4 years
0 Lacs
Posted:9 hours ago|
Platform:
On-site
Contractual
A level two (L2) Security Operation Center (SOC) analyst performs a number of activities in addition to the incident triage activities.
Manage Security Incident end to end life-cycle till resolution
Participate in use case and rule workshops
Participate in rule tuning sessions
Participate in response procedure workshops
Participate in lessons learned workshops
Participate in education sessions as needed
Shift meetings (typically start and end of shift)
Record key metrics (auto or manual) to document:
- Response time
- Handle time
- Cycle time
- Quality
- Error rates
- Feedback
Review Incident Response Procedures by Threat Categories
Review threat intelligence briefs
Maintain and manage skills development plans
Provides feedback on quality of SA assessment to L1 Monitoring team
Lessons Learned reviews
Strong hands-on experience with SIEM tools (e.g., IBM QRadar, Splunk, ArcSight).
Knowledge of IDS/IPS, firewalls, endpoint detection and response (EDR), and threat intel platforms.
Proficiency in incident response, malware analysis, phishing detection, and network security monitoring.
Understanding of MITRE ATT&CK framework and cyber kill chain.
Familiarity with scripting (Python, PowerShell, Bash) for automation and enrichment.
Innova ESI
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Practice Python coding challenges to boost your skills
Start Practicing Python Nownoida, uttar pradesh, india
Salary: Not disclosed
noida, uttar pradesh, india
Salary: Not disclosed