SOC L3 Analyst - Incident Response

Mahape, Navi Mumbai, Maharasht, IN

⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️

Atos

We design digital solutions from the everyday to the mission critical — in artificial intelligence, hybrid cloud, infrastructure management, decarbonization and employee experience.

View all jobs at Atos

Apply now Apply later

About Atos

 

Atos is a global leader in digital transformation with c. 78,000 employees and annual revenue of c. € 10 billion. European number one in cybersecurity, cloud and high-performance computing, the Group provides tailored end-to-end solutions for all industries in 68 countries. A pioneer in decarbonization services and products, Atos is committed to a secure and decarbonized digital for its clients. Atos is a SE (Societas Europaea) and listed on Euronext Paris.

 

The purpose of Atos is to help design the future of the information space. Its expertise and services support the development of knowledge, education and research in a multicultural approach and contribute to the development of scientific and technological excellence. Across the world, the Group enables its customers and employees, and members of societies at large to live, work and develop sustainably, in a safe and secure information space.

Responsibilities-

  • Act as the final escalation point for complex security incidents and alerts.
  • Perform deep-dive analysis of security events using SIEM, EDR, and other security tools.
  • Lead incident response efforts, including containment, eradication, and recovery. Conduct threat hunting to proactively detect and mitigate threats.
  • Develop and maintain playbooks and procedures for incident handling.
  • Mentor and guide SOC L1 and L2 analysts.
  • Work with threat intelligence teams to correlate global threats with local events.
  • Support forensic investigations, root cause analysis, and post-incident reviews.
  • Evaluate and recommend enhancements to SOC processes and tools.
  • Assist with tuning of detection systems to reduce false positives.
  • Any Graduate with 5-10 years’ experience of working in IT Security.
  • Good Knowledge of Incident Management.
  • Experience in working High Severity Complex Cyber Security Incidents that involved multiple Business Functions and Technology Teams.
  • Good Data Analysis and Presentation skills.
  • Good Communication skills.
  • Good understanding of MITRE ATT&CK Framework

Beneficial:

  • Good Documentation skills
  • Good at Incident Management.

Personal Characteristics:

  • Strong communication skills, ability to work comfortably with different regions
  • Actively participate within internal project community  
  • Good team player, ability to work on a local, regional and global basis and as part of joint cross location initiative.
  • Self-motivated, able to work independently and with a team
  • Able to perform under pressure.
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  8  0  0

Tags: C Cloud EDR Incident response MITRE ATT&CK SIEM SOC Threat intelligence

Perks/benefits: Team events

Region: Asia/Pacific
Country: India

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.