CMS-TDR Staff
As part of our EY-cyber security team, who shall work as SOC analyst who will assist clients in detecting and responding to security incidents with support of their SIEM, EDR and NSM solutions.
We re looking for Security Analyst with experience in SIEM, EDR and NSM solutions.
Your key responsibilities
- Operational support using SIEM solutions (Splunk, Sentinel, CrowdStrike Falcon LogScale), EDR Solution (Defender, CrowdStrike, Carbon Black), NSM (Fidelis, ExtraHop) for multiple customers.
- First level of monitoring and triaging of security alerts
- Initial data gathering and investigation using SIEM, EDR, NSM solutions.
- Provide near real-time analysis, investigation and, reporting security incidents for customer
Skills and attributes for success
- Customer Service oriented - Meets commitments to customers; Seeks feedback from customers to identify improvement opportunities.
- Good hands-on knowledge of SIEM technologies such as Splunk, Azure Sentinel, CrowdStrike Falcon LogScale from a Security analyst s point of view
- Exposure to IOT/OT monitoring (Claroty, Nozomi Networks etc.) is a plus
- Good knowledge and experience in Security Monitoring
- Good knowledge and experience in Cyber Incident Response
- Knowledge in Network monitoring technology platforms such as Fidelis XPS, ExtraHop
- Knowledge in endpoint protection tools, techniques, and platforms such as Carbon Black, Tanium, CrowdStrike, Defender ATP etc.
To qualify for the role, you must have
- B. Tech./ B.E. with sound technical skills
- Ability to work in 24x7 shifts
- Strong command on verbal and written English language.
- Demonstrate both technical acumen and critical thinking abilities.
- Strong interpersonal and presentation skills.
- Hands-on experience in SIEM, EDR and NSM solution
- Certification in any of the SIEM platforms
- Knowledge of RegEx, Perl scripting and SQL query language.
- Certification - CEH, ECSA, ECIH, Splunk Power User
Plus, we offer
Employment Type: Full Time, Permanent
Read full job description