Job Code : NTT_NTT_09761_24_1|SOC Analyst|5-8 yrs|ESSENTIAL FUNCTIONS: • 5+ Primary support for security infrastructure platforms focused on requests, incidents, alarm triage, and problem resolution. • Prioritize undocumented security tasks and alarm investigation, complete the task, and produce a SOP to standardize the steps. • Operate as the main alarm triage escalation point, review previous triage assessments for shortcomings, and assist with incident investigations. • Provide guidance around rule creation, tuning, and optimize security related workflows. • Mentor juniors and mids within the team and produce stronger teammates. • Compile report packages, validate data, and articulate to customers the status of their security environment. • Utilize dashboards to stay on top of trends and customer commitments. • Leverage the data lake and SIEM for everyday tasks like alarm triage, data inquires, and lock outs • Provision IAM requests, troubleshoot access issues, and audit password management. • Triage phishing attempts, identify the level of impact, and determine next steps. • Configure vulnerability scans, triage results, and work with relevant parties to remediate findings. • Gain experience in platforms such as AV, Cloud, EDR, FIM, MFA, MDM, and Web Content Filtering • Rotate through different weekly duties including leading the shift, oncall duty, vuln analyst, and group work to narrow down that week’s scope of duty. MINIMUM QUALIFICATIONS: • Multiple years with SIEM platforms (EG. Qradar, Splunk, Sentinel) • 2-3+ year with EDR platforms (EG. Crowdstrike, Carbon Black, Defender) • 2-3+ year with Cloud products desired (EG. AWS, Azure, GCP) • 1+ year with SOAR products desired (EG. XSOAR, XDR, Phantom) • Excellent verbal/written communication, interpersonal, and organizational skills • Pragmatic understanding of security concepts to work on a broad variety of security tasks • Ability to design processes and create SOPs • Ability to support the proliferation of knowledge among fellow team members • Adapt to emerging technologies and threats on a consistent basis EDUCATION and TRAINING: • 4+ year relevant experience with graduate Degree. • Comptia SEC+ or CySA+ preferred. • SANS certifications or sec tech specific certifications desired • ITIL, Six Sigma, and Agile certifications are nice to have

Posted 2 weeks ago
 Job Profile : SOC Analyst
 Job Location : Hyderabad
 Experience Required :  5-8 yrs
 Job Description : ESSENTIAL FUNCTIONS:
• 5+ Primary support for security infrastructure platforms focused on requests, incidents, alarm triage, and problem resolution.
• Prioritize undocumented security tasks and alarm investigation, complete the task, and produce a SOP to standardize the steps.
• Operate as the main alarm triage escalation point, review previous triage assessments for shortcomings, and assist with incident investigations.
• Provide guidance around rule creation, tuning, and optimize security related workflows.
• Mentor juniors and mids within the team and produce stronger teammates.
• Compile report packages, validate data, and articulate to customers the status of their security environment.
• Utilize dashboards to stay on top of trends and customer commitments.
• Leverage the data lake and SIEM for everyday tasks like alarm triage, data inquires, and lock outs
• Provision IAM requests, troubleshoot access issues, and audit password management.
• Triage phishing attempts, identify the level of impact, and determine next steps.
• Configure vulnerability scans, triage results, and work with relevant parties to remediate findings.
• Gain experience in platforms such as AV, Cloud, EDR, FIM, MFA, MDM, and Web Content Filtering
• Rotate through different weekly duties including leading the shift, oncall duty, vuln analyst, and group work to narrow down that week’s scope of duty.

MINIMUM QUALIFICATIONS:
• Multiple years with SIEM platforms (EG. Qradar, Splunk, Sentinel)
• 2-3+ year with EDR platforms (EG. Crowdstrike, Carbon Black, Defender)
• 2-3+ year with Cloud products desired (EG. AWS, Azure, GCP)
• 1+ year with SOAR products desired (EG. XSOAR, XDR, Phantom)
• Excellent verbal/written communication, interpersonal, and organizational skills
• Pragmatic understanding of security concepts to work on a broad variety of security tasks
• Ability to design processes and create SOPs
• Ability to support the proliferation of knowledge among fellow team members
• Adapt to emerging technologies and threats on a consistent basis

EDUCATION and TRAINING:
• 4+ year relevant experience with graduate Degree.
• Comptia SEC+ or CySA+ preferred.
• SANS certifications or sec tech specific certifications desired
• ITIL, Six Sigma, and Agile certifications are nice to have 

Apply Online