Posted:1 month ago|
Platform:
Work from Office
Full Time
The primary role of a Security Analyst (L2) is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures. Specifically, these analysts will be responsible for monitoring the SIEM tools for security events and closing or escalating those events as necessary. Security Analysts maintain the group email address and distribution lists, answer the main phone lines, and update all relevant documentation such as shift logs and tickets. Additionally, assist the MDR Analyst in an incident workflow and assist the MDR team in incident detection, remediation and communicate with external teams in proper incident resolution. We are currently seeking a Senior Security Associate for our KPMG Managed Services (Spectrum) practice to join us in our Bangalore office.
1. Rapidly identify, categorize, prioritize and investigate events as the initial cyber event detection group for the enterprise using all available security logs and intelligence sources to include but not limited to:
a. Firewalls (Zscalar, Cisco ASA & Palo Alto etc.,)
b. Systems and Network Devices
c. Web Proxies (Zscalar)
d. Intrusion Detection/Prevention Systems (Zscalar, Cisco ASA & Palo Alto etc.,)
e. Data Loss Prevention (Zscalar)
f. EDR / Antivirus Systems (Crowd Strike, MDE etc.,)
g. Knowledgebase Framework (Confluence)
2. Continuously monitor SIEM and logging environments for security events and alerts to threats, intrusions, and/or compromises, including:
3. Validate alerts as they come in to eliminate false positives and use other internal and external data sources to enrich alerts with additional context
4. Perform triage of service requests from customers and internal teams
5. Use playbook procedures to carry out standard plays for routine event types and escalate alerts to Level 2 Analysts for further triage and remediation
6. Assist with containment of threats and remediation of environment during or after an incident
7. Act as a participant during Threat Hunting activities at the direction of one or more Incident Response Handlers
8. Document event analysis and write comprehensive reports of incident investigations
9. Proactively improve security-related operational processes and procedures
10. Use available security tools for historical analysis purposes as necessary for detected events; for example, historical searches using SIEM tools (Splunk & Microsoft Sentinel)
11. Maintain operational shift logs with relevant activity from the Analysts shift. Document investigation results, ensuring relevant details are passed to Level 2 or MDR Analysts for final event analysis
12. Update/reference knowledgebase tool (e.g. Confluence) as necessary for changes to processes and procedures, and ingest of daily intelligence reports and previous shift logs
13. Conduct research and document events of interest within the scope of IT Security
14. Alternatively, consulting, or advisory experience in Security Operations
15. Monitor and analyse Intrusion Detection Systems (IDS), Anomaly Detection Systems (ADS), Firewall event logs, Security Incident and Event Management (SIEM) toolset and other event logs to identify security attacks and threats for remediation/suppression.
16. Validate IOCs that triggered the original alert.
17. Research additional internal and external data sources for additional enrichment of event information
18. Determine when an event has reached the threshold of an incident and engage Incident Response Handler to declare an incident.
19. Create filters, data monitors, dashboards, and reports within monitoring utilities.
20. Troubleshoot security monitoring devices to improve event correlation and performance.
21. Handle high and critical severity incidents as described in the operations playbook.
22. Operational level experience in some of these domains (not all): security engineering, alert triaging, rule writing, incident response, DFIR, threat intelligence and management, vulnerability management, and security control testing
23. In-depth knowledge of at least one SIEM platform or security data lake and related processes
24. Knowledge of various security tools, their functions, and comparisons
25. Knowledge of network and cloud security fundamentals
26. Ability to explain complex technical concepts in business terms.
27. Extensive experience in report writing and presentation.
28. Strong, adaptable, and flexible work ethic
29. Good time management skills
30. Ability to work under pressure and prioritise activities
Flexability Hr Solutions
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Noida
3.4 - 5.425 Lacs P.A.
5.0 - 10.0 Lacs P.A.
Noida, Hyderabad, Bengaluru
10.0 - 20.0 Lacs P.A.
Bengaluru
7.0 - 9.0 Lacs P.A.
Navi Mumbai, Mumbai (All Areas)
0.5 - 0.5 Lacs P.A.
Gurugram
9.6 - 18.0 Lacs P.A.
Ahmedabad, Gujarat, India
Salary: Not disclosed
Noida, Gurugram, Delhi / NCR
4.0 - 9.0 Lacs P.A.
Hyderabad
15.0 - 20.0 Lacs P.A.
Bengaluru
8.0 - 18.0 Lacs P.A.