66965-1
Job Summary
Location: Mumbai MH
Experience Required: 8-10
Role Descriptions: SOC operations and managing a team of 10-15 management regarding the daily activities like alert monitoring reports log management and worked as SOC incident manager for a have hands-on experience on DNIF Qradar Sentinel or any other SIEM as L3 analyst or Platform build test deploy SIEM and Security & Dashboard Preparation: Create and maintain detailed reports and dashboards for the team providing insights into operational performance and incident Handling: Oversee incident management processes including incident assignment and coordination with the team to ensure timely resolution. Lead in automation of incident prioritization and false positives in integration of the SIEM tool with sources of security incidents e.g. logs from servers network and security devices Vulnerability Management system Antivirus system -on experience in Integration with multiple tools like Fileserver NACWAFADEDR at providing RCA for the major incidents occurring in customer hands-on experience in threat hunthing(Active and Passive). and maintaining of SOC KPIs on Weekly/Monthly basis & SOC SLA Attack Surface Monitoring - Monitoring threat technology landscape point of view and notify any vulnerability to larger security Protection Intelligence - Monitoring of any suspicious activity related to brand on Dark web deep net or underground forums for: threats against or targeting domains email addresses and external subnets on the deep and dark takedown and aliases mentioned on the deep and dark Centric Intelligence - Threat actor profiling to mitigate/control the issue proactively.15.
Essential Skills: SOC operations and managing a team of 10-15 management regarding the daily activities like alert monitoring reports log management and worked as SOC incident manager for a have hands-on experience on DNIF Qradar Sentinel or any other SIEM as L3 analyst or Platform build test deploy SIEM and Security & Dashboard Preparation: Create and maintain detailed reports and dashboards for the team providing insights into operational performance and incident Handling: Oversee incident management processes including incident assignment and coordination with the team to ensure timely resolution. Lead in automation of incident prioritization and false positives in integration of the SIEM tool with sources of security incidents e.g. logs from servers network and security devices Vulnerability Management system Antivirus system -on experience in Integration with multiple tools like Fileserver NACWAFADEDR at providing RCA for the major incidents occurring in customer hands-on experience in threat hunthing(Active and Passive). and maintaining of SOC KPIs on Weekly/Monthly basis & SOC SLA Attack Surface Monitoring - Monitoring threat technology landscape point of view and notify any vulnerability to larger security Protection Intelligence - Monitoring of any suspicious activity related to brand on Dark web deep net or underground forums for: threats against or targeting domains email addresses and external subnets on the deep and dark takedown and aliases mentioned on the deep and dark Centric Intelligence - Threat actor profiling to mitigate/control the issue proactively.15.
Skills: MSS - Security Operations Center (SOC)
Experience Required: 8-10
Role Descriptions: SOC operations and managing a team of 10-15 management regarding the daily activities like alert monitoring reports log management and worked as SOC incident manager for a have hands-on experience on DNIF Qradar Sentinel or any other SIEM as L3 analyst or Platform build test deploy SIEM and Security & Dashboard Preparation: Create and maintain detailed reports and dashboards for the team providing insights into operational performance and incident Handling: Oversee incident management processes including incident assignment and coordination with the team to ensure timely resolution. Lead in automation of incident prioritization and false positives in integration of the SIEM tool with sources of security incidents e.g. logs from servers network and security devices Vulnerability Management system Antivirus system -on experience in Integration with multiple tools like Fileserver NACWAFADEDR at providing RCA for the major incidents occurring in customer hands-on experience in threat hunthing(Active and Passive). and maintaining of SOC KPIs on Weekly/Monthly basis & SOC SLA Attack Surface Monitoring - Monitoring threat technology landscape point of view and notify any vulnerability to larger security Protection Intelligence - Monitoring of any suspicious activity related to brand on Dark web deep net or underground forums for: threats against or targeting domains email addresses and external subnets on the deep and dark takedown and aliases mentioned on the deep and dark Centric Intelligence - Threat actor profiling to mitigate/control the issue proactively.15.
Essential Skills: SOC operations and managing a team of 10-15 management regarding the daily activities like alert monitoring reports log management and worked as SOC incident manager for a have hands-on experience on DNIF Qradar Sentinel or any other SIEM as L3 analyst or Platform build test deploy SIEM and Security & Dashboard Preparation: Create and maintain detailed reports and dashboards for the team providing insights into operational performance and incident Handling: Oversee incident management processes including incident assignment and coordination with the team to ensure timely resolution. Lead in automation of incident prioritization and false positives in integration of the SIEM tool with sources of security incidents e.g. logs from servers network and security devices Vulnerability Management system Antivirus system -on experience in Integration with multiple tools like Fileserver NACWAFADEDR at providing RCA for the major incidents occurring in customer hands-on experience in threat hunthing(Active and Passive). and maintaining of SOC KPIs on Weekly/Monthly basis & SOC SLA Attack Surface Monitoring - Monitoring threat technology landscape point of view and notify any vulnerability to larger security Protection Intelligence - Monitoring of any suspicious activity related to brand on Dark web deep net or underground forums for: threats against or targeting domains email addresses and external subnets on the deep and dark takedown and aliases mentioned on the deep and dark Centric Intelligence - Threat actor profiling to mitigate/control the issue proactively.15.
Skills: MSS - Security Operations Center (SOC)