Exp: 2+ years
location: Noida
HCL Software is looking for a Security Operations Centre Analyst. The successful
candidate will combine their natural curiosity with hands-on experience to support all HCL
Software security operation centre (SOC) activities including incident response, threat
hunting and remediation. It is preferred that the Security Operations Analyst has hands-on
experience in enterprise technologies such as Windows, Mac OSX and Linux
operating systems, Identity and Access Management (IAM), Vulnerability Scanners,
Endpoint Detection and Response (EDR) tools, Data Loss Prevention (DLP) tools,
Intrusion Detection and Prevention Systems (IDS/IPS), Next Generation Firewalls
(NGFW), packet capture tools, log correlation and analysis tools (SIEM), antivirus
technologies, Security Orchestration Automation and Response (SOAR) and
malicious code analysis tools.
It is 24x7 operations which includes rotational shift (includes night shift)
Key Responsibilities:
Security monitoring
Operating and maintaining security tools
Incident response and risk mitigation
Threat hunting
Working with the business to remediate adverse events
Development of detection logic and expand the teams detective capability
Ability to work a rotation of 1st, 2nd and 3rd shifts.
Key Skills:
Security Monitoring and Investigations
Monitor, correlate, and analyse HCL Software security events.
Experience in a SIEM solution (Splunk, Exabeam, ArcSight, QRadar) or a data
aggregator (Elastic, etc.)
Provide Tier 1 and Tier 2 incident analysis and response support for real time events
generated by security devices, as well as possible post incident support.
Strong understanding of risk factors/vectors/levels
Report security-related incidents
Perform research on cyber threats.
Incident Response
Ability to create and follow response procedures and playbooks
Work with end users to quickly return them to a productive state
Develop after action reports including root cause analysis
Capability building
Create detection logic aligned to frameworks to expand detective capability.
Assist in mapping the threat landscape and HCL s adversaries to direct detective capabilities
Leverage SOAR and native SIEM tools to automate and increase efficiency.
Mandatory Qualifications
Requires a bachelor?s degree in computer sciences or similar field.
1 to 2 years of experience in IT Security Operations including one or more of the following:
prevention, tool maintenance, monitoring or response.
Desirable CertificationsCEH, Security+, CISSP, AWS Certified SysOps Administrator, CAP,
SSCP, GSEC, GCIH, GCIA, GPEN or other security/cloud vendor certification.

Keyskills: Cyber Security SOC Cyber Threat Siem Tools Dlp
At Emerson, we prioritize a workplace where every employee is valued, respected, and empowered to grow. We foster an environment that encourages innovation, collaboration, and diverse perspectivesbecause we know that great ideas come from great teams. Our commitment to ongoing career development and...