Designation : SOC Analyst
Location : Bangalore
Experience : 4+ years
Mode : Work from office (WFO) { 5 days working }
Skills Required :
- EDR / XDR
- DLP
- SIEM
- L2 level skills such as threat hunting, etc.
Good to have (certifications) : EDR/XDR, CEH/SANS GIAC/GCIA/GCIH, CISSP
JOB DESCRIPTION :
• Excellent hands-on experience on endpoint security technology such as EDR or XDR technologies (Preferred SentinelOne) like CrowdStrike, sentinelOne, Carbonblack etc. and hands-on experience in DLP solutions (Preferred Forcepoint DLP) and hands-on experience in Vulnerability management.
• Strong skills on incident handling, threat analysis, process analysis using EDR and decide recommendations.
• Must have administrative skills in EDR such as adding new hosts to EDR, upgradation of EDR agents and manager, configuration changes, policy changes, writing rules to find threats, trouble
• Must have experience in DLP administrative and analytical skills such as troubleshooting agents which are not reporting, writing policies, and analysing DLP incidents.
• Identify repetitive issues and suggest for permanent resolution (tuning etc)
• Good Understanding of cyberkill-chain, Mitre ATT&CK framework.
• Understanding security reports.
• Should have good communication skills which is required for client interaction.
• Should have L2 level skills such as threat hunting etc using EDR tools.
• Knowledge of servers and networking. Good knowledge of cyber- attacks and cyber threats.
• Should possess sound understanding in information security fundamentals, systems security, and controls such as Vulnerability Assessment.
• Contributes to team effort by accomplishing related results as needed.
Education & Experience:
• Bachelor’s degree in any Stream, Information Security, or equivalent education or work experience.
• 3+ years of prior relevant experience in EDR, Antivirus or XDR.
• Administrative experience in EDR or XDR.
• Administrative experience DLP.
• Knowledge in Endpoint compliance, network device compliance.
• Understanding of Enterprise threat Vulnerability Management, Understanding of configuration management.
• Provision of Critical Incident Response Report and lessons learnt to key stakeholders.