Sign In
 [New User? Sign Up]
Mobile Version

IT Analyst - Security Operations-SOC

Chennai, TN
Job Code:
  • Manufacturing & Production
Applying for this job will take you to an external site
  • Shortlist
  • Email Friend
  • Print

Job Details

Job Description Working on SIEM, Vulnerability Management tool, Endpointsecurity, PCI compliance and Incident response Having team of SOC analyst. Average experience around 5 years + Working closely with Security team and Overall security operation handling from Chennai Working for 16X5, mostly US coverage. Extended culture of LITCCISSP Certified.Hands on experience with troubleshooting malicious and suspicious activityStrong understanding of responding and mitigating Ransomware, Industrial Cyber-Espionage, Payment Card information data breaches, and other Insider threat activity.Experience with Securing Web Application and Services - need a basic understanding of the common network \ WEB applications and services. Should be able to understand and evaluate the purpose of the application or service while working with development teams, how it works, its common usages, secure configurations, and the common types of threats or attacks against the application or service, as well as mitigation strategies. Strong knowledge of SSL/TLS risks, Java vulnerabilities, cross-site scripting risks, secure password configuration for websites, secure certificate configuration, and memory scraping threats are required.Experience with one or more of the following TCP/IP networking / Various Intrusion Detection Systems / Various firewall systems / Various scanning systems / Strong knowledge of Information Security concepts.Must be willing and able to work a shift routine.Experience with Unix and Windows in an administrative capacity will be an add on.Strong knowledge of TCP/IP networking, Expert knowledge of various Intrusion Detection Systems,Experienced knowledge of firewall systems like Palo Alto and Checkpoint.Experienced knowledge of scanning systems including Rapid7 and Nessus.Within the broad range of technical skills needed to undertake incident handling is a subset of skills the IRT Analyst will need. Tool like Service Now and knowledge of Change process as per ITIL is must.Expert knowledge of the Mcafee product like SIEM, VSE, DLP and MSE to correlate the logs from events.Experience in reviewing and troubleshooting syslog data for successful and failed privilege user account attempts on both Windows and Unix systems. IRT Analyst needs to understand security issues at a host level for the various types of operating systems (UNIX, RedHat Linux, Windows 7, Windows 8, Windows 10, Windows Server 2003, Windows Server 2008, Windows Server 2012. The IRT staff member must have experience using the operating system (user security issues) some familiarity with managing and maintaining the operating system (as an administrator) Then, for each operating system, the IRT staff member needs to know how toStrong understanding of Configuring(harden) the system securelyReview and audit configuration files for security weaknessesRoutinely Identify common attack methodsAbility to determine if a compromise attempt occurred and provide clear communication to management and team leadAbility to determine if an attempted system compromise was successful and provide clear communication to management and team leadRoutinely review log files for anomaliesAnalyze the results of attacks and provide root cause analysisAnalyze system privileges and recommend the safe settings to operations.Secure network daemonsClearly communicate verbally and written steps to recover from a compromise. QualificationsSecurity Bachelor's degree and 3-4+ years related experience in the related field.
Additional Degree: BE/ B.Tech (Engineering) | BCA (Computer Application)

Experience: 5-10


H/W Installation/Maintenance | Hardware Design | Network Planning | Security
Applying for this job will take you to an external site


© Copyright 2015 Al Nisr Publishing LLC - powered by Gulf News