Home
Jobs

1 Network Probing Jobs

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8 - 10 years

18 - 20 Lacs

Bengaluru, Hyderabad

Hybrid

Naukri logo

Work Locations: Hyderabad & Bangalore only (local candidates are required as the final round will be in-person) Minimum 4yrs of experience of SOC L2 is required for this position. JD: Work you'll do As a Fusion Level 2 Consultant you will support the Security Operations Center (SOC) as the first line of defense to identify potential information security incidents. Monitor client sources of potential security incidents, health alerts with monitored solutions and requests for information. This includes the monitoring of real-time channels or dashboards, periodic reports, email inboxes, helpdesk or other ticketing system, telephone calls, chat sessions. Follow client and incident-specific procedures to perform triage of potential security incidents to validate and determine needed mitigation. Escalate potential security incidents to client personnel, implements countermeasures in response to others, and recommend operational improvements. Keep accurate incident notes in case management system. Maintain awareness of the clients technology architecture, known weaknesses, the architecture of the security solutions used for monitoring, imminent and pervasive threats as identified by client threat intelligence, and recent security incidents. Provide advanced analysis of the results of the monitoring solutions, asses escalated outputs and alerts from Level 1 Analysts. Perform web hunting for new patterns/activities. Advise on content development and testing. Provide advice and guidance on the response action plans for information risk events and incidents based on incident type and severity. Ensure that all identified events are promptly validated and thoroughly investigated. Provide end-to-end event analysis, incident detection, and manage escalations using documented procedures. Devise and document new procedures and runbooks/playbooks as directed. Assist the Shift Leads and fulfill Shift Lead responsibilities in their absence. Maintain monthly Service Level Agreements (SLAs). Maintain compliance with processes, runbooks, templates and procedures-based experience and best practices. Assist Cyber Hunting team with advanced investigations as needed. Provide malware analysis (executables, scripts, documents) to determine indicators of compromise, and create signatures for future detection of similar samples. Continuously improve the service by identifying and correcting issues or gaps in knowledge (analysis procedures, plays, client network models), false positive tuning, identifying and recommending new or updated tools, content, countermeasures, scripts, plug-ins, etc. Perform peer reviews and consultations with Level 1 analysts regarding potential security incidents. Serve as a subject matter expert in at least one security-related area (e.g. specific malware solution, python programming, etc.) Actively seek self-improvement through continuous learning and pursuing advancement to a SOC Shift Lead. Provide shift status and metric reporting. Support weekly Operations calls. Adhere to internal operational security and other policies. Perform light project work as assigned. Required skills 4-6 years working in a SOC and/or strong security technology operations experience. Certified Information Systems Security Professional (CISSP), Certification in Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH) or equivalent. Able to work shifts on a rotating basis for 24/7 support of clients. Experience in security technologies such as: Security information and event management (SIEM), IDS/IPS, Data Loss Prevention (DLP), Proxy, Web Application Firewall (WAF), Endpoint detection and response (EDR), Anti-Virus, Sandboxing, network- and host- based firewalls, Threat Intelligence, Penetration Testing, etc. Knowledge of Advanced Persistent Threats (APT) tactics , technics and procedures. Understanding of possible attack activities such as network probing / scanning, DDOS, malicious code activity , etc. Understanding of common network infrastructure devices such as routers and switches. Understanding of basic networking protocols such as TCP/IP, DNS, HTTP. Basic knowledge in system security architecture and security solutions. Preferred skills Excellent interpersonal and organizational skills. Excellent oral and written communication skills. Strong analytical and problem-solving skills. Self-motivated to improve knowledge and skills. A strong desire to understand the what as well as the why and the how of security incidents. Qualification Bachelors degree is required. Ideally in Computer Science, Cyber Security, Information Security, Engineering, Information Technology.

Posted 3 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies