Flag job

Report

L1 SOC Analyst - Splunk

Min Experience

2 years

Location

Trivandrum, Kochi, Chennai, Bangalore, Hyderabad

JobType

full-time

About the job

Info This job is sourced from a job board

About the role

Job Title: L1 SOC Analyst Experience : 2 to 3 years Location: Trivandrum, Kochi, Chennai, Bangalore, Hyderabad Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world's largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. SOC Analyst L1 is an operational role, focusing on ticket quality and security incident deeper investigation and will be responsible to monitor the s in the customer environment Responsibilities : • Provide guidance to senior members on tuning opportunities. • Analyze and fully remediate phishing incidents. • Analyze and triage EDR security incidents • Engage in communication for employee reported security events • Participate in incident response activities as necessary. Required experience : • Extensive knowledge of internet security issues and the threat landscape. • Previous experience with the following tools is helpful: Splunk, SentinelOne, Microsoft Security products. • Problem-solver with excellent communication skills, a deep technical understanding of security best practices. • Strong grasp of operating systems (Windows, Linux, MacOS) and networking protocols and concepts. • Extensive knowledge of internet security issues and the threat landscape. • Ability to understand and apply the incident response life cycle to events. • Previous experience with the following tools: Splunk, EDR Solutions, Microsoft Security products. • Problem-solver with excellent communication skills, a deep technical understanding of security best practices. • Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. • Analyze log files from a variety of sources (for example, Individual host logs, network traffic logs, firewall logs, and intrusion detection system logs) to identify possible threats to network security. • Utilize SIEM tools, such as Splunk and EDR tools, to enhance monitoring capabilities and expanding on the security posture of the current environment. • 2+ years' experience in a SOC or Fusion Center environment Good to have skills : • Incident Response specific or other relevant certifications [ex. GCIH, ECIH, SEC + etc.] • Experience with incident response in cloud platforms [AWS, GCP, etc].

About the company

CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world's largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence.

Skills

SOC Analysis
Mitire Analysis
Invetigation
Sentinel