5 TechDemocracy Jobs
SOC L3 Professional
TechDemocracy
posted 1d ago
Flexible timing
Key skills for the job
Lead and manage the SOC:
SOC L3 analyst -Lead must oversee the entire SOCs day-to-day operations. This involves ensuring the delivery of project deliverables, ensuring efficient workflow, and driving continuous improvement.
Project Management:
Handling resource allocation, Task delegation, Shift Management and implementing corrective actions when needed.
Team and Vendor Management:
Effectively manage the security analyst team, fostering collaboration and ensuring everyone performs at their best. Additionally, handle vendor relationships, ensuring smooth collaboration with external security solution providers and OEMs\u2019
Security Expertise Incident andThreat Response:
Security Event Monitoring, Management, and Response:
As L3 analyst expertise at monitoring security events from various sources (firewalls, SIEM systems, etc.) and analyze these events, identify potential threats, and orchestrate a swift and effective response.
Assist L2 & L1 Analysts in Incident analysis and response.
Devices Integration with the SIEM Solutions
Review the Incidents/Alerts analysis
Prepare the security reports and presentations for the review/status meetings
Incident Handling:
Entire incident response lifecycle \u2013 from identification and assessment to containment, eradication, and recovery.
Ensure proper communication, documentation, and reporting throughout the process.
False positive alerts reduction
Requirements
Technical Skills andKnowledge:
Security Technologies: In-depth knowledge of various security tools and technologies such as,
SIEM - IBM QRadar/Splunk/ArcSight/Sentinel
Cloud \u2013 AWS/Microsoft Azure
Firewalls \u2013 Checkpoint / Fortinet / Paloalto / SonicWall
Familiar with Data Loss Prevention (DLP) tools, Intrusion Detection Systems (IDS), Load balancers and Web Application Security
Familiar with NIST, MITRE ATT&CK framework
Familiar with ISO ISO/IEC 27001:2022
Usecase and Rules management : Identify the Usecases for security monitoring and reate the rules in SIEM
Identify Needs - The SOC Lead analyzes the organizations security posture, ndustry threats, and compliance requirements.
Develop Scenarios: Outline use cases that describe potential security incidents. These scenarios should detail the type of event (e.g., phishing attempt, malware infection), the expected logs or alerts generated, and the desired esponse from the SOC team.
Document Actions: The use cases should clearly define the actions the SOC analysts should take upon encountering such an event. This might involve escalating the incident, initiating containment procedures, or collecting further nformation for investigation.
Translate Use Cases to rules: Work with the Security Engineer or Analyst to translate the use cases into actionable SIEM rules.
Define Triggers: These rules specify the conditions that will trigger an alert in the SIEM system. This could involve specific log entries, patterns within the data, or exceeding predefined thresholds.
Fine-Tuning: The Lead plays a key role in testing and refining the SIEM rules to minimize false positives (alerts triggered by harmless events) and ensure they effectively detect actual threats as outlined in the use cases.
Maintenance: The threat landscape constantly evolves, so the Lead is responsible for reviewing and updating the use cases and SIEM rules to adapt to new threats and security vulnerabilities.
System Administration: A strong foundation in Windows, Linux/Unix system administration needed to manage and troubleshoot security tools running on these platforms.
Vulnerability Management: Understanding vulnerability assessment and penetration testing methodologies.
Soft Skills andCommunication:
Communication: Excellent verbal and written communication skills are crucial. They need to clearly articulate complex security issues to both technical and non-technical audiences.
Leadership and Collabration: Leading and inspiring a team is a core responsibility. Collboration is key for effective threat hunting and incident response.
Ethics and Confidentiality: Maintaining high ethical standards and protecting confidential information is paramount in this role.
Employment Type: Full Time, Permanent
Read full job descriptionPrepare for Professional roles with real interview advice