Security Operations Center Analyst

1 years

0 Lacs

Posted:4 days ago| Platform: Linkedin logo

Apply

Work Mode

Remote

Job Type

Full Time

Job Description

!! Attention !!

  • Please apply only if you are an immediate joiner

  • This is a full time position, with from office work only (NO WFH)

  • Position is based out of Hyderabad, India



Company Description

Castellum Labs is a Next Gen Cyber Security Technology Venture that started in 2018, from Hyderabad, India with global ambitions, to change the cybersecurity service model. The company's vision is to change the cybersecurity value model in the industry. They use SaaS platforms, advanced lab infra in the cloud and a team of specialized experts to deliver long-term value. Castellum Labs' primary focus areas in Cyber Security are application security, network and infra security, cloud security, threat detection and response, and Darkweb monitoring and OSINT.


Role Description

These are SOC Analysts / Sr. SOC Analysts (L1 and L2) position. All these positions require candidate to perform 24x7 monitoring of enterprise customers, from SOC Centre in Hyderabad, India. Role requires, eye on the glass monitoring, alert analysis, case management, incident reporting and forensic. Role is expected to operate across three shifts on a rotation basis. L1 is to focus on monitoring and incident detailing. L2 is to focus on incident analysis, data collection and report preparation.


Number of Positions - 4

Location - Hyderabad

Experience Needed - Minimum 1 years .. Maximum 6 years

Companies Preferred - People with experience in SOC tech companies (not from service companies)

Preference - People from strong networking & system admin background who transitioned into security

Condition - Strong interest in cyber security with demonstrable works/projects

Certifications Needed - None


Requirement

  • You should be working in a SOC in L1 and/or L2 position with real hands on work
  • We are not looking for L1 and L2 people who have done only eye on glass monitoring
  • Your graduation can be in any of the science or engineering subjects
  • Or else be in industry for one/two year with networking/admin background
  • You will handle
  • Alert monitoring
  • Alert analysis
  • Observables Establishment
  • Raw log fetching and analysis
  • Intelligence correlations
  • Incident reporting
  • Dashboard based outlier monitoring
  • Incident life cycle management process
  • SOAR automation development for customers
  • You should be self initiated and driven to learn cyber security
  • You should have worked and explored Linux during last two years
  • You should know github well and should have used some tools from git
  • You should have strong concept of cyber security fundamentals
  • You should have some basic knowledge on shell & python
  • You should have good enough concepts of different type of cyber attacks
  • Deep understanding of MITRE framework in context of real time monitoring
  • Very thorough understanding of the cyber kill chain and its applications in monitoring



If you have what it takes to become a great cyber security SOC Analyst, please apply.


Note --

  • Not a 9 to 5 role (Needs deep involvement and no time constraints should be there)
  • Needs an intent to get deeper into the cyber security areas across whole cyber spectrum
  • This is not a penetration testing role, so please do not apply if you wish to pursue VAPT career

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You