Your browser does not support javascript! Please enable it, otherwise web will not work for you.

SOC l2 Analyst - Bengaluru/Bangalore,Hyderabad @ Cirruslabs

Home > IT Security

 SOC l2 Analyst - Bengaluru/Bangalore,Hyderabad

Job Description


Candidates have to possess min 4 years of relevant experience as a SOC Analyst L2.
Shift timings: 24/7 rotational shifts- 6AM to 3PM IST, 2PM to 11PM IST, 9PM to 6AM IST.

Location - Hyderabad, Bangalore, Gurgaon and Chennai (Hybrid Mode of work)
Experience - 4-6 Years
24*7 Rotational Shifts

Job title: SOC Level 2 Consultant

Work you'll do
As a Fusion Level 2 Consultant you will support the Security Operations Center (SOC) as the first line of defense to identify potential information security incidents.
Monitor client sources of potential security incidents, health alerts with monitored solutions and requests for information. This includes the monitoring of real-time channels or dashboards, periodic reports, email inboxes, helpdesk or other ticketing system, telephone calls, chat sessions.
Follow client and incident-specific procedures to perform triage of potential security incidents to validate and determine needed mitigation.
Escalate potential security incidents to client personnel, implements countermeasures in response to others, and recommend operational improvements.
Keep accurate incident notes in case management system.
Maintain awareness of the client's technology architecture, known weaknesses, the architecture of the security solutions used for monitoring, imminent and pervasive threats as identified by client threat intelligence, and recent security incidents.
Provide advanced analysis of the results of the monitoring solutions, asses escalated outputs and alerts from Level 1 Analysts.
Perform web hunting for new patterns/activities.
Advise on content development and testing.
Provide advice and guidance on the response action plans for information risk events and incidents based on incident type and severity.
Ensure that all identified events are promptly validated and thoroughly investigated.
Provide end-to-end event analysis, incident detection, and manage escalations using documented procedures.
Devise and document new procedures and runbooks/playbooks as directed.
Assist the Shift Leads and fulfill Shift Lead responsibilities in their absence.
Maintain monthly Service Level Agreements (SLAs).
Maintain compliance with processes, runbooks, templates and procedures-based experience and best practices.
Assist Cyber Hunting team with advanced investigations as needed.
Provide malware analysis (executables, scripts, documents) to determine indicators of compromise, and create signatures for future detection of similar samples.
Continuously improve the service by identifying and correcting issues or gaps in knowledge (analysis procedures, plays, client network models), false positive tuning, identifying and recommending new or updated tools, content, countermeasures, scripts, plug-ins, etc.
Perform peer reviews and consultations with Level 1 analysts regarding potential security incidents.
Serve as a subject matter expert in at least one security-related area (e.g. specific malware solution, python programming, etc.)
Actively seek self-improvement through continuous learning and pursuing advancement to a SOC Shift Lead.
Provide shift status and metric reporting.
Support weekly Operations calls.
Adhere to internal operational security and other policies.
Perform light project work as assigned.

Required skills
4-6 years working in a SOC and/or strong security technology operations experience.
Certified Information Systems Security Professional (CISSP), Certification in Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH) or equivalent.
Able to work shifts on a rotating basis for 24/7 support of clients.
Experience in security technologies such as: Security information and event management (SIEM), IDS/IPS, Data Loss Prevention (DLP), Proxy, Web Application Firewall (WAF), Endpoint detection and response (EDR), Anti-Virus, Sandboxing, network- and host- based firewalls, Threat Intelligence, Penetration Testing, etc. Knowledge of Advanced Persistent Threats (APT) tactics, technics and procedures.
Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc.
Understanding of common network infrastructure devices such as routers and switches.
Understanding of basic networking protocols such as TCP/IP, DNS, HTTP.
Basic knowledge in system security architecture and security solutions.

Preferred skills
Excellent interpersonal and organizational skills.
Excellent oral and written communication skills.
Strong analytical and problem-solving skills.
Self-motivated to improve knowledge and skills.
A strong desire to understand the what as well as the why and the how of security incidents.

Qualification
Bachelor's degree is required. Ideally in Computer Science, Cyber Security, Information Security, Engineering, Information Technology.


Job Classification

Industry: IT Services & Consulting
Functional Area: IT Services & Consulting
Role Category: IT Security
Role: IT Security - Other
Employement Type: Full time

Contact Details:

Company: Cirruslabs
Location(s): Hyderabad

+ View Contactajax loader


 Fraud Alert to job seekers!

₹ 12-16 Lacs P.A

Similar positions

Remote- Human Resource Internship (Part Time)

  • GAO Tek
  • 0 - 5 years
  • Delhi, NCR
  • 27 days ago
₹ Not Disclosed

Associate Architect - Security Testing - Pune

  • Icertis
  • 9 - 14 years
  • Pune
  • 28 days ago
₹ 4-9 Lacs P.A.

Cybersecurity Advisor - Senior - Pune

  • Cummins
  • 5 - 10 years
  • Pune
  • 29 days ago
₹ 16-20 Lacs P.A.

Remote- Human Resource Internship (Part Time)

  • GAO Tek
  • 0 - 5 years
  • Delhi, NCR
  • 29 days ago
₹ 2-6 Lacs P.A.

Cirruslabs

we are a Digital Transformation company