Role & responsibilities
Experience in event monitoring, correlation, event analysis, investigate and remediation of security events
Good knowledge and experience of Security Monitoring tools
Good knowledge and experience of Cyber Incident Response
Good knowledge and experience of Cyber Threat Intelligence and the role it plays
Awareness of Cyber security issue and remediation
Awareness of Attack & Penetration Testing / Ethical Hacking
Use strong TCP/IP networking skills to perform network troubleshooting to isolate and diagnose common network problems
Resolve problems independently and understand escalation procedure
Interface with clients to understand the quality aspects and expectations, as needed
Monitoring security events from the various SOC entry channels (Alerts, Tickets, and Email) based on the security event severity, escalate to Vendor/Customer/Product Development as appropriate to perform further investigation and resolution
Follow ITIL practices regarding incident, problem and change management.
Staying up-to-date with emerging security threats including applicable regulatory security requirements.
Recommend enhancements to SOC security process, procedures and policies.
Communicate effectively with customers, teammates, and management.
Ability to quickly adapt and master new technology/processes as per the business/partner requirement.
Mentoring the team to enhance their skills on the Security Domain
Relevant professional experience including working knowledge or high level awareness of the following technologies:
Log Management and Event Management
Firewalls, Routers (e.g. Cisco, IPS, Palo Alto etc.)
Windows Management (e.g., Active Directory, Group Policy Objects, etc.)
Operating Systems (e.g. Windows Server 2008/2012, CentOS Linux, OSX, etc.
Understanding of different compliances.
Working experience and exposure on SIEM tool (eg : Splunk)"
Keyskills: Mitre Attack SOC Splunk Vulnerability Scanning Security Operations Center