Pradip Mitna’s Post

View profile for Pradip Mitna, graphic

Specialist PMO at LTIMindtree

Specialist - Information Security 7 - 10 Years 1 opening Bengaluru Job Description Responsibilities: 1. A senior SOC analyst would work closely with the SOC team and be responsible for incident detection, triage, analysis, and response. 2. Hands-on experience with configurations and management of SIEM tools (Qradar (preferred), Azure Sentinel, and Splunk), including log source integrations, custom parsers built, fine tuning and optimizing the correlation rules, and use cases Is MUST. 3. Proven experience with any of the security information and event management (SIEM) tools like Azure Sentinel (preferred), Qradar, Splunk, etc. 4. Having good experience working with an EDR solution like MS Defender 5. Determine quick defense techniques until a permanent solution is found. 6. Experience in building automation playbooks using any of the SOAR tools like IBM Resilient (Preferred), ServiceNow SecOps, Demisto (XSOAR), and LogicApps 7. Experience in writing automation scripts using Python, KQL, and PowerShell 8. Recognize successful intrusions and compromises by reviewing and analyzing relevant event detail data. 9. Review incidents escalated by Level 1 analysts. 10. Launch and track investigations to resolution. Recognize attacks based on their signatures, which differentiates false positives from true intrusion attempts. 11. actively investigates the latest in security vulnerabilities, advisories, incidents, and 12. penetration techniques and notifies end users when appropriate. 13. Identify the gaps in the security environment and suggest the gap's closure. 14. Change Management must be driven and supported. 15. performs and reviews tasks as identified in a daily task list. 16. Report Generation and Trend Analysis Starting the governance meeting with the customer and walking the customer and stakeholders through the security status from the SOC's perspective. 17. It is advantageous to have prior experience managing SIEM solutions on public and private clouds such as Amazon Web Services (AWS), Microsoft Azure, and others. 18. willing to work in a 24-hour, seven-day-a-week rotational shift model, including night shift KRA: 1. 3 to 5 years experience 2. Identify and investigate the security incidents. 3. Identify security gaps and use Change Management to close them. 4. Monitor the security logs and s from various devices and escalate or investigate the incident. 5. To explore different security technologies available in the market. 6. Install, build, test, and configure SIEM-related systems. 7. Maintain security dashboards. 8. Coordination with internal customers for their security-related problems and providing solutions 9. Documentation of security solutions 10. Handle L2 and above-level technical escalations from the operations team and resolve within the SLA. 11. Work closely with L1 team members to provide quick support and escalate issues. 12. Train other analysts in their role and responsibilities SOC - Operations [email protected]

To view or add a comment, sign in

Explore topics