Search by job, company or skills

ValueMentor

SOC L1

Early Applicant
  • a month ago
  • Be among the first 50 applicants

Job Description

Description :

As a Security Analyst (Tier 1), you will be responsible for monitoring in-house and client security alerts/incidents while working in shifts.
Primary responsibilities include monitoring SIEM platform triaging alerts, work to cover 24/7 service with (8+1) hour work shifts.
Participating in threat-actor based investigations, suggesting new detection methodologies and providing expert support to alerting, incident response and monitoring functions.
Day to day operations involves dealing with SIEM Monitoring, various reporting and security incident handling.

Requirements :


Experienced with data analysis, centralized logging (Splunk. QRadar, ELK, Kafka, rsyslog, etc.);
Scripting and development skills (BASH, Perl, Python or Java) with strong knowledge of regular expressions.
Capability to develop use cases or additional detection capabilities based on the SIEM query language, understanding of incident response.
Skill to analyze large data sets and unstructured data, manually or using tools to identify trends and anomalies indicative of malicious activity.
Linux incident handling skill would be ideal
Knowledge of current security threats, techniques and landscape, and dedicated desire to research current information security landscape.
Experience in analyzing networking protocols, firewalls, host and network IPS, Linux, virtualization containers technologies, databases, web servers.

More Info

Industry:Other

Function:Security

Job Type:Permanent Job

Skills Required

Login to check your skill match score

Login

Date Posted: 25/10/2024

Job ID: 98039941

Report Job

About Company

Follow

Hi , want to stand out? Get your resume crafted by experts.

Last Updated: 15-11-2024 00:43:08 PM