Entry-level SOC Analyst responsible for monitoring security events and incidents within a Security Operations Center. Utilize security information and event management tools to detect and respond to cyber threats. Collaborate with team members to investigate and escalate security incidents as needed.
Skills
- Windows
- Linux
- BASH
- Python
- Ruby
- Perl
- PowerShell
- SIEM
- Collaboration Skills
- Team Collaboration
Requirements
- Job Role SOC ANALYST L1
- Job Type Full Time
- Workplace Type Onsite
- Industry
Computer and Network Security
Secondary locations
Not provided
Responsibilities
- Monitoring of security incidents in 24x7 rotational shifts.
- Detect Incidents by monitoring the SIEM console, Rules, Reports and Dashboards.
- Ensure incidents are reported as tickets using ticketing tool and handled as per SLA defined for each customer. The Standard SLA time to be taken is 10 mins per incident ticket.
- Monitor the SIEM console resources to identify any anomalies.
- Recognize potential, successful, and unsuccessful intrusion attempts/compromises thorough review and analysis of relevant event detail and summary information.
- Report the confirmed incidents to customers and escalate to them for further to the concerned L2 team.
- Track incident status to closure as per Standard Operating Procedures (SOP) defined.
- First level Triage of events as provided in Standard Operating Procedures and automate analysis if possible.
- Monitor the health of the SIEM tool and create incidents to the engineering team for their action.
- Assist L2 analysts in incident workflow whenever requested.
- Proactively identify vulnerabilities in customer infrastructure environment and suggest updating of SIEM use cases to generate alerts.
- Ensure confidentiality and protection of sensitive customer data.
Other Requirements
- Previous working experience as a SOC Analyst for 2 years
- Knowledge and experience on SIEM Platform is Must
- Knowledge and experience in operating Windows & Linux Platforms.
- Scripting skill set (Bash, Python, Ruby, Perl, PowerShell) will be considered a plus.
- Hands-on experience with any commercial Security Information and Event Management (SIEM) solution
- In-depth understanding of security threats (preferably OWASP Top 10 vulnerabilities), threat attack methods and the current threat environment
- Basic understanding of common cyber-attacks (e.g., brute force, SYN flood, session hijack, smurf etc.) and their SIEM signatures.
- Must be Collaborative and team oriented.
- Must have appreciable troubleshooting and analytical skills.
- Must be able to multitask in a fast-paced environment.
- Good Understanding of network protocols (TCP/IP stack, SSL/TLS, IPSEC, SMTP/IMAP, FTP, HTTP etc.)
- Good Understanding of Operating System, Web Server, database, and Security devices (firewall/NIDS/NIPS) logs and log formats.
-
Any bachelor’s degree in computer science
- Priority for B. Tech (Computer Science/IT/Electronics/Communication Engineering)
- Mandatory: CEH/Microsoft Certified: Security Operations Analyst Associate (any 1 will do)
- Desirable: SIEM product Certifications /RHCE/CCNA/CCNP
- Strong written and oral communication skills
Good to have
Not provided
About the Company
ValueMentor is a full-fledged Cyber Security Partner helping organizations worldwide to effortlessly manage cyber risks. We offer Risk & Compliance Services, Security Testing & Managed Security Services.