24*7 cybersoc support to customer
Plan, implement, configure, and migrate market-leading cyber security solutions (Qradar, Sentinel, Arbor, Qualys etc)
Creation and implementation of new SIEM use cases (correlation rules), fine tuning, DDOS managed object, Qualys solution
Configuration, onboarding, and parsing of new log sources in SIEM solution, creation of new MO, defining Threosholds in DDOS solution, working on malware analysis, mail analysis, qualys scanning etc
Classification and investigation of alarms from different threat detection platforms and provision of the processed results to our customers
Assessment of the effects of an attack, taking initial measures and making concrete recommendations for action, Improvement of response plans and incident playbooks
Anomaly and attack pattern detection at all stages of the cyber killchain
Tool-based and manual threat hunting to detect attacks after zero-day exploits or vulnerabilities with a potentially severe impact on customer environments become known
Creation of security reports based on the security incidents within the reporting period
Creation of reports and dashboards
Ensure adherence to and implementation of best incident response procedures as well as internal and industry standards
Participation in on-call duty to ensure incident response even outside of business hours
education, qualifications, and certifications
- Degree / Diploma Holders with Cybersecurity knowledge
- Excellent verbal & written communication skills in English language
Skill Set
- Mandatory skill set
- Good hands-on experience on SIEM tools like Qradar, Sentinel
- Knowledge on Microsoft Defender
- Knowledge of DDOS service & mitigation methodology
- Experience on Incident handling & response
- Certification in IBM Qradar SOC Analyst/Administratior, SC-200
- Secondary skill set
- Knowledge on Python, any scripting language
- Malware investigation and reporting
- Forensic investigation of SPAM / Phising email incidents
- Knowledge on Qualys, Crowdstrike will be added advantage