drjobs Senior SOC Analyst Microsoft Azure Sentinel

Senior SOC Analyst Microsoft Azure Sentinel

Employer Active

1 Vacancy
The job posting is outdated and position may be filled
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Bengaluru - India

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Senior SOC Analyst (Microsoft Azure Sentinel)

Experience Range: 24 Years 

Location: Bangalore

Key responsibilities

  • Operate within a fastpaced 24x7 SOC environment either as part of a team or independently to Analyse alerts and log data promptly and effectively. Assess the severity and impact of potential threats to accurately prioritize alerts and incidents.
  • Monitor and analyze security information and event management (SIEM) tools and other security monitoring systems to identify potential security incidents and anomalies.
  • Conduct indepth analysis of security events collaborating directly with customers to escalate and thoroughly investigate incidents. This involves understanding the scope impact and root cause of incidents to tailor the response effectively.
  • Execute swift containment and remediation measures for identified security incidents employing predefined response strategies to isolate affected systems and prevent further compromise.
  • Proactively participate in the creation and enhancement of processes and procedures such as Security Playbooks.
  • Refine and optimise analytical rules within the SIEM platform to reduce false positive alerts enhancing the accuracy and efficiency of threat detection.
  • Assist in vulnerability assessments and penetration testing activities. Evaluate and prioritise identified vulnerabilities for remediation by collaborating directly with customers.
  • Maintain accurate records of incidents investigations and securityrelated activities within the incident management platform.
  • Create detailed reports on security incidents response actions taken and recommendations for improvement.
  • Research new concepts and present them to the internal team as well as customers.

Required skills:

  • Excellent English written and verbal communication skills.
  • Prior experience working within a 24x7 Security Operations Centre (SOC).
  • Security monitoring experience with one or more SIEM technologies preferably Microsoft Sentinel.
  • Knowledge of EDR solutions including Microsoft Defender and CrowdStrike Falcon.
  • Strong understanding of Windows Linux and cloud technologies including Microsoft Azure and Office365.
  • Good understanding of security solutions including SIEMs Web Proxies AntiVirus Firewalls VPN authentication providers and mechanisms encryption IPS/IDS.
  • Strong understanding of networking principles including TCP/IP WANs LANs and commonly used Internet protocols.

Qualifications :

  • Degree in Computer Science Information Security or a related field Must have.
  • SC200 Microsoft Security Operations Analyst Must have.
  • AZ500 Microsoft Azure Security Technologies Desirable.
  • CompTIA Security SY0601 Desirable.
  • Certified Ethical Hacker (CEH) Desirable.
  • GIAC Security Essentials (GSEC) Desirable.
  • GIAC Certified Incident Handler (GCIH) Desirable.


Remote Work :

No


Employment Type :

Fulltime

Employment Type

Full-time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.