Key Responsibilities of the Position. Learn to navigate and interpret security documentation, including incident response plans, standard operating procedures (SOPs), and security policies Acquire knowledge of fundamental cybersecurity principles, such as threat vectors, attack techniques, and common vulnerabilities. Learn incident handling procedures, including initial assessment, containment, eradication, and recovery steps. Learn to leverage threat intelligence feeds and sources to enhance threat detection capabilities within the SOC. Monitoring of security incidents in 24x7 rotational shifts. Detect Incidents by monitoring the SIEM console, Rules, Reports and Dashboards. Ensure incidents are reported as tickets using ticketing tool and handled as per SLA defined for each customer. Monitor the SIEM console resources to identify any anomalies. Recognize potential, successful, and unsuccessful intrusion attempts/compromises thorough review and analysis of relevant event detail and summary information. Commit to continuous self-improvement by exploring additional cybersecurity resources, online courses, and certifications. Report the confirmed incidents to customers / L2 team as the case may be. Track incident status to closure as per Standard Operating Procedures (SOP) defined. First level Triage of events as provided in SOP and automate analysis if possible. Monitor the health of the SIEM tool and create incidents to the engineering team for their action. Assist L2 analysts in incident workflow whenever requested. Key Skills Required Basic knowledge of Linux and windows process commands Basic knowledge in Networking/Cyber security Understanding of any SIEM tool is an advantage CEH/CCNA will be a plus,
Employement Category:
Employement Type: Full timeIndustry: IT Services & ConsultingRole Category: Not SpecifiedFunctional Area: Not SpecifiedRole/Responsibilies: Soc Trainee Job In Valuementor At Other Kerala