Job Code : NTT_NTT_09759_24_1|SOC Analyst|3-4 yrs|ESSENTIAL FUNCTIONS: • 3+ Primary support for security infrastructure platforms focused on requests, incidents, monitoring, and problem resolution. • Responsible for resolving tasks or escalating incidents within SLA while also working with responsible parties to remediate root causes. • Utilize dashboards to stay on top of trends and customer commitments. • Leverage the data lake and SIEM for everyday tasks like alarm triage, data inquires, and investigations. • Mature the SIEM via post triage efforts including tuning rulesets, tagging log sources, and updating the network hierarchy. • Provision IAM requests, troubleshoot access issues, and audit password management. • Triage phishing attempts, identify the level of impact, and determine next steps. • Configure vulnerability scans, triage results, and drive remediation. • Compile report packages, validate data, and articulate to customers the status of their security environment. • Gain experience in platforms such as AV, Cloud, EDR, FIM, MFA, MDM, and Web Content Filtering. • Create, optimize, and or automate security related workflows. • Create and update runbooks, knowledge transfer to internal resources, and optimize processes. • Rotate through shift lead duties and practice being a leader by assisting the team with maintaining SLA commitments, delegating work, and monitor incoming communications. • Educate employees and advise customers on security best practices. • Availability to work swing shifts and or on call as needed. MINIMUM QUALIFICATIONS: • 1+ year with EDR platforms (EG. Crowdstrike, Carbon Black, Defender) • 1+ year with SIEM platforms (EG. Qradar, Splunk, Sentinel) • 1+ year with Cloud products desired (EG. AWS, Azure, GCP) • 1+ year with SOAR products desired (EG. XSOAR, XDR, Phantom) • Excellent verbal/written communication, interpersonal, and organizational skills • Pragmatic understanding of security concepts to work on a broad variety of security tasks • Ability to design processes and create SOPs • Ability to support the proliferation of knowledge among fellow team members • Adapt to emerging technologies and threats on a consistent basis EDUCATION and TRAINING: • 2+ year relevant experience with graduate Degree. • Comptia SEC+ or CySA+ preferred. • SANS certifications or sec tech specific certifications desired • ITIL, Six Sigma, and Agile certifications are nice to have

Posted 2 weeks ago
 Job Profile : SOC Analyst
 Job Location : Hyderabad
 Experience Required :  3-4 yrs
 Job Description : ESSENTIAL FUNCTIONS:
• 3+ Primary support for security infrastructure platforms focused on requests, incidents, monitoring, and problem resolution.
• Responsible for resolving tasks or escalating incidents within SLA while also working with responsible parties to remediate root causes.
• Utilize dashboards to stay on top of trends and customer commitments.
• Leverage the data lake and SIEM for everyday tasks like alarm triage, data inquires, and investigations.
• Mature the SIEM via post triage efforts including tuning rulesets, tagging log sources, and updating the network hierarchy.
• Provision IAM requests, troubleshoot access issues, and audit password management.
• Triage phishing attempts, identify the level of impact, and determine next steps.
• Configure vulnerability scans, triage results, and drive remediation.
• Compile report packages, validate data, and articulate to customers the status of their security environment.
• Gain experience in platforms such as AV, Cloud, EDR, FIM, MFA, MDM, and Web Content Filtering.
• Create, optimize, and or automate security related workflows.
• Create and update runbooks, knowledge transfer to internal resources, and optimize processes.
• Rotate through shift lead duties and practice being a leader by assisting the team with maintaining SLA commitments, delegating work, and monitor incoming communications.
• Educate employees and advise customers on security best practices.
• Availability to work swing shifts and or on call as needed.
MINIMUM QUALIFICATIONS:
• 1+ year with EDR platforms (EG. Crowdstrike, Carbon Black, Defender)
• 1+ year with SIEM platforms (EG. Qradar, Splunk, Sentinel)
• 1+ year with Cloud products desired (EG. AWS, Azure, GCP)
• 1+ year with SOAR products desired (EG. XSOAR, XDR, Phantom)
• Excellent verbal/written communication, interpersonal, and organizational skills
• Pragmatic understanding of security concepts to work on a broad variety of security tasks
• Ability to design processes and create SOPs
• Ability to support the proliferation of knowledge among fellow team members
• Adapt to emerging technologies and threats on a consistent basis

EDUCATION and TRAINING:
• 2+ year relevant experience with graduate Degree.
• Comptia SEC+ or CySA+ preferred.
• SANS certifications or sec tech specific certifications desired
• ITIL, Six Sigma, and Agile certifications are nice to have 

Apply Online