SOC Analyst - Level 3

SOC Analyst - Level 3

DXC Technology India
Selangor Malaysia
7-10 years
Not Specified

Job Description

Job Description :
Job Description:
The SOC Analyst (Level 3) will be a member of the L3 - Security team responsible for protecting the company or clientinformation technology assets.
Roles and Responsibilities:
• Provide resolution and handle escalated incidents from other analysts as necessary. Responsible for handlingof all escalated incidents till closure.
• Perform detailed analysis or troubleshooting with platform owners or remediation owners.
• Perform identification, remediation, and documentation of network intrusions and computer systemcompromises, advance malware analysis and forensic analysis of n/w activity, disks, and memory.
• Detailed analysis of threat and vulnerability alerts to determine current impacts, and help L2 team tocoordinate remediation actions as necessary.
• Proactively research and monitor security-related information sources to aid in the identification of threats tonetworks, systems, and intellectual property.
• Experience hunting proactively for threats within an enterprise and investigating computer networkintrusions in an enterprise.
• Contribute to the overall performance and success of the SOC. Team up with SOC Security IncidentManagers and engineers for problem, Incident tracking & resolution.
• Collaborate with other information security and IT team members to develop and implement innovativestrategies for monitoring and preventing attacks.
• Lead L2 & L1 team to conduct proactive monitoring, logging and alerting to analyze, correlate, and respondto cyber-attacks, threat intelligence and ability to define Risk and Compliance Dashboards.
• Respond and manage security events. Engage in security investigations and use tools to identify and reportthe outcomes of incidents to senior management.
Qualifications & Requirements:
• Bachelor’s degree in Computer Science, Engineering, Business, or related field or equivalent work experiencein IT Audit / Security.
• May have Master's degree in related field. . Often holds intermediate-level certification(s) in work field suchas ITIL Foundation, SANS – GCIH, Comptia Security+, CISA, CISM, MCSE and CISSP. Typically 7+ years ofrelevant experience.
• Extensive experience in Incident Response, Incident Handling and Security Operations.
• Advanced knowledge and expertise of using SIEM technologies for event investigation.
• Basic understanding of incident handling/incident response techniques within a cloud-based environmentsuch as Google Cloud, Azure or AWS.
• Expert knowledge of Cyber Threats and threat hunting.
• Experience in responding to threats and high-level security events.
• Experience monitoring advanced threats that are not typically through traditional systems.
• Experience in advanced data analytics and discovery techniques.
• Must have very strong communication skills and ability to work under pressure.

Job Details




Similar Jobs

Career Advice to Find Better