Posted:9 hours ago|
Platform:
On-site
Full Time
SOC Automation engineer Location: Gurgaon Experience: 5-8 years Immediate joiners Preferred. Mandatory Skills: Power BI, Python & incident response ********* Kindly share resume to nsenthil.kumar@genpact.com with Sub of "SOC Automation" along with notice period********* · This role will enhance the client Cyber Security Incident Response Team’s (CSIRT) automation and orchestration capabilities (SOAR). The candidate will be responsible for developing, implementing, and maintaining automation solutions to enhance security monitoring and incident response capabilities. · The ideal candidate will have experience in IR and a SOC environment and automation and orchestration experience. Moreover, the candidate will be able to apply the experience in incident response to identify and develop automation workflows that will enhance operations. Responsibilities · Work closely with CSIRT team people & technology to detect, assess, and communicate cyber threats. · Identify IR automation opportunities and areas to reduce waste and collaborate with internal CSIRT members on automation requests. · Develop and maintain automated playbooks for incident response, threat detection, and monitoring. · Collaborate with SOC analysts to identify repetitive tasks and manual processes suitable for automation. · Perform incident response leveraging security tools such as SIEM, EDR solutions, Cloud security solutions, and Threat Intelligence tools. · Coordinate with different teams across the business through all phases of incident response. · Develop and implement automated workflows to enhance incident response tasks and detection. · Knowledge and skills in query languages useful for threat hunting and detection engineering. · Knowledge of APIs, RESTful services, and integration techniques for security tools. Qualifications we seek in you · Bachelor’s degree (or equivalent) in Computer Science, Cybersecurity, Information Security, or a related field. · Experience of information security experience, with a very strong technical background. Preferred Qualifications/ Skills · Demonstrated Incident Response and SOC experience. · Basic exposure to threat hunting methods and tools, including SIEM platforms, EDR solutions, network traffic analysis tools, and threat intelligence feeds. · Well versed with analysing and interpreting security logs, network traffic, and endpoint data to identify and investigate potential security incidents. · Basic exposure to crafting SIEM queries for investigation, threat hunting, and/or detect engineering. · Basic exposure to threat intelligence frameworks and methodologies, including STIX/TAXII, MITRE ATT&CK framework, and other relevant standards. · Skilled in scripting languages like Python, PowerShell, and Bash, with a deep understanding of automation tools and methodologies. · Experience in cyber security incident response and incident management. · Keen ability to identify waste and improve processes by leveraging automation in an efficient manner. · Ability and experience integrating security tools to perform automation and orchestration. · Excellent problem-solving and analytical skills.
Genpact
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Gurugram, Haryana, India
Salary: Not disclosed
Gurugram, Haryana, India
Salary: Not disclosed