SOC Analyst

Posted 2 Days Ago
Be an Early Applicant
Bengaluru, Karnataka
1-3 Years Experience
Information Technology • Cybersecurity
The Role
Operate within a fast-paced 24x7 SOC environment, analyzing alerts and log data promptly and effectively. Monitor security information and event management tools to identify potential security incidents. Conduct in-depth analysis of security events and collaborate with customers to investigate incidents. Execute containment and remediation measures for security incidents. Participate in the creation and enhancement of security procedures and processes.
Summary Generated by Built In

Company Description

Resillion is a global company with end-to-end capabilities: no matter your industry, your geographical location, or stage in your digital journey. With offices in North America, Europe, and Asia, Resillion will be by your side. Helping you and your organization realize your ambitions in cyber security, testing of digital media content and quality assurance.

Whether, testing, certification, (software) development, cyber security, or data-protection, the experts at Resillion do whatever it takes. We work as long and hard as necessary to get you to market. 

Job Description

SOC Analyst 

Experience Range: 4 -6 Years 

Location: Bangalore

Key responsibilities

  • Operate within a fast-paced 24x7 SOC environment, either as part of a team or independently, to Analyse alerts and log data promptly and effectively. Assess the severity and impact of potential threats to accurately prioritize alerts and incidents.
  • Monitor and analyze security information and event management (SIEM) tools and other security monitoring systems to identify potential security incidents and anomalies.
  • Conduct in-depth analysis of security events, collaborating directly with customers to escalate and thoroughly investigate incidents. This involves understanding the scope, impact, and root cause of incidents to tailor the response effectively.
  • Execute swift containment and remediation measures for identified security incidents, employing predefined response strategies to isolate affected systems and prevent further compromise.
  • Proactively participate in the creation and enhancement of processes and procedures such as Security Playbooks.
  • Refine and optimise analytical rules within the SIEM platform to reduce false positive alerts, enhancing the accuracy and efficiency of threat detection.
  • Assist in vulnerability assessments and penetration testing activities. Evaluate and prioritise identified vulnerabilities for remediation by collaborating directly with customers.
  • Maintain accurate records of incidents, investigations, and security-related activities within the incident management platform.
  • Create detailed reports on security incidents, response actions taken, and recommendations for improvement.
  • Research new concepts and present them to the internal team as well as customers.

Required skills:

  • Excellent English written and verbal communication skills.
  • Prior experience working within a 24x7 Security Operations Centre (SOC).
  • Security monitoring experience with one or more SIEM technologies, preferably Microsoft Sentinel.
  • Knowledge of EDR solutions including Microsoft Defender and CrowdStrike Falcon.
  • Strong understanding of Windows, Linux and cloud technologies including Microsoft Azure and Office365.
  • Good understanding of security solutions including SIEMs, Web Proxies, Anti-Virus, Firewalls, VPN, authentication providers and mechanisms, encryption, IPS/IDS.
  • Strong understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols.

Qualifications

  • Degree in Computer Science, Information Security, or a related field – Must have.
  • SC-200 Microsoft Security Operations Analyst – Must have.
  • AZ-500 Microsoft Azure Security Technologies – Desirable.
  • CompTIA Security+ SY0-601 – Desirable.
  • Certified Ethical Hacker (CEH) – Desirable.
  • GIAC Security Essentials (GSEC) – Desirable.
  • GIAC Certified Incident Handler (GCIH) – Desirable.

Top Skills

Crowdstrike Falcon
Azure
Microsoft Defender
Microsoft Sentinel
Office365
The Company
Burbank, California
486 Employees
On-site Workplace

What We Do

From the expertise of Eurofins Scientific’s Digital Testing, Cyber Security, Digital Forensics and Content divisions, Resillion brings together over 700 experts with a passion for delivering the best in testing technologies.

Resillion is a global company with end-to-end capabilities: no matter your industry, your geographical location, or stage in your digital journey. With offices in North America, Europe, and Asia, Resillion will be by your side. Helping you and your organisation realise your ambitions in cyber security, testing of digital media content and quality assurance.

Jobs at Similar Companies

Alliant Credit Union Logo Alliant Credit Union

Data Analyst - Hybrid

Fintech • Financial Services
Hybrid
Chicago, IL, USA
843 Employees
Easy Apply
Remote
United States
985 Employees
Hybrid
Chicago, IL, USA
843 Employees

AffiniPay Logo AffiniPay

Sales Operations Manager

Fintech • Legal Tech • Payments • Sales • Software
Remote
United States
519 Employees

Similar Companies Hiring

Cisco Meraki Thumbnail
Software • Security • Information Technology • Hardware • Cybersecurity • Conversational AI
San Francisco , CA
3000 Employees
CrowdStrike Thumbnail
Security • Sales • Information Technology • Cybersecurity • Cloud
Austin, TX
10000 Employees
Arrow Electronics, Inc. Thumbnail
Semiconductor • Robotics • Internet of Things • Information Technology • Hardware • Enterprise Web • Cloud
Centennial, CO
22000 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account