Analyst - SOC Monitoring Group 42

Employer Active

Posted 15 hrs ago

Experience

4 - 9 Years

Education

Bachelor of Science(Computers)

Nationality

Any Nationality

Gender

Not Mentioned

Vacancy

1 Vacancy

Job Description

Roles & Responsibilities

Responsibilities:
  • Examine network topologies to understand data flow through the network.
  • Use SOC tools to monitor and analyze system activity to identify malicious activity continually.
  • Identify network mapping and operating system fingerprinting activities.
  • Continuously monitor the SIEM events/alerts to identify any anomalies.
  • Perform event correlation using information from various sources within the organization to gain situational awareness and determine the effectiveness of observed attacks.
  • Detect Incidents by monitoring the SIEM console, Rules, Reports, and Dashboards.
  • Provide timely detection, identification, and alerts of possible attacks/intrusions, anomalous activities, and misuse activities, distinguishing these incidents and events from benign ones.
  • Report the confirmed incident as per the Incident management process.
  • Notify the Senior SOC Analyst on suspected/anomaly events for further analysis.
  • Document and escalate incidents (including the event s history, status, and potential impact for further action) that may cause an ongoing and immediate impact on the environment.
  • Monitor the health of the SIEM tool and report any issues/incidents/malfunctions to the SOC SIEM administrator.
  • Assist Senior SOC Analysts and security specialists in incident investigation and workflow.
  • Assist the Senior SOC Analyst and internal team in incident detection and resolution.
  • Communicate and provide necessary information to external teams for timely incident resolution.
  • High-level understanding of TCP/IP protocol and OSI Seven Layer Model.
  • Knowledge of security best practices and concepts.
  • Knowledge of Windows and/or Unix-based systems/architectures and related security.
  • Intermediate level of knowledge of LAN/WAN technologies.
  • Must have a solid understanding of information technology and information security.
  • Good understanding of defense-in-depth analysis techniques.
  • Knowledge of log monitoring, analysis, and correlations.
  • Knowledge of Incident detection, reporting, and responding.
  • Understanding of security threats and vulnerabilities.
  • Ability to use SIEM console to create/analyze Rules, Reports, and Dashboards.
  • Sound knowledge of the functioning of IPS.

Desired Candidate Profile

EC-Council Certified Ethical Hacker (CEH)

CompTIA Security+

Minimum of 4+ years relevant experience or working in a large-scale ICT environment focusing on Information/Cyber Security.

Bachelor s degree in engineering, computer science, information systems, or any other quantitative field.

Company Industry

Department / Functional Area

Keywords

  • Analyst - SOC Monitoring

Disclaimer: Naukrigulf.com is only a platform to bring jobseekers & employers together. Applicants are advised to research the bonafides of the prospective employer independently. We do NOT endorse any requests for money payments and strictly advice against sharing personal or bank related information. We also recommend you visit Security Advice for more information. If you suspect any fraud or malpractice, email us at abuse@naukrigulf.com

Similar Jobs

IT Security Specialist

Cyber Security Specialist

Security Analyst – SIEM (Wazuh), Python & AWS

Hexadefend FZE

  • 1 - 3 Years
  • Abu Dhabi - United Arab Emirates (UAE)
View All