Security Operations Center Analyst

  • Kochi
  • Soffit Infrastructure Services (p) Ltd

Job brief

The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you.


Main Responsibilities

  • Tier 2 SOC analysts are incident responders, remediating serious attacks escalated from Tier 1, assessing the scope of the attack, and affected systems, and collecting data for further analysis.
  • Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments (CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks.
  • Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone), based on the security event severity and suspicious activities, escalate to managed service support teams, tier 3 information security specialists, and/or customer as appropriate to perform further investigation and resolution.
  • Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats.
  • Analyse the Events & incidents and identify the root cause.
  • Assist in keeping the SIEM platform up to date and contribute to security strategies as an when new threats emerge.
  • Staying up to date with emerging security threats including applicable regulatory security requirements.
  • Bring enhancements to SOC security process, procedures, and policies.
  • Document and maintain customer build documents, security procedures and processes.
  • Document incidents to contribute to incident response and disaster recovery plans.
  • Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate.
  • Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc.
  • Other responsibilities and additional duties as assigned by the security management team or service delivery manager


Requirements:

  • Min 3 Years’ Experience as SOC Analyst – (Experience in SIEM Tool ELK & Wazuh preferable)
  • Process and Procedure adherence
  • General network knowledge and TCP/IP Troubleshooting
  • Ability to trace down an endpoint on the network, based on ticket information
  • Familiarity with system log information and what it means
  • Understanding of common network services (web, mail, DNS, authentication)
  • Knowledge of host-based firewalls, Anti-Malware, HIDS
  • Understanding of common network device functions (firewall, IPS/IDS, NAC)
  • General Desktop OS and Server OS knowledge
  • TCP/IP, Internet Routing, UNIX / LINUX & Windows.
  • Excellent written and verbal communication skills


Skills:

  • Excellent event or log analytical skills
  • Proven experience as IT Security Monitoring or similar role
  • Exceptional organizing and time-management skills
  • Very good communication abilities
  • ELK, Wazuh, Splunk, ArcSight SIEM management skills
  • Reporting

Insert your email to proceed to Soffit Infrastructure Services (p) Ltd's job offer

or