logo

JobNob

Your Career. Our Passion.

Security Operations Center Analyst -L2/L3


Incedo Inc.


Location

Gurgaon | India


Job description

Soc L2, L3 support Threat Hunting Gurgaon Location Mandatory Skill :- Q radar / Sentinal Timings 24/7 Shift Immidiate Joiners Only

Share your resume :- [email protected]

Profile Name: SOC L2 /L3 :_ Incident management -Hunter/Threat Hunter/Threat Analyst/Threat Researcher

Responsibilities:

Threat Hunting: Proactively search for potential security threats and anomalies within your organization's network and systems using various data sources, including

QRadar / Sentinal Event Analysis: Perform in-depth analysis of security events and incidents to determine their nature, impact, and potential risks. Understand source and destination IP addresses, protocols, payloads, and attack patterns. Triage and Investigation: Conduct thorough investigations to identify true positives from false positives, prioritize incidents, and recommend appropriate actions. Custom Rule Creation: Create and customize rules within QRadar to improve the accuracy of threat detection and reduce false positives. This may involve writing custom correlation rules or adjusting existing ones. Security Tool Expertise: Familiarity with other security tools and technologies, in addition to QRadar, such as

SIEM solutions, EDR

(Endpoint Detection and Response) tools, and network security devices. Threat Intelligence: Utilize threat intelligence feeds and sources to stay informed about emerging threats and vulnerabilities. Documentation and Reporting: Maintain detailed records of investigations, findings, and actions taken. Generate reports for management and compliance purposes. Collaboration: Work closely with

L2 and L3

analysts to provide guidance and mentorship, helping them improve their analysis skills.

Qualifications: Bachelor's degree in a related field (e.g., Cybersecurity, Information Technology). Relevant industry certifications, such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM), are a plus. Previous experience in a SOC environment, preferably in a threat hunting or incident response role. Proficiency in IBM QRadar and other security tools. Strong analytical and problem-solving skills. Excellent communication and teamwork skills. Knowledge of cybersecurity best practices and emerging threats. Scripting and programming skills may be advantageous for custom rule creation and automation. When you share this job description with recruitment, they should be able to use these details to find candidates with the specific skills and experience you need to enhance your SOC team's capabilities. Be sure to also specify any additional qualifications or requirements unique to your organization's environment and industry.


Job tags



Salary

All rights reserved