2+ Security Information and Event Management (SIEM) Jobs in Delhi, NCR and Gurgaon | Security Information and Event Management (SIEM) Job openings in Delhi, NCR and Gurgaon
Apply to 2+ Security Information and Event Management (SIEM) Jobs in Delhi, NCR and Gurgaon on CutShort.io. Explore the latest Security Information and Event Management (SIEM) Job opportunities across top companies like Google, Amazon & Adobe.
Role: SOC Analyst
Job Type: Full Time, Permanent
Location: Onsite – Delhi
Experience Required: 1-3 Yrs
Skills Required:
1) Working knowledge across various security appliances (e.g., Firewall, WAF, Web Security Appliance, Email Security Appliance, Antivirus).
2) Experience with SOC Operations tools like SIEM, NDR, EDR, UEBA, SOAR, etc.
3) Strong analytical and problem-solving skills, with a deep understanding of cybersecurity principles, attack vectors, and threat intelligence.
4) Knowledge of network protocols, security technologies, and the ability to analyze and interpret security logs and events to identify potential threats.
5) Scripting skills (e.g., Python, Bash, PowerShell) for automation and analysis purposes.
6) Skilled in evaluating and integrating inputs from people, processes, and technologies to identify effective solutions.
7) Demonstrate a thorough understanding of the interdependencies between these elements and leverages this knowledge to develop comprehensive, efficient, and sustainable problem-solving strategies.
8) Excellent communication skills to articulate complex technical concepts to non-technical stakeholders and collaborate effectively with team members.
9) Ability to prioritize and manage multiple tasks in a dynamic environment.
10) Willingness to stay updated with the latest cybersecurity trends and technologies.
Job Responsibilities:
1) Continuously monitor and Analyze security alerts and logs to identify potential incidents. Analyze network traffic patterns to detect anomalies and identify potential security breaches.
2) Implement correlation rules and create playbooks as per requirements. Continuously update and suggest new rules and playbooks based on the latest attack vectors and insights from public articles and cybersecurity reports.
3) Use security compliance and scanning solutions to conduct assessments and validate the effectiveness of security controls and policies. Suggest improvements to enhance the overall security posture.
4) Utilize deception security solutions to deceive and detect potential attackers within the network.
5) Leverage deep expertise in networking, system architecture, operating systems, virtual machines (VMs), servers, and applications to enhance cybersecurity operations.
6) Work effectively with cross-functional teams to implement and maintain robust security measures. Conduct thorough forensic analysis of security incidents to determine root causes and impact.
7) Assist with all phases of incident response. Develop and refine incident response strategies and procedures to address emerging cyber threats.
8) Perform digital forensics to understand attack vectors and impact. Swiftly respond to and mitigate security threats, ensuring the integrity and security of organizational systems and data.
9) Professionally communicate and report technical findings, security incidents, and mitigation recommendations to clients.
About Company
Innspark is the fastest-growing Deep-tech Solutions company that provides next-generation products and services in Cybersecurity and Telematics. The Cybersecurity segment provides out-of-the-box solutions to detect and respond to sophisticated cyber incidents, threats, and attacks. The solutions are powered by advanced Threat Intelligence, Machine Learning, and Artificial Intelligence that provides deep visibility of the enterprise’s security.
We have developed and implemented solutions for a wide range of customers with highly complex environments including Government Organizations, Banks & Financial institutes, PSU, Healthcare Providers, Private Enterprises.
Website: https://innspark.in/
• Handling critical incidents/escalations, reviewing incidents and tracking towards closure • Good experience in SIEM tools, event logging and event analysis • Good knowledge in enterprise security products like Firewalls, IPS, Web/content Filtering tools, Compliance tools • Team Management, performance monitoring and prepare reports on weekly, monthly basis and share to stakeholders as needed • Good knowledge about common security attacks, targeted attacks • Good experience in forensic analysis, Packet Analysis tools like Wireshar • Assisting, mentoring L2/L3 analysts and groom them to move to next level • Contribute to continue monitoring and improvement of security posture of the organization • Having experience of managing team of 25+ team members across multiple locations.
|
• Primarily responsible for security event monitoring, management and response • Ensure incident identification, assessment, quantification, reporting, communication, mitigation and monitoring • Revise and develop processes to strengthen the current Security Operations Framework, Review policies and highlight the challenges in managing SLAs • Responsible for team & vendor management, overall use of resources and initiation of corrective action where required for Security Operations Center • Management, administration & maintenance of security devices under the purview of SOC which consists of state-of-the art technologies • Perform threat management, threat modeling, identify threat vectors and develop use cases for security monitoring • Responsible for integration of standard and non-standard logs in SIEM • Creation of reports, dashboards, metrics for SOC operations and presentation to Sr. Mgmt. • Co-ordination with stakeholders, build and maintain positive working relationships with them
|