Simplify ID : 871
Budget - 60000 (inclusive of vendor markup)
Location - Mumbai Airoli
Position Open - 3
Keywords to look for -
SOC Operations QRADAR Networking Incident/alert analysis phishing email analysis endpoint alert analysis security tools knowledge (Firewall WAF Antivirus EDR email security NIPS SIEM)
Job Description -
A SOC L1 Analyst is responsible for continuously monitoring security alerts performing initial incident analysis and initiating triage for potential threats identified across the organization’s security this role the analyst acts as the first line of defense reviewing alerts generated by SIEM EDR and other security monitoring tools to quickly identify true security incidents. The SOC L1 Analyst analyzes multiple types of incidents including phishing attempts malware infections suspicious account lockouts authentication anomalies and active reconnaissance activities such as port scanning or probing. They collect preliminary evidence validate indicators assess the severity of incidents and escalate them to higher-level SOC teams when deeper investigation or response is required.
Required Skills:
Cco Cio Cro Mba Networking Scala
Simplify ID : 871Budget - 60000 (inclusive of vendor markup)Location - Mumbai AiroliPosition Open - 3 Keywords to look for -SOC Operations QRADAR Networking Incident/alert analysis phishing email analysis endpoint alert analysis security tools knowledge (Firewall WAF Antivirus EDR email security NIP...
Simplify ID : 871
Budget - 60000 (inclusive of vendor markup)
Location - Mumbai Airoli
Position Open - 3
Keywords to look for -
SOC Operations QRADAR Networking Incident/alert analysis phishing email analysis endpoint alert analysis security tools knowledge (Firewall WAF Antivirus EDR email security NIPS SIEM)
Job Description -
A SOC L1 Analyst is responsible for continuously monitoring security alerts performing initial incident analysis and initiating triage for potential threats identified across the organization’s security this role the analyst acts as the first line of defense reviewing alerts generated by SIEM EDR and other security monitoring tools to quickly identify true security incidents. The SOC L1 Analyst analyzes multiple types of incidents including phishing attempts malware infections suspicious account lockouts authentication anomalies and active reconnaissance activities such as port scanning or probing. They collect preliminary evidence validate indicators assess the severity of incidents and escalate them to higher-level SOC teams when deeper investigation or response is required.
Required Skills:
Cco Cio Cro Mba Networking Scala
View more
View less