Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailJob Title - SOC Analyst
Location - New York (or) New Jersey (Onsite)
Qualifications:
Key Skill Is below
1. Mandatory: Security Operations [Manager]
2. Mandatory: Implemented [managed] security operations [team]
3. Optional: Implemented [managed] Threat Detection and Response [team]
4. Mandatory: Threat intelligence [Hunting]
5. Mandatory: [security] incident response
6. Mandatory: Tools ==> SIEM (Splunk, IBM QRadar or similar), EDR (Crowdstrike, Defender or similar)
7. Optional: SOC manager [Lead]
Security Specialist (Level 3 SIEM Administrator / Content Developer) USE CASE DEVELOPER (SIEM & EDR)
Monitor health of SIEM components and create incidents to the support team for action.
Create use cases to find the malicious activity in the infrastructure.
Aware of current attacks and implement new use cases to avoid impact of prevailing attacks in cyber world.
Create rules, reports, dashboards as per requirement
Work with internal teams to obtain an in-depth understanding of security requirements in order to translate them into policies, procedures, and plans.
Analyzing new features and hot fixes released by SIEM and plan the upgrades as required
Patch upgrades
Overall Version upgrades to avail new features and enhancements
Work with vendors to resolve SIEM component and infrastructure issue
Trouble shooting log sources not reporting issues
SIEM access control management (add, delete and audit)
Ensure daily data and configuration backup and event retention period
Full Time