JOBS|

Free Website Template By Free-Template.co

SOC Analyst Tier 3

Tracelay Bangalore Full Time

Job Description

Tracelay SOC platform gives organizations the upper hand by taking an entirely new approach to cyber security with our dedicated SOC as a Service/SIEM as a Service We're expanding our security services and looking for curious, diligent, technical people to help us build out and run our Osprey team. As member of this elite team you'll be working closely with some of the best minds in incident response, malware analysis and security research, partnering with the highly skilled defense teams of our customers, and against some of the most advanced adversaries out there. You will experience and investigate attacks eliminate alerts and unusual events that no one else has seen before. We value creativity, ingenuity, and persistence in conducting investigations primarily in the Tracelay SOC defense platform. We're a diverse global team with operation in Bangalore, Arizona,Tel Aviv .The Ability to step into the mind of an attacker is a must and being able to predict their next move even more so.

Responsibilities

  • •Familiarity and experience in implementation of EDR products.
  • •Should have good experience working on ArcSight Implementation and content creation engineer.
  • •Should be able to Identify cloud log source-based use cases and define.
  • •Install/configure/build/fine-tune the SIEM tools to setup an effective information security support / operation.
  • •Establish KPI, review & manage security logs and provide reports based on KPI and metrics.
  • •Ability to develop solution architecture design and implementation for security projects.
  • •Hands-on knowledge of Correlation rules creation / Update / Deletion.
  • •The familiarity of ITIL and ISO processes.

Education + Experience

  • •Full Time Graduate (MANDATORY).
  • • 1-4 years of experience in Information Security domain
  • • Experience in Security Operation Centre operations with good understanding SIEMs like Sumologic / Q radar / Splunk / ELK – QRadar Exp is required
  • • Good understanding on Network (LAN/WAN/ WI-FI / VPN), Security solutions e.g. IDS / IPS, Firewall, Proxies, DLP, WAF, anti DDOS tools etc, Operating systems & databases – Windows / Linux, SQL , Syslog
  • •Pro-Active Mindest
  • • Aware on malware / APT operations and participated in Red / Blue / Purple team simulations.
  • • CCIE or SIEM product certification would be added advantage.
  • • Good analytical & technical skills.

Other Benifits

  • •Provident fund (PF)
  • • Flexible work hours
  • • Joining bonus
  • • Shift allowance
  • • Give away gifts

We have fun.We are looking for exceptionals.

Great food. Summer sports. And an amazing vacation policy.

We are (extreme) creative. DON’T SEE YOUR POSITION LISTED? Tell us about yourself and what you’re interested in.