Job Description
We are looking for a motivated SOC Analyst to join our team. The ideal candidate will have 1.5-6 years of experience in cybersecurity, with a focus on
threat investigation and hunting.
Note : Hands-on Working experience on IBM Qradar SIEM (Mandatory)
Handson on Sentinel One EDR & other SOC technologies would be an added advantage.
Responsibilities:
Monitor security events and alerts to identify potential threats.
Assist in investigating security incidents and conducting threat hunting activities.
Analyze security data and provide reports to the senior team members.
Assist in implementing and maintaining security controls and measures.
Use Case Creation, testing.
Creating SIEM Reports and Customized Customer Dashboards.
Good to have certifications like Comp TIA Security+, CEH, IBM Qradar Certified.
-- : e Sec Forte® Technologies!
threat investigation and hunting.
Note : Hands-on Working experience on IBM Qradar SIEM (Mandatory)
Handson on Sentinel One EDR & other SOC technologies would be an added advantage.
Responsibilities:
Monitor security events and alerts to identify potential threats.
Assist in investigating security incidents and conducting threat hunting activities.
Analyze security data and provide reports to the senior team members.
Assist in implementing and maintaining security controls and measures.
Use Case Creation, testing.
Creating SIEM Reports and Customized Customer Dashboards.
Good to have certifications like Comp TIA Security+, CEH, IBM Qradar Certified.
-- : e Sec Forte® Technologies!