Posted:3 days ago|
Platform:
On-site
Full Time
Project Role : Security Advisor
Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders.
Must have skills : Security Information and Event Management (SIEM)
Good to have skills : NA
Minimum 3 year(s) of experience is required
Educational Qualification : 15 years full time education
Role Summary: The SOC Analyst plays a critical role in the first line of cyber defense by monitoring and triaging security alerts generated by Microsoft Sentinel. This role is responsible for identifying potential threats through continuous monitoring of security dashboards, performing initial analysis, executing predefined response actions, and escalating incidents based on severity. The analyst will work closely with L2/L3 analysts to ensure timely escalation and incident closure while maintaining accuracy and SLA adherence. This role is ideal for individuals developing their skills in SIEM operations and security monitoring with a focus on Microsoft’s security ecosystem. Roles & Responsibilities - Monitor Microsoft Sentinel dashboards and respond to alerts. - Perform initial triage, classification, and correlation of security events. - Trigger and monitor predefined SOAR playbooks. - Create and update incident tickets with all required details. - Escalate validated incidents to L2/L3 teams for deeper investigation. - Support daily SOC health checks and Sentinel connector status reviews Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Information and Event Management (SIEM) Operations. - Strong understanding of incident response processes and procedures. - Experience with security monitoring tools and techniques. - Knowledge of compliance frameworks and regulations related to cybersecurity. - Ability to analyze security incidents and provide actionable insights. - Experience in SOC / IT security. - Basic knowledge of Microsoft Sentinel and KQL. - Familiarity with Defender for Endpoint, Identity, and Microsoft 365 Security. - Ability to follow runbooks, good verbal and written communication. Additional Information: - The candidate should have minimum 3 years of experience in Security Information and Event Management (SIEM) Operations. - This position is based at our Bengaluru office. - A 15 years full time education is required.
Accenture
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Chennai, Tamil Nadu, India
Salary: Not disclosed
Noida, Uttar Pradesh, India
Salary: Not disclosed
Greater Kolkata Area
Salary: Not disclosed
Gurugram
4.0 - 8.0 Lacs P.A.
Gurugram
4.0 - 8.0 Lacs P.A.
Bengaluru
4.0 - 8.0 Lacs P.A.
Bengaluru, Karnataka
Salary: Not disclosed
Chennai, Tamil Nadu
Salary: Not disclosed
Bengaluru
Salary: Not disclosed
Bengaluru, Karnataka
Salary: Not disclosed