T&T - Cyber - D&R - SIEM - Consultant

3 - 6 years

14 - 18 Lacs

Posted:2 hours ago| Platform: Naukri logo

Apply

Work Mode

Work from Office

Job Type

Full Time

Job Description

Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks

Preferred Knowledge

  • 3-6 years of experience in 24x7 (rotating shifts) monitoring at a Security Operations center
  • Must have hands-on experience with Microsoft Sentinel, Google SecOps, and Microsoft Defender along with security tools such as IBM QRadar, FireEye Anti-APT solution
  • Review and triage information security alerts worked by L1, provide analysis, determine and track remediation, and escalate as appropriate
  • Desirable to have experience of SOC Monitoring and tirage using SOAR
  • Knowledge on XDR can be an added advantage
  • Knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
  • Fundamental understanding of network traffic analysis including TCP/IP, routing, switching, protocols, etc.
  • Reviews the most recent SIEM alerts to see their relevance and urgency. Carries out triage to ensure that a genuine security incident is occurring. Oversees and configures security monitoring tools
  • Inform L3 team of proactive and reactive actions to minimize false positives
  • Maintain, manage, improve and update security incident process and protocol documentation (Run Book)
  • Strong understanding of Windows event log analysis
  • Acts as Security Incident Handler for high-impact cyber security incidents and advanced attacks in accordance with Cyber Kill Chain methodology and incident response process.
  • Conducts malware analysis and identification of Indicators of Compromise (IOCs) to evaluate incident scope and associated impact.
  • Enhances workflow and processes driving incident response and mitigation efforts
  • Practical understanding of exploits, vulnerabilities, computer network intrusions, adversary tactics, exfiltration techniques and common knowledge
  • Demonstrate proficiency in the Incident Response Process as well as the performance of threat hunting and SOC operations.
  • Log analysis across disparate log sources, prioritize and differentiate between potential intrusion attempts and false alarms
  • Sound understanding of different attack frameworks like Kill Chain MITRE ability to utilize them for incident response reporting.

Preferred Certifications:

  • IBM QRadar SIEM Certification.
  • CISSP, CEH, CISM, or other relevant security certifications

Desired qualifications

  • Education B.E / B.Tech (Tier 1/2) in Computer Science, Information Technology or related fields

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now

RecommendedJobs for You