Cyber Security Analyst
Send a job offer directly to this candidate
Having 3+years of experience in the field of information technology with background in Cyber
Security, monitoring.
Managing 24x7 operations at SOC, includes event monitoring, incident detection, tracking and analysing on real time basis.
Monitoring network security events and take appropriate action based on security policy.
Perform detailed investigation on the alerts assigned toL1 group.
Creating dashboards, reports on different SIEM tools to detect new threats.
Understand cyber-attack methods, perform analysis of security logs to detect unauthorized behaviour.
Experience in performing Root Cause Analysis for data from SIEM.
Responsible for incident validation, incident analysis, solution recommendation.
Review the correlation rules and define the improvement plan.
Familiarity of MITRE ATT&CK framework processes.
Good understanding on security devices like Firewall, IPS/IDS, Proxy, Email Gateway, WAF,
Antivirus.
Perform searches using filters, perform quick (KQL) searches.
Good knowledge on security concepts, networking concepts, network scanning, DDOS, Trojans,
Worms, Viruses and various network attacks.
Having 3+years of experience in the field of information technology with background in Cyber
Security, monitoring.
Managing 24x7 operations at SOC, includes event monitoring, incident detection, tracking and analysing on real time basis.
Monitoring network security events and take appropriate action based on security policy.
Perform detailed investigation on the alerts assigned toL1 group.
Creating dashboards, reports on different SIEM tools to detect new threats.
Understand cyber-attack methods, perform analysis of security logs to detect unauthorized behaviour.
Experience in performing Root Cause Analysis for data from SIEM.
Responsible for incident validation, incident analysis, solution recommendation.
Review the correlation rules and define the improvement plan.
Familiarity of MITRE ATT&CK framework processes.
Good understanding on security devices like Firewall, IPS/IDS, Proxy, Email Gateway, WAF,
Antivirus.
Perform searches using filters, perform quick (KQL) searches.
Good knowledge on security concepts, networking concepts, network scanning, DDOS, Trojans,
Worms, Viruses and various network attacks.
Having 3+years of experience in the field of information technology with background in Cyber
Security, monitoring.
Managing 24x7 operations at SOC, includes event monitoring, incident detection, tracking and analysing on real time basis.
Monitoring network security events and take appropriate action based on security policy.
Perform detailed investigation on the alerts assigned toL1 group.
Creating dashboards, reports on different SIEM tools to detect new threats.
Understand cyber-attack methods, perform analysis of security logs to detect unauthorized behaviour.
Experience in performing Root Cause Analysis for data from SIEM.
Responsible for incident validation, incident analysis, solution recommendation.
Review the correlation rules and define the improvement plan.
Familiarity of MITRE ATT&CK framework processes.
Good understanding on security devices like Firewall, IPS/IDS, Proxy, Email Gateway, WAF,
Antivirus.
Perform searches using filters, perform quick (KQL) searches.
Good knowledge on security concepts, networking concepts, network scanning, DDOS, Trojans,
Worms, Viruses and various network attacks.