Your browser does not support javascript! Please enable it, otherwise web will not work for you.

SOC Manager @ Sisa Information

Home > IT Security

 SOC Manager

Job Description


Roles and Responsibilities:

  • Serve as an escalation point for all Threat Analysts on shift for complex/unusual alerts/cases/requests/incidents.
  • Daily review of security alerts/logs with follow-up on any suspicious activity.
  • Basic understanding of Forensics / hands on experience of sandboxing
  • Hands on experience and rule revisions of security solutions on phishing emails
  • Review cases escalated by Threat Analysts to investigate, respond and remediate; Ensure an effective flow of escalated cases; and Conduct quality assurance of cases.
  • Mentoring associate team members and contribute to streamlining SOC operations for continuous improvement.
  • To ensure an escalate flow of Incident Management System; Assist the team in developing the incident response strategy and then creating and assigning response actions to Threat Analysts as needed.
  • Perform investigation of network and hosts/endpoints for malicious activity, to include analysis of packet captures, and assist in efforts to detect, confirm, contain, remediate, and recover from attacks.
  • Proactively monitor, identify, and analyze complex internal and external threats, including viruses, targeted attacks and unauthorized access, and mitigate risk to IT systems.
  • Work in concert with team members, Information Security engineering, and relevant Subject Matter
  • Experts to process, analyze and drive the remediation of identified IT related vulnerabilities Responsible to follow the IT Security Incident Response policies and tools.
  • Contribute to Information Security policies, standards, and supporting documentation.
  • Root cause analysis, troubleshoot complex issues with existing security and privacy protection protocols.
  • Responding to inbound security monitoring alerts, emails, and inquiries from the organization.
  • Providing support for Incident Response, including evidence collection, documentation, communications, and reporting.
  • Maintaining and improving standard operating procedures and processes
  • Responsible for onboarding the clients; both in cloud and on-prem.

Mandatory Skills required for the role:

  • Proven work experience as a Technical Support Engineer, Operation, System Admin or similar role.
  • Hands on working Experience on any SIEM tool (Qradar /Alien Vault/ McAfee ESM/DNIF).
  • 6 months to 1 year of L3 experience and team management is required.
  • Team Management and Network Management / Operations Management.
  • Good understanding of database, security products (Firewall, IDS/IPS, AV, WAF) and other security products.

Desired Skills:

  • Networking concepts
  • Information security concepts
  • Windows and troubleshooting and domain knowledge
  • Linux and troubleshooting and domain knowledge
  • Data Analysis
  • Data Analytics for Security

Job Classification

Industry: IT Services & Consulting
Functional Area / Department: IT & Information Security
Role Category: IT Security
Role: Cyber Security
Employement Type: Full time

Contact Details:

Company: Sisa Information
Location(s): Bengaluru

+ View Contactajax loader


Keyskills:   Incident Response Threat Detection SOC

 Job seems aged, it may have been expired!
 Fraud Alert to job seekers!

₹ Not Disclosed

Similar positions

Soc Analyst 2

  • NTT DATA
  • 4 - 7 years
  • Noida, Gurugram
  • 13 days ago
₹ -12 Lacs P.A.

Banking Client Looking For Project Manager Cybersecurity-uk Shift-pune

  • Top 5 Cmm Level
  • 10 - 20 years
  • Pune
  • 9 days ago
₹ 25-40 Lacs P.A.

Associate SOC Engineer

  • Futurism Technologies
  • 0 - 1 years
  • Pune
  • 28 days ago
₹ Not Disclosed

Soc Analyst

  • Cloudstrats
  • 2 - 7 years
  • Delhi, NCR
  • 1 month ago
₹ Not Disclosed

Sisa Information

SISA information security pvt ltd