Job Description
Role Summary:
Analyst part of Zalaris CSOC is responsible for monitoring, logging, detecting, and isolating incidents and the management of the organizations secured infrastructure. 1 year of experience in cyber security operations, having hands on experience in Incident response, Investigation in a large enterprise IT environment.
Responsibilities:
Cyber Security Operations Center: (24*7 Monthly Rotation)
- Perform Security Event monitoring & 1st level response, Investigation analysis and troubleshooting.
- Track incident to closure as per SOP
- Escalation of incident to Shift Lead for non-standard incident.
- Respond, follow up and handle the security incidents within SLA.
- Escalation and follow up as per SLA
- Flexible to work in 24X7 SOC environment.
- Assist L-2, L-3 to perform Investigation
- Provide expert guidance on cyber security best practices to stakeholders within the organization.
Experience & Skills:
- Hands on SIEM (Splunk, ELK), EDR (Crowd strike), Microsoft Office 365 Security
- Good understanding of cloud security and tools (Azure/AWS etc.)
- Good understanding of various cyber attacks
- Understanding of security fundamentals and principles, MITRE Framework techniques, TTP, IOC hacking tools etc.
What we Offer:
- International working environment
- Friendly and supporting colleagues
- Competitive base salary
- Several additional benefits, like:
- Health insurance
- Team building events
Role Summary:
Analyst part of Zalaris CSOC is responsible for monitoring, logging, detecting, and isolating incidents and the management of the organizations secured infrastructure. 1 year of experience in cyber security operations, having hands on experience in Incident response, Investigation in a large enterprise IT environment.
Responsibilities:
Cyber Security Operations Center: (24*7 Monthly Rotation)
- Perform Security Event monitoring & 1st level response, Investigation analysis and troubleshooting.
- Track incident to closure as per SOP
- Escalation of incident to Shift Lead for non-standard incident.
- Respond, follow up and handle the security incidents within SLA.
- Escalation and follow up as per SLA
- Flexible to work in 24X7 SOC environment.
- Assist L-2, L-3 to perform Investigation
- Provide expert guidance on cyber security best practices to stakeholders within the organization.
Experience & Skills:
- Hands on SIEM (Splunk, ELK), EDR (Crowd strike), Microsoft Office 365 Security
- Good understanding of cloud security and tools (Azure/AWS etc.)
- Good understanding of various cyber attacks
- Understanding of security fundamentals and principles, MITRE Framework techniques, TTP, IOC hacking tools etc.
What we Offer:
- International working environment
- Friendly and supporting colleagues
- Competitive base salary
- Several additional benefits, like:
- Health insurance
- Team building events
Apply for this Position
Ready to join ? Click the button below to submit your application.
Submit Application