Premium Employer

i

This company page is being actively managed by Infinite Computer Solutions Team. If you also belong to the team, you can get access from here

Infinite Computer Solutions Verified Tick

Compare button icon Compare button icon Compare
filter salaries All Filters

144 Infinite Computer Solutions Jobs

Specialist

8-13 years

Bangalore / Bengaluru

1 vacancy

Specialist

Infinite Computer Solutions

posted 3hr ago

Job Description

Job Description

Tier 2 SOC Analyst
A Tier 2 SOC Analyst serves as a critical escalation point and deeper investigation resource within the SOC structure. They are expected to possess a more advanced skillset and broader knowledge base than Tier 1 analysts, allowing them to handle more complex security incidents and contribute to proactive security measures. Principal Duties and Responsibilities
  1. Incident Investigation and Analysis
    • Advanced Alert Triage and Analysis:
      • In-depth Investigation: Thoroughly investigate security alerts escalated from Tier 1 or directly generated by security tools. Go beyond initial triage and reconstruct event timelines, analyze logs across multiple systems, and correlate disparate data points.
      • Contextualization: Deeply understand the context of security incidents, including aEected assets, business impact, and potential attack vectors.
      • False Positive/Negative Analysis: Accurately diEerentiate between true positives, false positives, and potential false negatives. Analyze the root cause of false positives and propose tuning or improvement of detection rules. Investigate scenarios where detections might have been missed.
      • Determine Scope and Impact: Precisely define the scope of security incidents, including the number of systems aEected, data compromised, and potential business disruption. Assess the immediate and long-term impact of the incident.
      • Containment and Remediation Guidance: Provide actionable guidance to Tier 1 analysts and relevant teams (e. g. , IT, system administrators) on immediate containment steps and initial remediation actions based on the nature of the incident.
    • Complex Security Incident Handling:
      • Lead Investigations for Complex Incidents: Take the lead in investigating more complex security incidents, such as suspected advanced persistent threats (APTs), sophisticated malware outbreaks, or significant data breaches.
      • Malware Analysis: Conduct basic malware analysis, including analysis of malware sandbox reports, identify indicators of compromise (IOCs), and determine its capabilities and potential impact.
      • Network Forensics: Perform network traEic analysis using tools like Wireshark or tcpdump to identify malicious network activity, analyze protocols, reconstruct network sessions, and extract relevant artifacts.
      • Endpoint Forensics: Utilize endpoint detection and response (EDR) tools and perform manual endpoint analysis to investigate compromised systems, analyze process execution, registry modifications, file system changes, and identify malicious artifacts.
      • Log Analysis: Perform log analysis across diverse systems and security devices (SIEM, firewalls, IDS/IPS, operating systems, applications). Develop complex queries and correlations to identify subtle indicators of malicious activity.
    • Incident Documentation and Reporting o Detailed Incident Documentation: Create comprehensive incident reports documenting the entire investigation process, findings, analysis, containment steps, remediation actions, and lessons learned. Reports should be clear, concise, and actionable.
      • Develop Actionable Recommendations: Based on incident analysis, develop specific and actionable recommendations for improving security posture, enhancing detection capabilities, and preventing future incidents.
      • Incident Timeline Creation: Construct detailed timelines of security incidents, accurately mapping out the sequence of events to understand the attack lifecycle and identify critical points of compromise.
  2. Threat Intelligence and Proactive Security
    • Threat Intelligence Utilization:
      • Consume and Integrate Threat Intelligence: Actively consume threat intelligence feeds, reports, and briefings to stay updated on emerging threats, attack trends, and threat actor tactics, techniques, and procedures (TTPs). Integrate threat intelligence into investigations and detection strategies.
      • Contextualize Threats with Intelligence: Use threat intelligence to contextualize security incidents, identify potential threat actors involved, and understand their motivations and capabilities.
      • Proactive Threat Hunting: Participate in basic to intermediate threat hunting activities based on threat intelligence, anomaly detection, and observed patterns of malicious activity. Develop and execute hunt plans to proactively identify hidden or persistent threats within the environment.
    • Detection Engineering and Improvement o Detection Rule Tuning and Optimization: Analyze false positive/negative incidents and proactively tune and optimize existing detection rules in security tools (SIEM, IDS/IPS, EDR) to improve detection accuracy and reduce alert fatigue.
      • Detection Gap Analysis: Identify gaps in current detection coverage based on threat intelligence, incident trends, and known attacker TTPs. Propose new detection rules and strategies to address these gaps.
      • Develop New Detections (Under Guidance): Contribute to the development of new detection rules and logic under the guidance of senior analysts or detection engineers, based on emerging threats and identified gaps.
  3. Tooling, Technology, and Technical Proficiency
    • Advanced Security Tool Proficiency:
      • SIEM Expertise: Proficiently utilize SIEM platforms for alert analysis, log investigation, correlation rule development, and report generation. Understand SIEM architecture and data flow.
      • EDR Expertise: Expertly leverage EDR tools for endpoint investigation, threat hunting, containment actions, and forensic data collection.
      • IDS/IPS Expertise: Understand IDS/IPS principles, analyze alerts, review signatures, and contribute to rule tuning.
      • Firewall Analysis: Analyze firewall logs, understand firewall rule sets, and use firewalls for containment actions.
    • Scripting and Automation (Desirable, Increasingly Important):
      • Scripting Skills (e. g. , Python, PowerShell): Develop scripts for automating repetitive tasks, data analysis, and tool integration. IV. Collaboration, Communication, and Escalation
    • Collaboration with Tier 1 and Other Teams: EEectively collaborate with Tier 1 analysts, providing guidance, mentorship, and knowledge transfer. Work collaboratively with other teams (IT, Engineering, Incident Response Team) as needed during incident response.
    • Clear and Concise Communication: Communicate technical findings and analysis clearly and concisely to both technical and non-technical audiences (e. g. , management, other teams).
    • EUective Escalation to Tier 3/Incident Response Team: Know when and how to appropriately escalate complex or high-severity incidents to Tier 3 analysts or the Incident Response Team, providing comprehensive context and analysis.
Level of Depth and Technical Proficiency:
    • Deeper Technical Understanding: Tier 2 analysts require a deeper technical understanding of operating systems (Windows, Linux), networking protocols, security controls, and attack methodologies compared to Tier 1.
    • Strong Analytical and Problem-Solving Skills: They must possess strong analytical and problem-solving skills to dissect complex security incidents, identify root causes, and develop eEective solutions.
    • Hands-on Experience: They should have demonstrable hands-on experience with security tools and technologies and be comfortable performing detailed technical investigations.
Knowledge of Threat Actor Tools, Tactics, and Behavior:
    • Solid Understanding of TTPs: Tier 2 analysts must have a solid understanding of common threat actor tactics, techniques, and procedures (TTPs) across diEerent attack stages (reconnaissance, initial access, persistence, lateral movement, exfiltration, etc. ).
    • Familiarity with Threat Actor Groups: They should be familiar with common threat actor groups (APTs, cybercrime gangs) and their associated TTPs and tools.
    • Knowledge of Attack Vectors and Exploits: Understanding common attack vectors (phishing, malware, web application attacks) and exploit methods is crucial for contextualizing incidents and identifying potential vulnerabilities.
    • Staying Updated on Emerging Threats: Tier 2 analysts must continuously stay informed about new and emerging threats, vulnerabilities, and attack trends to maintain eEective detection and response capabilities.

Employment Type: Full Time, Permanent

Read full job description

Prepare for Specialist roles with real interview advice

What people at Infinite Computer Solutions are saying

2.1
 Rating based on 2 Specialist reviews

Likes

It's very good location to work

  • Salary - Excellent
  • +6 more
Dislikes

There is no such dislikes I found yet

Read 2 Specialist reviews

Specialist salary at Infinite Computer Solutions

reported by 20 employees with 8-13 years exp.
₹10 L/yr - ₹18 L/yr
43% more than the average Specialist Salary in India
View more details

What Infinite Computer Solutions employees are saying about work life

based on 1.5k employees
73%
85%
66%
69%
Flexible timing
Monday to Friday
No travel
Day Shift
View more insights

Infinite Computer Solutions Benefits

Submitted by Company
Health & Insurance
Financial Benefits
Professional Support & Learning
Office Perks
Time Off
Submitted by Employees
Health Insurance
Work From Home
Team Outings
Cafeteria
Soft Skill Training
Job Training +6 more
View more benefits

Compare Infinite Computer Solutions with

TCS

3.7
Compare

Wipro

3.7
Compare

HCLTech

3.5
Compare

Tech Mahindra

3.5
Compare

Infosys

3.6
Compare

LTIMindtree

3.8
Compare

Mphasis

3.4
Compare

Hexaware Technologies

3.6
Compare

KPIT Technologies

3.4
Compare

Sutherland Global Services

3.6
Compare

Virtusa Consulting Services

3.8
Compare

CGI Group

4.0
Compare

GlobalLogic

3.6
Compare

Bosch Global Software Technologies

3.9
Compare

UST

3.8
Compare

Nagarro

4.0
Compare

Hewlett Packard Enterprise

4.2
Compare

ITC Infotech

3.8
Compare

Publicis Sapient

3.5
Compare

Synechron

3.6
Compare

Similar Jobs for you

Senio at Abnormal Security

Bangalore / Bengaluru

6-11 Yrs

₹ 10-14 LPA

SOC Engineer at Sandoz

Hyderabad / Secunderabad

4-7 Yrs

₹ 12-16 LPA

Leader Quality Assurance at Sony Pictures Networks India Private Limited (SPN)

Bangalore / Bengaluru

10-15 Yrs

₹ 12-16 LPA

Data Quality Analyst at UBS Business Solutions (India) Pvt. Ltd.

Mumbai

4-7 Yrs

₹ 14-19 LPA

Protection at Zensar Technologies

Mumbai, Nagpur + 4

6-11 Yrs

₹ 15-19 LPA

Financial Data Specialist at Moodys Investors Service

Bangalore / Bengaluru

5-11 Yrs

₹ 10-14 LPA

Security Analyst at Michelin

Pune

10-12 Yrs

₹ 10-12 LPA

Specialist at Levi Strauss Co.

Bangalore / Bengaluru

3-7 Yrs

₹ 14-18 LPA

Security Operations Analyst at Marvell India Pvt Ltd

Bangalore / Bengaluru

8-13 Yrs

₹ 15-20 LPA

Network Security at India Medtronic Pvt. Ltd

Bangalore / Bengaluru

4-7 Yrs

₹ 14-19 LPA

Infinite Computer Solutions Bangalore / Bengaluru Office Locations

View all
Bangalore / Bengaluru, Karnataka Office
157, EPIP Zone, Phase 2, Kundalahalli, Whitefield, KA 560066 Bangalore / Bengaluru, Karnataka
Bangalore / Bengaluru, Karnataka Office
GEIPL-SEZ, Global Axis, Block 2(A1), EPIP, Whitefield, KA 560066 Bangalore / Bengaluru, Karnataka

Specialist

8-13 Yrs

Bangalore / Bengaluru

17hr ago·via naukri.com

Lead Database Administrator

7-9 Yrs

Bangalore / Bengaluru

15hr ago·via naukri.com

Technical Lead

5-14 Yrs

Hyderabad / Secunderabad

15hr ago·via naukri.com

Technical Lead

5-14 Yrs

Bangalore / Bengaluru

15hr ago·via naukri.com

Software Test Engineer

2-5 Yrs

Chennai

15hr ago·via naukri.com

Technical Lead

5-14 Yrs

Bangalore / Bengaluru

17hr ago·via naukri.com

Senior Database administrator

3-10 Yrs

Bangalore / Bengaluru

17hr ago·via naukri.com

Lead Database Administrator

6-7 Yrs

Bangalore / Bengaluru

17hr ago·via naukri.com

Senior Technical Lead

9-16 Yrs

Bangalore / Bengaluru

17hr ago·via naukri.com

Senior Test Analyst

4-10 Yrs

Bangalore / Bengaluru

17hr ago·via naukri.com
write
Share an Interview