Your browser does not support javascript! Please enable it, otherwise web will not work for you.

SIEM Qradar @ Capgemini

Home > IT Security

 SIEM Qradar

Job Description

  • The SOC L1 Analyst is responsible for the first line of defense in the Security Operations Center (SOC).
  • This role involves monitoring, analyzing, and responding to security events and incidents using IBM QRadar. The L1 Analyst will work closely with other SOC team members to identify potential security threats and ensure the security of the organization's information systems.

Key Responsibilities:


Monitoring and Analysis:


  • Monitor security alerts and events using IBM QRadar.
  • Analyze security incidents and determine their impact and urgency.
  • Escalate incidents to L2/L3 analysts as necessary.
  • Incident Response:
  • Respond to security incidents promptly and accurately.
  • Follow incident response procedures and document actions taken.
  • Assist in the containment and mitigation of security threats.

Threat Intelligence:

  • Utilize threat intelligence sources to identify new and emerging threats.
  • Correlate security events with threat intelligence to enhance detection capabilities.
  • Reporting and Documentation:
  • Maintain accurate and detailed records of security incidents and actions taken.
  • Generate daily, weekly, and monthly reports on security events and incidents.
  • Collaboration and Communication:
  • Collaborate with other SOC team members to share knowledge and improve detection and response processes.
  • Communicate effectively with other IT and security teams to coordinate responses to security incidents.

Continuous Improvement:


  • Participate in SOC training sessions and stay updated on the latest security trends and technologies.
  • Provide feedback to improve SOC processes and QRadar configurations.

Qualifications:

  • Education: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
  • Experience: 2-3 years of experience in a SOC or similar environment.
  • Certifications: Relevant certifications such as CompTIA Security+, CEH (Certified Ethical Hacker), IBM QRadar Certification are preferred.

Skills:


Technical Skills:

  • Proficiency with IBM QRadar and its components.
  • Understanding of network protocols, intrusion detection systems, and firewall technologies.
  • Basic knowledge of malware analysis and threat intelligence.
  • Familiarity with incident response procedures and best practices.

Analytical Skills:


  • Strong analytical and problem-solving skills.
  • Ability to analyze security alerts and determine their severity and impact.

Communication Skills:


  • Excellent verbal and written communication skills.
  • Ability to document incidents and communicate effectively with team members and other departments.

Soft Skills:


  • Attention to detail and a proactive approach to security monitoring.
  • Ability to work in a fast-paced environment and handle multiple tasks simultaneously.
  • Strong teamwork and collaboration skills.

Job Classification

Industry: IT Services & Consulting
Functional Area / Department: IT & Information Security
Role Category: IT Security
Role: Cyber Security
Employement Type: Full time

Contact Details:

Company: Capgemini
Location(s): Hyderabad

+ View Contactajax loader


Keyskills:   SOC SIEM Qradar Security Information And Event Management Siem Qradar

 Fraud Alert to job seekers!

₹ Not Disclosed

Similar positions

Sr. SIEM Administrator - ELK

  • Atos
  • 3 - 7 years
  • Mumbai
  • 5 days ago
₹ Not Disclosed

SIEM Qradar Engineer

  • Capgemini
  • 4 - 9 years
  • Hyderabad
  • 19 days ago
₹ Not Disclosed

QRadar SIEM Administrator

  • Inspira Enterprise
  • 6 - 11 years
  • Pune
  • 24 days ago
₹ 15-30 Lacs P.A.

Soc Analyst For -mumbai -4+yrs.exp Xdr,siem,soar

  • Locuz
  • 4 - 8 years
  • Mumbai
  • 27 days ago
₹ Not Disclosed

Capgemini

Capgemini Invent