Your browser does not support javascript! Please enable it, otherwise web will not work for you.

SOC Analyst Splunk @ Capgemini

Home > IT Security

 SOC Analyst Splunk

Job Description


We are looking for an experienced and motivated Incident Response Analyst with hands-on knowledge of SOC/SIEM(preferable Splunk), which can be a great addition to our Cybersecurity team. The role of monitoring, analysis, and response to the security incidents ensures the confidentiality, integrity, and availability of the information systems of the company. The suitable candidate would be familiar with the use of Splunk in order to analyze and remediate security threats and would collaborate with various teams for enhancing our security posture.


Role & responsibilities

Incident Detection and Analysis

Analyze all the active security alerts, events, and incidents on Splunk SIEM for detecting, investigating, and responding to security threats.

Conduct log analysis and pattern recognition on Splunk to identify anomalies or IOCs.

Create detailed incident reports based on investigation and root cause analysis for security events and incidents.

Carry out detection of potential threats through threat intelligence feeds and correlation rules.

Incident Response Management

First Responder for the Security Incident, ensuring that it is promptly and accurately handled, documented, and escalated.

Execution of the incident response lifecycle, including Containment, Eradication and Recovery

Work with IT, Network and other teams to contain and remediate incidents and ensure minimal impact and ability to restore normal operations

Proactively hunt for threats using Splunk and security tools to identify potential vulnerabilities.

Research emerging threats, vulnerabilities, and attack vectors and recommend associated detection methodologies.


Requirements:


  • Bachelor's degree in computer science, Cybersecurity, Information Systems or related field.
  • Experience in security operations, incident response and threat analysis
  • Good knowledge about the concepts of SIEM, SOC operations, log management, and threat intelligence.
  • Security frameworks: knowledge about NIST, MITRE ATT&CK, ISO 27001; incident response process.

Technical Competency:


  • Knowledge about other Splunk SIEM, SOC, EDR. Building dashboards, log intake, use cases building, and fine-tuning.
  • Analitical Aptitude: Good analytical mind with problem-solving abilities while doing investigations.
  • Communication: Effective communication of the findings using both written as well as the verbal method.
  • Detail orientation: Having good attention to details in log analysis and report generation.
  • Adaptability: Adaptability to working in a high-pressure environment, where multiple incidents and priorities are expected to be dealt with.

Job Classification

Industry: IT Services & Consulting
Functional Area / Department: IT & Information Security
Role Category: IT Security
Role: Security Engineer / Analyst
Employement Type: Full time

Contact Details:

Company: Capgemini
Location(s): Bengaluru

+ View Contactajax loader


Keyskills:   SOC SIEM Splunk Security Operations Center Security Information And Event Management

 Fraud Alert to job seekers!

₹ Not Disclosed

Similar positions

Cyber Threat Intelligence Analyst

  • Fortinet Technologies
  • 3 - 7 years
  • Pune
  • 1 day ago
₹ Not Disclosed

Cyber Security Analyst - L4

  • Wipro
  • 5 - 8 years
  • Hyderabad
  • 5 days ago
₹ Not Disclosed

Cyber Security Analyst - L4

  • Wipro
  • 5 - 8 years
  • Hyderabad
  • 5 days ago
₹ Not Disclosed

Cyber Security Analyst - L3

  • Wipro
  • 3 - 5 years
  • Hyderabad
  • 5 days ago
₹ Not Disclosed

Capgemini

Capgemini Invent