Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
Job Location | Chennai |
Education | Not Mentioned |
Salary | Not Disclosed |
Industry | Education / Training |
Functional Area | General / Other Software |
EmploymentType | Full-time |
The security analyst monitors security events from the various SOC entry channels (SIEM, , Dark Trace (IDS/IPS) Tickets, Email and Phone), based on the security event severity, escalate to managed service support teams, tier 2 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Recommend enhancements to SOC security process, procedures and policies. Participate in security incident management and vulnerability management processes Participate in evaluating, recommending, implementing, and troubleshooting security solutions and evaluating IT security of the new IT Infrastructure systems. Works as part of a team to ensure that corporate data and technology platform components are safeguarded from known threats Prior experience in working with Q-Radar/ArcSight/Dark Trace / Any other 3rd IDS/IPS monitoring Communicate effectively with customers, teammates and management Provide input on tuning and optimization of security systems Salary: Not Disclosed by Recruiter Industry: IT-Software / Software Services Employment Type: Full Time, Permanent,
Keyskills :
analysis it trace email soc software security anagemen vulnerabilitymanagement itsecurity informationsecurity itinfrastructure servicesupport tier2 incidentmanagement securityanalysis optimizationstrategies