Posted:1 week ago|
Platform:
Hybrid
Full Time
The SOC L1 Analyst is responsible for the first line of defense in the Security Operations Center (SOC). This role involves monitoring, analyzing, and responding to security events and incidents using IBM QRadar. The L1 Analyst will work closely with other SOC team members to identify potential security threats and ensure the security of the organization's information systems. Key Responsibilities: Monitoring and Analysis: Monitor security alerts and events using IBM QRadar. Analyze security incidents and determine their impact and urgency. Escalate incidents to L2/L3 analysts as necessary. Incident Response: Respond to security incidents promptly and accurately. Follow incident response procedures and document actions taken. Assist in the containment and mitigation of security threats. Threat Intelligence: Utilize threat intelligence sources to identify new and emerging threats. Correlate security events with threat intelligence to enhance detection capabilities. Reporting and Documentation: Maintain accurate and detailed records of security incidents and actions taken. Generate daily, weekly, and monthly reports on security events and incidents. Collaboration and Communication: Collaborate with other SOC team members to share knowledge and improve detection and response processes. Communicate effectively with other IT and security teams to coordinate responses to security incidents. Continuous Improvement: Participate in SOC training sessions and stay updated on the latest security trends and technologies. Provide feedback to improve SOC processes and QRadar configurations. Qualifications: Education: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Experience: 2-3 years of experience in a SOC or similar environment. Certifications: Relevant certifications such as CompTIA Security+, CEH (Certified Ethical Hacker), IBM QRadar Certification are preferred. Skills: Technical Skills: Proficiency with IBM QRadar and its components. Understanding of network protocols, intrusion detection systems, and firewall technologies. Basic knowledge of malware analysis and threat intelligence. Familiarity with incident response procedures and best practices. Analytical Skills: Strong analytical and problem-solving skills. Ability to analyze security alerts and determine their severity and impact. Communication Skills: Excellent verbal and written communication skills. Ability to document incidents and communicate effectively with team members and other departments. Soft Skills: Attention to detail and a proactive approach to security monitoring. Ability to work in a fast-paced environment and handle multiple tasks simultaneously. Strong teamwork and collaboration skills.
Capgemini
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Hyderabad, Bangalore Rural, Bengaluru
6.0 - 12.0 Lacs P.A.
Bengaluru
20.0 - 25.0 Lacs P.A.
Bengaluru
12.0 - 16.0 Lacs P.A.
Bengaluru
25.0 - 30.0 Lacs P.A.
10.0 - 15.0 Lacs P.A.
Bengaluru
7.0 - 10.0 Lacs P.A.
3.0 - 7.0 Lacs P.A.
Gurugram
4.0 - 8.0 Lacs P.A.
9.0 - 13.0 Lacs P.A.
4.0 - 5.0 Lacs P.A.