Security Operation Analyst

  • Hyderabad
  • E2open
Title: Security Operation Analyst Location: Hyderabad Job Descriptions The Cyber Security Analyst be responsible for handling security events/alerts and providing rapid response with the understanding of network infrastructure and security tools. In addition to this, the analyst will be responsible for executing a cyber threat hunting program to identify, detect, mitigate, and respond to cyber threats and advanced threat actors. Responsibilities and Tasks Performing daily detect and response functions, closely aligned with typical SOC functions. Analyze, and investigate alerts/incidents as required, perform in-depth analysis, summarize observations, and perform root cause analysis as required. Conduct proactive threat-hunting operations to detect and investigate sophisticated cyber threats including advanced persistent threats (APTs). Analyze security event logs, network traffic, and other security data to identify indicators of compromise (IOCs) and potential security breaches. Enhance detection and response capabilities by creating and enhancing threat-hunting methodologies, processes, and playbooks. Investigate the various threat advisories/feeds received within the shift, in in-line with the defined process. Present threat hunt findings to management and develop use cases on pervasive threats as identified by Offensive Security/Red teams and recent security incidents. Provide technical and service mentorship to other SOC analysts. Stay up to date with the latest cybersecurity threats, vulnerabilities, and attack methodologies. Required Experience and Knowledge: 2-4 years of Experience Excellent communication skills, with an emphasis on the ability to discuss technical issues with non-technical people. Experience of cyber threat hunt working within a global organization and understanding of offensive security strategies and assessment methodologies. Have an understanding in at least three of the following areas: Network, and Internet Security; Operations Security; Risk and Compliance; Access Control Systems and Methodologies; Security Architectures and Models; Security Management Practices; Investigative Techniques. Exposure to Incident Response, Threat Hunting, and Vulnerability Management among other cyber security streams Excellent Organizational skills and the ability to see Incidents to their conclusion. The ability to define and communicate risk in business-relevant language. The ability to react to high-pressure dynamic changing environments. Advanced problem-solving and analytical skills. Background and Education: Bachelor’s degree or higher from an accredited 4-year university CEH /CompTIA certified.