Work from Office
Full Time
Monitor the infrastructure to detect cyber security events, triage them and follow established incident response processes Participate in Incident Analysis and Response Participate in the evolution of use cases, incident response processes as well as other tasks performed by the team Requirements Bachelors or Master Degree level in Computer Sciences, Computer Engineering, Software Engineering, Information Security or any other equivalent degree Minimum of 4 years of experience in the Information Security field Experience Identification, triage of Cyber Security Events Deliver 24/7 monitoring of Security Alerts generated by SIEM Tools (Azure Sentinel, Qradar, Cofence) Integrate with CGI Security Orchestration and Response (SOAR) solution, pulling alert data from by SIEM Tools (Azure Sentinel, Qradar, Cofence) to support security analyst monitoring activities to gain investigation intelligence; Run enrichment playbooks against the alert(s) to extract and augment data provided with the initial alert to further drive and help analysts in their event classification and analysis. Engage incident process playbooks to ensure standardization and enhanced SOC response capabilities, when or if a security issue is declared Ensure SLA requirements are being met and proper processes used. Post Security Incident Reports to the clients MSS Security portal Monitor for suspicious activities, including predefined threat signature criteria, and indicators of attack Use pre-configured alerts to rapidly identify suspicious activities Respond to generated security events and assess whether or not a valid security incident has occurred Notify clients designated contacts and recommend next steps to follow if an incident is identified; Collaborate with the hardening team to address security events that have been determined to be a false positives Recommend improvements to dashboards and Sentinel tuning/normalization to the hardening team as applicable Triage and assessment of potentially infected Windows hosts Response to phishing campaigns Response to cyber security events in Microsoft Office 365 Tools Support Monitoring - Working knowledge of systems such as SIEM, EDR, Antivirus, Splunk, MS Defender Knowledge and Skills Security is a passion Knowledge Experience on Splunk, QRadar, Azure Sentinel is must Knowledge in malware investigations and remediations Good understanding of the Windows operating system and protocols such as TCP/IP , HTTP, SMTP Strong analytical and investigative skills Strong technical and learning agility, able to adapt to constantly evolving threats, domains and technologies Good written communication skills Ability to work independently, under pressure Skills: Security Infrastructure Supprt Security Operations Center Splunk Vulnerability Management(IAVM)
CGI
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
My Connections CGI
Experience: Not specified
Salary: Not disclosed
Gurugram, Haryana, India
Salary: Not disclosed
Vadodara
5.0 - 8.0 Lacs P.A.
Mumbai
3.0 - 7.0 Lacs P.A.
Experience: Not specified
2.75 - 9.0 Lacs P.A.
Vadodara, Gujarat, India
Salary: Not disclosed
Hyderabad, Telangana, India
Salary: Not disclosed
Bengaluru
8.5 - 11.0 Lacs P.A.
Hyderabad, Telangana, India
Salary: Not disclosed
Noida, Uttar Pradesh, India
Salary: Not disclosed