drjobs Assistant Manager SOC Security Operations Center

Assistant Manager SOC Security Operations Center

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Hyderabad - India

Monthly Salary drjobs

INR INR 1500000 - 1900000

Vacancy

1 Vacancy

Job Description

Assistant Manager SOC (Security Operations Center)
Company: Deloitte Support Services India Private Limited
Location: Hyderabad
Shift Timings: 06:30 AM to 03:30 PM
Salary Package: 19 LPA
Experience: 48 years

Role Overview:
As a member of the Cyber Defence team the Senior Analyst/Assistant Manager will play a critical role in safeguarding the organization s digital assets information and networks from cyber threats. This role primarily focuses on maintaining and strengthening the cybersecurity posture against a variety of attacks by monitoring analyzing and responding to security events and incidents.

Responsibilities:
  • Security Monitoring & Incident Detection:
  • Monitor security alerts and events generated by multiple security systems.
  • Identify potential security incidents anomalies and unusual activities.
  • Conduct initial triage of security incidents assessing severity and potential impact.
  • Escalate incidents to higherlevel analysts or engineers as required.
  • Analysis & Threat Correlation:
  • Analyze logs and data from various sources to detect patterns or indicators of compromise (IoCs).
  • Correlate information from multiple sources to identify and address security threats.
  • Use threat intelligence to anticipate emerging threats and strengthen security measures.
  • Apply threat intelligence to improve detection and response capabilities.
  • Incident Response:
  • Participate in incident response activities adhering to predefined incident response procedures.
  • Document all incident details including actions taken and lessons learned.
  • Assist in root cause analysis and implement corrective actions for resolved security incidents.
  • Collaboration & Reporting:
  • Collaborate with senior stakeholders building strong professional relationships.
  • Present findings and reports to leadership and senior stakeholders with confidence and clarity.
  • Contribute to fostering a positive and constructive team culture.
  • Share knowledge gained from lessons learned and encourage continual improvement.
  • Other Key Responsibilities:
  • Act as an independent contributor delivering without significant senior support or escalation.
  • Be available for oncall support as needed addressing highpriority incidents or issues.
  • Drive and contribute to process improvements and the development of security playbooks.
The Cloud Defence Teams Responsibilities:
  • Continuously monitor network traffic to identify potential threats and attacks.
  • Respond promptly to security incidents and perform investigations to identify root causes.
  • Identify and remediate system vulnerabilities.
  • Implement and manage security measures for computers servers and network devices.
  • Design maintain and enforce network security controls.
  • Manage user access and implement multifactor authentication for secure access.
  • Develop and deliver cybersecurity training programs for the organization.
  • Ensure compliance with security policies and regulatory requirements.
  • Stay updated on the latest cybersecurity threats and trends.
  • Collaborate with IT teams to enhance the organization s overall security posture.

Qualifications & Skills:
Required:
  • Education: BE/B.Tech/MCA or equivalent.
  • Experience: 4 years within a Security Operations Centre (SOC) environment.
  • Technologies:
  • SIEM Tools: Experience with Splunk and SOAR technologies.
  • Cyber Threat Intelligence: Practical experience in Threat Intelligence and Threat Hunting.
  • Scripting: PowerShell (essential) Python (good to have).
  • Cloud Platforms: Experience with AWS Azure and GCP (good to have).
  • Endpoint Protection & Security Tools: Familiarity with MS Defender CrowdStrike Web Proxy and WAF (good to have).
  • Cybersecurity Knowledge:
  • Knowledge of cyber playbook development and its practical application.
  • Familiarity with malware analysis techniques digital forensics and memory analysis.
  • Understanding of frameworks like MITRE ATT&CK and the Cyber Killchain.
  • Certifications:
  • CompTIA Security SANS or CISSP certification (good to have).
  • Skills:
  • Strong problemsolving and cyber analytical skills.
  • Excellent technical stakeholder management and the ability to mentor and train junior analysts.
  • Presentation skills and the ability to develop and implement processes.
  • Written and verbal communication skills are crucial for reporting documentation and stakeholder interactions.

endpoint security,security,scripting,soar technologies,waf,gcp,python,aws,mitre att&ck,splunk,threat hunting,memory analysis,incident response,soar,web proxy,malware analysis,digital forensics,siem,shell scripting,security operations,cyber threat intelligence,ms defender,siem tools,cybersecurity,comptia security+,powershell,intelligence,cyber kill-chain,cyber,crowdstrike,azure,sans,threat intelligence,endpoint protection,cissp

Employment Type

Full Time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.