You are on page 1of 2

JOB DESCRIPTION

Position Title SOC Executive


Department IT Infra
Level / Band
Reporting to (Title) Infra Manager
Employment Type (Permanent / Contract/ Permanent
Freelancer)
Location Mumbai

Details

Job Purpose

Role and Responsibility:

• Responsible for working in a global 24x7 Security Operation Center (SOC)


environment which consists of an in-house and outsourced SOC.
• Perform real-time alert monitoring and detection & alerting process.
• Raise a ticket for open points and tract till closure
• Work on critical, warning alerts and track till closure across multiple security
dashboards and monitoring services
• Provide analysis and trending of security log data from a large number of
heterogeneous security devices across different layers.
• Provide Incident Response (IR) support when analysis confirms actionable
incident from the outsourced SOC and internal systems.
• Provide threat and vulnerability analysis as well as security advisory services.
• Analyze and respond to previously undisclosed software and hardware
vulnerabilities.
• Investigate, document, and report on information security issues and
emerging trends.
• Integrate and share information with other analysts and teams.
• Participate in security projects and assist network operations and
engineering teams.
• Other tasks and responsibilities as assigned through ticketing system.
• Creation of SOC reports, analytical Stats presenting performance,
dashboards, metrics for SOC operations and presentation to Sr. Mgmt.
• Ensuring daily/weekly/monthly management, administration & maintenance
of security devices to achieve operational effectiveness
• Revising and develop processes to strengthen the current Security
Operations, Review policies and highlight the challenges in managing SLAs
• Ensuring incident identification, assessment, quantification, reporting,
communication, mitigation and monitoring
• Work across multiple shifts
Educational Qualification

• Bachelor's degree/diploma in a related field (Security, Forensics or Computer Science is


preferred)
• At least 1 years of experience as a security analyst, incident handler/responder, security
engineer or penetration tester.
• Excellent knowledge of security methodologies, processes like Kill chain.
• Excellent knowledge of technical security solutions (firewalls, SIEM,
NIDS/NIPS/HIDS/HIPS, AVs, DLP, proxies, network behavioral analytics, endpoint and
cloud security).
• In depth knowledge of TCP/IP, UDP, DNS, FTP, SSH, SSL/TLS and HTTP Protocols,
network analysis, and network/security applications.

Skills and experience:

• Candidate should have at least 1-2 years of experience

Desirable

Soft Skills:
• Excellent oral and written communications with good presentation
skills
• Leadership Skills
Budget:
• 2:60- 3:20 LPA

You might also like