Work from Office
Full Time
Incedo is a US-based consulting, data science and technology services firm with over 3000 people helping clients
from our six offices across US, Mexico and India. We help our clients achieve competitive advantage throughend-to-end digital transformation. Our uniqueness lies in bringing together strong engineering, data science, anddesign capabilities coupled with deep domain understanding. We combine services and products to maximizebusiness impact for our clients in telecom, Banking, Wealth Management, product engineering and life science& healthcare industries. Working at Incedo will provide you an opportunity to work with industry leading client organizations, deeptechnology and domain experts, and global teams. Incedo University, our learning platform, provides amplelearning opportunities starting with a structured onboarding program and carrying throughout various stages ofyour career. A variety of fun activities is also an integral part of our friendly work environment. Our flexiblecareer paths allow you to grow into a program manager, a technical architect or a domain expert based on yourskills and interests. Our Mission is to enable our clients to maximize business impact from technology by
Position Description:
Incedo is seeking a SOC Analyst (L3/Tier 3/Threat Hunter) to join our rapidly growing cybersecurity team!Role and responsibilities:Participate in a rotating SOC on-call; rotation is based on the number of team members.Provide first-line SOC support with timely triage, routing and analysis of SOC tasks.Researches, develops, and monitors custom visualizations.Researches, analyzes, and writes documents such as cybersecurity briefings for all levels of stakeholders from Tier 1-3 SOC, security engineering, and executives.Tunes and develops SIEM correlation logic for threat detection.Ensures documentation is accurate and complete, meets editorial and government specifications, and adheres to standards for quality, graphics, coverage, format, and style.Develop scripts using Python to automate IR functions, including (but not limited to) IOC ingestion and SIEM integration via REST APIs to minimize repetition of duties and automate tasks.Produce and review aggregated performance metrics.Perform Cyber Threat Assessment and Remediation AnalysisProcessing, organizing, and analyzing incident indicators retrieved from the client environment and correlating said indicators to various intelligence data.Assisting in the coordination with internal teams as well as in the creation of engagement deliverables for a multitude of activities, including but not limited to Insider Threats, Rule of Engagement (ROE), Threat Hunting, After Action Reports, and other artifacts to support testing, monitoring and protecting the enterprise.Investigate network and host detection and monitoring systems to advise engagement processes.Develop and Execute bash and python scripts to process discrete log files and extract specific incident indicators; develop tools to aid in Tier 1 and Tier 2 functions.Participate in on-call rotation for after-hours security and/or engineering issues.Participate in the increase of effectiveness and efficiency of the SOC, through improvements to each function as well as coordination and communication between support and business functions.Think critically and creatively while analyzing security events, network traffic, and logs to engineer new detection methods.Work directly with Security and SOC leadership on cyber threat intelligence reports to convert intelligence into useful detection.
Required Experience / Skills:
Minimum of nine (9) years technical experience7+ years of experience in SOC, security operations, cyber technical analysis, threat hunting, and threat attribution assessment with increasing responsibilities.3+ years of rule development and tuning experience1+ years of Incident responseDeep understanding of Cyber Threat TTPs, Threat Hunt, and the application of the MITRE Attack FrameworkKnowledge of security operations and attacker tacticsAbility to identify cyber-attacks and develop monitoring logicExperience supporting 24x7x365 SOC operations including but not limited to Alert and notification activities- analysis/triage/response, Review and action on Threat Intel for IOCs and other operationally impactful information, initial review and triage of reported alerts and Incidents.Support alert and notification triage, review/analysis through resolution / closeManage multiple tickets/alerts in parallel, including end-user coordination.Demonstrated ability to evaluate events (through a triage process) and identify appropriate prioritization for response.Solid understanding and experience analyzing security events generated from security tools and devices not limited to QRadar, MS Sentinel, FireEye, Elastic, SourceFire, Malware Bytes, CarbonBlack/Bit9, Splunk, Prisma Cloud/Compute, Cisco IronPort, BlueCoatExperience and solid understanding of Malware analysisDemonstrated proficiencies with one or more toolsets such as QRadar, MS Sentinel, Bit9/CarbonBlack, Endgame, FireEye HX / CM / ETP, Elastic KibanaExperience and ability to use, contribute, develop and follow Standard Operating Procedures (SOPs)
Incedo
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Gurugram
9.0 - 14.0 Lacs P.A.
Ahmedabad
12.0 - 18.0 Lacs P.A.
kochi, kerala
Salary: Not disclosed
Gurugram, Haryana, India
Salary: Not disclosed
1.2 - 1.2 Lacs P.A.
Gurugram, Haryana, India
Salary: Not disclosed
Gurugram, Haryana, India
Salary: Not disclosed
Gurugram, Haryana, India
Salary: Not disclosed
Gurugram, Haryana, India
Salary: Not disclosed
Bengaluru, Karnataka, India
Salary: Not disclosed