SOC Analyst - SE/SSE (Job Code : J43729)  

 Job Summary
Share this job on Facebook  Share this job on Twitter  Share this job on Linked In
 
Experience:
3.00 - 5.00  Years 
 
Location:
Mumbai
 
Designation:
SOC Analyst - SE/SSE
 
Degree:
BCA, BCS, BE-Comp/IT, BE-Other, BSc-Comp/IT, BSc-Other, BTech-Comp/IT, BTech-Other
 
Educational Level:
Graduate/Bachelors
 
Stream of Study:
 
Industrial Type:
IT-Software/Software Services
 
Functional Area:
IT Software - Network Administration / Security
 
Key Skills:
SOC, QRadar
 
Job Post Date:
2021-05-07 13:49:17  
 
 

 Company Description
 
Our Client was founded by 3 IIMers in the year 2000. Client is an electronic presentment technology and payment services company. The Company is focused on leveraging technology to enable banks,businesses and other institutions to present invoices, statements and bills to
consumers or businesses and receive payments against them.

Their Product powers electronic payments and collections services for the largest banks and companies in India and also manages the bill payment service of Visa in India. It operates as a neutral service bureau aggregating multiple banks, billing companies and other corporations onto a common standards-based platform for delivering electronic payments and collection services across multiple electronic channels.

Their Product manages these services across a range of access channels viz. Internet Banking, ATM Banking, Tele Banking, Mobile Banking etc. The Payment Gateway services of our Client enable customers to pay online using either their electronic banking accounts or credit cards.
 

 Job Description
 
Role: SOC Analyst L2 / L1 Reporting to: SOC Manager / Lead

Qualifications / Skills:
• Full Time Graduate (MANDATORY).
• 3-5 years of experience in Information Security domain
• Experience in Security Operation Centre operations with good understanding SIEMs like
Arcsight / Q radar / Splunk / ELK – QRadar Exp is required
• Good understanding on Network (LAN/WAN/ WI-FI / VPN), Security solutions e.g. IDS / IPS,
Firewall, Proxies, DLP, WAF, anti DDOS tools etc, Operating systems & databases – Windows / Linux, SQL , Syslog
• Aware on malware / APT operations and participated in Red / Blue / Purple team simulations
• CEH or CCNA or SIEM product certification would be added advantage • Good analytical & technical skills.

Key Responsibilities / Activities:
Administration and maintenance of SIEM platform and its components Monitoring of security incidents in 24x7 rotational shifts.
Monitor health of SIEM components and create incidents to the support team for action. Triage of events as provided in SOPs and automate analysis if possible Escalation of incident to SOC lead as per SOPs.
Ensure incidents are handled as per SLA.
Track incident to closure as per SOP.
Escalation of incident to SOC Lead for non-standard incident.
Highlight gaps in SOPs to SOC lead
Generate reports as per defined templates and frequency.
Provide shift hand over reports as per defined template.
Create & review SOPs for incident handling
Create report templates in the SIEM tool as defined by SOC lead
Develop and maintain knowledge base
Proactively identify vulnerabilities in infra and update use cases to generate alerts
Perform use case testing and review to revoke obsolete use cases