Orient Logic has an opening for a SOC Engineer to support the current Information Security requirements and objectives.
Job Duties/Responsibilities:
Responsible for security event monitoring, management, and response utilizing different toolsets.
Develop and improve monitoring strategies and analyze threats, using tools like SIEM, Firewalls, IDS, Insider Threat Management, DLP, EDR, Vulnerability Management, etc.
Perform a deep-dive incident analysis by correlating data from various sources and determine if a critical system or data set has been impacted, advise on remediation, and provide support for new analytic methods for detecting threats.
Conduct incident handling functions of containment, eradication and recovering, closeout reports and lessons learned, escalate to other members of the security team.
Review alerts to determine relevancy and urgency and communicate alerts to related units regarding intrusions to the network infrastructure, applications, and operating systems.
Collaborate with other teams to assess risk and develop improvement strategies for security posture.
Monitor open-source channels and determine which security issues may have an impact on the organization.
Stay up to date with current vulnerabilities, attacks, and countermeasures.
Required Qualifications:
2+ (two or more) years of relevant experience;
Strong experience in monitoring network traffic, Cyber Analyses, investigating computer and information security incidents, and Incident Handling.
Desired Qualifications:
Experience with IBM Qradar, Splunk, Elastic Stack, VMware Carbon Black, CrowdStrike, Cloudflare, Network Monitoring/Analyses, DLP and Vulnerability Management preferred.
Experience with rule-driven and analysis-driven network platforms like Snort, Zeek and Suricata.
Cyber Analyses / Ethical Hacking / Incident Handling / Cyber Forensics related certifications preferred.
Cyber Forensics experience desired.
Please fill out a short Application Form Deadline: 2022 15 April.
Thanks For Your Interests
Comments