Responsibilities :
Executes daily operations, will be responsible for monitoring the security events/alerts/incidents and closing or escalating those as access. SOC Analysts update all relevant documentation such as shift logs and tickets.
Rapidly identify, categorize, prioritize and Triage Incidents as the initial step for the enterprise using all available log and intelligence sources.
Perform initial investigation and triage of potential incidents and escalate or close incidents as applicable.
Maintain SOC shift logs with relevant activity from analyst shift.
Document investigation results, ensuring relevant details are passed to the Senior Analysts for final event analysis.
Manage SOC event and information intake to include gathering intelligence reports, monitoring ticket queues, investigating reported incidents and interacting with other security and network groups as necessary
3 candidates required , will work in shift hours
Skills Required :
Splunk, Microsoft Sentinel ,IBM QRADAR ,Log rhythm
Experience :
Minimum 5 years of relevant experience