Sr. SOC Analyst
Apply Now
We Can Help You Build An Exceptional Career
Location: Noida/Remote
Job Type: Full-Time
Years of Experience: 5-7 Yrs.
Ready to Join: Immediate
Key Responsibilities:
- Thoroughly document incident response analysis activities
- Detect incidents through proactive “hunting” across security-relevant datasets.
- Review investigations conducted by more junior analysts to ensure quality standards are met.
- Develop new, repeatable methods for finding malicious activity across the networks.
- Provide recommendations to enhance detection and protection capabilities.
- Regularly present technical topics to technical and non-technical audiences
- Develop and follow detailed operational processes and procedures to appropriately analyse, escalate, and assist in the remediation of information security incidents.
- Prioritize multiple high-priority tasks and formulate responses/recommendations to customers and team members in a fast-paced environment.
- Provide assistance to other security teams.
- Continually develop new technical skills and push overall team capabilities forward.
- Engage with and mentor other team members.
- Work with other teams on major engineering and architecture initiatives.
- Be innovative with their understanding of attack methodologies, malware analysis, malicious toolkits, and how those may manifest within various security technologies.
- Advanced proactive threat hunting
- Understands advanced adversary emulation concepts.
- Advanced use case design for insider threat, operational, threat detection and response
- Review of defensive and detective controls to reduce client attack surface.
- Other duties as assigned
Required Skills and Qualifications:
- 5+ years operational experience assessing, reviewing, and remediating infrastructure vulnerabilities, CVEs, and risks.
- Knowledge of third-party software vulnerabilities, security threat landscape, especially network and server threats
- Knowledge of cyber security threats and risks, vendor computing environments, basic systems, and network technologies.
- Experience with and understanding of CVE’s and CVSS scores Knowledge of compensating controls and mitigating factors.
- Knowledge of Information Security frameworks, guidelines, and standard methodologies.
- Knowledge of the Windows and / or Linux operating systems
- Knowledge and understanding of Cybersecurity controls and logging and monitoring tools.
- Ability to expertly interact with all levels of personnel.
- Excellent verbal and written communication skills
- Strong in problem solving and analytical skills.
- Ability to work on multiple projects by prioritizing and results oriented approach.
- Good teammate with flexibility required for support operations.
- Be well versed in the cyber threat landscape; have an advanced understanding and knowledge of what tactics and techniques are being used by adversaries; have an advanced understand and knowledge of what security controls and/or telemetry data is available to detect these tactics and techniques; and be familiar with cyber security incident response terminology, processes, and techniques.
- Moderate to complex investigations (multiple tools) including endpoint, UEBA, public cloud, SAAS and packet analysis.
- Security use case design recommendations for threat detection
- Threat response activities such as quarantining host and other common response playbook activities
- Proactive threat hunting using multiple client tools.
- Process development and documentation.
- Application of threat intelligence to improve detection and response capabilities.
- Extensive experience with the MITRE @ttack framework and associated tactics
- Extensive alert triage and endpoint investigations using technologies such as EDR.
- Phishing analysis
- Malware analysis (does not include reverse engineering)
- MITRE attack framework expertise and understanding of common attack tactics used by threat actors.
- Provide recommendations on tuning of security detection platforms and use cases to improve accuracy of detection.
- Principal resource should have experience in Building use cases (Content Creation) with SIEM tools (any product experience will work)
- This role demands EDR experience towards CrowdStrike, Carbon black, MS Defender, Endgame as NextGen EDR Solutions
- Strong attention to detail and meticulous reporting using Power BI or other similar software and develop IR playbooks.
- Strong knowledge of network security including Firewalls (Palo Alto preferred), intrusion detection systems, load balancers TCP/IP Protocols, network analysis, and network/security applications
- Experience coordinating with multiple teams for rapid incident response and resolution.
- Ability to multi-task, prioritize, and manage time effectively.
- Excellent interpersonal skills and professional demeanor
- Excellent verbal and written communication skills
Preferred Skills:
- Experience in system administration of AD, Microsoft Azure environment, Windows servers, Unix environment.
- Scripting knowledge (PowerShell, java, Perl)
- Knowledge of databases and query language such as SQL