job Description

Roles and Responsibilities

Summary-
This role is responsible to work as L-2 SOC Analyst and handle all the escalation from L1.
The candidate must have good working experience with SIEM tool.

Repsonsibilities-

• Candidate shall work as L2 analyst in the captive & advance SOC (SIEM, SOAR, UEBA, NBAD, Threat Hunting, Darkweb Monitoring, Vulnerability Management, etc)
• In-depth knowledge of various SOC tools and technics.
• Perform the security event and incident monitoring
• Provide on-going guidance to L1 team
• Create the Procedure documents
• Responsible for security event monitoring, management, and response
• Ensure incident identification, assessment, quantification, reporting, communication, mitigation and monitoring
• Ensure that the required use cases have been created in SIEM for detection and response are configured in SOAR
• Perform threat management, threat modelling, identify threat vectors and develop use cases for security monitoring
• Responsible for integration of all type of logs in SIEM and ensure the logging level are appropriate defined
• Create various reports and dashboards
• Security incidents handling as per company' define procedures.
• Monitor and Triage Security Events from various security controls. Such as, firewall, proxy, host intrusion prevention systems, endpoint security, network devices, application, and system logs, to identify possible threats to network security.
• Perform incident triage (Identify, Map, Eradicate), documentation, and escalate whenever needed
• Add/Delete/Update the IT Asset in NGSOC system and ensure alerts/events are captured
• Knowledge on networking and TCP/IP Troubleshooting
• Identifying and report the compromised computers, IP and suspicious activities as per escalation matrix
• Stay up to date with latest cyber security vulnerabilities and threats.
• Recommend and implement changes required to counter the cyber-attack or enhance the cyber security control.
• Ensure that department documents and other records are updated in timely manner.
• Understand, recognise, and act on crisis / urgent situations in an appropriate manner to lower the impact of compliance violation.

Education-

Any Graduate in Any Specialization - Minimum 60%

Certifications: ITIL / CEH / CISM / GCIH / GSEC

Experience-
Candidate must have 5-7 years of total experience with 2-5 years’ of relevent experience

Knowledge-

• Good understanding of Cyber Security incident handling, network investigative techniques, and cyber security trends
• Good experience in generating various custom report from SIEM / Security tools
• Basic Knowledge of network Security, DNS, DHCP, Firewall, IDS / IPS, VPN, WAF
• Experience in threat management
• Knowledge of Antivirus, EDR, HIDS / HIPS and various other endpoint Security tool
• Experience in threat management

Skills-

• Should lead Cyber Security Incident investigation till closer and recommend the responsive acitons
• Self-motivated and able to motivate the L1 staff




Key Skills

Education

UG:Any Graduate

PG:Post Graduation Not Required

Doctorate:Doctorate Not Required

Company Profile

Indian Financial Technology And Allied Services

IFTAS
Company Info
X
View Contact Details+

Contact Company:Indian Financial Technology And Allied Services

Website:http://careers.iftas.in

Salary:

Not Disclosed by Recruiter

Role Category:

IT Security

Role:

System Security Engineer

Employment Type:

Full Time, Permanent