ca

Careers|

Free Website Template By Free-Template.co

SOC Analyst Tier 1

Tracelay Bangalore Full Time

Job Description

WHAT'S YOUR PASSION ? Join us ! We're expanding our security services and looking for curious, diligent, technical people to help us build out and run our team. As member of this elite team you'll be working closely with some of the best minds in incident response, malware analysis and security research, partnering with the highly skilled defense teams of our customers, and against some of the most advanced adversaries out there. You will experience and investigate attacks eliminate alerts and unusual events that no one else has seen before. We value creativity, ingenuity, and persistence in conducting investigations primarily in the Tracelay SOC defense platform. We're a diverse global team with operation in Bangalore, Arizona,Tel Aviv .The Ability to step into the mind of an attacker is a must and being able to predict their next move even more so.

The Security Operation Centre (SOC) Information Security Analyst L1 is the first level of monitoring in the SOC. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis.

Responsibilities

  • •1 year of experience in handling IT / Networking role.
  • •Experience with Security Orchestration, Managed operations for Cyber Security.
  • •Experience working with one or more SIEM platforms.
  • •Worked on Global customers and experience with Splunk ES, SOC operations and Cloud tools which are emerging needs.
  • •Managing Cyber Security Services portfolio serving 200+ customers across the globe.
  • •Incident Management, Vulnerability Management and threat intelligence with the relevant tools.
  • •Deep technical knowledge Security analysis, vulnerability management, Security Incident handling and Threat Intelligence. Ability to handle high-pressure situations with key stakeholders,
  • •Good Analytical skills, Problem-solving and Interpersonal skills.
  • •Perform threat management, threat modeling, identify threat vectors and develop use cases for security monitoring.
  • •Responsible for integration of standard and non-standard logs in SIEM.
  • •Creation of reports, dashboards, metrics for SOC operations and presentation to Sr. Mgmt.
  • •Co-ordination with stakeholders, build and maintain positive working relationships with them.

Education + Experience

  • •Full Time Graduate (MANDATORY).
  • • 0-2 years of experience in Information Security domain
  • • Experience in Security Operation Centre operations with good understanding SIEMs, XDR,EDR,NDR Tool Experience is required
  • • Good understanding on Network (LAN/WAN/ WI-FI / VPN), Security solutions e.g. IDS / IPS, Firewall, Proxies, DLP, WAF, anti DDOS tools etc, Operating systems & databases – Windows / Linux, SQL , Syslog
  • •Pro-Active Mindest
  • • Aware on malware / APT operations and participated in Red / Blue / Purple team simulations.
  • • Any SIEM product certification would be added advantage.
  • • Good analytical & technical skills.

Other Benifits

  • •Provident fund (PF)
  • • Education assistance
  • • Flexible work hours
  • • Joining bonus
  • • Shift allowance
  • • Give away gifts

We have fun.We are looking for exceptionals.

Great food. Summer sports. And an amazing vacation policy.

We are (extreme) creative. DON’T SEE YOUR POSITION LISTED? Tell us about yourself and what you’re interested in.