Key Responsibilities of the Position. and nbsp; and nbsp; and nbsp;
- Learn to navigate and interpret security documentation including incident response plans standard operating procedures (SOPs) and security policies
- Acquire knowledge of fundamental cybersecurity principles such as threat vectors attack techniques and common vulnerabilities.
- Learn incident handling procedures including initial assessment containment eradication and recovery steps.
- Learn to leverage threat intelligence feeds and sources to enhance threat detection capabilities within the SOC.
- Monitoring of security incidents in 24x7 rotational shifts.
- Detect Incidents by monitoring the SIEM console Rules Reports and Dashboards.
- Ensure incidents are reported as tickets using ticketing tool and handled as per SLA defined for each customer.
- Monitor the SIEM console resources to identify any anomalies.
- Recognize potential successful and unsuccessful intrusion attempts/compromises thorough review and analysis of relevant event detail and summary information.
- Commit to continuous selfimprovement by exploring additional cybersecurity resources online courses and certifications.
- Report the confirmed incidents to customers / L2 team as the case may be.
- Track incident status to closure as per Standard Operating Procedures (SOP) defined.
- First level Triage of events as provided in SOP and automate analysis if possible.
- Monitor the health of the SIEM tool and create incidents to the engineering team for their action.
- Assist L2 analysts in incident workflow whenever requested. and nbsp;
Key Skills Required
- Basic knowledge of Linux and windows process commands
- Basic knowledge in Networking/Cyber security
- Understanding of any SIEM tool is an advantage
- CEH/CCNA will be a plus