L1 SOC Analyst - Sentinel

3 - 5 years

0 Lacs

Posted:2 months ago| Platform: Linkedin logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

Role Description L1 SOC Analyst Experience : 3 to 5 years Expertise in Triage, Threat Detection and Response, Threat Hunting and SOC Assessment. Expertise in Sentinel, Crowdstrike Expertise in security event collection, monitoring, analysis, issue investigation and incident response leveraging automated SOAR tools Real-time monitoring, data enrichment, event correlation, OS/application event analysis and IOC based threat hunting Email analysis, investigation and phishing detection Incident workflow management, issue escalation and assist stakeholders with issue containment, remediation and risk mitigation Provide input into enhancing threat detection rules and optimizing response playbooks Participate in operational meetings and war-room sessions, and provide input into issue eradication and security posture improvement Skills Microsoft defender E5 Security Suite,Microsoft Sentinel,security suite Show more Show less

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now
UST logo
UST

IT Services and IT Consulting

Aliso Viejo CA

RecommendedJobs for You

Hyderabad, Telangana, India

Trivandrum, Kerala, India

Hyderabad, Telangana, India

Trivandrum, Kerala, India