Security Operations Centre (SOC) - Information Security

12 years

0 Lacs

Posted:4 days ago| Platform: Linkedin logo

Apply

Work Mode

On-site

Job Type

Full Time

Job Description

  • Align with the SOC maturity roadmap and assign priorities for implementation.
  • Driving creating use cases for new scenarios and/or fine tuning the existing scenarios.
  • Help create play books in SOAR for various use cases that Tier 1/Tier 2 teams.
  • Provide overall direction for the SOC function and input to the overall cyber defense strategy.
  • Collaborate and create synergies within the cyber team and wider IT function.
  • Ensure SOC function is delivering the core monitoring, threat detection and response activities adhering to the defined SLAs and SOPs.
  • Help drive upskilling of existing SOC team members in new cybersecurity technologies.
  • Continuously monitor the effectiveness of incident detection and response solution and provide improvement inputs to SOC Architecture and Engineering teams.
  • Measure and mature the SOC service SLAs/KPIs from time to time.
  • Continuously work with technology teams to integrate new feeds into SIEM.
  • Broad knowledge of cybersecurity functions beyond traditional SOC operations (e.g. vulnerability management, application security, penetration testing, data protection, identity and privileged access).
  • Working knowledge of incident ticketing platforms
  • Should possess hands on experience of security Information Event Monitoring (SIEM) platforms, Endpoint Detection and Response (EDR) platforms, Network Security Monitoring (NSM)/Network Detection and Response (NDR) platforms and other leading tools and technologies of Cyber Defence domain.
  • Working knowledge of security alert triage and analysis methods (e.g., use of correlations, behaviors, and patterns, pivoting, enriching alert data and providing remediation recommendations)
  • Experience with threat hunting and threat hunting methodologies
  • Experience with cybersecurity incident response coordination and methods
  • Experience integrating cyber threat intelligence with security monitoring processes and threat hunting
  • Knowledge of detection rule logic management (e.g., creation, tuning and management methods)
  • Knowledge of cybersecurity frameworks (e.g., Mitre ATT&CK, VERIS, Cyber Kill Chain, Diamond Model, and other frameworks)
  • Knowledge of cloud infrastructures and cloud security monitoring (Azure, AWS, and GCP)
  • Knowledge of network communication concepts including ports, protocols, and encryption
  • Plan, direct and control the SOC functions and operation
  • Ensure the monitoring and analysis of incidents to protect People, Technology and Process addressing all security incidents and ensuring timely escalation.
  • Direct the Cyber Intelligence capability to identify potential threats delivering strategic reports and strategies to minimise the impact of the threat.
  • Ensuring incident identification, assessment, quantification, reporting, communication, mitigation and monitoring
  • Ensuring compliance to policy, process, and procedure adherence and process improvisation to achieve operational objectives
  • Revising and develop processes to strengthen the current Security Operations Framework, Review policies and highlight the challenges in managing SLAs
  • Responsible for overall use of resources and initiation of corrective action where required for Security Operations Center
  • Ensuring threat management, threat modeling, identify threat vectors and develop use cases for security monitoring
  • Creation of reports, dashboards, metrics for SOC operations and presentation to Sr. Mgmt.
  • Co-ordination with stakeholders, build and maintain positive working relationships with them
  • Be a thought leader in security engineering and operations delivery - driving automation, analytics, and advanced threat analysis.
  • Oversee technical delivery, assessing and continually improving output and ensuring processes are developed and adhered to drive operational excellence.
  • Benchmark, analyze, report on, and make recommendations for the improvement and growth of the Next Generation infrastructure and systems.
  • Participate in quarterly business reviews with vendors and customers.
  • Manage the deployment, monitoring, maintenance, development, upgrade, and support of all Client managed systems, operating systems, hardware, and software.
  • Keep current with the latest vendor updates, expansion opportunities, and technology directions, utilized in the Clients environment.
  • Collaborate and consult with other Group Managers on the overall advancement of the Emerging Services organization and Optiv in general.
  • Establish operational foundations, defining metrics and KPIs to drive governance, quality, and efficiency. Influence and improve existing processes through innovation and operational change.
  • Manage staffing, including recruitment, supervision, scheduling, development, evaluation, and disciplinary actions.
  • Develop and maintain an educational environment where the knowledge and performance of the group is constantly advancing.
  • Perform annual staff appraisals.
  • Develop and mentor staff through open communication, training and development opportunities, and performance management processes; build and maintain employee morale and motivation.
  • Ensure incident identification, assessment, quantification, reporting, communication, mitigation, and monitoring.
  • Drive the implementation of emerging threat intelligence (IOCs, updated rules, etc.) to identify affected systems and the scope of the attack.
  • Implement standards and procedures to ensure alerts are addressed with relevancy, accuracy and in a timely manner
  • Operate autonomously to further investigate and escalate in accordance with policies, procedures and defined processes


Educational Qualification

  • Engineering graduate from Computer Science, IT, Telecommunication or a similar discipline
  • Post-Graduation: PGDIT, MCA, MBA


Key Skills

  • Certification like CISSP, CISA or CISM
  • Ability to handle senior management escalation.
  • Vendor management Skills
  • Effective communication
  • Proficient team leader
  • Strategic skills
  • Decision making and communication.
  • Risk management skills
  • Knowledge of latest cyber security trends & global industry best practices pertaining to financial Industry
  • Technical working knowledge, understanding of SIEM technology, various other security technology (EDR, NDR, HIPS, WAF, IDS, IPS, Firewall, Networking) etc.


Experience

  • Overall 12 - 15 year on experience in Information/Cyber Security experience working in a SIEM tool (Next-Gen SIEM, UEBA, etc.) with strong background in security incident monitoring, response, and operations.
  • Experience in managing 24x7 Cyber Security Operations Center (CSOC) for 5+ years managing teams from Leadership level primarily involved in Cyber Defense
  • Experience in managing 20+ members team which may include vendor teams.
  • Certification like SANS, OSCP/OSCE and CREST will be added advantage (CEH, Security+, OSCP, CISSP or other industry-relevant cyber-security certifications and ITIL V3.0, GIAC (e.g. GCIA, GCFE, GCIH), ISC2 (e.g. CCSP), or EC-COUNCIL (e.g. CEH) preferred. Etc.)

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You