Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
4.0 - 6.0 years
4 - 6 Lacs
Bengaluru / Bangalore, Karnataka, India
On-site
Here's a reframed job description for a SOC L2/L3 Professional, tailored to your specifications: SOC L2/L3 Professional Location: Bengaluru Experience: 4-6 Years We are looking for a skilled and dedicated SOC L2/L3 Professional with 4-6 years of hands-on experience in a Security Operations Center (SOC) or security technology operations. Based in Bengaluru , you will play a critical role in our 24/7 security defense, contributing to the detection, analysis, and response to sophisticated cyber threats. You will be responsible for advanced incident analysis, threat hunting, and leveraging a wide array of security technologies to safeguard our clients environments. This role requires flexibility to work rotating shifts to ensure continuous support. Key Responsibilities: Perform advanced security incident analysis and response, escalating critical issues to relevant teams and management. Utilize Security Information and Event Management (SIEM) tools to monitor security alerts, investigate anomalies, and identify potential threats. Conduct in-depth analysis of security events from various sources including IDS/IPS, EDR, DLP, WAF, Proxies, and firewalls. Contribute to threat hunting initiatives using threat intelligence to proactively identify hidden threats and vulnerabilities. Operate and optimize security technologies such as Endpoint Detection and Response (EDR), Anti-Virus solutions, Sandboxing, and network/host-based firewalls. Understand and analyze Advanced Persistent Threat (APT) tactics, techniques, and procedures (TTPs) to enhance detection capabilities. Recognize and interpret various attack activities, including network probing/scanning, DDoS attacks, and malicious code activity. Collaborate with internal and external teams during incident response, providing technical expertise and guidance. Document incident details , remediation steps, and contribute to the continuous improvement of SOC processes and playbooks. Maintain up-to-date knowledge of the latest cybersecurity threats, vulnerabilities, and industry best practices. Required Qualifications: 4-6 years of demonstrable experience working in a Security Operations Center (SOC) or in a strong security technology operations role. Bachelor's degree in Computer Science, Information Security, or a related field is preferred. Willingness and ability to work shifts on a rotating basis to provide 24/7 support for clients. Mandatory Skills & Certifications: Certifications (one or more highly preferred): Certified Information Systems Security Professional (CISSP) GIAC Certified Intrusion Analyst (GCIA) GIAC Continuous Monitoring (GMON) Certified Ethical Hacker (CEH) Or equivalent industry-recognized security certifications. Security Technologies Expertise: Security Information and Event Management (SIEM) platforms. Intrusion Detection/Prevention Systems (IDS/IPS). Data Loss Prevention (DLP) solutions. Proxy and Web Application Firewalls (WAF). Endpoint Detection and Response (EDR) tools. Anti-Virus and Sandboxing technologies. Network- and host-based firewalls. Threat Intelligence platforms and their application. Exposure to Penetration Testing concepts and methodologies. Threat Intelligence Knowledge: Understanding of Advanced Persistent Threats (APT) tactics, techniques, and procedures (TTPs). Attack Recognition: Strong understanding of common attack activities such as network probing/scanning, DDoS attacks, and malicious code activity. Networking Fundamentals: Solid understanding of common network infrastructure devices (routers, switches) and basic networking protocols (TCP/IP, DNS, HTTP). Security Architecture: Basic knowledge in system security architecture and security solutions.
Posted 2 weeks ago
3.0 - 5.0 years
4 - 6 Lacs
Hyderabad
Work from Office
Position and Key Responsibilities At RSM, analysts work with large and small companies in variety of industries. They develop strong working relationships with their peers within the security operations center (SOC) while learning their clients businesses and challenges facing their organizations. Analysts work as part of a broader team under the direction of more senior analysts, threat hunters, shift leads, intelligence analysts and SOC managers in support of multiple clients. Working in a mutually respectful team environment helps our analysts perform at their best and integrate their career with their personal life. You will have the opportunity to: Role Responsibilities: Investigate security incidents using SIEM tools, automation, and other cybersecurity technologies (i.e. ServiceNow, Stellar Cyber, Hyas Insight and DNS Protect, sentinel One, ELK Stack, Virus total, Shodan, NetFlow, Passive DNS, Silobreaker, Tenable.io, Hatching Triage Sandbox) Analyze, escalate, and assist in remediation of critical security incidents. Improve and challenge existing processes and procedures in a very agile and fast-paced information security environment serving multiple clients Process IDS alerts and identifying incidents and events in customer data. Setup and execution and analysis of vulnerability scans Perform advanced analysis and investigation into alerts as they are identified Performing initial basic malware analysis utilizing automated means (static and dynamic sandbox analysis or other available tools) Incident intake, ticket updates and reporting of cyber events and threat intelligence Understanding, identifying, and researching indicators of compromise (IOCs) from a variety of sources such as threat intelligence reports and feeds Writing incident reports, process documentation, and interact with clients as required Transcribe and implement atomic indicators into a monitoring environment. Consume policy documentation and determine applicability in a network. Work with protocols at layers 2 and higher in the OSI model, to include ARP TCP, UDP, ICMP, DNS, Telnet, SSH, HTTP, SSL, SNMP, SMTP, and other common protocols that use well-known ports. Develops the playbooks to respond and recovery from various attacks/incidents. Drives the automation efforts focused on the closing cases, responding to Cyber events and analyzing data required to enable efficient response activities. Processing of Cyber Threat Intel that is used across RSM detection platforms to understand and prepare for potential threats. Threat intel is heavily used across RSM platforms drive issue prioritization. Open to working shifts in a 24x7 operations environment. Qualifications and Experience: Minimum B.A. or B.S. degree or equivalent from an accredited university by the time employment commences or prior relevant military / law enforcement experience. Computer science, information technology, information systems management, or other similar degrees preferably with a focus on information security 3-5 years experience working in a security operations center, networking operations center or threat intelligence capacity. Possess at least one security industry certification such as CYSA+, Security+, CISSP, SANS GIAC (GSOC, GCIA, GMON, CGCDA) Knowledge of security standards and information security and compliance frameworks, controls, and best practices, including SSAE 16, SOC 2 and SOC3, OWASP Top 10, SANS, NIST Must have a naturally curious mindset and approach to solving problems. Basic understanding of cloud technologies and their operations Experience supporting various operating systems such as Windows/Linux Understanding of IP network protocols
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
20312 Jobs | Dublin
Wipro
11977 Jobs | Bengaluru
EY
8165 Jobs | London
Accenture in India
6667 Jobs | Dublin 2
Uplers
6464 Jobs | Ahmedabad
Amazon
6352 Jobs | Seattle,WA
Oracle
5993 Jobs | Redwood City
IBM
5803 Jobs | Armonk
Capgemini
3897 Jobs | Paris,France
Tata Consultancy Services
3776 Jobs | Thane