
SOC Analyst
- Bangalore, Karnataka
- Permanent
- Full-time
- Perform cybersecurity threat detection, assessment, and mitigation efforts
- Support inquiries from compliance teams such as IT risk management and internal and external audit, to ensure documentation is complete and in compliance with information security policies
- Identify, evaluate, and monitor continually threats that could affect operational and business activities
- Support development of security operations playbooks to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats
- Create, Enhance and manage security use cases, dashboards and alerts using Splunk
- Research and look for opportunities to adopt the best practices and industry standards to enhance the SIEM and SOAR platforms
- Provide guidance to junior team members
- Bachelor's degree in business, Management, Computer Sciences, or equivalent prior work experience in a related field
- Minimum of 3-5 years overall experience working in global, complex, matrix-managed organization
- Minimum of 2 years working experience in Cybersecurity Operations or Information Security
- Minimum of 2 years' experience in Incident Response and Forensic Investigations work
- Minimum of 2 years' experience in threat and vulnerability management
- Understanding of enterprise detection technologies and processes (advanced threat detection tools, intrusion detection system/intrusion prevention system (IDS/IPS), network packet analysis, endpoint protection, Anti malware/anti-virus).
- Understanding of network protocols and operating systems (Windows, Unix, Linux, databases)
- Knowledge in one or more security domains including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, and Incident Response and Forensics
- Knowledge of the following areas: IT security, incident handling and response, exploit analysis, intelligence gathering, digital forensics methods and procedures.
- Knowledge of Splunk, Phantom, Python, CrowdStrike, Tanium, Defender, Azure, AWS and forensic security tools is preferred.
- Knowledge of Information Assurance concepts and technologies
- Knowledge of cloud computing security, network, operating system, database, application, and mobile device security.
- Knowledge of vulnerability management and remediation.
- A diverse skill base in both product security and information security including organizational structure and administration practices, system development and maintenance procedures, system software and hardware security controls, access controls, computer operations, physical and environmental controls, and backup and recovery procedures.
- Solid experience in day-to-day operational processes such as security monitoring, data correlation, troubleshooting, security operations, etc.
- Experience working within the Financial Services Industry preferred.
- Experience in one or more security domains including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, and Incident Response and Forensics preferred.
- Experience with information security risk management, including conducting information security audits, reviews, and risk assessments.
- Knowledge of the Amazon Web Services (AWS) and/or Azure for infrastructure is preferred
- Working experience with MITRE ATT&CK or similar frameworks is preferred
- One to three years of experience in Splunk, Splunk Enterprise Security or Splunk Phantom is preferred
- Knowledge of scripting languages like Python is preferred
- Knowledge in RegEx is preferred
- Strong analytical skills (i.e., technical and non-technical problem solving skills).
- Maintain certifications in an information security related field. The following are recommended: CySA+, CISSP, ISSMP, SANS, GCIA, CISM, EnCE, CEH, GCFA, GCFE, GCIH, or GSEC and/or Splunk Certifications.