Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
Job Location | Pune |
Education | Any Graduate - Any Specialization |
Salary | Not Disclosed by Recruiter |
Industry | IT-Software / Software Services |
Functional Area | IT Software - Network Administration , Security |
EmploymentType | Full-time |
Acknowledge, analyse and validate incidents triggered from correlated events through SIEM solution Acknowledge, analyse and validate incidents received through other reporting mechanisms such as email, phone calls, management directions, etc. Collection of necessary logs that could help in the incident containment and security investigation Escalate validated and confirmed incidents to SOC Analyst Undertake first stages of false positive and false negative analysis Understand the structure and the meaning of logs from different log sources such as FW, IDS, Windows DC, Cisco appliances, AV and antimalware software, email security etc. Understand the subject of Carbon Black alarms Open incidents in SecurityHQ (ITSM Platform) to report the alarms triggered or threats detected. Analyst should properly include for each incident on SecurityHQ all details related to the logs, alarms and other indicators identified in accordance with the intervention protocol of each client and the SLA. Track and update incidents and requests based on clients updates and analysis results Properly log client requests and change requests in SecurityHQ Report infrastructure issues to the Si support team. Report false positive alarms from Carbon Black and LogRhythm to L2 SOC analysts Generate weekly reports from LogRhythm platform and send it to L2 SOC analysts for review Other duties related to the position Knowledge and hands-on experience in management of IDS/IPS, Firewall, VPN, and other security products Experience in Security Information Event Management (SIEM) tools, creation of basic co-relation rules, and administration of SIEM Should have expertise on TCP/IP network traffic and event log analysis Knowledge and hands-on experience in LogRhythm, QRadar, Arcsight, Novell Sentinel or any other SIEM tool Knowledge of ITIL disciplines such as Incident, Problem and Change Management Education Requirements & Experience Bachelors in Computer Science/IT/Electronics Engineering, M.C.A. or equivalent University degree Minimum of 1 year of experience in the IT security industry, preferably working in a SOC/NOC environment Certifications: CCNA, CCSP, CEH
Keyskills :
Ccsp SIEM Qradar IP Networking Ceh IPS Firewall SOC VPN Log Analysis Cyber Security Arcsight
SECINTEL CONSULT TECHNOLOGY PRIVATE LIMITED Si is a leading Managed Security Services Provider and we are driven by a desire to offer our clients the highest degree of protection against today's cyber threats. We protect our clients 24 x 7 and we combine people, technology and processes to deliver a true enterprise grade experience to our clients.
We are searching for a SOC Engineer who will be responsible for monitoring, reporting, and escalating events to our SOC Analysts.The primary function of this position is to monitor the analytics tools and perform alert management and initial incident qualification.This role reports to the SOC Team Lead.