Job Description
Key Responsibilities
• Work collaboratively with Account Manager
• Track incident detection and closure
• Act as subject matter expert and expert witness where required
• Generate new use cases for emerging threats
• Conduct incident response coordination with customer
• Validation of security incidents
• Conduct audits of logging and correlation
• Conduct monthly security use case review and correlation audits
• Escalation management
• Ensure process compliance ans SLA compliance
• Ensure quality of investigations and notification and direct L2 and L1 accordingly
• Report deviations to SOC manager and L3
• Perform deep analysis to security incidents to identify the full kill chain
• Set up weekly meeting to review the weekly reports with the client
• Respond to clients’ requests, concerns and suggestions
• Follow up with the recommendations to the client to contain an incident or mitigate a
threat
• Respond to incident escalations and provide solid recommendations
• Update aging incidents and requests
• Track SOC performance in terms of SLAs and incident quality
• Conduct threat hunting exercises on SIEM and EDR platforms
• Perform quarterly evaluation for L1 and L2 analysts and report feedback to SI management
Essential Skills
• Experience with Security Information Event Management (SIEM) tools
• Good understanding of SIEM co-relation rules
• Should have expertise on TCP/IP network traffic and event log analysis
• Knowledge and hands-on experience with any SIEM tool, \"SPLUNk \"
• Knowledge and handon experience on any EDR tool, \"Crowdstrike, MS\"
• Good Understanding of Cloud Services. E.g. AWS Guard Duty, AWS Cloud Trail, AWS Cloud
Watch etc
• Good understanding of system hardening, and Vulnerability Assessments
Apply for this Position
Ready to join ? Click the button below to submit your application.
Submit Application