Job Details
Experience Needed:
Career Level:
Education Level:
Salary:
Job Categories:
Skills And Tools:
Job Description
Summary:
The Security Analyst /SEIM Admin will be responsible for detecting and responding to security threats. The SOC Analyst will monitor and analyze events, identify potential security incidents, and ensure that appropriate actions are taken to protect the security of the organization's systems and data..
Duties & Responsibilities:
- Serving as the 'first responders' of the cybersecurity world.
- Monitoring, reporting, and escalating validated and confirmed incidents to SOC Analysts.
- Acknowledging, analyzing, and validating incidents triggered from correlated events through SIEM solutions.
- Collecting necessary logs that could help in incident containment and security investigation.
- Understanding the structure and meaning of logs from different log sources.
- Reporting infrastructure issues to the Site Support Team.
- Identify and Report false positive alarms tagged as false positives.
- Generating weekly reports from available tools and sending them to Use Case Lead for review.
- Escalating validated and confirmed incidents to Use case Lead.
- Collecting necessary logs that could help in incident containment and security investigation.
- Provide accurate, complete, and timely Shift handover reports.
- Must support traditional SOC operational activities to maintain approved SLA's.
Job Requirements
Knowledge, Experience & Competencies
- Bachelor’s degree in computer science, Information Security, or a related field, or equivalent work experience.
- 3-4 years of experience in a security operations role, preferably within a SOC environment.
- Strong understanding of networking concepts, protocols, and technologies (TCP/IP, DNS, DHCP, VPN, etc.).
- Familiarity with security tools and technologies, such as SIEM (Security Information and Event Management), IDS/IPS (Intrusion Detection/Prevention Systems), firewalls, and endpoint security solutions.
- Knowledge of common security threats, vulnerabilities, and attack vectors, and the ability to recognize indicators of compromise (IoCs).
- Proficiency in using Linux/Unix and Windows operating systems, as well as command-line tools for system administration and troubleshooting.
- Excellent analytical and problem-solving skills, with the ability to assess complex situations and make timely decisions under pressure.
- Effective communication skills, both verbal and written, with the ability to convey technical information to non-technical stakeholders clearly and concisely.
- Certifications such as CompTIA Security+, CCNA , Incident Handler Training, Linux+, Arbor and SIEM Official Training or Certified Ethical Hacker (CEH) are a plus.
- Strong commitment to continuous learning and professional development in the field of cybersecurity.
- Experience with SPLUNK and SENTINEL are a plus.
- Experience in Nokia equipment is a must.