SR. SECURITY ANALYST

26LPA Yearly
SR. SECURITY ANALYST
  • SR. SECURITY ANALYST @ CLOUDERA
  • Pune / MAHARASHTRA
Job Description

The primary function of an L2 Analyst is to ensure that the SOC team is performing its functions as required and to trouble shoot problematic incidents and events. Responsibilities ¿ Track incident detection and closure ¿ Execute risk hunting activities ¿ Undertake forensic investigations ¿ Act as subject matter expert and expert witness where required ¿ General intelligence advisories and delegate intelligence aggregation tasks to L1 ¿ Generate new use cases for emerging threats ¿ Validation of security incidents ¿ Conduct audits of logging and correlation ¿ Conduct monthly security use case review and correlation audits ¿ Use of sandbox, honeypot, analytics tools and security testing ¿ Escalation management ¿ Ensure process compliance ¿ Ensure quality of investigations and notification and direct L1 accordingly ¿ Report deviations to SOC manager and L3 ¿ Ensure SLA compliance for projects within remit ¿ Perform deep analysis to security incidents to identify the full kill chain ¿ Provide knowledge to L1 such as guides, cheat sheets etc ¿ Follow up with the recommendations to the client to contain an incident or mitigate a threat ¿ Respond to incident escalations and provide solid recommendations ¿ Update aging incidents and requests ¿ Track SOC performance in terms of SLAs and incident quality ¿ Conduct threat hunting exercises on SIEM and EDR platforms ¿ Develop and improve processes for monitoring and incident qualification ¿ Perform quarterly evaluation for L1 analysts and report feedback to RM ¿ Perform threat intelligence analysis and investigations. Search on the dark web and use other platforms such as RF to identify intelligence indicators or threats for a specific client. Essential Skills ¿ Experience with Security Information Event Management (SIEM) tools, creating advanced co relation rules, administration of SIEM, system hardening, and Vulnerability Assessments ¿ Should have expertise on TCP/IP network traffic and event log analysis ¿ Knowledge and hands on experience with Qradar (preferred), Arcsight, Mcafee epo, NetIQ Sentinel or any SIEM tool ¿ Knowledge of ITIL disciplines such as Incident, Problem and Change Management ¿ Configuration and Troubleshooting experience on Checkpoint, Cisco, Fortigate, PaloAlto and Sonicwall firewalls would be an added advantage. ¿ Knowledge and hands on experience of implementation and management of IDS/IPS, Firewall, VPN, and other security products Education ¿ Bachelors in computer science/IT/Electronics Engineering, M.C.A. or equivalent University degree Requirements & ¿ Minimum of 4 6 years of experience in the IT security industry, preferably working in a SOC Experience environment ¿ Certifications: GCIH, CCNA, CCSP, CEH Additional ¿ Strong verbal and written English communication. Desired Skills ¿ Strong interpersonal and presentation skills ¿ Ability to work with minimal levels of supervision. ¿ Willingness to work in a job that involves 24/7 operations