About the role
This role will be responsible for supporting 24x7 operations thus requires working night / weekend shifts on a rotational basis to support the business requirements of the organization
Primary responsibilities include monitoring and triaging all security events coming into SOC / CDC from multiple sources. Security events include but not limited to; social engineering attacks, malware, DDoS, data exfiltration, ransomware etc.
Triage for first 20 minutes as per standard operating procedure, and post which engage Tier2 for further assistance
Identifying and Analyzing of security event and incident data by leveraging Orchestration tool workflows and knowledge base
Updating the Ticketing system thoroughly and timely
Communicating with stake holders for making sound recommendations on mitigation and or prevention techniques
Follow up and resolution of issues/tickets timely per SLA's
Follow-up on pending tickets and issues ensuring SLA's
Working closely with Tier2 and Tier3 teams
Escalating security events in a timely manner
Staying current with new Use Cases and process changes
Actively participate in brown bag sessions
'The individual must also have a good awareness of current and developing security threats and technologies
Strong proficiency in security event investigations, also in written and spoken English
Strong interpersonal skills and a good team player
Prior professional services experience in 24x7 SOC or CDC operations is desired
Bachelor's degree or Master's Degree in Computer Sciences or in Cyber Security
'3 - 5 years of experience working in a SIEM tool with strong background in security incident response and system operations
CEH, Security+, OSCP or other industry-relevant cyber-security certifications and ITIL V3.0 knowledge is a plus