SOC L2 Sentinel
1 week ago
1. A senior SOC analyst would work closely with the SOC team and be responsible for incident detection, triage, analysis, and response.
2. Hands-on experience with configurations and management of SIEM tools (Qradar (preferred), Azure Sentinel, and Splunk), including log source integrations, custom parsers built, fine tuning and optimizing the correlation rules, and use cases Is MUST.
3. Proven experience with any of the security information and event management (SIEM) tools like Azure Sentinel (preferred), Qradar, Splunk, etc.
4. Having good experience working with an EDR solution like MS Defender
5. Determine quick defense techniques until a permanent solution is found.
6. Experience in building automation playbooks using any of the SOAR tools like IBM Resilient (preferred), ServiceNow SecOps, Demisto (XSOAR), and LogicApps
7. Recognize successful intrusions and compromises by reviewing and analyzing relevant event detail data.
8. Review incidents escalated by Level 1 analysts.
9. Launch and track investigations to resolution. Recognize attacks based on their signatures, which differentiates false positives from true intrusion attempts.
10. actively investigates the latest in security vulnerabilities, advisories, incidents, and
11. penetration techniques and notifies end users when appropriate.
12. Identify the gaps in the security environment and suggest the gap's closure.
13. Change Management must be driven and supported.
14. performs and reviews tasks as identified in a daily task list.
15. Report Generation and Trend Analysis Starting the governance meeting with the customer and walking the customer and stakeholders through the security status from the SOC's perspective.
16. It is advantageous to have prior experience managing SIEM solutions on public and private clouds such as Amazon Web Services (AWS), Microsoft Azure, and others.
17. willing to work in a 24-hour, seven-day-a-week rotational shift model, including night shift.
KRA:
1. 2 to 5 years’ experience
2. Identify and investigate the security incidents.
3. Identify security gaps and use Change Management to close them.
4. Monitor the security logs and alerts from various devices and escalate or investigate the incident.
5. To explore different security technologies available in the market.
6. Install, build, test, and configure SIEM-related systems.
7. Maintain security dashboards.
8. Coordination with internal customers for their security-related problems and providing solutions
9. Documentation of security solutions
10. Handle L2 and above-level technical escalations from the operations team and resolve within the SLA.
11. Work closely with L1 team members to provide quick support and escalate issues.
**Job Type**: Temporary
Contract length: 12 months
**Experience**:
- total work: 4 years (preferred)
Work Location: In person
-
Azure Sentinel SOC L2 L3 Mumbai
1 day ago
Bengaluru, India Capgemini Full time4-9 years previous Security Operations Centre L2/L3 support Experience in conducting security investigations.- - Must have Experience on Azure Sentinel.- - Experience with KQL Use case creation and fine tuning and Workbook development.- - Experience on tools such as SIEM EDR Firewall IDS IPS Vulnerability Management Web Filtering etc- - Experience on...
-
L2 Azure Sentinel
9 hours ago
Bengaluru, Karnataka, India Terralogic Full time ₹ 5,00,000 - ₹ 15,00,000 per yearOverview:Seeking a Security Analyst with expertise in Microsoft Sentinel and the Microsoft Defender Suite (EDR, XDR, SIEM, SOAR). Role involves threat detection, incident response, threat hunting, and automation using KQL, PowerShell, Defender for Cloud, Defender for Office 365, MDVM, Copilot for Security, and ServiceNow SecOps SIR for incident tracking and...
-
Azure Sentinel 04 to 06 Years Mumbai
1 week ago
Bengaluru, India Capgemini Full timeGood knowledge of SIEM, SIEM Architecture and Hybrid Integrations. - Expertise with Azure Sentinel creating deploying Analytics Rules Playbooks Workbooks Logic Apps Log Analytics Key Vault IAM Azure AD etc - Good Knowledge of Azure DevOps GitHub On boarding various of log sources on Multitenant Platform On boarding customer Sentinel Workspace using...
-
Azure Sentinel 2 to 4 Years Pan India
5 days ago
Bengaluru, India Capgemini Full time**SIEM monitoring.** - Monitor incoming alerts - Monitor SIEM health - Monitor incoming SIEM tickets **Alert Investigation & Reporting** - Provide initial triage for all SIEM alerts - Escalate alert to L2 when approrpiate and as indicated by SOP - Collect and include any relevant evidence for escalated alerts. This includes investigation steps already done,...
-
Siem/sentinel (Rm 2119)
2 weeks ago
Bengaluru, Karnataka, India Source-right Full timeMust have: SIEM/Sentinel - strong experience in implementation of MS Sentinel, log source integration, logic apps, use case management - Expert knowledge in SOC Implementation Services, Incident response, and Microsoft Defender for Cloud. - Strong knowledge in SOAR EUBA. - Working knowledge of ITSM tools, ServiceNow preferred. - Ability to onboard new log...
-
Senior Analyst SOC L2
4 days ago
Bengaluru, Karnataka, India Capgemini Full time ₹ 15,00,000 - ₹ 25,00,000 per yearAbout CompanyChoosing Capgemini means choosing a company where you will be empowered to shape your career in the way you'd like, where you'll be supported and inspired by a collaborative community of colleagues around the world, and where you'll be able to reimagine what's possible. Join us and help the world's leading organizations unlock the value of...
-
SOC L2 Analyst
2 days ago
Bengaluru, Chennai, India AltiSec Full time ₹ 6,00,000 - ₹ 18,00,000 per yearWe are seeking a highly motivated and skilled SOC L2 Analyst to join our security team at Bangalore & Chennai. The ideal candidate will be responsible for advanced security incident analysis, threat hunting, and the development of new detection rules and playbooks. This role will also have a partial focus on security governance, including assisting with...
-
L2 SOC Analyst
4 days ago
Bengaluru, Karnataka, India UST Full time ₹ 4,00,000 - ₹ 8,00,000 per year4 - 8 Years1 OpeningBangalore, Kochi, TrivandrumRole descriptionL2 SOC AnalystExperience : 4 to 8 yearsSOC Analyst L2 SOC Analyst L2 is an operational role, focusing on ticket quality and security incident deeper investigation and will be responsible to handle the escalated incidents from Level 1 team within SLA.Responsibilities:SOC Analyst L2 would work...
-
Senior Analyst SOC L2
4 days ago
Bengaluru, Karnataka, India Capgemini Full time ₹ 15,00,000 - ₹ 25,00,000 per yearAbout Company Choosing Capgemini means choosing a company where you will be empowered to shape your career in the way you'd like, where you'll be supported and inspired by a collaborative community of colleagues around the world, and where you'll be able to reimagine what's possible. Join us and help the world's leading organizations unlock the value of...
-
SOC L3 Analyst
2 weeks ago
Bengaluru, Karnataka, India Hinduja Global Solutions (HGS) Full time ₹ 12,00,000 - ₹ 36,00,000 per yearJob DescriptionThe SOC L3 Analyst is a senior-level position responsible for handling the most complex security incidents and providing strategic direction for the SOC team. This role involves leading shifts, mentoring junior analysts, and providing strategic oversight to ensure effective detection, analysis, and response to security incidents. The L3...